首页 > 最新文献

2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)最新文献

英文 中文
Requirements specification of a cloud service for Cyber Security compliance analysis 用于网络安全合规性分析的云服务的需求规范
A. Furfaro, Teresa Gallo, A. Garro, D. Saccá, A. Tundis
This paper presents the practical exploitation of a goal-oriented methodology for requirements specification, called GOReM, for an application scenario involving the development of a cloud service offering a functionality of compliance analysis in the business model of Security as a Service (SecaaS). The requirements specification for this scenario emerged as a real need inside a large industrial project on the field of Cyber Security. GOReM has allowed to achieve in a lean, yet accurate, way the analysis of such a complex scenario, where non-functional requirements, coming from rules and regulations in force in different countries, complicate the handling of a cloud service which might be usable worldwide.
本文介绍了一种面向目标的需求规范方法(称为GOReM)的实际应用,该方法适用于一个应用场景,该场景涉及在安全即服务(SecaaS)的业务模型中提供遵从性分析功能的云服务的开发。此场景的需求规范作为网络安全领域的大型工业项目中的实际需求而出现。GOReM允许以一种精简而准确的方式对这样一个复杂的场景进行分析,在这种场景中,来自不同国家实施的规则和法规的非功能需求使可能在全球范围内可用的云服务的处理复杂化。
{"title":"Requirements specification of a cloud service for Cyber Security compliance analysis","authors":"A. Furfaro, Teresa Gallo, A. Garro, D. Saccá, A. Tundis","doi":"10.1109/CLOUDTECH.2016.7847700","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847700","url":null,"abstract":"This paper presents the practical exploitation of a goal-oriented methodology for requirements specification, called GOReM, for an application scenario involving the development of a cloud service offering a functionality of compliance analysis in the business model of Security as a Service (SecaaS). The requirements specification for this scenario emerged as a real need inside a large industrial project on the field of Cyber Security. GOReM has allowed to achieve in a lean, yet accurate, way the analysis of such a complex scenario, where non-functional requirements, coming from rules and regulations in force in different countries, complicate the handling of a cloud service which might be usable worldwide.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127189874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Dynamic adaptation of the ACS-TSP local pheromone decay parameter based on the Hidden Markov Model 基于隐马尔可夫模型的ACS-TSP局部信息素衰减参数的动态自适应
Safae Bouzbita, A. El Afia, R. Faizi, Mustapha Zbakh
The objective of the present paper is to propose an improved Ant Colony System (ACS) algorithm based on a Hidden Markov Model (HMM) so as dynamically adapt the local pheromone decay parameter ξ. The proposed algorithm uses Iteration and Diversity as indicators of the hidden states in the search space in ACS. To test the efficiency of our algorithm, we experimented it on several benchmark Travelling Salesman Problem (TSP) instances. The results have proven the effectiveness of our algorithm in both the convergence speed and the solution quality.
本文的目的是提出一种基于隐马尔可夫模型的改进蚁群系统(ACS)算法,以动态适应局部信息素衰减参数ξ。该算法使用迭代和多样性作为ACS搜索空间中隐藏状态的指示器。为了测试算法的有效性,我们在几个旅行推销员问题(TSP)的基准实例上进行了实验。实验结果证明了该算法在收敛速度和解质量上的有效性。
{"title":"Dynamic adaptation of the ACS-TSP local pheromone decay parameter based on the Hidden Markov Model","authors":"Safae Bouzbita, A. El Afia, R. Faizi, Mustapha Zbakh","doi":"10.1109/CLOUDTECH.2016.7847719","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847719","url":null,"abstract":"The objective of the present paper is to propose an improved Ant Colony System (ACS) algorithm based on a Hidden Markov Model (HMM) so as dynamically adapt the local pheromone decay parameter ξ. The proposed algorithm uses Iteration and Diversity as indicators of the hidden states in the search space in ACS. To test the efficiency of our algorithm, we experimented it on several benchmark Travelling Salesman Problem (TSP) instances. The results have proven the effectiveness of our algorithm in both the convergence speed and the solution quality.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126521250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A virtual environment for the enactment of realistic cyber security scenarios 一个虚拟环境,用于制定现实的网络安全场景
A. Furfaro, A. Piccolo, D. Saccá, Andrea Parise
In the last few years, cyber security has become a hot topic because of the ever-increasing availability of Internet accessible services driven by the diffusion of connected devices. The consequent exposition to cyber threats demands for suitable methodologies, techniques and tools allowing to adequately handle issues arising in such a complex domain. We argue that the flexibility of virtual environments will play a critical role in many cyber security related aspects. Problems like the assessment of newly devised intrusion detection techniques, the evaluation of skills of cyber defense team members, the evaluation of the disruptive effects caused by the diffusion of new malware, are just few examples of issues that cannot be directly addressed in production systems even though they require realistic operating environments in order to be suitably performed. This paper describes the architecture of SMALLWORLD, a scalable software platform designed to reproduce realistic scenarios achieved by the immersion of real systems into a software defined virtual environment.
