Please use this identifier to cite or link to this item: http://hdl.handle.net/10553/40198
DC FieldValueLanguage
dc.contributor.authorSendra, S.en_US
dc.contributor.authorLacuesta, R.en_US
dc.contributor.authorLloret, J.en_US
dc.contributor.authorMacías López, Elsa Maríaen_US
dc.date.accessioned2018-06-07T13:18:13Z-
dc.date.available2018-06-07T13:18:13Z-
dc.date.issued2017en_US
dc.identifier.issn1607-9264en_US
dc.identifier.urihttp://hdl.handle.net/10553/40198-
dc.description.abstractSpontaneous ad hoc cloud computing networks let us perform complex tasks in a distributed manner by sharing computing resources. This kind of infrastructure is based on mobile devices with limited processing and storage capacity. Nodes with more processing capacity and energy in a spontaneous network store data or perform computing tasks in order to increase the whole computing and storage capacity. However, these networks can also present some problems of security and data vulnerability. In this paper, we present a secure spontaneous mobile ad hoc cloud computing network to make estimations using several information sources. The application is able to create users and manage encryption methods to protect the data sent through the network. The proposal has been simulated in several scenarios. The results show that the network performance depends mainly on the network size and nodes mobility.en_US
dc.languageengen_US
dc.relation.ispartofJournal of Internet Technologyen_US
dc.sourceJournal of Internet Technology [ISSN 1607-9264], v. 18 (7), p. 1485-1498en_US
dc.subject3325 Tecnología de las telecomunicacionesen_US
dc.subject.otherMobile Cloud Computingen_US
dc.subject.otherSecure Protocolen_US
dc.subject.otherSpontaneous Networksen_US
dc.titleA secure spontaneous mobile ad hoc cloud computing networken_US
dc.typeinfo:eu-repo/semantics/Articlees
dc.typeArticlees
dc.identifier.doi10.6138/JIT.2017.18.7.20141221
dc.identifier.scopus85041839929
dc.identifier.isi000423459000002-
dc.contributor.authorscopusid35189596800
dc.contributor.authorscopusid35092517700
dc.contributor.authorscopusid23389476400
dc.contributor.authorscopusid24825216400
dc.description.lastpage1498-
dc.identifier.issue7-
dc.description.firstpage1485-
dc.relation.volume18-
dc.investigacionIngeniería y Arquitecturaen_US
dc.type2Artículoen_US
dc.contributor.daisngid699951
dc.contributor.daisngid1182340
dc.contributor.daisngid59484
dc.contributor.daisngid9973514
dc.contributor.wosstandardWOS:Sendra, S
dc.contributor.wosstandardWOS:Lacuesta, R
dc.contributor.wosstandardWOS:Lloret, J
dc.contributor.wosstandardWOS:Macias-Lopez, E
dc.date.coverdateEnero 2017
dc.identifier.ulpgces
dc.description.sjr0,329
dc.description.jcr1,301
dc.description.sjrqQ2
dc.description.jcrqQ3
dc.description.scieSCIE
item.grantfulltextnone-
item.fulltextSin texto completo-
crisitem.author.deptGIR IUCES: Arquitectura y Concurrencia-
crisitem.author.deptIU de Cibernética, Empresa y Sociedad (IUCES)-
crisitem.author.deptDepartamento de Ingeniería Telemática-
crisitem.author.orcid0000-0002-9085-8398-
crisitem.author.parentorgIU de Cibernética, Empresa y Sociedad (IUCES)-
crisitem.author.fullNameMacías López, Elsa María-
Appears in Collections:Artículos
Show simple item record

Google ScholarTM

Check

Altmetric


Share



Export metadata



Items in accedaCRIS are protected by copyright, with all rights reserved, unless otherwise indicated.