Subjects -> COMPUTER SCIENCE (Total: 2313 journals)
    - ANIMATION AND SIMULATION (33 journals)
    - ARTIFICIAL INTELLIGENCE (133 journals)
    - AUTOMATION AND ROBOTICS (116 journals)
    - CLOUD COMPUTING AND NETWORKS (75 journals)
    - COMPUTER ARCHITECTURE (11 journals)
    - COMPUTER ENGINEERING (12 journals)
    - COMPUTER GAMES (23 journals)
    - COMPUTER PROGRAMMING (25 journals)
    - COMPUTER SCIENCE (1305 journals)
    - COMPUTER SECURITY (59 journals)
    - DATA BASE MANAGEMENT (21 journals)
    - DATA MINING (50 journals)
    - E-BUSINESS (21 journals)
    - E-LEARNING (30 journals)
    - ELECTRONIC DATA PROCESSING (23 journals)
    - IMAGE AND VIDEO PROCESSING (42 journals)
    - INFORMATION SYSTEMS (109 journals)
    - INTERNET (111 journals)
    - SOCIAL WEB (61 journals)
    - SOFTWARE (43 journals)
    - THEORY OF COMPUTING (10 journals)

COMPUTER SCIENCE (1305 journals)            First | 1 2 3 4 5 6 7 | Last

Showing 601 - 800 of 872 Journals sorted alphabetically
International Journal of Digital Enterprise Technology     Hybrid Journal   (Followers: 1)
International Journal of Digital Literacy and Digital Competence     Full-text available via subscription   (Followers: 6)
International Journal of Digital Signals and Smart Systems     Hybrid Journal   (Followers: 4)
International Journal of Education and Development using Information and Communication Technology     Open Access   (Followers: 9)
International Journal of Electrical and Computer Engineering     Open Access   (Followers: 8)
International Journal of Electronic Banking     Hybrid Journal   (Followers: 3)
International Journal of Electronic Business     Hybrid Journal   (Followers: 2)
International Journal of Electronic Commerce     Full-text available via subscription   (Followers: 10)
International Journal of Electronic Government Research     Full-text available via subscription   (Followers: 3)
International Journal of Embedded and Real-Time Communication Systems     Full-text available via subscription   (Followers: 9)
International Journal of Engineering and Manufacturing     Open Access   (Followers: 3)
International Journal of Engineering Science     Hybrid Journal   (Followers: 5)
International Journal of Entertainment Technology and Management     Hybrid Journal   (Followers: 1)
International Journal of Experimental Design and Process Optimisation     Hybrid Journal   (Followers: 5)
International Journal of Foundations of Computer Science     Hybrid Journal   (Followers: 3)
International Journal of Fuzzy Computation and Modelling     Hybrid Journal   (Followers: 2)
International Journal of Fuzzy System Applications     Full-text available via subscription   (Followers: 3)
International Journal of General Systems     Hybrid Journal   (Followers: 1)
International Journal of Granular Computing, Rough Sets and Intelligent Systems     Hybrid Journal   (Followers: 1)
International Journal of Green Computing     Full-text available via subscription  
International Journal of Grid and High Performance Computing     Full-text available via subscription   (Followers: 2)
International Journal of Grid and Utility Computing     Hybrid Journal  
International Journal of Handheld Computing Research     Full-text available via subscription  
International Journal of Heritage in the Digital Era     Full-text available via subscription   (Followers: 7)
International Journal of High Performance Computing and Networking     Hybrid Journal   (Followers: 4)
International Journal of High Performance Computing Applications     Hybrid Journal   (Followers: 4)
International Journal of High Performance Systems Architecture     Hybrid Journal   (Followers: 6)
International Journal of Human Capital and Information Technology Professionals     Full-text available via subscription   (Followers: 3)
International Journal of Human-Computer Interaction     Hybrid Journal   (Followers: 22)
International Journal of Human-Computer Studies     Hybrid Journal   (Followers: 20)
International Journal of Humanitarian Technology     Hybrid Journal   (Followers: 1)
International Journal of Humanities and Arts Computing     Hybrid Journal   (Followers: 11)
International Journal of Hybrid Intelligence     Hybrid Journal   (Followers: 1)
International Journal of ICT Research and Development in Africa     Full-text available via subscription   (Followers: 4)
International Journal of Imaging Systems and Technology     Hybrid Journal   (Followers: 1)
International Journal of Impact Engineering     Hybrid Journal   (Followers: 9)
International Journal of Industrial and Systems Engineering     Hybrid Journal   (Followers: 7)
International Journal of Industrial Electronics and Drives     Hybrid Journal   (Followers: 3)
International Journal of Information and Coding Theory     Hybrid Journal   (Followers: 6)
International Journal of Information and Communication Technology Education     Full-text available via subscription   (Followers: 13)
International Journal of Information Communication Technologies and Human Development     Full-text available via subscription   (Followers: 4)
International Journal of Information Quality     Hybrid Journal   (Followers: 3)
International Journal of Information Retrieval Research     Full-text available via subscription   (Followers: 28)
International Journal of Information Science and Management     Open Access   (Followers: 5)
International Journal of Information Science and Technology     Open Access  
International Journal of Information Systems and Management     Hybrid Journal   (Followers: 2)
International Journal of Information Systems and Project Management     Free   (Followers: 12)
International Journal of Information Systems and Software Engineering for Big Companies     Open Access   (Followers: 2)
International Journal of Information Technology and Computer Science     Open Access   (Followers: 3)
International Journal of Information Technology and Web Engineering     Hybrid Journal   (Followers: 2)
International Journal of Information Technology Project Management     Full-text available via subscription   (Followers: 9)
International Journal of Information Technology, Communications and Convergence     Hybrid Journal   (Followers: 14)
International Journal of Innovation in the Digital Economy     Full-text available via subscription   (Followers: 5)
International Journal of Innovative Computing and Applications     Hybrid Journal   (Followers: 3)
