A QoS-based approach for cloud-service matchmaking, selection and composition using the Semantic Web

KJ Modi, S Garg - Journal of Systems and Information Technology, 2019 - emerald.com
Purpose Cloud computing provides a dynamic, heterogeneous and elastic environment by
offering accessible 'cloud services' to end-users. The tasks involved in making cloud …

Improved pre-copy algorithm using statistical prediction and compression model for efficient live memory migration

M Patel, S Chaudhary, S Garg - International Journal of …, 2018 - inderscienceonline.com
Xen hypervisor is used to execute and migrate the guests on different architectures using a
pre-copy algorithm. There are three major categories to improve pre-copy using live …

Efficient and secure software-defined mobile cloud computing infrastructure

L Tawalbeh, Y Haddad, O Khamis… - … Journal of High …, 2016 - inderscienceonline.com
This paper proposes an efficient software-based data possession mobile cloud computing
framework. The proposed design combines the characteristics of two frameworks. The first …

An approach to transform Internet of Things data into knowledge

I Atanasov, A Nikolov… - International Journal of …, 2017 - inderscienceonline.com
The concept of Internet of Things (IoT) will play an essential role in future applications aimed
at optimisation of energy consumption. Interoperability of IoT applications can be achieved …

Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application

C Hu, P Liu, S Guo, Q Xu - International Journal of High …, 2017 - inderscienceonline.com
Hierarchical identity-based encryption can be used to protect the sensitive data in cloud
system. However, as the traditional security model does not capture side-channel attacks …

An approach to data annotation for internet of things

I Atanasov, A Nikolov, E Pencheva… - International Journal of …, 2015 - igi-global.com
The increasing number of connected devices which use Internet of Things (IoT) technology
and variety of associated services is a real challenge to interoperability. There is a need of …

A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience

C Hu, R Yang, P Liu, T Li, F Kong - The Journal of Supercomputing, 2019 - Springer
Public-key encryption is an important security mechanism used in cloud environment. To
ensure the confidentiality of data encrypted using public-key encryption, countermeasures …

ACSmI: a solution to address the challenges of cloud services federation and monitoring towards the cloud continuum

J Alonso, M Huarte, LOE Arrieta - International Journal of …, 2023 - inderscienceonline.com
The evolution of cloud computing has changed the way in which cloud service providers
offer their services and how cloud customers consume them, moving towards the use of …

Achieving fine-grained access control and mitigating role explosion by utilising ABE with RBAC

B Balusamy, S Ramachandran… - International Journal of …, 2017 - inderscienceonline.com
Cloud systems can store a vast amount of sensitive data whose access must be well
regulated. A good access control policy ensures the security of this data while providing high …

A security ensemble framework for securing the file in cloud computing environments

JS Moses, M Nirmala, ED Raj - International Journal of …, 2019 - inderscienceonline.com
Scalability and on-demand features of cloud computing have revolutionised IT industry in a
large scale. Cloud service providers takes the entire burdens of computing, especially …