首页 > 最新文献

2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)最新文献

英文 中文
Cloud computing and sentiment analysis in E-learning systems 电子学习系统中的云计算和情感分析
Taoufiq Zarra, R. Chiheb, R. Faizi, A. El Afia
Currently the variety of possibilities of browsing the Web either via PCs, tablets or mobile phones has allowed learners to have access to a large repository of learning resources. However, given that most e-learning platforms, mainly used by universities and academic institutions around the world, do not actively follow the technological development as they usually require a lot of hardware and software resources, having recourse to Cloud computing technologies will certainly change the way applications are designed and accessed, and will, at the same time, contribute in cutting down costs. In this respect, the use of Web 2.0 technologies, which have completely revolutionized the way in which individuals communicate, are capable of enhancing the ways both learning and teaching are conducted. Our objective in this paper is, two-fold: examine the current state and the challenges of using cloud technologies in e-learning environments propose a cloud-based service that would monitor and foster students' learning and provide educators with recommendations to improve platforms and resources.
目前,通过个人电脑、平板电脑或手机浏览网页的各种可能性使学习者能够访问大量的学习资源。然而,鉴于大多数电子学习平台主要由世界各地的大学和学术机构使用,由于它们通常需要大量的硬件和软件资源,因此没有积极地跟随技术的发展,求助于云计算技术肯定会改变应用程序的设计和访问方式,同时也有助于降低成本。在这方面,Web 2.0技术的使用彻底改变了个人交流的方式,能够增强学习和教学的方式。我们在本文中的目标有两个:研究在电子学习环境中使用云技术的现状和挑战,提出一种基于云的服务,该服务可以监控和促进学生的学习,并为教育工作者提供改进平台和资源的建议。
{"title":"Cloud computing and sentiment analysis in E-learning systems","authors":"Taoufiq Zarra, R. Chiheb, R. Faizi, A. El Afia","doi":"10.1109/CLOUDTECH.2016.7847695","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847695","url":null,"abstract":"Currently the variety of possibilities of browsing the Web either via PCs, tablets or mobile phones has allowed learners to have access to a large repository of learning resources. However, given that most e-learning platforms, mainly used by universities and academic institutions around the world, do not actively follow the technological development as they usually require a lot of hardware and software resources, having recourse to Cloud computing technologies will certainly change the way applications are designed and accessed, and will, at the same time, contribute in cutting down costs. In this respect, the use of Web 2.0 technologies, which have completely revolutionized the way in which individuals communicate, are capable of enhancing the ways both learning and teaching are conducted. Our objective in this paper is, two-fold: examine the current state and the challenges of using cloud technologies in e-learning environments propose a cloud-based service that would monitor and foster students' learning and provide educators with recommendations to improve platforms and resources.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130701885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A decision-support model enabling a proactive vision of Cloud Computing adoption 一个决策支持模型,支持采用云计算的前瞻性愿景
M'barek El Haloui, A. Kriouile
Market competitiveness and technological evolution encourage companies to seek IT solutions enabling to save costs, increase productivity, and focus on high value-added activities. Outsourcing and cloud computing activities become increasingly adopted choices. That is why, decision makers need to look for decision support tools helping them for the adoption of new solutions and services such as Cloud Computing. This article presents a maturity assessment model of a functional block information system in order to outsource it to Cloud. Basing on the enterprise architecture point of view, best practices repositories, basic criteria of activities outsourcing, and the cloud computing adoption requirements, this model is built around four modules: the block scope identification, the outsourcing opportunity, the cloud computing architectural requirements, and governance and control. Thus, this model will provide new benefits for opened Enterprise Architectures to cloud computing.
