


default search action
IEEE Transactions on Cloud Computing, Volume 10
Volume 10, Number 1, January - March 2022
- João P. S. Catalão

, Young-Jin Kim
, Jamshid Aghaei
, Joel J. P. C. Rodrigues
, Miadreza Shafie-Khah
:
Guest Editorial: Special Section on Demand Response Applications of Cloud Computing Technologies. 1-3 - David Sehloff

, Maitreyee Marathe
, Ashray Manur, Giri Venkataramanan
:
Self-Sufficient Participation in Cloud-Based Demand Response. 4-16 - Hwei-Ming Chung

, Sabita Maharjan
, Yan Zhang
, Frank Eliassen
, Kai Strunz
:
Optimal Energy Trading With Demand Responses in Cloud Computing Enabled Virtual Power Plant in Smart Grids. 17-30 - Qiangang Jia

, Sijie Chen
, Zheng Yan
, Yiyan Li
:
Optimal Incentive Strategy in Cloud-Edge Integrated Demand Response Framework for Residential Air Conditioning Loads. 31-42 - Jianqiang Hu, Zhixun Zhang, Jianquan Lu, Jie Yu, Jinde Cao:

Demand Response Control of Smart Buildings Integrated With Security Interconnection. 43-55 - Yuechuan Tao

, Jing Qiu
, Shuying Lai:
A Hybrid Cloud and Edge Control Strategy for Demand Responses Using Deep Reinforcement Learning and Transfer Learning. 56-71 - Chunhe Song

, Guangjie Han
, Peng Zeng
:
Cloud Computing Based Demand Response Management Using Deep Reinforcement Learning. 72-81 - Georgios Tsaousoglou

, Polyzois Soumplis
, Nikolaos Efthymiopoulos, Konstantinos Steriotis
, Aristotelis Kretsis, Prodromos Makris
, Panagiotis C. Kokkinos
, Emmanouel A. Varvarigos
:
Demand Response as a Service: Clearing Multiple Distribution-Level Markets. 82-96 - Ouzhu Han, Tao Ding

, Linquan Bai
, Yuankang He, Fangxing Li
, Mohammad Shahidehpour
:
Evolutionary Game Based Demand Response Bidding Strategy for End-Users Using Q-Learning and Compound Differential Evolution. 97-110 - Ayan Mondal

, Sudip Misra
, Aishwariya Chakraborty
:
Dynamic Price-Enabled Strategic Energy Management Scheme in Cloud-Enabled Smart Grid. 111-122 - Athanasios Bachoumis

, Nikos Andriopoulos
, Konstantinos Plakas
, Aristeidis Magklaras, Panayiotis Alefragis
, Georgios Goulas, Alexios N. Birbas
, Alex Papalexopoulos
:
Cloud-Edge Interoperability for Demand Response-Enabled Fast Frequency Response Service Provision. 123-133 - Zhuping Zou

, Yulai Xie
, Kai Huang, Gongming Xu
, Dan Feng, Darrell D. E. Long
:
A Docker Container Anomaly Monitoring System Based on Optimized Isolation Forest. 134-145 - Kaiyang Liu

, Jun Peng
, Jingrong Wang
, Boyang Yu
, Zhuofan Liao
, Zhiwu Huang
, Jianping Pan
:
A Learning-Based Data Placement Framework for Low Latency in Data Center Networks. 146-157 - Gang Liu, Zheng Xiao

, Anthony Theodore Chronopoulos
, Chubo Liu
, Zhuo Tang
:
A Many-to-Many Demand and Response Hybrid Game Method for Cloud Environments. 158-171 - Kuljeet Kaur

, Sahil Garg
, Gagangeet Singh Aujla
, Neeraj Kumar
, Albert Y. Zomaya
:
A Multi-Objective Optimization Scheme for Job Scheduling in Sustainable Cloud Data Centers. 172-186 - Junyu Lu

, Qiang Li, Bing Guo
, Jie Li
, Yan Shen, Gongliang Li, Hong Su
:
A Multi-Task Oriented Framework for Mobile Computation Offloading. 187-201 - Xiaodong Dong

, Laiping Zhao
, Xiaobo Zhou
, Keqiu Li
, Deke Guo, Tie Qiu
:
An Online Cost-Efficient Transmission Scheme for Information-Agnostic Traffic in Inter-Datacenter Networks. 202-215 - Nazatul Haque Sultan

, Nesrine Kaaniche
, Maryline Laurent
, Ferdous Ahmed Barbhuiya
:
Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment. 216-233 - Yuqing Zhu

, Jianxun Liu:
ClassyTune: A Performance Auto-Tuner for Systems in the Cloud. 234-246 - Chao Qiu

, Haipeng Yao
, Chunxiao Jiang
, Song Guo
, Fangmin Xu
:
Cloud Computing Assisted Blockchain-Enabled Internet of Things. 247-257 - Huaqiang Kang

, Yan Liu
, Weishan Zhang
:
Cloud-Based Framework for Spatio-Temporal Trajectory Data Segmentation and Query. 258-275 - Yiannis Verginadis

, Ioannis Patiniotakis, Panagiotis Gouvas, Spyros Mantzouratos, Simeon Veloudis
, Sebastian Thomas Schork
, Ludwig Seitz, Iraklis Paraskakis
, Gregoris Mentzas
:
Context-Aware Policy Enforcement for PaaS-Enabled Access Control. 276-291 - Dongwei Li

, Shuliang Wang
, Nan Gao
, Qiang He
, Yun Yang
:
Cutting the Unnecessary Long Tail: Cost-Effective Big Data Clustering in the Cloud. 292-303 - Long Luo

