Linked e-resources

Details

Introduction and Applications of MCC and Big Data Paradigm in 5G Access; 1 Handling Big Data in the Era of Internet of Things (IoT); Abstract; 1 Introduction; 2 Big Data: Definition, Value and Features; 3 Big Data and Internet of Things; 4 Implementations; 4.1 The Hadoop Project; 4.2 Semantic Sensor Web; 5 Big Data Over the Cloud; 6 Privacy and Security Issues; 7 Conclusions; References; 2 Big Data and Cloud Computing: A Survey of the State-of-the-Art and Research Challenges; Abstract; 1 Introduction; 2 Big Data: Background and Architecture.

3 Cloud-Supported Big Data: Towards a Cost-Benefit Analysis Model in Big Data-as-a-Service (BDaaS)4 Challenges and Open Research Issues; 5 Summary and Conclusion; Acknowledgements; References; 3 Towards Mobile Cloud Computing in 5G Mobile Networks: Applications, Big Data Services and Future Opportunities; Abstract; 1 Introduction; 2 Mobile Cloud Computing: Concept and Core Ideas; 2.1 Mobile Cloud Computing Definition and Architecture; 2.2 Applications of Mobile Cloud Computing and Impact Areas.

3 Communicating the Business Value and Benefits of Mobile Cloud Computing to Non-technical Stakeholders: The Technical Debt Viewpoint4 Future Opportunities and Challenges; 5 Concluding Remarks; Acknowledgements; References; Architectures of MCC and Big Data Paradigm; 4 Heterogeneous Data Access Control Based on Trust and Reputation in Mobile Cloud Computing; Abstract; 1 Introduction; 2 Data Access Control in MCC; 2.1 MCC System Model; 2.2 Access Control on Mobile Cloud Data; 3 The State of Arts; 3.1 Overview of Data Security and Privacy in MCC; 3.1.1 Risks of Data Security in MCC.

3.1.2 Privacy Preservation in Cloud Computing3.2 Data Access Control in MCC; 3.2.1 Role-Based Access Control in Cloud Computing; 3.2.2 Attribute-Based Encryption for Cloud Computing; 3.3 Reputation and Trust Management in Cloud Computing; 3.3.1 Trust Management; 3.3.2 Reputation Management; 3.4 Open Research Issues; 4 Heterogeneous Data Access Control in MCC Based on Trust and Reputation: Three Schemes; 4.1 Schemeß1: Controlling Cloud Data Access Based on Reputation; 4.1.1 Reputation Generation; 4.1.2 The Proposed Schemeß1; 4.2 Schemeß2: Cloud Data Access Control Based on Trust Assessment.

4.2.1 Trust Assessment4.2.2 The Proposed Schemeß2; 4.2.3 Scheme Algorithms; 4.3 Schemeß3: Flexible Cloud Data Access Control Based on Trust and Reputation; 4.3.1 The Proposed Schemeß3; 5 Performance Evaluation and Analysis; 5.1 Performance Analysis; 5.1.1 Computational Complexity; 5.1.2 Data Confidentiality; 5.1.3 Flexibility; 5.1.4 Scalability; 5.2 Performance Test; 5.2.1 Performance Test of Schemeß1; 5.2.2 Performance Test of Schemeß2; 5.2.3 Performance Test of Schemeß3; 6 Discussions and Future Research Trends; 6.1 Usage Scenarios and Limitations for Practical Deployment.

Browse Subjects

Show more subjects...

Statistics

from
to
Export