首页 > 最新文献

2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)最新文献

英文 中文
Crowdcloud: Cloud of the Crowd Crowdcloud:群众的云
M. Hosseini
The ever increasing utilisation of crowdsourcing in various domains and its popularity as a method of accessing free or inexpensive labour, services, and innovation, and also as a method of providing fast solutions is observed as a good opportunity for both non-profit and for-profit organisations while it also appeals to members of the crowd. In particular, many cloud-based projects have benefited from crowdsourcing their needs for resources and they rely on the crowd and the resources they provide, either for free or for a nominal fee. However, current cloud platforms either provide services to the crowd or request services from them. Moreover, cloud services generally include a legally binding contract between the cloud service providers and cloud service clients. In this paper, the possible opportunities for applying crowdsourcing principles in the cloud in a new fashion are reviewed by proposing the idea of crowdcloud. Crowdcloud simply refers to the availability of cloud infrastructure, cloud platform, and cloud software services to the crowd by the crowd with or without a legally binding contract. This paper discusses the differences between crowdcloud and other similar notions already in existence. Then, a functional architecture is proposed for crowdcloud and its constituents. Some of the advantages of crowdcloud, along with potential issues in crowdcloud and how to circumvent or minimise them are also reviewed and discussed.
众包在各个领域的应用越来越多,它作为一种获得免费或廉价劳动力、服务和创新的方法,以及作为一种提供快速解决方案的方法,被认为是非营利组织和营利组织的一个好机会,同时它也吸引了人群的成员。特别是,许多基于云的项目受益于众包他们对资源的需求,他们依赖于他们提供的人群和资源,无论是免费的还是象征性的费用。然而,目前的云平台要么向人群提供服务,要么向他们请求服务。此外,云服务通常包括云服务提供商和云服务客户之间具有法律约束力的合同。在本文中,通过提出众云的概念,回顾了以一种新的方式在云中应用众包原则的可能机会。众云(Crowdcloud)是指通过或不通过具有法律约束力的合同将云基础设施、云平台和云软件服务提供给大众。本文讨论了众云与其他已经存在的类似概念的区别。然后,提出了一种面向众云及其组成部分的功能架构。本文还回顾和讨论了众云的一些优势,以及众云的潜在问题以及如何规避或最小化这些问题。
{"title":"Crowdcloud: Cloud of the Crowd","authors":"M. Hosseini","doi":"10.1109/FiCloud.2017.22","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.22","url":null,"abstract":"The ever increasing utilisation of crowdsourcing in various domains and its popularity as a method of accessing free or inexpensive labour, services, and innovation, and also as a method of providing fast solutions is observed as a good opportunity for both non-profit and for-profit organisations while it also appeals to members of the crowd. In particular, many cloud-based projects have benefited from crowdsourcing their needs for resources and they rely on the crowd and the resources they provide, either for free or for a nominal fee. However, current cloud platforms either provide services to the crowd or request services from them. Moreover, cloud services generally include a legally binding contract between the cloud service providers and cloud service clients. In this paper, the possible opportunities for applying crowdsourcing principles in the cloud in a new fashion are reviewed by proposing the idea of crowdcloud. Crowdcloud simply refers to the availability of cloud infrastructure, cloud platform, and cloud software services to the crowd by the crowd with or without a legally binding contract. This paper discusses the differences between crowdcloud and other similar notions already in existence. Then, a functional architecture is proposed for crowdcloud and its constituents. Some of the advantages of crowdcloud, along with potential issues in crowdcloud and how to circumvent or minimise them are also reviewed and discussed.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115101323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Analysis of Two Operational Developments within IT Companies' Servitization - Microsoft and HP 两家IT公司服务化运营发展的比较分析——微软和惠普
L. Bickel, N. Kryvinska
Servitization is a time-consuming-, and needs to be persistent-, process at the companies, especially in the IT branch. Thus, a company must find itself properly, on which phase of this process it is operating in, to perform further accurate steps, to succeed in a short time with this development, since the competition in the IT industry is highly dynamic. Accordingly, we perform in this paper an analysis of the customization grade in relation to the degree of integration into the product/service provided by a company. The analysis is based on the segments evaluation a company operates on. We study also the Servitization change processes in different business segments, based on the real scenarios of two mayor players in the IT business – Microsoft and HP, as well as revenue distribution/change within the ten years period.