International Journal of Innovative Technology and Research     Open Access   (Followers: 1)
International Journal of Intelligence and Sustainable Computing     Hybrid Journal  
International Journal of Intelligence Science     Open Access   (Followers: 3)
International Journal of Intelligent Engineering Informatics     Hybrid Journal  
International Journal of Intelligent Enterprise     Hybrid Journal   (Followers: 1)
International Journal of Intelligent Information and Database Systems     Hybrid Journal   (Followers: 3)
International Journal of Intelligent Internet of Things Computing     Hybrid Journal   (Followers: 2)
International Journal of Intelligent Networks     Open Access  
International Journal of Intelligent Systems Technologies and Applications     Hybrid Journal   (Followers: 2)
International Journal of Intercultural Relations     Hybrid Journal   (Followers: 16)
International Journal of IT Standards and Standardization Research     Full-text available via subscription  
International Journal of IT/Business Alignment and Governance     Full-text available via subscription  
International Journal of Knowledge and Systems Science     Full-text available via subscription   (Followers: 1)
International Journal of Knowledge Engineering and Soft Data Paradigms     Hybrid Journal   (Followers: 1)
International Journal of Knowledge Society Research     Full-text available via subscription  
International Journal of Leadership in Education: Theory and Practice     Hybrid Journal   (Followers: 23)
International Journal of Logistics Research and Applications : A Leading Journal of Supply Chain Management     Hybrid Journal   (Followers: 16)
International Journal of Management & Information Technology     Open Access   (Followers: 2)
International Journal of Management Innovation Systems     Open Access  
International Journal of Mathematical Modelling & Computations     Open Access   (Followers: 3)
International Journal of Mathematical Sciences and Computing     Open Access  
International Journal of Mathematics & Computation     Full-text available via subscription  
International Journal of Mathematics in Operational Research     Hybrid Journal   (Followers: 2)
International Journal of Medical Engineering and Informatics     Hybrid Journal   (Followers: 4)
International Journal of Medical Informatics     Hybrid Journal   (Followers: 10)
International Journal of Metadata, Semantics and Ontologies     Hybrid Journal   (Followers: 9)
International Journal of Metaheuristics     Hybrid Journal   (Followers: 1)
International Journal of Mobile Communications     Hybrid Journal   (Followers: 8)
International Journal of Mobile Computing and Multimedia Communications     Full-text available via subscription   (Followers: 2)
International Journal of Mobile Network Design and Innovation     Hybrid Journal   (Followers: 1)
International Journal of Modeling, Simulation, and Scientific Computing     Hybrid Journal   (Followers: 3)
International Journal of Modelling, Identification and Control     Hybrid Journal   (Followers: 1)
International Journal of Modern Education and Computer Science     Open Access   (Followers: 2)
International Journal of Multimedia Data Engineering and Management     Full-text available via subscription   (Followers: 2)
International Journal of Multimedia Information Retrieval     Partially Free   (Followers: 8)
International Journal of Nanotechnology and Molecular Computation     Full-text available via subscription   (Followers: 4)
International Journal of Natural Computing Research     Hybrid Journal  
International Journal of Neural Systems     Hybrid Journal   (Followers: 4)
International Journal of Online Marketing     Full-text available via subscription   (Followers: 5)
International Journal of Organizational and Collective Intelligence     Hybrid Journal   (Followers: 1)
International Journal of Parallel, Emergent and Distributed Systems     Hybrid Journal   (Followers: 3)
International Journal of Pattern Recognition and Artificial Intelligence     Hybrid Journal   (Followers: 12)
International Journal of Performance Arts and Digital Media     Hybrid Journal   (Followers: 12)
International Journal of Pervasive Computing and Communications     Hybrid Journal   (Followers: 3)
International Journal of Polymer Science     Open Access   (Followers: 25)
International Journal of Process Systems Engineering     Hybrid Journal   (Followers: 1)
International Journal of Quantum Information     Hybrid Journal   (Followers: 6)
International Journal of Reasoning-based Intelligent Systems     Hybrid Journal  
International Journal of Reconfigurable and Embedded Systems     Open Access   (Followers: 6)
International Journal of Reconfigurable Computing     Open Access  
International Journal of Refractory Metals and Hard Materials     Hybrid Journal   (Followers: 5)
International Journal of Reliability, Quality and Safety Engineering     Hybrid Journal   (Followers: 14)
International Journal of Reliable and Quality E-Healthcare     Full-text available via subscription   (Followers: 2)
International Journal of Research Studies in Computing     Open Access  
International Journal of RF and Microwave Computer-Aided Engineering     Hybrid Journal   (Followers: 26)
International Journal of Sediment Research     Full-text available via subscription   (Followers: 2)
International Journal of Sensor Networks     Hybrid Journal   (Followers: 2)
International Journal of Service and Computing Oriented Manufacturing     Hybrid Journal   (Followers: 2)
International Journal of Shape Modeling     Hybrid Journal   (Followers: 1)
International Journal of Signs and Semiotic Systems     Full-text available via subscription  
International Journal of Smart Grid and Green Communications     Hybrid Journal   (Followers: 2)
International Journal of Social and Organizational Dynamics in IT     Full-text available via subscription   (Followers: 1)
International Journal of Sociotechnology and Knowledge Development     Full-text available via subscription   (Followers: 1)
International Journal of Soft Computing and Networking     Hybrid Journal   (Followers: 2)
International Journal of Soft Computing and Software Engineering     Open Access   (Followers: 13)
International Journal of Software Engineering and Knowledge Engineering     Hybrid Journal   (Followers: 6)
International Journal of Spatio-Temporal Data Science     Hybrid Journal  
