


default search action
IEEE Transactions on Cloud Computing, Volume 10
Volume 10, Number 1, January - March 2022
- João P. S. Catalão
, Young-Jin Kim
, Jamshid Aghaei
, Joel J. P. C. Rodrigues
, Miadreza Shafie-Khah
:
Guest Editorial: Special Section on Demand Response Applications of Cloud Computing Technologies. 1-3 - David Sehloff
, Maitreyee Marathe
, Ashray Manur, Giri Venkataramanan
:
Self-Sufficient Participation in Cloud-Based Demand Response. 4-16 - Hwei-Ming Chung
, Sabita Maharjan
, Yan Zhang
, Frank Eliassen
, Kai Strunz
:
Optimal Energy Trading With Demand Responses in Cloud Computing Enabled Virtual Power Plant in Smart Grids. 17-30 - Qiangang Jia
, Sijie Chen
, Zheng Yan
, Yiyan Li
:
Optimal Incentive Strategy in Cloud-Edge Integrated Demand Response Framework for Residential Air Conditioning Loads. 31-42 - Jianqiang Hu, Zhixun Zhang, Jianquan Lu, Jie Yu, Jinde Cao:
Demand Response Control of Smart Buildings Integrated With Security Interconnection. 43-55 - Yuechuan Tao
, Jing Qiu
, Shuying Lai:
A Hybrid Cloud and Edge Control Strategy for Demand Responses Using Deep Reinforcement Learning and Transfer Learning. 56-71 - Chunhe Song
, Guangjie Han
, Peng Zeng
:
Cloud Computing Based Demand Response Management Using Deep Reinforcement Learning. 72-81 - Georgios Tsaousoglou
, Polyzois Soumplis
, Nikolaos Efthymiopoulos, Konstantinos Steriotis
, Aristotelis Kretsis, Prodromos Makris
, Panagiotis C. Kokkinos
, Emmanouel A. Varvarigos
:
Demand Response as a Service: Clearing Multiple Distribution-Level Markets. 82-96 - Ouzhu Han, Tao Ding
, Linquan Bai
, Yuankang He, Fangxing Li
, Mohammad Shahidehpour
:
Evolutionary Game Based Demand Response Bidding Strategy for End-Users Using Q-Learning and Compound Differential Evolution. 97-110 - Ayan Mondal
, Sudip Misra
, Aishwariya Chakraborty
:
Dynamic Price-Enabled Strategic Energy Management Scheme in Cloud-Enabled Smart Grid. 111-122 - Athanasios Bachoumis
, Nikos Andriopoulos
, Konstantinos Plakas
, Aristeidis Magklaras, Panayiotis Alefragis
, Georgios Goulas, Alexios N. Birbas
, Alex Papalexopoulos
:
Cloud-Edge Interoperability for Demand Response-Enabled Fast Frequency Response Service Provision. 123-133 - Zhuping Zou
, Yulai Xie
, Kai Huang, Gongming Xu
, Dan Feng, Darrell D. E. Long
:
A Docker Container Anomaly Monitoring System Based on Optimized Isolation Forest. 134-145 - Kaiyang Liu
, Jun Peng
, Jingrong Wang
, Boyang Yu
, Zhuofan Liao
, Zhiwu Huang
, Jianping Pan
:
A Learning-Based Data Placement Framework for Low Latency in Data Center Networks. 146-157 - Gang Liu, Zheng Xiao
, Anthony Theodore Chronopoulos
, Chubo Liu
, Zhuo Tang
:
A Many-to-Many Demand and Response Hybrid Game Method for Cloud Environments. 158-171 - Kuljeet Kaur
, Sahil Garg
, Gagangeet Singh Aujla
, Neeraj Kumar
, Albert Y. Zomaya
:
A Multi-Objective Optimization Scheme for Job Scheduling in Sustainable Cloud Data Centers. 172-186 - Junyu Lu
, Qiang Li, Bing Guo
, Jie Li
, Yan Shen, Gongliang Li, Hong Su
:
A Multi-Task Oriented Framework for Mobile Computation Offloading. 187-201 - Xiaodong Dong
, Laiping Zhao
, Xiaobo Zhou
, Keqiu Li
, Deke Guo, Tie Qiu
:
An Online Cost-Efficient Transmission Scheme for Information-Agnostic Traffic in Inter-Datacenter Networks. 202-215 - Nazatul Haque Sultan
, Nesrine Kaaniche
, Maryline Laurent
, Ferdous Ahmed Barbhuiya
:
Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment. 216-233 - Yuqing Zhu
, Jianxun Liu:
ClassyTune: A Performance Auto-Tuner for Systems in the Cloud. 234-246 - Chao Qiu
, Haipeng Yao
, Chunxiao Jiang
, Song Guo
, Fangmin Xu
:
Cloud Computing Assisted Blockchain-Enabled Internet of Things. 247-257 - Huaqiang Kang
, Yan Liu
, Weishan Zhang
:
Cloud-Based Framework for Spatio-Temporal Trajectory Data Segmentation and Query. 258-275 - Yiannis Verginadis
, Ioannis Patiniotakis, Panagiotis Gouvas, Spyros Mantzouratos, Simeon Veloudis
, Sebastian Thomas Schork
, Ludwig Seitz, Iraklis Paraskakis
, Gregoris Mentzas
:
Context-Aware Policy Enforcement for PaaS-Enabled Access Control. 276-291 - Dongwei Li
, Shuliang Wang
, Nan Gao
, Qiang He
, Yun Yang
:
Cutting the Unnecessary Long Tail: Cost-Effective Big Data Clustering in the Cloud. 292-303 - Long Luo
, Yijing Kong
, Mohammad Noormohammadpour
