A. Longo, M. Zappatore, Mario Alessandro Bochicchio, S. Navathe
Local transportation services are an essential component of all modern urban infrastructures. The constantly growing requirements and expectations from several stakeholders, ranging from public authorities, service providers and customers, demand a deep rethinking of the entire system. Such services must be oriented towards sustainability and everyday living, thus needing significant Quality of Service (QoS) improvement in this sector. This paper aims at highlighting the main challenges for modeling and implementing the relationships between the stakeholders in the public transportation sector and proposes a systemic modeling approach that would serve to design, implement, and monitor a QoS-regulatory document. A taxonomy of quality indicators and service levels are proposed along with metrics on the basis of athe European and Italian regulatory background as well as of the public transportation service lifecycle model. The proposed approach has been validated by developing a service analytics system deployed at the regional transportation agency in the Apulia administrative region of Southern Italy.
{"title":"Modeling and Evaluating Relationships and Service Contracts in Public Transportation: A Pilot Project in Italy","authors":"A. Longo, M. Zappatore, Mario Alessandro Bochicchio, S. Navathe","doi":"10.1109/SCC.2016.72","DOIUrl":"https://doi.org/10.1109/SCC.2016.72","url":null,"abstract":"Local transportation services are an essential component of all modern urban infrastructures. The constantly growing requirements and expectations from several stakeholders, ranging from public authorities, service providers and customers, demand a deep rethinking of the entire system. Such services must be oriented towards sustainability and everyday living, thus needing significant Quality of Service (QoS) improvement in this sector. This paper aims at highlighting the main challenges for modeling and implementing the relationships between the stakeholders in the public transportation sector and proposes a systemic modeling approach that would serve to design, implement, and monitor a QoS-regulatory document. A taxonomy of quality indicators and service levels are proposed along with metrics on the basis of athe European and Italian regulatory background as well as of the public transportation service lifecycle model. The proposed approach has been validated by developing a service analytics system deployed at the regional transportation agency in the Apulia administrative region of Southern Italy.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128555235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social networking sites (SNSs), such as Facebook, have become part of everyday use. While many individuals and organizations use SNSs to maintain contact and to do a variety of services, attackers may see them as a prime target for performing different types of attacks. Phishing is one of the most common attacks, and one of the most challenging problems in SNSs. Existing human behaviours literature related to social capital, habitual usage, and risk perception shows a strong indication that it is possible to predict Facebook users' susceptibility to phishing victimization based on their demographics, anonymity, social capital, and risk perception. Using quantitative survey, this paper aims to predict Facebook users' susceptibility to phishing victimization based on these factors. Among the hypothesized factors, we found that it is possible to predict user's susceptibility to phishing victimization based on the user's anonymity status, the number of all friends the user is connected to, the number of strangers that the user is connected to, and the number of close friends that the user is connected to.
{"title":"Toward Predicting Susceptibility to Phishing Victimization on Facebook","authors":"Z. Alqarni, A. Algarni, Yue Xu","doi":"10.1109/SCC.2016.61","DOIUrl":"https://doi.org/10.1109/SCC.2016.61","url":null,"abstract":"Social networking sites (SNSs), such as Facebook, have become part of everyday use. While many individuals and organizations use SNSs to maintain contact and to do a variety of services, attackers may see them as a prime target for performing different types of attacks. Phishing is one of the most common attacks, and one of the most challenging problems in SNSs. Existing human behaviours literature related to social capital, habitual usage, and risk perception shows a strong indication that it is possible to predict Facebook users' susceptibility to phishing victimization based on their demographics, anonymity, social capital, and risk perception. Using quantitative survey, this paper aims to predict Facebook users' susceptibility to phishing victimization based on these factors. Among the hypothesized factors, we found that it is possible to predict user's susceptibility to phishing victimization based on the user's anonymity status, the number of all friends the user is connected to, the number of strangers that the user is connected to, and the number of close friends that the user is connected to.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Molka Rekik, Khouloud Boukadi, Nour Assy, Walid Gaaloul, H. Ben-Abdallah
A configurable process model is a generic model from which an enterprise can derive and execute process variants that meet its specific needs and contexts. With the advent of cloud computing and its economic pay-per-use model, enterprises are increasingly outsourcing partially or totally their process variants to cloud providers, and recently to cloud federations. A main challenge in this regard is to allocate optimally cloud resources to the process variants' activities. More specifically, an enterprise may be interested in outsourcing only those that result in an optimal deployment. Due to the diversity of the enterprise QoS requirements, the heterogeneity of resources offered by the cloud federation and the large number of possible configurations in a configurable process model, finding the optimal process variant deployment becomes a highly challenging problem. In this paper, we propose a novel approach to solve this problem through a binary/(0-1) linear program with a quadratic objective function under a set of constraints pertinent to both the enterprise and cloud federation requirements. Our prototypical implementation demonstrates the feasibility and the results of our experiments highlight the effectiveness of our proposed solution.