市场竞争和技术发展鼓励公司寻求能够节省成本、提高生产力和专注于高附加值活动的IT解决方案。外包和云计算活动越来越多地被采用。这就是为什么决策者需要寻找决策支持工具来帮助他们采用新的解决方案和服务,例如云计算。为了将功能块信息系统外包给云计算,本文提出了一个功能块信息系统的成熟度评估模型。基于企业体系结构观点、最佳实践存储库、活动外包的基本标准和云计算采用需求,该模型围绕四个模块构建:块范围识别、外包机会、云计算体系结构需求以及治理和控制。因此,该模型将为开放的企业架构提供云计算的新好处。
{"title":"A decision-support model enabling a proactive vision of Cloud Computing adoption","authors":"M'barek El Haloui, A. Kriouile","doi":"10.1109/CLOUDTECH.2016.7847698","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847698","url":null,"abstract":"Market competitiveness and technological evolution encourage companies to seek IT solutions enabling to save costs, increase productivity, and focus on high value-added activities. Outsourcing and cloud computing activities become increasingly adopted choices. That is why, decision makers need to look for decision support tools helping them for the adoption of new solutions and services such as Cloud Computing. This article presents a maturity assessment model of a functional block information system in order to outsource it to Cloud. Basing on the enterprise architecture point of view, best practices repositories, basic criteria of activities outsourcing, and the cloud computing adoption requirements, this model is built around four modules: the block scope identification, the outsourcing opportunity, the cloud computing architectural requirements, and governance and control. Thus, this model will provide new benefits for opened Enterprise Architectures to cloud computing.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133966435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECC certificate for authentication in cloud-based RFID 用于云RFID认证的ECC证书
Elmakfalji Chaimae, Romadi Rahal, E. Abdellatif
Cloud computing is the access via internet to shared resources and services. Merging this technology with RFID enabled the improvement of the latter such as data storage and processing, and both allow to have intelligent environments and access services anytime and anywhere. But this fusion is the subject of some criticism concerning the data security and privacy. In this article we are interested in the authentication of tag / reader to the cloud interface and we propose a protocol using elliptic curve cryptography (ECC) to verify the identity of readers before issuing the certificate which authenticates the reader to tag, and then lets them access the cloud interface.
云计算是通过互联网访问共享的资源和服务。将该技术与RFID相结合,可以改善后者,例如数据存储和处理,并且可以随时随地拥有智能环境和访问服务。但这种融合在数据安全和隐私方面受到了一些批评。在本文中,我们对标签/阅读器对云接口的身份验证感兴趣,并提出了一个使用椭圆曲线加密(ECC)的协议,在颁发证书之前验证阅读器对标签的身份验证,然后允许它们访问云接口。
{"title":"ECC certificate for authentication in cloud-based RFID","authors":"Elmakfalji Chaimae, Romadi Rahal, E. Abdellatif","doi":"10.1109/CLOUDTECH.2016.7847699","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847699","url":null,"abstract":"Cloud computing is the access via internet to shared resources and services. Merging this technology with RFID enabled the improvement of the latter such as data storage and processing, and both allow to have intelligent environments and access services anytime and anywhere. But this fusion is the subject of some criticism concerning the data security and privacy. In this article we are interested in the authentication of tag / reader to the cloud interface and we propose a protocol using elliptic curve cryptography (ECC) to verify the identity of readers before issuing the certificate which authenticates the reader to tag, and then lets them access the cloud interface.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114866611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Load balancing issue in cloud services selection by using MCDA and Markov Chain Model approaches 基于MCDA和马尔可夫链模型的云服务选择中的负载均衡问题
S. Hemam, O. Hioual
In this paper, we investigate the cloud service selection model by taking into account the load-balancing across different clouds. Indeed, a number of service providers offer similar services at various prices and performance levels which made a real decision -making problem in a service selection. This problem occurs in a multi cloud environment when we need to select a service by taking into consideration the preference of users (minimizing both cost and response time) and the requirement of the system (load balancing between clouds). In this work, we present our solution which allows to select a cloud service by taking into account the preferences of the user and also which allows to balance the load between different clouds. The proposed solution is based on the MCDA: Multi Criteria Decision Analysis and the Markov Chain Model.
