⏩ Volume 21, Issue No.3, 2023 (SCT)
Optimizing Data Transfer Efficiency in Hybrid Cloud Systems Using Delay-Aware Compression and Caching Layers

This paper introduces a delay-aware compression and caching layer for hybrid cloud data transfers. It reduces latency by dynamically adjusting compression based on congestion and enhances throughput during real-time data-intensive operations across multi-cloud infrastructures.

Anderson Kai Mitchell, Chen Xiu Fang, Vikram Shailesh Nambiar, Layla June Roberts, Rodrigo Felipe Morales

Paper ID: 22321301
✅ Access Request

Secure Cloud-Edge Synchronization Using Blockchain-Based Provenance Tracking and Multi-Signature Verification Framework

This research presents a blockchain framework for tracking data provenance across cloud-edge boundaries. It leverages multi-signature verification to ensure integrity, transparency, and non-repudiation, safeguarding collaborative AI pipelines and IoT data ingestion workflows.

Malcolm Isaiah Tate, Wu Yue Wen, Harshil Prakash Bhargava, Daisy Aurora Richardson, Emilio Santiago Vargas

Paper ID: 22321302
✅ Access Request

Dynamic Task Offloading in Vehicular Edge-Cloud Networks Using Graph Neural Networks and Real-Time Heuristics

This work introduces a graph neural model for task offloading in vehicular networks. The system dynamically selects edge or cloud targets based on connectivity graphs and latency thresholds, ensuring stable service quality in mobile environments.

Dominic Jalen Greene, Shen Ming Hui, Anirudh Gopal Tiwari, Mia Scarlett Lawrence, Fernando Javier Rivas

Paper ID: 22321303
✅ Access Request

Quantum-Resistant Cryptography for Confidential Cloud Workflows in Multi-Jurisdictional Data Environments

This study evaluates the application of lattice-based cryptographic schemes to protect cloud data workflows across international boundaries. It addresses regulatory compliance while resisting threats from future quantum adversaries.

Everett Miles Finley, Zhao Li Ning, Tejas Ramesh Bhosale, Paige Meredith Foster, Manuel Alberto Cruz

Paper ID: 22321304
✅ Access Request

Cloud-Native Container Security Using Runtime Behavior Profiling and Anomaly Feedback Loops

This paper presents a security system for containers in cloud-native environments. It uses runtime behavior profiling and adaptive feedback loops to detect anomalies, offering real-time mitigation for policy breaches without introducing overhead on orchestrated platforms.

Nelson Troy Blackburn, Wang Zhen Rui, Manan Prateek Khosla, Isabelle Noelle Simmons, Andres Emilio Pacheco

Paper ID: 22321305
✅ Access Request

Latency-Aware Auto-Scaling Strategy for Cloud-Based Machine Learning Services in Multi-Region Deployments

This study introduces an adaptive auto-scaling method tailored for ML services in global cloud environments. By incorporating latency patterns and regional demand fluctuations, it ensures seamless scaling while maintaining real-time responsiveness and system cost-efficiency.

Grayson Elijah Stone, Li Hao Feng, Rithvik Suresh Anand, Emily Jean Porter, Alejandro Tomas Rivera

Paper ID: 22321306
✅ Access Request

Back