{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T00:09:16Z","timestamp":1704931756247},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2020,4,1]]},"DOI":"10.1587\/transcom.2019nri0002","type":"journal-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T22:04:04Z","timestamp":1570485844000},"page":"292-301","source":"Crossref","is-referenced-by-count":3,"title":["Secure Resilient Edge Cloud Designed Network"],"prefix":"10.23919","volume":"E103.B","author":[{"given":"Tarek","family":"SAADAWI","sequence":"first","affiliation":[{"name":"City College, City University of New York"}]},{"given":"Akira","family":"KAWAGUCHI","sequence":"additional","affiliation":[{"name":"City College, City University of New York"}]},{"given":"Myung Jong","family":"LEE","sequence":"additional","affiliation":[{"name":"City College, City University of New York"}]},{"given":"Abbe","family":"MOWSHOWITZ","sequence":"additional","affiliation":[{"name":"City College, City University of New York"}]}],"member":"263","reference":[{"key":"1","unstructured":"[1] Z. Zhou and D. Huang, \u201cEfficient and secure data storage operations for mobile cloud computing,\u201d Proc. 8th International Conference on Network and Service Management, CNSM&apos;12, pp.37-45, Laxenburg, Austria, 2013."},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] K. Yang, S. Ou, and H. Chen, \u201cOn effective offloading services for resource-constrained mobile devices running heavier mobile internet applications,\u201d IEEE Commun. Mag., vol.46, no.1, pp.56-63, Jan. 2008. 10.1109\/mcom.2008.4427231","DOI":"10.1109\/MCOM.2008.4427231"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] K. Kumar and Y. Lu, \u201cCloud computing for mobile users: Can offloading computation save energy?,\u201d Computer, vol.43, no.4, pp.51-56, April 2010. 10.1109\/mc.2010.98","DOI":"10.1109\/MC.2010.98"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] E. Cuervo, A. Balasubramanian, D. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, \u201cMaui: Making smartphones last longer with code offload,\u201d Proc. 8th International Conference on Mobile Systems, Applications, and Services, MobiSys&apos;10, pp.49-62, New York, 2010. 10.1145\/1814433.1814441","DOI":"10.1145\/1814433.1814441"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] M. Satyanarayanan, \u201cThe role of cloudlets in hostile environments,\u201d Proc. Fourth ACM Workshop on Mobile Cloud Computing and Services, MCS&apos;13, pp.1-2, New York, NY, 2013. 10.1145\/2497306.2483793","DOI":"10.1145\/2497306.2483793"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] S. Wang and S. Dey, \u201cAdaptive mobile cloud computing to enable rich mobile multimedia applications,\u201d IEEE Trans. Multimedia, vol.15, no.4, pp.870-883, 2013. 10.1109\/tmm.2013.2240674","DOI":"10.1109\/TMM.2013.2240674"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] A. Ellouze, M. Gagnaire, and A. Haddad, \u201cA mobile application offloading algorithm for mobile cloud computing,\u201d Prof. 3rd IEEE Mobile Cloud Computing, Services and Engineering, Mobile Cloud 2015, San Francisco, CA, March 2015. 10.1109\/mobilecloud.2015.11","DOI":"10.1109\/MobileCloud.2015.11"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] D. Hoang, D. Niyato, and P. Wang, \u201cOptimal admission control policy for mobile cloud computing hotspot with cloudlet,\u201d Prof. IEEE Wireless Communications and Networking Conference, WCNC 2012, pp.3145-3149, Paris, France, April 2012. 10.1109\/wcnc.2012.6214347","DOI":"10.1109\/WCNC.2012.6214347"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] Y. Liu and M.J. Lee, \u201cAn effective dynamic programming offloading algorithm in mobile cloud computing system,\u201d Prof. IEEE Wireless Communications and Networking Conference, WCNC 2014, pp.1868-1873, Istanbul, Turkey, April, 2014. 10.1109\/wcnc.2014.6952554","DOI":"10.1109\/WCNC.2014.6952554"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] Y. Liu and M.J. Lee, \u201cAn adaptive resource allocation algorithm for partitioned services in mobile cloud computing,\u201d Prof. 9th IEEE International Symposium on Service-Oriented System Engineering, SOSE 2015, San Francisco, CA, March 2015. 10.1109\/sose.2015.19","DOI":"10.1109\/SOSE.2015.19"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] S. Malik and M.M. Chaturvedi, \u201cPrivacy and security in mobile cloud computing: Review,\u201d International Journal of Computer Applications, vol.80, no.11, pp.20-26, Oct. 2013. 