, Yijing Kong
, Mohammad Noormohammadpour
, Zilong Ye
, Gang Sun
, Hongfang Yu
, Bo Li
:
Deadline-Aware Fast One-to-Many Bulk Transfers over Inter-Datacenter Networks. 304-321 - Biwen Chen

, Libing Wu
, Sherali Zeadally
, Debiao He
:
Dual-Server Public-Key Authenticated Encryption with Keyword Search. 322-333 - Arijit Roy

, Sudip Misra
, Prerona Dutta
:
Dynamic Pricing for Sensor-Cloud Platform in the Presence of Dumb Nodes. 334-347 - Majid Azadi, Ali Emrouznejad

, Fahimeh Ramezani
, Farookh Khadeer Hussain:
Efficiency Measurement of Cloud Service Providers Using Network Data Envelopment Analysis. 348-355 - Jiguo Li

, Hao Yan
, Yichen Zhang:
Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage. 356-365 - Jun Zhou

, Zhenfu Cao
, Xiaolei Dong, Kim-Kwang Raymond Choo
:
Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain. 366-382 - Guanglei Li

, Huachun Zhou, Bohao Feng
, Yuming Zhang
, Shui Yu
:
Efficient Provision of Service Function Chains in Overlay Networks Using Reinforcement Learning. 383-395 - Yue Zeng

, Songtao Guo
, Guiyan Liu, Pan Li
, Yuanyuan Yang
:
Energy-Efficient Device Activation, Rule Installation and Data Transmission in Software Defined DCNs. 396-410 - Chao Wu

, Lan Zhang
, Zhenhua Li
, Qiushi Li
, Yaoxue Zhang
:
Exploring Potential and Feasibility of Binary Code Sharing in Mobile Computing. 411-425 - Ming Zeng

, Haifeng Qian
, Jie Chen
, Kai Zhang
:
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage. 426-438 - Víctor Jesús Sosa Sosa

, Alfredo Barron
, José Luis González Compeán
, Jesús Carretero
, Ivan López-Arévalo
:
Improving Performance and Capacity Utilization in Cloud Storage for Content Delivery and Sharing Services. 439-450 - Kai Guo

, Mingcong Yang
, Yongbing Zhang
, Jiannong Cao
:
Joint Computation Offloading and Bandwidth Assignment in Cloud-Assisted Edge Computing. 451-460 - Donglin Yang

, Dazhao Cheng
, Wei Rang
, Yu Wang
:
Joint Optimization of MapReduce Scheduling and Network Policy in Hierarchical Data Centers. 461-473 - Shengmin Xu, Yingjiu Li

, Robert H. Deng
, Yinghui Zhang
, Xiangyang Luo
, Ximeng Liu
:
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things. 474-490 - Yun Li

, Shichao Xia
, Mengyan Zheng
, Bin Cao
, Qilie Liu:
Lyapunov Optimization-Based Trade-Off Policy for Mobile Cloud Offloading in Heterogeneous Wireless Networks. 491-505 - Yi Li, Fangming Liu

, Qiong Chen, Yibing Sheng
, Miao Zhao
, Jianping Wang
:
MarVeLScaler: A Multi-View Learning-Based Auto-Scaling System for MapReduce. 506-520 - Jeongchul Kim

, Myungjun Son
, Kyungyong Lee
:
MPEC: Distributed Matrix Multiplication Performance Modeling on a Scale-Out Cloud Environment for Data Mining Jobs. 521-538 - Keke Gai

, Liehuang Zhu
, Meikang Qiu
, Kai Xu, Kim-Kwang Raymond Choo
:
Multi-Access Filtering for Privacy-Preserving Fog Computing. 539-552 - Xiaoning Zhang

, Zhichao Xu, Lang Fan, Shui Yu
, Youyang Qu
:
Near-Optimal Energy-Efficient Algorithm for Virtual Network Function Placement. 553-567 - Zhongming Fu

, Zhuo Tang
:
Optimizing Speculative Execution in Spark Heterogeneous Environments. 568-582 - Nicolas S. Holliman

, Manu Antony
, James Charlton
, Stephen Dowsland, Philip James
, Mark Turner:
Petascale Cloud Supercomputing for Terapixel Visualization of a Digital Twin. 583-594 - Waheed Iqbal

, Abdelkarim Erradi
, Muhammad Abdullah
, Arif Mahmood
:
Predictive Auto-Scaling of Multi-Tier Applications Using Performance Varying Cloud Resources. 595-607 - Jun Sun

, Qinmin Yang
, Zaiyue Yang
:
Probability-Based Online Algorithm for Switch Operation of Energy Efficient Data Center. 608-618 - Miao Hu

, Di Wu
, Weigang Wu
, Julian Cheng
, Min Chen
:
Quantifying the Influence of Intermittent Connectivity on Mobile Edge Computing. 619-632 - Guoqi Xie

, Yehua Wei
, Yi Le
, Renfa Li
:
Redundancy Minimization and Cost Reduction for Workflows with Reliability Requirements in Cloud-Based Services. 633-647 - Rui Li

, Zhi Zhou
, Xu Chen
, Qing Ling
:
Resource Price-Aware Offloading for Edge-Cloud Collaboration: A Two-Timescale Online Control Approach. 648-661 - Biao Hu

, Zhengcai Cao
, Mengchu Zhou
:
Scheduling Real-Time Parallel Applications in Cloud to Minimize Energy Consumption. 662-674 - Guiyan Liu

