-
2020 Index IEEE Transactions on Services Computing Vol. 13 IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2021-02-03
Presents the 2020 subject/author index for this publication.
-
Holistic Technologies for Managing Internet of Things Services IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-08-05 Rajiv Ranjan; Ching-Hsien Hsu; Lydia Y. Chen; Dimitrios Georgakopoulos
The Internet of Things (IoT) is the latest Internet evolution that incorporates billions of sensors, actuators, and related software services that collectively distill high value information, perform actions that affect the physical world, and support a variety of applications controlled by different organizations and individuals. IoT's ability to observe and affect the physical world presents a unprecedented
-
Guest Editorial: Special Issue on Blockchain-Based Services Computing IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-04-08 Zibin Zheng; Andreas Kind; Peter Chen
The papers in this special section focus on blockchain-based computing services. Blockchain has become a hot research area in academia and industry. A blockchain is a continuously growing list of records of value-transferred transactions maintained by a peer-to-peer network through a distributed consensus mechanism. Blockchain technology has promising characteristics regarding decentralization, persistency
-
A Service-Oriented Permissioned Blockchain for the Internet of Things IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-10-23 Chao Qiu; Haipeng Yao; F. Richard Yu; Chunxiao Jiang; Song Guo
Recently, the emergence of blockchain has stirred great interests in the field of Internet of Things (IoT). However, numerous non-trivial problems in the current blockchain system prevent it from being used as a generic platform for large-scale services and applications in IoT. One notable drawback is the scalability problem. Lots of projects and researches have been done to solve this problem. Nevertheless
-
Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-10-15 Yuan Zhang; Chunxiang Xu; Nan Cheng; Hongwei Li; Haomiao Yang; Xuemin Shen
We propose Chronos $^{{\mathbf +}}$+ , an accurate blockchain-based time-stamping scheme for outsourced data, where both the storage and time-stamping services are provided by cloud service providers. Specifically, Chronos $^{{\mathbf +}}$+ integrates a file into a transaction on a blockchain once the file is created, which guarantees the file's latest creation time to be the time when the block containing
-
Policy-Driven Blockchain and Its Applications for Transport Systems IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-10-16 Yi Mu; Fatemeh Rezaeibagha; Ke Huang
Blockchains offer opportunities for developing advanced digital services. While current research on this topic is still growing, various security concerns have been raised and the security of blockchains has been becoming the most important issue which must be well addressed. Blockchain transactions are based on digital signatures, where the public key is associated with the ownership of the digital
-
A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-01-07 Zhihua Cui; Fei XUE; Shiqiang Zhang; Xingjuan Cai; Yang Cao; Wensheng Zhang; Jinjun Chen
Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been a widely concerned issue. Node identity authentication is an important means to ensure its security. Traditional IoT identity authentication protocols usually rely on trusted third parties. However, many IoT environments do not allow such conditions, and are prone to single point failure. Blockchain
-
Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-04-08 Kai Lei; Maoyu Du; Jiyue Huang; Tong Jin
Powered by a number of smart devices distributed throughout the whole network, the Internet of Things (IoT) is supposed to provide services computing for massive data from devices. Fog computing, an extension of cloud-based IoT-oriented solutions, has emerged with requirements for distribution and decentralization. In this respect, the conjunction with Blockchain provides a natural solution for decentralization
-
DEAL: Differentially Private Auction for Blockchain-Based Microgrids Energy Trading IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-10-15 Muneeb Ul Hassan; Mubashir Husain Rehmani; Jinjun Chen
Modern smart homes are being equipped with certain renewable energy resources that can produce their own electric energy. From time to time, these smart homes or microgrids are also capable of supplying energy to other houses, buildings, or energy grid in the time of available self-produced renewable energy. Therefore, researches have been carried out to develop optimal trading strategies, and many
-
A Blockchain-Based Model for Cloud Service Quality Monitoring IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-10-17 Mona Taghavi; Jamal Bentahar; Hadi Otrok; Kaveh Bakhtiyari