10.5120\/13906-1833","DOI":"10.5120\/13906-1833"},{"key":"12","unstructured":"[12] Q. Xia, W. Liang, and W. Xu, \u201cThroughput maximization for online request admissions in mobile cloudlets,\u201d Prof. 38th Annual IEEE Conference on Local Computer Networks, pp.589-596, Sydney, Australia, Oct. 2013 10.1109\/lcn.2013.6761295"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] Y. Liu and M.J. Lee, \u201cSecurity-aware resource allocation for mobile cloud computing systems,\u201d Prof. 24th International Conference on Computer Communication and Networks, ICCCN 2015, Las Vegas, NV, USA, 2015. 10.1109\/icccn.2015.7288465","DOI":"10.1109\/ICCCN.2015.7288465"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] S. Clinch, J. Harkes, A. Friday, N. Davies, and M. Satyanarayanan, \u201cHow close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users,\u201d Prof. Pervasive Computing and Communications (PerCom), 2012 IEEE International Conference on, pp.122-127, 2012. 10.1109\/percom.2012.6199858","DOI":"10.1109\/PerCom.2012.6199858"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] Y. Liu, M. Lee, and Y. Zheng, \u201cMulti-resource allocation for cloudlet-based mobile cloud computing system,\u201d IEEE Trans. Mobile Comput., vol.15, no.10, pp.2398-2410, Oct. 2016. 10.1109\/tmc.2015.2504091","DOI":"10.1109\/TMC.2015.2504091"},{"key":"16","unstructured":"[16] G. Bent, P. Dantressangle, D. Vyvyan, A. Mowshowitz, and V. Mitsou, \u201cA dynamic distributed federated database,\u201d Annual Conference of the International Technology Alliance, Imperial College-London, 2008."},{"key":"17","unstructured":"[17] A. Kawaguchi, A. Mowshowitz, A. Nagel, A. Toce, G. Bent, P. Stone, and P. Dantressangle, \u201cA model of query performance in dynamic distributed federated databases taking account of network topology,\u201d Annual Conference of the International Technology Alliance, Southampton, UK, Sept. 2012."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] A. Mowshowitz, V. Mitsou, and G. Bent, \u201cEvolving networks and their vulnerabilities,\u201d Modern and Interdisciplinary Problems in Network Science: A Translational Research Perspective, M. Dehmer, et al., eds., CRC Press, 2018.","DOI":"10.1201\/9781351237307-7"},{"key":"19","unstructured":"[19] A. Mowshowitz, A. Kawaguchi, A. Toce, A. Nagel, P. Stone, P. Dantressangle, and G. Bent, \u201cNetwork topology as a cost factor in query optimization,\u201d Annual Conference of the International Technology Alliance, Adelphi, MD, 2011."},{"key":"20","unstructured":"[20] A. Mowshowitz, A. Kawaguchi, A. Toce, A. Nagel, G. Bent, P. Stone, and P. Dantressangle, \u201cQuery optimization in a distributed hypercube database,\u201d Annual Conference of the International Technology Alliance, Imperial College-London, Sept. 2010."},{"key":"21","unstructured":"[21] A. Mowshowitz, G. Bent, and P. Dantressangle, \u201cAligning network structures: Embedding a logical dynamic distributed database in a MANET,\u201d Annual Conference of the International Technology Alliance, University of Maryland, 2009."},{"key":"22","unstructured":"[22] A. Mowshowitz, V. Mitsou, and G. Bent, \u201cModels of network growth by combination,\u201d Annual Conference of the International Technology Alliance, Imperial College-London, 2008."},{"key":"23","unstructured":"[23] A. Mowshowitz and G. Bent, \u201cFormal properties of distributed database networks,\u201d Annual Conference of the International Technology Alliance, University of Maryland, 2007."},{"key":"24","unstructured":"[23a] P. Stone, P. Dantressangle, G. Bent, A. Mowshowitz, A. Toce, and B. Szymanski, \u201cQuery execution and maintenance costs in a dynamic distributed federated database,\u201d Annual Conference of the International Technology Alliance, Southampton, UK, Sept. 2012."},{"key":"25","unstructured":"[24] P. Stone, A. Mowshowitz, P. Dantressangle, and G. Bent, \u201cCalculation of the center-of-data in a hypercube,\u201d Annual Conference of the International Technology Alliance, Southampton, UK, Sept. 2012."},{"key":"26","unstructured":"[25] P. Stone, P. Dantressangle, A. Mowshowitz, and G. Bent, \u201cReview of relational algebra for dynamic distributed federated databases,\u201d Annual Conference of the International Technology Alliance, Imperial College-London, Sept. 2010."},{"key":"27","doi-asserted-by":"crossref","unstructured":"[26] A. Toce, A. Mowshowitz, A. Kawaguchi, P. Stone, P. Dantressangle, and G. Bent, \u201cAn efficient hypercube labeling scheme for dynamic peer-to-peer networks,\u201d J. Parallel Distrib. Comput., vol.102, pp.186-198, 2017.","DOI":"10.1016\/j.jpdc.2016.12.022"},{"key":"28","unstructured":"[27] A. Toce, A. Mowshowitz, A. Kawaguchi, P. Stone, P. Dantressangle, and G. Bent, \u201cHyperD: Analysis and performance evaluation of a distributed hypercube database,\u201d Annual Conference of the International Technology Alliance, Southampton, UK, Sept. 2012."