在过去的几年里,网络安全已经成为一个热门话题,因为连接设备的扩散推动了互联网可访问服务的不断增加。随之而来的对网络威胁的阐述需要合适的方法、技术和工具,以充分处理在如此复杂的领域中出现的问题。我们认为,虚拟环境的灵活性将在许多网络安全相关方面发挥关键作用。诸如评估新设计的入侵检测技术、评估网络防御团队成员的技能、评估新恶意软件扩散造成的破坏性影响等问题,只是无法在生产系统中直接解决的问题的几个例子,尽管它们需要现实的操作环境才能适当地执行。本文描述了SMALLWORLD的体系结构,SMALLWORLD是一个可扩展的软件平台,旨在通过将真实系统浸入到软件定义的虚拟环境中来重现现实场景。
{"title":"A virtual environment for the enactment of realistic cyber security scenarios","authors":"A. Furfaro, A. Piccolo, D. Saccá, Andrea Parise","doi":"10.1109/CLOUDTECH.2016.7847720","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847720","url":null,"abstract":"In the last few years, cyber security has become a hot topic because of the ever-increasing availability of Internet accessible services driven by the diffusion of connected devices. The consequent exposition to cyber threats demands for suitable methodologies, techniques and tools allowing to adequately handle issues arising in such a complex domain. We argue that the flexibility of virtual environments will play a critical role in many cyber security related aspects. Problems like the assessment of newly devised intrusion detection techniques, the evaluation of skills of cyber defense team members, the evaluation of the disruptive effects caused by the diffusion of new malware, are just few examples of issues that cannot be directly addressed in production systems even though they require realistic operating environments in order to be suitably performed. This paper describes the architecture of SMALLWORLD, a scalable software platform designed to reproduce realistic scenarios achieved by the immersion of real systems into a software defined virtual environment.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130365161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient anonymous user authentication on server without secure channel during registration 在注册过程中,在没有安全通道的服务器上进行高效的匿名用户身份验证
An Braeken, A. Touhafi
Cloud computing offers a simple way to provide access to servers, storage, databases and a broad set of application services over the Internet. Its popularity is growing spectacularly. Consequently, there is a need for strong authentication schemes, offering besides privacy also anonymity to the users during these actions. Therefore, this paper presents two userfriendly authentication protocols, able to derive the required security material at user side without the need of a secure channel between user and registration center. The second protocol has the added functionality to guarantee unforgeability and non repudiation of the request. Simple elliptic curve operations, together with hashes and symmetric key encryption algorithms are used. The proposed protocols are two-factor based, requiring password and smartphone, and are very efficient to be executed on the smartphone due to a small amount of computations.