, Zilong Ye
, Gang Sun
, Hongfang Yu
, Bo Li
:
Deadline-Aware Fast One-to-Many Bulk Transfers over Inter-Datacenter Networks. 304-321 - Biwen Chen
, Libing Wu
, Sherali Zeadally
, Debiao He
:
Dual-Server Public-Key Authenticated Encryption with Keyword Search. 322-333 - Arijit Roy
, Sudip Misra
, Prerona Dutta
:
Dynamic Pricing for Sensor-Cloud Platform in the Presence of Dumb Nodes. 334-347 - Majid Azadi, Ali Emrouznejad
, Fahimeh Ramezani
, Farookh Khadeer Hussain:
Efficiency Measurement of Cloud Service Providers Using Network Data Envelopment Analysis. 348-355 - Jiguo Li
, Hao Yan
, Yichen Zhang:
Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage. 356-365 - Jun Zhou
, Zhenfu Cao
, Xiaolei Dong, Kim-Kwang Raymond Choo
:
Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain. 366-382 - Guanglei Li
, Huachun Zhou, Bohao Feng
, Yuming Zhang
, Shui Yu
:
Efficient Provision of Service Function Chains in Overlay Networks Using Reinforcement Learning. 383-395 - Yue Zeng
, Songtao Guo
, Guiyan Liu, Pan Li
, Yuanyuan Yang
:
Energy-Efficient Device Activation, Rule Installation and Data Transmission in Software Defined DCNs. 396-410 - Chao Wu
, Lan Zhang
, Zhenhua Li
, Qiushi Li
, Yaoxue Zhang
:
Exploring Potential and Feasibility of Binary Code Sharing in Mobile Computing. 411-425 - Ming Zeng
, Haifeng Qian
, Jie Chen
, Kai Zhang
:
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage. 426-438 - Víctor Jesús Sosa Sosa
, Alfredo Barron
, José Luis González Compeán
, Jesús Carretero
, Ivan López-Arévalo
:
Improving Performance and Capacity Utilization in Cloud Storage for Content Delivery and Sharing Services. 439-450 - Kai Guo
, Mingcong Yang
, Yongbing Zhang
, Jiannong Cao
:
Joint Computation Offloading and Bandwidth Assignment in Cloud-Assisted Edge Computing. 451-460 - Donglin Yang
, Dazhao Cheng
, Wei Rang
, Yu Wang
:
Joint Optimization of MapReduce Scheduling and Network Policy in Hierarchical Data Centers. 461-473 - Shengmin Xu, Yingjiu Li
, Robert H. Deng
, Yinghui Zhang
, Xiangyang Luo
, Ximeng Liu
:
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things. 474-490 - Yun Li
, Shichao Xia
, Mengyan Zheng
, Bin Cao
, Qilie Liu:
Lyapunov Optimization-Based Trade-Off Policy for Mobile Cloud Offloading in Heterogeneous Wireless Networks. 491-505 - Yi Li, Fangming Liu
, Qiong Chen, Yibing Sheng
, Miao Zhao
, Jianping Wang
:
MarVeLScaler: A Multi-View Learning-Based Auto-Scaling System for MapReduce. 506-520 - Jeongchul Kim
, Myungjun Son
, Kyungyong Lee
:
MPEC: Distributed Matrix Multiplication Performance Modeling on a Scale-Out Cloud Environment for Data Mining Jobs. 521-538 - Keke Gai
, Liehuang Zhu
, Meikang Qiu
, Kai Xu, Kim-Kwang Raymond Choo
:
Multi-Access Filtering for Privacy-Preserving Fog Computing. 539-552 - Xiaoning Zhang
, Zhichao Xu, Lang Fan, Shui Yu
, Youyang Qu
:
Near-Optimal Energy-Efficient Algorithm for Virtual Network Function Placement. 553-567 - Zhongming Fu
, Zhuo Tang
:
Optimizing Speculative Execution in Spark Heterogeneous Environments. 568-582 - Nicolas S. Holliman
, Manu Antony
, James Charlton
, Stephen Dowsland, Philip James
, Mark Turner:
Petascale Cloud Supercomputing for Terapixel Visualization of a Digital Twin. 583-594 - Waheed Iqbal
, Abdelkarim Erradi
, Muhammad Abdullah
, Arif Mahmood
:
Predictive Auto-Scaling of Multi-Tier Applications Using Performance Varying Cloud Resources. 595-607 - Jun Sun
, Qinmin Yang
, Zaiyue Yang
:
Probability-Based Online Algorithm for Switch Operation of Energy Efficient Data Center. 608-618 - Miao Hu
, Di Wu
, Weigang Wu
, Julian Cheng
, Min Chen
:
Quantifying the Influence of Intermittent Connectivity on Mobile Edge Computing. 619-632 - Guoqi Xie
, Yehua Wei
, Yi Le
, Renfa Li
:
Redundancy Minimization and Cost Reduction for Workflows with Reliability Requirements in Cloud-Based Services. 633-647 - Rui Li
, Zhi Zhou
, Xu Chen
, Qing Ling
:
Resource Price-Aware Offloading for Edge-Cloud Collaboration: A Two-Timescale Online Control Approach. 648-661 - Biao Hu
, Zhengcai Cao
, Mengchu Zhou
:
Scheduling Real-Time Parallel Applications in Cloud to Minimize Energy Consumption. 662-674 - Guiyan Liu
, Songtao Guo
, Bin Xiao
, Yuanyuan Yang
:
