
样式: 排序: IF: - GO 导出 标记为已读
-
LogKG: Log Failure Diagnosis Through Knowledge Graph IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-07-11 Yicheng Sui, Yuzhe Zhang, Jianjun Sun, Ting Xu, Shenglin Zhang, Zhengdan Li, Yongqian Sun, Fangrui Guo, Junyu Shen, Yuzhi Zhang, Dan Pei, Xiao Yang, Li Yu
Logs are one of the most valuable data to describe the running state of services. Failure diagnosis through logs is crucial for service reliability and security. The current automatic log failure diagnosis methods cannot fully use the multiple fields of logs, which fail to capture the relation between them. In this article, we propose LogKG, a new framework for diagnosing failures based on knowledge
-
ECFA: An Efficient Convergent Firefly Algorithm for Solving Task Scheduling Problems in Cloud-Edge Computing IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-07-10 Lu Yin, Jin Sun, Junlong Zhou, Zonghua Gu, Keqin Li
In cloud-edge computing paradigms, the integration of edge servers and task offloading mechanisms has posed new challenges to developing task scheduling strategies. This paper proposes an efficient convergent firefly algorithm (ECFA) for scheduling security-critical tasks onto edge servers and the cloud datacenter. The proposed ECFA uses a probability-based mapping operator to convert an individual
-
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-07-05 Jiani Li, Tao Wang, Bo Yang, Qiliang Yang, Wenzheng Zhang, Keyong Hong
Crowdsourcing for healthcare, which is an application of crowd intelligence, has become a novel and important auxiliary way for traditional healthcare, showing a huge application perspective. In a crowdsourcing platform for healthcare, patients can act as requesters who recruit workers, such as doctors, to provide professional advice by posting a task. However, privacy concerns pose a significant obstacle
-
mISO: Incentivizing Demand-Agnostic Microservices for Edge-Enabled IoT Networks IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-07-05 Amit Samanta, Quoc-Viet Pham, Nhu-Ngoc Dao, Ammar Muthanna, Sungrae Cho
The recent expansion of mobile IoT devices (MIoTDs) along with the exposure of many compute-intensive and latency-critical applications, have given a step rise to the mobile edge computing (MEC) platform to process computational microservices at the edge. The paramount importance of designing an effective incentive mechanism is a very important topic for such systems to get a fair amount of resources
-
Vehicle Parking Navigation Based on Edge Computing With Diffusion Model and Information Potential Field IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-30 Wei Wei, Qiao Ke, Adam Zielonka, Mariusz Pleszczyński, Marcin Woźniak
Based on sensor networks within a dynamic and real-time environment, a novel parking-lot navigation method is proposed based on diffusion equation and Poisson equation to achieve convenient and efficient navigation process with edge computing mind to aid information query and navigation. From the perspective of theoretical proof, is presented parallel method mainly for ordinary differential equations
-
Adaptive Observability for Forensic-Ready Microservice Systems IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-29 Davi Monteiro, Yijun Yu, Andrea Zisman, Bashar Nuseibeh
Microservice-based applications may include multiple instances of microservices running on containerised infrastructures. These infrastructures pose challenges to digital investigations of security incidents because digital evidence can be destroyed when containers are terminated. Observability techniques are used to facilitate the investigation of incidents in microservice systems. However, existing
-
Private Transaction Retrieval for Lightweight Bitcoin Clients IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-29 Yankai Xie, Qingtao Wang, Ruoyue Li, Chi Zhang, Lingbo Wei
Running a typical Bitcoin client (also called full node) needs more than 444 GB of disk space, considerable time, and computational resources to synchronize the entire blockchain, which is infeasible for resource-constrained devices. To address such concerns, the lightweight Bitcoin client proposed by Satoshi outsources most of computational and storage burdens to full nodes. Unfortunately, interacting
-
Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-28 Chao Lin, Xinyi Huang, Debiao He
Electronic Medical Records (EMRs) sharing enhances healthcare and biomedical discoveries but faces challenges: data provider centralization and limited interoperability. Blockchain can address these issues, but existing systems struggle with malicious EMR propagation due to challenges concerning the authenticity, non-repudiation, and integrity of the digital signatures they employ. Universal Designated
-
A Trajectory Prediction-Based and Dependency-Aware Container Migration for Mobile Edge Computing IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-27 Weiwen Zhang, Jinzhou Luo, Lei Chen, Jianqi Liu