在本文中,我们通过考虑不同云之间的负载平衡来研究云服务选择模型。事实上,许多服务提供商以不同的价格和性能水平提供类似的服务,这在服务选择中构成了一个真正的决策问题。在多云环境中,当我们需要通过考虑用户偏好(最小化成本和响应时间)和系统需求(云之间的负载平衡)来选择服务时,就会出现这个问题。在这项工作中,我们提出了我们的解决方案,它允许通过考虑用户的偏好来选择云服务,也允许在不同的云之间平衡负载。提出的解决方案基于MCDA:多准则决策分析和马尔可夫链模型。
{"title":"Load balancing issue in cloud services selection by using MCDA and Markov Chain Model approaches","authors":"S. Hemam, O. Hioual","doi":"10.1109/CLOUDTECH.2016.7847694","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847694","url":null,"abstract":"In this paper, we investigate the cloud service selection model by taking into account the load-balancing across different clouds. Indeed, a number of service providers offer similar services at various prices and performance levels which made a real decision -making problem in a service selection. This problem occurs in a multi cloud environment when we need to select a service by taking into consideration the preference of users (minimizing both cost and response time) and the requirement of the system (load balancing between clouds). In this work, we present our solution which allows to select a cloud service by taking into account the preferences of the user and also which allows to balance the load between different clouds. The proposed solution is based on the MCDA: Multi Criteria Decision Analysis and the Markov Chain Model.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132794484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud security and privacy model for providing secure cloud services 云安全与隐私模型,提供安全的云服务
Khalid El Makkaoui, Abdellah Ezzati, A. Beni-Hssane, C. Motamed
Cloud computing is becoming increasingly a magical solution and a widely adopted technology for delivering services over the Internet thanks to its diverse benefits, including services on demand, reducing costs, sharing and configuring computing resources, and high services scalability and flexibility. However, with the emergence of this technology, the concept of security and privacy has become a major barrier to cloud services adoption. Indeed, many research works have been done to identify cloud security and privacy issues. It is in this context that in this paper, we will provide a new cloud security and privacy model (CSPM) into layers which can be taken into account by cloud providers during all the stages of cloud services building and monitoring. This model will permit to overcome this cloud services barrier adoption and thus, to build confidence in cloud services and also to provide secure services. Finally, we will present some security threats and attacks, and propose, according to CSPM, some countermeasures.
云计算正日益成为一种神奇的解决方案和广泛采用的技术,用于在互联网上提供服务,这要归功于它的各种好处,包括按需服务、降低成本、共享和配置计算资源,以及高服务可伸缩性和灵活性。然而,随着这项技术的出现,安全和隐私的概念已经成为采用云服务的主要障碍。事实上,许多研究工作已经完成,以确定云安全和隐私问题。正是在这种背景下,在本文中,我们将提供一种新的云安全和隐私模型(CSPM),该模型可以在云服务构建和监控的所有阶段被云提供商考虑在内。这种模式将克服采用云服务的障碍,从而建立对云服务的信心,并提供安全的服务。最后,我们将介绍一些安全威胁和攻击,并根据CSPM提出一些对策。
{"title":"Cloud security and privacy model for providing secure cloud services","authors":"Khalid El Makkaoui, Abdellah Ezzati, A. Beni-Hssane, C. Motamed","doi":"10.1109/CLOUDTECH.2016.7847682","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847682","url":null,"abstract":"Cloud computing is becoming increasingly a magical solution and a widely adopted technology for delivering services over the Internet thanks to its diverse benefits, including services on demand, reducing costs, sharing and configuring computing resources, and high services scalability and flexibility. However, with the emergence of this technology, the concept of security and privacy has become a major barrier to cloud services adoption. Indeed, many research works have been done to identify cloud security and privacy issues. It is in this context that in this paper, we will provide a new cloud security and privacy model (CSPM) into layers which can be taken into account by cloud providers during all the stages of cloud services building and monitoring. This model will permit to overcome this cloud services barrier adoption and thus, to build confidence in cloud services and also to provide secure services. Finally, we will present some security threats and attacks, and propose, according to CSPM, some countermeasures.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115620454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
On the impact of virtualization on the I/O performance of analytic workloads 虚拟化对分析工作负载I/O性能的影响
S. Ha, D. Venzano, P. Brown, P. Michiardi
In this work we study the I/O performance of long, sequential workloads that mimic those of Big Data applications, to understand the implications of system virtualization on data-intensive frameworks such as Apache Hadoop and Spark, which are frequently run in clusters of Virtual Machines (VMs). We do so through an experimental measurement campaign that collects low-level traces and metrics, to show the role played by important parameters such as the I/O schedulers and caching mechanisms involved in the I/O path, and the VM configuration in terms of dedicated resources. Our findings are important, especially for determining appropriate deployment strategies for today's emerging Analytics Services hosted both on public and private clouds.
