Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (379)
  • Open Access

    ARTICLE

    Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud

    Zaid Abdulsalam Ibrahim1,*, Muhammad Ilyas2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 939-956, 2023, DOI:10.32604/cmc.2023.035798

    Abstract Most research works nowadays deal with real-time Internet of Things (IoT) data. However, with exponential data volume increases, organizations need help storing such humongous amounts of IoT data in cloud storage systems. Moreover, such systems create security issues while efficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT data more secure and reliable in various cloud storage services. Cloud-assisted IoTs suffer from two privacy issues: access policies (public) and super polynomial decryption times (attributed mainly to complex access structures). We have developed a CP-ABE scheme in alignment with a Hidden Hierarchy Ciphertext-Policy… More >

  • Open Access

    ARTICLE

    Virtual Machine Consolidation with Multi-Step Prediction and Affinity-Aware Technique for Energy-Efficient Cloud Data Centers

    Pingping Li*, Jiuxin Cao

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 81-105, 2023, DOI:10.32604/cmc.2023.039076

    Abstract Virtual machine (VM) consolidation is an effective way to improve resource utilization and reduce energy consumption in cloud data centers. Most existing studies have considered VM consolidation as a bin-packing problem, but the current schemes commonly ignore the long-term relationship between VMs and hosts. In addition, there is a lack of long-term consideration for resource optimization in the VM consolidation, which results in unnecessary VM migration and increased energy consumption. To address these limitations, a VM consolidation method based on multi-step prediction and affinity-aware technique for energy-efficient cloud data centers (MPaAFVMC) is proposed. The proposed method uses an improved linear… More >

  • Open Access

    ARTICLE

    Energy and Latency Optimization in Edge-Fog-Cloud Computing for the Internet of Medical Things

    Hatem A. Alharbi1, Barzan A. Yosuf2, Mohammad Aldossary3,*, Jaber Almutairi4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1299-1319, 2023, DOI:10.32604/csse.2023.039367

    Abstract In this paper, the Internet of Medical Things (IoMT) is identified as a promising solution, which integrates with the cloud computing environment to provide remote health monitoring solutions and improve the quality of service (QoS) in the healthcare sector. However, problems with the present architectural models such as those related to energy consumption, service latency, execution cost, and resource usage, remain a major concern for adopting IoMT applications. To address these problems, this work presents a four-tier IoMT-edge-fog-cloud architecture along with an optimization model formulated using Mixed Integer Linear Programming (MILP), with the objective of efficiently processing and placing IoMT… More >

  • Open Access

    ARTICLE

    Securing Cloud Computing from Flash Crowd Attack Using Ensemble Intrusion Detection System

    Turke Althobaiti1,2, Yousef Sanjalawe3,*, Naeem Ramzan4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 453-469, 2023, DOI:10.32604/csse.2023.039207

    Abstract Flash Crowd attacks are a form of Distributed Denial of Service (DDoS) attack that is becoming increasingly difficult to detect due to its ability to imitate normal user behavior in Cloud Computing (CC). Botnets are often used by attackers to perform a wide range of DDoS attacks. With advancements in technology, bots are now able to simulate DDoS attacks as flash crowd events, making them difficult to detect. When it comes to application layer DDoS attacks, the Flash Crowd attack that occurs during a Flash Event is viewed as the most intricate issue. This is mainly because it can imitate… More >

  • Open Access

    ARTICLE

    A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments

    Zakariae Dlimi*, Abdellah Ezzati, Said Ben Alla

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 79-103, 2023, DOI:10.32604/csse.2023.037099

    Abstract The growing advent of the Internet of Things (IoT) users is driving the adoption of cloud computing technologies. The integration of IoT in the cloud enables storage and computational capabilities for IoT users. However, security has been one of the main concerns of cloud-integrated IoT. Existing work attempts to address the security concerns of cloud-integrated IoT through authentication, access control, and blockchain-based methods. However, existing frameworks are somewhat limited by scalability, privacy, and centralized structures. To mitigate the existing problems, we propose a blockchain-based distributed access control method for secure storage in the IoT cloud (BL-DAC). Initially, the BL-DAC performs… More >