在公司中,特别是在IT分支中,服务化是一个耗时且需要持久的过程。因此,由于it行业的竞争是高度动态的,公司必须正确地找到自己,在这个过程的哪个阶段操作,执行进一步的准确步骤,在短时间内取得成功。因此,我们在本文中分析了定制等级与公司提供的产品/服务集成程度的关系。该分析是基于对公司运营的细分市场的评估。我们还基于IT业务中两个主要参与者的真实场景,研究了不同业务部门的服务化变化过程–微软和惠普,以及十年内的收入分配/变化。
{"title":"Comparative Analysis of Two Operational Developments within IT Companies' Servitization - Microsoft and HP","authors":"L. Bickel, N. Kryvinska","doi":"10.1109/FiCloud.2017.28","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.28","url":null,"abstract":"Servitization is a time-consuming-, and needs to be persistent-, process at the companies, especially in the IT branch. Thus, a company must find itself properly, on which phase of this process it is operating in, to perform further accurate steps, to succeed in a short time with this development, since the competition in the IT industry is highly dynamic. Accordingly, we perform in this paper an analysis of the customization grade in relation to the degree of integration into the product/service provided by a company. The analysis is based on the segments evaluation a company operates on. We study also the Servitization change processes in different business segments, based on the real scenarios of two mayor players in the IT business – Microsoft and HP, as well as revenue distribution/change within the ten years period.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130438423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Ubiquitous Multi-agent Mobile Platform for Distributed Crowd Sensing and Social Mining 面向分布式人群感知和社交挖掘的泛在多智能体移动平台
S. Bosse, Evangelos Pournaras
Smart mobile devices are fundamental date sources for crowd activity tracing. Large-scale mobile networks and the Internet-of-Things (IoT) expand and become part of perva-sive and ubiquitous computing offering distributed and trans-parent services. With the IoT, Crowd Sensing is extended by Things Sensing, creating heterogeneous smart environments. A unified and common data processing and communication methodology is required so that the IoT, mobile networks, and Cloud-based environments seamlessly integrate, which can be fulfilled by self-organizing mobile agents, discussed in this work. Currently, portability, resource constraints, security, and scalability of Agent Processing Platforms (APP) are essen-tial issues for the deployment of Multi-agent Systems (MAS) in highly heterogeneous networks. Beside the operational aspects of MAS, an organizational structure is required for the deployment of MAS in crowd sensing and social mining applications. The Planetary Nervous system (Nervousnet) consists of virtual sensors building the core functionality for such applica-tions running on smart phones with a Cloud-like architecture. The virtual sensors enable a holistic composition and modelling approach. Self-organizing and adaptive mobile agents are well known as the core cells of holistic and modular systems. In this work, both concepts are combined. JavaScript agents are introduced as virtual sensors in the Nervousnet environment, evaluated with a simulation of a distributed sensor fusion use-case in a mobile network based on real-world data from Nerv-ousnet, showing the suitability of the hybrid approach, benefit-ing from local and event-based sensor processing performed by the MAS.
智能移动设备是人群活动跟踪的基本数据来源。大规模移动网络和物联网(IoT)扩展并成为无处不在的计算的一部分,提供分布式和透明的服务。随着物联网的发展,物联网(Things Sensing)扩展了人群感知(Crowd Sensing),创造了异构的智能环境。需要统一和通用的数据处理和通信方法,以便物联网,移动网络和基于云的环境无缝集成,这可以通过自组织移动代理来实现,本工作中讨论了。当前,Agent处理平台(APP)的可移植性、资源约束、安全性和可扩展性是在高度异构网络中部署多Agent系统(MAS)的关键问题。除了MAS的操作方面,在人群感知和社会挖掘应用中部署MAS还需要一个组织结构。行星神经系统(Nervousnet)由虚拟传感器组成,为类似云架构的智能手机上运行的应用程序构建核心功能。虚拟传感器实现了整体构图和建模方法。自组织和自适应移动代理是整体系统和模块化系统的核心单元。在这部作品中,这两个概念被结合起来。JavaScript代理在Nervousnet环境中作为虚拟传感器引入,通过基于Nervousnet真实数据的移动网络中的分布式传感器融合用例模拟进行评估,显示混合方法的适用性,受益于MAS执行的本地和基于事件的传感器处理。
{"title":"An Ubiquitous Multi-agent Mobile Platform for Distributed Crowd Sensing and Social Mining","authors":"S. Bosse, Evangelos Pournaras","doi":"10.1109/FiCloud.2017.44","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.44","url":null,"abstract":"Smart mobile devices are fundamental date sources for crowd activity tracing. Large-scale mobile networks and the Internet-of-Things (IoT) expand and become part of perva-sive and ubiquitous computing offering distributed and trans-parent services. With the IoT, Crowd Sensing is extended by Things Sensing, creating heterogeneous smart environments. A unified and common data processing and communication methodology is required so that the IoT, mobile networks, and Cloud-based environments seamlessly integrate, which can be fulfilled by self-organizing mobile agents, discussed in this work. Currently, portability, resource constraints, security, and scalability of Agent Processing Platforms (APP) are essen-tial issues for the deployment of Multi-agent Systems (MAS) in highly heterogeneous networks. Beside the operational aspects of MAS, an organizational structure is required for the deployment of MAS in crowd sensing and social mining applications. The Planetary Nervous system (Nervousnet) consists of virtual sensors building the core functionality for such applica-tions running on smart phones with a Cloud-like architecture. The virtual sensors enable a holistic composition and modelling approach. Self-organizing and adaptive mobile agents are well known as the core cells of holistic and modular systems. In this work, both concepts are combined. JavaScript agents are introduced as virtual sensors in the Nervousnet environment, evaluated with a simulation of a distributed sensor fusion use-case in a mobile network based on real-world data from Nerv-ousnet, showing the suitability of the hybrid approach, benefit-ing from local and event-based sensor processing performed by the MAS.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134219767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