This paper introduces a novel blockchain-based decentralized federation model that embodies quality verification for cloud providers who lease computing resources from each other. The blockchain structure removes the barriers of a traditional centralized federation and offers a fully distributed and transparent administration by enforcing the involved agents to maintain consensus on the data. For a
-
Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-11-20 Yang Xu; Ju Ren; Yan Zhang; Cheng Zhang; Bo Shen; Yaoxue Zhang
The maturity of network storage technology drives users to outsource local data to remote servers. Since these servers are not reliable enough for keeping users’ data, remote data auditing mechanisms are studied for mitigating the threat to data integrity. However, many traditional schemes achieve verifiable data integrity for users only without resolutions to data possession disputes, while others
-
BoR: Toward High-Performance Permissioned Blockchain in RDMA-Enabled Network IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-10-21 Bobo Huang; Li Jin; ZhiHui Lu; Xin Zhou; Jie Wu; Qifeng Tang; Patrick C. K. Hung
Known as a distributed ledger, blockchain is becoming prevalent due to its decentralization, traceability and tamper resistance. Particularly, permissioned blockchain such as Hyperledger Fabric shows great application prospects as the infrastructure of IoT security, credit management, etc. Many cloud platforms like AWS, Azure, Oracle and IBM cloud currently provide blockchain as a service, in which
-
ContractGuard: Defend Ethereum Smart Contracts with Embedded Intrusion Detection IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-10-25 Xinming Wang; Jiahao He; Zhijian Xie; Gansen Zhao; Shing-Chi Cheung
Ethereum smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes. Smart contracts handle and transfer assets of values, offering strong incentives for malicious attacks. Intrusion attacks are a popular type of malicious attacks. In this article, we propose ContractGuard , the first intrusion detection system (IDS) to defend Ethereum smart contracts against
-
Blockchain-Based Object Name Service With Tokenized Authority IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-12-30 Wondeuk Yoon; Janggwan Im; Tindal Choi; Daeyoung Kim
Today, the Internet of Things (IoT) technology is applied everywhere, providing tremendous amounts of IoT service. The GS1, a non-profit international standards organization, has established standards for IoT technology. Especially, the GS1 standardized an Object Name Service (ONS) leveraging DNS's distributed and federated infrastructure, enables users to manage and discover IoT services such as the
-
Decentralized Services Computing Paradigm for Blockchain-Based Data Governance: Programmability, Interoperability, and Intelligence IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-11-06 Xuanzhe Liu; Sam Xun Sun; Gang Huang
With the explosion of “big data” in the past decade, exploring and mining the value hidden in the data has already generated a lot of innovative applications, especially the recent advances of AI applications. The data governance, including activities of data creation, sharing, exchange, management, analytics, tracing, and accounting, has drawn a lot of attentions. Services computing establishes the
-
Cloud/Edge Computing Service Management in Blockchain Networks: Multi-Leader Multi-Follower Game-Based ADMM for Pricing IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-10-16 Zehui Xiong; Jiawen Kang; Dusit Niyato; Ping Wang; H. Vincent Poor
The mining process in public blockchains with the Nakamoto consensus protocol requires solving a computational puzzle, i.e., proof-of-work, which is resource expensive to implement in lightweight devices with limited computing resources and energy. Thus, renting mining service from cloud providers becomes a reasonable solution, which is called cloud mining. This enables users who want to mine, i.e
-
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-03-19 Long Cheng; Boudewijn F. van Dongen; Wil M. P. van der Aalst
Process descriptions are used to create products and deliver services. To lead better processes and services, the first step is to learn a process model. Process discovery is such a technique which can automatically extract process models from event logs. Although various discovery techniques have been proposed, they focus on either constructing formal models which are very powerful but complex, or
-
Facilitating Application-Aware Bandwidth Allocation in the Cloud with One-Step-Ahead Traffic Information IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-06-11 Dian Shen; Junzhou Luo; Fang Dong; Jiahui Jin; Junxue Zhang; Jun Shen
Bandwidth allocation to virtual machines (VMs) has a significant impact on the performance of communication-intensive big data applications hosted in VMs. It is crucial to accurately determine how much bandwidth to be reserved for VMs and when to adjust it. Past approaches typically resort to predicting the long-term network demands of applications for bandwidth allocation. However, lacking of prediction
-
Editorial IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-02-06 James Joshi
Presents the introductory editorial for this issue of the publication.
