The ever increasing utilisation of crowdsourcing in various domains and its popularity as a method of accessing free or inexpensive labour, services, and innovation, and also as a method of providing fast solutions is observed as a good opportunity for both non-profit and for-profit organisations while it also appeals to members of the crowd. In particular, many cloud-based projects have benefited from crowdsourcing their needs for resources and they rely on the crowd and the resources they provide, either for free or for a nominal fee. However, current cloud platforms either provide services to the crowd or request services from them. Moreover, cloud services generally include a legally binding contract between the cloud service providers and cloud service clients. In this paper, the possible opportunities for applying crowdsourcing principles in the cloud in a new fashion are reviewed by proposing the idea of crowdcloud. Crowdcloud simply refers to the availability of cloud infrastructure, cloud platform, and cloud software services to the crowd by the crowd with or without a legally binding contract. This paper discusses the differences between crowdcloud and other similar notions already in existence. Then, a functional architecture is proposed for crowdcloud and its constituents. Some of the advantages of crowdcloud, along with potential issues in crowdcloud and how to circumvent or minimise them are also reviewed and discussed.
{"title":"Crowdcloud: Cloud of the Crowd","authors":"M. Hosseini","doi":"10.1109/FiCloud.2017.22","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.22","url":null,"abstract":"The ever increasing utilisation of crowdsourcing in various domains and its popularity as a method of accessing free or inexpensive labour, services, and innovation, and also as a method of providing fast solutions is observed as a good opportunity for both non-profit and for-profit organisations while it also appeals to members of the crowd. In particular, many cloud-based projects have benefited from crowdsourcing their needs for resources and they rely on the crowd and the resources they provide, either for free or for a nominal fee. However, current cloud platforms either provide services to the crowd or request services from them. Moreover, cloud services generally include a legally binding contract between the cloud service providers and cloud service clients. In this paper, the possible opportunities for applying crowdsourcing principles in the cloud in a new fashion are reviewed by proposing the idea of crowdcloud. Crowdcloud simply refers to the availability of cloud infrastructure, cloud platform, and cloud software services to the crowd by the crowd with or without a legally binding contract. This paper discusses the differences between crowdcloud and other similar notions already in existence. Then, a functional architecture is proposed for crowdcloud and its constituents. Some of the advantages of crowdcloud, along with potential issues in crowdcloud and how to circumvent or minimise them are also reviewed and discussed.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115101323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Servitization is a time-consuming-, and needs to be persistent-, process at the companies, especially in the IT branch. Thus, a company must find itself properly, on which phase of this process it is operating in, to perform further accurate steps, to succeed in a short time with this development, since the competition in the IT industry is highly dynamic. Accordingly, we perform in this paper an analysis of the customization grade in relation to the degree of integration into the product/service provided by a company. The analysis is based on the segments evaluation a company operates on. We study also the Servitization change processes in different business segments, based on the real scenarios of two mayor players in the IT business – Microsoft and HP, as well as revenue distribution/change within the ten years period.
{"title":"Comparative Analysis of Two Operational Developments within IT Companies' Servitization - Microsoft and HP","authors":"L. Bickel, N. Kryvinska","doi":"10.1109/FiCloud.2017.28","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.28","url":null,"abstract":"Servitization is a time-consuming-, and needs to be persistent-, process at the companies, especially in the IT branch. Thus, a company must find itself properly, on which phase of this process it is operating in, to perform further accurate steps, to succeed in a short time with this development, since the competition in the IT industry is highly dynamic. Accordingly, we perform in this paper an analysis of the customization grade in relation to the degree of integration into the product/service provided by a company. The analysis is based on the segments evaluation a company operates on. We study also the Servitization change processes in different business segments, based on the real scenarios of two mayor players in the IT business – Microsoft and HP, as well as revenue distribution/change within the ten years period.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130438423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smart mobile devices are fundamental date sources for crowd activity tracing. Large-scale mobile networks and the Internet-of-Things (IoT) expand and become part of perva-sive and ubiquitous computing offering distributed and trans-parent services. With the IoT, Crowd Sensing is extended by Things Sensing, creating heterogeneous smart environments. A unified and common data processing and communication methodology is required so that the IoT, mobile networks, and Cloud-based environments seamlessly integrate, which can be fulfilled by self-organizing mobile agents, discussed in this work. Currently, portability, resource constraints, security, and scalability of Agent Processing Platforms (APP) are essen-tial issues for the deployment of Multi-agent Systems (MAS) in highly heterogeneous networks. Beside the operational aspects of MAS, an organizational structure is required for the deployment of MAS in crowd sensing and social mining applications. The Planetary Nervous system (Nervousnet) consists of virtual sensors building the core functionality for such applica-tions running on smart phones with a Cloud-like architecture. The virtual sensors enable a holistic composition and modelling approach. Self-organizing and adaptive mobile agents are well known as the core cells of holistic and modular systems. In this work, both concepts are combined. JavaScript agents are introduced as virtual sensors in the Nervousnet environment, evaluated with a simulation of a distributed sensor fusion use-case in a mobile network based on real-world data from Nerv-ousnet, showing the suitability of the hybrid approach, benefit-ing from local and event-based sensor processing performed by the MAS.