International Journal of Speech Technology     Hybrid Journal   (Followers: 7)
International Journal of Strategic Change Management     Hybrid Journal   (Followers: 7)
International Journal of Strategic Communication     Hybrid Journal   (Followers: 5)
International Journal of Strategic Information Technology and Applications     Full-text available via subscription   (Followers: 1)
International Journal of Stress Management     Full-text available via subscription   (Followers: 6)
International Journal of Student Project Reporting     Hybrid Journal   (Followers: 5)
International Journal of Swarm Intelligence     Hybrid Journal   (Followers: 2)
International Journal of Swarm Intelligence Research     Full-text available via subscription   (Followers: 3)
International Journal of System Dynamics Applications     Full-text available via subscription  
International Journal of Systems Science     Hybrid Journal   (Followers: 2)
International Journal of Systems Science : Operations & Logistics     Hybrid Journal  
International Journal of Systems, Control and Communications     Hybrid Journal   (Followers: 6)
International Journal of Technoethics     Full-text available via subscription   (Followers: 2)
International Journal of Technology and Educational Marketing     Full-text available via subscription   (Followers: 2)
International Journal of Technology and Human Interaction     Full-text available via subscription   (Followers: 2)
International Journal of Technology Diffusion     Full-text available via subscription   (Followers: 1)
International Journal of Technology Marketing     Hybrid Journal   (Followers: 3)
International Journal of Telecommunications & Emerging Technologies     Full-text available via subscription   (Followers: 1)
International Journal of the Digital Human     Hybrid Journal   (Followers: 2)
International Journal of Trust Management in Computing and Communications     Hybrid Journal   (Followers: 1)
International Journal of Ultra Wideband Communications and Systems     Hybrid Journal  
International Journal of Virtual Reality     Open Access   (Followers: 1)
International Journal of Virtual Technology and Multimedia     Hybrid Journal   (Followers: 2)
International Journal of Web Services Research     Full-text available via subscription  
International Journal of Wireless and Microwave Technologies     Open Access   (Followers: 12)
International Journal of Wireless Information Networks     Hybrid Journal   (Followers: 2)
International Journal on Advances in ICT for Emerging Regions (ICTer)     Open Access   (Followers: 2)
International Journal on Artificial Intelligence Tools     Hybrid Journal   (Followers: 9)
International Journal on Digital Libraries     Hybrid Journal   (Followers: 544)
International Journal on Document Analysis and Recognition (IJDAR)     Hybrid Journal   (Followers: 2)
International Journal on Smart Sensing and Intelligent Systems     Open Access  
International Journal on Software Tools for Technology Transfer (STTT)     Hybrid Journal   (Followers: 4)
International Review of Law, Computers & Technology     Hybrid Journal   (Followers: 3)
International Review of Research in Open and Distance Learning     Open Access   (Followers: 24)
International Transaction of Electrical and Computer Engineers System     Open Access   (Followers: 2)
Internet of Things     Hybrid Journal   (Followers: 2)
Internet of Things and Cyber-Physical Systems     Open Access   (Followers: 1)
Internet Technology Letters     Hybrid Journal  
IoT     Open Access  
IPSJ Transactions on Computer Vision and Applications     Open Access   (Followers: 1)
Iran Journal of Computer Science     Hybrid Journal  
ISPRS Open Journal of Photogrammetry and Remote Sensing     Open Access   (Followers: 3)
ISSS Journal of Micro and Smart Systems     Hybrid Journal   (Followers: 3)
Issues in Informing Science and Information Technology     Open Access   (Followers: 2)
IT Journal Research and Development     Open Access  
ITM Web of Conferences     Open Access  
ITNOW     Hybrid Journal   (Followers: 1)
J-ENSITEC : Journal Of Engineering and Sustainable Technology     Open Access   (Followers: 4)
JISTEM : Journal of Information Systems and Technology Management     Open Access   (Followers: 6)
JMIR mHealth and uHealth     Open Access   (Followers: 3)
Johnson Matthey Technology Review     Open Access  
Jornal Brasileiro de TeleSSaúde     Open Access  
Journal of Computer Science & Systems Biology     Open Access   (Followers: 3)
Journal of 3D Printing in Medicine     Hybrid Journal  
Journal of Advanced Computer Science & Technology     Open Access   (Followers: 3)
Journal of Advances in Information Systems and Technology     Open Access  
Journal of Advances in Mathematics and Computer Science     Open Access  
Journal of Aggression Maltreatment & Trauma     Hybrid Journal   (Followers: 5)
Journal of Algorithms & Computational Technology     Open Access  
Journal of Altmetrics     Open Access   (Followers: 7)
Journal of Ambient Intelligence and Humanized Computing     Hybrid Journal   (Followers: 1)
Journal of Applied & Computational Mathematics     Open Access  
Journal of Applied and Computational Topology     Hybrid Journal  
Journal of Applied Bioinformatics & Computational Biology     Hybrid Journal   (Followers: 4)
Journal of Applied Communication Research     Hybrid Journal   (Followers: 10)
Journal of Applied Informatics and Technology     Open Access  
Journal of Applied Intelligent System     Open Access  
Journal of Approximation Theory     Hybrid Journal   (Followers: 1)
Journal of Artificial Intelligence     Open Access   (Followers: 18)
Journal of Automated Reasoning     Hybrid Journal  
Journal of Automation and Control     Open Access   (Followers: 9)
Journal of Banking and Financial Technology     Hybrid Journal   (Followers: 1)
Journal of Big Data     Open Access   (Followers: 16)
Journal of Bioinformatics and Computational Biology     Hybrid Journal   (Followers: 19)
Journal of Biomedical Informatics     Partially Free   (Followers: 9)
Journal of Cases on Information Technology     Full-text available via subscription   (Followers: 3)
Journal of Chemical Information and Modeling     Hybrid Journal   (Followers: 18)
Journal of Chemical Theory and Computation     Hybrid Journal   (Followers: 21)
Journal of Circuits, Systems, and Computers     Hybrid Journal   (Followers: 4)