-
A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-03-08 Shridhar G. Domanal; Ram Mohana Reddy Guddeti; Rajkumar Buyya
In this paper, we propose a novel HYBRID Bio-Inspired algorithm for task scheduling and resource management, since it plays an important role in the cloud computing environment. Conventional scheduling algorithms such as Round Robin, First Come First Serve, Ant Colony Optimization etc. have been widely used in many cloud computing systems. Cloud receives clients tasks in a rapid rate and allocation
-
A Privacy-Preserving Localization Service for Assisted Living Facilities IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2016-12-29 Francesco Buccafurri; Gianluca Lax; Serena Nicolazzo; Antonino Nocera
In this paper, we propose a novel localization service to monitor the position of residents in assisted living facilities. The service supports a configurable balancing between precision and privacy, in such a way that the right of the residents to move freely in the environment in which they live without being tracked is preserved. However, in case of need, they can always be quickly localized. To
-
A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-01-24 Marco Anisetti; Claudio Agostino Ardagna; Ernesto Damiani; Filippo Gaudenzi
Traditional assurance solutions for software-based systems rely on static verification techniques and assume continuous availability of trusted third parties. With the advent of cloud computing, these solutions become ineffective since services/applications are flexible, dynamic, and change at runtime, at high rates. Although several assurance approaches have been defined, cloud requires a step-change
-
Assessing Invariant Mining Techniques for Cloud-Based Utility Computing Systems IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-03-08 Antonio Pecchia; Stefano Russo; Santonu Sarkar
Likely system invariants model properties that hold in operating conditions of a computing system. Invariants may be mined offline from training datasets, or inferred during execution. Scientific work has shown that invariants’ mining techniques support several activities, including capacity planning and detection of failures, anomalies and violations of Service Level Agreements. However their practical
-
Deadline Constrained Video Analysis via In-Transit Computational Environments IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-01-13 Ali Reza Zamani; Mengsong Zou; Javier Diaz-Montes; Ioan Petri; Omer Rana; Ashiq Anjum; Manish Parashar
Combining edge processing (at data capture site) with analysis carried out while data is enroute from the capture site to a data center offers a variety of different processing models. Such in-transit nodes include network data centers that have generally been used to support content distribution (providing support for data multicast and caching), but have recently started to offer user-defined programmability
-
DLTSR: A Deep Learning Framework for Recommendations of Long-Tail Web Services IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-03-13 Bing Bai; Yushun Fan; Wei Tan; Jia Zhang
With the growing popularity of web services, more and more developers are composing multiple services into mashups. Developers show an increasing interest in non-popular services (i.e., long-tail ones), however, there are very scarce studies trying to address the long-tail web service recommendation problem. The major challenges for recommending long-tail services accurately include severe sparsity
-
Game-Theoretic Resource Pricing and Provisioning Strategies in Cloud Systems IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2016-11-29 Valeria Cardellini; Valerio Di Valerio; Francesco Lo Presti
We consider several Software as a Service (SaaS) providers that offer services using the Cloud resources provided by an Infrastructure as a Service (IaaS) provider which adopts a pay-per-use scheme similar to the Amazon EC2 service, comprising flat, on demand, and spot virtual machine instances. For this scenario, we study the virtual machine provisioning and spot pricing strategies. We consider a
-
Integrated Content and Network-Based Service Clustering and Web APIs Recommendation for Mashup Development IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-03-22 Buqing Cao; Xiaoqing Frank Liu; MD Mahfuzer Rahman; Bing Li; Jianxun Liu; Mingdong Tang
The rapid growth in the number and diversity of Web APIs, coupled with the myriad of functionally similar Web APIs, makes it difficult to find most suitable Web APIs for users to accelerate and accomplish Mashup development. Even if the existing methods show improvements in Web APIs recommendation, it is still challenging to recommend Web APIs with high accuracy and good diversity. In this paper, we
