Trustworthy Data Collection Approach in Sensor-Cloud Systems

sensor-cloud systems have received wide attention from both academia and industry. Sensor-cloud system not only improves performances of wireless sensor networks (WSNs), but also combines different functional WSNs together to provide comprehensive services. However, a variety of malicious attacks threaten the sensor-cloud security, such as integrity, authenticity, availability and so on. Traditional available security mechanisms (e.g. cryptography and authentication) are still vulnerable. Although there are schemes to provide security by trust evaluation, the evaluation considers whether or not a sensor is credible only by checking the communication behaviors. Furthermore, when…

Read More

PacketCloud: an Open Platform for Elastic In-network Services

PacketCloud: an Open Platform for Elastic In-network Services The Internet was designed with the end-to-end principle where the network layer provided merely the best-effort for- warding service. This design makes it challenging to add new services to the network layer. However, as the Inter- net connectivity becomes a commodity, users and applications increasingly demand new in-network services. This paper proposes PacketCloud, a cloudlet-based open platform to host elastic in-network services. PacketCloud can help both Internet Service Providers (ISPs) and emerging appliation/content providers deploy their services to strategic network locations. We…

Read More

Flexible Data Access Control based on Trust and Reputation in Cloud Computing

Flexible Data Access Control based on Trust and Reputation in Cloud Computing Nowadays cloud computing is gaining more essential cue its abundant services in data storage and retrieval. Individuals and institutions seeks cloud server as a storage medium to reduce their storage burden under local devices. As the cloud service providers are considered to be untrusted, users generally store their crucial data in an encrypted form. Data need to be accessed by other entities for fulfilling an expected service, e.g., an eHealth service. Controlling persona and sensitive data from cloud…

Read More

TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Data privacy is a growing challenge in cloud computing, as the users data are uploaded on a third party cloud. To preserve data privacy for user uploaded data, the data is encrypted and stored in cloud server. When the user request for data, it can be downloaded and decrypted from user side. Data encryption incurs high overhead, which make it necessary to find an efficient search scheme. Existing technique uses, single keyword search on encrypted data, in which user…

Read More

A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds

A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds Load-balanced flow scheduling for big data centers in clouds, in which a large amount of data needs to be transferred frequently among thousands of interconnected servers, is a key and challenging issue. The OpenFlow is a promising solution to balance data flows in a data center network through its programmatic traffic controller. Existing OpenFlow based scheduling schemes, however, statically set up routes only at the initialization stage of data transmissions, which suffers from dynamical flow distribution and…

Read More

Secure k-NN Query on Encrypted Cloud Data with Multiple Keys

Secure k-NN Query on Encrypted Cloud Data with Multiple Keys The k-nearest neighbors (k-NN) query is a fundamental primitive in spatial and multimedia databases. It has extensive applications in location-based services, classification & clustering and so on. With the promise of confidentiality and privacy, massive data are increasingly outsourced to cloud in the encrypted form for enjoying the advantages of cloud computing (e.g., reduce storage and query processing costs). Recently, many schemes have been proposed to support k-NN query on encrypted cloud data. However, prior works have all assumed that…

Read More

Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing

Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing Privacy has become a considerable issue when the applications of big data are dramatically growing in cloud computing. The benefits of the implementation for these emerging technologies have improved or changed service models and improve application performances in various perspectives. However, the remarkably growing volume of data sizes has also resulted in many challenges in practice. The execution time of the data encryption is one of the serious issues during the data processing and transmissions. Many current applications abandon…

Read More

Power Consumption-Aware Virtual Machine Placement in Cloud Data Center

Power Consumption-Aware Virtual Machine Placement in Cloud Data Center A set of Virtual Machine (VM) allocators for Cloud Data Centers (DCs) that perform the joint allocation of computing and network resources. VM requests are defined in terms of system (CPU, RAM and Disk) and network (Bandwidth) resources. As concerns the first ones, we allocate VM resources following two different policies, namely Best Fit and Worst Fit, corresponding to consolidation and spreading strategies respectively. For each server, the allocators choose the network path that minimizes electrical power consumption, evaluated according to…

Read More

Fast Phrase Search for Encrypted Cloud Storage

Fast Phrase Search for Encrypted Cloud Storage Cloud computing has generated much interest in the research community in recent years for its many advantages, but has also raise security and privacy concerns. The storage and access of confidential documents have been identified as one of the central problems in the area. In particular, many researchers investigated solutions to search over encrypted documents stored on remote cloud servers. While many schemes have been proposed to perform conjunctive keyword search, less attention has been noted on more specialized searching techniques. In this…

Read More

Privacy and Security of Sharing Referral Medical Record for Health Care System

Privacy and Security of Sharing Referral Medical Record for Health Care System Sharing of health information become daily routines in which hospitals and clinics often refer patients to specialists because of their limited facilities, services, and number of specialist physicians. This paper proposed secure design for sharing referral medical record using HIBE (Hierarchical IDBased Encryption), that focused on the ability of sharing information and ensuring privacy of referral medical record. Our proposed system is able to secure referral medical record from third parties and only the referral physician that can…

Read More