  First | 1 2 3 4 5 6 7 | Last

Similar Journals
Journal Cover
Journal of Cloud Computing : Advances, Systems and Applications
Journal Prestige (SJR): 0.412
Citation Impact (citeScore): 3
Number of Followers: 11  

  This is an Open Access Journal Open Access journal
ISSN (Online) 2192-113X
Published by SpringerOpen Homepage  [228 journals]
  • OpenIaC: open infrastructure as code - the network is my computer

    • Abstract: Abstract Modern information systems are built fron a complex composition of networks, infrastructure, devices, services, and applications, interconnected by data flows that are often private and financially sensitive. The 5G networks, which can create hyperlocalized services, have highlighted many of the deficiencies of current practices in use today to create and operate information systems. Emerging cloud computing techniques, such as Infrastructure-as-Code (IaC) and elastic computing, offer a path for a future re-imagining of how we create, deploy, secure, operate, and retire information systems. In this paper, we articulate the position that a comprehensive new approach is needed for all OSI layers from layer 2 up to applications that are built on underlying principles that include reproducibility, continuous integration/continuous delivery, auditability, and versioning. There are obvious needs to redesign and optimize the protocols from the network layer to the application layer. Our vision seeks to augment existing Cloud Computing and Networking solutions with support for multiple cloud infrastructures and seamless integration of cloud-based microservices. To address these issues, we propose an approach named Open Infrastructure as Code (OpenIaC), which is an attempt to provide a common open forum to integrate and build on advances in cloud computing and blockchain to address the needs of modern information architectures. The main mission of our OpenIaC approach is to provide services based on the principles of Zero Trust Architecture (ZTA) among the federation of connected resources based on Decentralized Identity (DID). Our objectives include the creation of an open-source hub with fine-grained access control for an open and connected infrastructure of shared resources (sensing, storage, computing, 3D printing, etc.) managed by blockchains and federations. Our proposed approach has the potential to provide a path for developing new platforms, business models, and a modernized information ecosystem necessary for 5G networks.
      PubDate: 2022-05-08
       