SDN-Based Traffic Matrix Estimation in Data Center Networks through Large Size Flow Identification. 675-690 - Jiahui Wu
, Nankun Mu
, Xinyu Lei
, Junqing Le
, Di Zhang
, Xiaofeng Liao
:
SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing. 691-705 - Yinghao Yu
, Chengliang Zhang
, Wei Wang, Jun Zhang
, Khaled Ben Letaief
:
Towards Dependency-Aware Cache Management for Data Analytics Applications. 706-723 - Yukun Cheng
, Xiaotie Deng
, Mengqian Zhang
:
Two-Tier Sharing in Electric Vehicle Service Market. 724-735 - Seyyed Ahmad Javadi
, Anshul Gandhi
:
User-Centric Interference-Aware Load Balancing for Cloud-Deployed Applications. 736-748
Volume 10, Number 2, April - June 2022
- Gaurang Panchal
, Debasis Samanta
, Ashok Kumar Das, Neeraj Kumar
, Kim-Kwang Raymond Choo
:
Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services. 749-761 - Jiguo Li
, Yichen Zhang, Jianting Ning
, Xinyi Huang
, Geong Sen Poh
, Debang Wang
:
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT. 762-773 - Hani Nemati
, François Tetreault
, Jason Puncher, Michel R. Dagenais:
Critical Path Analysis through Hierarchical Distributed Virtualized Environments Using Host Kernel Tracing. 774-791 - Muhammad K. Ali
, Ashiq Anjum
, Omer F. Rana
, Ali Reza Zamani, Daniel Balouek-Thomert
, Manish Parashar
:
RES: Real-Time Video Stream Analytics Using Edge Enhanced Clouds. 792-804 - Tong Ye
, Jianke Li, Xiaodan Pan
, Tony Tong Lee:
Asynchronous Optical Traffic Offloading of Hybrid Optical/Electrical Data Center Networks. 805-820 - Shagufta Henna
, Alan Davy:
Distributed and Collaborative High-Speed Inference Deep Learning for Mobile Edge with Topological Dependencies. 821-834 - Yinbin Miao
, Qiuyun Tong
, Robert H. Deng
, Kim-Kwang Raymond Choo
, Ximeng Liu
, Hongwei Li
:
Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage. 835-848 - Weihua Bai
, Jiaxian Zhu, Shaowei Huang, Huibing Zhang
:
A Queue Waiting Cost-Aware Control Model for Large Scale Heterogeneous Cloud Datacenter. 849-862 - Rakesh Garg
:
MCDM-Based Parametric Selection of Cloud Deployment Models for an Academic Organization. 863-871 - Anthony Byrne
, Emre Ates
, Ata Turk, Vladimir Pchelin, Sastry S. Duri, Shripad Nadgowda
, Canturk Isci
, Ayse K. Coskun
:
Praxi: Cloud Software Discovery That Learns From Practice. 872-884 - Rustem Dautov
, Salvatore Distefano
:
Stream Processing on Clustered Edge Devices. 885-898 - Kejiang Ye
, Haiying Shen
, Yang Wang, Cheng-Zhong Xu
:
Multi-Tier Workload Consolidations in the Cloud: Profiling, Modeling and Optimization. 899-912 - Zhou Chen, Yukun Cheng
, Xiaotie Deng
, Qi Qi
, Xiang Yan
:
Tight Bound on Incnetive Ratio for Sybil Attack in Resource Sharing System. 913-924 - Peijin Cong
, Junlong Zhou
, Mingsong Chen
, Tongquan Wei
:
Personality-Guided Cloud Pricing via Reinforcement Learning. 925-943 - Yi Su
, Dan Feng, Yu Hua
, Zhan Shi
, Tingwei Zhu
:
An In-Network Replica Selection Framework for Latency-Critical Distributed Data Stores. 944-956 - Benay Kumar Ray, Avirup Saha
, Sunirmal Khatua
, Sarbani Roy
:
Proactive Fault-Tolerance Technique to Enhance Reliability of Cloud Service in Cloud Federation Environment. 957-971 - Kawsar Haghshenas
, Somayyeh Taheri
, Maziar Goudarzi
, Siamak Mohammadi
:
Infrastructure Aware Heterogeneous-Workloads Scheduling for Data Center Energy Cost Minimization. 972-983 - Venkat Tadakamalla, Daniel A. Menascé
:
Autonomic Elasticity Control for Multi-Server Queues Under Generic Workload Surges in Cloud Environments. 984-995 - Kuangyu Zheng
, Xiaorui Wang
, Jia Liu
:
Distributed Traffic Flow Consolidation for Power Efficiency of Large-Scale Data Center Network. 996-1007 - Changhee Hahn
, Jongkil Kim, Hyunsoo Kwon
, Junbeom Hur
:
Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage. 1008-1020 - Chuanyi Liu, Xiaoyong Li
, Mingliang Sun, Yali Gao
, Jie Yuan
, Shaoming Duan:
Bi-TCCS: Trustworthy Cloud Collaboration Service Scheme Based on Bilateral Social Feedback. 1021-1037 - Jingling Liu
, Jiawei Huang
, Wenjun Lv
, Jianxin Wang
:
APS: Adaptive Packet Spraying to Isolate Mix-Flows in Data Center Network. 1038-1051 - Hao Ren
, Hongwei Li
, Dongxiao Liu
, Guowen Xu
, Nan Cheng
, Xuemin Shen
:
Privacy-Preserving Efficient Verifiable Deep Packet Inspection for Cloud-Assisted Middlebox. 1052-1064 - Frederico Cerveira
, Raul Barbosa
