SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
  • 2
    Yuan D, Yang Y, Liu X, Chen J. On-demand minimum cost benchmarking for intermediate datasets storage in scientific cloud workflow systems. Journal of Parallel and Distributed Computing 2011; 71(2): 316332.
  • 3
    Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Communications of the ACM 2010; 53(4): 5058.
  • 4
    Wang L, Zhan J, Shi W, Liang Y. In cloud, can scientific communities benefit from the economies of scale?. IEEE Transactions on Parallel and Distributed Systems 2012; 23(2): 296303.
  • 5
    Zissis D, Lekkas D. Addressing cloud computing security issues. Future Generation Computer Systems 2011; 28(3): 583592.
  • 6
    Bernd G, Tobias W, Elmar S. Understanding cloud computing vulnerabilities. IEEE Security and Privacy 2010; 9(2): 5057.
  • 7
    Lin H, Tzeng W. A secure erasure code-based cloud storage system with secure data forwarding. IEEE Transactions on Parallel and Distributed Systems 2012; 23(6): 9951003.
  • 8
    Cao N, Wang C, Li M, Ren K, Lou W. Privacy-preserving multi-keyword ranked search over encrypted cloud data. Proceedings of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM'11), April 2011. IEEE CS Press, Los Alamitos, CA, USA, Shanghai, China, 2011; 829837.
  • 9
    Zhang X, Liu C, Nepal S, Pandey S, Chen J. A privacy leakage upper-bound constraint based approach for cost-effective privacy preserving of intermediate datasets in cloud. IEEE Transactions on Parallel and Distributed Systems 2012; 24(6): 11921202.
  • 10
    Zhang X, Yang T, Liu C, Chen J. A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud. IEEE Transactions on Parallel and Distributed Systems, in press, accepted on 6 Feb. 2013.
  • 11
    Zhang X, Liu C, Nepal S, Chen J. An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. Journal of Computer and System Sciences 2012; 79(5): 542555.
  • 12
    Yang J, Lin W, Dou W. An adaptive service selection method for cross-cloud service composition. Concurrency and Computation: Practice and Experience 2013; 25(18): 24352454.
  • 13
    Khan K, Malluhi Q. Role of contextual properties in enterprise service migration to cloud computing. Concurrency and Computation: Practice and Experience 2013; 25(18): 24552470.
  • 14
    Mach W, Schikuta E. Towards an economic and energy aware cloud cost model. Concurrency and Computation: Practice and Experience 2013; 25(18): 24712487.
  • 15
    Pedersen J, Riaz MT, Júnior JC, Dubalski B, Ledzinski D, Patel A. Using latency as a QoS-indicator for global cloud computing services. Concurrency and Computation: Practice and Experience 2013; 25(18): 24882500.
  • 16
    McGough AS, Forshaw M, Gerrard C, Robinson P, Wheater S. Analysis of power-saving techniques over a large multi-use cluster with variable workload. Concurrency and Computation: Practice and Experience 2013; 25(18): 25012522.
  • 17
    Deng K, Ren K, Song J, Yuan D, Xiang Y, Chen J. A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing. Concurrency and Computation: Practice and Experience 2013; 25(18): 25232539.
  • 18
    Yang C, Liu J, Ranjan R, Shih W, Lin C. On construction of heuristic QoS bandwidth management in clouds. Concurrency and Computation: Practice and Experience 2013; 25(18): 25402560.
  • 19
    Zhang X, Liu C, Nepal S, Yang C, Dou W, Chen J. SaC-FRAPP: A scalable and cost-effective framework for privacy preservation over big data on cloud. Concurrency and Computation: Practice and Experience 2013; 25(18): 25612576.