Skip to main content

Cluster Computing

Ausgabe 5/2022

Inhalt (40 Artikel)

Achieving data privacy for decision support systems in times of massive data sharing

Rabeeha Fazal, Munam Ali Shah, Hasan Ali Khattak, Hafiz Tayyab Rauf, Fadi Al-Turjman

Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation

Rahul Mishra, Dharavath Ramesh, Damodar Reddy Edla, Munesh Chandra Trivedi

Efficient and privacy-preserving location-based services over the cloud

Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan

A two-stage scheduling method for deadline-constrained task in cloud computing

Xiaojian He, Junmin Shen, Fagui Liu, Bin Wang, Guoxiang Zhong, Jun Jiang

Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing

Simar Preet Singh, Rajesh Kumar, Anju Sharma, Jemal H. Abawajy, Ravneet Kaur

Big data analytics for data-driven industry: a review of data sources, tools, challenges, solutions, and research directions

Anayo Chukwu Ikegwu, Henry Friday Nweke, Chioma Virginia Anikwe, Uzoma Rita Alo, Obikwelu Raphael Okonkwo

BigRC-EML: big-data based ransomware classification using ensemble machine learning

Sana Aurangzeb, Haris Anwar, Muhammad Asif Naeem, Muhammad Aleem

Placement of IoT services in fog environment based on complex network features: a genetic-based approach

Masomeh Azimzadeh, Ali Rezaee, Somayyeh Jafarali Jassbi, Mehdi Esnaashari

A gradient-based optimization approach for task scheduling problem in cloud computing

Xingwang Huang, Yangbin Lin, Zongliang Zhang, Xiaoxi Guo, Shubin Su

An exploration to graphics processing unit spot price prediction

Muhammad Khan, Ali Imran Jehangiri, Zulfiqar Ahmad, Mohammed Alaa Ala’anzy, Asif Umer

Data replica placement approaches in fog computing: a review

Esmaeil Torabi, Mostafa Ghobaei-Arani, Ali Shahidinejad

An enhanced privacy-preserving record linkage approach for multiple databases

Shumin Han, Derong Shen, Tiezheng Nie, Yue Kou, Ge Yu

An enhanced smart card and dynamic ID based remote multi-server user authentication scheme

Nitish Andola, Sourabh Prakash, Raghav Gahlot, S. Venkatesan, Shekhar Verma

The research and analysis of efficiency of hardware usage base on HDFS

Yun Liu, Xiao Zhang, Binbin Liu, Xiaonan Zhao

RSM analysis based cloud access security broker: a systematic literature review

Shahnawaz Ahmad, Shabana Mehfuz, Fateh Mebarek-Oudina, Javed Beg

Correction

Correction: Mitigating the worst parent attack in RPL based internet of things

Rashmi Sahay, G. Geethakumari, Barsha Mitra