, Henrique Madeira
, Filipe Araújo
:
The Effects of Soft Errors and Mitigation Strategies for Virtualization Servers. 1065-1081 - Juan Wang
, Shirong Hao
, Hongxin Hu
, Bo Zhao, Hongda Li, Wenhui Zhang, Jun Xu, Peng Liu
, Jing Ma:
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX. 1082-1099 - Guangba Yu
, Pengfei Chen
, Zibin Zheng
:
Microscaler: Cost-Effective Scaling for Microservice Applications in the Cloud With an Online Learning Approach. 1100-1116 - Xing Chen
, Fangning Zhu, Zheyi Chen
, Geyong Min
, Xianghan Zheng, Chunming Rong
:
Resource Allocation for Cloud-Based Software Services Using Prediction-Enabled Feedback Control With Reinforcement Learning. 1117-1129 - Roberto Beraldi
, Gabriele Proietti Mattia
:
Power of Random Choices Made Efficient for Fog Computing. 1130-1141 - Yingying Li
, Jianfeng Ma
, Yinbin Miao
, Yue Wang
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Similarity Search for Encrypted Images in Secure Cloud Computing. 1142-1155 - Chinmaya Kumar Dehury
, Prasan Kumar Sahoo
:
Failure Aware Semi-Centralized Virtual Network Embedding in Cloud Computing Fat-Tree Data Center Networks. 1156-1172 - Zhongbao Zhang
, Huafeng Cao, Sen Su
, Weitian Li:
Energy Aware Virtual Network Migration. 1173-1189 - Noor Ahmed
, Bharat K. Bhargava
:
Bio-Inspired Formal Model for Space/Time Virtual Machine Randomization and Diversification. 1190-1200 - Qiang Wang
, Fucai Zhou
, Jian Xu
, Su Peng
:
Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets. 1201-1214 - Ke Gu
, Xinying Dong
, Weijia Jia:
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs. 1215-1232 - Guowen Xu
, Hongwei Li
, Hao Ren, Xiaodong Lin
, Xuemin Shen
:
DNA Similarity Search With Access Control Over Encrypted Cloud Data. 1233-1252 - Zhiwei Wang
, Jiaxing Fan
:
Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing. 1253-1261 - Bo He
, Jingyu Wang
, Qi Qi
, Haifeng Sun
, Jianxin Liao
:
Towards Intelligent Provisioning of Virtualized Network Functions in Cloud of Things: A Deep Reinforcement Learning Based Approach. 1262-1274 - Xing Gao
, Jidong Xiao
, Haining Wang
, Angelos Stavrou
:
Understanding the Security Implication of Aborting Virtual Machine Live Migration. 1275-1286 - Sumitro Bhaumik, Ravi Bansal, Raja Karmakar
, Satish Kumar Mopur, Saikat Mukherjee
, Mandar Jagannath Chitale, Sandip Chakraborty
:
NetStor: Network and Storage Traffic Management for Ensuring Application QoS in a Hyperconverged Data-Center. 1287-1300 - Marco Lattuada
, Enrico Barbierato, Eugenio Gianniti
, Danilo Ardagna
:
Optimal Resource Allocation of Cloud-Based Spark Applications. 1301-1316 - Xiaoqun Yuan
, Mengting Sun
, Wenjing Lou
:
A Dynamic Deep-Learning-Based Virtual Edge Node Placement Scheme for Edge Cloud Systems in Mobile Environment. 1317-1328 - In Kee Kim
, Jinho Hwang
, Wei Wang
, Marty Humphrey:
Guaranteeing Performance SLAs of Cloud Applications Under Resource Storms. 1329-1343 - Xiuxiu Wang, Yipei Niu
, Fangming Liu
, Zichen Xu
:
When FPGA Meets Cloud: A First Look at Performance. 1344-1357 - Xiaokang Hu
, Jian Li
, Ruhui Ma
, Haibing Guan:
ES2: Building an Efficient and Responsive Event Path for I/O Virtualization. 1358-1372 - Mitsuhiro Okada
, Takayuki Suzuki, Naoya Nishio
, Hasitha Muthumala Waidyasooriya
, Masanori Hariyama:
FPGA-Accelerated Searchable Encrypted Database Management Systems for Cloud Services. 1373-1385 - Yulai Xie
, Minpeng Jin, Zhuping Zou
, Gongming Xu
, Dan Feng, Wenmao Liu, Darrell D. E. Long
:
Real-Time Prediction of Docker Container Resource Load Based on a Hybrid Model of ARIMA and Triple Exponential Smoothing. 1386-1401 - Hui Yang
, Xudong Zhao, Qiuyan Yao
, Ao Yu, Jie Zhang, Yuefeng Ji:
Accurate Fault Location using Deep Neural Evolution Network in Cloud Data Center Interconnection. 1402-1412 - Hang Cheng
, Ximeng Liu
, Huaxiong Wang
, Yan Fang, Meiqing Wang
, Xiaopeng Zhao:
SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment. 1413-1427 - Donghai Tian
, Qiang Zeng, Dinghao Wu
, Peng Liu
, Changzhen Hu:
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising. 1428-1444 - Weipeng Lin
, Ke Wang
, Zhilin Zhang
, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Cheng Long
, Chunyan Miao
:
Towards Secure and Efficient Equality Conjunction Search Over Outsourced Databases. 1445-1461 - Guangjun Wu