Edge computing and container technologies offer more possibilities for the development of Internet of Vehicles (IOV). However, many studies have neglected the dependencies among containers and the mobility of users. In this article, we propose a container migration strategy based on trajectory prediction, with the consideration of dependencies among containers. Given a set of containers with dependencies
-
Identifying Users Across Social Media Networks for Interpretable Fine-Grained Neighborhood Matching by Adaptive GAT IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-26 Wei Tang, Haifeng Sun, Jingyu Wang, Cong Liu, Qi Qi, Jing Wang, Jianxin Liao
The primary concern of numerous online social media network (SMN) platforms is how to provide users with effective and personalized web services. To achieve this goal, SMN platforms typically begin by collecting user preferences based on user behaviors (e.g., browsing history, posts) or user profiles. However, the effective information about a specific user on a single SMN platform is limited and monotonous
-
MLog: Mogrifier LSTM-Based Log Anomaly Detection Approach Using Semantic Representation IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-26 Yuanyuan Fu, Kun Liang, Jian Xu
Streaming logs provide valuable information for complex systems in diagnosing system faults or conducting security analysis. Although the log sequence anomaly detection has drawn more and more attention and achieved a satisfactory performance, it remains an extremely difficult task because of several intrinsic challenges including new event occurrences in a continuously evolving environment, making
-
RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-26 Zhen Lv, Kaiyu Shang, Hongwei Huo, Ximeng Liu, Yanguo Peng, Xiangyu Wang, Yaorong Tan
Spatial keyword queries have attracted much attention over the past decade due to the popularity of location-based services and social networks, which brings great economic benefits. Geo-textual data are encrypted-and-delegated to public clouds for efficient management and utilization while preventing potential data leakage. However, it is still challenging to solve secure ra nge s patial k eyword
-
Web Service Recommendation via Integrating Heterogeneous Graph Attention Network Representation and FiBiNET Score Prediction IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-20 Buqing Cao, Mi Peng, Lulu Zhang, Yueying Qing, Bing Tang, Guosheng Kang, Jianxun Liu
The rapid growth in the number and diversity of Web service, coupled with the myriad of similar Web service in functionality, makes it challenging to find most suitable Web service for users to accelerate and accomplish Mashup development. Therefore, this article proposes a Web service recommendation method via integrating heterogeneous graph attention network representation and FiBiNET (Feature Importance
-
User-Driven Synthetic Dataset Generation With Quantifiable Differential Privacy IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-19 Bo-Chen Tai, Yao-Tung Tsou, Szu-Chuang Li, Yennun Huang, Pei-Yuan Tsai, Yu-Cheng Tsai
Recently, releasing data to a third party for secondary analysis has become a trend of service computing. However, data owners are concerned that such a move may expose individuals’ records, which is in violation of regulations such as the European Union's General Data Protection Regulation. Differential privacy has been proposed as a possible solution to the aforementioned problem. The privacy budget
-
Feynman: Federated Learning-Based Advertising for Ecosystems-Oriented Mobile Apps Recommendation IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-16 Jiang Bian, Jizhou Huang, Shilei Ji, Yuan Liao, Xuhong Li, Qingzhong Wang, Jingbo Zhou, Dejing Dou, Yaqing Wang, Haoyi Xiong
While recommender systems have been ubiquitously used in digital marketing and online business development, the conversions of online advertising for mobile apps installation and activation sometimes are far from satisfactory, due to the lack of feedback from App-related activities, leading to a poor record of Return on Investment (RoI). Though the advertisers, e.g., App operators and App Store, are
-
Securing Deep Learning as a Service Against Adaptive High Frequency Attacks With MMCAT IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-15 Bingbing Song, Ruxin Wang, Song Gao, Yunyun Dong, Ling Liu, Wei Zhou
Most cloud providers offer Deep Learning as a Service (DLaaS) for different business, science and engineering domains. However, it is known that deep neural networks (DNNs) are vulnerable to adversarial examples, which can cause well-trained DNN models to misbehave by injecting human-imperceptible perturbations to the query input data. Securing deep learning as a service becomes a critical challenge
-
A Cloud Broker for Executing Deadline-Constrained Periodic Scientific Workflows IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-06-09 Hoda Taheri, Saeid Abrishami, Mahmoud Naghibzadeh