How to Adapt Authentication and Authorization Infrastructure of Applications for the Cloud 如何使应用程序的认证和授权基础设施适应云
T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann
Migration of existing enterprise applications to the Cloud requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating the application with functional and non-functional aspects. However, none of them has focused so far on the adaptation of security and privacy. In our previous work, Identity-as-a-service (IDaaS) decouples Authentication and Authorization Infrastructure (AAI) from the business logic of the application as a manageable resource for the Cloud provider to control its life cycle. Since IDaaS controls the complete security chain, it can coordinate automated trust negotiation between Cloud services in federated security domains. On the other hand, IDaaS provides identity federation for Cloud users to access multiple service providers on demand but also may preserve user's privacy. In this paper, we continue to model a security topology for the Cloud applications. A security topology describes an abstract layer of AAI's components, requirements, and trust relationship between them. It preserves the provisioning of AAI across different environments for interoperability, portability, and enables a dynamic trust relationship with other services on demand.
将现有企业应用程序迁移到云需要在各个体系结构组件中进行大量的适应工作。现有的工作集中在迁移具有功能和非功能方面的应用程序上。然而,到目前为止,它们都没有把重点放在安全和隐私的适应上。在我们之前的工作中,身份即服务(IDaaS)将身份验证和授权基础设施(AAI)从应用程序的业务逻辑中分离出来,作为云提供商控制其生命周期的可管理资源。由于IDaaS控制着完整的安全链,因此它可以协调联合安全域中的云服务之间的自动信任协商。另一方面,IDaaS为云用户提供身份联合,以便按需访问多个服务提供商,但也可能保护用户的隐私。在本文中,我们将继续为云应用程序建模安全拓扑。安全拓扑描述了AAI组件、需求和它们之间的信任关系的抽象层。它保留了跨不同环境的AAI供应,以实现互操作性、可移植性,并支持与其他按需服务之间的动态信任关系。
{"title":"How to Adapt Authentication and Authorization Infrastructure of Applications for the Cloud","authors":"T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann","doi":"10.1109/FiCloud.2017.14","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.14","url":null,"abstract":"Migration of existing enterprise applications to the Cloud requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating the application with functional and non-functional aspects. However, none of them has focused so far on the adaptation of security and privacy. In our previous work, Identity-as-a-service (IDaaS) decouples Authentication and Authorization Infrastructure (AAI) from the business logic of the application as a manageable resource for the Cloud provider to control its life cycle. Since IDaaS controls the complete security chain, it can coordinate automated trust negotiation between Cloud services in federated security domains. On the other hand, IDaaS provides identity federation for Cloud users to access multiple service providers on demand but also may preserve user's privacy. In this paper, we continue to model a security topology for the Cloud applications. A security topology describes an abstract layer of AAI's components, requirements, and trust relationship between them. It preserves the provisioning of AAI across different environments for interoperability, portability, and enables a dynamic trust relationship with other services on demand.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126535550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Adaptive Multimedia Signal Transmission Strategy in Cloud-Assisted Vehicular Networks 云辅助车辆网络中的自适应多媒体信号传输策略
Xing Liu, Zheyi Chen, Kun Hua, Mingyue Liu, Junyi Zhang
Recently, Vehicular Ad-hoc Network (VANET) has been drawing lots of attentions from many researchers. It is considered as an important future network for Intelligent Transportation Systems (ITS). Meanwhile, the cloud network has been gradually accepted by more and more customers as a flexible storage and computing facility. In this paper, we propose a novel communication system to integrate vehicular network and Cloud to provide shareable multimedia services, i.e., local news, weather forecast, popular game videos etc. To achieve this goal, a relay-selective multi-hop scheme is designed in this system where Road Side Units (RSU) will be allocated by Cloud assistance to provide multimedia services. This scheme has been proved to be able to take precautionary measures for severe weathers and also reduce transmission burdens in wireless channels. Moreover, we apply the Hybrid Automatic Repeat Quest (HARQ) mechanism based on multimedia data to improve the transmission reliability. Simulation results show that our proposed scheme can support and improve the shareable multimedia service, especially in throughput-sensitive and high-speed vehicular networks.
