Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection

Permanent URI for this collectionhttps://hdl.handle.net/11147/7148

Browse

Search Results

Now showing 1 - 7 of 7
  • Article
    Citation - WoS: 15
    Citation - Scopus: 18
    Achieving Query Performance in the Cloud Via a Cost-Effective Data Replication Strategy
    (Springer, 2021) Tos, Uras; Mokadem, Riad; Hameurlain, Abdelkader; Ayav, Tolga
    Meeting performance expectations of tenants without sacrificing economic benefit is a tough challenge for cloud providers. We propose a data replication strategy to simultaneously satisfy both the performance and provider profit. Response time of database queries is estimated with the consideration of parallel execution. If the estimated response time is not acceptable, bottlenecks are identified in the query plan. Data replication is realized to resolve the bottlenecks. Data placement is heuristically performed in a way to satisfy query response times at a minimal cost for the provider. We demonstrate the validity of our strategy in a performance evaluation study.
  • Article
    Citation - WoS: 28
    Citation - Scopus: 28
    Multi-Helper Noma for Cooperative Mobile Edge Computing
    (Institute of Electrical and Electronics Engineers, 2022) Yılmaz, Saadet Simay; Özbek, Berna
    The next-generation wireless networks are expected to support a number of computation-intensive and delay-sensitive applications such as virtual reality (VR), autonomous driving, telesurgery and unmanned aerial vehicles (UAVs). Since many devices are computation and power limited, mobile edge computing (MEC) has been deemed as a promising way to enhance computation service. In this paper, we propose a novel cooperative MEC that exploits the combination of non-orthogonal multiple access (NOMA) and multiple helpers. In the proposed system featuring a user, multiple helpers and a base station (BS), the user can simultaneously offload its computation-intensive tasks to the helpers using NOMA when there is no strong direct transmission link between the user and the BS. Then, the helpers can compute and offload these tasks through NOMA. Thus, in the proposed scheme, the computation and offloading modes at the helpers are determined with respect to the optimized task offloading decision factor. The simulation results show that the proposed NOMA-based cooperative MEC significantly increases the total offloading data under the latency constraints compared to the benchmark schemes featuring one helper with strong direct transmission link. IEEE
  • Article
    Citation - WoS: 26
    Citation - Scopus: 30
    Ensuring Performance and Provider Profit Through Data Replication in Cloud Systems
    (Springer Verlag, 2017) Tos, Uras; Mokadem, Riad; Hameurlain, Abdelkader; Ayav, Tolga; Bora, Şebnem
    Cloud computing is a relatively recent computing paradigm that is often the answer for dealing with large amounts of data. Tenants expect the cloud providers to keep supplying an agreed upon quality of service, while cloud providers aim to increase profits as it is a key ingredient of any economic enterprise. In this paper, we propose a data replication strategy for cloud systems that satisfies the response time objective for executing queries while simultaneously enables the provider to return a profit from each execution. The proposed strategy estimates the response time of the queries and performs data replication in a way that the execution of any particular query is still estimated to be profitable for the provider. We show with simulations that how the proposed strategy fulfills these two criteria.
  • Conference Object
    Citation - WoS: 17
    Citation - Scopus: 30
    A Performance and Profit Oriented Data Replication Strategy for Cloud Systems
    (Institute of Electrical and Electronics Engineers Inc., 2017) Tos, Uras; Mokadem, Riad; Hameurlain, Abdelkader; Ayav, Tolga; Bora, Şebnem
    In today's world, tenants of cloud systems expect timely responses to queries that process ever-increasing sizes of data. However, most cloud providers offer their services without any performance guarantees to their tenants. In this paper we propose a data replication strategy that aims to satisfy performance guarantees for the tenant while ensuring profitability of the cloud provider. Our strategy estimates the response time of the queries, as well as the expenditures that affect the profitability of the cloud provider. The decision of whether to perform replication is determined by the fulfillment of these two criteria. Validity of the proposed strategy is provided by means of a simulation study.
  • Conference Object
    Citation - WoS: 2
    Citation - Scopus: 5
    On Current Trends in Security and Privacy of Cloud Computing
    (Institute of Electrical and Electronics Engineers Inc., 2013) Şahin, Serap
    One of the major components of the Cloud Computing is 'Security and Privacy'. These concerns about security and privacy directly address the trustworthy and reliability levels of a system. The researches and studies about security and privacy on cloud computing are continuing. The aim of this paper is to analyze the privacy and security requirements and highlight new tools and open research topics for cloud computing systems. © 2013 IEEE.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 4
    A Practical Privacy-Preserving Targeted Advertising Scheme for Iptv Users
    (Springer Verlag, 2016) Khayati, Leyli Javid; Örencik, Cengiz; Savaş, Erkay; Ustaoğlu, Berkant
    In this work, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of subscribers, a content provider (IPTV), advertisers and a semi-trusted server. To target potential customers, the advertiser can utilize not only demographic information of subscribers, but also their watching habits. The latter includes watching history, preferences for IPTV content and watching rate, which are periodically (e.g., weekly) published on a semi-trusted server (e.g., cloud server) along with anonymized demographics. Since the published data may leak sensitive information about subscribers, it is safeguarded using cryptographic techniques in addition to the anonymization of demographics. The techniques used by the advertiser, which can be manifested in its queries to the server, are considered (trade) secrets and therefore are protected as well. The server is oblivious to the published data and the queries of the advertiser as well as its own responses to these queries. Only a legitimate advertiser, endorsed with so-called trapdoors by the IPTV, can query the cloud server and access the query results. Even when some background information about users is available, query responses do not leak sensitive information about the IPTV users. The performance of the proposed scheme is evaluated with experiments, which show that the scheme is practical. The algorithms demonstrate both weak and strong scaling property and take advantage of high level of parallelism. The scheme can also be applied as a recommendation system. © 2015, Springer-Verlag Berlin Heidelberg.
  • Conference Object
    Citation - WoS: 2
    Citation - Scopus: 12
    A Review of Cloud Deployment Models for E-Learning Systems
    (Institute of Electrical and Electronics Engineers Inc., 2013) Leloğlu, Engin; Ayav, Tolga; Aslan, Burak Galip
    With the significant growth in the cloud-based systems, many industries give their attention to cloud computing solutions. E-learning is a promising application area since its typical requirements such as dynamically allocation of computation and storage resources, coincide well with cloud characteristics. This paper presents some possible cloud solutions in e-learning environments by emphasizing its pros and cons. It is of paramount importance to choose the most suitable cloud model for an e-learning application or an educational organization in terms of scalability, portability and security. We distinguish various deployment alternatives of cloud computing and discuss their benefits against typical e-learning requirements.