云计算提供了一种通过互联网访问服务器、存储、数据库和广泛的应用程序服务的简单方法。它的受欢迎程度正在惊人地增长。因此,需要一个强大的身份验证方案,在这些操作期间为用户提供隐私和匿名性。因此,本文提出了两种用户友好的认证协议,可以在用户端导出所需的安全资料,而无需在用户和注册中心之间建立安全通道。第二个协议具有额外的功能,以保证请求的不可伪造性和不可否认性。使用简单的椭圆曲线运算,以及哈希和对称密钥加密算法。所提出的协议是基于双因素的,需要密码和智能手机,并且由于计算量少,在智能手机上执行效率很高。
{"title":"Efficient anonymous user authentication on server without secure channel during registration","authors":"An Braeken, A. Touhafi","doi":"10.1109/CLOUDTECH.2016.7847702","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847702","url":null,"abstract":"Cloud computing offers a simple way to provide access to servers, storage, databases and a broad set of application services over the Internet. Its popularity is growing spectacularly. Consequently, there is a need for strong authentication schemes, offering besides privacy also anonymity to the users during these actions. Therefore, this paper presents two userfriendly authentication protocols, able to derive the required security material at user side without the need of a secure channel between user and registration center. The second protocol has the added functionality to guarantee unforgeability and non repudiation of the request. Simple elliptic curve operations, together with hashes and symmetric key encryption algorithms are used. The proposed protocols are two-factor based, requiring password and smartphone, and are very efficient to be executed on the smartphone due to a small amount of computations.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114358232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the evaluation of cloud web services for crowdsourcing mobile applications 众包移动应用的云web服务评价研究
M. H. Heyi, C. Rossi
Despite the growing importance of mobile crowdsourcing applications and cloud computing, little is known about the actual performances of web services deployed within public cloud computing platforms. In order to provide an assessment of the achievable performances in such scenario, we design and implement a back-end general architecture for mobile applications requiring crowdsourcing. We deploy our back-end in the Microsoft Azure cloud computing platform using the PaaS approach, and we evaluate its performance in terms of autoscaling, response time and request rate; while varying the number of instances, the instance type, and the number of concurrent users. Our results shed light on the achievable performances of web services aimed at ingesting crowdsourced data.
尽管移动众包应用程序和云计算越来越重要,但人们对部署在公共云计算平台内的web服务的实际性能知之甚少。为了对这种情况下可实现的性能进行评估,我们为需要众包的移动应用程序设计并实现了一个后端通用架构。我们使用PaaS方法将后端部署在Microsoft Azure云计算平台上,并从自动伸缩、响应时间和请求率方面评估其性能;同时改变实例的数量、实例类型和并发用户的数量。我们的结果揭示了旨在摄取众包数据的web服务的可实现性能。
{"title":"On the evaluation of cloud web services for crowdsourcing mobile applications","authors":"M. H. Heyi, C. Rossi","doi":"10.1109/CLOUDTECH.2016.7847725","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847725","url":null,"abstract":"Despite the growing importance of mobile crowdsourcing applications and cloud computing, little is known about the actual performances of web services deployed within public cloud computing platforms. In order to provide an assessment of the achievable performances in such scenario, we design and implement a back-end general architecture for mobile applications requiring crowdsourcing. We deploy our back-end in the Microsoft Azure cloud computing platform using the PaaS approach, and we evaluate its performance in terms of autoscaling, response time and request rate; while varying the number of instances, the instance type, and the number of concurrent users. Our results shed light on the achievable performances of web services aimed at ingesting crowdsourced data.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115818174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A secure framework for medical image storage based on multi-cloud 基于多云的医学图像存储安全框架
M. Marwan, A. Kartit, H. Ouahmane
Cloud-based medical image is a promising technology. In fact, it provides cost-efficient services and allows collaboration between healthcare ecosystem. Despite its multiple advantages, migrating to this new paradigm arises several challenges: technical, legal and managerial. Recently, the healthcare sector has been interested in adopting this technology to improve the quality of medical care. In this study, we propose a secure framework based on multi-cloud environment. For that, we use a secret share scheme to improve data confidentiality. Moreover, reversible watermarking technique is proposed to verify the integrity of medical image.