在这项工作中,我们研究了模拟大数据应用程序的长时间连续工作负载的I/O性能,以了解系统虚拟化对数据密集型框架(如Apache Hadoop和Spark)的影响,这些框架经常运行在虚拟机(vm)集群中。我们通过收集低级跟踪和指标的实验性测量活动来做到这一点,以显示重要参数所起的作用,例如I/O调度器和I/O路径中涉及的缓存机制,以及VM在专用资源方面的配置。我们的发现很重要,特别是对于当今新兴的托管在公共云和私有云上的分析服务确定适当的部署策略。
{"title":"On the impact of virtualization on the I/O performance of analytic workloads","authors":"S. Ha, D. Venzano, P. Brown, P. Michiardi","doi":"10.1109/CLOUDTECH.2016.7847722","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847722","url":null,"abstract":"In this work we study the I/O performance of long, sequential workloads that mimic those of Big Data applications, to understand the implications of system virtualization on data-intensive frameworks such as Apache Hadoop and Spark, which are frequently run in clusters of Virtual Machines (VMs). We do so through an experimental measurement campaign that collects low-level traces and metrics, to show the role played by important parameters such as the I/O schedulers and caching mechanisms involved in the I/O path, and the VM configuration in terms of dedicated resources. Our findings are important, especially for determining appropriate deployment strategies for today's emerging Analytics Services hosted both on public and private clouds.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel architecture for task scheduling based on Dynamic Queues and Particle Swarm Optimization in cloud computing 云计算中基于动态队列和粒子群优化的任务调度新架构
Hicham Ben Alla, Said Ben Alla, Abdellah Ezzati
Task scheduling is one of the most challenging aspects in cloud computing nowadays, which plays an important role to improve the overall performance and services of the cloud such as response time, cost, makespan, throughput etc. Mostly a non-optimal task scheduling algorithm can be a key tool in over utilization or under utilization of cloud resources. In order to solve these problems, this paper proposes a novel architecture to schedule the tasks in cloud computing on the basis of a new Dynamic Dispatch Queues Algorithm (DDQA) and Particle Swarm Optimization (PSO) algorithm. The proposed algorithm DDQA-PSO gives full consideration to the dynamic characteristics of the cloud computing environment. The experimental results based on CloudSim simulator show that the proposed architecture can effectively achieve good performance, load balancing, and improve the resource utilization.
