Skip to main content
Erschienen in: Wireless Personal Communications 1/2021

28.03.2021

Inherent Security-aware Resource Utilizing Methodology for Cloud Environments

verfasst von: C. Gopala Krishnan, E. Golden Julie, Y. Harold Robinson

Erschienen in: Wireless Personal Communications | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud-based environments utilize a different kind of security services on the Internet in a cost effective manner. The cloud-based service providers may diminish the cost for the operational purpose by the methodology of automatic controlling of the resource utilization with the user’s demand. Moreover, the time and expenditure may expand and the amount of active utilization of computational resources is one of the high restrictions of the scalability measurement. The automatic controlling and utilization of resources are the biggest confront in a cloud computing environment. This paper proposed a solution for providing the automatic scalability of the limited resources for the multi-layered cloud applications. The Google penalty payment methodology was utilized to synchronize the expenditure for the penalty related issues and to correctly compute the actual profit. A hybrid resource utilization algorithm is used to find the valid resources in the cloud layer with a security-aware algorithm are utilized to distribute the resources to the active users based on their request. The experimental results are performed using CLOUDSIM that indicates the advancements of the proposed methodology in terms of resource utilization, providing security and profit identification.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bhattacharjya, A., Zhong, X., & Li, X. (2019). A Lightweight and efficient secure hybrid RSA (SHRSA) messaging scheme with four-layered authentication stack. IEEE Access, 7, 30487–30506.CrossRef Bhattacharjya, A., Zhong, X., & Li, X. (2019). A Lightweight and efficient secure hybrid RSA (SHRSA) messaging scheme with four-layered authentication stack. IEEE Access, 7, 30487–30506.CrossRef
2.
Zurück zum Zitat Yu, R., Wang, J., Xu, T., Gao, J., An, Y., Zhang, G., & Yu, M. (2017). Authentication with block-chain algorithm and text encryption protocol in calculation of social network. IEEE Access, 5, 24944–24951.CrossRef Yu, R., Wang, J., Xu, T., Gao, J., An, Y., Zhang, G., & Yu, M. (2017). Authentication with block-chain algorithm and text encryption protocol in calculation of social network. IEEE Access, 5, 24944–24951.CrossRef
3.
Zurück zum Zitat Wong, C. K., Gouda, M., & Lam, S. S. (2000). Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8, 16–30.CrossRef Wong, C. K., Gouda, M., & Lam, S. S. (2000). Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8, 16–30.CrossRef
4.
Zurück zum Zitat Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25, 222–233.CrossRef Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25, 222–233.CrossRef
5.
Zurück zum Zitat Kamil, I.A., Ogundoyin, S.O. (2018) EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network. Journal of King Saud University-Computer and Information Sciences. Kamil, I.A., Ogundoyin, S.O. (2018) EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network. Journal of King Saud University-Computer and Information Sciences.
6.
Zurück zum Zitat Feng, B., Ma, X., Guo, C., Shi, H., Fu, Z., & Qiu, T. (2016). An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access, 4, 7899–7911.CrossRef Feng, B., Ma, X., Guo, C., Shi, H., Fu, Z., & Qiu, T. (2016). An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access, 4, 7899–7911.CrossRef
7.
Zurück zum Zitat Liang, K., & Susilo, W. (2015). Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 10, 1981–1992.CrossRef Liang, K., & Susilo, W. (2015). Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 10, 1981–1992.CrossRef
8.
Zurück zum Zitat Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24, 131–143.CrossRef Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24, 131–143.CrossRef
9.
Zurück zum Zitat Li, J., Yu, Q., & Zhang, Y. (2019). Hierarchical attribute based encryption with continuous leakage-resilience. Information Sciences, 484, 113–134.CrossRef Li, J., Yu, Q., & Zhang, Y. (2019). Hierarchical attribute based encryption with continuous leakage-resilience. Information Sciences, 484, 113–134.CrossRef
10.
Zurück zum Zitat Xu, S., Yang, G., Mu, Y., & Liu, X. (2019). A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Generation Computer Systems, 97, 284–294.CrossRef Xu, S., Yang, G., Mu, Y., & Liu, X. (2019). A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Generation Computer Systems, 97, 284–294.CrossRef
11.
