data caching
Recently Published Documents


TOTAL DOCUMENTS

224
(FIVE YEARS 65)

H-INDEX

15
(FIVE YEARS 4)

2021 ◽  
Author(s):  
Ying Liu ◽  
Yuzheng Han ◽  
Ao Zhang ◽  
Xiaoyu Xia ◽  
Feifei Chen ◽  
...  
Keyword(s):  

Author(s):  
Xiaoyu Xia ◽  
Feifei Chen ◽  
John Grundy ◽  
Mohamed Abdelrazek ◽  
Hai Jin ◽  
...  

Author(s):  
Ashraf Ahmed Fadelelmoula

This article presents a new comprehensive approach to realize a sufficient trade-off between the CAP properties (i.e., consistency, availability, and partition tolerance) in the large-scale pervasive information systems. To achieve these critical properties, the capabilities of both cloud computing and web services were exploited in developing the components of the proposed approach. These components include a cloud-based replication architecture for ensuring high data availability and achieving partition tolerance, a web services-based middleware for maintaining the eventual consistency, and a data caching scheme to enable the mobile computing elements to conduct  update transactions during the disconnection periods.  The evaluation of the performance aspects revealed that the proposed approach is able to achieve a load balance, lower propagation delay, and higher cache hit ratio, as compared to other baseline approaches.


Author(s):  
Xinxin Han ◽  
Guichen Gao ◽  
Yang Wang ◽  
Hing‐Fung Ting ◽  
Ilsun You ◽  
...  

Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2021 ◽  
Vol 11 (13) ◽  
pp. 5802
Author(s):  
Tian Liu ◽  
Wenhao Fan ◽  
Fan Wu ◽  
Wei Xie ◽  
Wen Yuan

Mobile terminal applications with high computing complexity and high time delay sensitivity are developing quite fast today, which aggravates the load of mobile cloud computing and storage and further leads to network congestion and service quality decline. Mobile edge computing (MEC) is a way of breaking through the limits of computing and storage resources of mobile cloud and alleviating the load of mobile cloud. Computing time costs and transmission time costs are considered to be the main issues for the mobile cloud when carrying out computing offloading and data caching. Therefore, an efficient resource management strategy, which could minimize the system delay, is proposed in this paper. The new scheme offloads reasonably computing tasks and caches the tasks’ data from the mobile cloud to mobile edge computing-enabled base stations. An intelligence algorithm, genetic algorithm, is being used to solve the global optimization problem which would cause transmission delay and computing resources occupation, and to determine the computing offloading and data caching probability. The simulation of the system using MATLAB is conducted in 8 different scenarios with different parameters. The results show that our new scheme improves the system computing speed and optimizes the user experience in all scenarios, compared with the scheme without data caching and the scheme without computing offloading and data caching.


Author(s):  
Yang Wang ◽  
Yong Zhang ◽  
Xinxin Han ◽  
Pengfei Wang ◽  
Chengzhong Xu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document