-
Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-04-17 Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad
Distributed Denial of Service (DDoS) constitutes a major threat against cloud systems owing to the large financial losses it incurs. This motivated the security research community to investigate numerous detection techniques to limit such attack's effects. Yet, the existing solutions are still not mature enough to satisfy a cloud-dedicated detection system's requirements since they overlook the attacker's
-
Resource Renting for Periodical Cloud Workflow Applications IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-03-07 Long Chen; Xiaoping Li; Rubén Ruiz
Cloud computing is a new resource provisioning mechanism, which represents a convenient way for users to access different computing resources. Periodical workflow applications commonly exist in scientific and business analysis, among many other fields. One of the most challenging problems is to determine the right amount of resources for multiple periodical workflow applications. In this paper, the
-
Shifting to Mobile: Network-Based Empirical Study of Mobile Vulnerability Market IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2016-12-30 Keman Huang; Jia Zhang; Wei Tan; Zhiyong Feng
With the increasing popularity and great economic benefit from vulnerability exploitation, it is important to study mobile vulnerability in the mobile ecosystem. Beyond the traditional technical solutions such as developing technologies to identify potential vulnerabilities, discover the widely available exploitations and protect consumers from attacks, constructing the vulnerability market, a marketplace
-
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-03-14 Jianan Hong; Kaiping Xue; Yingjie Xue; Weikeng Chen; David S. L. Wei; Nenghai Yu; Peilin Hong
The new paradigm of outsourcing data to the cloud is a double-edged sword. On the one hand, it frees data owners from the technical management, and is easier for data owners to share their data with intended users. On the other hand, it poses new challenges on privacy and security protection. To protect data confidentiality against the honest-but-curious cloud service provider, numerous works have
-
Traffic-Aware and Energy-Efficient vNF Placement for Service Chaining: Joint Sampling and Matching Approach IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-02-20 Chuan Pham; Nguyen H. Tran; Shaolei Ren; Walid Saad; Choong Seon Hong
Although network function virtualization (NFV) is a promising approach for providing elastic network functions, it faces several challenges in terms of adaptation to diverse network appliances and reduction of the capital and operational expenses of the service providers. In particular, to deploy service chains, providers must consider different objectives, such as minimizing the network latency or
-
2019 Index IEEE Transactions on Services Computing Vol. 12 IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-02-05
Presents the 2019 subject/author index for this publication.
-
Virtual Machine Consolidation with Multiple Usage Prediction for Energy-Efficient Cloud Data Centers IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-01-05 Nguyen Trung Hieu; Mario Di Francesco; Antti Ylä-Jääski
Virtual machine consolidation aims at reducing the number of active physical servers in a data center so as to decrease the total power consumption. In this context, most of the existing solutions rely on aggressive virtual machine migration, thus resulting in unnecessary overhead and energy wastage. Besides, virtual machine consolidation should take into account multiple resource types at the same
-
An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-01-15 Abbas Yazdinejad; Reza M. Parizi; Ali Dehghantanha; Qi Zhang; Kim-Kwang Raymond Choo
Internet of Things (IoT) is a disruptive technology in many aspects of our society, ranging from communications to financial transactions to national security (e.g., Internet of Battlefield / Military Things), and so on. There are long-standing challenges in IoT, such as security, comparability, energy consumption, and heterogeneity of devices. Security and energy aspects play important roles in data
-
A Cyclic Game for Service-Oriented Resource Allocation in Edge Computing IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-01-15 Shiheng Ma; Song Guo; Kun Wang; Weijia Jia; Minyi Guo
Existing works adopt the Edge-Oriented Resource Allocation (EORA) scheme, in which edge nodes cache services and schedule user requests to distribute workloads over cloud and edge nodes, so as to achieve high-quality services and low latency. Unfortunately, EORA does not fully take into account the fact that service providers are sometimes independent from the edge operators with their own objectives