{"title":"An Ubiquitous Multi-agent Mobile Platform for Distributed Crowd Sensing and Social Mining","authors":"S. Bosse, Evangelos Pournaras","doi":"10.1109/FiCloud.2017.44","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.44","url":null,"abstract":"Smart mobile devices are fundamental date sources for crowd activity tracing. Large-scale mobile networks and the Internet-of-Things (IoT) expand and become part of perva-sive and ubiquitous computing offering distributed and trans-parent services. With the IoT, Crowd Sensing is extended by Things Sensing, creating heterogeneous smart environments. A unified and common data processing and communication methodology is required so that the IoT, mobile networks, and Cloud-based environments seamlessly integrate, which can be fulfilled by self-organizing mobile agents, discussed in this work. Currently, portability, resource constraints, security, and scalability of Agent Processing Platforms (APP) are essen-tial issues for the deployment of Multi-agent Systems (MAS) in highly heterogeneous networks. Beside the operational aspects of MAS, an organizational structure is required for the deployment of MAS in crowd sensing and social mining applications. The Planetary Nervous system (Nervousnet) consists of virtual sensors building the core functionality for such applica-tions running on smart phones with a Cloud-like architecture. The virtual sensors enable a holistic composition and modelling approach. Self-organizing and adaptive mobile agents are well known as the core cells of holistic and modular systems. In this work, both concepts are combined. JavaScript agents are introduced as virtual sensors in the Nervousnet environment, evaluated with a simulation of a distributed sensor fusion use-case in a mobile network based on real-world data from Nerv-ousnet, showing the suitability of the hybrid approach, benefit-ing from local and event-based sensor processing performed by the MAS.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134219767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Migration of existing enterprise applications to the Cloud requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating the application with functional and non-functional aspects. However, none of them has focused so far on the adaptation of security and privacy. In our previous work, Identity-as-a-service (IDaaS) decouples Authentication and Authorization Infrastructure (AAI) from the business logic of the application as a manageable resource for the Cloud provider to control its life cycle. Since IDaaS controls the complete security chain, it can coordinate automated trust negotiation between Cloud services in federated security domains. On the other hand, IDaaS provides identity federation for Cloud users to access multiple service providers on demand but also may preserve user's privacy. In this paper, we continue to model a security topology for the Cloud applications. A security topology describes an abstract layer of AAI's components, requirements, and trust relationship between them. It preserves the provisioning of AAI across different environments for interoperability, portability, and enables a dynamic trust relationship with other services on demand.
