Tamer Abdelkader - Academia.edu (original) (raw)
Papers by Tamer Abdelkader
A Review on Privacy and Anonymity in Blockchain Security, Nov 20, 2023
The advent of blockchain technology has revolutionized various industries, including finance, sup... more The advent of blockchain technology has revolutionized various industries, including finance, supply chain management, and healthcare. However, concerns regarding privacy and anonymity in blockchain security have emerged as significant challenges. This paper aims to investigate the current state of privacy and anonymity in blockchain security by gathering insights from a diverse group of recent researches. we explore the current understanding, practices, and challenges related to privacy and anonymity in blockchain security, to identify the importance of them, assess the effectiveness of existing privacy-enhancing techniques, and uncover potential areas for improvement.
arXiv (Cornell University), Jul 23, 2022
The intermittent wireless connectivity in Mobiles limits the spread of mobile applications usage ... more The intermittent wireless connectivity in Mobiles limits the spread of mobile applications usage over the web, such that the web services are the independent protocol that used to achieve the mobile connectivity with the cloud services. Achieving the web service reliability results in two aspects. The first is low communication overhead and retrieving the appropriate response to prevent the duplicate request execution. The second is overcoming the request time out problem that is one of the most effected issues in the mobile experience. This paper proposes Reliable Mobile Agent and Web Socket approach (RMAWS) that achieves the reliable web services consumption. The enhanced architecture is hybrid between the mobile agent approach and web socket open connection communication protocol. This approach recovers the data lose because of the intermittent connections, overcomes the Time-out problem, and enhances the mobile experience by achieving this service consumption reliability.
International journal of intelligent computing and information sciences, Dec 31, 2020
Voice over Internet Protocol (VoIP) is a recent technology used to transfer media and voice over ... more Voice over Internet Protocol (VoIP) is a recent technology used to transfer media and voice over Internet Protocol (IP). Many organizations moved to VoIP services instead of the traditional telephone systems because of its low cost and variety of introduced services. The Session Initiation Protocol (SIP) is the most used protocol for signaling functions in VoIP networks. It has simple implantation but suffers from less protection against attacks. The Distributed Denial of Service (DDoS) attack is a dangerous attack that preventing legitimate users from using VoIP services and draining their resources. In this paper, we proposed an approach that utilizes deep learning to detect DDoS attacks. The proposed approach uses token embedding to improve the extracted features of SIP messages. Then, Convolutional Neural Network (CNN) was used to detect DDoS attacks with different intensities. Furthermore, a real VoIP dataset that contains different scenarios of attacks was used to evaluate the proposed approach. Our experiments find that the CNN model achieved a high F1 score (99-100%) as another deep learning approach that utilizes Recurrent Neural Network (RNN) but with less detection time. Also, it outperforms another system that depends on classical machine learning in case of low-rate DDoS attacks.
Computers & Security, 2023
Utility-driven mining is a powerful data mining technique that aims to extract significant and va... more Utility-driven mining is a powerful data mining technique that aims to extract significant and valuable knowledge from different kinds of datasets. Nevertheless, analyzing datasets with sensitive or private information may raise security and privacy concerns. To balance utility maximization and privacy preservation, Privacy Preserving Utility Mining (PPUM) has been presented. The primary objective of PPUM algorithms is to conceal the sensitive knowledge that can be found via the application of utility mining algorithms to sensitive data. However, the current PPUM literature shows a paucity of privacy preserving algorithms scalable and efficient enough to handle large and dense datasets. Based on this perspective, this paper proposes three heuristic-based algorithms, namely Selecting the Most Real item sensitive utility First (SMRF), Selecting the Least Real item sensitive utility First (SLRF), and Selecting the most Desirable Item First (SDIF), to efficiently conceal all Sensitive High utility Itemsets (SHIs) while mitigating the projected detrimental impact on the non-sensitive information. The proposed algorithms rely on a novel concept, called Real Item Sensitive Utility (RISU), to effectively select a definite victim item for each SHI during the whole sanitization process. Furthermore, a new sensitive dataset sorting technique is proposed to reduce the time needed to find suitable transactions for sanitization. Through comprehensive experimental evaluations with state-of-the-arts, the viability of the proposed three algorithms was testified. The acquired findings clearly demonstrate the efficacy of the proposed algorithms in terms of reducing the sanitization time and side effects.