, Xiaochun Yun, Yong Wang
, Shupeng Wang, Binbin Li, Yong Liu
:
A Sketching Approach for Obtaining Real-Time Statistics Over Data Streams in Cloud. 1462-1475 - Willy Susilo
, Fuchun Guo
, Zhen Zhao
, Ge Wu
:
PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing. 1476-1488
Volume 10, Number 3, July - September 2022
- Chuntao Ding
, Ao Zhou
, Yunxin Liu
, Rong N. Chang
, Ching-Hsien Hsu
, Shangguang Wang
:
A Cloud-Edge Collaboration Framework for Cognitive Service. 1489-1499 - Boxiong Tan
, Hui Ma
, Yi Mei
, Mengjie Zhang
:
A Cooperative Coevolution Genetic Programming Hyper-Heuristics Approach for On-Line Resource Allocation in Container-Based Clouds. 1500-1514 - Prabhu Kaliyammal Thiruvasagam
, Vijeth J. Kotagi
, C. Siva Ram Murthy
:
A Reliability-Aware, Delay Guaranteed, and Resource Efficient Placement of Service Function Chains in Softwarized 5G Networks. 1515-1531 - Aram Kocharyan, Brice Ekane, Boris Teabe
, Giang Son Tran
, Hrachya V. Astsatryan
, Daniel Hagimont:
A Remote Memory Sharing System for Virtualized Computing Infrastructures. 1532-1542 - Gaurav Baranwal
, Deo Prakash Vidyarthi
:
Admission Control Policies in Fog Computing Using Extensive Form Game. 1543-1556 - Nafiseh Sharghivand
, Farnaz Derakhshan
, Lena Mashayekhy
, Leyli Mohammadkhanli
:
An Edge Computing Matching Framework With Guaranteed Quality of Service. 1557-1570 - Michele Ciavotta
, Giovanni Paolo Gibilisco, Danilo Ardagna
, Elisabetta Di Nitto
, Marco Lattuada
, Marcos Aurélio Almeida da Silva:
Architectural Design of Cloud Applications: A Performance-Aware Cost Minimization Approach. 1571-1591 - Hong Zhong
, Chuanwang Zhang, Jie Cui
, Yan Xu
, Lu Liu
:
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud. 1592-1603 - Dejan Dundjerski
, Milo Tomasevic:
Automatic Database Troubleshooting of Azure SQL Databases. 1604-1619 - Glaucio H. S. Carvalho
, Isaac Woungang
, Alagan Anpalagan
:
Cloud Firewall Under Bursty and Correlated Data Traffic: A Theoretical Analysis. 1620-1633 - Wenjuan Wang
, Xuehui Du
, Dibin Shan
, Ruoxi Qin, Na Wang
:
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine. 1634-1646 - Lingjuan Lyu, Sid Chi-Kin Chau
, Nan Wang
, Yifeng Zheng
:
Cloud-Based Privacy-Preserving Collaborative Consumption for Sharing Economy. 1647-1660 - Martin Henze
, Roman Matzutt
, Jens Hiller
, Erik Mühmer
, Jan Henrik Ziegeldorf
, Johannes van der Giet
, Klaus Wehrle
:
Complying With Data Handling Requirements in Cloud Storage Systems. 1661-1674 - Xiaoyi Tao
, Kaoru Ota
, Mianxiong Dong
, Wuyunzhaola Borjigin
, Heng Qi
, Keqiu Li:
Congestion-Aware Traffic Allocation for Geo-Distributed Data Centers. 1675-1687 - Xueqing Huang
, Nirwan Ansari
:
Content Caching and Distribution at Wireless Mobile Edge. 1688-1700 - Phu Lai
, Qiang He
, John Grundy
, Feifei Chen
, Mohamed Abdelrazek
, John G. Hosking
, Yun Yang
:
Cost-Effective App User Allocation in an Edge Computing Environment. 1701-1713 - Ali Belgacem
, Kadda Beghdad Bey, Hassina Nacer
:
Dynamic Resource Allocation Method Based on Symbiotic Organism Search Algorithm in Cloud Computing. 1714-1725 - Duc-Nghia Vu
, Nhu-Ngoc Dao
, Woongsoo Na
, Sungrae Cho
:
Dynamic Resource Orchestration for Service Capability Maximization in Fog-Enabled Connected Vehicle Networks. 1726-1737 - Shuhui Chu
, Zhiyi Fang, Shinan Song
, Zhanyang Zhang
, Chengxi Gao
, Chengzhong Xu
:
Efficient Multi-Channel Computation Offloading for Mobile Edge Computing: A Game-Theoretic Approach. 1738-1750 - Chao Guo
, Yongcheng Li, Yonghu Yan, Wei Chen, Sanjay Kumar Bose
, Gangxiang Shen
:
Efficiently Consolidating Virtual Data Centers for Time-Varying Resource Demands. 1751-1764 - Chengliang Zhang
, Minchen Yu
, Wei Wang
, Feng Yan:
Enabling Cost-Effective, SLO-Aware Machine Learning Inference Serving on Public Cloud. 1765-1779 - Thanh-Phuong Pham
, Thomas Fahringer
:
Evolutionary Multi-Objective Workflow Scheduling for Volatile Resources in the Cloud. 1780-1791 - Huifeng Wu
, Yi Yan
, Baiping Chen
, Feng Hou
, Danfeng Sun
:
FADA: A Cloud-Fog-Edge Architecture and Ontology for Data Acquisition. 1792-1805 - Shanjiang Tang
, Ce Yu
, Yusen Li
:
Fairness-Efficiency Scheduling for Cloud Computing With Soft Fairness Guarantees. 1806-1818 - Xinyu Meng