Zurück zum Zitat Lang, B., Wang, J., & Liu, Y. (2017). Achieving flexible and self-contained data protection in cloud computing. IEEE Access, 5, 1510–1523.CrossRef Lang, B., Wang, J., & Liu, Y. (2017). Achieving flexible and self-contained data protection in cloud computing. IEEE Access, 5, 1510–1523.CrossRef
12.
Zurück zum Zitat Hong, J., Wen, T., Guo, Q., Ye, Z., Yin, Y. (2017) Privacy protection and integrity verification of aggregate queries in cloud computing. Cluster Computing 1–11 Hong, J., Wen, T., Guo, Q., Ye, Z., Yin, Y. (2017) Privacy protection and integrity verification of aggregate queries in cloud computing. Cluster Computing 1–11
13.
Zurück zum Zitat Ali, M., Malik, S. U., & Khan, S. U. (2017). DaSCE: Data security for cloud environment with semi-trusted third party. IEEE Transactions on Cloud Computing, 5, 642–655.CrossRef Ali, M., Malik, S. U., & Khan, S. U. (2017). DaSCE: Data security for cloud environment with semi-trusted third party. IEEE Transactions on Cloud Computing, 5, 642–655.CrossRef
14.
Zurück zum Zitat Jia, X., He, D., Zeadally, S., & Li, L. (2017). Efficient revocable ID-based signature with cloud revocation server. IEEE Access, 5, 2945–2954.CrossRef Jia, X., He, D., Zeadally, S., & Li, L. (2017). Efficient revocable ID-based signature with cloud revocation server. IEEE Access, 5, 2945–2954.CrossRef
15.
Zurück zum Zitat Wang, S., Zhang, D., Zhang, Y., & Liu, L. (2018). Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage. IEEE Access, 6, 30444–30457.CrossRef Wang, S., Zhang, D., Zhang, Y., & Liu, L. (2018). Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage. IEEE Access, 6, 30444–30457.CrossRef
16.
Zurück zum Zitat Sun, Y., Susilo, W., Zhang, F., & Fu, A. (2018). CCA-secure revocable identity-based encryption with ciphertext evolution in the cloud. IEEE Access, 6, 56977–56983.CrossRef Sun, Y., Susilo, W., Zhang, F., & Fu, A. (2018). CCA-secure revocable identity-based encryption with ciphertext evolution in the cloud. IEEE Access, 6, 56977–56983.CrossRef
17.
Zurück zum Zitat Ali, S., Rauf, A., Islam, N., Farman, H., Jan, B., Khan, M., et al. (2018). SGKMP: A scalable group key management protocol. Sustainable Cities and Society, 39, 37–42.CrossRef Ali, S., Rauf, A., Islam, N., Farman, H., Jan, B., Khan, M., et al. (2018). SGKMP: A scalable group key management protocol. Sustainable Cities and Society, 39, 37–42.CrossRef
18.
Zurück zum Zitat Gonzales, D., Kaplan, J. M., Saltzman, E., Winkelman, Z., & Woods, D. (2017). Cloud-trust—A security assessment model for infrastructure as a service (IaaS) clouds. IEEE Transactions on Cloud Computing, 5, 523–536.CrossRef Gonzales, D., Kaplan, J. M., Saltzman, E., Winkelman, Z., & Woods, D. (2017). Cloud-trust—A security assessment model for infrastructure as a service (IaaS) clouds. IEEE Transactions on Cloud Computing, 5, 523–536.CrossRef
19.
Zurück zum Zitat Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2019). Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14, 331–346.CrossRef Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2019). Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14, 331–346.CrossRef
20.
Zurück zum Zitat Shao, B., Bian, G., Wang, Y., Su, S., & Guo, C. (2018). Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment. IEEE Access, 6, 43785–43797.CrossRef Shao, B., Bian, G., Wang, Y., Su, S., & Guo, C. (2018). Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment. IEEE Access, 6, 43785–43797.CrossRef
21.