International Journal of Intelligent Computing and Information Sciences
Due to the rapid evolution of data saved in electronic form, data mining technologies have become... more Due to the rapid evolution of data saved in electronic form, data mining technologies have become critical and indispensable in looking for nontrivial, implicit, hidden, and possibly beneficial information in enormous volumes of data. High Utility Pattern Mining (HUPM), among the most intriguing data mining techniques, is broadly leveraged to analyze business interactions in market data based on the notion of economic utilities. These economic utilities can be used to examine the factors influencing a customer's purchasing behavior or to come up with new tailored selling and promotion tactics. This in turn has made utility-driven techniques an essential operation and vital activity for many data analysts since they can lead to proper decision-making processes. Nevertheless, such techniques can also lead to major threats regarding privacy and information security if they were misused. Privacy-Preserving Utility Mining (PPUM), also known as High Utility Pattern Hiding (HUPH), has recently emerged to mitigate the security and privacy issues that could happen in the utility framework. In this paper, we propose a heuristic PPUM method, named HUP-Hiding, to protect the results when mining sensitive data using a utility mining algorithm. The proposed method employs a dataset projection mechanism and a new victim item selection technique to efficiently perform the sanitization process. Experiments were performed to verify the reliability of the suggested algorithm. Our experimental results on different datasets confirm that HUP-Hiding has reasonable performance and fewer side effects compared to existing approaches.
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS), 2015
The Mobile intermittent wireless connectivity limits the evolution of the mobile landscape, such ... more The Mobile intermittent wireless connectivity limits the evolution of the mobile landscape, such that this progress coupled with the ubiquitous nature of the Internet and the web services. The web service Reliability achieves the low overhead communication and retrieves the appropriate state response from the web service consumption. This paper discusses and analyzes the most recent approaches that achieve the reliability of web services consumed by mobile devices. Achieving the reliable web service consumption is tended to two approaches: Middleware approach and Mobile Agent (MA) approach. Both of them focus on ensuring the request execution under the communication limitations and services temporary unavailability.
2018 14th International Computer Engineering Conference (ICENCO), 2018
Database outsourcing introduces a new paradigm, called Database as a Service (DBaaS). Database Se... more Database outsourcing introduces a new paradigm, called Database as a Service (DBaaS). Database Service Providers (DSPs) have the ability to host outsourced databases and provide efficient facilities for their users. However, the data and the execution of database queries are under the control of the DSP, which is not always a trusted authority. Therefore, our problem is to ensure the outsourced database security. To address this problem, we propose a Secure scheme to provide Confidentiality and Integrity of Query results for Cloud Databases (SCIQ-CD). The performance analysis shows that our proposed scheme is secure and efficient for practical deployment.
2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
In this paper, we study the impact of using a hybrid-technique approach, which is a combination o... more In this paper, we study the impact of using a hybrid-technique approach, which is a combination of genetic algorithm (GA) and protein's free energy minimization calculations, to predict protein tertiary structure. We compare the results with a basic approach which applies genetic algorithm only. A genetic algorithm is used to predict the protein structure using the primary structure, the amino acids sequence of a given polypeptide chain, as input. After that, we combine the GA with energy minimization feature. Finally, the outcomes of both experiments are analyzed. Results reveal that the hybrid approach outperforms the basic one.
Information Sciences, 2021
2018 13th International Conference on Computer Engineering and Systems (ICCES), 2018
In Mobile Social Networks (MSNs), people contact each other through mobile devices, such as smart... more In Mobile Social Networks (MSNs), people contact each other through mobile devices, such as smartphones and tablets, while they move freely. The communication takes place on-the-fly by the opportunistic contacts between mobile users via local wireless bandwidth, such as Bluetooth or WiFi without a network infrastructure. Social Multicast is an important routing service in MSNs where data transmission is addressed to a group of users according to their social features. The aim of this paper is to find and recommend mobile nodes that can efficiently relay and consume messages based on their social features. Efficiency in this context is to achieve high delivery ratio while reducing considering resources constraints and limitations such as power and space. The proposed algorithm, TESS, measures social similarity based on Time-based Encounter of Socially Similar nodes. We compare the proposed algorithm with the known social multicast algorithms: Multi-CSDO, EncoCent and Epidemic. Simula...