基于云的医学图像是一项很有前途的技术。事实上,它提供了具有成本效益的服务,并允许医疗保健生态系统之间的协作。尽管有多种优势,但迁移到这种新范式会带来一些挑战:技术、法律和管理。最近,医疗保健部门对采用这种技术来提高医疗质量很感兴趣。在本研究中,我们提出了一个基于多云环境的安全框架。为此,我们使用秘密共享方案来提高数据的保密性。此外,提出了可逆水印技术来验证医学图像的完整性。
{"title":"A secure framework for medical image storage based on multi-cloud","authors":"M. Marwan, A. Kartit, H. Ouahmane","doi":"10.1109/CLOUDTECH.2016.7847683","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847683","url":null,"abstract":"Cloud-based medical image is a promising technology. In fact, it provides cost-efficient services and allows collaboration between healthcare ecosystem. Despite its multiple advantages, migrating to this new paradigm arises several challenges: technical, legal and managerial. Recently, the healthcare sector has been interested in adopting this technology to improve the quality of medical care. In this study, we propose a secure framework based on multi-cloud environment. For that, we use a secret share scheme to improve data confidentiality. Moreover, reversible watermarking technique is proposed to verify the integrity of medical image.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117186051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Adaptive workload prediction for proactive auto scaling in PaaS systems 面向PaaS系统中主动自动扩展的自适应工作负载预测
R.S. Shariffdeen, D.T.S.P. Munasinghe, H. S. Bhathiya, U.K.J.U. Bandara, H. Bandara
Elasticity is a key feature of cloud computing where resources are allocated and released according to user demands. Reactive auto scaling, in which the scaling actions take place just after meeting the triggering thresholds, suffers from several issues like risk of under provisioning at peak loads and over provisioning during other times. Proactive scaling solutions, where future resource demand can be forecast and necessary scaling actions enacted beforehand, can overcome these issues. Nevertheless, the effectiveness of such proactive scaling solutions depends on the accuracy of the prediction method(s) adopted. We propose a forecasting technique to enhance the accuracy of workload forecasting in cloud auto-scalers. An ensemble workload prediction mechanism based on time series and machine learning techniques is proposed to make more accurate predictions on drastically different workload patterns. In this work, we initially evaluated several forecasting models for their applicability in forecasting different workload patterns. The proposed ensemble technique is then implemented using three well-known forecasting models and tested for three real-world workloads. Simulation results show that our ensemble method produces significantly lower forecast errors compared to the use of individual models and the prediction technique employed in Apache Stratos, an open source PaaS platform.
弹性是云计算的一个关键特性,其中资源是根据用户需求分配和释放的。响应式自动扩展,即在满足触发阈值之后才进行扩展操作,它面临着几个问题,比如在峰值负载时供应不足的风险,以及在其他时间供应过剩的风险。主动扩展解决方案可以预测未来的资源需求,并事先制定必要的扩展措施,可以克服这些问题。然而,这种主动标度解决方案的有效性取决于所采用的预测方法的准确性。本文提出了一种预测技术,以提高云自动扩展器中工作量预测的准确性。提出了一种基于时间序列和机器学习技术的集成工作负载预测机制,以便对不同的工作负载模式进行更准确的预测。在这项工作中,我们初步评估了几种预测模型在预测不同工作负荷模式中的适用性。然后使用三个众所周知的预测模型实现所提出的集成技术,并针对三个实际工作负载进行测试。仿真结果表明,与使用单个模型和开源PaaS平台Apache Stratos中使用的预测技术相比,我们的集成方法产生的预测误差显着降低。
{"title":"Adaptive workload prediction for proactive auto scaling in PaaS systems","authors":"R.S. Shariffdeen, D.T.S.P. Munasinghe, H. S. Bhathiya, U.K.J.U. Bandara, H. Bandara","doi":"10.1109/CLOUDTECH.2016.7847713","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847713","url":null,"abstract":"Elasticity is a key feature of cloud computing where resources are allocated and released according to user demands. Reactive auto scaling, in which the scaling actions take place just after meeting the triggering thresholds, suffers from several issues like risk of under provisioning at peak loads and over provisioning during other times. Proactive scaling solutions, where future resource demand can be forecast and necessary scaling actions enacted beforehand, can overcome these issues. Nevertheless, the