任务调度是当今云计算中最具挑战性的方面之一,它对提高云的整体性能和服务(如响应时间、成本、完工时间、吞吐量等)起着重要作用。大多数情况下,非最优任务调度算法可能成为云资源过度利用或利用不足的关键工具。为了解决这些问题,本文在动态调度队列算法(DDQA)和粒子群优化算法(PSO)的基础上,提出了一种新的云计算任务调度架构。提出的DDQA-PSO算法充分考虑了云计算环境的动态特性。基于CloudSim模拟器的实验结果表明,该架构能够有效实现良好的性能、负载均衡,提高资源利用率。
{"title":"A novel architecture for task scheduling based on Dynamic Queues and Particle Swarm Optimization in cloud computing","authors":"Hicham Ben Alla, Said Ben Alla, Abdellah Ezzati","doi":"10.1109/CLOUDTECH.2016.7847686","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847686","url":null,"abstract":"Task scheduling is one of the most challenging aspects in cloud computing nowadays, which plays an important role to improve the overall performance and services of the cloud such as response time, cost, makespan, throughput etc. Mostly a non-optimal task scheduling algorithm can be a key tool in over utilization or under utilization of cloud resources. In order to solve these problems, this paper proposes a novel architecture to schedule the tasks in cloud computing on the basis of a new Dynamic Dispatch Queues Algorithm (DDQA) and Particle Swarm Optimization (PSO) algorithm. The proposed algorithm DDQA-PSO gives full consideration to the dynamic characteristics of the cloud computing environment. The experimental results based on CloudSim simulator show that the proposed architecture can effectively achieve good performance, load balancing, and improve the resource utilization.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Taking account of trust when adopting cloud computing architecture 采用云计算架构时考虑信任问题
B. Mohamed, Khamlichi Idrissi Youness, Moughit Mohamed
Recently, with the rapid growth of distributed computing, high performance computing and cloud services, trust issue is a primary concern and become a hot topic. Furthermore, the lack of trust comes from a lack of transparency, loss of control over data and unclear security assurances, which impedes its large-scale adoption. To fill these gaps, the authors have dissected the challenges related to cloud computing trust and the virtual environment, components of trust and approaches able to establish an acceptable level of trust in the minds of users.
近年来,随着分布式计算、高性能计算和云服务的快速发展,信任问题成为人们普遍关注的热点问题。此外,缺乏信任来自于缺乏透明度,对数据失去控制和不明确的安全保证,这阻碍了其大规模采用。为了填补这些空白,作者剖析了与云计算信任和虚拟环境、信任的组成部分以及能够在用户心目中建立可接受的信任水平的方法相关的挑战。
{"title":"Taking account of trust when adopting cloud computing architecture","authors":"B. Mohamed, Khamlichi Idrissi Youness, Moughit Mohamed","doi":"10.1109/CLOUDTECH.2016.7847685","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847685","url":null,"abstract":"Recently, with the rapid growth of distributed computing, high performance computing and cloud services, trust issue is a primary concern and become a hot topic. Furthermore, the lack of trust comes from a lack of transparency, loss of control over data and unclear security assurances, which impedes its large-scale adoption. To fill these gaps, the authors have dissected the challenges related to cloud computing trust and the virtual environment, components of trust and approaches able to establish an acceptable level of trust in the minds of users.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115608643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
New technique for face recognition based on Singular Value Decomposition (SVD) 基于奇异值分解的人脸识别新技术
E. Barrah, Said Safi, A. Malaoui
In this paper, we describe a texture analysis which plays an important role in face analysis. Many studies have used texture image to characterize a face. Local Binary Pattern (LBP) coding is a state-of-the-art technique characterized by it's simplicity and efficiency. In the proposed method, we associate Local Binary Pattern with integral image representation, which permits to evaluate the sum of values over rectangular regions, in the Singular Value Decomposition (SVD) domain. Finally, the obtained results, using the proposed method, will be compared with those obtained from other local approaches.