2020 15th International Conference on Computer Engineering and Systems (ICCES), 2020
Geographical information is important in several applications, such as, advertising and recommend... more Geographical information is important in several applications, such as, advertising and recommending. Despite the availability and the existence of social media, especially twitter, the geographical coordinates are often hidden according to privacy reasons. In this paper, a new model is proposed to predict the tweet location based on the KNN-Sentimental Analysis (KNNSA) model. Predicting the tweet location based on the KNN-sentiment analysis (KNNSA) model extracts text features from the tweet in addition to the date and time features. Then, applying sentimental analysis and classifying the data by K-nearest neighbors (KNN) classifier. The (KNNSA) model is evaluated and compared to the previous work and it achieves better performance in terms of root mean squared error (RMSE) and of the mean absolute error (MAE).
Ain Shams Engineering Journal, 2021
Identifying the home location of Twitter users is very important in many business community appli... more Identifying the home location of Twitter users is very important in many business community applications. Therefore, many approaches have been developed to automatically geolocate Twitter users using their tweets. In this paper, a new model to predict home location for Twitter users based on sentiment analysis (Pre-HLSA) is proposed. It predicts the users' home location using only their tweets, by analyzing some of the tweet's features. Achieving this goal allows providing geospatial services, especially in the epidemic dispersion. The Pre-HLSA represents user tweets as a set of extracted features and predicts the users' home locations by analyzing their tweets to find sentiments and polarities, even in the absence of geospatial clues. Then, different classifiers are applied. The experimental results show a promising performance compared to the previous methods in terms of accuracy, mean and median performance measures. It achieves up to 85% accuracy, 223 km mean, and 96 km median.
International Journal of Electrical and Computer Engineering (IJECE), 2022
Mobile edge computing (MEC) is a new computing paradigm that brings cloud services to the network... more Mobile edge computing (MEC) is a new computing paradigm that brings cloud services to the network edge. Despite its great need in terms of computational services in daily life, service users may have several concerns while selecting a suitable service provider to fulfil their computational requirements. Such concerns are: with whom they are dealing with, where will their private data migrate to, service provider processing performance quality. Therefore, this paper presents a trust evaluation scheme that evaluates the processing performance of a service provider in the MEC environment. Processing performance of service providers is evaluated in terms of average processing success rate and processing throughput, thus allocating a service provider in a relevant trust status. Service provider processing incompliance and user termination ratio are also computed during provider’s interactions with users. This is in an attempt to help future service users to be acknowledged of service pro...
Mobile Computing - Technology and Applications, May 30, 2018
The mobile intermittent wireless connectivity limits the evolution of the mobile landscape. Achie... more The mobile intermittent wireless connectivity limits the evolution of the mobile landscape. Achieving web service reliability results in low communication overhead and correct retrieval of the appropriate state response. In this chapter, we discuss and analyze two approaches based on middleware approach, Reliable Service Architecture using Middleware (RSAM), and Reliable Approach using Middleware and WebSocket (RAMWS). These approaches achieve the reliability of web services consumed by mobile devices and propose an enhanced architecture that achieves the reliability under various conditions with minimum communication data overhead. In these experiments, we covered several cases to prove the achievement of reliability. Results also show that the request size was found to be constant, the response size is identical to the traditional architecture, and the increase in the consumption time was less than 5% with the different response sizes.
bolton.ac.uk
Traditional ways of teaching -depended on tutors teaching students in class rooms using the black... more Traditional ways of teaching -depended on tutors teaching students in class rooms using the blackboard-were used for centuries in teaching around the world. Shifting from these will known traditional ways of teaching to the modern approach of e-learning is a challenging but yet ...
PeerJ Computer Science
Mobile edge computing (MEC) is introduced as part of edge computing paradigm, that exploit cloud ... more Mobile edge computing (MEC) is introduced as part of edge computing paradigm, that exploit cloud computing resources, at a nearer premises to service users. Cloud service users often search for cloud service providers to meet their computational demands. Due to the lack of previous experience between cloud service providers and users, users hold several doubts related to their data security and privacy, job completion and processing performance efficiency of service providers. This paper presents an integrated three-tier trust management framework that evaluates cloud service providers in three main domains: Tier I, which evaluates service provider compliance to the agreed upon service level agreement; Tier II, which computes the processing performance of a service provider based on its number of successful processes; and Tier III, which measures the violations committed by a service provider, per computational interval, during its processing in the MEC network. The three-tier evalu...
