G
Guiyi Wei
Researcher at Zhejiang Gongshang University
Publications - 77
Citations - 1768
Guiyi Wei is an academic researcher from Zhejiang Gongshang University. The author has contributed to research in topics: Encryption & Computer science. The author has an hindex of 18, co-authored 65 publications receiving 1436 citations.
Papers
More filters
Journal ArticleDOI
A game-theoretic method of fair resource allocation for cloud computing services
TL;DR: A QoS constrained resource allocation problem is considered, in which service demanders intend to solve sophisticated parallel computing problem by requesting the usage of resources across a cloud-based network, and a cost of each computational service depends on the amount of computation.
Journal ArticleDOI
Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter
TL;DR: A novel prediction-based data collection protocol is proposed, in which a double-queue mechanism is designed to synchronize the prediction data series of the sensor node and the sink node, and therefore, the cumulative error of continuous predictions is reduced.
Journal ArticleDOI
CCA-secure ABE with outsourced decryption for fog computing
TL;DR: This work firstly proposes the CCA security model for ABE with outsourced decryption, and then presents a concrete CCA-secure ABE scheme with outsourcing decryption that is secure and practical for fog computing.
Proceedings ArticleDOI
GA-Based Task Scheduler for the Cloud Computing Systems
TL;DR: A new scheduler which makes a scheduling decision by evaluating the entire group of tasks in the job queue is proposed, which can get a shorter make span for jobs than FIFO and delay scheduling policies and achieve a better balanced load across all the nodes in the cloud.
Journal ArticleDOI
Data Security and Privacy in Fog Computing
TL;DR: The unique data security and privacy design challenges presented by the fog layer are presented and the reasons why the data protection techniques in cloud computing cannot be directly applied in fog computing are highlighted.