本文介绍了一种在人脸分析中起重要作用的纹理分析方法。许多研究使用纹理图像来描述人脸特征。局部二值模式(LBP)编码具有简单、高效等特点。在提出的方法中,我们将局部二值模式与积分图像表示相关联,允许在奇异值分解(SVD)域中计算矩形区域上的值和。最后,将采用该方法得到的结果与其他局部方法得到的结果进行比较。
{"title":"New technique for face recognition based on Singular Value Decomposition (SVD)","authors":"E. Barrah, Said Safi, A. Malaoui","doi":"10.1109/CLOUDTECH.2016.7847684","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847684","url":null,"abstract":"In this paper, we describe a texture analysis which plays an important role in face analysis. Many studies have used texture image to characterize a face. Local Binary Pattern (LBP) coding is a state-of-the-art technique characterized by it's simplicity and efficiency. In the proposed method, we associate Local Binary Pattern with integral image representation, which permits to evaluate the sum of values over rectangular regions, in the Singular Value Decomposition (SVD) domain. Finally, the obtained results, using the proposed method, will be compared with those obtained from other local approaches.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A collaborative framework for intrusion detection (C-NIDS) in Cloud computing 云计算中入侵检测(C-NIDS)协作框架
Zayed Alhaddad, Mostafa Hanoune, Abdelaziz Mamouni
In recent years, Cloud computing has emerged as a new paradigm for delivering highly scalable and on-demand shared pool IT resources such as networks, servers, storage, applications and services through internet. It enables IT managers to provision services to users faster and in a cost-effective way. As a result, this technology is used by an increasing number of end users. On the other hand, existing security deficiencies and vulnerabilities of underlying technologies can leave an open door for intruders. Indeed, one of the major security issues in Cloud is to protect against distributed attacks and other malicious activities on the network that can affect confidentiality, availability and integrity of Cloud resources. In order to solve these problems, we propose a Collaborative Network Intrusion Detection System (C-NIDS) to detect network attacks in Cloud by monitoring network traffic, while offering high accuracy by addressing newer challenges, namely, intrusion detection in virtual network, monitoring high traffic, scalability and resistance capability. In our NIDS framework, we use Snort as a signature based detection to detect known attacks, while for detecting network anomaly, we use Support Vector Machine (SVM). Moreover, in this framework, the NIDS sensors deployed in Cloud operate in collaborative way to oppose the coordinated attacks against cloud infrastructure and knowledge base remains up-to-date.
近年来,云计算成为一种新的模式,它通过互联网提供网络、服务器、存储、应用和服务等高度可扩展和按需的共享IT资源池。它使It经理能够以经济有效的方式更快地向用户提供服务。因此,越来越多的终端用户使用该技术。另一方面,现有的安全缺陷和底层技术的漏洞可能为入侵者敞开大门。实际上,云中的主要安全问题之一是防止网络上的分布式攻击和其他可能影响云资源的机密性、可用性和完整性的恶意活动。为了解决这些问题,我们提出了一种协同网络入侵检测系统(C-NIDS),通过监控网络流量来检测云中的网络攻击,同时通过解决虚拟网络中的入侵检测、监控高流量、可扩展性和抵抗能力等新挑战来提供高精度。在我们的NIDS框架中,我们使用Snort作为基于签名的检测来检测已知的攻击,而对于检测网络异常,我们使用支持向量机(SVM)。此外,在此框架下,部署在云中的NIDS传感器以协作方式运行,以对抗针对云基础设施和知识库的协同攻击。
{"title":"A collaborative framework for intrusion detection (C-NIDS) in Cloud computing","authors":"Zayed Alhaddad, Mostafa Hanoune, Abdelaziz Mamouni","doi":"10.1109/CLOUDTECH.2016.7847708","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847708","url":null,"abstract":"In recent years, Cloud computing has emerged as a new paradigm for delivering highly scalable and on-demand shared pool IT resources such as networks, servers, storage, applications and services through internet. It enables IT managers to provision services to users faster and in a cost-effective way. As a result, this technology is used by an increasing number of end users. On the other hand, existing security deficiencies and vulnerabilities of underlying technologies can leave an open door for intruders. Indeed, one of the major security issues in Cloud is to protect against distributed attacks and other malicious activities on the network that can affect confidentiality, availability and integrity of Cloud resources. In order to solve these problems, we propose a Collaborative Network Intrusion Detection System (C-NIDS) to detect network attacks in Cloud by monitoring network traffic, while offering high accuracy by addressing newer challenges, namely, intrusion detection in virtual network, monitoring high traffic, scalability and resistance capability. In our NIDS framework, we use Snort as a signature based detection to detect known attacks, while for detecting network anomaly, we use Support Vector Machine (SVM). Moreover, in this framework, the NIDS sensors deployed in Cloud operate in collaborative way to oppose the coordinated attacks against cloud infrastructure and knowledge base remains up-to-date.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115620353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1