{"title":"A Linear Program for Optimal Configurable Business Processes Deployment into Cloud Federation","authors":"Molka Rekik, Khouloud Boukadi, Nour Assy, Walid Gaaloul, H. Ben-Abdallah","doi":"10.1109/SCC.2016.31","DOIUrl":"https://doi.org/10.1109/SCC.2016.31","url":null,"abstract":"A configurable process model is a generic model from which an enterprise can derive and execute process variants that meet its specific needs and contexts. With the advent of cloud computing and its economic pay-per-use model, enterprises are increasingly outsourcing partially or totally their process variants to cloud providers, and recently to cloud federations. A main challenge in this regard is to allocate optimally cloud resources to the process variants' activities. More specifically, an enterprise may be interested in outsourcing only those that result in an optimal deployment. Due to the diversity of the enterprise QoS requirements, the heterogeneity of resources offered by the cloud federation and the large number of possible configurations in a configurable process model, finding the optimal process variant deployment becomes a highly challenging problem. In this paper, we propose a novel approach to solve this problem through a binary/(0-1) linear program with a quadratic objective function under a set of constraints pertinent to both the enterprise and cloud federation requirements. Our prototypical implementation demonstrates the feasibility and the results of our experiments highlight the effectiveness of our proposed solution.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116579989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Schäfer, A. Weiss, M. Tariq, V. Andrikopoulos, Santiago Gómez Sáez, Lukas Krawczyk, K. Rothermel
The workflow technology is the de facto standard for managing business processes. Today, workflows are even used for automating interactions and collaborations between business partners, e.g., for enabling just-in-time production. Every workflow that is part of such a collaboration needs to be highly available. Otherwise, the business operations, e.g., the production, might be hindered or even stopped. Since today's business partners are scattered across the globe, the workflows are executed in a highly distributed and heterogeneous environment. Those environments are, however, failure-prone and, thus, providing availability is not trivial. In this work, we improve availability by replicating workflow executions, while ensuring that the outcome is the same as in a non-replicated execution. For making workflow replication easily usable with current workflow technology, we derive the requirements for modeling a workflow replication system. Then, we propose the HAWKS system, which adheres to the previously specified requirements and is compatible with current technology. We implement a proof-of-concept in the open-source workflow execution engine Apache ODE for demonstrating this compatibility. Finally, we extensively evaluate the impact of using HAWKS in terms of performance and availability in the presence of failures.