Scheduling workflows in cloud environments is an important issue that many types of research have been conducted in this field. However, these approaches often focus on single workflow scheduling while the need for scheduling multiple workflows is growing. This study aims at presenting a cloud broker for executing Deadline-constrained Periodic scientific Workflows (BDPW). BDPW acts as a Workflow as
-
RuleDRL: Reliability-Aware SFC Provisioning With Bounded Approximations in Dynamic Environments IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-31 Yue Zeng, Zhihao Qu, Song Guo, Bin Tang, Baoliu Ye, Jing Li, Jie Zhang
As a key enabling technology for 5G, network function virtualization abstracts services into software-based service function chains (SFCs), facilitating mission-critical services with high-reliability requirements. However, it is challenging to cost-effectively provide reliable SFCs in dynamic environments due to delayed rewards caused by future SFC requests, limited infrastructure resources, and heterogeneity
-
A Solution to Blockchain Smart Contract Based Parametric Transport and Logistics Insurance IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-30 Hiren Dutta, Saurabh Nagesh, Jawahar Talluri, Parama Bhaumik
Traditional insurance policies pay the insurer according to the actual loss or damage to a tangible object that is insured. Due to the numerous parties involved, the settlement procedure is usually highly drawn out. Comparatively, parametric insurance protects a policyholder from the occurrence of a particular event by disbursing a predetermined sum dependent on the severity of the event. In the transportation
-
EthereumX: Improving Signature Security With Randomness Preprocessing Module IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-30 Peng Jiang, Fuchun Guo, Willy Susilo, Chao Lin, Jiaxi Hu, Zhen Zhao, Liehuang Zhu, Debiao He
Ethereum leverages ECDSA as the digital signature scheme to validate transactions. From the provable security standpoint, ECDSA built on an 80-bit security Elliptic Curve group can achieve at most 50-bit concrete security, rather than 80-bit security, due to its reduction loss for $2^{30}$ signature queries in security analysis. The state-of-the-art ECDSA scheme comes with no de facto formal security
-
Improving Next Location Recommendation Services With Spatial-Temporal Multi-Group Contrastive Learning IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-29 Zhixuan Jia, Yushun Fan, Jia Zhang, Chunyu Wei, Ruyu Yan, Xing Wu
Next location recommendation services play a pivotal role in Location-Based Social Networks (LBSNs) due to their ability to provide personalized recommendations of attractive destinations, resulting in substantial benefits for both users and service providers. Recent research indicates that these services are influenced by both sequential and geographical factors. However, we argue that most of these
-
Loader: A Log Anomaly Detector Based on Transformer IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-29 Tong Xiao, Zhe Quan, Zhi-Jie Wang, Yuquan Le, Yunfei Du, Xiangke Liao, Kenli Li, Keqin Li
Detecting anomalies in logs is crucial for service and system management, since logs are widely used to record the runtime status, and are often the only data available for postmortem analysis. Since anomalies are usually rare in real-world services and systems, a common and feasible practice is to mine or learn normal patterns from logs, and deem those violating the normal patterns as anomalies. As
-
Role-Based User Allocation Driven by Criticality in Edge Computing IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-29 Ensheng Liu, Liping Zheng, Qiang He, Phu Lai, Benzhu Xu, Gaofeng Zhang
Edge computing is a promising solution to enabling highly accessible resources and latency-sensitive services for nearby users. In public safety, it can provide critical support for urban crowd/hazard management services, such as real-time path planning, hazard warning, etc. In a crowd/hazard scenario, crowds can be allocated to nearby edge servers for obtaining real-time support, e.g., evacuation
-
Threshold Attribute-Based Credentials With Redactable Signature IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-29 Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng
Threshold attribute-based credentials are suitable for decentralized systems such as blockchains as such systems generally assume that authenticity, confidentiality, and availability can still be guaranteed in the presence of a threshold number of dishonest or faulty nodes. Coconut (NDSS’19) was the first selective disclosure attribute-based credentials scheme supporting threshold issuance. However
-
ChainDiscipline - Towards a Blockchain-IoT-Based Self-Sovereign Identity Management Framework IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-25 Marius Popa, Sebastian Michael Stoklossa, Somnath Mazumdar
In today's complex Internet platform, online users need help to protect their online identity. Only sometimes, websites are very transparent about how user data will be collected, stored and processed by them. Sometimes Internet entities collect more online user information than required. These entities often share user identity-related data with third parties without consent. Existing traditional
