Secure Mining of Association Rules in Horizontally Distributed Databases

Secure Mining of Association Rules in Horizontally Distributed Databases Abstract We propose a protocol for secure mining of association rules in horizontally distributed databases. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm which is an unsecured distributed version of the Apriori algorithm. The main ingredients in our protocol are two

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Abstract Secure data transmission is a critical issue for wireless sensor networks (WSNs).Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Abstract Software-as-a-service (SaaS) cloud systems enable application service providers to deliver their applications via massivecloud computing infrastructures. However, due to their sharing nature, SaaS clouds are vulnerable to malicious attacks. In this paper,we presentIntTest, a scalable and effective service integrity attestation framework for SaaS clouds. IntTest provides

Quality of Service Provision in Cloud-based Storage System for Multimedia Delivery

Quality of Service Provision in Cloud-based Storage System for Multimedia Delivery Abstract cloud multimedia applications, service and devices, multimedia delivery is expected to become the major traffic of Internet which will keep increasing rapidly. In order to serve such large scale multimedia applications, more and more service providers store their video assets in the cloud

PSR A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks

PSR A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks Abstract Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networking, with most research conducted for stationary wireless networks. One of the reasons why opportunistic data forwarding has not been widely utilized in mobile ad hoc networks (MANETs)

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data have to be encrypted before outsourcing, which obsoletes

Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud Abstract With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure share data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in

Network Resource Allocation for Users With Multiple Connections Fairness and Stability

Network Resource Allocation for Users With Multiple Connections Fairness and Stability Abstract This paper studies network resource allocation between users that manage multiple connections, possibly through different routes, where each connection is subject to congestion control. We formulate a user-centric Network Utility Maximization problem that takes into account the aggregate rate a user obtains from

Multicast Capacity in MANET with Infrastructure Support

Multicast Capacity in MANET with Infrastructure Support Abstract We study the multicast capacity under a network model featuring both node’s mobility and infrastructure support. Combinations between mobility and infrastructure, as well as multicast transmission and infrastructure, have already been showed effective ways to increase it. In this work, we jointly consider the impact of the

Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs

Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs Abstract Current peer-to-peer (P2P) file sharing methods in mobile ad hoc networks (MANETs) can be classified into three groups: flooding-based, advertisement-based, and social contact-based. The first two groups of methods can easily have high overhead and low scalability. They are mainly developed for connected