-
Buoy Sensor Cyberattack Detection in Offshore Petroleum Cyber-Physical Systems IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-01-07 Lin Mu; Enjin Zhao; Yuewei Wang; Albert Y. Zomaya
Frequently occurred oil leaking accidents can induce significant damage to the ocean ecosystem and environment. Integrated buoy sensing, which functions as a tool for periodically monitoring oil existence, plays an essential role in oil leakage detection in an offshore petroleum Internet of Things (IoT) and Cyber Physical System (CPS). Buoy sensor cyberattack can severely affect the ability to detect
-
MMDP: A Mobile-IoT Based Multi-Modal Reinforcement Learning Service Framework IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-01-07 Puming Wang; Laurence T. Yang; Jintao Li; Xue Li; Xiaokang Zhou
With the development of GPS technology, a new Mobile Internet of Things (M-IoT) is emerging, which perceives the city's rhythm and pulse day and night to collect a large scale of city data. It is urgent to innovate M-IoT service system for these large-scale and heterogeneous data. To cope with the problem, this article proposes a Mobile-IoT based multi-modal reinforcement learning service framework
-
Personalized Recommendation System Based on Collaborative Filtering for IoT Scenarios IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-01-07 Zhihua Cui; Xianghua Xu; Fei XUE; Xingjuan Cai; Yang Cao; Wensheng Zhang; Jinjun Chen
Recommendation technology is an important part of the Internet of Things (IoT) services, which can provide better service for users and help users get information anytime, anywhere. However, the traditional recommendation algorithms cannot meet user's fast and accurate recommended requirements in the IoT environment. In the face of a large-volume data, the method of finding neighborhood by comparing
-
IoT-Enabled Service for Crude-Oil Production Systems Against Unpredictable Disturbance IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2020-01-06 Qianqian Duan; Daniel Sun; Guoqiang Li; Genke Yang; Wei-Wu Yan
Internet of Things (IoT) has become a new paradigm of communication to reform traditional industries, in which distributed data automatically collected via IoT in a low cost enables many new IT services that were even impossible decades ago. This research reports on an IoT-enabled production management service for crude-oil industry. In practice, even if an optimal management decision is achieved,
-
Privacy in Data Service Composition IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-12-31 mahmoud barhamgi; Charith Perera; Chia-Mu Yu; Djamal Benslimane; David Camacho; Christine Bonnet
In modern information systems different information features, about the same individual, are often collected and managed by autonomous data collection services that may have different privacy policies. Answering many end-users’ legitimate queries requires the integration of data from multiple such services. However, data integration is often hindered by the lack of a trusted entity, often called a
-
Security-Critical Energy-Aware Task Scheduling for Heterogeneous Real-Time MPSoCs in IoT IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-12-31 Junlong Zhou; Jin Sun; Peijin Cong; Zhe Liu; Xiumin Zhou; Tongquan Wei; Shiyan Hu
Internet of Things (IoT) devices, such as intelligent road side units and video-based detectors, are being deployed in emerging applications like sustainable and intelligent transportation systems. The primary obstacles against the development of these IoT devices are various security threats and huge energy consumption. In this article, we study the problem of scheduling tasks onto a heterogeneous
-
GUARDIAN: Blockchain-Based Secure Demand Response Management in Smart Grid System IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-12-27 Anish Jindal; Gagangeet Singh Aujla; Neeraj Kumar; Massimo Villari
Smart grid (SG) is an emerging technology which provides many services to the end users and utilities, such as load management, frequency regulation, and grid stability. Although many solutions exist to provide these services in a secure manner, but these solutions are not adequate keeping in view of the heavy cryptographic primitives execution on these devices. Hence, in this article, GUARDIAN , a
-
Improving Brain E-Health Services via High-Performance EEG Classification With Grouping Bayesian Optimization IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-12-27 Hengjin Ke; Dan Chen; Benyun Shi; Jindong Zhang; Xianzeng Liu; Xinhua Zhang; Xiaoli Li