, Songtao Guo
, Bin Xiao
, Yuanyuan Yang
:
SDN-Based Traffic Matrix Estimation in Data Center Networks through Large Size Flow Identification. 675-690 - Jiahui Wu

, Nankun Mu
, Xinyu Lei
, Junqing Le
, Di Zhang
, Xiaofeng Liao
:
SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing. 691-705 - Yinghao Yu

, Chengliang Zhang
, Wei Wang, Jun Zhang
, Khaled Ben Letaief
:
Towards Dependency-Aware Cache Management for Data Analytics Applications. 706-723 - Yukun Cheng

, Xiaotie Deng
, Mengqian Zhang
:
Two-Tier Sharing in Electric Vehicle Service Market. 724-735 - Seyyed Ahmad Javadi

, Anshul Gandhi
:
User-Centric Interference-Aware Load Balancing for Cloud-Deployed Applications. 736-748
Volume 10, Number 2, April - June 2022
- Gaurang Panchal

, Debasis Samanta
, Ashok Kumar Das, Neeraj Kumar
, Kim-Kwang Raymond Choo
:
Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services. 749-761 - Jiguo Li

, Yichen Zhang, Jianting Ning
, Xinyi Huang
, Geong Sen Poh
, Debang Wang
:
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT. 762-773 - Hani Nemati

, François Tetreault
, Jason Puncher, Michel R. Dagenais:
Critical Path Analysis through Hierarchical Distributed Virtualized Environments Using Host Kernel Tracing. 774-791 - Muhammad K. Ali

, Ashiq Anjum
, Omer F. Rana
, Ali Reza Zamani, Daniel Balouek-Thomert
, Manish Parashar
:
RES: Real-Time Video Stream Analytics Using Edge Enhanced Clouds. 792-804 - Tong Ye

, Jianke Li, Xiaodan Pan
, Tony Tong Lee:
Asynchronous Optical Traffic Offloading of Hybrid Optical/Electrical Data Center Networks. 805-820 - Shagufta Henna

, Alan Davy:
Distributed and Collaborative High-Speed Inference Deep Learning for Mobile Edge with Topological Dependencies. 821-834 - Yinbin Miao

, Qiuyun Tong
, Robert H. Deng
, Kim-Kwang Raymond Choo
, Ximeng Liu
, Hongwei Li
:
Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage. 835-848 - Weihua Bai

, Jiaxian Zhu, Shaowei Huang, Huibing Zhang
:
A Queue Waiting Cost-Aware Control Model for Large Scale Heterogeneous Cloud Datacenter. 849-862 - Rakesh Garg

:
MCDM-Based Parametric Selection of Cloud Deployment Models for an Academic Organization. 863-871 - Anthony Byrne

, Emre Ates
, Ata Turk, Vladimir Pchelin, Sastry S. Duri, Shripad Nadgowda
, Canturk Isci
, Ayse K. Coskun
:
Praxi: Cloud Software Discovery That Learns From Practice. 872-884 - Rustem Dautov

, Salvatore Distefano
:
Stream Processing on Clustered Edge Devices. 885-898 - Kejiang Ye

, Haiying Shen
, Yang Wang, Cheng-Zhong Xu
:
Multi-Tier Workload Consolidations in the Cloud: Profiling, Modeling and Optimization. 899-912 - Zhou Chen, Yukun Cheng

, Xiaotie Deng
, Qi Qi
, Xiang Yan
:
Tight Bound on Incnetive Ratio for Sybil Attack in Resource Sharing System. 913-924 - Peijin Cong

, Junlong Zhou
, Mingsong Chen
, Tongquan Wei
:
Personality-Guided Cloud Pricing via Reinforcement Learning. 925-943 - Yi Su

, Dan Feng, Yu Hua
, Zhan Shi
, Tingwei Zhu
:
An In-Network Replica Selection Framework for Latency-Critical Distributed Data Stores. 944-956 - Benay Kumar Ray, Avirup Saha

, Sunirmal Khatua
, Sarbani Roy
:
Proactive Fault-Tolerance Technique to Enhance Reliability of Cloud Service in Cloud Federation Environment. 957-971 - Kawsar Haghshenas

, Somayyeh Taheri
, Maziar Goudarzi
, Siamak Mohammadi
:
Infrastructure Aware Heterogeneous-Workloads Scheduling for Data Center Energy Cost Minimization. 972-983 - Venkat Tadakamalla, Daniel A. Menascé

:
Autonomic Elasticity Control for Multi-Server Queues Under Generic Workload Surges in Cloud Environments. 984-995 - Kuangyu Zheng

, Xiaorui Wang
, Jia Liu
:
Distributed Traffic Flow Consolidation for Power Efficiency of Large-Scale Data Center Network. 996-1007 - Changhee Hahn

, Jongkil Kim, Hyunsoo Kwon
, Junbeom Hur
:
Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage. 1008-1020 - Chuanyi Liu, Xiaoyong Li

, Mingliang Sun, Yali Gao
, Jie Yuan
, Shaoming Duan:
Bi-TCCS: Trustworthy Cloud Collaboration Service Scheme Based on Bilateral Social Feedback. 1021-1037 - Jingling Liu

, Jiawei Huang
, Wenjun Lv
, Jianxin Wang
:
APS: Adaptive Packet Spraying to Isolate Mix-Flows in Data Center Network. 1038-1051 - Hao Ren

