Joint Interference Coordination and Load Balancing for OFDMA Multihop Cellular Networks Abstract Multihop cellular networks (MCNs) have drawn tremendous attention due to its high throughput and extensive coverage. However, there are still three issues not well addressed. With the existence of relay stations (RSs), how to efficiently allocate frequency resource to relay links becomes a
Introducing Replaceability into Web Service Composition Abstract In this paper, we propose a proactive approach that searches for an optimal plan with a lower risk of violating the constraints in the event that re-composition is needed. Our approach introduces replaceability as a metric applied to plan composition. We define replaceability as the degree to which
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage Abstract Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the same
Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks Abstract Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have
Generating Summary Risk Scores for Mobile Applications Abstract One of Android’s main defense mechanisms against malicious apps is a risk communication mechanism which, before a user installs an app, warns the user about the permissions the app requires, trusting that the user will make the right decision. This approach has been shown to be ineffective
Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication Abstract Intervehicular communication (IVC) is an important emerging research area that is expected to considerably contribute to traffic safety and efficiency. In this context, many possible IVC applications share the common need for fast multihop message propagation, including information such as position, direction, and speed. However,
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Abstract Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute based Encryption (CP-ABE) is regarded as
Exploiting Service Similarity for Privacy in Location Based Search Queries Abstract Location-based applications utilize the positioning capabilities of a mobile device to determine the current location of a user, and customize query results to include neighboring points of interests. However, location knowledge is often perceived as personal information. One of the immediate issues hindering the
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Abstract In this paper, we propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, which collects and stores users’ reviews about its services without requiring any
Enabling Smart Cloud Services Through Remote Sensing An Internet of Everything Enabler Abstract The recent emergence and success of cloud-based services has empowered remote sensing and made it very possible. Cloud-assisted remote sensing (CARS) enables distributed sensory data collection, global resource and data sharing, remote and realtime data access, elastic resource provisioning and scaling, and