Zurück zum Zitat He, J., Zhang, Z., Li, M., Zhu, L., & Hu, J. (2019). Provable data integrity of cloud storage service with enhanced security in the internet of things. IEEE Access, 7, 6226–6239.CrossRef He, J., Zhang, Z., Li, M., Zhu, L., & Hu, J. (2019). Provable data integrity of cloud storage service with enhanced security in the internet of things. IEEE Access, 7, 6226–6239.CrossRef
22.
Zurück zum Zitat Wu, X., Jiang, R., & Bhargava, B. (2017). On the security of data access control for multiauthority cloud storage systems. IEEE Transactions on Services Computing, 10, 258–272.CrossRef Wu, X., Jiang, R., & Bhargava, B. (2017). On the security of data access control for multiauthority cloud storage systems. IEEE Transactions on Services Computing, 10, 258–272.CrossRef
23.
Zurück zum Zitat Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(6), 1265–1277.CrossRef Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(6), 1265–1277.CrossRef
24.
Zurück zum Zitat Ateniese, G., Hohenberger S. (2005) Proxy re-signatures: New definitions, algorithms and applications. Proceedings of the 12th Computer and Communications Security (pp. 310–319), 7–11 Nov, USA. Ateniese, G., Hohenberger S. (2005) Proxy re-signatures: New definitions, algorithms and applications. Proceedings of the 12th Computer and Communications Security (pp. 310–319), 7–11 Nov, USA.
25.
Zurück zum Zitat Wang, X., He, J., Cheng, P., & Chen, J. (2019). Privacy preserving collaborative computing: heterogeneous privacy guarantee and efficient incentive mechanism. IEEE Transactions on Signal Processing, 67(1), 221–233.MathSciNetCrossRef Wang, X., He, J., Cheng, P., & Chen, J. (2019). Privacy preserving collaborative computing: heterogeneous privacy guarantee and efficient incentive mechanism. IEEE Transactions on Signal Processing, 67(1), 221–233.MathSciNetCrossRef
26.
Zurück zum Zitat Ganeshkumar, K., & Arivazhagan, D. (2014). Generating a digital signature based on new cryptographic scheme for user authentication and security. Indian Journal of Science and Technology, 7, 1–5.CrossRef Ganeshkumar, K., & Arivazhagan, D. (2014). Generating a digital signature based on new cryptographic scheme for user authentication and security. Indian Journal of Science and Technology, 7, 1–5.CrossRef
27.
Zurück zum Zitat Institute, P. (2016) Sixth annual benchmark study on privacy and security of healthcare data. Technical report. Ponemon Institute LLC. Institute, P. (2016) Sixth annual benchmark study on privacy and security of healthcare data. Technical report. Ponemon Institute LLC.
29.
Zurück zum Zitat Al-Ayyoub, M., Jararweh, Y., Daraghmeh, M., & Althebyan, Q. (2015). Multi-agent based dynamic resource provisioning and monitoring for cloud computing systems infrastructure. Cluster Computing, 18, 919.CrossRef Al-Ayyoub, M., Jararweh, Y., Daraghmeh, M., & Althebyan, Q. (2015). Multi-agent based dynamic resource provisioning and monitoring for cloud computing systems infrastructure. Cluster Computing, 18, 919.CrossRef
31.
Zurück zum Zitat Yu, J., Ren, K., Wang, C., & Varadharajan, V. (2015). Enabling cloud storage auditing with key-exposure resistance. IEEE Transactions on Information forensics and security, 10(6), 1167–1179.CrossRef Yu, J., Ren, K., Wang, C., & Varadharajan, V. (2015). Enabling cloud storage auditing with key-exposure resistance. IEEE Transactions on Information forensics and security, 10(6), 1167–1179.CrossRef
32.
Zurück zum Zitat Chen, X., Li, J., Huang, X., Ma, J., & Lou, W. (2015). New publicly verifiable databases with efficient updates. IEEE Transactions on Dependable and Secure Computing, 12(5), 546–556.CrossRef Chen, X., Li, J., Huang, X., Ma, J., & Lou, W. (2015). New publicly verifiable databases with efficient updates. IEEE Transactions on Dependable and Secure Computing, 12(5), 546–556.CrossRef
33.
