Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
Node and relevant data selection in distributed predictive analytics: A query-centric approach
Journal of Network and Computer Applications (JNCA), Volume 232, Issue Chttps://doi.org/10.1016/j.jnca.2024.104029AbstractDistributed Predictive Analytics (DPA) refers to constructing predictive models based on data distributed across nodes. DPA reduces the need for data centralization, thus, alleviating concerns about data privacy, decreasing the load on central ...
- research-articleNovember 2024
Anomalous state detection in radio access networks: A proof-of-concept
Journal of Network and Computer Applications (JNCA), Volume 231, Issue Chttps://doi.org/10.1016/j.jnca.2024.103979AbstractModern radio access networks (RANs) are both highly complex and potentially vulnerable to unauthorized security setting changes. A RAN is studied in a proof-of-concept experiment to demonstrate that an unauthorized network state is detectable at ...
- research-articleSeptember 2024
Caching or not: An online cost optimization algorithm for geodistributed data analysis in cloud environments
Journal of Network and Computer Applications (JNCA), Volume 229, Issue Chttps://doi.org/10.1016/j.jnca.2024.103942AbstractWith the wide application of big data technology, a large number of data geographically stored in data centers across various regions are generated everyday, waiting to be analyzed by big data tasks. Examples of such data analysis tasks include ...
- research-articleFebruary 2023
Privacy preserving subgraph isomorphism query for dynamic graph database
Journal of Network and Computer Applications (JNCA), Volume 211, Issue Chttps://doi.org/10.1016/j.jnca.2022.103562AbstractGraph is an important structure for presenting the data with internal connections. Subgraph isomorphism query is one of the most important operations in graph database. Unfortunately, the calculation of subgraph isomorphism query is ...
- research-articleSeptember 2019
SpeCH: A scalable framework for data placement of data-intensive services in geo-distributed clouds
Journal of Network and Computer Applications (JNCA), Volume 142, Issue CPages 1–14https://doi.org/10.1016/j.jnca.2019.05.012AbstractThe advent of big data analytics and cloud computing technologies has resulted in wide-spread research on the data placement problem. Since data-intensive services require access to multiple datasets within each transaction, ...
Highlights- Scalable and unified framework for data placement of data-intensive services.
- ...
-
- research-articleAugust 2019
Comments on a lightweight cloud auditing scheme: Security analysis and improvement
Journal of Network and Computer Applications (JNCA), Volume 139, Issue CPages 49–56https://doi.org/10.1016/j.jnca.2019.04.012AbstractIn a cloud storage service, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data users without the need to retrieve data from the cloud server. Recently, Shen et al. proposed a new ...
- research-articleJune 2019
rDBF: A r-Dimensional Bloom Filter for massive scale membership query
Journal of Network and Computer Applications (JNCA), Volume 136, Issue CPages 100–113https://doi.org/10.1016/j.jnca.2019.03.004AbstractBloom Filter is a data structure for membership filtering that is deployed in various domains to boost up the lookup performance and to lower the memory consumption. Bloom Filter has gained a massive popularity nowadays, and thus, it is deployed ...
- research-articleMarch 2019
User stateless privacy-preserving TPA auditing scheme for cloud storage
Journal of Network and Computer Applications (JNCA), Volume 129, Issue CPages 62–70https://doi.org/10.1016/j.jnca.2019.01.005AbstractIn recent years, researchers have proposed some privacy-preserving public auditing schemes to remotely check the integrity of the outsourced data in cloud storage based on the homomorphic authenticators, random blocks sampling and ...
- research-articleSeptember 2018
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server
Journal of Network and Computer Applications (JNCA), Volume 118, Issue CPages 102–112https://doi.org/10.1016/j.jnca.2018.06.003AbstractOutsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers, which is more economical for cloud customers. However, since users lose direct control of the computation task,...
- research-articleAugust 2018
Verifiable database outsourcing supporting join
Journal of Network and Computer Applications (JNCA), Volume 115, Issue CPages 1–19https://doi.org/10.1016/j.jnca.2018.04.006AbstractIn an outsourced database scheme, the data owner delegates the data management tasks to a remote service provider who is supposed to answer owner's queries on the database. The essential requirements are ensuring the data integrity and ...