  • Look-ahead energy efficient VM allocation approach for data centers

    • Abstract: Abstract Energy efficiency is an important issue for reducing environmental dissipation. Energy efficient resource provisioning in cloud environments is a challenging problem because of its dynamic nature and varied application workload characteristics. In the literature, live migration of virtual machines (VMs) among servers is commonly proposed to reduce energy consumption and to optimize resource usage, although it comes with essential drawbacks, such as migration cost and performance degradation. Energy efficient provisioning is addressed at the data center level in this research. A novel efficient resource management algorithm for virtualized data centers that optimizes the number of servers to meet the requirements of dynamic workloads without migration is proposed in this paper. The proposed approach, named Look-ahead Energy Efficient VM Allocation (LAA), contains a Holt Winters-based prediction module. Energy efficiency and performance are inversely proportional. The energy-performance trade-off relies on periodic comparisons of the predicted and active numbers of servers. To evaluate the proposed algorithm, experiments are conducted with real-world workload traces from Google Cluster. LAA is compared with the best approach provided by CloudSim based on VM migration called Local Regression-Minimum Migration Time (LR-MMT). The experimental results show that the proposed algorithm leads to a consumption reduction of up to 45% to complete one workload compared with the LR-MMT.
      PubDate: 2022-03-19
       
  • Multi-Recipient encryption with keyword search without pairing for cloud
           storage

    • Abstract: Abstract With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document efficiently. Individual privacy in outsource data are very sensitive and should be prevented from any leakage. Public-key encryption with keyword search (PEKS) scheme resolves this tension, while public-key authentication encryption with keyword search (PAEKS) scheme improve its keyword guessing attacks problem potentially. Whereas, the loss of keyword privacy, the limitation of single user interaction and low efficiency make PEKS/PAEKS schemes far from enough in practical applications.In this paper, we develop a multi-recipient public key encryption scheme with keyword search without pairing (MREKS) for cloud storage under public key infrastructure. The proposed scheme has the merits of supporting multi-recipient keyword search way as well as requiring no expensively bilinear pairing operations under standard model. We present a concrete and efficient construction of MREKS, and prove its security based on discrete logarithm assumptions. Furthermore, we embed the algorithm of data plaintext encryption and decryption into the scheme, which makes the scheme more practical. We show that our scheme enjoys much more efficiency than previous PEKS/PAEKS scheme in the simulation experiment, especially the keyword encryption is optimized by 79.5%.
      PubDate: 2022-03-15
       
  • Improved firefly algorithm with courtship learning for unrelated parallel
           machine scheduling problem with sequence-dependent setup times

    • Abstract: Abstract The Unrelated Parallel Machines Scheduling Problem (UPMSP) with sequence-dependent setup times has been widely applied to cloud computing, edge computing and so on. When the setup times are ignored, UPMSP will be a NP problem. Moreover, when considering the sequence related setup times, UPMSP is difficult to solve, and this situation will be more serious in the case of high-dimensional. This work firstly select the maximum completion time as the optimization objective, which establishes a mathematical model of UPMSP with sequence-dependent setup times. In addition, an improved firefly algorithm with courtship learning is proposed. Finally, in order to provide an approximate solution in an acceptable time, the proposed algorithm is applied to solve the UPMSP with sequence-dependent setup times. The experimental results show that the proposed algorithm has competitive performance when dealing with UPMSP with sequence-dependent setup times.
      PubDate: 2022-03-12
       
  • KeyPIn – mitigating the free rider problem in the distributed cloud
           based on Key, Participation, and Incentive

    • Abstract: Abstract In a distributed cloud, unlike centralized resource management, users provide and share resources. However, this allows for the existence of free riders who do not provide resources to others, but at the same time use resources that others provide. In a distributed cloud, resource providers share resources in a P2P fashion. In this paper, we propose a 3-pronged solution KeyPIn—a Key-based, Participation-based, and Incentive-based scheme to mitigate the free rider problem in a distributed cloud environment. We propose an incentive-based scheme based on game theory for providers to participate in the cloud by providing resources. This participation will be low for free riders thereby limiting their access to resources. A secure time instant key is generated based on a key management scheme that enables good users’ more time to access resources as their participation is high, whereas free riders are given limited or no time as their participation is low. Simulation results show that our scheme is effective in mitigating the free rider problem in the distributed cloud.
      PubDate: 2022-02-24
       
  • Identity-based remote data checking with a designated verifier

    • Abstract: Abstract Traditional remote data possession auditing mechanisms are usually divided into two types: private auditing and public auditing. Informally, private auditing only allows the original data owner to check the integrity of its outsourced data, whereas anyone is allowed to perform the checking task in public auditing. However, in many practical applications, the data owner expects some designated verifier (instead of others) to audit its data file, which cannot be covered by the existing private or public auditing protocols. Thus, in a recent work, Yan et al. proposed a new auditing technique with a designated verifier [IEEE Systems Journal, 12(4): 1788-1797, 2020]. Nevertheless, we note that this protocol suffers from complicated management of certificates and hence heavily relies on public key infrastructure. To overcome this shortcoming, in this paper, we propose an identity-based auditing protocol with a designated verifier, which not only avoids the introduction of certificates, but also has the desired property of only allowing specific verifier to audit. Its security is based on the classical computational Diffie-Hellman and Weil Diffie-Hellman assumptions. Finally, performance analysis shows that our proposed protocol is very efficient and suitable for some real-life applications.
      PubDate: 2022-02-14
       