-
Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-25 Yifeng Zheng, Shuangqing Xu, Songlei Wang, Yansong Gao, Zhongyun Hua
Vertical federated learning (VFL) has recently emerged as an appealing distributed paradigm empowering multi-party collaboration for training high-quality models over vertically partitioned datasets. Gradient boosting has been popularly adopted in VFL, which builds an ensemble of weak learners (typically decision trees) to achieve promising prediction performance. Recently there have been growing interests
-
FaaSDeliver: Cost-Efficient and QoS-Aware Function Delivery in Computing Continuum IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-10 Guangba Yu, Pengfei Chen, Zibin Zheng, Jingrun Zhang, Xiaoyun Li, Zilong He
Serverless Function-as-a-Service (FaaS) is a rapidly growing computing paradigm in the cloud era. To provide rapid service response and save network bandwidth, traditional cloud-based FaaS platforms have been extended to the edge. However, launching functions in a heterogeneous computing continuum (HCC) that includes the cloud, fog, and the edge brings new challenges: determining where functions should
-
Service Recommendation Model Based on Trust and QoS for Social Internet of Things IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-10 Shaozhong Zhang, Dingkai Zhang, Yaohui Wu, Haidong Zhong
The Social Internet of Things (SIoT) is a novel network that integrates social relations among objects and facilitates the interconnection between humans and smart devices through the Internet of Things (IoT). However, with the growing number of users and their devices in SIoT, ensuring high quality of service (QoS) and trust relations among users poses significant challenges. Therefore, this article
-
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-05 Lulu Han, Weiqi Luo, Yaxi Yang, Anjia Yang, Rongxing Lu, Junzuo Lai, Yandong Zheng
The optimal location selection is one type of the location-based services (LBS) that aims to find the best location for a new facility from some candidate facilities given a set of existing facilities and a set of customers. Due to reliable and flexible cloud services, outsourcing such heavy-computation tasks has been a popular trend. However, since the cloud is not fully trusted, and the location
-
Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-05-03 Suhui Liu, Liquan Chen, Ge Wu, Huaqun Wang, Hongtao Yu
Patient-centered data management and sharing of personal health records (PHRs) are difficult to be realized as data is controlled by doctors/hospitals. In addition, security and privacy, oppressive costs, search and tracing unreliability, and complicated access authorization caused by traditional encryption severely hinder the widespread adoption of PHRs. To overcome these challenges, we propose a
-
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-27 Sourav Kanti Addya, Anurag Satpathy, Bishakh Chandra Ghosh, Sandip Chakraborty, Soumya K. Ghosh, Sajal K. Das
Virtual machine (VM) migration enables cloud service providers (CSPs) to balance workload, perform zero-downtime maintenance, and reduce applications’ power consumption and response time. Migrating a VM consumes energy at the source, destination, and backbone networks, i.e., intermediate routers and switches, especially in a Geo-distributed setting. In this context, we propose a VM migration model
-
Brain: Log Parsing With Bidirectional Parallel Tree IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-26 Siyu Yu, Pinjia He, Ningjiang Chen, Yifan Wu
Automated log analysis can facilitate failure diagnosis for developers and operators using a large volume of logs. Log parsing is a prerequisite step for automated log analysis, which parses semi-structured logs into structured logs. However, existing parsers are difficult to apply to software-intensive systems, due to their unstable parsing accuracy on various software. Although neural network-based
-
Towards Fully Anonymous Integrity Checking and Reliability Authentication for Cloud Data Sharing IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-26 Ran Ding, Yan Xu, Hong Zhong, Jie Cui, Kewei Sha
Cloud storage services improve the efficiency and popularity of data sharing. These services allow groups of participants to jointly maintain the shared data. As important security properties of cloud data sharing, the integrity and the reliability of the shared data have been studied recently. However, the existing research cannot sufficiently solve the issue of participant identity anonymity in the
-
Graph-Represented Computation-Intensive Task Scheduling Over Air-Ground Integrated Vehicular Networks IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-25 Minghui Liwang, Zhibin Gao, Seyyedali Hosseinalipour, Yuhan Su, Xianbin Wang, Huaiyu Dai
This article investigates vehicular cloud (VC)-assisted task scheduling in an air-ground integrated vehicular network (AGVN), where tasks carried by unmanned aerial vehicles (UAVs) and resources of VCs are both modeled as graph structures. We consider a scenario in which resource-limited UAVs carry a set of computation-intensive graph tasks, which are offloaded to resource-abundant vehicles for processing
