Please use this identifier to cite or link to this item:
http://hdl.handle.net/10553/40198
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sendra, S. | en_US |
dc.contributor.author | Lacuesta, R. | en_US |
dc.contributor.author | Lloret, J. | en_US |
dc.contributor.author | Macías López, Elsa María | en_US |
dc.date.accessioned | 2018-06-07T13:18:13Z | - |
dc.date.available | 2018-06-07T13:18:13Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.issn | 1607-9264 | en_US |
dc.identifier.uri | http://hdl.handle.net/10553/40198 | - |
dc.description.abstract | Spontaneous ad hoc cloud computing networks let us perform complex tasks in a distributed manner by sharing computing resources. This kind of infrastructure is based on mobile devices with limited processing and storage capacity. Nodes with more processing capacity and energy in a spontaneous network store data or perform computing tasks in order to increase the whole computing and storage capacity. However, these networks can also present some problems of security and data vulnerability. In this paper, we present a secure spontaneous mobile ad hoc cloud computing network to make estimations using several information sources. The application is able to create users and manage encryption methods to protect the data sent through the network. The proposal has been simulated in several scenarios. The results show that the network performance depends mainly on the network size and nodes mobility. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | Journal of Internet Technology | en_US |
dc.source | Journal of Internet Technology [ISSN 1607-9264], v. 18 (7), p. 1485-1498 | en_US |
dc.subject | 3325 Tecnología de las telecomunicaciones | en_US |
dc.subject.other | Mobile Cloud Computing | en_US |
dc.subject.other | Secure Protocol | en_US |
dc.subject.other | Spontaneous Networks | en_US |
dc.title | A secure spontaneous mobile ad hoc cloud computing network | en_US |
dc.type | info:eu-repo/semantics/Article | es |
dc.type | Article | es |
dc.identifier.doi | 10.6138/JIT.2017.18.7.20141221 | |
dc.identifier.scopus | 85041839929 | |
dc.identifier.isi | 000423459000002 | - |
dc.contributor.authorscopusid | 35189596800 | |
dc.contributor.authorscopusid | 35092517700 | |
dc.contributor.authorscopusid | 23389476400 | |
dc.contributor.authorscopusid | 24825216400 | |
dc.description.lastpage | 1498 | - |
dc.identifier.issue | 7 | - |
dc.description.firstpage | 1485 | - |
dc.relation.volume | 18 | - |
dc.investigacion | Ingeniería y Arquitectura | en_US |
dc.type2 | Artículo | en_US |
dc.contributor.daisngid | 699951 | |
dc.contributor.daisngid | 1182340 | |
dc.contributor.daisngid | 59484 | |
dc.contributor.daisngid | 9973514 | |
dc.contributor.wosstandard | WOS:Sendra, S | |
dc.contributor.wosstandard | WOS:Lacuesta, R | |
dc.contributor.wosstandard | WOS:Lloret, J | |
dc.contributor.wosstandard | WOS:Macias-Lopez, E | |
dc.date.coverdate | Enero 2017 | |
dc.identifier.ulpgc | Sí | es |
dc.description.sjr | 0,329 | |
dc.description.jcr | 1,301 | |
dc.description.sjrq | Q2 | |
dc.description.jcrq | Q3 | |
dc.description.scie | SCIE | |
item.grantfulltext | none | - |
item.fulltext | Sin texto completo | - |
crisitem.author.dept | GIR IUCES: Arquitectura y Concurrencia | - |
crisitem.author.dept | IU de Cibernética, Empresa y Sociedad (IUCES) | - |
crisitem.author.dept | Departamento de Ingeniería Telemática | - |
crisitem.author.orcid | 0000-0002-9085-8398 | - |
crisitem.author.parentorg | IU de Cibernética, Empresa y Sociedad (IUCES) | - |
crisitem.author.fullName | Macías López, Elsa María | - |
Appears in Collections: | Artículos |
Items in accedaCRIS are protected by copyright, with all rights reserved, unless otherwise indicated.