, Hongwei Li
, Dongxiao Liu
, Guowen Xu
, Nan Cheng
, Xuemin Shen
:
Privacy-Preserving Efficient Verifiable Deep Packet Inspection for Cloud-Assisted Middlebox. 1052-1064 - Frederico Cerveira

, Raul Barbosa
, Henrique Madeira
, Filipe Araújo
:
The Effects of Soft Errors and Mitigation Strategies for Virtualization Servers. 1065-1081 - Juan Wang

, Shirong Hao
, Hongxin Hu
, Bo Zhao, Hongda Li, Wenhui Zhang, Jun Xu, Peng Liu
, Jing Ma:
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX. 1082-1099 - Guangba Yu

, Pengfei Chen
, Zibin Zheng
:
Microscaler: Cost-Effective Scaling for Microservice Applications in the Cloud With an Online Learning Approach. 1100-1116 - Xing Chen

, Fangning Zhu, Zheyi Chen
, Geyong Min
, Xianghan Zheng, Chunming Rong
:
Resource Allocation for Cloud-Based Software Services Using Prediction-Enabled Feedback Control With Reinforcement Learning. 1117-1129 - Roberto Beraldi

, Gabriele Proietti Mattia
:
Power of Random Choices Made Efficient for Fog Computing. 1130-1141 - Yingying Li

, Jianfeng Ma
, Yinbin Miao
, Yue Wang
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Similarity Search for Encrypted Images in Secure Cloud Computing. 1142-1155 - Chinmaya Kumar Dehury

, Prasan Kumar Sahoo
:
Failure Aware Semi-Centralized Virtual Network Embedding in Cloud Computing Fat-Tree Data Center Networks. 1156-1172 - Zhongbao Zhang

, Huafeng Cao, Sen Su
, Weitian Li:
Energy Aware Virtual Network Migration. 1173-1189 - Noor Ahmed

, Bharat K. Bhargava
:
Bio-Inspired Formal Model for Space/Time Virtual Machine Randomization and Diversification. 1190-1200 - Qiang Wang

, Fucai Zhou
, Jian Xu
, Su Peng
:
Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets. 1201-1214 - Ke Gu

, Xinying Dong
, Weijia Jia:
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs. 1215-1232 - Guowen Xu

, Hongwei Li
, Hao Ren, Xiaodong Lin
, Xuemin Shen
:
DNA Similarity Search With Access Control Over Encrypted Cloud Data. 1233-1252 - Zhiwei Wang

, Jiaxing Fan
:
Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing. 1253-1261 - Bo He

, Jingyu Wang
, Qi Qi
, Haifeng Sun
, Jianxin Liao
:
Towards Intelligent Provisioning of Virtualized Network Functions in Cloud of Things: A Deep Reinforcement Learning Based Approach. 1262-1274 - Xing Gao

, Jidong Xiao
, Haining Wang
, Angelos Stavrou
:
Understanding the Security Implication of Aborting Virtual Machine Live Migration. 1275-1286 - Sumitro Bhaumik, Ravi Bansal, Raja Karmakar

, Satish Kumar Mopur, Saikat Mukherjee
, Mandar Jagannath Chitale, Sandip Chakraborty
:
NetStor: Network and Storage Traffic Management for Ensuring Application QoS in a Hyperconverged Data-Center. 1287-1300 - Marco Lattuada

, Enrico Barbierato, Eugenio Gianniti
, Danilo Ardagna
:
Optimal Resource Allocation of Cloud-Based Spark Applications. 1301-1316 - Xiaoqun Yuan

, Mengting Sun
, Wenjing Lou
:
A Dynamic Deep-Learning-Based Virtual Edge Node Placement Scheme for Edge Cloud Systems in Mobile Environment. 1317-1328 - In Kee Kim

, Jinho Hwang
, Wei Wang
, Marty Humphrey:
Guaranteeing Performance SLAs of Cloud Applications Under Resource Storms. 1329-1343 - Xiuxiu Wang, Yipei Niu

, Fangming Liu
, Zichen Xu
:
When FPGA Meets Cloud: A First Look at Performance. 1344-1357 - Xiaokang Hu

, Jian Li
, Ruhui Ma
, Haibing Guan:
ES2: Building an Efficient and Responsive Event Path for I/O Virtualization. 1358-1372 - Mitsuhiro Okada

, Takayuki Suzuki, Naoya Nishio
, Hasitha Muthumala Waidyasooriya
, Masanori Hariyama:
FPGA-Accelerated Searchable Encrypted Database Management Systems for Cloud Services. 1373-1385 - Yulai Xie

, Minpeng Jin, Zhuping Zou
, Gongming Xu
, Dan Feng, Wenmao Liu, Darrell D. E. Long
:
Real-Time Prediction of Docker Container Resource Load Based on a Hybrid Model of ARIMA and Triple Exponential Smoothing. 1386-1401 - Hui Yang

, Xudong Zhao, Qiuyan Yao
, Ao Yu, Jie Zhang, Yuefeng Ji:
Accurate Fault Location using Deep Neural Evolution Network in Cloud Data Center Interconnection. 1402-1412 - Hang Cheng

, Ximeng Liu
, Huaxiong Wang
, Yan Fang, Meiqing Wang
, Xiaopeng Zhao:
SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment. 1413-1427 - Donghai Tian

, Qiang Zeng, Dinghao Wu
, Peng Liu
, Changzhen Hu:
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising. 1428-1444 - Weipeng Lin

, Ke Wang
, Zhilin Zhang
, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Cheng Long
, Chunyan Miao
:
Towards Secure and Efficient Equality Conjunction Search Over Outsourced Databases. 1445-1461 - Guangjun Wu