},{"key":"29","unstructured":"[28] Wikipedia, Hypercube Graphs, https:\/\/en.wikipedia.org\/wiki\/Hypercube_graph"},{"key":"30","unstructured":"[29] Wikipedia, Floyd-Warshall Algorithm, https:\/\/en.wikipedia.org\/wiki\/Floyd-Warshall_algorithm"},{"key":"31","unstructured":"[30] Wikipedia, k-medoids, https:\/\/en.wikipedia.org\/wiki\/K-medoids"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[31] Z. Tan, A. Jamdagni, X. He, P. Nanda, and R.P. Liu, \u201cA system for denial-of-service attack detection based on multivariate correlation analysis,\u201d IEEE Trans. Parallel Distrib. Syst., vol.25, no.2, pp.447-456, 2014.","DOI":"10.1109\/TPDS.2013.146"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[32] S. Peddabachigari, A. Abraham, C. Grosan, and J. Thomas, \u201cModeling intrusion detection system using hybrid intelligent systems,\u201d J. Netw. Comput. Appl., vol.30, no.1, pp.114-132, 2007.","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"34","doi-asserted-by":"crossref","unstructured":"[33] O. Igbe, O. Ajayi, and T. Saadawi, \u201cDetecting denial of service attacks using a combination of dendritic cell algorithm and the negative selection algorithm,\u201d 2nd IEEE International Conf. on Smart Cloud 2017, Nov. 2017. 10.1109\/smartcloud.2017.18","DOI":"10.1109\/SmartCloud.2017.18"},{"key":"35","doi-asserted-by":"crossref","unstructured":"[34] O. Igbe, O. Ajayi, and T. Saadawi, \u201cDenial of service attack detection using dendritic cell algorithm,\u201d IEEE 8th Annual Ubiquitous Computing, Electronics, and Mobile Communication Conference (UEMCON), Oct. 2017. 10.1109\/uemcon.2017.8249054","DOI":"10.1109\/UEMCON.2017.8249054"},{"key":"36","doi-asserted-by":"crossref","unstructured":"[35] O. Igbe, I. Darwish, and T. Saadawi, \u201cDeterministic dendritic cell algorithm application to smart-grid cyber attack detection,\u201d IEEE 4th International Conference on Cyber Security and Cloud Computing, June 2017. 10.1109\/cscloud.2017.12","DOI":"10.1109\/CSCloud.2017.12"},{"key":"37","doi-asserted-by":"crossref","unstructured":"[36] A. Somayaji, S. Hofmeyr, and S. Forrest, \u201cPrinciples of a computer immune system,\u201d Proc. 1997 workshop on New security paradigms, ACM, pp.75-82, 1998. 10.1145\/283699.283742","DOI":"10.1145\/283699.283742"},{"key":"38","doi-asserted-by":"crossref","unstructured":"[37] M. Zamani, M. Movahedi, M. Ebadzadeh, and H. Pedram, \u201cA DDoS-Aware IDS model based on danger theory and mobile agents,\u201d Computational Intelligence and Security, 2009. CIS&apos;09. International Conference on, vol.1, pp.516-520, IEEE, 2009. 10.1109\/cis.2009.215","DOI":"10.1109\/CIS.2009.215"},{"key":"39","doi-asserted-by":"publisher","unstructured":"[38] S.A. Hofmeyr and S. Forrest, \u201cArchitecture for an artificial immune system,\u201d Evol. Comput., vol.8, no.4, pp.443-473, 2000. 10.1162\/106365600568257","DOI":"10.1162\/106365600568257"},{"key":"40","doi-asserted-by":"crossref","unstructured":"[39] F. Gu, J. Greensmith, and U. Aicklein, \u201cThe dendritic cell algorithm for intrusion detection,\u201d Biologically Inspired Networking and Sensing: Algorithms and Architectures, pp.84-102, 2011. 10.4018\/978-1-61350-092-7.ch005","DOI":"10.4018\/978-1-61350-092-7.ch005"},{"key":"41","doi-asserted-by":"crossref","unstructured":"[40] D. Dasgupta and F. Nino, Immunological Computation: Theory and Applications, Auerbach Publications, 2008. 10.1201\/9781420065466","DOI":"10.1201\/9781420065466"},{"key":"42","unstructured":"[41] Introduction to Genetic Algorithms, http:\/\/www.doc.ic.ac.uk\/~nd\/surprise_96\/journal\/vol1\/hmw\/article1.html (accessed Jan. 2, 2016)."},{"key":"43","doi-asserted-by":"crossref","unstructured":"[42] K. Kourai and K. Nakamura, \u201cEfficient VM introspection in KVM and performance comparison with Xen,\u201d Department of Creative Informatics, Kyushu Institute of Technology, Fukuoka, Japan, Nov. 2014.","DOI":"10.1109\/PRDC.2014.33"},{"key":"44","doi-asserted-by":"publisher","unstructured":"[43] K. Kourai and K. Juda, \u201cSecure offloading of legacy IDSes using remote VM introspection in semi-trusted clouds,\u201d Department of Creative Informatics, Kyushu Institute of Technology, Fukuoka, Japan, June 2016. 10.1016\/j.jpdc.2016.12.022","DOI":"10.1016\/j.jpdc.2016.12.022"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E103.B\/4\/E103.B_2019NRI0002\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T15:01:16Z","timestamp":1704898876000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E103.B\/4\/E103.B_2019NRI0002\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2019nri0002","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}