Zurück zum Zitat Libert, B., Vergmud D. (2008) Unidirectional chosen-ciphertext secure proxy re-encryption. Proceedings of the PKC 2008, 9–12 March 2008 (pp. 360–379). Springer: Berlin/Heidelberg. Libert, B., Vergmud D. (2008) Unidirectional chosen-ciphertext secure proxy re-encryption. Proceedings of the PKC 2008, 9–12 March 2008 (pp. 360–379). Springer: Berlin/Heidelberg.
34.
Zurück zum Zitat Jia, G., Han, G., Xie, H., & Du, J. (2019). Hybrid-LRU caching for optimizing data storage and retrieval in edge computing-based wearable sensors. IEEE Internet of Things Journal, 6(2), 1342–1351.CrossRef Jia, G., Han, G., Xie, H., & Du, J. (2019). Hybrid-LRU caching for optimizing data storage and retrieval in edge computing-based wearable sensors. IEEE Internet of Things Journal, 6(2), 1342–1351.CrossRef
35.
Zurück zum Zitat Vijayakumar, P., Pandiaraja, P., Karuppiah, M., & Deborah, L. J. (2017). An efficient secure communication for healthcare system using wearable devices. Computers & Electrical Engineering, 63, 232–245.CrossRef Vijayakumar, P., Pandiaraja, P., Karuppiah, M., & Deborah, L. J. (2017). An efficient secure communication for healthcare system using wearable devices. Computers & Electrical Engineering, 63, 232–245.CrossRef
36.
Zurück zum Zitat Vijayakumar, P., Pandiaraja, P., Balamurugan, B., & Karuppiah, M. (2019). A novel performance enhancing task scheduling algorithm for cloud based E-health environment. International Journal of E-Health and Medical Communications (IJEHMC), 10(2), 102–117 IGI-Global.CrossRef Vijayakumar, P., Pandiaraja, P., Balamurugan, B., & Karuppiah, M. (2019). A novel performance enhancing task scheduling algorithm for cloud based E-health environment. International Journal of E-Health and Medical Communications (IJEHMC), 10(2), 102–117 IGI-Global.CrossRef
37.
Zurück zum Zitat Mazini, M., Shirazi, B., Mahdavi, I. (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. Journal of King Saud University-Computer and Information Sciences. Mazini, M., Shirazi, B., Mahdavi, I. (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. Journal of King Saud University-Computer and Information Sciences.
39.
Zurück zum Zitat Muthu, A. B. A., & Enoch, S. (2017). Optimized scheduling and resource allocation using evolutionary algorithms in cloud environment. International Journal of Intelligent Engineering and Systems, 10(5), 125–133.CrossRef Muthu, A. B. A., & Enoch, S. (2017). Optimized scheduling and resource allocation using evolutionary algorithms in cloud environment. International Journal of Intelligent Engineering and Systems, 10(5), 125–133.CrossRef
40.
Zurück zum Zitat Wang, X. A., Xhafa, F., Ma, J., & Zheng, Z. (2019). Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme. Journal of Parallel and Distributed Computing, 130, 153–165.CrossRef Wang, X. A., Xhafa, F., Ma, J., & Zheng, Z. (2019). Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme. Journal of Parallel and Distributed Computing, 130, 153–165.CrossRef
41.
Zurück zum Zitat Tian, H., Nan, F., Jiang, H., Chang, C.-C., Ning, J., & Huang, Y. (2019). Public auditing for shared cloud data with efficient and secure group management. Information Sciences, 472, 107–125.CrossRef Tian, H., Nan, F., Jiang, H., Chang, C.-C., Ning, J., & Huang, Y. (2019). Public auditing for shared cloud data with efficient and secure group management. Information Sciences, 472, 107–125.CrossRef
43.
