Learn More
In this paper, we present a secure frame-work when the location information of mobile terminals is utilized in a cloud computing environment. Because cloud computing provides powerful storage capability and scalability, many application providers start migrating the data stored in their original databases to outsourced databases (ODB), such as(More)
For security concerns, a security traversal service can route data flows through a sequences of security devices (middleboxes). In this paper, we identify the problem of delay guarantee in security traversal and propose a scheme to dynamically change the security traversal path. To provide deterministic delay guarantee with minimum virtual machine (VM) and(More)
In this paper, we propose a sensors-assisted rescue service architecture to integrate rescue schemes for different purposes, including disaster prediction, evacuation planning, and emergency broadcast. In the proposed architecture, multiple-sensed mobile devices are designed to provide a personalized situational awareness, thereby further enhancing the(More)
Network coding is an important cloud storage technique, which can recover data with small repair bandwidth and high reliability compared to the existing erasure coding and replication methods. However, regardless of which data recovery technique is used, the repaired data in a geographically distributed cloud storage system are easy to be eavesdropped at(More)
Two experiments document effects of experienced outcome feedback on risk behavior in a repeated description-based decision task. In Study 1, participants were initially strongly risk-seeking in the loss domain, but became less so across 100 repeated trials with outcome feedback. No significant trend was observed for gain problems. Participants then(More)
To relieve the heavy loading caused by burst machine-to-machine (M2M) traffic and also satisfy various quality of service (QoS) requirements, load balancing techniques are often introduced in M2M networks. In recent years, software-defined networking (SDN) has shown the possibility of improving load balancing technique. In this paper, we propose(More)
In this paper, we develop a privacy preserving mechanism for a scheduling service for a group of users, which can compute the joint available time based on users' calendar information. We also propose a weighted voting game with partially homomorphic encryption (WVGPHE) scheme to protect the privacy of users' calendar information as well as users' weight.(More)
Communication networks such as cellular phone networks are quite likely to be severely damaged during a large-scale of disaster, making SOS message dissemination to rescue authorities extremely difficult. In this paper, we first propose a FM radio-based emergency communication service through the integration of FM transmitters into smartphones. FM radio(More)