Match!
Journal of Parallel and Distributed Computing
IF
1.82
Papers
3883
Papers 3814
1 page of 382 pages (3,814 results)
Newest
#1S. Jaya Nirmala (National Institute of Technology, Tiruchirappalli)H-Index: 3
#2Amrith Rajagopal Setlur (National Institute of Technology, Tiruchirappalli)
Last.Sudhanshu Khoriya (National Institute of Technology, Tiruchirappalli)
view all 0 authors...
Abstract Scientific workflows have been predominantly used for complex and large scale data analysis and scientific computation/automation and the need for robust workflow scheduling techniques has grown considerably. But, most of the existing workflow scheduling algorithms do not provide the required reliability and robustness. In this paper, a new fault tolerant workflow scheduling algorithm that learns replication heuristics in an unsupervised manner has been proposed. Furthermore, the use of...
#1En Wang (JLU: Jilin University)H-Index: 5
#2Yongjian Yang (JLU: Jilin University)H-Index: 5
Last.Yuanbo Xu (JLU: Jilin University)H-Index: 2
view all 0 authors...
Abstract Mobile crowdsensing offers a new platform that recruits a suitable set of users to collectively complete an information collection/sensing task through users’ equipped devices. As a special case, video crowdsensing is to collect different video segments of the same event that are taken separately by the built-in cameras of mobile devices, and then combine them into a complete video. Mobile crowdsensing has attracted considerable attention recently due to the rich information that can be...
#1Hui Yin (CCSU: Changsha University)H-Index: 2
#2Zheng Qin (Hunan University)H-Index: 3
Last.Keqin Li (SUNY: State University of New York System)H-Index: 33
view all 0 authors...
Abstract With the rapid development of cloud computing, secure search has become a hot research spot, which is a promising technique that allows a data user to perform privacy-preserving keyword-based search over encrypted cloud data. In this paper, we further consider the secure search problem based on a practical application scenario that a data owner needs to grant different keyword query permissions for different data users to achieve flexible access control on outsourced encrypted data in t...
#1Kai Fan (Xidian University)H-Index: 8
view all 0 authors...
Abstract With the development of computer technology, it makes malicious users more easily get data stored in cloud. However, these data are always related to users’ privacy, and it is harmful when the data are acquired by attackers. Ciphertext-policy attribute-based encryption (CP-ABE) is suitable to achieve privacy and security in cloud. In this paper, we put forward a secure and efficient outsourced computation algorithm on data sharing scheme for privacy computing. Existing schemes only outs...
#1Lakshmi J. Mohan (University of Melbourne)H-Index: 1
#2Ketan Rajawat (IITK: Indian Institute of Technology Kanpur)H-Index: 11
Last.Aaron Harwood (University of Melbourne)H-Index: 13
view all 0 authors...
Abstract Erasure codes are increasingly being used by storage providers to reduce the cost of reliably storing large volumes of data. As compared to the default mechanism of triple replication, erasure codes result in optimal storage efficiency, but require significant network and disk usage during repair of failed data. The repair process is particularly complicated for storage clusters with data centers spread across a wide geographical area. For such geo-diverse clusters, the recovery perform...
#1Sana Belguith (University of Salford)H-Index: 3
#2Nesrine Kaaniche (University of Sheffield)H-Index: 6
Last.Rabah Attia (Carthage University)H-Index: 6
view all 5 authors...
Abstract In this paper, we propose an accountable privacy preserving attribute-based framework, called Ins-PAbAC , that combines attribute based encryption and attribute based signature techniques for securely sharing outsourced data contents via public cloud servers. The proposed framework presents several advantages. First, it provides an encrypted access control feature, enforced at the data owner’s side, while providing the desired expressiveness of access control policies. Second, Ins-PAbAC...
#1Jinwen Liang (Hunan University)
#2Zheng Qin (Hunan University)H-Index: 3
Last.Keqin Li (Hunan University)H-Index: 33
view all 0 authors...
Abstract Range query is an important data search technique in cloud-based electronic healthcare (eHealth) systems. It enables authorized doctors to retrieve target electronic health records (EHRs) that are generated and outsourced by patients from the cloud server. In reality, patients always encrypt their EHRs before outsourcing, making the range query impossible. In this paper, we identify three threats in real cloud-based eHealth systems, i.e., privacy leakage, frequency analysis, and identic...
#1Yuanyuan HeH-Index: 3
#2Yuanyuan He (CAS: Chinese Academy of Sciences)
Last.Xuemin ShenH-Index: 74
view all 0 authors...
Abstract Crowdsourced bus service provides the customized bus for a group of users with similar itineraries by designing the route based on the users’ trip plans. With crowdsourced bus service, the users with similar trips can enjoy the customized bus route efficiently and inexpensively. However, serious privacy concerns (e.g., the exposure of users’ current and future locations) have become a major barrier. To protect users’ itineraries, we propose Privbus, a privacy-enhanced crowdsourced bus s...
#1Weibei Fan (NUPT: Nanjing University of Posts and Telecommunications)
view all 0 authors...
Abstract With the rise of cloud service providers and the continuous virtualization of data centers, data center networks are also developing rapidly. As data centers become more and more complex, the demand for security increases dramatically. This paper discusses the privacy inherent in data centers. However, there is no general solution to the privacy problem in data centers due to the device heterogeneity. In this paper, we proposed a local differential privacy-based classification algorithm...
12345678910