Zurück zum Zitat Grossman, R. L. (2019). Data lakes, clouds, and commons: A review of platforms for analyzing and sharing genomic data. Trends in Genetics, 35(3), 223–234.CrossRef Grossman, R. L. (2019). Data lakes, clouds, and commons: A review of platforms for analyzing and sharing genomic data. Trends in Genetics, 35(3), 223–234.CrossRef
44.
Zurück zum Zitat Wang, H., Zhang, Y., Chen, K., Sui, G., Zhao, Y., & Huang, X. (2019). Functional broadcast encryption with applications to data sharing for cloud storage. Information Sciences, 502, 109–124.MathSciNetCrossRef Wang, H., Zhang, Y., Chen, K., Sui, G., Zhao, Y., & Huang, X. (2019). Functional broadcast encryption with applications to data sharing for cloud storage. Information Sciences, 502, 109–124.MathSciNetCrossRef
46.
Zurück zum Zitat Liu, Z.L., Li, B., Huang, Y.Y., Li, J., Xiang, Y., Pedrycz, W. (2019). Newmcos: Towards a practical multi-cloud oblivious storage scheme. IEEE Transactions on Knowledge and Data Engineering 99. Liu, Z.L., Li, B., Huang, Y.Y., Li, J., Xiang, Y., Pedrycz, W. (2019). Newmcos: Towards a practical multi-cloud oblivious storage scheme. IEEE Transactions on Knowledge and Data Engineering 99.
47.
Zurück zum Zitat Li, J., Huang, Y.Y., Wei, Y., Lv, S.Y., Liu, Z.L., Dong, C.Y., Lou W.J. (2019) Searchable symmetric encryption with forward search privacy. IEEE Transactions on Dependable and Secure Computing 99 Li, J., Huang, Y.Y., Wei, Y., Lv, S.Y., Liu, Z.L., Dong, C.Y., Lou W.J. (2019) Searchable symmetric encryption with forward search privacy. IEEE Transactions on Dependable and Secure Computing 99
48.
Zurück zum Zitat Liu, H., Yao, X., Yang, T., & Ning, H. (2019). Cooperative privacy preservation for wearable devices in hybrid computing-based smart health. IEEE Internet of Things Journal, 6(2), 1352–1362.CrossRef Liu, H., Yao, X., Yang, T., & Ning, H. (2019). Cooperative privacy preservation for wearable devices in hybrid computing-based smart health. IEEE Internet of Things Journal, 6(2), 1352–1362.CrossRef
49.
Zurück zum Zitat Chadwick, D. W., Fan, W., Constantino, G., de Lemos, R., Di Cerbo, F., Herwono, I., Manea, M., Mori, P., Sajjad, A., & Wang, X.-S. (2020). A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Generation Computer Systems, 102, 710–722.CrossRef Chadwick, D. W., Fan, W., Constantino, G., de Lemos, R., Di Cerbo, F., Herwono, I., Manea, M., Mori, P., Sajjad, A., & Wang, X.-S. (2020). A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Generation Computer Systems, 102, 710–722.CrossRef
50.
Zurück zum Zitat Harold Robinson, Y., Jeena Jacob, I., Golden Julie, E., Ebby Darney, P. (2019). Hadoop mapreduce and dynamic intelligent splitter for efficient and speed transmission of cloud-based video transforming. IEEE - 3rd International Conference on Computing Methodologies and Communication (ICCMC), (pp. 400–404). IEEE. Harold Robinson, Y., Jeena Jacob, I., Golden Julie, E., Ebby Darney, P. (2019). Hadoop mapreduce and dynamic intelligent splitter for efficient and speed transmission of cloud-based video transforming. IEEE - 3rd International Conference on Computing Methodologies and Communication (ICCMC), (pp. 400–404). IEEE.
Metadaten
Titel
Inherent Security-aware Resource Utilizing Methodology for Cloud Environments
verfasst von
C. Gopala Krishnan
E. Golden Julie
Y. Harold Robinson
Publikationsdatum
28.03.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08431-1

Weitere Artikel der Ausgabe 1/2021

Wireless Personal Communications 1/2021 Zur Ausgabe

Neuer Inhalt