Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2016 IEEE International Conference on Smart Cloud (SmartCloud)

18-20 Nov. 2016

Filter Results

Displaying Results 1 - 25 of 62
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (5495 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2016, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2016, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Committee Members

    Publication Year: 2016, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2016, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • A Study of a Framework for Experimental Games with Sensors in IoT

    Publication Year: 2016, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Extending the current Internet with interconnected objects and devices and their virtual representation has been a growing trend in recent years. This will be supported challenges in a large of aspects such as smart health, green energy, smart home and personalized applications. So, the IoT plays more and more important issue in lifestyle. In this paper, we discussed what to consider when planning... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication

    Publication Year: 2016, Page(s):5 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and telecommunication data centers are replaced by cloud computing environments hosting dynamic, mobile workloads. Traditional data center security best practices involving network segmentation are not well suited to these new environments. We discuss a novel network architecture which enables an explicit zero tru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unified, Multi-level Intrusion Detection in Private Cloud Infrastructures

    Publication Year: 2016, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Traditional network firewalls and intrusion detection systems (IDSs) are typically relied upon as the primary defense against unauthorized access in private clouds. While certainly important, we argue traditional approaches to intrusion detection are insufficient for private clouds-by ignoring application-and cloud-specific mechanisms and network traffic, traditional IDSs can either notice too lat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accuracy Comparison Between GPS and BeiDou2/Compass of Dynamic Differential Positioning in the Experiment of Air-Gun in Reservoir

    Publication Year: 2016, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    The next few years promises drastic improvements to global navigation satellite systems. The USA is modernizing GPS, Russia is GLONASS, Europe is moving ahead with its own Galileo System, and China is expanding its BeiDou-1 system from a regional navigation system to a full constellation global navigation satellite system known as BeiDou-2/Compass. Chinese BeiDou satellite navigation system conste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges and Opportunities in Edge Computing

    Publication Year: 2016, Page(s):20 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Many cloud-based applications employ a data centers as a central server to process data that is generated by edge devices, such as smartphones, tablets and wearables. This model places ever increasing demands on communication and computational infrastructure with inevitable adverse effect on Quality-of-Service and Experience. The concept of Edge Computing is predicated on moving some of this compu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Disintegration Protocol: An Ultimate Technique for Cloud Data Security

    Publication Year: 2016, Page(s):27 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (742 KB) | HTML iconHTML

    There has been an accelerating trend in outsourcing data to Cloud Service Providers (CSPs) who offer huge storage space for a little cost. Once data goes into the cloud, owners lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. These worries security and restrict the use of cloud services not so much malleable. In this paper, we also propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework to Secure the Virtual Machine Image in Cloud Computing

    Publication Year: 2016, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Cloud computing which uses outsourcing and remote processing of applications first appeared about ten years ago. Cloud Computing built on research in virtualization, distributed computing, utility computing, and web services. It reduces the information technology overhead for starting a new business and it can be accessed from anywhere. One of the concepts used for constructing cloud computing is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Detection and Transmission of Abnormalities in ECG via Bluetooth

    Publication Year: 2016, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    Technology plays the major role in healthcare not only for sensory devices but also in data transfer accordingly and displaying it. Networked sensors, either worn on the body or embedded in our living environment, makes it possible for gathering rich information indicative of our physical and mental health in a smart approach. In this paper the Arduino based microcontroller is used as a gateway to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NUBOMEDIA: An Elastic PaaS Enabling the Convergence of Real-Time and Big Data Multimedia

    Publication Year: 2016, Page(s):45 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (906 KB) | HTML iconHTML

    The increasing acceptance of Network Function Virtualization (NFV) and Software Defined Networks (SDN) paradigms is enabling the creation of cloud technologies combining Real-Time multimedia Communications (RTC) and multimedia processing for big data. Although many vendors already provide solutions in these areas, none of them comprises a single platform for end-to-end service provisioning and dep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CACROS: A Context-Aware Cloud Content Roaming Service

    Publication Year: 2016, Page(s):57 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1039 KB) | HTML iconHTML

    Cloud computing has emerged as the primary and popular computing paradigm recently. Since cloud users move continuously, sustaining the required quality of service (QoS) in a cost effective manner is very challenging. For maintaining the required QoS for a moving user, the current cloud systems use some of the existing service replication or/and migration strategies. However, those policies become... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Enhancement via Cloud Cascade Control Based Sub-Image-Clipped Histogram Equalization

    Publication Year: 2016, Page(s):69 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4112 KB) | HTML iconHTML

    Histogram-Based image enhancement techniques attempts to divide the histogram vertically and horizontally to overcome the saturation effect of intensities and over-enhancement. The proposed cloud-based method makes an effort to modify a classic histogram-based image enhancement by concept of cascade control. Two control loops check the quality of the output image by an inner and outer feedback sig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Technique to Enhance Low Resolution CT and Magnetic Resonance Images in Cloud

    Publication Year: 2016, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1608 KB) | HTML iconHTML

    Image analysis plays a crucial role in the field of medicine, as the analysis guides the radiologist towards perfect diagnosis and treatment planning. This paper presents a novel method to enhance computerized tomography (CT) and magnetic resonance (MR) images. The proposed algorithm uses three techniques, namely, Domain Transform, Shape-adaptive edge enhancement, and Adaptive histogram equalizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Stage Fault Analysis against a Falsification Detection Cipher Minalpher

    Publication Year: 2016, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    Regarding security measures, several falsification detection ciphers have been proposed. On the other hand, a thread of fault analysis against cryptographic circuits has been noted. Fault analysis attacks use the characteristics of a circuit that is incorporated into the device, generate a fault, analyze internal information of the circuit from its output, and obtain secret keys. Therefore, to ens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linger Thermo Theory: Simplifying the Finding of the Entropy of Mediums with Applications that Span from Astrophysics to Human Lifespan

    Publication Year: 2016, Page(s):85 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1583 KB) | HTML iconHTML

    A new, simple, method is revealed to yield the entropy of mediums such as a black-hole, a photon gas, and a flexible phase. These mediums span the scale of application from astrophysics to the derivation of lifespan bounds for organisms. The offered scheme surfaced through linger thermo theory (LTT), a novel, powerful, and emergent theory of thermal physics that integrates thermodynamics with its ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing Cloud Containers Using Quantum Networking Channels

    Publication Year: 2016, Page(s):103 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB) | HTML iconHTML

    While all cloud based platforms possess security vulnerabilities, the additional security challenges with container systems stem from the sharing of Host OS among independent containers. If a malicious application was to break into the root of container Daemon, it could gain root access into the host kernel thereby compromising the entire system. It could create Denial-Of-Service attack for other ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Control Model for Ambient Intelligent Services in Cloud Computing

    Publication Year: 2016, Page(s):112 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Ambient intelligent services often need to be executed at computing devices whose computational resources are limited. To solve this problem, such services intensive tasks should be offloaded to cloud computing. However, there is a gap between access control models in ambient intelligent services and cloud computing, where the former tends to be context-dependent and the latter to be subject-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.