Online electroencephalograph (EEG) classification is a core service of recently booming brain e-health, but its performance often becomes unstable because (1) conventional end-to-end models (e.g., deep neural network, $DNN$ ) largely remain static , while brain states of diseases are highly dynamic and exhibits significant individuality; and (2) EEG analytics are too complicated and have to be sustained
-
An Efficient Resource Monitoring Service for Fog Computing Environments IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-12-27 Sudheer Kumar Battula; Saurabh Garg; James Montgomery; Byeong Kang
With the increasing number of Internet of Things (IoT) devices, the volume and variety of data being generated by these devices are increasing rapidly. Cloud computing cannot process this data due to its high latency and scalability. In order to process this data in less time, fog computing has evolved as an extension to Cloud computing. In a fog computing environment, a resource monitoring service
-
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-12-24 Yanyu Huang; Bo Li; Zheli Liu; Jin Li; Siu-Ming Yiu; Thar Baker; Brij B. Gupta
Oblivious RAM (ORAM) is important for applications that require hiding of access patterns. However, most of existing implementations of ORAM are very expensive, which are infeasible to be deployed in lightweight devices, like the terminal equipment for Internet of Things (IoT). In this article, we focus on how to apply the expensive ORAM to protect access pattern in IoT devices and propose an ORAM
-
Resilient Edge Data Management Framework IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-12-24 Ivan Lujic; Vincenzo De Maio; Ivona Brandic
Transferring and processing huge amounts of data in the cloud can violate the low latency requirements of modern IoT applications, considering underlying network infrastructure limitations. Edge data analytics is a promising solution. However, edge resources have usually less computational capabilities than cloud nodes, resulting in a higher failure rate of IoT systems. Consequently, near-real-time
-
Towards Service Composition Aware Virtual Machine Migration Approach in the Cloud IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2019-12-24 Ao Zhou; Shangguang Wang; Xiao Ma; Stephen S. Yau
There is a growing trend for service providers to migrate their services from local clusters to the cloud data center. When there is no single service can satisfy the functionality requirement of the end user, existing services are combined together to fulfill the requirements. The data communication between component service hosting servers imposes a heavy burden on the data center network. In this
-
An Iterative Budget Algorithm for Dynamic Virtual Machine Consolidation Under Cloud Computing Environment IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2018-01-15 Yuanjun Laili; Fei Tao; Fei Wang; Lin Zhang; Tingyu Lin
Virtualization is a crucial technology of cloud computing to enable the flexible use of a significant amount of distributed computing services on a pay-as-you-go basis. As the service demand continuingly increases to a global scale, efficient virtual machine consolidation becomes more and more imperative. Existing heuristic algorithms targeted mostly at minimizing either the rate of service level agreement
-
Certification-Based Cloud Adaptation IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2018-01-15 Claudio A. Ardagna; Rasool Asal; Ernesto Damiani; Theo Dimitrakos; Nabil El Ioini; Claus Pahl
Performance and dependability levels of cloud-based computations are difficult to guarantee by-design due to segregation of visibility and control between applications, data owners, and cloud providers. Lack of predictability increases users’ uncertainty about the service levels they will actually achieve. Cloud tenants compete for shared resources/services at all layers of the cloud stack, and pose
-
RepNet: Cutting Latency with Flow Replication in Data Center Networks IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2018-01-15 Shuhao Liu; Hong Xu; Libin Liu; Wei Bai; Kai Chen; Zhiping Cai
Data center networks need to provide low latency, especially at the tail, as demanded by many interactive applications. To improve tail latency, existing approaches require modifications to switch hardware and/or end-host operating systems, making them difficult to be deployed. We present the design, implementation, and evaluation of RepNet, an application layer transport that can be deployed today
-
TARCO: Two-Stage Auction for D2D Relay Aided Computation Resource Allocation in HetNet IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2018-01-11 Long Chen; Jigang Wu; Xinxiang Zhang; Gangqiang Zhou
In heterogeneous cellular network, task scheduling for computation offloading is one of the biggest challenges. Most works focus on alleviating heavy burden of macro base stations by moving the computation tasks on macro cell user equipment (MUE) to remote cloud or small cell base stations. But the selfishness of network users is seldom considered. Motivated by the multiple access mobile edge computing