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)
A Review on Privacy and Anonymity in Blockchain Security, Nov 20, 2023
The advent of blockchain technology has revolutionized various industries, including finance, sup... more The advent of blockchain technology has revolutionized various industries, including finance, supply chain management, and healthcare. However, concerns regarding privacy and anonymity in blockchain security have emerged as significant challenges. This paper aims to investigate the current state of privacy and anonymity in blockchain security by gathering insights from a diverse group of recent researches. we explore the current understanding, practices, and challenges related to privacy and anonymity in blockchain security, to identify the importance of them, assess the effectiveness of existing privacy-enhancing techniques, and uncover potential areas for improvement.
arXiv (Cornell University), Jul 23, 2022
The intermittent wireless connectivity in Mobiles limits the spread of mobile applications usage ... more The intermittent wireless connectivity in Mobiles limits the spread of mobile applications usage over the web, such that the web services are the independent protocol that used to achieve the mobile connectivity with the cloud services. Achieving the web service reliability results in two aspects. The first is low communication overhead and retrieving the appropriate response to prevent the duplicate request execution. The second is overcoming the request time out problem that is one of the most effected issues in the mobile experience. This paper proposes Reliable Mobile Agent and Web Socket approach (RMAWS) that achieves the reliable web services consumption. The enhanced architecture is hybrid between the mobile agent approach and web socket open connection communication protocol. This approach recovers the data lose because of the intermittent connections, overcomes the Time-out problem, and enhances the mobile experience by achieving this service consumption reliability.
International journal of intelligent computing and information sciences, Dec 31, 2020
Voice over Internet Protocol (VoIP) is a recent technology used to transfer media and voice over ... more Voice over Internet Protocol (VoIP) is a recent technology used to transfer media and voice over Internet Protocol (IP). Many organizations moved to VoIP services instead of the traditional telephone systems because of its low cost and variety of introduced services. The Session Initiation Protocol (SIP) is the most used protocol for signaling functions in VoIP networks. It has simple implantation but suffers from less protection against attacks. The Distributed Denial of Service (DDoS) attack is a dangerous attack that preventing legitimate users from using VoIP services and draining their resources. In this paper, we proposed an approach that utilizes deep learning to detect DDoS attacks. The proposed approach uses token embedding to improve the extracted features of SIP messages. Then, Convolutional Neural Network (CNN) was used to detect DDoS attacks with different intensities. Furthermore, a real VoIP dataset that contains different scenarios of attacks was used to evaluate the proposed approach. Our experiments find that the CNN model achieved a high F1 score (99-100%) as another deep learning approach that utilizes Recurrent Neural Network (RNN) but with less detection time. Also, it outperforms another system that depends on classical machine learning in case of low-rate DDoS attacks.
Computers & Security, 2023
Utility-driven mining is a powerful data mining technique that aims to extract significant and va... more Utility-driven mining is a powerful data mining technique that aims to extract significant and valuable knowledge from different kinds of datasets. Nevertheless, analyzing datasets with sensitive or private information may raise security and privacy concerns. To balance utility maximization and privacy preservation, Privacy Preserving Utility Mining (PPUM) has been presented. The primary objective of PPUM algorithms is to conceal the sensitive knowledge that can be found via the application of utility mining algorithms to sensitive data. However, the current PPUM literature shows a paucity of privacy preserving algorithms scalable and efficient enough to handle large and dense datasets. Based on this perspective, this paper proposes three heuristic-based algorithms, namely Selecting the Most Real item sensitive utility First (SMRF), Selecting the Least Real item sensitive utility First (SLRF), and Selecting the most Desirable Item First (SDIF), to efficiently conceal all Sensitive High utility Itemsets (SHIs) while mitigating the projected detrimental impact on the non-sensitive information. The proposed algorithms rely on a novel concept, called Real Item Sensitive Utility (RISU), to effectively select a definite victim item for each SHI during the whole sanitization process. Furthermore, a new sensitive dataset sorting technique is proposed to reduce the time needed to find suitable transactions for sanitization. Through comprehensive experimental evaluations with state-of-the-arts, the viability of the proposed three algorithms was testified. The acquired findings clearly demonstrate the efficacy of the proposed algorithms in terms of reducing the sanitization time and side effects.