{"title":"How to Adapt Authentication and Authorization Infrastructure of Applications for the Cloud","authors":"T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann","doi":"10.1109/FiCloud.2017.14","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.14","url":null,"abstract":"Migration of existing enterprise applications to the Cloud requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating the application with functional and non-functional aspects. However, none of them has focused so far on the adaptation of security and privacy. In our previous work, Identity-as-a-service (IDaaS) decouples Authentication and Authorization Infrastructure (AAI) from the business logic of the application as a manageable resource for the Cloud provider to control its life cycle. Since IDaaS controls the complete security chain, it can coordinate automated trust negotiation between Cloud services in federated security domains. On the other hand, IDaaS provides identity federation for Cloud users to access multiple service providers on demand but also may preserve user's privacy. In this paper, we continue to model a security topology for the Cloud applications. A security topology describes an abstract layer of AAI's components, requirements, and trust relationship between them. It preserves the provisioning of AAI across different environments for interoperability, portability, and enables a dynamic trust relationship with other services on demand.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126535550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xing Liu, Zheyi Chen, Kun Hua, Mingyue Liu, Junyi Zhang
Recently, Vehicular Ad-hoc Network (VANET) has been drawing lots of attentions from many researchers. It is considered as an important future network for Intelligent Transportation Systems (ITS). Meanwhile, the cloud network has been gradually accepted by more and more customers as a flexible storage and computing facility. In this paper, we propose a novel communication system to integrate vehicular network and Cloud to provide shareable multimedia services, i.e., local news, weather forecast, popular game videos etc. To achieve this goal, a relay-selective multi-hop scheme is designed in this system where Road Side Units (RSU) will be allocated by Cloud assistance to provide multimedia services. This scheme has been proved to be able to take precautionary measures for severe weathers and also reduce transmission burdens in wireless channels. Moreover, we apply the Hybrid Automatic Repeat Quest (HARQ) mechanism based on multimedia data to improve the transmission reliability. Simulation results show that our proposed scheme can support and improve the shareable multimedia service, especially in throughput-sensitive and high-speed vehicular networks.
近年来,车载自组织网络(Vehicular Ad-hoc Network, VANET)受到了许多研究者的关注。它被认为是未来智能交通系统(ITS)的重要网络。同时,云网络作为一种灵活的存储和计算设施,已经逐渐被越来越多的客户所接受。在本文中,我们提出了一种新的通信系统,将车联网与云相结合,提供可共享的多媒体服务,如本地新闻、天气预报、热门游戏视频等。为了实现这一目标,本系统设计了中继选择性多跳方案,通过Cloud assistance分配路旁单元(Road Side Units, RSU)提供多媒体服务。该方案已被证明能够对恶劣天气采取预防措施,并减少无线信道的传输负担。此外,我们还采用了基于多媒体数据的混合自动重复请求(HARQ)机制来提高传输可靠性。仿真结果表明,该方案能够支持和改进可共享的多媒体业务,特别是在吞吐量敏感的高速车载网络中。
{"title":"An Adaptive Multimedia Signal Transmission Strategy in Cloud-Assisted Vehicular Networks","authors":"Xing Liu, Zheyi Chen, Kun Hua, Mingyue Liu, Junyi Zhang","doi":"10.1109/FiCloud.2017.42","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.42","url":null,"abstract":"Recently, Vehicular Ad-hoc Network (VANET) has been drawing lots of attentions from many researchers. It is considered as an important future network for Intelligent Transportation Systems (ITS). Meanwhile, the cloud network has been gradually accepted by more and more customers as a flexible storage and computing facility. In this paper, we propose a novel communication system to integrate vehicular network and Cloud to provide shareable multimedia services, i.e., local news, weather forecast, popular game videos etc. To achieve this goal, a relay-selective multi-hop scheme is designed in this system where Road Side Units (RSU) will be allocated by Cloud assistance to provide multimedia services. This scheme has been proved to be able to take precautionary measures for severe weathers and also reduce transmission burdens in wireless channels. Moreover, we apply the Hybrid Automatic Repeat Quest (HARQ) mechanism based on multimedia data to improve the transmission reliability. Simulation results show that our proposed scheme can support and improve the shareable multimedia service, especially in throughput-sensitive and high-speed vehicular networks.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133072847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work, telemetry system is proposed by using Internet of objects (IoT) paradigm. IoT has become widespread as a result of the increase in the number of addressable devices, especially with the transition of internet to IPv6. The downsizing of the sensing devices, the ability to operate with low energy on their own, and the ability to communicate can also have a positive impact on the development of IoT. IoT is not yet standardized. At present, three-layer and five-layer standards are recommended for IoT. Both tiered architectures are not yet discussed sufficiently. Because telemetry systems provide realtime monitoring, they can be designed on an IoT basis, providing instant data analysis and visualization for users. In this study, a telemetry system with reference to the five-layered IoT architecture in the literature is proposed. The proposed system is low cost and can be integrated and scalable into other monitoring systems.