, Xiaochun Yun, Yong Wang
, Shupeng Wang, Binbin Li, Yong Liu
:
A Sketching Approach for Obtaining Real-Time Statistics Over Data Streams in Cloud. 1462-1475 - Willy Susilo

, Fuchun Guo
, Zhen Zhao
, Ge Wu
:
PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing. 1476-1488
Volume 10, Number 3, July - September 2022
- Chuntao Ding

, Ao Zhou
, Yunxin Liu
, Rong N. Chang
, Ching-Hsien Hsu
, Shangguang Wang
:
A Cloud-Edge Collaboration Framework for Cognitive Service. 1489-1499 - Boxiong Tan

, Hui Ma
, Yi Mei
, Mengjie Zhang
:
A Cooperative Coevolution Genetic Programming Hyper-Heuristics Approach for On-Line Resource Allocation in Container-Based Clouds. 1500-1514 - Prabhu Kaliyammal Thiruvasagam

, Vijeth J. Kotagi
, C. Siva Ram Murthy
:
A Reliability-Aware, Delay Guaranteed, and Resource Efficient Placement of Service Function Chains in Softwarized 5G Networks. 1515-1531 - Aram Kocharyan, Brice Ekane, Boris Teabe

, Giang Son Tran
, Hrachya V. Astsatryan
, Daniel Hagimont:
A Remote Memory Sharing System for Virtualized Computing Infrastructures. 1532-1542 - Gaurav Baranwal

, Deo Prakash Vidyarthi
:
Admission Control Policies in Fog Computing Using Extensive Form Game. 1543-1556 - Nafiseh Sharghivand

, Farnaz Derakhshan
, Lena Mashayekhy
, Leyli Mohammadkhanli
:
An Edge Computing Matching Framework With Guaranteed Quality of Service. 1557-1570 - Michele Ciavotta

, Giovanni Paolo Gibilisco, Danilo Ardagna
, Elisabetta Di Nitto
, Marco Lattuada
, Marcos Aurélio Almeida da Silva:
Architectural Design of Cloud Applications: A Performance-Aware Cost Minimization Approach. 1571-1591 - Hong Zhong

, Chuanwang Zhang, Jie Cui
, Yan Xu
, Lu Liu
:
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud. 1592-1603 - Dejan Dundjerski

, Milo Tomasevic:
Automatic Database Troubleshooting of Azure SQL Databases. 1604-1619 - Glaucio H. S. Carvalho

, Isaac Woungang
, Alagan Anpalagan
:
Cloud Firewall Under Bursty and Correlated Data Traffic: A Theoretical Analysis. 1620-1633 - Wenjuan Wang

, Xuehui Du
, Dibin Shan
, Ruoxi Qin, Na Wang
:
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine. 1634-1646 - Lingjuan Lyu, Sid Chi-Kin Chau

, Nan Wang
, Yifeng Zheng
:
Cloud-Based Privacy-Preserving Collaborative Consumption for Sharing Economy. 1647-1660 - Martin Henze

, Roman Matzutt
, Jens Hiller
, Erik Mühmer
, Jan Henrik Ziegeldorf
, Johannes van der Giet
, Klaus Wehrle
:
Complying With Data Handling Requirements in Cloud Storage Systems. 1661-1674 - Xiaoyi Tao

, Kaoru Ota
, Mianxiong Dong
, Wuyunzhaola Borjigin
, Heng Qi
, Keqiu Li:
Congestion-Aware Traffic Allocation for Geo-Distributed Data Centers. 1675-1687 - Xueqing Huang

, Nirwan Ansari
:
Content Caching and Distribution at Wireless Mobile Edge. 1688-1700 - Phu Lai

, Qiang He
, John Grundy
, Feifei Chen
, Mohamed Abdelrazek
, John G. Hosking
, Yun Yang
:
Cost-Effective App User Allocation in an Edge Computing Environment. 1701-1713 - Ali Belgacem

, Kadda Beghdad Bey, Hassina Nacer
:
Dynamic Resource Allocation Method Based on Symbiotic Organism Search Algorithm in Cloud Computing. 1714-1725 - Duc-Nghia Vu

, Nhu-Ngoc Dao
, Woongsoo Na
, Sungrae Cho
:
Dynamic Resource Orchestration for Service Capability Maximization in Fog-Enabled Connected Vehicle Networks. 1726-1737 - Shuhui Chu

, Zhiyi Fang, Shinan Song
, Zhanyang Zhang
, Chengxi Gao
, Chengzhong Xu
:
Efficient Multi-Channel Computation Offloading for Mobile Edge Computing: A Game-Theoretic Approach. 1738-1750 - Chao Guo

, Yongcheng Li, Yonghu Yan, Wei Chen, Sanjay Kumar Bose
, Gangxiang Shen
:
Efficiently Consolidating Virtual Data Centers for Time-Varying Resource Demands. 1751-1764 - Chengliang Zhang

, Minchen Yu
, Wei Wang
, Feng Yan:
Enabling Cost-Effective, SLO-Aware Machine Learning Inference Serving on Public Cloud. 1765-1779 - Thanh-Phuong Pham

, Thomas Fahringer
:
Evolutionary Multi-Objective Workflow Scheduling for Volatile Resources in the Cloud. 1780-1791 - Huifeng Wu

, Yi Yan
, Baiping Chen
, Feng Hou
, Danfeng Sun
:
FADA: A Cloud-Fog-Edge Architecture and Ontology for Data Acquisition. 1792-1805 - Shanjiang Tang