近年来,车载自组织网络(Vehicular Ad-hoc Network, VANET)受到了许多研究者的关注。它被认为是未来智能交通系统(ITS)的重要网络。同时,云网络作为一种灵活的存储和计算设施,已经逐渐被越来越多的客户所接受。在本文中,我们提出了一种新的通信系统,将车联网与云相结合,提供可共享的多媒体服务,如本地新闻、天气预报、热门游戏视频等。为了实现这一目标,本系统设计了中继选择性多跳方案,通过Cloud assistance分配路旁单元(Road Side Units, RSU)提供多媒体服务。该方案已被证明能够对恶劣天气采取预防措施,并减少无线信道的传输负担。此外,我们还采用了基于多媒体数据的混合自动重复请求(HARQ)机制来提高传输可靠性。仿真结果表明,该方案能够支持和改进可共享的多媒体业务,特别是在吞吐量敏感的高速车载网络中。
{"title":"An Adaptive Multimedia Signal Transmission Strategy in Cloud-Assisted Vehicular Networks","authors":"Xing Liu, Zheyi Chen, Kun Hua, Mingyue Liu, Junyi Zhang","doi":"10.1109/FiCloud.2017.42","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.42","url":null,"abstract":"Recently, Vehicular Ad-hoc Network (VANET) has been drawing lots of attentions from many researchers. It is considered as an important future network for Intelligent Transportation Systems (ITS). Meanwhile, the cloud network has been gradually accepted by more and more customers as a flexible storage and computing facility. In this paper, we propose a novel communication system to integrate vehicular network and Cloud to provide shareable multimedia services, i.e., local news, weather forecast, popular game videos etc. To achieve this goal, a relay-selective multi-hop scheme is designed in this system where Road Side Units (RSU) will be allocated by Cloud assistance to provide multimedia services. This scheme has been proved to be able to take precautionary measures for severe weathers and also reduce transmission burdens in wireless channels. Moreover, we apply the Hybrid Automatic Repeat Quest (HARQ) mechanism based on multimedia data to improve the transmission reliability. Simulation results show that our proposed scheme can support and improve the shareable multimedia service, especially in throughput-sensitive and high-speed vehicular networks.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133072847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT-based Real-Time Telemetry System Design: An Approach 基于物联网的实时遥测系统设计方法
A. Albayrak
In this work, telemetry system is proposed by using Internet of objects (IoT) paradigm. IoT has become widespread as a result of the increase in the number of addressable devices, especially with the transition of internet to IPv6. The downsizing of the sensing devices, the ability to operate with low energy on their own, and the ability to communicate can also have a positive impact on the development of IoT. IoT is not yet standardized. At present, three-layer and five-layer standards are recommended for IoT. Both tiered architectures are not yet discussed sufficiently. Because telemetry systems provide realtime monitoring, they can be designed on an IoT basis, providing instant data analysis and visualization for users. In this study, a telemetry system with reference to the five-layered IoT architecture in the literature is proposed. The proposed system is low cost and can be integrated and scalable into other monitoring systems.