-
Privacy-Preserving Task Recommendation Services for Crowdsourcing IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2018-01-10 Jiangang Shu; Xiaohua Jia; Kan Yang; Hua Wang
Crowdsourcing is a distributed computing paradigm that utilizes human intelligence or resources from a crowd of workers. Existing solutions of task recommendation in crowdsourcing may leak private and sensitive information about both tasks and workers. To protect privacy, information about tasks and workers should be encrypted before being outsourced to the crowdsourcing platform, which makes the task
-
CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2018-01-09 Jianting Ning; Zhenfu Cao; Xiaolei Dong; Kaitai Liang; Lifei Wei; Kim-Kwang Raymond Choo
Secure cloud storage, which is an emerging cloud service, is designed to protect the confidentiality of outsourced data but also to provide flexible data access for cloud users whose data is out of physical control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is regarded as one of the most promising techniques that may be leveraged to secure the guarantee of the service. However, the use
-
Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2018-01-08 Jiguo Li; Hao Yan; Yichen Zhang
Cloud storage service supplies people with an efficient method to share data within a group. The cloud server is not trustworthy, so lots of remote data possession checking (RDPC) protocols are proposed and thought to be an effective way to ensure the data integrity. However, most of RDPC protocols are based on the mechanism of traditional public key infrastructure (PKI), which has obvious security
-
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2018-01-08 Wei Zhang; Yaping Lin; Jie Wu; Ting Zhou
The e-healthcare cloud system has shown its potential to improve the quality of healthcare and individuals’ quality of life. Unfortunately, security and privacy impede its widespread deployment and application. There are several research works focusing on preserving the privacy of the electronic healthcare record (EHR) data. However, these works have two main limitations. First, they only support the
-
Web Service Interaction Modeling and Verification Using Recursive Composition Algebra IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2018-01-04 Gopal N. Rai; G. R. Gangadharan; Vineet Padmanabhan; Rajkumar Buyya
The design principle of composability among Web services is one of the most crucial reasons for the success and popularity of Web services. However, achieving error-free automatic Web service composition is still a challenge. In this paper, we propose a recursive composition based modeling and verification technique for Web service interaction. The application of recursive composition over a Web service
-
An Availability Analysis Approach for Deployment Configurations of Containers IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2018-01-01 Stefano Sebastio; Rahul Ghosh; Tridib Mukherjee
Operating system (OS) containers enabling the microservice-oriented architecture are becoming popular in the context of Cloud services. Containers provide the ability to create lightweight and portable runtime environments that decouple the application requirements from the characteristics of the underlying system. Services built on containers have a small resource footprint in terms of processing
-
OSPN: Optimal Service Provisioning with Negotiation for Bag-of-Tasks Applications IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-12-27 Xiaogang Wang; Jian Cao; Yang Xiang
Cloud service selection is becoming more complex with the arrival of a large number of cloud providers offering various service packages on the market. These cloud service packages are generally provisioned by Spot, On-demand and Reserved Instances. Typically, a user's service requirements contain many independent sub-tasks (Bag-of-Tasks), and have budget limitations and additional constraints. To
-
An Approximation Algorithm for Sharing-Aware Virtual Machine Revenue Maximization IEEE Trans. Serv. Comput. (IF 5.823) Pub Date : 2017-12-25 Safraz Rampersaud; Daniel Grosu
Cloud providers face the challenge of efficiently managing their infrastructure through minimizing resource consumption while allocating service requests such that their revenue is maximized. Solutions addressing this challenge should consider the sharing of memory pages among virtual machines (VMs) and the available capacity of each type of requested resources. We provide such solution by designing
Contents have been reproduced by permission of the publishers.