, Ce Yu
, Yusen Li
:
Fairness-Efficiency Scheduling for Cloud Computing With Soft Fairness Guarantees. 1806-1818 - Xinyu Meng

, Lei Zhang
, Burong Kang:
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing. 1819-1830 - Feng Tian

, Zhenqiang Wu
, Xiaolin Gui
, Jianbing Ni
, Xuemin Sherman Shen
:
Fine-Grained Query Authorization With Integrity Verification Over Encrypted Spatial Data in Cloud Storage. 1831-1847 - In Kee Kim

, Wei Wang
, Yanjun Qi, Marty Humphrey:
Forecasting Cloud Application Workloads With CloudInsight for Predictive Resource Management. 1848-1863 - Haitao Yuan

, Jing Bi
, MengChu Zhou
:
Geography-Aware Task Scheduling for Profit Maximization in Distributed Green Data Centers. 1864-1874 - Xiaofeng Hou, Chao Li

, Jinghang Yang, Wenli Zheng
, Xiaoyao Liang, Minyi Guo
:
Integrated Power Anomaly Defense: Towards Oversubscription-Safe Data Centers. 1875-1887 - Guangming Cui

, Qiang He
, Xiaoyu Xia
, Phu Lai
, Feifei Chen
, Tao Gu
, Yun Yang
:
Interference-Aware SaaS User Allocation Game for Edge Computing. 1888-1899 - Bangbang Ren, Siyuan Gu

, Deke Guo
, Guoming Tang
, Xu Lin
:
Joint Optimization of VNF Placement and Flow Scheduling in Mobile Core Network. 1900-1912 - Xiaobo Zhou

, Xiaodong Dong
, Laiping Zhao
, Keqiu Li, Tie Qiu
:
Learning-Driven Cloud Resource Provision Policy for Content Providers With Competitor. 1913-1924 - Zhenjie Yang, Yong Cui

, Xin Wang
, Minming Li
, Yadong Liu:
Less is More: Service Profit Maximization in Geo-Distributed Clouds. 1925-1940 - Binlei Cai

, Keqiu Li, Laiping Zhao
, Rongqi Zhang:
Less Provisioning: A Hybrid Resource Scaling Engine for Long-Running Services With Tail Latency Guarantees. 1941-1957 - Sowndarya Sundar, Jaya Prakash Champati

, Ben Liang
:
Multi-User Task Offloading to Heterogeneous Processors With Communication Delay and Budget Constraints. 1958-1974 - Anthony, Shihabur Rahman Chowdhury

, Tim Bai
, Raouf Boutaba
, Jérôme François
:
Non-Intrusive and Workflow-Aware Virtual Network Function Scheduling in User-Space. 1975-1990 - Peijin Cong

, Guo Xu, Junlong Zhou
, Mingsong Chen
, Tongquan Wei
, Meikang Qiu
:
Personality- and Value-Aware Scheduling of User Requests in Cloud for Profit Maximization. 1991-2004 - Jiayi Li

, Jianfeng Ma
, Yinbin Miao
, Ruikang Yang
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data. 2005-2019 - Yang Yang

, Robert H. Deng
, Ximeng Liu
, Yongdong Wu, Jian Weng
, Xianghan Zheng, Chunming Rong
:
Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata. 2020-2037 - Xiangjian Zuo

, Lixiang Li
, Haipeng Peng
, Shoushan Luo, Yixian Yang
:
Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks. 2038-2049 - Ye Su

, Jiameng Sun, Jing Qin
, Jiankun Hu
:
Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing. 2050-2065 - Boyang Wang

, Yantian Hou
, Ming Li
:
QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data. 2066-2078 - Patryk Osypanka

, Piotr Nawrocki
:
Resource Usage Cost Optimization in Cloud Computing Using Machine Learning. 2079-2089 - Binanda Sengupta

, Akanksha Dixit
, Sushmita Ruj
:
Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques. 2090-2101 - Cheng Guo

, Wanping Liu, Ximeng Liu
, Yinghui Zhang
:
Secure Similarity Search Over Encrypted Non-Uniform Datasets. 2102-2117 - Jing Bai, Xiaolin Chang

, Gao-Rong Ning, Zhenjiang Zhang
, Kishor S. Trivedi
:
Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach. 2118-2130 - Ashkan Aghdai

, Cing-yu Chu, Yang Xu
, David H. Dai
, Jun Xu, H. Jonathan Chao
:
Spotlight: Scalable Transport Layer Load Balancing for Data Center Networks. 2131-2145 - Yinbin Miao

, Robert H. Deng
, Kim-Kwang Raymond Choo
, Ximeng Liu
, Hongwei Li
:
Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing. 2146-2162 - Xinping Xu

, Wenxin Li
, Renhai Xu
, Heng Qi
, Keqiu Li, Xiaobo Zhou
, Sheng Chen
:
Trading Cost and Throughput in Geo-Distributed Analytics With A Two Time Scale Approach. 2163-2177 - Guangming Cui

, Qiang He
, Feifei Chen
, Hai Jin
, Yun Yang
:
Trading off Between User Coverage and Network Robustness for Edge Server Placement. 2178-2189 - Faiza Samreen

, Gordon S. Blair
, Yehia Elkhatib
:
Transferable Knowledge for Low-Cost Decision Making in Cloud Environments. 2190-2203 - Yiwen Han

, Dongyu Guo, Wei Cai
, Xiaofei Wang
, Victor C. M. Leung
:
Virtual Machine Placement Optimization in Mobile Cloud Gaming Through QoE-Oriented Resource Competition. 2204-2218 - Mark Shifrin