{"title":"IoT-based Real-Time Telemetry System Design: An Approach","authors":"A. Albayrak","doi":"10.1109/FiCloud.2017.40","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.40","url":null,"abstract":"In this work, telemetry system is proposed by using Internet of objects (IoT) paradigm. IoT has become widespread as a result of the increase in the number of addressable devices, especially with the transition of internet to IPv6. The downsizing of the sensing devices, the ability to operate with low energy on their own, and the ability to communicate can also have a positive impact on the development of IoT. IoT is not yet standardized. At present, three-layer and five-layer standards are recommended for IoT. Both tiered architectures are not yet discussed sufficiently. Because telemetry systems provide realtime monitoring, they can be designed on an IoT basis, providing instant data analysis and visualization for users. In this study, a telemetry system with reference to the five-layered IoT architecture in the literature is proposed. The proposed system is low cost and can be integrated and scalable into other monitoring systems.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115750825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Obinna Ethelbert, Faraz Fatemi Moghaddam, P. Wieder, R. Yahyapour
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its challenges – such as governance, security, and privacy. This paper is focused on the security and privacy challenges of cloud computing with specific reference to user authentication and access management for cloud SaaS applications. The suggested model uses a framework that harnesses the stateless and secure nature of JWT for client authentication and session management. Furthermore, authorized access to protected cloud SaaS resources have been efficiently managed. Accordingly, a Policy Match Gate (PMG) component and a Policy Activity Monitor (PAM) component have been introduced. In addition, other subcomponents such as a Policy Validation Unit (PVU) and a Policy Proxy DB (PPDB) have also been established for optimized service delivery. A theoretical analysis of the proposed model portrays a system that is secure, lightweight and highly scalable for improved cloud resource security and management.
{"title":"A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications","authors":"Obinna Ethelbert, Faraz Fatemi Moghaddam, P. Wieder, R. Yahyapour","doi":"10.1109/FiCloud.2017.29","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.29","url":null,"abstract":"Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its challenges – such as governance, security, and privacy. This paper is focused on the security and privacy challenges of cloud computing with specific reference to user authentication and access management for cloud SaaS applications. The suggested model uses a framework that harnesses the stateless and secure nature of JWT for client authentication and session management. Furthermore, authorized access to protected cloud SaaS resources have been efficiently managed. Accordingly, a Policy Match Gate (PMG) component and a Policy Activity Monitor (PAM) component have been introduced. In addition, other subcomponents such as a Policy Validation Unit (PVU) and a Policy Proxy DB (PPDB) have also been established for optimized service delivery. A theoretical analysis of the proposed model portrays a system that is secure, lightweight and highly scalable for improved cloud resource security and management.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121975240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Modern high performance computing and cloud computing infrastructures often leverage Graphic Processing Units (GPUs) to provide accelerated, massively parallel computational power. This performance gain, however, may also introduce higher energy consumption. The energy challenge has become more and more pronounced when the system scales. To address this challenge, we propose Archon, a framework for supporting energy-efficient computing on CPU-GPU heterogeneous architectures. Specifically, Archon takes user's programs as input, automatically distribute the workload between CPU and GPU, and dynamically tunes the distribution ratio at runtime for an energy-efficient execution. Experiments have been carried out to evaluate the effectiveness of Archon, and the results show that it can achieve considerable energy savings at runtime, without significant efforts from the programmers.
{"title":"Supporting Energy-Efficient Computing on Heterogeneous CPU-GPU Architectures","authors":"K. Siehl, Xinghui Zhao","doi":"10.1109/FiCloud.2017.46","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.46","url":null,"abstract":"Modern high performance computing and cloud computing infrastructures often leverage Graphic Processing Units (GPUs) to provide accelerated, massively parallel computational power. This performance gain, however, may also introduce higher energy consumption. The energy challenge has become more and more pronounced when the system scales. To address this challenge, we propose Archon, a framework for supporting energy-efficient computing on CPU-GPU heterogeneous architectures. Specifically, Archon takes user's programs as input, automatically distribute the workload between CPU and GPU, and dynamically tunes the distribution ratio at runtime for an energy-efficient execution. Experiments have been carried out to evaluate the effectiveness of Archon, and the results show that it can achieve considerable energy savings at runtime, without significant efforts from the programmers.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The survey of related works on insider information security (IS) threats is presented. Special attention is paid to works that consider the insiders' behavioral models as it is very up-to-date for behavioral intrusion detection. Three key research directions are defined: 1) the problem analysis in general, including the development of taxonomy for insiders, attacks and countermeasures; 2) study of a specific IS threat with forecasting model development; 3) early detection of a potential insider. The models for the second and third directions are analyzed in detail. Among the second group the works on three IS threats are examined, namely insider espionage, cyber sabotage and unintentional internal IS violation. Discussion and a few directions for the future research conclude the paper.
