Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
921
Cybersecurity and Liability in a Big Data World
Published 2018-10-01“… The interplay between big data and cloud computing is at the same time undoubtedly promising, challenging and puzzling. …”
Get full text
Article -
922
Permeability evaluation of Industry 4.0 technologies in cloud-based energy management systems environments - Energy Cloud
Published 2021-08-01“…Main findings The results show that there is a greater understanding and use of the Internet of Things and Sensors technologies to the detriment of Cloud Computing and Big Data. Implications for theory and practice The article shows that there is a need for managers to seek greater familiarization, especially with Cloud Computing and Big Data.…”
Get full text
Article -
923
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
924
Latency-Aware Power Management in Software-Defined Radios
Published 2020-01-01“…Cloud computing provides benefits in terms of equipment consolidation and power savings from higher utilization for virtualizable software. …”
Get full text
Article -
925
Towards carbon emission modeling and optimization for time-sensitive IIoT
Published 2025-03-01“…The large-scale deployment of edge computing and cloud computing infrastructures has brought both opportunities and challenges to the realization of the green and low-carbon industrial Internet of things (IIoT). …”
Get full text
Article -
926
Implementing Fuzzy TOPSIS in Cloud Type and Service Provider Selection
Published 2018-01-01“…Cloud computing can be considered as one of the leading-edge technological advances in the current IT industry. …”
Get full text
Article -
927
Hybrid Electro Search with Ant Colony Optimization Algorithm for Task Scheduling in a Sensor Cloud Environment for Agriculture Irrigation Control System
Published 2022-01-01“…Integrating cloud computing with wireless sensor networks creates a sensor cloud (WSN). …”
Get full text
Article -
928
Temporal fusion transformer-based strategy for efficient multi-cloud content replication
Published 2025-03-01“…In cloud computing, ensuring the high availability and reliability of data is dominant for efficient content delivery. …”
Get full text
Article -
929
On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems
Published 2022-11-01Get full text
Article -
930
A Genetic-Algorithm-Based Approach for Task Migration in Pervasive Clouds
Published 2015-08-01“…Pervasive computing is converging with cloud computing which becomes pervasive cloud computing as an emerging computing paradigm. …”
Get full text
Article -
931
Advancing Data Privacy in Cloud Storage: A Novel Multi-Layer Encoding Framework
Published 2025-07-01“…In response to the identified gap in privacy-preserving techniques for cloud computing, this research paper presents a novel and adaptable framework. …”
Get full text
Article -
932
Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities
Published 2025-01-01“…Cloud computing centralizes resources in distant data centers, leading to high latency and increased network congestion, while edge computing, though closer to data sources, lacks the agility to dynamically adapt to fluctuating workloads, user mobility, and real-time requirements. …”
Get full text
Article -
933
Improvement of Business Analysis Method of E-Commerce System from the Perspective of Intelligent Recommendation System
Published 2022-01-01“…Aiming at the new requirements for the development of e-commerce intelligent recommendation technology in the big data environment, this paper uses the big data processing technology based on cloud computing and focuses on the realization technology of the e-commerce intelligent recommendation algorithm and the comprehensive evaluation method of the recommendation system in the big data environment. …”
Get full text
Article -
934
A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform
Published 2018-01-01“…With the continuous development of cloud computing, cloud security has become one of the most important issues in cloud computing. …”
Get full text
Article -
935
Collaborative Big Data Management and Analytics in Complex Systems with Edge 2021 eaCamera: A Case Study on AI-Based Complex Attention Analysis with Edge System
Published 2021-01-01“…As an extension of cloud computing, edge computing makes up for the deficiency of cloud computing to a certain extent. …”
Get full text
Article -
936
A comprehensive IoT cloud-based wind station ready for real-time measurements and artificial intelligence integration
Published 2024-12-01“…This paper presents an integrated approach for a cloud-computing Internet of Things-based Automated Weather Station, with edge devices, designed to provide real-time wind measurements in diverse environments. …”
Get full text
Article -
937
A Novel Artificial Bee Colony Approach of Live Virtual Machine Migration Policy Using Bayes Theorem
Published 2013-01-01“…Green cloud data center has become a research hotspot of virtualized cloud computing architecture. Since live virtual machine (VM) migration technology is widely used and studied in cloud computing, we have focused on the VM placement selection of live migration for power saving. …”
Get full text
Article -
938
RACHEIM: Reinforced Reliable Computing in Cloud by Ensuring Restricted Access Control
Published 2025-06-01“…Cloud computing has witnessed rapid growth and notable technological progress in recent years. …”
Get full text
Article -
939
SpanTrain: a cross-domain distributed model training system for cloud-edge-end heterogeneous devices
Published 2025-05-01“…Currently, in addition to cloud computing centers, the edge and end environments represented by the internet of things, fixed or mobile computing edges are also filled with a large number of intelligent computing devices. …”
Get full text
Article -
940
Quality of Experience Aware Service Selection Model to Empower Edge Computing in IoT
Published 2025-01-01Get full text
Article