Showing papers in "Future Generation Computer Systems in 2016"
••
TL;DR: This paper provides an up-to-date picture of CloudIoT applications in literature, with a focus on their specific research challenges, and identifies open issues and future directions in this field, which it expects to play a leading role in the landscape of the Future Internet.
1,880 citations
••
TL;DR: An in-depth survey of various clustering based anomaly detection techniques and compares them from different perspectives and discusses the lack of real world data and how synthetic data has been used to validate current detection techniques.
324 citations
••
TL;DR: Results revealed that DSOS outperforms Particle Swarm Optimization which is one of the most popular heuristic optimization techniques used for task scheduling problems and performs significantly better than PSO for large search spaces.
291 citations
••
TL;DR: CCAF multi-layered security blends with policy, services and business activities, and can be beneficial for volume, velocity, and veracity of big data services operated in the cloud.
288 citations
••
TL;DR: The proposed scheme consists of a secure and efficient end-user authentication and authorization architecture based on the certificate based DTLS handshake, secure end-to-end communication based on session resumption, and robust mobility based on interconnected smart gateways.
230 citations
••
TL;DR: A risk analysis applied on a smart home automation system developed in a research project involving leading industrial actors has been conducted and it is concluded that security and privacy should be integrated in the design phase.
219 citations
••
TL;DR: A novel approach to estimate and predict the urban traffic congestion using floating car trajectory data efficiently using a new fuzzy comprehensive evaluation method in which the weights of multi-indexes are assigned according to the traffic flows.
202 citations
••
TL;DR: This work allows an individual user to enforce all her privacy requirements before any sensitive data is uploaded to the cloud, enables developers of cloud services to integrate privacy functionality already into the development process of cloud Services, and offers users a transparent and adaptable interface for configuring their privacy requirements.
193 citations
••
TL;DR: The architecture and evaluation of each automatics methods used to generate efficient and accurate signatures to create countermeasures against attacks by polymorphic worms, and the implementation used as patterns by SRE mechanism to extract accurate signatures are presented.
172 citations
••
TL;DR: The main conclusion is that the model can be used as an appropriate way to obtain the Quality-in-Use levels of the input data of the Big Data analysis, and those levels can be understood as indicators of trustworthiness and soundness of the results of theBig Data analysis.
165 citations
••
TL;DR: This paper comprehensively survey the concept and strategies for building a resilient and integrated cyber-physical system (CPS) and uses two detailed examples from achieved projects to explain how to achieve a robust, systematic CPS design.
••
TL;DR: This paper surveys the advancement of CPSS through cyber-physical systems (CPS), cyber-social systems (CSS) and CPSS, as well as related techniques, and reviews the existing system-level design methodologies in multiple application domains.
••
TL;DR: A mutual authentication and key agreement scheme for WSN using chaotic maps is proposed, the first to be proposed based on chaotic maps, and the superiority of the proposed scheme over its predecessor schemes is shown by means of detailed security analysis and comparative evaluation.
••
TL;DR: This work is the first approach that applies biogeography-based optimization (BBO) to virtual machine placement and it is shown that VMPMBBO has better convergence characteristics and is more computationally efficient as well as robust.
••
TL;DR: A novel concept Cybermatics is put forward as a broader vision of the IoT (called hyper IoT) to address science and technology issues in the heterogeneous CPST hyperspace and its three main features (i.e., interconnection, intelligence, and greenness) are presented.
••
TL;DR: The process of setting up such a comparison and the metric used is examined, Organizational Sustainability Modeling (OSM) compares Cloud and non-Cloud storage and factors affect performance and design ways to make fair comparisons.
••
TL;DR: An ecosystem for mobile crowd sensing which relies on the CloUd-based PUblish/Subscribe middleware (CUPUS) to acquire sensor data from mobile devices in a flexible and energy-efficient manner and to perform near real-time processing of Big Data streams.
••
[...]
TL;DR: An innovative architecture for collecting and accessing large amount of data generated by medical sensor networks is proposed and an effective and flexible security mechanism that guarantees confidentiality, integrity as well as fine-grained access control to outsourced medical data is proposed.
••
TL;DR: This paper presents a heuristic scheduling algorithm with quadratic time complexity that considers two important constraints for QoS-based workflow scheduling, time and cost, named Deadline-Budget Constrained Scheduling (DBCS).
••
TL;DR: This study presents a novel framework for heart sound classification without segmentation based on the autocorrelation feature and diffusion maps, which can provide a primary diagnosis in the primary health center and home care.
••
TL;DR: A personalized hashtag recommendation approach is proposed according to the latent topical information in microblogs, and the proposed Hashtag-LDA can not only find meaningful latent topics, but also find global hashtags and the relationships between topics and hashtags.
••
TL;DR: A hybrid wrapper-Filter based malware feature selection and malware detection framework which combines the properties of both wrapper and filters and API call statistics which can detect malware based on the nature of infectious actions instead of signature is proposed.
••
TL;DR: This paper proposes a security and cost aware scheduling (SCAS) algorithm based on the meta-heuristic optimization technique, particle swarm optimization (PSO), the coding strategy of which is devised to minimize the total workflow execution cost while meeting the deadline and risk rate constraints.
••
TL;DR: A new secure clustering for efficient data dissemination in vehicular environment is proposed and a new trust metric based on varying transmission characteristics of vehicles is defined for trust computation among the different devices which is evaluated both at local, and global levels.
••
[...]
TL;DR: A novel fuzzy decision-making framework to model uncertain relationships between objects in databases for service matching, and a novel analytic hierarchy process approach to calculate the semantic similarity between concepts is presented.
••
TL;DR: Software Defined Cloud (SDCloud) is introduced, a novel software defined cloud management framework that integrates different software define cloud components to handle complexities associated with cloud computing systems.
••
TL;DR: Simulation results have shown that the proposed scheme can significantly reduce redundant transmissions with high prediction accuracy and guarantee the confidentiality in WSN while guaranteeing the data confidentiality.
••
TL;DR: An efficient privacy-preserving item-based collaborative filtering algorithm is proposed, which can protect user privacy during online recommendation process without compromising recommendation accuracy and efficiency.
••
TL;DR: This paper proposes an improved serial migration strategy for migrating multiple VMs and introduces the post-copy migration scheme into it, and presents the m mixed migration strategy that is based on the improvedserial migration strategy and the parallel migration strategy.
••
TL;DR: This paper provides a formal security model for ID-CDIC and proves the security of the construction under the RSA assumption with large public exponents in the random oracle model, which can eliminate the complex certificate management in traditional cloud data integrity checking protocols.