Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (251)
  • Open Access

    ARTICLE

    Searchable Attribute-Based Encryption with Multi-Keyword Fuzzy Matching for Cloud-Based IoT

    He Duan, Shi Zhang*, Dayu Li

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069628 - 09 December 2025

    Abstract Internet of Things (IoT) interconnects devices via network protocols to enable intelligent sensing and control. Resource-constrained IoT devices rely on cloud servers for data storage and processing. However, this cloud-assisted architecture faces two critical challenges: the untrusted cloud services and the separation of data ownership from control. Although Attribute-based Searchable Encryption (ABSE) provides fine-grained access control and keyword search over encrypted data, existing schemes lack of error tolerance in exact multi-keyword matching. In this paper, we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search (FCS-ABMSE) scheme that avoids computationally expensive bilinear pairing… More >

  • Open Access

    ARTICLE

    Priority-Based Scheduling and Orchestration in Edge-Cloud Computing: A Deep Reinforcement Learning-Enhanced Concurrency Control Approach

    Mohammad A Al Khaldy1, Ahmad Nabot2, Ahmad Al-Qerem3,*, Mohammad Alauthman4, Amina Salhi5,*, Suhaila Abuowaida6, Naceur Chihaoui7

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 673-697, 2025, DOI:10.32604/cmes.2025.070004 - 30 October 2025

    Abstract The exponential growth of Internet of Things (IoT) devices has created unprecedented challenges in data processing and resource management for time-critical applications. Traditional cloud computing paradigms cannot meet the stringent latency requirements of modern IoT systems, while pure edge computing faces resource constraints that limit processing capabilities. This paper addresses these challenges by proposing a novel Deep Reinforcement Learning (DRL)-enhanced priority-based scheduling framework for hybrid edge-cloud computing environments. Our approach integrates adaptive priority assignment with a two-level concurrency control protocol that ensures both optimal performance and data consistency. The framework introduces three key innovations: (1)… More >

  • Open Access

    ARTICLE

    A Genetic Algorithm-Based Double Auction Framework for Secure and Scalable Resource Allocation in Cloud-Integrated Intrusion Detection Systems

    Siraj Un Muneer1, Ihsan Ullah1, Zeshan Iqbal2,*, Rajermani Thinakaran3

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4959-4975, 2025, DOI:10.32604/cmc.2025.068566 - 23 October 2025

    Abstract The complexity of cloud environments challenges secure resource management, especially for intrusion detection systems (IDS). Existing strategies struggle to balance efficiency, cost fairness, and threat resilience. This paper proposes an innovative approach to managing cloud resources through the integration of a genetic algorithm (GA) with a “double auction” method. This approach seeks to enhance security and efficiency by aligning buyers and sellers within an intelligent market framework. It guarantees equitable pricing while utilizing resources efficiently and optimizing advantages for all stakeholders. The GA functions as an intelligent search mechanism that identifies optimal combinations of bids More >

  • Open Access

    ARTICLE

    An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services

    Victor Otieno Mony*, Anselemo Peters Ikoha, Roselida O. Maroko

    Journal of Cyber Security, Vol.7, pp. 395-415, 2025, DOI:10.32604/jcs.2025.070952 - 30 September 2025

    Abstract The widespread adoption of Cloud-Based Services has significantly increased the surface area for cyber threats, particularly targeting authentication mechanisms, which remain among the most vulnerable components of cloud security. This study aimed to address these challenges by developing and evaluating an Intelligent Zero Trust Architecture model tailored to mitigate authentication-related threats in Cloud-Based Services environments. Data was sourced from public repositories, including Kaggle and the National Institute for Standards and Technology MITRE Corporation’s Adversarial Tactics, Techniques, & Common Knowledge (ATT&CK) framework. The study utilized two trust signals: Behavioral targeting system users and Contextual targeting system… More >

  • Open Access

    ARTICLE

    Approximate Homomorphic Encryption for MLaaS by CKKS with Operation-Error-Bound

    Ray-I Chang1, Chia-Hui Wang2,*, Yen-Ting Chang1, Lien-Chen Wei2

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 503-518, 2025, DOI:10.32604/cmc.2025.068516 - 29 August 2025

    Abstract As data analysis often incurs significant communication and computational costs, these tasks are increasingly outsourced to cloud computing platforms. However, this introduces privacy concerns, as sensitive data must be transmitted to and processed by untrusted parties. To address this, fully homomorphic encryption (FHE) has emerged as a promising solution for privacy-preserving Machine-Learning-as-a-Service (MLaaS), enabling computation on encrypted data without revealing the plaintext. Nevertheless, FHE remains computationally expensive. As a result, approximate homomorphic encryption (AHE) schemes, such as CKKS, have attracted attention due to their efficiency. In our previous work, we proposed RP-OKC, a CKKS-based clustering… More >