-
Hierarchical Reinforcement Learning for Conversational Recommendation With Knowledge Graph Reasoning and Heterogeneous Questions IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-24 Yao-Chun Yang, Chiao-Ting Chen, Tzu-Yu Lu, Szu-Hao Huang
User interaction history with items is used to infer user preferences in conventional recommendation systems. Among these, conversational recommendation systems (CRSs), which provide effective recommendations based on a framework combining recommendations and conversations with users, have been proposed. However, existing CRS model still have some shortcomings, such as the lack of using dialogue records
-
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-20 Jiangjiang Zhang, Bei Gong, Muhammad Waqas, Shanshan Tu, Zhu Han
Mobile edge computing (MEC) is an effective computing tool to cope with the explosive growth of data traffic. It plays a vital role in improving the quality of service for user task computing. However, the existing solutions rarely address all the significant factors that impact the quality of service. To challenge this problem, a trusted many-objective model is built by comprehensively considering
-
Unified Implementation and Simplification for Task-Based Authorization Security in Workflows IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-20 Wenjing Zhong, Jinjing Zhao, Hesuan Hu
Authorization-related security requirements are of great significance in workflow management systems. Existing studies are restricted in their scopes of research. There is no unified principle for their implementation. In this paper, we focus on the unification of authorization-related security requirements using Petri nets (PNs). These security requirements are expressed by constraints, being imposed
-
SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-17 E Chen, Shengdian Wang, Yuqing Fan, Yan Zhu, Stephen S. Yau
Usage-based pricing or Pay-as-You-Go is a relatively new SaaS business model that may provide customers the option to pay for only what they use. Yet, it is more challenging to implement than traditional Pay-before-Use subscriptions considering that it need not only realize financial payment on consumption-based behaviors, but also regulate the rights and obligations among the providers, consumers
-
GASF-IPP: Detection and Mitigation of LDoS Attack in SDN IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-13 Dan Tang, Siyuan Wang, Boru Liu, Wenqiang Jin, Jiliang Zhang
Software defined networking (SDN), a highly regarded architecture, enhances the programmability and manageability of the network by decoupling the data plane and the control plane. It has emerged to bring more possibilities to the Internet, but at the same time, its inherent shortcomings have become a pool for malicious attackers. Low-rate denial of service (LDoS) attacks, a variant of denial of service
-
Metric Learning as a Service With Covariance Embedding IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-12 Imam Mustafa Kamal, Hyerim Bae, Ling Liu
Metric learning as a service (MLaaS) represents one of the main learning streams to handle complex datasets in service computing research communities and industries. A common approach for dealing with high-dimensional and complex datasets is employing a feature embedding algorithm to compress data through dimension reduction while optimizing intra-class distance. To create generalizable MLaaS for high-performance
-
A Load Balancing Algorithm for Equalising Latency Across Fog or Edge Computing Nodes IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-10 Gabriele Proietti Mattia, Antonio Pietrabissa, Roberto Beraldi
When dealing with distributed applications in Edge or Fog computing environments, the service latency that the user experiences at a given node can be considered an indicator of how much the node itself is loaded with respect to the others. Indeed, only considering the average CPU time or the RAM utilisation, for example, does not give a clear depiction of the load situation because these parameters
-
Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-06 Qinlong Huang, Qinglin Wei, Guanyu Yan, Lin Zou, Yixian Yang
Currently, various encryption techniques have been employed to protect the documents in cloud storage. In particular, attribute-based keyword search (ABKS) is a practical encryption primitive that can realize fine-grained access control and keyword based searching over encrypted documents. However, the search time in most of the existing ABKS schemes increases linearly with the size of document collection
-
A QoS-Aware Clustering Based Multi-Layer Model for Web Service Selection IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-05 Lalit Purohit, Santosh Singh Rathore, Sandeep Kumar