{"title":"HAWKS: A System for Highly Available Executions of Workflows","authors":"D. Schäfer, A. Weiss, M. Tariq, V. Andrikopoulos, Santiago Gómez Sáez, Lukas Krawczyk, K. Rothermel","doi":"10.1109/SCC.2016.24","DOIUrl":"https://doi.org/10.1109/SCC.2016.24","url":null,"abstract":"The workflow technology is the de facto standard for managing business processes. Today, workflows are even used for automating interactions and collaborations between business partners, e.g., for enabling just-in-time production. Every workflow that is part of such a collaboration needs to be highly available. Otherwise, the business operations, e.g., the production, might be hindered or even stopped. Since today's business partners are scattered across the globe, the workflows are executed in a highly distributed and heterogeneous environment. Those environments are, however, failure-prone and, thus, providing availability is not trivial. In this work, we improve availability by replicating workflow executions, while ensuring that the outcome is the same as in a non-replicated execution. For making workflow replication easily usable with current workflow technology, we derive the requirements for modeling a workflow replication system. Then, we propose the HAWKS system, which adheres to the previously specified requirements and is compatible with current technology. We implement a proof-of-concept in the open-source workflow execution engine Apache ODE for demonstrating this compatibility. Finally, we extensively evaluate the impact of using HAWKS in terms of performance and availability in the presence of failures.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"66 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114016829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Process behavioral similarity calculation is widely used in many activities of business process management, such as process mining, process clustering and process retrieval. However, most existing process behavioral similarity measurement methods do not consider variable constraints (e.g. time constraints) in process models. Since the variable constraints of tasks, especially time constraints, are crucial to quantify the differences between the executions of tasks with the same or similar labels in process models, it is significant to calculate exact process behavioral similarity with the consideration of their impacts in process models. In this paper, we formally define the process behavioral similarity with time constraints and propose a time-aware method to efficiently compute the process behavioral similarity based on the ordering relations with time constraints. Experiments illustrate that our proposal can significantly improve the rationality and accuracy of process behavioral similarity measurement.
{"title":"A Time-Aware Method to Process Behavioral Similarity Calculation","authors":"Hua Huang, Rong Peng, Zaiwen Feng","doi":"10.1109/SCC.2016.58","DOIUrl":"https://doi.org/10.1109/SCC.2016.58","url":null,"abstract":"Process behavioral similarity calculation is widely used in many activities of business process management, such as process mining, process clustering and process retrieval. However, most existing process behavioral similarity measurement methods do not consider variable constraints (e.g. time constraints) in process models. Since the variable constraints of tasks, especially time constraints, are crucial to quantify the differences between the executions of tasks with the same or similar labels in process models, it is significant to calculate exact process behavioral similarity with the consideration of their impacts in process models. In this paper, we formally define the process behavioral similarity with time constraints and propose a time-aware method to efficiently compute the process behavioral similarity based on the ordering relations with time constraints. Experiments illustrate that our proposal can significantly improve the rationality and accuracy of process behavioral similarity measurement.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116166877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The lack of a framework that provides for business process outsourcing to the cloud hinders the widespread adoption of this emerging computing environment. Unlike the multiple decision methods related to outsourcing classical applications in a cloud environment, there is no standard dealing with the outsourcing of business processes starting from the enterprise business concerns to select the appropriate business process to be outsourced, to a finer level of decision to select the business process fragments to be supported by the cloud. In this paper, we first present an end-to-end framework that addresses some of these shortages. The presented framework, entitled Business Process Outsourcing to the cloud (BPO2C), covers the outsourcing process lifecyle. Indeed, the BPO2C framework elaborates several phases pertinent to the outsourcing decision, starting from the elaboration of the enterprise business motivations to identify the implied business process in the outsourcing decision, to the identification of outsourceable process fragments to minimize the business process costs, duration and to mitigate cloud risks.