International Journal of Intelligent Computing and Information Sciences
Due to the rapid evolution of data saved in electronic form, data mining technologies have become... more Due to the rapid evolution of data saved in electronic form, data mining technologies have become critical and indispensable in looking for nontrivial, implicit, hidden, and possibly beneficial information in enormous volumes of data. High Utility Pattern Mining (HUPM), among the most intriguing data mining techniques, is broadly leveraged to analyze business interactions in market data based on the notion of economic utilities. These economic utilities can be used to examine the factors influencing a customer's purchasing behavior or to come up with new tailored selling and promotion tactics. This in turn has made utility-driven techniques an essential operation and vital activity for many data analysts since they can lead to proper decision-making processes. Nevertheless, such techniques can also lead to major threats regarding privacy and information security if they were misused. Privacy-Preserving Utility Mining (PPUM), also known as High Utility Pattern Hiding (HUPH), has recently emerged to mitigate the security and privacy issues that could happen in the utility framework. In this paper, we propose a heuristic PPUM method, named HUP-Hiding, to protect the results when mining sensitive data using a utility mining algorithm. The proposed method employs a dataset projection mechanism and a new victim item selection technique to efficiently perform the sanitization process. Experiments were performed to verify the reliability of the suggested algorithm. Our experimental results on different datasets confirm that HUP-Hiding has reasonable performance and fewer side effects compared to existing approaches.
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS), 2015
The Mobile intermittent wireless connectivity limits the evolution of the mobile landscape, such ... more The Mobile intermittent wireless connectivity limits the evolution of the mobile landscape, such that this progress coupled with the ubiquitous nature of the Internet and the web services. The web service Reliability achieves the low overhead communication and retrieves the appropriate state response from the web service consumption. This paper discusses and analyzes the most recent approaches that achieve the reliability of web services consumed by mobile devices. Achieving the reliable web service consumption is tended to two approaches: Middleware approach and Mobile Agent (MA) approach. Both of them focus on ensuring the request execution under the communication limitations and services temporary unavailability.
2018 14th International Computer Engineering Conference (ICENCO), 2018
Database outsourcing introduces a new paradigm, called Database as a Service (DBaaS). Database Se... more Database outsourcing introduces a new paradigm, called Database as a Service (DBaaS). Database Service Providers (DSPs) have the ability to host outsourced databases and provide efficient facilities for their users. However, the data and the execution of database queries are under the control of the DSP, which is not always a trusted authority. Therefore, our problem is to ensure the outsourced database security. To address this problem, we propose a Secure scheme to provide Confidentiality and Integrity of Query results for Cloud Databases (SCIQ-CD). The performance analysis shows that our proposed scheme is secure and efficient for practical deployment.
2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
In this paper, we study the impact of using a hybrid-technique approach, which is a combination o... more In this paper, we study the impact of using a hybrid-technique approach, which is a combination of genetic algorithm (GA) and protein's free energy minimization calculations, to predict protein tertiary structure. We compare the results with a basic approach which applies genetic algorithm only. A genetic algorithm is used to predict the protein structure using the primary structure, the amino acids sequence of a given polypeptide chain, as input. After that, we combine the GA with energy minimization feature. Finally, the outcomes of both experiments are analyzed. Results reveal that the hybrid approach outperforms the basic one.
Information Sciences, 2021
2018 13th International Conference on Computer Engineering and Systems (ICCES), 2018
In Mobile Social Networks (MSNs), people contact each other through mobile devices, such as smart... more In Mobile Social Networks (MSNs), people contact each other through mobile devices, such as smartphones and tablets, while they move freely. The communication takes place on-the-fly by the opportunistic contacts between mobile users via local wireless bandwidth, such as Bluetooth or WiFi without a network infrastructure. Social Multicast is an important routing service in MSNs where data transmission is addressed to a group of users according to their social features. The aim of this paper is to find and recommend mobile nodes that can efficiently relay and consume messages based on their social features. Efficiency in this context is to achieve high delivery ratio while reducing considering resources constraints and limitations such as power and space. The proposed algorithm, TESS, measures social similarity based on Time-based Encounter of Socially Similar nodes. We compare the proposed algorithm with the known social multicast algorithms: Multi-CSDO, EncoCent and Epidemic. Simula...