{"title":"Critical Analysis in the Research Area of Insider Threats","authors":"A. Zaytsev, A. Malyuk, N. Miloslavskaya","doi":"10.1109/FiCloud.2017.16","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.16","url":null,"abstract":"The survey of related works on insider information security (IS) threats is presented. Special attention is paid to works that consider the insiders' behavioral models as it is very up-to-date for behavioral intrusion detection. Three key research directions are defined: 1) the problem analysis in general, including the development of taxonomy for insiders, attacks and countermeasures; 2) study of a specific IS threat with forecasting model development; 3) early detection of a potential insider. The models for the second and third directions are analyzed in detail. Among the second group the works on three IS threats are examined, namely insider espionage, cyber sabotage and unintentional internal IS violation. Discussion and a few directions for the future research conclude the paper.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126231312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adamu Hussaini, Bashir Mohammed, A. M. Bukar, A. Cullen, H. Ugail, I. Awan
Failure in cloud system is defined as an even that occurs when the delivered service deviates from the correct intended service. As the cloud computing systems continue to grow in scale and complexity, there is an urgent need for cloud service providers (CSP) to guarantee a reliable on-demand resource to their customers in the presence of faults thereby fulfilling their service level agreement (SLA). Component failures in cloud systems are very familiar phenomena. However, large cloud service providers' data centers should be designed to provide a certain level of availability to the business system. Infrastructure-as-a-service (Iaas) cloud delivery model presents computational resources (CPU and memory), storage resources and networking capacity that ensures high availability in the presence of such failures. The data in-production-faults recorded within a 2 years period has been studied and analyzed from the National Energy Research Scientific computing center (NERSC). Using the real-time data collected from the Computer Failure Data Repository (CFDR), this paper presents the performance of two machine learning (ML) algorithms, Linear Regression (LR) Model and Support Vector Machine (SVM) with a Linear Gaussian kernel for predicting hardware failures in a real-time cloud environment to improve system availability. The performance of the two algorithms have been rigorously evaluated using K-folds cross-validation technique. Furthermore, steps and procedure for future studies has been presented. This research will aid computer hardware companies and cloud service providers (CSP) in designing a reliable fault-tolerant system by providing a better device selection, thereby improving system availability and minimizing unscheduled system downtime.
{"title":"An Approach to Failure Prediction in a Cloud Based Environment","authors":"Adamu Hussaini, Bashir Mohammed, A. M. Bukar, A. Cullen, H. Ugail, I. Awan","doi":"10.1109/FiCloud.2017.56","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.56","url":null,"abstract":"Failure in cloud system is defined as an even that occurs when the delivered service deviates from the correct intended service. As the cloud computing systems continue to grow in scale and complexity, there is an urgent need for cloud service providers (CSP) to guarantee a reliable on-demand resource to their customers in the presence of faults thereby fulfilling their service level agreement (SLA). Component failures in cloud systems are very familiar phenomena. However, large cloud service providers' data centers should be designed to provide a certain level of availability to the business system. Infrastructure-as-a-service (Iaas) cloud delivery model presents computational resources (CPU and memory), storage resources and networking capacity that ensures high availability in the presence of such failures. The data in-production-faults recorded within a 2 years period has been studied and analyzed from the National Energy Research Scientific computing center (NERSC). Using the real-time data collected from the Computer Failure Data Repository (CFDR), this paper presents the performance of two machine learning (ML) algorithms, Linear Regression (LR) Model and Support Vector Machine (SVM) with a Linear Gaussian kernel for predicting hardware failures in a real-time cloud environment to improve system availability. The performance of the two algorithms have been rigorously evaluated using K-folds cross-validation technique. Furthermore, steps and procedure for future studies has been presented. This research will aid computer hardware companies and cloud service providers (CSP) in designing a reliable fault-tolerant system by providing a better device selection, thereby improving system availability and minimizing unscheduled system downtime.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115142505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}