  • Open Access

    ARTICLE

    Hybrid Chameleon and Honey Badger Optimization Algorithm for QoS-Based Cloud Service Composition Problem

    G. Manimala*, A. Chinnasamy

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 393-412, 2023, DOI:10.32604/csse.2023.037066

    Abstract Cloud computing facilitates the great potentiality of storing and managing remote access to services in terms of software as a service (SaaS). Several organizations have moved towards outsourcing over the cloud to reduce the burden on local resources. In this context, the metaheuristic optimization method is determined to be highly suitable for selecting appropriate services that comply with the requirements of the client’s requests, as the services stored over the cloud are too complex and scalable. To achieve better service composition, the parameters of Quality of Service (QoS) related to each service considered to be the best resource need to… More >

  • Open Access

    ARTICLE

    Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment

    Z. Faizal Khan1, Saeed M. Alshahrani2,*, Abdulrahman Alghamdi2, Someah Alangari3, Nouf Ibrahim Altamami4, Khalid A. Alissa5, Sana Alazwari6, Mesfer Al Duhayyim7, Fahd N. Al-Wesabi8

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 855-871, 2023, DOI:10.32604/csse.2023.036735

    Abstract The Internet of Things (IoT) is determine enormous economic openings for industries and allow stimulating innovation which obtain between domains in childcare for eldercare, in health service to energy, and in developed to transport. Cybersecurity develops a difficult problem in IoT platform whereas the presence of cyber-attack requires that solved. The progress of automatic devices for cyber-attack classifier and detection employing Artificial Intelligence (AI) and Machine Learning (ML) devices are crucial fact to realize security in IoT platform. It can be required for minimizing the issues of security based on IoT devices efficiently. Thus, this research proposal establishes novel mayfly… More >

  • Open Access

    ARTICLE

    Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud

    S. Sureshkumar1,*, G .K. D. Prasanna Venkatesan2, R. Santhosh3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.036267

    Abstract Cloud computing technology provides flexible, on-demand, and completely controlled computing resources and services are highly desirable. Despite this, with its distributed and dynamic nature and shortcomings in virtualization deployment, the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties. The Intrusion Detection System (IDS) is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources. DDoS attacks are becoming more frequent and powerful, and their attack pathways are continually changing, which requiring the development of new detection methods. Here the purpose of the study… More >

  • Open Access

    ARTICLE

    BFS-SVM Classifier for QoS and Resource Allocation in Cloud Environment

    A. Richard William1,*, J. Senthilkumar2, Y. Suresh2, V. Mohanraj2

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 777-790, 2023, DOI:10.32604/csse.2023.031753

    Abstract In cloud computing Resource allocation is a very complex task. Handling the customer demand makes the challenges of on-demand resource allocation. Many challenges are faced by conventional methods for resource allocation in order to meet the Quality of Service (QoS) requirements of users. For solving the about said problems a new method was implemented with the utility of machine learning framework of resource allocation by utilizing the cloud computing technique was taken in to an account in this research work. The accuracy in the machine learning algorithm can be improved by introducing Bat Algorithm with feature selection (BFS) in the… More >

  • Open Access

    ARTICLE

    Improved Cloud Storage Encryption Using Block Cipher-Based DNA Anti-Codify Model

    E. Srimathi1,*, S. P. Chokkalingam2

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 903-918, 2023, DOI:10.32604/csse.2023.029790

    Abstract When it comes to data storage, cloud computing and cloud storage providers play a critical role. The cloud data can be accessed from any location with an internet connection. Additionally, the risk of losing privacy when data is stored in a cloud environment is also increased. A variety of security techniques are employed in the cloud to enhance security. In this paper, we aim at maintaining the privacy of stored data in cloud environment by implementing block-based modelling to boost the privacy level with Anti-Codify Technique (ACoT) and block cipher-based algorithms. Initially, the cipher text is generated using Deoxyribo Nucleic… More >

Displaying 1-10 on page 1 of 379. Per Page  

Share Link