, Lei Zhang
, Burong Kang:
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing. 1819-1830 - Feng Tian
, Zhenqiang Wu
, Xiaolin Gui
, Jianbing Ni
, Xuemin Sherman Shen
:
Fine-Grained Query Authorization With Integrity Verification Over Encrypted Spatial Data in Cloud Storage. 1831-1847 - In Kee Kim
, Wei Wang
, Yanjun Qi, Marty Humphrey:
Forecasting Cloud Application Workloads With CloudInsight for Predictive Resource Management. 1848-1863 - Haitao Yuan
, Jing Bi
, MengChu Zhou
:
Geography-Aware Task Scheduling for Profit Maximization in Distributed Green Data Centers. 1864-1874 - Xiaofeng Hou, Chao Li
, Jinghang Yang, Wenli Zheng
, Xiaoyao Liang, Minyi Guo
:
Integrated Power Anomaly Defense: Towards Oversubscription-Safe Data Centers. 1875-1887 - Guangming Cui
, Qiang He
, Xiaoyu Xia
, Phu Lai
, Feifei Chen
, Tao Gu
, Yun Yang
:
Interference-Aware SaaS User Allocation Game for Edge Computing. 1888-1899 - Bangbang Ren, Siyuan Gu
, Deke Guo
, Guoming Tang
, Xu Lin
:
Joint Optimization of VNF Placement and Flow Scheduling in Mobile Core Network. 1900-1912 - Xiaobo Zhou
, Xiaodong Dong
, Laiping Zhao
, Keqiu Li, Tie Qiu
:
Learning-Driven Cloud Resource Provision Policy for Content Providers With Competitor. 1913-1924 - Zhenjie Yang, Yong Cui
, Xin Wang
, Minming Li
, Yadong Liu:
Less is More: Service Profit Maximization in Geo-Distributed Clouds. 1925-1940 - Binlei Cai
, Keqiu Li, Laiping Zhao
, Rongqi Zhang:
Less Provisioning: A Hybrid Resource Scaling Engine for Long-Running Services With Tail Latency Guarantees. 1941-1957 - Sowndarya Sundar, Jaya Prakash Champati
, Ben Liang
:
Multi-User Task Offloading to Heterogeneous Processors With Communication Delay and Budget Constraints. 1958-1974 - Anthony, Shihabur Rahman Chowdhury
, Tim Bai
, Raouf Boutaba
, Jérôme François
:
Non-Intrusive and Workflow-Aware Virtual Network Function Scheduling in User-Space. 1975-1990 - Peijin Cong
, Guo Xu, Junlong Zhou
, Mingsong Chen
, Tongquan Wei
, Meikang Qiu
:
Personality- and Value-Aware Scheduling of User Requests in Cloud for Profit Maximization. 1991-2004 - Jiayi Li
, Jianfeng Ma
, Yinbin Miao
, Ruikang Yang
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data. 2005-2019 - Yang Yang
, Robert H. Deng
, Ximeng Liu
, Yongdong Wu, Jian Weng
, Xianghan Zheng, Chunming Rong
:
Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata. 2020-2037 - Xiangjian Zuo
, Lixiang Li
, Haipeng Peng
, Shoushan Luo, Yixian Yang
:
Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks. 2038-2049 - Ye Su
, Jiameng Sun, Jing Qin
, Jiankun Hu
:
Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing. 2050-2065 - Boyang Wang
, Yantian Hou
, Ming Li
:
QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data. 2066-2078 - Patryk Osypanka
, Piotr Nawrocki
:
Resource Usage Cost Optimization in Cloud Computing Using Machine Learning. 2079-2089 - Binanda Sengupta
, Akanksha Dixit
, Sushmita Ruj
:
Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques. 2090-2101 - Cheng Guo
, Wanping Liu, Ximeng Liu
, Yinghui Zhang
:
Secure Similarity Search Over Encrypted Non-Uniform Datasets. 2102-2117 - Jing Bai, Xiaolin Chang
, Gao-Rong Ning, Zhenjiang Zhang
, Kishor S. Trivedi
:
Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach. 2118-2130 - Ashkan Aghdai
, Cing-yu Chu, Yang Xu
, David H. Dai
, Jun Xu, H. Jonathan Chao
:
Spotlight: Scalable Transport Layer Load Balancing for Data Center Networks. 2131-2145 - Yinbin Miao
, Robert H. Deng
, Kim-Kwang Raymond Choo
, Ximeng Liu
, Hongwei Li
:
Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing. 2146-2162 - Xinping Xu
, Wenxin Li
, Renhai Xu
, Heng Qi
, Keqiu Li, Xiaobo Zhou
, Sheng Chen
:
Trading Cost and Throughput in Geo-Distributed Analytics With A Two Time Scale Approach. 2163-2177 - Guangming Cui
, Qiang He
, Feifei Chen
, Hai Jin
, Yun Yang
:
Trading off Between User Coverage and Network Robustness for Edge Server Placement. 2178-2189 - Faiza Samreen
, Gordon S. Blair
, Yehia Elkhatib
:
Transferable Knowledge for Low-Cost Decision Making in Cloud Environments. 2190-2203 - Yiwen Han
, Dongyu Guo, Wei Cai
, Xiaofei Wang
, Victor C. M. Leung
:
Virtual Machine Placement Optimization in Mobile Cloud Gaming Through QoE-Oriented Resource Competition. 2204-2218 - Mark Shifrin