  • Performance evaluation of publish-subscribe systems in IoT using
           energy-efficient and context-aware secure messages

    • Abstract: Background The Internet of Things (IoT) enables the development of innovative applications in various domains such as healthcare, transportation, and Industry 4.0. Publish-subscribe systems enable IoT devices to communicate with the cloud platform. However, IoT applications need context-aware messages to translate the data into contextual information, allowing the applications to act cognitively. Besides, end-to-end security of publish-subscribe messages on both ends (devices and cloud) is essential. However, achieving security on constrained IoT devices with memory, payload, and energy restrictions is a challenge. Contribution Messages in IoT need to achieve both energy efficiency and secure delivery. Thus, the main contribution of this paper refers to a performance evaluation of a message structure that standardizes the publish-subscribe topic and payload used by the cloud platform and the IoT devices. We also propose a standardization for the topic and payload for publish-subscribe systems. Conclusion The messages promote energy efficiency, enabling ultra-low-power and high-capacity devices and reducing the bytes transmitted in the IoT domain. The performance evaluation demonstrates that publish-subscribe systems (namely, AMQP, DDS, and MQTT) can use our proposed energy-efficient message structure on IoT. Additionally, the message system provides end-to-end confidentiality, integrity, and authenticity between IoT devices and the cloud platform.
      PubDate: 2022-01-31
       
  • Application of deterministic, stochastic, and hybrid methods for cloud
           provider selection

    • Abstract: Abstract Cloud Computing popularization inspired the emergence of many new cloud service providers. The significant number of cloud providers available drives users to complex or even impractical choice of the most suitable one to satisfy his needs without automation. The Cloud Provider Selection (CPS) problem addresses that choice. Hence, this work presents a general approach for solving the CPS problem using as selection criteria performance indicators compliant with the Cloud Service Measurement Initiative Consortium - Service Measurement Index framework (CSMIC-SMI). To accomplish that, deterministic (CPS-Matching and CPS-DEA), stochastic (Evolutionary Algorithms: CPS-GA, CPS-BDE, and CPS-DDE), and hybrid (Matching-GA, Matching-BDE, and Matching-DDE) selection optimization methods are developed and employed. The evaluation uses a synthetic database created from several real cloud provider indicator values in experiments comprising scenarios with different user needs and several cloud providers indicating that the proposed approach is appropriate for solving the cloud provider selection problem, showing promising results for a large-scale application. Particularly, comparing which approach chooses the most appropriate cloud provider the better, the hybrid one presents better results, achieving the best average hit percentage, dealing with simple and multi-cloud user requests.
      PubDate: 2022-01-28
       
  • Security scheduling and transaction mechanism of virtual power plants
           based on dual blockchains

    • Abstract: Abstract Aiming at the data authenticity and storage problems in the current coordinated scheduling of virtual power plants, as well as the opaque information and high transaction costs, a dual blockchains security mechanism is proposed to solve above problems. In the process of security scheduling, a hybrid attribute proxy re-encryption algorithm based on ciphertext strategy is designed. The algorithm is composed of an identity encryption algorithm and an attribute proxy re-encryption algorithm with ciphertext strategy. Combining blockchain, tamper-proof smart metering equipment can effectively solve data authenticity and confidentiality in the information transmission process of distributed energy. In the research process of the trading mechanism, a continuous double auction mechanism based on reputation is proposed. In order to create a favorable trading atmosphere, reputation-based market segmentation mechanisms are integrated, and participants are divided according to reputation value. Depending on the properties of the stored information, they are divided into the private blockchain (with coordination scheduling information) and the consortium blockchain (with transaction information). The system analysis shows the reliability of the dual blockchains architecture. The communication and calculation costs of the proxy re-encryption algorithm verify the practicability of the proposed scheme. The case analysis of the auction mechanism declares that the mechanism can operate effective in the electricity trading market.
      PubDate: 2022-01-28
       
  • A trusted de-swinging k-anonymity scheme for location privacy protection

    • Abstract: Abstract K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are still some threats such as behavior deception and service swing, since utilizing distributed k-anonymity technology to construct an anonymous domain. More specifically, the coordinate of the honest node will be a leak if the malicious nodes submit wrong locations coordinate to take part in the domain construction process. Worse still, owing to service swing, the attacker increases the reputation illegally to deceive honest nodes again. To overcome those drawbacks, we propose a trusted de-swinging k-anonymity scheme for location privacy protection. Primarily, we introduce a de-swinging reputation evaluation method (DREM), which designs a penalty factor to curb swinging behavior. This method calculates the reputation from entity honesty degree, location information entropy, and service swing degree. Besides, based on our proposed DREM, a credible cloaking area is constructed to protect the location privacy of the requester. In the area, nodes can choose some nodes with a high reputation for completing the construction process of the anonymous domain. Finally, we design reputation contracts to calculate credit automatically based on smart contracts. The security analysis and simulation results indicate that our proposed scheme effectively resists malicious attacks, curbs the service swing, and encourages nodes to participate honestly in the construction of cloaking areas.
      PubDate: 2022-01-08
       