{"title":"A Comprehensive Framework for Business Process Outsourcing to the Cloud","authors":"M. Rekik, Khouloud Boukadi, H. Ben-Abdallah","doi":"10.1109/SCC.2016.30","DOIUrl":"https://doi.org/10.1109/SCC.2016.30","url":null,"abstract":"The lack of a framework that provides for business process outsourcing to the cloud hinders the widespread adoption of this emerging computing environment. Unlike the multiple decision methods related to outsourcing classical applications in a cloud environment, there is no standard dealing with the outsourcing of business processes starting from the enterprise business concerns to select the appropriate business process to be outsourced, to a finer level of decision to select the business process fragments to be supported by the cloud. In this paper, we first present an end-to-end framework that addresses some of these shortages. The presented framework, entitled Business Process Outsourcing to the cloud (BPO2C), covers the outsourcing process lifecyle. Indeed, the BPO2C framework elaborates several phases pertinent to the outsourcing decision, starting from the elaboration of the enterprise business motivations to identify the implied business process in the outsourcing decision, to the identification of outsourceable process fragments to minimize the business process costs, duration and to mitigate cloud risks.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122402054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marlon Cordeiro Domenech, Leonardo R. P. Rauta, Marcelo Dornbusch Lopes, Paulo H. Da Silva, R. C. Silva, Benjamin W. Mezger, Michelle S. Wangham
Remote monitoring and intelligent intervention of machines are essentials in a smart industrial environment. However, the heterogeneity of machines makes it difficult to construct solutions for this purpose. This work aims to describe how to provide smart industrial environments using Smart Gateways, RESTful Web Services, and Cloud Computing. In the proposed solution, a Smart Gateway is responsible for representing a given machines' resources as RESTful Web Services for clients and Web applications, sending monitored data to a persistence service in a Cloud, while also allowing for the remote control of these machines. As a proof of concept, a smart industrial environment was developed from the considerations of a real case study at an apparel factory. Functional testing and performance evaluation confirmed the feasibility of the solution in this case study.
{"title":"Providing a Smart Industrial Environment with the Web of Things and Cloud Computing","authors":"Marlon Cordeiro Domenech, Leonardo R. P. Rauta, Marcelo Dornbusch Lopes, Paulo H. Da Silva, R. C. Silva, Benjamin W. Mezger, Michelle S. Wangham","doi":"10.1109/SCC.2016.89","DOIUrl":"https://doi.org/10.1109/SCC.2016.89","url":null,"abstract":"Remote monitoring and intelligent intervention of machines are essentials in a smart industrial environment. However, the heterogeneity of machines makes it difficult to construct solutions for this purpose. This work aims to describe how to provide smart industrial environments using Smart Gateways, RESTful Web Services, and Cloud Computing. In the proposed solution, a Smart Gateway is responsible for representing a given machines' resources as RESTful Web Services for clients and Web applications, sending monitored data to a persistence service in a Cloud, while also allowing for the remote control of these machines. As a proof of concept, a smart industrial environment was developed from the considerations of a real case study at an apparel factory. Functional testing and performance evaluation confirmed the feasibility of the solution in this case study.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elaheh Shafieibavani, M. Ebrahimi, R. Wong, Fang Chen
It can be time consuming to search Internet news, due to multiple sources reporting repetitive information. Given a query and a set of relevant text articles, query-focused multi-document summarization (QMDS) aims to generate a fluent, well-organized, and compact summary that answers the query. While QMDS helps to summarize search results, most top-performing systems for this purpose remain largely extractive. Extractive summarization extracts a group of sentences and concatenates them. In this paper, we propose a summarization service based on abstractive QMDS using multi-sentence compression (MSC). Our proposed service generates a novel summary representing the gist of the content of the source document(s). Experiments using popular summarization benchmark datasets demonstrate the effectiveness of the proposed service.
{"title":"A Query-Based Summarization Service from Multiple News Sources","authors":"Elaheh Shafieibavani, M. Ebrahimi, R. Wong, Fang Chen","doi":"10.1109/SCC.2016.13","DOIUrl":"https://doi.org/10.1109/SCC.2016.13","url":null,"abstract":"It can be time consuming to search Internet news, due to multiple sources reporting repetitive information. Given a query and a set of relevant text articles, query-focused multi-document summarization (QMDS) aims to generate a fluent, well-organized, and compact summary that answers the query. While QMDS helps to summarize search results, most top-performing systems for this purpose remain largely extractive. Extractive summarization extracts a group of sentences and concatenates them. In this paper, we propose a summarization service based on abstractive QMDS using multi-sentence compression (MSC). Our proposed service generates a novel summary representing the gist of the content of the source document(s). Experiments using popular summarization benchmark datasets demonstrate the effectiveness of the proposed service.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122548241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Business process dynamics in services computing has become more and more important to satisfy today's variable enterprise requirements. Existing business process systems lack support for business process flexibility in practice, it has become increasingly difficult to cope with variable enterprise needs. To solve this problem, a dynamic business process model is introduced in this paper, and a dynamic business process generation algorithm is proposed. The verification of the generated business process is based on the Kripke structure to verify the proposed correctness properties specified in Computational Tree Logic (CTL). We implement a dynamic expansion module for dynamic business process engine based on jBPM5, in that way, a black box in the business process definition can be generated dynamically according to the Drools rules. We demonstrate the proposed approach in a real auditing business process system project. Our approach is generic and can reduce the maintenance costs and the risks during the project.