effectiveness of such proactive scaling solutions depends on the accuracy of the prediction method(s) adopted. We propose a forecasting technique to enhance the accuracy of workload forecasting in cloud auto-scalers. An ensemble workload prediction mechanism based on time series and machine learning techniques is proposed to make more accurate predictions on drastically different workload patterns. In this work, we initially evaluated several forecasting models for their applicability in forecasting different workload patterns. The proposed ensemble technique is then implemented using three well-known forecasting models and tested for three real-world workloads. Simulation results show that our ensemble method produces significantly lower forecast errors compared to the use of individual models and the prediction technique employed in Apache Stratos, an open source PaaS platform.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128030904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
FP2E: Flexible, effective and privacy preserving cloud data sharing scheme FP2E:灵活、有效、保护隐私的云数据共享方案
Imad El Ghoubach, Rachid Benabbou, F. Mrabti
The storage service is one of the most popular services in the cloud. This service allows outsourcing of data storage in service provider servers while having the ability to access it from different devices. Moreover, this service provides the ability to make data-sharing operations with one or more customers, which requires the implementation of a method to maintain data confidentiality while providing granular, scalable and flexible access control. For this reason, several schemes have been proposed. In this paper we propose a scheme, based on cipher-text policy attribute based encryption (CP-ABE), that is able to achieve the desired level of security while having a reduced computation overhead.
存储服务是云计算中最流行的服务之一。该服务允许外包服务提供商服务器中的数据存储,同时能够从不同的设备访问它。此外,该服务提供了与一个或多个客户进行数据共享操作的能力,这需要实现一种方法来维护数据机密性,同时提供粒度、可扩展和灵活的访问控制。为此,提出了几种方案。在本文中,我们提出了一种基于密文策略属性加密(CP-ABE)的方案,该方案能够在降低计算开销的同时达到所需的安全级别。
{"title":"FP2E: Flexible, effective and privacy preserving cloud data sharing scheme","authors":"Imad El Ghoubach, Rachid Benabbou, F. Mrabti","doi":"10.1109/CLOUDTECH.2016.7847691","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847691","url":null,"abstract":"The storage service is one of the most popular services in the cloud. This service allows outsourcing of data storage in service provider servers while having the ability to access it from different devices. Moreover, this service provides the ability to make data-sharing operations with one or more customers, which requires the implementation of a method to maintain data confidentiality while providing granular, scalable and flexible access control. For this reason, several schemes have been proposed. In this paper we propose a scheme, based on cipher-text policy attribute based encryption (CP-ABE), that is able to achieve the desired level of security while having a reduced computation overhead.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131869559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Class noise elimination approach for large datasets based on a combination of classifiers 基于分类器组合的大型数据集类噪声消除方法
B. Zerhari
Noise points, or class noise, detection and elimination became increasingly important to handle large datasets. In fact, eliminating noise in this environment helps reduce computing costs, especially when using clustering algorithms. Nowadays, large varieties of clustering algorithms exist and produce good results. However, they often assume that the input data are free or have very low level of noise, which is rarely the case in real Big Data context. In this paper, we present a noise detection and elimination approach for large datasets. This approach relies on four important steps: divide data into subsets, extract the best rules, apply different classifiers to the subsets, and finally combine the classifiers results.