2020 15th International Conference on Computer Engineering and Systems (ICCES), 2020
Geographical information is important in several applications, such as, advertising and recommend... more Geographical information is important in several applications, such as, advertising and recommending. Despite the availability and the existence of social media, especially twitter, the geographical coordinates are often hidden according to privacy reasons. In this paper, a new model is proposed to predict the tweet location based on the KNN-Sentimental Analysis (KNNSA) model. Predicting the tweet location based on the KNN-sentiment analysis (KNNSA) model extracts text features from the tweet in addition to the date and time features. Then, applying sentimental analysis and classifying the data by K-nearest neighbors (KNN) classifier. The (KNNSA) model is evaluated and compared to the previous work and it achieves better performance in terms of root mean squared error (RMSE) and of the mean absolute error (MAE).
Ain Shams Engineering Journal, 2021
Identifying the home location of Twitter users is very important in many business community appli... more Identifying the home location of Twitter users is very important in many business community applications. Therefore, many approaches have been developed to automatically geolocate Twitter users using their tweets. In this paper, a new model to predict home location for Twitter users based on sentiment analysis (Pre-HLSA) is proposed. It predicts the users' home location using only their tweets, by analyzing some of the tweet's features. Achieving this goal allows providing geospatial services, especially in the epidemic dispersion. The Pre-HLSA represents user tweets as a set of extracted features and predicts the users' home locations by analyzing their tweets to find sentiments and polarities, even in the absence of geospatial clues. Then, different classifiers are applied. The experimental results show a promising performance compared to the previous methods in terms of accuracy, mean and median performance measures. It achieves up to 85% accuracy, 223 km mean, and 96 km median.
International Journal of Electrical and Computer Engineering (IJECE), 2022
Mobile edge computing (MEC) is a new computing paradigm that brings cloud services to the network... more Mobile edge computing (MEC) is a new computing paradigm that brings cloud services to the network edge. Despite its great need in terms of computational services in daily life, service users may have several concerns while selecting a suitable service provider to fulfil their computational requirements. Such concerns are: with whom they are dealing with, where will their private data migrate to, service provider processing performance quality. Therefore, this paper presents a trust evaluation scheme that evaluates the processing performance of a service provider in the MEC environment. Processing performance of service providers is evaluated in terms of average processing success rate and processing throughput, thus allocating a service provider in a relevant trust status. Service provider processing incompliance and user termination ratio are also computed during provider’s interactions with users. This is in an attempt to help future service users to be acknowledged of service pro...
Mobile Computing - Technology and Applications, May 30, 2018
The mobile intermittent wireless connectivity limits the evolution of the mobile landscape. Achie... more The mobile intermittent wireless connectivity limits the evolution of the mobile landscape. Achieving web service reliability results in low communication overhead and correct retrieval of the appropriate state response. In this chapter, we discuss and analyze two approaches based on middleware approach, Reliable Service Architecture using Middleware (RSAM), and Reliable Approach using Middleware and WebSocket (RAMWS). These approaches achieve the reliability of web services consumed by mobile devices and propose an enhanced architecture that achieves the reliability under various conditions with minimum communication data overhead. In these experiments, we covered several cases to prove the achievement of reliability. Results also show that the request size was found to be constant, the response size is identical to the traditional architecture, and the increase in the consumption time was less than 5% with the different response sizes.
bolton.ac.uk
Traditional ways of teaching -depended on tutors teaching students in class rooms using the black... more Traditional ways of teaching -depended on tutors teaching students in class rooms using the blackboard-were used for centuries in teaching around the world. Shifting from these will known traditional ways of teaching to the modern approach of e-learning is a challenging but yet ...
PeerJ Computer Science
Mobile edge computing (MEC) is introduced as part of edge computing paradigm, that exploit cloud ... more Mobile edge computing (MEC) is introduced as part of edge computing paradigm, that exploit cloud computing resources, at a nearer premises to service users. Cloud service users often search for cloud service providers to meet their computational demands. Due to the lack of previous experience between cloud service providers and users, users hold several doubts related to their data security and privacy, job completion and processing performance efficiency of service providers. This paper presents an integrated three-tier trust management framework that evaluates cloud service providers in three main domains: Tier I, which evaluates service provider compliance to the agreed upon service level agreement; Tier II, which computes the processing performance of a service provider based on its number of successful processes; and Tier III, which measures the violations committed by a service provider, per computational interval, during its processing in the MEC network. The three-tier evalu...
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)