为了满足当今多变的企业需求,服务计算中的业务流程动态变得越来越重要。现有的业务流程系统缺乏对业务流程灵活性的支持,在实践中越来越难以应对多变的企业需求。为了解决这一问题,本文引入了动态业务流程模型,并提出了动态业务流程生成算法。生成的业务流程的验证基于Kripke结构,以验证在计算树逻辑(Computational Tree Logic, CTL)中指定的建议正确性属性。我们实现了基于jBPM5的动态业务流程引擎的动态扩展模块,这样就可以根据Drools规则动态生成业务流程定义中的黑盒。我们在一个实际的审计业务流程系统项目中演示了所建议的方法。我们的方法是通用的,可以减少项目期间的维护成本和风险。
{"title":"Dynamic Business Process Generation and Verification","authors":"Budan Wu, Rongheng Lin, Pengjie Wang, Junliang Chen","doi":"10.1109/SCC.2016.118","DOIUrl":"https://doi.org/10.1109/SCC.2016.118","url":null,"abstract":"Business process dynamics in services computing has become more and more important to satisfy today's variable enterprise requirements. Existing business process systems lack support for business process flexibility in practice, it has become increasingly difficult to cope with variable enterprise needs. To solve this problem, a dynamic business process model is introduced in this paper, and a dynamic business process generation algorithm is proposed. The verification of the generated business process is based on the Kripke structure to verify the proposed correctness properties specified in Computational Tree Logic (CTL). We implement a dynamic expansion module for dynamic business process engine based on jBPM5, in that way, a black box in the business process definition can be generated dynamically according to the Drools rules. We demonstrate the proposed approach in a real auditing business process system project. Our approach is generic and can reduce the maintenance costs and the risks during the project.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122622334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The concept of containerization and virtualization is getting traction in the cloud based IT environments. Docker engine is popular implementation for simplifying and streamlining containerization technology. IT industry realizes numerous automation and acceleration features and facilities through the embracement of the Docker-sponsored containerization paradigm, which is an operating system (OS)-level and lightweight virtualization. However the security issues affect the widespread and confident usage of Docker platform. In this paper, we have discussed important security issues of the Docker containers as well as the related work that is being carried out in this area. Also we have proposed security algorithms and methods to address DoS attacks related issues in the Docker container technology. The preliminary experiments and testing of the security methods are promising.
{"title":"Securing Docker Containers from Denial of Service (DoS) Attacks","authors":"Jeeva Chelladhurai, P. Chelliah, S. Kumar","doi":"10.1109/SCC.2016.123","DOIUrl":"https://doi.org/10.1109/SCC.2016.123","url":null,"abstract":"The concept of containerization and virtualization is getting traction in the cloud based IT environments. Docker engine is popular implementation for simplifying and streamlining containerization technology. IT industry realizes numerous automation and acceleration features and facilities through the embracement of the Docker-sponsored containerization paradigm, which is an operating system (OS)-level and lightweight virtualization. However the security issues affect the widespread and confident usage of Docker platform. In this paper, we have discussed important security issues of the Docker containers as well as the related work that is being carried out in this area. Also we have proposed security algorithms and methods to address DoS attacks related issues in the Docker container technology. The preliminary experiments and testing of the security methods are promising.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}