噪声点或类噪声的检测和消除对于处理大型数据集变得越来越重要。事实上,在这种环境中消除噪声有助于降低计算成本,特别是在使用聚类算法时。目前,聚类算法种类繁多,并取得了良好的聚类效果。然而,他们通常假设输入的数据是自由的或具有非常低的噪声水平,这在真正的大数据环境中很少出现。在本文中,我们提出了一种针对大数据集的噪声检测和消除方法。该方法依赖于四个重要步骤:将数据划分为子集,提取最佳规则,对子集应用不同的分类器,最后组合分类器的结果。
{"title":"Class noise elimination approach for large datasets based on a combination of classifiers","authors":"B. Zerhari","doi":"10.1109/CLOUDTECH.2016.7847688","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847688","url":null,"abstract":"Noise points, or class noise, detection and elimination became increasingly important to handle large datasets. In fact, eliminating noise in this environment helps reduce computing costs, especially when using clustering algorithms. Nowadays, large varieties of clustering algorithms exist and produce good results. However, they often assume that the input data are free or have very low level of noise, which is rarely the case in real Big Data context. In this paper, we present a noise detection and elimination approach for large datasets. This approach relies on four important steps: divide data into subsets, extract the best rules, apply different classifiers to the subsets, and finally combine the classifiers results.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128709252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Comparative study between Hadoop and Spark based on Hibench benchmarks 基于Hibench基准的Hadoop和Spark的比较研究
Yassir Samadi, M. Zbakh, C. Tadonki
Big Data is currently a hot topic for companies and scientists around the world, due to the emergence of new technologies, devices and communication means like social network sites, which led to a noticeable increase of the amount of data produced every year, even every day. In addition, traditional algorithms and technologies are inefficient to process, analyze and store this vast amount of data. So, to solve this problem, Big Data frameworks are needed. In this paper, we present and discuss a performance comparison between two popular Big Data frameworks. Hadoop and Spark, which are used to efficiently process vast amount of data in parallel and distributed mode on a large clusters. Hibench benchmark suite is used to compare the performance of these two frameworks based on the criteria as execution time, throughput and speedup. Our experimental results show that Spark is more efficient than Hadoop to deal with large amount of data. However, spark requires higher memory allocation, since it loads processes into memory and keeps them in caches for a while, just like standard databases. So the choice depends on performance level and memory constraints.
由于社交网站等新技术、新设备和新通信手段的出现,导致每年甚至每天产生的数据量都在显著增加,大数据目前是世界各地公司和科学家的热门话题。此外,传统的算法和技术在处理、分析和存储如此庞大的数据方面效率低下。因此,要解决这个问题,需要大数据框架。在本文中,我们提出并讨论了两种流行的大数据框架之间的性能比较。Hadoop和Spark,用于在大型集群上以并行和分布式模式高效地处理大量数据。Hibench基准测试套件用于根据执行时间、吞吐量和加速等标准比较这两个框架的性能。实验结果表明,在处理海量数据时,Spark比Hadoop更高效。然而,spark需要更高的内存分配,因为它将进程加载到内存中并将它们保存在缓存中一段时间,就像标准数据库一样。因此,选择取决于性能水平和内存约束。
{"title":"Comparative study between Hadoop and Spark based on Hibench benchmarks","authors":"Yassir Samadi, M. Zbakh, C. Tadonki","doi":"10.1109/CLOUDTECH.2016.7847709","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2016.7847709","url":null,"abstract":"Big Data is currently a hot topic for companies and scientists around the world, due to the emergence of new technologies, devices and communication means like social network sites, which led to a noticeable increase of the amount of data produced every year, even every day. In addition, traditional algorithms and technologies are inefficient to process, analyze and store this vast amount of data. So, to solve this problem, Big Data frameworks are needed. In this paper, we present and discuss a performance comparison between two popular Big Data frameworks. Hadoop and Spark, which are used to efficiently process vast amount of data in parallel and distributed mode on a large clusters. Hibench benchmark suite is used to compare the performance of these two frameworks based on the criteria as execution time, throughput and speedup. Our experimental results show that Spark is more efficient than Hadoop to deal with large amount of data. However, spark requires higher memory allocation, since it loads processes into memory and keeps them in caches for a while, just like standard databases. So the choice depends on performance level and memory constraints.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123440822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
期刊
2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1