In the cloud service paradigm, service providers aim to cost-efficiently serve Internet of Things (IoT) devices' applications that often request computation-intensive services. In this study, we focus on the cloud...
详细信息
In the cloud service paradigm, service providers aim to cost-efficiently serve Internet of Things (IoT) devices' applications that often request computation-intensive services. In this study, we focus on the cloud resource sharing problem in the distributed mobile cloud computing (DMCC) platform. By considering different IoT applications and distributedcloud infrastructure, we design a novel DMCC resource sharing scheme for data offloading services. Based on the cooperative game theory, five different value solutions are adopted, and they are implemented for each case cooperative process to provide the fair-efficient solution. According to the service characteristics, our proposed scheme explores the mutual benefits of local and global MCC providers' interactions, and effectively shares the distributedcloud resources. To dynamically adapt the current DMCC system conditions, our approach can provide an appropriate guidance to improve the efficiency of cloud resource usage while enhancing the service quality. The main novelty of our proposed scheme is the ability to leverage a reciprocal consensus between different control viewpoints. Therefore, we can ensure a relevant tradeoff between efficiency and fairness among multiple service providers.
With the flourishing build out of the cloudcomputing, privacy and security worries of outsourcing data have been increasing to a great extent. mobilecloud model aids for analyzing the information related with patien...
详细信息
ISBN:
(纸本)9781728140421
With the flourishing build out of the cloudcomputing, privacy and security worries of outsourcing data have been increasing to a great extent. mobilecloud model aids for analyzing the information related with patients data and to give recommendations in healthcare applications. A fine-grained level access management of multi-server cloud information is very essential requirement accomplishing and for implementation of end users application, in mobilecloudcomputing. Present paper is to illustrate collective focus of fine grained access control of clouds based servers information besides a incontrovertibly mobilecloud users validation system of healthcare industry using ABE algorithm. We as a proposed system will use an auditing technique for fraud detection of data on cloud side. Initially distributed modular and distinguished construction of large-scale virtual mechanisms behavior is illustrated based on distributed monitoring agent and later on feasible, appropriate parallel trust computing system is presented for large data. Evaluation of analysis and results of the experiment confirms the practicability and efficiency of system proposed.
Secure and efficient lightweight user authentication protocol for mobilecloudcomputing becomes a paramount concern due to the data sharing using Internet among the end users and mobile devices. Mutual authentication...
详细信息
Secure and efficient lightweight user authentication protocol for mobilecloudcomputing becomes a paramount concern due to the data sharing using Internet among the end users and mobile devices. Mutual authentication of a mobile user and cloud service provider is necessary for accessing of any cloud services. However, resource constraint nature of mobile devices makes this task more challenging. In this paper, we propose a new secure and lightweight mobile user authentication scheme for mobilecloudcomputing, based on cryptographic hash, bitwise XOR, and fuzzy extractor functions. Through informal security analysis and rigorous formal security analysis using random oracle model, it has been demonstrated that the proposed scheme is secure against possible well-known passive and active attacks and also provides user anonymity. Moreover, we provide formal security verification through ProVerif 1.93 simulation for the proposed scheme. Also, we have done authentication proof of our proposed scheme using the Burrows-Abadi-Needham logic. Since the proposed scheme does not exploit any resource constrained cryptosystem, it has the lowest computation cost in compare to existing related schemes. Furthermore, the proposed scheme does not involve registration center in the authentication process, for which it is having lowest communication cost compared with existing related schemes.
暂无评论