  • Deep Reinforcement Learning-Based Workload Scheduling for Edge Computing

    • Abstract: Abstract Edge computing is a new paradigm for providing cloud computing capacities at the edge of network near mobile users. It offers an effective solution to help mobile devices with computation-intensive and delay-sensitive tasks. However, the edge of network presents a dynamic environment with large number of devices, high mobility of users, heterogeneous applications and intermittent traffic. In such environment, edge computing often suffers from unbalance resource allocation, which leads to task failure and affects system performance. To tackle this problem, we proposed a deep reinforcement learning(DRL)-based workload scheduling approach with the goal of balancing the workload, reducing the service time and the failed task rate. Meanwhile, We adopt Deep-Q-Network(DQN) algorithms to solve the complexity and high dimension of workload scheduling problem. Simulation results show that our proposed approach achieves the best performance in aspects of service time, virtual machine(VM) utilization, and failed tasks rate compared with other approaches. Our DRL-based approach can provide an efficient solution to the workload scheduling problem in edge computing.
      PubDate: 2022-01-08
       
  • Scalability resilience framework using application-level fault injection
           for cloud-based software services

    • Abstract: Abstract This paper presents an investigation into the effect of faults on the scalability resilience of cloud-based software services. The study introduces an experimental framework using the Application-Level Fault Injection (ALFI) to investigate how the faults at the application level affect the scalability resilience and behaviour of cloud-based software services. Previous studies on scalability analysis of cloud-based software services provide a baseline of the scalability behaviour of such services, allowing to conduct in-depth scalability investigation of these services. Experimental analysis on the EC2 cloud using a real-world cloud-based software service is used to demonstrate the framework, considering delay latency of software faults with two varied settings and two demand scenarios. The experimental approach is explained in detail. Here we simulate delay latency injection with two different times, 800 and 1600 ms, and compare the results with the baseline data. The results show that the proposed approach allows a fair assessment of the fault scenario’s impact on the cloud software service’s scalability resilience. We explain the use of the methodology to determine the impact of injected faults on the scalability behaviour and resilience of cloud-based software services.
      PubDate: 2022-01-03
       
  • Security-driven distributed platforms for intellectual property resource
           provision - a case study of TSITE IP

    • Abstract: Abstract In the information age, with the vigorous development of big data and artificial intelligence, intellectual property protection is an essential part of the current scientific and technological development. Intellectual property related data grows in a geometric progression, so the demand for IP data storage space is also increasing day by day. With the rise of cloud computing technology, intellectual property data distributed platforms based on cloud storage have also been produced one after another. Because the biggest feature of cloud storage is that storage is a service, it puts forward higher requirements for the intellectual property service industry. Firstly, it introduces the domestic intellectual property cloud platform services from the perspectives of government support, state-owned enterprises and private enterprises; Secondly, four typical distributed platforms provided by commercial resources are selected to introduce their operation modes, focusing on the problems faced by domestic intellectual property service modes; Secondly, it compares and discusses the current situation of domestic intellectual property distributed platforms; Then, aiming at the current domestic intellectual property service mode, taking tsite as an example, this paper puts forward the design and construction strategy of intellectual property protection, intellectual property operation service distributed platform and operation service mode under the background of information age.
      PubDate: 2021-12-11
       
  • A price-aware congestion control protocol for cloud services

    • Abstract: Abstract In current infrastructure-as-a service (IaaS) cloud services, customers are charged for the usage of computing/storage resources only, but not the network resource. The difficulty lies in the fact that it is nontrivial to allocate network resource to individual customers effectively, especially for short-lived flows, in terms of both performance and cost, due to highly dynamic environments by flows generated by all customers. To tackle this challenge, in this paper, we propose an end-to-end Price-Aware Congestion Control Protocol (PACCP) for cloud services. PACCP is a network utility maximization (NUM) based optimal congestion control protocol. It supports three different classes of services (CoSes), i.e., best effort service (BE), differentiated service (DS), and minimum rate guaranteed (MRG) service. In PACCP, the desired CoS or rate allocation for a given flow is enabled by properly setting a pair of control parameters, i.e., a minimum guaranteed rate and a utility weight, which in turn, determines the price paid by the user of the flow. Two pricing models, i.e., a coarse-grained VM-Based Pricing model (VBP) and a fine-grained Flow-Based Pricing model (FBP), are proposed. The optimality of PACCP is verified by both large scale simulation and small testbed implementation. The price-performance consistency of PACCP are evaluated using real datacenter workloads. The results demonstrate that PACCP provides minimum rate guarantee, high bandwidth utilization and fair rate allocation, commensurate with the pricing models.
      PubDate: 2021-11-20
       