- research-articleJune 2018
Multi-authority fine-grained access control with accountability and its application in cloud
Journal of Network and Computer Applications (JNCA), Volume 112, Issue CPages 89–96https://doi.org/10.1016/j.jnca.2018.03.006Attribute-based encryption (ABE) is one of critical primitives for the application of fine-grained access control. To reduce the trust assumption on the attribute authority and in the meanwhile enhancing the privacy of users and the security of the ...
- research-articleFebruary 2018
Quantum technique for access control in cloud computing II
Journal of Network and Computer Applications (JNCA), Volume 103, Issue CPages 178–184https://doi.org/10.1016/j.jnca.2017.11.012This is the second paper of the series of papers dealing with access control problems in cloud computing by adopting quantum techniques. In this paper we study the application of quantum encryption and quantum key distribution in the access control ...
- research-articleJanuary 2018
Security for 4G and 5G cellular networks
Journal of Network and Computer Applications (JNCA), Volume 101, Issue CPages 55–82https://doi.org/10.1016/j.jnca.2017.10.017This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular networks. Then, we give a ...
- research-articleAugust 2017
Key management in wireless Body Area Network
Journal of Network and Computer Applications (JNCA), Volume 91, Issue CPages 36–51https://doi.org/10.1016/j.jnca.2017.04.008The miniaturization of wireless sensors and medical devices have empowered the extension of Wireless Body Area Networks (WBANs) and E-Health care systems. However, in WBANs, wireless communications are exposed to a variety of passive and active security ...
- research-articleJune 2017
Proxy Re-Encryption
Journal of Network and Computer Applications (JNCA), Volume 87, Issue CPages 193–209https://doi.org/10.1016/j.jnca.2017.03.005This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from the functional and efficiency perspectives. Proxy re-encryption is a ...
- research-articleJune 2017
A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems
Journal of Network and Computer Applications (JNCA), Volume 87, Issue CPages 1–19https://doi.org/10.1016/j.jnca.2017.03.003A Telecare Medical Information System (TMIS) enables doctors and physicians at a medical center to provide remote care via Internet to the registered patients at any place. Considering the privacy of the patients, medical data, secure and authenticated ...
- research-articleMay 2017
Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud
Journal of Network and Computer Applications (JNCA), Volume 86, Issue CPages 3–14https://doi.org/10.1016/j.jnca.2016.09.010Cloud computing has greatly facilitated large-scale data outsourcing due to its cost efficiency, scalability and many other advantages. Subsequent privacy risks force data owners to encrypt sensitive data, hence making the outsourced data no longer ...
- research-articleApril 2017
A green framework for DBMS based on energy-aware query optimization and energy-efficient query processing
Journal of Network and Computer Applications (JNCA), Volume 84, Issue CPages 118–130https://doi.org/10.1016/j.jnca.2017.02.015Traditional database systems result in high energy consumption and low energy efficiency due to the lack of consideration of energy issues and environmental adaptation in the design process. In this study, we report our recent efforts on this issue, ...
- research-articleApril 2017
A proxy signature-based handover authentication scheme for LTE wireless networks
Journal of Network and Computer Applications (JNCA), Volume 83, Issue CPages 63–71https://doi.org/10.1016/j.jnca.2017.01.023A seamless and secure handover is always one of the important design goals of the cellular networks. The handover scheme of 4G Long Term Evolution (LTE) wireless networks is complex due to the presence of two possible different types of base stations. ...
- research-articleMarch 2017
A survey on non-linear optimization problems in wireless sensor networks
Journal of Network and Computer Applications (JNCA), Volume 82, Issue CPages 1–20https://doi.org/10.1016/j.jnca.2017.01.001Wireless Sensor Networks (WSN) pose several problems in terms of scalability and energy consumption. Many of them have been treated in the literature by means of optimization techniques. Depending on the optimization goal and constraints, a great number ...