scispace - formally typeset
Search or ask a question

Showing papers in "Future Generation Computer Systems in 2016"


Journal ArticleDOI
TL;DR: This paper provides an up-to-date picture of CloudIoT applications in literature, with a focus on their specific research challenges, and identifies open issues and future directions in this field, which it expects to play a leading role in the landscape of the Future Internet.

1,880 citations


Journal ArticleDOI
TL;DR: An in-depth survey of various clustering based anomaly detection techniques and compares them from different perspectives and discusses the lack of real world data and how synthetic data has been used to validate current detection techniques.

324 citations


Journal ArticleDOI
TL;DR: Results revealed that DSOS outperforms Particle Swarm Optimization which is one of the most popular heuristic optimization techniques used for task scheduling problems and performs significantly better than PSO for large search spaces.

291 citations


Journal ArticleDOI
TL;DR: CCAF multi-layered security blends with policy, services and business activities, and can be beneficial for volume, velocity, and veracity of big data services operated in the cloud.

288 citations


Journal ArticleDOI
TL;DR: The proposed scheme consists of a secure and efficient end-user authentication and authorization architecture based on the certificate based DTLS handshake, secure end-to-end communication based on session resumption, and robust mobility based on interconnected smart gateways.

230 citations


Journal ArticleDOI
TL;DR: A risk analysis applied on a smart home automation system developed in a research project involving leading industrial actors has been conducted and it is concluded that security and privacy should be integrated in the design phase.

219 citations


Journal ArticleDOI
TL;DR: A novel approach to estimate and predict the urban traffic congestion using floating car trajectory data efficiently using a new fuzzy comprehensive evaluation method in which the weights of multi-indexes are assigned according to the traffic flows.

202 citations


Journal ArticleDOI
TL;DR: This work allows an individual user to enforce all her privacy requirements before any sensitive data is uploaded to the cloud, enables developers of cloud services to integrate privacy functionality already into the development process of cloud Services, and offers users a transparent and adaptable interface for configuring their privacy requirements.

193 citations


Journal ArticleDOI
TL;DR: The architecture and evaluation of each automatics methods used to generate efficient and accurate signatures to create countermeasures against attacks by polymorphic worms, and the implementation used as patterns by SRE mechanism to extract accurate signatures are presented.

172 citations


Journal ArticleDOI
TL;DR: The main conclusion is that the model can be used as an appropriate way to obtain the Quality-in-Use levels of the input data of the Big Data analysis, and those levels can be understood as indicators of trustworthiness and soundness of the results of theBig Data analysis.

165 citations


Journal ArticleDOI
TL;DR: This paper comprehensively survey the concept and strategies for building a resilient and integrated cyber-physical system (CPS) and uses two detailed examples from achieved projects to explain how to achieve a robust, systematic CPS design.

Journal ArticleDOI
TL;DR: This paper surveys the advancement of CPSS through cyber-physical systems (CPS), cyber-social ​systems (CSS) and CPSS, as well as related techniques, and reviews the existing system-level design methodologies in multiple application domains.

Journal ArticleDOI
TL;DR: A mutual authentication and key agreement scheme for WSN using chaotic maps is proposed, the first to be proposed based on chaotic maps, and the superiority of the proposed scheme over its predecessor schemes is shown by means of detailed security analysis and comparative evaluation.

Journal ArticleDOI
TL;DR: This work is the first approach that applies biogeography-based optimization (BBO) to virtual machine placement and it is shown that VMPMBBO has better convergence characteristics and is more computationally efficient as well as robust.

Journal ArticleDOI
TL;DR: A novel concept Cybermatics is put forward as a broader vision of the IoT (called hyper IoT) to address science and technology issues in the heterogeneous CPST hyperspace and its three main features (i.e., interconnection, intelligence, and greenness) are presented.

Journal ArticleDOI
TL;DR: The process of setting up such a comparison and the metric used is examined, Organizational Sustainability Modeling (OSM) compares Cloud and non-Cloud storage and factors affect performance and design ways to make fair comparisons.

Journal ArticleDOI
TL;DR: An ecosystem for mobile crowd sensing which relies on the CloUd-based PUblish/Subscribe middleware (CUPUS) to acquire sensor data from mobile devices in a flexible and energy-efficient manner and to perform near real-time processing of Big Data streams.

Journal ArticleDOI
TL;DR: An innovative architecture for collecting and accessing large amount of data generated by medical sensor networks is proposed and an effective and flexible security mechanism that guarantees confidentiality, integrity as well as fine-grained access control to outsourced medical data is proposed.

Journal ArticleDOI
TL;DR: This paper presents a heuristic scheduling algorithm with quadratic time complexity that considers two important constraints for QoS-based workflow scheduling, time and cost, named Deadline-Budget Constrained Scheduling (DBCS).

Journal ArticleDOI
TL;DR: This study presents a novel framework for heart sound classification without segmentation based on the autocorrelation feature and diffusion maps, which can provide a primary diagnosis in the primary health center and home care.

Journal ArticleDOI
TL;DR: A personalized hashtag recommendation approach is proposed according to the latent topical information in microblogs, and the proposed Hashtag-LDA can not only find meaningful latent topics, but also find global hashtags and the relationships between topics and hashtags.

Journal ArticleDOI
TL;DR: A hybrid wrapper-Filter based malware feature selection and malware detection framework which combines the properties of both wrapper and filters and API call statistics which can detect malware based on the nature of infectious actions instead of signature is proposed.

Journal ArticleDOI
TL;DR: This paper proposes a security and cost aware scheduling (SCAS) algorithm based on the meta-heuristic optimization technique, particle swarm optimization (PSO), the coding strategy of which is devised to minimize the total workflow execution cost while meeting the deadline and risk rate constraints.

Journal ArticleDOI
TL;DR: A new secure clustering for efficient data dissemination in vehicular environment is proposed and a new trust metric based on varying transmission characteristics of vehicles is defined for trust computation among the different devices which is evaluated both at local, and global levels.

Journal ArticleDOI
TL;DR: A novel fuzzy decision-making framework to model uncertain relationships between objects in databases for service matching, and a novel analytic hierarchy process approach to calculate the semantic similarity between concepts is presented.

Journal ArticleDOI
TL;DR: Software Defined Cloud (SDCloud) is introduced, a novel software defined cloud management framework that integrates different software define cloud components to handle complexities associated with cloud computing systems.

Journal ArticleDOI
TL;DR: Simulation results have shown that the proposed scheme can significantly reduce redundant transmissions with high prediction accuracy and guarantee the confidentiality in WSN while guaranteeing the data confidentiality.

Journal ArticleDOI
TL;DR: An efficient privacy-preserving item-based collaborative filtering algorithm is proposed, which can protect user privacy during online recommendation process without compromising recommendation accuracy and efficiency.

Journal ArticleDOI
TL;DR: This paper proposes an improved serial migration strategy for migrating multiple VMs and introduces the post-copy migration scheme into it, and presents the m mixed migration strategy that is based on the improvedserial migration strategy and the parallel migration strategy.

Journal ArticleDOI
TL;DR: This paper provides a formal security model for ID-CDIC and proves the security of the construction under the RSA assumption with large public exponents in the random oracle model, which can eliminate the complex certificate management in traditional cloud data integrity checking protocols.