本文提出了一种基于物联网(IoT)的遥测系统。由于可寻址设备数量的增加,特别是随着互联网向IPv6的过渡,物联网已经变得广泛。传感设备的小型化、自身低能耗运行的能力以及通信能力也可以对物联网的发展产生积极影响。物联网尚未标准化。目前推荐的物联网标准有三层和五层。这两种分层架构还没有得到充分的讨论。由于遥测系统提供实时监控,因此可以在物联网的基础上进行设计,为用户提供即时数据分析和可视化。在本研究中,参考文献中的五层物联网架构,提出了一种遥测系统。该系统成本低,可集成和扩展到其他监控系统中。
{"title":"IoT-based Real-Time Telemetry System Design: An Approach","authors":"A. Albayrak","doi":"10.1109/FiCloud.2017.40","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.40","url":null,"abstract":"In this work, telemetry system is proposed by using Internet of objects (IoT) paradigm. IoT has become widespread as a result of the increase in the number of addressable devices, especially with the transition of internet to IPv6. The downsizing of the sensing devices, the ability to operate with low energy on their own, and the ability to communicate can also have a positive impact on the development of IoT. IoT is not yet standardized. At present, three-layer and five-layer standards are recommended for IoT. Both tiered architectures are not yet discussed sufficiently. Because telemetry systems provide realtime monitoring, they can be designed on an IoT basis, providing instant data analysis and visualization for users. In this study, a telemetry system with reference to the five-layered IoT architecture in the literature is proposed. The proposed system is low cost and can be integrated and scalable into other monitoring systems.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115750825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications 用于云SaaS应用程序的基于令牌的JSON身份验证和访问管理模式
Obinna Ethelbert, Faraz Fatemi Moghaddam, P. Wieder, R. Yahyapour
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its challenges – such as governance, security, and privacy. This paper is focused on the security and privacy challenges of cloud computing with specific reference to user authentication and access management for cloud SaaS applications. The suggested model uses a framework that harnesses the stateless and secure nature of JWT for client authentication and session management. Furthermore, authorized access to protected cloud SaaS resources have been efficiently managed. Accordingly, a Policy Match Gate (PMG) component and a Policy Activity Monitor (PAM) component have been introduced. In addition, other subcomponents such as a Policy Validation Unit (PVU) and a Policy Proxy DB (PPDB) have also been established for optimized service delivery. A theoretical analysis of the proposed model portrays a system that is secure, lightweight and highly scalable for improved cloud resource security and management.
云计算正在显著地重塑围绕虚拟化、处理能力、连接性和弹性等核心概念构建的计算行业,从而通过广泛的网络存储和共享IT资源。它已经成为释放大数据、物联网、移动和Web应用等相关技术潜力的关键技术;但它也带来了挑战–例如治理、安全性和隐私。本文重点关注云计算的安全和隐私挑战,具体涉及云SaaS应用的用户认证和访问管理。建议的模型使用一个框架,该框架利用JWT的无状态和安全特性进行客户端身份验证和会话管理。此外,对受保护的云SaaS资源的授权访问已得到有效管理。因此,引入了策略匹配门(PMG)组件和策略活动监视器(PAM)组件。此外,还建立了其他子组件,如策略验证单元(PVU)和策略代理数据库(PPDB),以优化服务交付。对所提出模型的理论分析描绘了一个安全、轻量级和高度可扩展的系统,以改善云资源的安全性和管理。
{"title":"A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications","authors":"Obinna Ethelbert, Faraz Fatemi Moghaddam, P. Wieder, R. Yahyapour","doi":"10.1109/FiCloud.2017.29","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.29","url":null,"abstract":"Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its challenges – such as governance, security, and privacy. This paper is focused on the security and privacy challenges of cloud computing with specific reference to user authentication and access management for cloud SaaS applications. The suggested model uses a framework that harnesses the stateless and secure nature of JWT for client authentication and session management. Furthermore, authorized access to protected cloud SaaS resources have been efficiently managed. Accordingly, a Policy Match Gate (PMG) component and a Policy Activity Monitor (PAM) component have been introduced. In addition, other subcomponents such as a Policy Validation Unit (PVU) and a Policy Proxy DB (PPDB) have also been established for optimized service delivery. A theoretical analysis of the proposed model portrays a system that is secure, lightweight and highly scalable for improved cloud resource security and management.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121975240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Supporting Energy-Efficient Computing on Heterogeneous CPU-GPU Architectures 支持异构CPU-GPU架构下的节能计算
K. Siehl, Xinghui Zhao
Modern high performance computing and cloud computing infrastructures often leverage Graphic Processing Units (GPUs) to provide accelerated, massively parallel computational power. This performance gain, however, may also introduce higher energy consumption. The energy challenge has become more and more pronounced when the system scales. To address this challenge, we propose Archon, a framework for supporting energy-efficient computing on CPU-GPU heterogeneous architectures. Specifically, Archon takes user's programs as input, automatically distribute the workload between CPU and GPU, and dynamically tunes the distribution ratio at runtime for an energy-efficient execution. Experiments have been carried out to evaluate the effectiveness of Archon, and the results show that it can achieve considerable energy savings at runtime, without significant efforts from the programmers.