The rapid proliferation of new web services over the last decade has led to an increase in functionally identical services, making the service selection system more challenging. In this work, we propose a web service selection model consisting of two layers, which we call CPSky. The upper layer, called the Prefilter layer, filters and allows only potent services to participate in the selection process
-
Egalitarian Transient Service Composition in Crowdsourced IoT Environment IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-05 Swasti Khurana, Novarun Deb, Sajib Mistry, Aditya Ghose, Aneesh Krishna, Hoa Khanh Dam
The Crowdsourced IoT Service (CIS) market is inherently different from other service markets, e.g., web services and cloud. The CIS market is dominated by transient services as both consumers and providers are dynamic in space and time. Consumer requests are usually long-term and demand continuity in service provision. We propose a novel egalitarian transient service composition framework from the
-
SecBerg: Secure and Practical Iceberg Queries in Cloud IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-04-05 Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao
Secure queries are fundamental to data security, particularly in cloud databases. In data analytics, one of the common and practical queries is the iceberg query that can find aggregate values above a specified threshold. However, existing secure aggregate query schemes: 1) are unable to support secure iceberg queries equipped with the HAVING clause; 2) only consider additive aggregate functions; and
-
A Lightweight Dynamic Storage Algorithm With Adaptive Encoding for Energy Internet IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-30 Song Deng, Yujia Zhai, Di Wu, Dong Yue, Xiong Fu, Yi He
Reliable data storage is crucial to the production, transmission, transaction, consumption, and analysis of an Energy Internet (EI). Whereas mainstream distributed data storage seems to be a plausible solution, the existing methods suffer from a tradeoff between the storage overhead (incurred by the replicas of data encodings for lossless recovery) and the communication latency (due to the spiking
-
GRASPED: A GRU-AE Network Based Multi-Perspective Business Process Anomaly Detection Model IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-30 Wei Guan, Jian Cao, Yang Gu, Shiyou Qian
In process-aware information systems (PAISs), anomalies are ubiquitous, having a number of different underlying causes, such as software malfunctions or operator errors. The presence of anomalies not only has an enormous impact on the economic well-being of the business, but also interferes with our ability to mine useful information from event logs. In this article, we propose GRASPED, a GR U- A E
-
Dual-Objective Personalized Federated Service System With Partially-Labeled Data Over Wireless Networks IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-30 Cheng-Wei Ching, Jia-Ming Chang, Jian-Jhih Kuo, Chih-Yu Wang
Federated learning (FL) emerges to mitigate the privacy concerns in machine learning-based services and applications, and personalized federated learning (PFL) evolves to alleviate the issue of data heterogeneity. However, FL and PFL usually rest on two assumptions: the users’ data is well-labeled, or the personalized goals align with sufficient local data. Unfortunately, the two assumptions may not
-
Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-29 Wenjing Gao, Jia Yu
With the widespread deployment of secure outsourcing computation, the resource-constrained client can delegate intensive computation tasks to powerful servers. Matrix determinant computation is a fundamental mathematical operation that has been widely used in IoT applications. This operation is computationally expensive. Nevertheless, the existing secure outsourcing protocols for matrix determinant
-
Secure Replication-Based Outsourced Computation Using Smart Contracts IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-29 Willy Susilo, Fuchun Guo, Zhen Zhao, Yinhao Jiang, Chunpeng Ge
The replication-Based Outsourced Computation (RBOC) mechanism allows a client to outsource the same computing job to multiple contractors and the honest contractors will get paid in the incentivized system based on the fact that a majority of contractors will honestly perform the computation. As self-executing contracts, smart contracts are utilized in the decentralized blockchain networks to execute
-
Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-28 Teng Li, Jiawei Zhang, Yulong Shen, Jianfeng Ma
With the development of Industrial Internet of Things (IIoT) and 5G, massive data are easily collected and transmitted in cloud. Therefore, it is critical to guarantee the security of data sharing. In IIoT applications, the users of a group are in hierarchical structure and they intend to access data by external groups, which requires fine-grained access control, data authenticity and data retrieval
-
CompCube: A Space-Time-Request Resource Trading Framework for Edge-Cloud Service Market IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-24 Xiaoxu Ren, Chao Qiu, Zheyuan Chen, Xiaofei Wang, Dusit Niyato, Wenyu Wang
