Identificador persistente para citar o vincular este elemento: http://hdl.handle.net/10553/40198
Campo DC Valoridioma
dc.contributor.authorSendra, S.en_US
dc.contributor.authorLacuesta, R.en_US
dc.contributor.authorLloret, J.en_US
dc.contributor.authorMacías López, Elsa Maríaen_US
dc.date.accessioned2018-06-07T13:18:13Z-
dc.date.available2018-06-07T13:18:13Z-
dc.date.issued2017en_US
dc.identifier.issn1607-9264en_US
dc.identifier.urihttp://hdl.handle.net/10553/40198-
dc.description.abstractSpontaneous ad hoc cloud computing networks let us perform complex tasks in a distributed manner by sharing computing resources. This kind of infrastructure is based on mobile devices with limited processing and storage capacity. Nodes with more processing capacity and energy in a spontaneous network store data or perform computing tasks in order to increase the whole computing and storage capacity. However, these networks can also present some problems of security and data vulnerability. In this paper, we present a secure spontaneous mobile ad hoc cloud computing network to make estimations using several information sources. The application is able to create users and manage encryption methods to protect the data sent through the network. The proposal has been simulated in several scenarios. The results show that the network performance depends mainly on the network size and nodes mobility.en_US
dc.languageengen_US
dc.relation.ispartofJournal of Internet Technologyen_US
dc.sourceJournal of Internet Technology [ISSN 1607-9264], v. 18 (7), p. 1485-1498en_US
dc.subject3325 Tecnología de las telecomunicacionesen_US
dc.subject.otherMobile Cloud Computingen_US
dc.subject.otherSecure Protocolen_US
dc.subject.otherSpontaneous Networksen_US
dc.titleA secure spontaneous mobile ad hoc cloud computing networken_US
dc.typeinfo:eu-repo/semantics/Articlees
dc.typeArticlees
dc.identifier.doi10.6138/JIT.2017.18.7.20141221
dc.identifier.scopus85041839929
dc.identifier.isi000423459000002-
dc.contributor.authorscopusid35189596800
dc.contributor.authorscopusid35092517700
dc.contributor.authorscopusid23389476400
dc.contributor.authorscopusid24825216400
dc.description.lastpage1498-
dc.identifier.issue7-
dc.description.firstpage1485-
dc.relation.volume18-
dc.investigacionIngeniería y Arquitecturaen_US
dc.type2Artículoen_US
dc.contributor.daisngid699951
dc.contributor.daisngid1182340
dc.contributor.daisngid59484
dc.contributor.daisngid9973514
dc.contributor.wosstandardWOS:Sendra, S
dc.contributor.wosstandardWOS:Lacuesta, R
dc.contributor.wosstandardWOS:Lloret, J
dc.contributor.wosstandardWOS:Macias-Lopez, E
dc.date.coverdateEnero 2017
dc.identifier.ulpgces
dc.description.sjr0,329
dc.description.jcr1,301
dc.description.sjrqQ2
dc.description.jcrqQ3
dc.description.scieSCIE
item.fulltextSin texto completo-
item.grantfulltextnone-
crisitem.author.deptGIR IUCES: Arquitectura y Concurrencia-
crisitem.author.deptIU de Cibernética, Empresa y Sociedad (IUCES)-
crisitem.author.deptDepartamento de Ingeniería Telemática-
crisitem.author.orcid0000-0002-9085-8398-
crisitem.author.parentorgIU de Cibernética, Empresa y Sociedad (IUCES)-
crisitem.author.fullNameMacías López, Elsa María-
Colección:Artículos
Vista resumida

Google ScholarTM

Verifica

Altmetric


Comparte



Exporta metadatos



Los elementos en ULPGC accedaCRIS están protegidos por derechos de autor con todos los derechos reservados, a menos que se indique lo contrario.