现代高性能计算和云计算基础设施通常利用图形处理单元(gpu)来提供加速的大规模并行计算能力。然而,这种性能提升也可能带来更高的能耗。随着系统规模的扩大,能源挑战变得越来越明显。为了解决这一挑战,我们提出了Archon,一个支持CPU-GPU异构架构上节能计算的框架。具体来说,Archon将用户的程序作为输入,在CPU和GPU之间自动分配工作负载,并在运行时动态调整分配比例,以实现节能执行。通过实验对Archon的有效性进行了评估,结果表明它可以在运行时实现相当大的节能,而无需程序员的大量努力。
{"title":"Supporting Energy-Efficient Computing on Heterogeneous CPU-GPU Architectures","authors":"K. Siehl, Xinghui Zhao","doi":"10.1109/FiCloud.2017.46","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.46","url":null,"abstract":"Modern high performance computing and cloud computing infrastructures often leverage Graphic Processing Units (GPUs) to provide accelerated, massively parallel computational power. This performance gain, however, may also introduce higher energy consumption. The energy challenge has become more and more pronounced when the system scales. To address this challenge, we propose Archon, a framework for supporting energy-efficient computing on CPU-GPU heterogeneous architectures. Specifically, Archon takes user's programs as input, automatically distribute the workload between CPU and GPU, and dynamically tunes the distribution ratio at runtime for an energy-efficient execution. Experiments have been carried out to evaluate the effectiveness of Archon, and the results show that it can achieve considerable energy savings at runtime, without significant efforts from the programmers.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Critical Analysis in the Research Area of Insider Threats 内部威胁研究领域的批判性分析
A. Zaytsev, A. Malyuk, N. Miloslavskaya
The survey of related works on insider information security (IS) threats is presented. Special attention is paid to works that consider the insiders' behavioral models as it is very up-to-date for behavioral intrusion detection. Three key research directions are defined: 1) the problem analysis in general, including the development of taxonomy for insiders, attacks and countermeasures; 2) study of a specific IS threat with forecasting model development; 3) early detection of a potential insider. The models for the second and third directions are analyzed in detail. Among the second group the works on three IS threats are examined, namely insider espionage, cyber sabotage and unintentional internal IS violation. Discussion and a few directions for the future research conclude the paper.
对内部信息安全(IS)威胁的相关研究进行了综述。由于行为入侵检测是最新的,因此我们特别关注了考虑内部人员行为模型的工作。确定了三个重点研究方向:1)总体问题分析,包括内部人员分类、攻击和对策的发展;2)研究特定的IS威胁并开发预测模型;3)及早发现潜在的内部人员。对第二方向和第三方向的模型进行了详细分析。在第二组中,研究了三种IS威胁的工作,即内部间谍活动、网络破坏和无意的IS内部侵犯。最后,对今后的研究方向进行了展望。
{"title":"Critical Analysis in the Research Area of Insider Threats","authors":"A. Zaytsev, A. Malyuk, N. Miloslavskaya","doi":"10.1109/FiCloud.2017.16","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.16","url":null,"abstract":"The survey of related works on insider information security (IS) threats is presented. Special attention is paid to works that consider the insiders' behavioral models as it is very up-to-date for behavioral intrusion detection. Three key research directions are defined: 1) the problem analysis in general, including the development of taxonomy for insiders, attacks and countermeasures; 2) study of a specific IS threat with forecasting model development; 3) early detection of a potential insider. The models for the second and third directions are analyzed in detail. Among the second group the works on three IS threats are examined, namely insider espionage, cyber sabotage and unintentional internal IS violation. Discussion and a few directions for the future research conclude the paper.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126231312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Approach to Failure Prediction in a Cloud Based Environment 基于云的环境中的故障预测方法
Adamu Hussaini, Bashir Mohammed, A. M. Bukar, A. Cullen, H. Ugail, I. Awan