  • Pricing strategies of an oligopolist in federated cloud markets

    • Abstract: Abstract In this paper, we study how an oligopolist influences the coalition structure in federated cloud markets. Specifically, we use cooperative game theory to model the circumstances under which a cloud provider prefers to join a cloud federation vis-a-vis consider taking a price offer made by an oligopolist. We consider two price offering strategies for an oligopolist: non-adaptive and adaptive. In non-adaptive strategy, an oligopolist makes a price offer to all the cloud providers simultaneously. It can be noted that the oligopolist can buy-out all the cloud providers by making a price offer which is equal to a core allocation and the total price offer made by the oligopolist is equal to the value of the grand coalition. In adaptive strategy, the oligopolist approaches the cloud providers one after another in a sequential manner. We show that by using the adaptive strategy, the oligopolist can buy-out all the cloud providers at a total price offer which is less than that of the non-adaptive strategy.
      PubDate: 2021-10-24
       
  • An efficient population-based multi-objective task scheduling approach in
           fog computing systems

    • Abstract: Abstract With the rapid development of Internet of Things (IoT) technologies, fog computing has emerged as an extension to the cloud computing that relies on fog nodes with distributed resources at the edge of network. Fog nodes offer computing and storage resources opportunities to resource-less IoT devices which are not capable to support IoT applications with computation-intensive requirements. Furthermore, the closeness of fog nodes to IoT devices satisfies the low-latency requirements of IoT applications. However, due to the high IoT task offloading requests and fog resource limitations, providing an optimal task scheduling solution that considers a number of quality metrics is essential. In this paper, we address the task scheduling problem with the aim of optimizing the time and energy consumption as two QoS parameters in the fog context. First, we present a fog-based architecture for handling the task scheduling requests to provide the optimal solutions. Second, we formulate the task scheduling problem as an Integer Linear Programming (ILP) optimization model considering both time and fog energy consumption. Finally, we propose an advanced approach called Opposition-based Chaotic Whale Optimization Algorithm (OppoCWOA) to enhance the performance of the original WOA for solving the modelled task scheduling problem in a timely manner. The efficiency of the proposed OppoCWOA is shown by providing extensive simulations and comparisons with the original WOA and some existing meta-heuristic algorithms such as Artificial Bee Colony (ABC), Particle Swarm Optimization (PSO), and Genetic Algorithm (GA).
      PubDate: 2021-10-07
       
  • A blockchain index structure based on subchain query

    • Abstract: Abstract Blockchain technology has the characteristics of decentralization and tamper resistance, which can store data safely and reduce the cost of trust effectively. However, the existing blockchain system has weak performance in data management, and only supports traversal queries with transaction hashes as keywords. The query method based on the account transaction trace chain (ATTC) improves the query efficiency of historical transactions of the account. However, the efficiency of querying accounts with longer transaction chains has not been effectively improved. Given the inefficiency and single method of the ATTC index in the query, we propose a subchain-based account transaction chain (SCATC) index structure. First, the account transaction chain is divided into subchains, and the last block of each subchain is connected by a hash pointer. The block-by-block query mode in ATTC is converted to the subchain-by-subchain query mode, which shortens the query path. Multiple transactions of the same account in the same block are merged and stored, which simplifies the construction cost of the index and saves storage resources. then, the construction algorithm and query algorithm is given for the SCATC index structure. Simulation analysis shows that the SCATC index structure significantly improves query efficiency.
      PubDate: 2021-10-02
       
  • A rational delegating computation protocol based on reputation and smart
           contract

    • Abstract: Abstract The delegating computation has become an irreversible trend, together comes the pressing need for fairness and efficiency issues. To solve this problem, we leverage game theory to propose a smart contract-based solution. First, according to the behavioral preferences of the participants, we design an incentive contract to describe the motivation of the participants. Next, to satisfy the fairness of the rational delegating computation, we propose a rational delegating computation protocol based on reputation and smart contract. More specifically, rational participants are to gain the maximum utility and reach the Nash equilibrium in the protocol. Besides, we design a reputation mechanism with a reputation certificate, which measures the reputation from multiple dimensions. The reputation is used to assure the client’s trust in the computing party to improve the efficiency of the protocol. Then, we conduct a comprehensive experiment to evaluate the proposed protocol. The simulation and analysis results show that the proposed protocol solves the complex traditional verification problem. We also conduct a feasibility study that involves implementing the contracts in Solidity and running them on the official Ethereum network. Meanwhile, we prove the fairness and correctness of the protocol.
      PubDate: 2021-09-25
       
  • Correction to: Severity: a QoS-aware approach to cloud application
           elasticity

    • PubDate: 2021-09-13
       
  • Welcome to the new Journal of Cloud Computing by Springer

    • PubDate: 2021-09-10
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.238.72.122
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-