  • Open Access

    ARTICLE

    Energy Efficient and Resource Allocation in Cloud Computing Using QT-DNN and Binary Bird Swarm Optimization

    Puneet Sharma1, Dhirendra Prasad Yadav1, Bhisham Sharma2,*, Surbhi B. Khan3,4,*, Ahlam Almusharraf 5

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2179-2193, 2025, DOI:10.32604/cmc.2025.063190 - 29 August 2025

    Abstract The swift expansion of cloud computing has heightened the demand for energy-efficient and high-performance resource allocation solutions across extensive systems. This research presents an innovative hybrid framework that combines a Quantum Tensor-based Deep Neural Network (QT-DNN) with Binary Bird Swarm Optimization (BBSO) to enhance resource allocation while preserving Quality of Service (QoS). In contrast to conventional approaches, the QT-DNN accurately predicts task-resource mappings using tensor-based task representation, significantly minimizing computing overhead. The BBSO allocates resources dynamically, optimizing energy efficiency and task distribution. Experimental results from extensive simulations indicate the efficacy of the suggested strategy; the… More >

  • Open Access

    ARTICLE

    Dynamic Multi-Objective Gannet Optimization (DMGO): An Adaptive Algorithm for Efficient Data Replication in Cloud Systems

    P. William1,2, Ved Prakash Mishra1, Osamah Ibrahim Khalaf3,*, Arvind Mukundan4, Yogeesh N5, Riya Karmakar6

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5133-5156, 2025, DOI:10.32604/cmc.2025.065840 - 30 July 2025

    Abstract Cloud computing has become an essential technology for the management and processing of large datasets, offering scalability, high availability, and fault tolerance. However, optimizing data replication across multiple data centers poses a significant challenge, especially when balancing opposing goals such as latency, storage costs, energy consumption, and network efficiency. This study introduces a novel Dynamic Optimization Algorithm called Dynamic Multi-Objective Gannet Optimization (DMGO), designed to enhance data replication efficiency in cloud environments. Unlike traditional static replication systems, DMGO adapts dynamically to variations in network conditions, system demand, and resource availability. The approach utilizes multi-objective optimization More >

  • Open Access

    ARTICLE

    SDVformer: A Resource Prediction Method for Cloud Computing Systems

    Shui Liu1,2, Ke Xiong1,2,*, Yeshen Li1,2, Zhifei Zhang1,2,*, Yu Zhang3, Pingyi Fan4

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5077-5093, 2025, DOI:10.32604/cmc.2025.064880 - 30 July 2025

    Abstract Accurate prediction of cloud resource utilization is critical. It helps improve service quality while avoiding resource waste and shortages. However, the time series of resource usage in cloud computing systems often exhibit multidimensionality, nonlinearity, and high volatility, making the high-precision prediction of resource utilization a complex and challenging task. At present, cloud computing resource prediction methods include traditional statistical models, hybrid approaches combining machine learning and classical models, and deep learning techniques. Traditional statistical methods struggle with nonlinear predictions, hybrid methods face challenges in feature extraction and long-term dependencies, and deep learning methods incur high… More >

  • Open Access

    ARTICLE

    A Comprehensive Study of Resource Provisioning and Optimization in Edge Computing

    Sreebha Bhaskaran*, Supriya Muthuraman

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5037-5070, 2025, DOI:10.32604/cmc.2025.062657 - 19 May 2025

    Abstract Efficient resource provisioning, allocation, and computation offloading are critical to realizing low-latency, scalable, and energy-efficient applications in cloud, fog, and edge computing. Despite its importance, integrating Software Defined Networks (SDN) for enhancing resource orchestration, task scheduling, and traffic management remains a relatively underexplored area with significant innovation potential. This paper provides a comprehensive review of existing mechanisms, categorizing resource provisioning approaches into static, dynamic, and user-centric models, while examining applications across domains such as IoT, healthcare, and autonomous systems. The survey highlights challenges such as scalability, interoperability, and security in managing dynamic and heterogeneous infrastructures. More >

  • Open Access

    ARTICLE

    Provable Data Possession with Outsourced Tag Generation for AI-Driven E-Commerce

    Yi Li1, Wenying Zheng2, Yu-Sheng Su3,4,5,*, Meiqin Tang6

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2719-2734, 2025, DOI:10.32604/cmc.2025.059949 - 16 April 2025

    Abstract AI applications have become ubiquitous, bringing significant convenience to various industries. In e-commerce, AI can enhance product recommendations for individuals and provide businesses with more accurate predictions for market strategy development. However, if the data used for AI applications is damaged or lost, it will inevitably affect the effectiveness of these AI applications. Therefore, it is essential to verify the integrity of e-commerce data. Although existing Provable Data Possession (PDP) protocols can verify the integrity of cloud data, they are not suitable for e-commerce scenarios due to the limited computational capabilities of edge servers, which More >

Displaying 1-10 on page 1 of 251. Per Page