Failure in cloud system is defined as an even that occurs when the delivered service deviates from the correct intended service. As the cloud computing systems continue to grow in scale and complexity, there is an urgent need for cloud service providers (CSP) to guarantee a reliable on-demand resource to their customers in the presence of faults thereby fulfilling their service level agreement (SLA). Component failures in cloud systems are very familiar phenomena. However, large cloud service providers' data centers should be designed to provide a certain level of availability to the business system. Infrastructure-as-a-service (Iaas) cloud delivery model presents computational resources (CPU and memory), storage resources and networking capacity that ensures high availability in the presence of such failures. The data in-production-faults recorded within a 2 years period has been studied and analyzed from the National Energy Research Scientific computing center (NERSC). Using the real-time data collected from the Computer Failure Data Repository (CFDR), this paper presents the performance of two machine learning (ML) algorithms, Linear Regression (LR) Model and Support Vector Machine (SVM) with a Linear Gaussian kernel for predicting hardware failures in a real-time cloud environment to improve system availability. The performance of the two algorithms have been rigorously evaluated using K-folds cross-validation technique. Furthermore, steps and procedure for future studies has been presented. This research will aid computer hardware companies and cloud service providers (CSP) in designing a reliable fault-tolerant system by providing a better device selection, thereby improving system availability and minimizing unscheduled system downtime.
云系统中的故障被定义为当交付的服务偏离正确的预期服务时发生的故障。随着云计算系统规模和复杂性的不断增长,云服务提供商(CSP)迫切需要在出现故障时为客户提供可靠的按需资源,从而履行其服务水平协议(SLA)。云系统中的组件故障是非常常见的现象。但是,大型云服务提供商的数据中心应该设计为为业务系统提供一定级别的可用性。基础设施即服务(Iaas)云交付模型提供计算资源(CPU和内存)、存储资源和网络容量,以确保出现此类故障时的高可用性。对国家能源研究科学计算中心(NERSC)记录的2年内生产故障数据进行了研究和分析。利用从计算机故障数据存储库(CFDR)收集的实时数据,本文介绍了两种机器学习(ML)算法的性能,线性回归(LR)模型和支持向量机(SVM)具有线性高斯核,用于预测实时云环境中的硬件故障,以提高系统可用性。使用k -fold交叉验证技术严格评估了这两种算法的性能。并提出了今后研究的步骤和步骤。这项研究将帮助计算机硬件公司和云服务提供商(CSP)通过提供更好的设备选择来设计可靠的容错系统,从而提高系统可用性并最大限度地减少计划外系统停机时间。
{"title":"An Approach to Failure Prediction in a Cloud Based Environment","authors":"Adamu Hussaini, Bashir Mohammed, A. M. Bukar, A. Cullen, H. Ugail, I. Awan","doi":"10.1109/FiCloud.2017.56","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.56","url":null,"abstract":"Failure in cloud system is defined as an even that occurs when the delivered service deviates from the correct intended service. As the cloud computing systems continue to grow in scale and complexity, there is an urgent need for cloud service providers (CSP) to guarantee a reliable on-demand resource to their customers in the presence of faults thereby fulfilling their service level agreement (SLA). Component failures in cloud systems are very familiar phenomena. However, large cloud service providers' data centers should be designed to provide a certain level of availability to the business system. Infrastructure-as-a-service (Iaas) cloud delivery model presents computational resources (CPU and memory), storage resources and networking capacity that ensures high availability in the presence of such failures. The data in-production-faults recorded within a 2 years period has been studied and analyzed from the National Energy Research Scientific computing center (NERSC). Using the real-time data collected from the Computer Failure Data Repository (CFDR), this paper presents the performance of two machine learning (ML) algorithms, Linear Regression (LR) Model and Support Vector Machine (SVM) with a Linear Gaussian kernel for predicting hardware failures in a real-time cloud environment to improve system availability. The performance of the two algorithms have been rigorously evaluated using K-folds cross-validation technique. Furthermore, steps and procedure for future studies has been presented. This research will aid computer hardware companies and cloud service providers (CSP) in designing a reliable fault-tolerant system by providing a better device selection, thereby improving system availability and minimizing unscheduled system downtime.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115142505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1