, Roy Mitrany, Erez Biton, Omer Gurewitz
:
VM Scaling and Load Balancing via Cost Optimal MDP Solution. 2219-2237
Volume 10, Number 4, October - December 2022
- Yonal Kirsal
, Yoney Kirsal Ever, Glenford Mapp
, Mohsin Raza
:
3D Analytical Modeling and Iterative Solution for High Performance Computing Clusters. 2238-2251 - Cheng Zhang
, Yang Xu
, Yupeng Hu
, Jiajing Wu
, Ju Ren
, Yaoxue Zhang
:
A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults. 2252-2263 - Mengyuan Lee
, Seyyedali Hosseinalipour
, Christopher G. Brinton
, Guanding Yu
, Huaiyu Dai
:
A Fast Graph Neural Network-Based Method for Winner Determination in Multi-Unit Combinatorial Auctions. 2264-2280 - Tomoki Yoshihisa
, Takahiro Hara
:
A Low-Load Distributed Stream Processing System for Continuous Conjunctive Normal Form Queries. 2281-2293 - Ismail M. Ali
, Karam M. Sallam
, Nour Moustafa
, Ripon K. Chakrabortty
, Michael J. Ryan
, Kim-Kwang Raymond Choo
:
An Automated Task Scheduling Model Using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems. 2294-2308 - Ling Xiong
, Fagen Li
, Mingxing He
, Zhicai Liu, Tu Peng
:
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services. 2309-2323 - Haneul Ko
, Minho Jo
, Victor C. M. Leung
:
Application-Aware Migration Algorithm With Prefetching in Heterogeneous Cloud Environments. 2324-2333 - Uma Tadakamalla, Daniel A. Menascé
:
Autonomic Resource Management for Fog Computing. 2334-2350 - Ke Huang
, Xiaosong Zhang
, Yi Mu
, Fatemeh Rezaeibagha
, Xiaojiang Du
:
Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage. 2351-2365 - Jiangang Shu
, Xing Zou, Xiaohua Jia
, Weizhe Zhang
, Ruitao Xie
:
Blockchain-Based Decentralized Public Auditing for Cloud Storage. 2366-2380 - Congfeng Jiang
, Yitao Qiu
, Weisong Shi
, Zhefeng Ge
, Jiwei Wang
, Shenglei Chen
, Christophe Cérin
, Zujie Ren
, Guoyao Xu, Jiangbin Lin:
Characterizing Co-Located Workloads in Alibaba Cloud Datacenters. 2381-2397 - Fucai Luo
, Saif M. Al-Kuwari
, Willy Susilo
, Dung Hoang Duong
:
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption. 2398-2408 - Mulugeta Weldezgina Asres
, Luca Ardito
, Edoardo Patti
:
Computational Cost Analysis and Data-Driven Predictive Modeling of Cloud-Based Online-NILM Algorithm. 2409-2423 - Haiqiao Wu
, Wan Du
, Peng Gong
, Dapeng Oliver Wu
:
CPU: Cross-Rack-Aware Pipelining Update for Erasure-Coded Storage. 2424-2436 - Subir Halder
, Mauro Conti
:
CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem. 2437-2450 - Long Chen
, Jigang Wu
, Jun Zhang
, Hong-Ning Dai
, Xin Long, Mianyang Yao
:
Dependency-Aware Computation Offloading for Mobile Edge Computing With Edge-Cloud Cooperation. 2451-2468 - Guanglin Zhang
, Shun Zhang
, Wenqian Zhang
, Zhirong Shen
, Lin Wang
:
Distributed Energy Management for Multiple Data Centers With Renewable Resources and Energy Storages. 2469-2480 - Yangyang Liu
, Laiping Zhao
, Jingyu Hua
, Wenyu Qu
, Suohao Zhang
, Sheng Zhong
:
Distributed Traffic Engineering for Multi-Domain SDN Without Trust. 2481-2496 - Chen Zhang
, Hongwei Du
:
DMORA: Decentralized Multi-SP Online Resource Allocation Scheme for Mobile Edge Computing. 2497-2507 - Zonghui Li
, Gilbert Chen
, Yangdong Deng:
Duplicacy: A New Generation of Cloud Backup Tool Based on Lock-Free Deduplication. 2508-2520 - Pei Ren
, Xiuquan Qiao
, Yakun Huang
, Ling Liu
, Calton Pu
, Schahram Dustdar
, Junliang Chen:
Edge AR X5: An Edge-Assisted Multi-User Collaborative Framework for Mobile Web Augmented Reality in 5G and Beyond. 2521-2537 - Xiang Yan
, Wei Zhu:
Efficiency and Fairness in Resource Exchange. 2538-2549 - Tayebeh Bahreini, Daniel Grosu
:
Efficient Algorithms for Multi-Component Application Placement in Mobile Edge Computing. 2550-2563 - Wenxin Li
, Sheng Chen
, Keqiu Li, Heng Qi
, Renhai Xu
, Song Zhang
:
Efficient Online Scheduling for Coflow-Aware Machine Learning Clusters. 2564-2579 - Hao Ren
, Hongwei Li
, Dongxiao Liu
, Guowen Xu
, Xuemin Sherman Shen
:
Enabling Secure and Versatile Packet Inspection With Probable Cause Privacy for Outsourced Middlebox. 2580-2594 - Xuelong Dai
, Hua Dai
, Chunming Rong
, Geng Yang
, Fu Xiao
, Bin Xiao
:
Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data. 2595-2612 - Arturo Fernandez
:
Evaluation of the Performance of Tightly Coupled Parallel Solvers and MPI Communications in IaaS From the Public Cloud. 2613-2622 - Tom Goethals
, Filip De Turck
, Bruno Volckaert
:
Extending Kubernetes Clusters to Low-Resource Edge Devices Using Virtual Kubelets. 2623-2636 - Haifeng Sun
, Zhiyi Gui, Song Guo
, Qi Qi
, Jingyu Wang
, Jianxin Liao
:
GSSP: Eliminating Stragglers Through Grouping Synchronous for Distributed Deep Learning in Heterogeneous Cluster. 2637-2648 - Yong Liu
, Huaxi Gu
, Ning Wang
:
HPSTOS: High-Performance and Scalable Traffic Optimization Strategy for Mixed Flows in Data Center Networks. 2649-2663 - Lara Lorna Jiménez
, Olov Schelén
:
HYDRA: Decentralized Location-Aware Orchestration of Containerized Applications. 2664-2678 - Andrea Segalini
, Dino Lopez Pacheco, Guillaume Urvoy-Keller, Fabien Hermenier, Quentin Jacquemart
:
Hy-FiX: Fast In-Place Upgrades of KVM Hypervisors. 2679-2690 - Bo Li
, Qiang He
, Feifei Chen
, Hai Jin
, Yang Xiang
, Yun Yang
:
Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment. 2691-2703 - Feng Wang
, Li Xu
, Jiguo Li
, Kim-Kwang Raymond Choo
:
Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage. 2704-2716 - Gyuyeong Kim
, Wonjun Lee
:
LossPass: Absorbing Microbursts by Packet Eviction for Data Center Networks. 2717-2728 - Haneul Ko
, Hochan Lee
, Taeyun Kim, Sangheon Pack
:
LPGA: Location Privacy-Guaranteed Offloading Algorithm in Cache-Enabled Edge Clouds. 2729-2738 - Chia-Cheng Hu
, Jeng-Shyang Pan
:
Maximum Profit of Real-Time IoT Content Retrieval by Joint Content Placement and Storage Allocation in C-RANs. 2739-2749 - Bara Abusalah
, Derek Schatzlein
, Julian James Stephen
, Masoud Saeida Ardekani, Patrick Eugster
:
Multi-Framework Reliability Approach. 2750-2768 - Auday Al-Dulaimy
, Javid Taheri
, Andreas Kassler
, M. Reza HoseinyFarahabady
, Shuiguang Deng
, Albert Y. Zomaya
:
MultiScaler: A Multi-Loop Auto-Scaling Approach for Cloud-Based Applications. 2769-2786 - Nassima Toumi
, Olivier Bernier
, Djamal-Eddine Meddour, Adlen Ksentini
:
On Using Physical Programming for Multi-Domain SFC Placement With Limited Visibility. 2787-2803 - Deepika Saxena
, Ashutosh Kumar Singh
, Rajkumar Buyya
:
OP-MLB: An Online VM Prediction-Based Multi-Objective Load Balancing Framework for Resource Management at Cloud Data Center. 2804-2816 - Jin Wang
, Chunming Cao, Jianping Wang
, Kejie Lu
, Admela Jukan
, Wei Zhao
:
Optimal Task Allocation and Coding Design for Secure Edge Computing With Heterogeneous Edge Devices. 2817-2833 - Nima Mahmoudi
, Hamzeh Khazaei
:
Performance Modeling of Serverless Computing Platforms. 2834-2847 - Hamzeh Khazaei
, Nima Mahmoudi
, Cornel Barna, Marin Litoiu
:
Performance Modeling of Microservice Platforms. 2848-2862 - Xi Huang
, Ziyu Shao
, Yang Yang
:
POTUS: Predictive Online Tuple Scheduling for Data Stream Processing Systems. 2863-2875 - Ting Yang
, Yucheng Hou
, Young Choon Lee
, Hao Ji, Albert Y. Zomaya
:
Power Control Framework for Green Data Centers. 2876-2886 - Soongeol Kwon
:
QoS-Aware Data Center Operations Based on Chance- and Risk-Constrained Optimization. 2887-2896 - Arijit Roy
, Sudip Misra
, Farid Naït-Abdesselam
:
Range-Price Trade-Off in Sensor-Cloud for Provisioning Sensors-as-a-Service. 2897-2908 - Xiaoyong Tang
:
Reliability-Aware Cost-Efficient Scientific Workflows Scheduling Strategy on Multi-Cloud Systems. 2909-2919 - Fujun He
, Takehiro Sato
, Bijoy Chand Chatterjee
, Takashi Kurimoto, Shigeo Urushidani
, Eiji Oki
:
Robust Optimization Model for Primary and Backup Resource Allocation in Cloud Providers. 2920-2935 - Yingying Li
, Jianfeng Ma
, Yinbin Miao
, Yue Wang
, Tengfei Yang, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings. 2936-2948 - Yu Ma
, Weifa Liang
, Meitian Huang, Wenzheng Xu
, Song Guo
:
Virtual Network Function Service Provisioning in MEC Via Trading Off the Usages Between Computing and Communication Resources. 2949-2963 - Qiuyun Tong
, Yinbin Miao
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
, Hongwei Li
:
VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things. 2964-2976 - Chuang Li, Chunxiang Xu
, Shanshan Li
, Kefei Chen
, Yinbin Miao
:
On the Security of Verifiable Searchable Encryption Schemes. 2977-2978

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