, Roy Mitrany, Erez Biton, Omer Gurewitz
:
VM Scaling and Load Balancing via Cost Optimal MDP Solution. 2219-2237
Volume 10, Number 4, October - December 2022
- Yonal Kirsal

, Yoney Kirsal Ever, Glenford Mapp
, Mohsin Raza
:
3D Analytical Modeling and Iterative Solution for High Performance Computing Clusters. 2238-2251 - Cheng Zhang

, Yang Xu
, Yupeng Hu
, Jiajing Wu
, Ju Ren
, Yaoxue Zhang
:
A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults. 2252-2263 - Mengyuan Lee

, Seyyedali Hosseinalipour
, Christopher G. Brinton
, Guanding Yu
, Huaiyu Dai
:
A Fast Graph Neural Network-Based Method for Winner Determination in Multi-Unit Combinatorial Auctions. 2264-2280 - Tomoki Yoshihisa

, Takahiro Hara
:
A Low-Load Distributed Stream Processing System for Continuous Conjunctive Normal Form Queries. 2281-2293 - Ismail M. Ali

, Karam M. Sallam
, Nour Moustafa
, Ripon K. Chakrabortty
, Michael J. Ryan
, Kim-Kwang Raymond Choo
:
An Automated Task Scheduling Model Using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems. 2294-2308 - Ling Xiong

, Fagen Li
, Mingxing He
, Zhicai Liu, Tu Peng
:
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services. 2309-2323 - Haneul Ko

, Minho Jo
, Victor C. M. Leung
:
Application-Aware Migration Algorithm With Prefetching in Heterogeneous Cloud Environments. 2324-2333 - Uma Tadakamalla, Daniel A. Menascé

:
Autonomic Resource Management for Fog Computing. 2334-2350 - Ke Huang

, Xiaosong Zhang
, Yi Mu
, Fatemeh Rezaeibagha
, Xiaojiang Du
:
Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage. 2351-2365 - Jiangang Shu

, Xing Zou, Xiaohua Jia
, Weizhe Zhang
, Ruitao Xie
:
Blockchain-Based Decentralized Public Auditing for Cloud Storage. 2366-2380 - Congfeng Jiang

, Yitao Qiu
, Weisong Shi
, Zhefeng Ge
, Jiwei Wang
, Shenglei Chen
, Christophe Cérin
, Zujie Ren
, Guoyao Xu, Jiangbin Lin:
Characterizing Co-Located Workloads in Alibaba Cloud Datacenters. 2381-2397 - Fucai Luo

, Saif M. Al-Kuwari
, Willy Susilo
, Dung Hoang Duong
:
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption. 2398-2408 - Mulugeta Weldezgina Asres

, Luca Ardito
, Edoardo Patti
:
Computational Cost Analysis and Data-Driven Predictive Modeling of Cloud-Based Online-NILM Algorithm. 2409-2423 - Haiqiao Wu

, Wan Du
, Peng Gong
, Dapeng Oliver Wu
:
CPU: Cross-Rack-Aware Pipelining Update for Erasure-Coded Storage. 2424-2436 - Subir Halder

, Mauro Conti
:
CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem. 2437-2450 - Long Chen

, Jigang Wu
, Jun Zhang
, Hong-Ning Dai
, Xin Long, Mianyang Yao
:
Dependency-Aware Computation Offloading for Mobile Edge Computing With Edge-Cloud Cooperation. 2451-2468 - Guanglin Zhang

, Shun Zhang
, Wenqian Zhang
, Zhirong Shen
, Lin Wang
:
Distributed Energy Management for Multiple Data Centers With Renewable Resources and Energy Storages. 2469-2480 - Yangyang Liu

, Laiping Zhao
, Jingyu Hua
, Wenyu Qu
, Suohao Zhang
, Sheng Zhong
:
Distributed Traffic Engineering for Multi-Domain SDN Without Trust. 2481-2496 - Chen Zhang

, Hongwei Du
:
DMORA: Decentralized Multi-SP Online Resource Allocation Scheme for Mobile Edge Computing. 2497-2507 - Zonghui Li

, Gilbert Chen
, Yangdong Deng:
Duplicacy: A New Generation of Cloud Backup Tool Based on Lock-Free Deduplication. 2508-2520 - Pei Ren

, Xiuquan Qiao
, Yakun Huang
, Ling Liu
, Calton Pu
, Schahram Dustdar
, Junliang Chen:
Edge AR X5: An Edge-Assisted Multi-User Collaborative Framework for Mobile Web Augmented Reality in 5G and Beyond. 2521-2537 - Xiang Yan

, Wei Zhu:
Efficiency and Fairness in Resource Exchange. 2538-2549 - Tayebeh Bahreini, Daniel Grosu

:
Efficient Algorithms for Multi-Component Application Placement in Mobile Edge Computing. 2550-2563 - Wenxin Li

, Sheng Chen
, Keqiu Li, Heng Qi
, Renhai Xu
, Song Zhang
:
Efficient Online Scheduling for Coflow-Aware Machine Learning Clusters. 2564-2579 - Hao Ren

, Hongwei Li
, Dongxiao Liu
, Guowen Xu
, Xuemin Sherman Shen
:
Enabling Secure and Versatile Packet Inspection With Probable Cause Privacy for Outsourced Middlebox. 2580-2594 - Xuelong Dai

, Hua Dai
, Chunming Rong
, Geng Yang
, Fu Xiao
, Bin Xiao
:
Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data. 2595-2612 - Arturo Fernandez