As the footing stone of artificial intelligence (AI), ubiquitous computing resource is beginning to receive interest. With this trend, a new form of edge-cloud service market dedicated to collecting, trading, and scheduling computing resources is rising. The computing participants in the service market, as providers and demanders of computing resources, are becoming more diversified and open. As such
-
SCAFE: A Service-Centered Cloud-Native Workflow Engine Architecture IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-21 Zhijun Ding, Yuanyuan Zhou, Shuaijun Wang, Changjun Jiang
With the rapid development of manufacturing and cloud computing, more and more emerged cloud services provide a promising way to perform complex requirements efficiently. Workflow offers an effective way to assemble disparate services and interacts with them to construct business logic for user requests. Meanwhile, workflow engines are responsible for the control of workflow execution. However, existing
-
Towards Efficient and Privacy-Preserving High-Dimensional Range Query in Cloud IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-21 Lili Sun, Yonggang Zhang, Yandong Zheng, Weiyu Song, Rongxing Lu
The Internet of Things (IoT) boom has enabled Internet Service Providers (ISPs) to collect an enormous amount of high-dimensional data. Performing range queries on such data can effectively reuse them to help ISPs offer better services. Owing to the low cost and high resource utilization of cloud computing, an increasing number of ISPs are inclined to outsource data and services to it. However, as
-
A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-20 Yang Yang, Ming Cheng, Yingqiu Ding, Weiming Zhang
With the popularity of social networks and the increase of cloud platform applications, service computing has also developed. Therefore, the protection of information even privacy uploaded to the cloud server has become critical. Recently, some researchers have proposed encryption schemes of visual meaningful image by using compressive sensing. However, these schemes generally cannot hide the large-size
-
Cost-Effective, Quality-Oriented Transcoding of Live-Streamed Video on Edge-Servers IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-17 Dayoung Lee, Younghyun Kim, Minseok Song
Live-streaming video requires a lot of CPU-intensive transcoding so that viewers can receive video at bitrates appropriate to their devices and network conditions, which is necessary for a good quality of experience (QoE). We allocate transcoding tasks to edge-servers in a multiple-access edge-computing (MEC) architecture, taking into account server capacity, wireless network coverage, and the cost
-
Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-16 Hang Xu, Chingfang Hsu, Lein Harn, Janqun Cui, Zhuo Zhao, Ze Zhang
With the increasing popularity and wide application of the Internet, the users (such as managers and data consumers) in the Industrial Internet of Things (IIoT) can remotely analyze and control real-time data collected by various smart sensor devices. However, there are many security and privacy issues in the process of transmitting collected data through public channels in IIoT environment. In order
-
On Efficient Processing of Queries for Live Multi-Streaming Soiree Organization IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-13 C. P. Kankeu Fotsing, Chih-Ya Shen, Liang-Hao Huang, Yi-Shin Chen, Wang-Chien Lee, De-Nian Yang
Real-time social interactions and multi-streaming are two critical features of live streaming services . In this paper, we formulate a new fundamental service query, Social-aware Diverse and Preferred Organization Query (SDSQ) , that jointly selects a set of diverse and preferred live streaming channels and a group of socially tight viewers for organization of a live multi-streaming soiree. We prove
-
Genetic Programming for Dynamic Workflow Scheduling in Fog Computing IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-08 Meng Xu, Yi Mei, Shiqiang Zhu, Beibei Zhang, Tian Xiang, Fangfang Zhang, Mengjie Zhang
D ynamic W orkflow S cheduling in F og C omputing (DWSFC) is an important optimisation problem with many real-world applications. The current workflow scheduling problems only consider cloud servers but ignore the roles of mobile devices and edge servers. Some applications need to consider the mobile devices, edge, and cloud servers simultaneously, making them work together to generate an effective
-
Towards Proactive Risk-Aware Cloud Cost Optimization Leveraging Transient Resources IEEE Trans. Serv. Comput. (IF 8.1) Pub Date : 2023-03-07 Mohan Baruwal Chhetri, Abdur Rahim Mohammad Forkan, Quoc Bao Vo, Surya Nepal, Ryszard Kowalczyk
Low-cost transient resources such as Amazon's Elastic Compute Cloud (EC2) Spot instances can be opportunistically leveraged to reduce the ongoing costs of cloud applications. However, they are susceptible to unilateral revocations by the vendor making them a risky proposition for long-running applications with strict performance requirements. It is challenging to effectively balance the cost savings