Improving Web Navigation Usability by Comparing Actual and Anticipated Usage

Improving Web Navigation Usability by Comparing Actual and Anticipated Usage ABSTRACT We present a new method to identify navigation related Web usability problems based on comparing actual and anticipated usage patterns. The actual usage patterns can be extracted from Web server logs routinely recorded for operational websites by first processing the log data to identify

Identity-Based Distributed Provable Data Possession in Multi cloud Storage

Identity-Based Distributed Provable Data Possession in Multi cloud Storage ABSTRACT Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the

Friendbook A Semantic-Based Friend Recommendation System for Social Networks

Friend-book A Semantic-Based Friend Recommendation System for Social Networks ABSTRACT Existing social networking services recommend friends to users based on their social graphs, which may not be the most appropriate to reflect a user’s preferences on friend selection in real life. In this paper, we present Friend-book, a novel semantic-based friend recommendation system for social

Energy Efficient Virtual Network Embedding for Cloud Networks

Energy Efficient Virtual Network Embedding for Cloud Networks ABSTRACT In this paper, we propose an energy efficient virtual network embedding (EEVNE) approach for cloud computing networks, where power savings are introduced by consolidating resources in the network and data centers. We model our approach in an IP over WDM network using mixed integer linear programming

Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data ABSTRACT Using cloud computing, individuals can store their data on remote servers and allow data access to public users through the cloud servers. As the outsourced data are likely to contain sensitive privacy information, they are typically encrypted before uploaded to the cloud. This,

Defeating Jamming With the Power of Silence A Game-Theoretic Analysis

Defeating Jamming With the Power of Silence A Game-Theoretic Analysis ABSTRACT The timing channel is a logical communication channel in which information is encoded in the timing between events. Recently, the use of the timing channel has been proposed as a countermeasure to reactive jamming attacks performed by an energy- constrained malicious node. In fact,

Data-Driven Composition for Service-Oriented Situational Web Applications

Data-Driven Composition for Service-Oriented Situational Web Applications ABSTRACT This paper presents a systematic data-driven approach to assisting situational application development. We first propose a technique to extract useful information from multiple sources to abstract service capabilities with set tags. This supports intuitive expression of user’s desired composition goals by simple queries, without having to know

Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks

Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks ABSTRACT Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenish able energy resources. In this paper, we first propose a novel secure and efficient Cost-Aware SEcure Routing (CASER) protocol to address these two conflicting issues through two

Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking

Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking ABSTRACT Recently, intensified small cell deployment with overlay coverage through coexisting heterogeneous networks has emerged as a viable solution for 5G mobile networks. However, this multi-tier architecture along with stringent latency requirements in 5G brings new challenges in security provisioning due to the potential

A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud

A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud ABSTRACT Big sensor data is prevalent in both industry and scientific research applications where the data is generated with high volume and velocity it is difficult to process using on-hand database management tools or traditional data processing applications. Cloud computing provides a