<p>This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. <p>The 47 papers presented in this volume were carefully reviewed and selecte
Cloud Computing, Security, Privacy in New Computing Environments: 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings
✍ Scribed by Jiafu Wan et al. (eds.)
- Publisher
- Springer International Publishing
- Year
- 2018
- Tongue
- English
- Leaves
- 250
- Series
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 197
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016.The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments.
✦ Table of Contents
Front Matter ....Pages I-XIV
Front Matter ....Pages 1-1
Software Defined Network Routing in Wireless Sensor Network (Junfeng Wang, Ping Zhai, Yin Zhang, Lei Shi, Gaoxiang Wu, Xiaobo Shi et al.)....Pages 3-11
Efficient Graph Mining on Heterogeneous Platforms in the Cloud (Tao Zhang, Weiqin Tong, Wenfeng Shen, Junjie Peng, Zhihua Niu)....Pages 12-21
Correlation-Aware Virtual Machine Placement in Data Center Networks (Tao Chen, Yaoming Zhu, Xiaofeng Gao, Linghe Kong, Guihai Chen, Yongjian Wang)....Pages 22-32
Connectivity-Aware Virtual Machine Placement in 60 GHz Wireless Cloud Centers (Linghe Kong, Linsheng Ye, Bowen Wang, Xiaofeng Gao, Fan Wu, Guihai Chen et al.)....Pages 33-43
Ethical Trust in Cloud Computing Using Fuzzy Logic (Ankita Sharma, Hema Banati)....Pages 44-55
Answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users (Qian Wang, Lei Su, Yiyang Li, Junhui Liu)....Pages 56-65
Mobile Cloud Platform: Architecture, Deployment and Big Data Applications (Mengchen Liu, Kai Lin, Jun Yang, Dengming Xiao, Yiming Miao, Lu Wang et al.)....Pages 66-80
Research on Algorithm and Model of Hand Gestures Recognition Based on HMM (Junhui Liu, Yun Liao, Zhenli He, Yu Yang)....Pages 81-90
Question Recommendation Based on User Model in CQA (Junfeng Wang, Lei Su, Jun Chen, Di Jiang)....Pages 91-101
Data Storage Protection of Community Medical Internet of Things (Ziyang Zhang, Fulong Chen, Heping Ye, Junru Zhu, Cheng Zhang, Chao Liu)....Pages 102-110
Front Matter ....Pages 111-111
Generalized Format-Preserving Encryption for Character Data (Yanyu Huang, Bo Li, Shuang Liang, Haoyu Ma, Zheli Liu)....Pages 113-122
Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System (Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu)....Pages 123-132
Ring Signature Scheme from Multilinear Maps in the Standard Model (Hong-zhang Han)....Pages 133-144
A Revocable Outsourcing Attribute-Based Encryption Scheme (Zoe L. Jiang, Ruoqing Zhang, Zechao Liu, S. M. Yiu, Lucas C. K. Hui, Xuan Wang et al.)....Pages 145-161
Operational-Behavior Auditing in Cloud Storage (Zhaoyi Chen, Hui Tian, Jing Lu, Yiqiao Cai, Tian Wang, Yonghong Chen)....Pages 162-172
Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud (Lanxiang Chen, Nan Zhang)....Pages 173-183
Secure Searchable Public-Key Encryption for Cloud Storage (Run Xie, Changlian He, Yu He, Chunxiang Xu, Kun Liu)....Pages 184-195
Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images (Hao Zhang, Zhaoxia Yin, Xinpeng Zhang, Jianpeng Chen, Ruonan Wang, Bin Luo)....Pages 196-203
Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks (Run-hua Shi, Shun Zhang)....Pages 204-215
DMSD-FPE: Data Masking System for Database Based on Format-Preserving Encryption (Mingming Zhang, Guiyang Xie, Shimeng Wei, Pu Song, Zhonghao Guo, Zheli Liu et al.)....Pages 216-226
Delay-Tolerant Network Based Secure Transmission System Design (Gang Ming, Zhenxiang Chen)....Pages 227-231
An Internal Waves Detection Method Based on PCANet for Images Captured from UAV (Qinghong Dong, Shengke Wang, Muwei Jian, Yujuan Sun, Junyu Dong)....Pages 232-237
Back Matter ....Pages 239-240
✦ Subjects
Computer Communication Networks
📜 SIMILAR VOLUMES
<p>This book constitutes the refereed proceedings of the 9th International Conference on on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016.<br>The 40 papers presented in this volume were carefully reviewed and sele
<p>This book constitutes the refereed conference proceedings of the 12<sup>th</sup> International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016.<p> The 32 revised full papers and 18 poster papers were carefully reviewed and
<p>This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. <p>The total of 75 papers presented in this
<p><p>This book constitutes the refereed proceedings of the 2<sup>nd</sup> EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019, held in Tianjin, China, in April 2019. The 62 full papers were selected from 112 submissions and are grouped into topics on priva
<p><p>This book constitutes the proceedings of the 16th International Conference on Service-Oriented Computing, ICSOC 2018, held in Hangzhou, China, in November 2018.</p><p>The 63 full papers presented together with 3 keynotes in this volume were carefully reviewed and selected from numerous submiss