2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)

21-23 Aug. 2017

Filter Results

Displaying Results 1 - 25 of 62
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1845 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2017, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Message from Chairs

    Publication Year: 2017, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2017, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2017, Page(s):xiv - xix
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • Keynote

    Publication Year: 2017, Page(s): xx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (87 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Run Time Technique for Handling Error in User-Estimated Execution Times on Systems Processing MapReduce Jobs with Deadlines

    Publication Year: 2017, Page(s):1 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    Effective management of resources on a cloud or cluster is crucial for achieving the quality of service requirements of users, which are typically captured in service level agreements (SLAs). This paper focuses on improving the robustness of resource allocation and scheduling techniques that process an open stream of MapReduce jobs with SLAs, by introducing techniques to handle errors/inaccuracies... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effect of Workload Computational Demand Variability on the Performance of a SaaS Cloud with a Multi-tier SLA

    Publication Year: 2017, Page(s):10 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    In the highly competitive business environment of Software as a Service (SaaS) clouds, Quality of Service (QoS) and fair pricing are of paramount importance for differentiating between similar cloud providers. In such platforms, the workload computational demand variability may have a significant impact on the system performance and thus on the provider's Service Level Agreement (SLA) commitments.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Framed Slotted ALOHA with Reservation Packets for M2M Networks

    Publication Year: 2017, Page(s):18 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    In the near future, it is expected that a large number of machine-to-machine (M2M) communication devices will provide with ubiquitous information and services. Random access protocols like ALOHA ans CSMA have been considered for M2M networks for their simplicity of operation. This paper evaluates the performance of a Frame Slotted-ALOHA protocol that deploys reservation and data packets (FSA-RDP),... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intersection Dynamic VANET Routing Protocol for a Grid Scenario

    Publication Year: 2017, Page(s):25 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Vehicular Ad-Hoc NETworks (VANETs) have received considerable attention in recent years, due to its unique characteristics, which are different from Mobile Ad-Hoc NETworks (MANETs), such as rapid topology change, frequent link failure, and high vehicle mobility. The main drawback of VANETs network is the network instability, which yields to reduce the network efficiency. This paper proposes a nove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Markov-Based Prediction Model for Host Load Detection in Live VM Migration

    Publication Year: 2017, Page(s):32 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    Host load detection algorithm determines if a given host is overload or underloaded then the decision can be made to migrate VMs to achieve host/server consolidation and load balancing in cloud data centers while satisfying the QoS constraints. Presently, host load detection is a challenging problem in the cloud data center management specially with high dynamic environment for the host load. In t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Assignment in Federated Cloud Environments Based on Multi-objective Optimization of Security

    Publication Year: 2017, Page(s):39 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    Cloud federation allows interconnected Cloud Computing environments of different Cloud Service Providers (CSPs) to share their resources and deliver more efficient service performance. However, each CSP provides a different level of security in terms of cost and performance. Instead of consuming the whole set of Cloud services that are required to deploy an application through a single CSP, consum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

    Publication Year: 2017, Page(s):47 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (633 KB) | HTML iconHTML

    Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Adapt Authentication and Authorization Infrastructure of Applications for the Cloud

    Publication Year: 2017, Page(s):54 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (809 KB) | HTML iconHTML

    Migration of existing enterprise applications to the Cloud requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating the application with functional and non-functional aspects. However, none of them has focused so far on the adaptation of security and privacy. In our previous work, Identity-as-a-service (IDaaS) decouples Authentication an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensuring Information Security for Internet of Things

    Publication Year: 2017, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (606 KB) | HTML iconHTML

    The survey of related work in the very specialized field of information security (IS) ensurance for the Internet of Things (IoT) allowed us to work out a taxonomy of typical attacks against the IoT elements (with special attention to the IoT device protection). The key directions of countering these attacks were defined on this basis. According to the modern demand for the IoT big IS-related data ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study of Cultural Dimensions and Cybersecurity Development

    Publication Year: 2017, Page(s):70 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    The purpose of the present study is to empirically investigate whether national culture has an impact on cybersecurity development. We used methods of correlation and hierarchical regression to analyse two sets of indices; the global cybersecurity index of 2015 and Hofstede cultural dimension index. The research discovered that there exist a significant correlation between cybersecurity developmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technologies for a Thing-Centric Internet of Things

    Publication Year: 2017, Page(s):77 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    The Internet of Things (IoT) offers challenges that are being met by the convergence of multiple technologies, which have matured rapidly over the past decade. Broadband communication and mobile platforms enable raw data collection and its transmission to the cloud. Data science, e.g., deep learning, transforms large amounts of data from the Internet-connected sensors and personal devices in meani... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposal of Adaptive Data Rate Algorithm for LoRaWAN-Based Infrastructure

    Publication Year: 2017, Page(s):85 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    Low Power Wide Area Networks (LPWAN) are expected to interconnect a high number of simple and inexpensive devices. The ability to control transmission parameters including modulation scheme and output power, enables reduction of the deployment costs, improvement of the network reliability, in terms of error performance under suboptimal conditions, and could contribute to the reduction of the maint... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Efficient Design of a Pasture Sensor Network

    Publication Year: 2017, Page(s):91 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    The use of animals, specially ovines, for controlling infesting species in crops is an ancient method that has several advantages with respect to the use of chemical and/or mechanical techniques. Shepherds required to supervise animals, are getting increasingly less available and are costly. Over the last years, technologies for automatic animal supervision have been investigated, typically includ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IoT-based Real-Time Telemetry System Design: An Approach

    Publication Year: 2017, Page(s):99 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    In this work, telemetry system is proposed by using Internet of objects (IoT) paradigm. IoT has become widespread as a result of the increase in the number of addressable devices, especially with the transition of internet to IPv6. The downsizing of the sensing devices, the ability to operate with low energy on their own, and the ability to communicate can also have a positive impact on the develo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improve IoT/M2M Data Organization Based on Stream Patterns

    Publication Year: 2017, Page(s):105 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1390 KB) | HTML iconHTML

    The increasing number of small, cheap devices full of sensing capabilities lead to an untapped source of information that can be explored to improve and optimize several systems. Yet, as this number grows it becomes increasingly difficult to manage and organize all this new information. The lack of a standard context representation scheme is one of the main difficulties in this research area. With... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GreenCloudTax: A Flexible IaaS Tax Approach as Stimulus for Green Cloud Computing

    Publication Year: 2017, Page(s):112 - 119
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    Cloud computing is underpinned by huge datacenters which are considered as significant consumers of energy. Under the umbrella term GreenCloud the scientific community developed different architectures, algorithms and methods to improve energy efficiency of these datacenters. However, approaches which try to modify existing or applying new economical concepts to improve energy efficiency of datace... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.