:
Evaluation of the Performance of Tightly Coupled Parallel Solvers and MPI Communications in IaaS From the Public Cloud. 2613-2622 - Tom Goethals

, Filip De Turck
, Bruno Volckaert
:
Extending Kubernetes Clusters to Low-Resource Edge Devices Using Virtual Kubelets. 2623-2636 - Haifeng Sun

, Zhiyi Gui, Song Guo
, Qi Qi
, Jingyu Wang
, Jianxin Liao
:
GSSP: Eliminating Stragglers Through Grouping Synchronous for Distributed Deep Learning in Heterogeneous Cluster. 2637-2648 - Yong Liu

, Huaxi Gu
, Ning Wang
:
HPSTOS: High-Performance and Scalable Traffic Optimization Strategy for Mixed Flows in Data Center Networks. 2649-2663 - Lara Lorna Jiménez

, Olov Schelén
:
HYDRA: Decentralized Location-Aware Orchestration of Containerized Applications. 2664-2678 - Andrea Segalini

, Dino Lopez Pacheco, Guillaume Urvoy-Keller, Fabien Hermenier, Quentin Jacquemart
:
Hy-FiX: Fast In-Place Upgrades of KVM Hypervisors. 2679-2690 - Bo Li

, Qiang He
, Feifei Chen
, Hai Jin
, Yang Xiang
, Yun Yang
:
Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment. 2691-2703 - Feng Wang

, Li Xu
, Jiguo Li
, Kim-Kwang Raymond Choo
:
Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage. 2704-2716 - Gyuyeong Kim

, Wonjun Lee
:
LossPass: Absorbing Microbursts by Packet Eviction for Data Center Networks. 2717-2728 - Haneul Ko

, Hochan Lee
, Taeyun Kim, Sangheon Pack
:
LPGA: Location Privacy-Guaranteed Offloading Algorithm in Cache-Enabled Edge Clouds. 2729-2738 - Chia-Cheng Hu

, Jeng-Shyang Pan
:
Maximum Profit of Real-Time IoT Content Retrieval by Joint Content Placement and Storage Allocation in C-RANs. 2739-2749 - Bara Abusalah

, Derek Schatzlein
, Julian James Stephen
, Masoud Saeida Ardekani, Patrick Eugster
:
Multi-Framework Reliability Approach. 2750-2768 - Auday Al-Dulaimy

, Javid Taheri
, Andreas Kassler
, M. Reza HoseinyFarahabady
, Shuiguang Deng
, Albert Y. Zomaya
:
MultiScaler: A Multi-Loop Auto-Scaling Approach for Cloud-Based Applications. 2769-2786 - Nassima Toumi

, Olivier Bernier
, Djamal-Eddine Meddour, Adlen Ksentini
:
On Using Physical Programming for Multi-Domain SFC Placement With Limited Visibility. 2787-2803 - Deepika Saxena

, Ashutosh Kumar Singh
, Rajkumar Buyya
:
OP-MLB: An Online VM Prediction-Based Multi-Objective Load Balancing Framework for Resource Management at Cloud Data Center. 2804-2816 - Jin Wang

, Chunming Cao, Jianping Wang
, Kejie Lu
, Admela Jukan
, Wei Zhao
:
Optimal Task Allocation and Coding Design for Secure Edge Computing With Heterogeneous Edge Devices. 2817-2833 - Nima Mahmoudi

, Hamzeh Khazaei
:
Performance Modeling of Serverless Computing Platforms. 2834-2847 - Hamzeh Khazaei

, Nima Mahmoudi
, Cornel Barna, Marin Litoiu
:
Performance Modeling of Microservice Platforms. 2848-2862 - Xi Huang

, Ziyu Shao
, Yang Yang
:
POTUS: Predictive Online Tuple Scheduling for Data Stream Processing Systems. 2863-2875 - Ting Yang

, Yucheng Hou
, Young Choon Lee
, Hao Ji, Albert Y. Zomaya
:
Power Control Framework for Green Data Centers. 2876-2886 - Soongeol Kwon

:
QoS-Aware Data Center Operations Based on Chance- and Risk-Constrained Optimization. 2887-2896 - Arijit Roy

, Sudip Misra
, Farid Naït-Abdesselam
:
Range-Price Trade-Off in Sensor-Cloud for Provisioning Sensors-as-a-Service. 2897-2908 - Xiaoyong Tang

:
Reliability-Aware Cost-Efficient Scientific Workflows Scheduling Strategy on Multi-Cloud Systems. 2909-2919 - Fujun He

, Takehiro Sato
, Bijoy Chand Chatterjee
, Takashi Kurimoto, Shigeo Urushidani
, Eiji Oki
:
Robust Optimization Model for Primary and Backup Resource Allocation in Cloud Providers. 2920-2935 - Yingying Li

, Jianfeng Ma
, Yinbin Miao
, Yue Wang
, Tengfei Yang, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings. 2936-2948 - Yu Ma

, Weifa Liang
, Meitian Huang, Wenzheng Xu
, Song Guo
:
Virtual Network Function Service Provisioning in MEC Via Trading Off the Usages Between Computing and Communication Resources. 2949-2963 - Qiuyun Tong

, Yinbin Miao
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
, Hongwei Li
:
VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things. 2964-2976 - Chuang Li, Chunxiang Xu

, Shanshan Li
, Kefei Chen
, Yinbin Miao
:
On the Security of Verifiable Searchable Encryption Schemes. 2977-2978

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














