首页 > 最新文献

2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)最新文献

英文 中文
Privacy Preserving Third Party Auditing in Multi Cloud Storage Environment 多云存储环境下保护隐私的第三方审计
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015495
M. Shashidhara, C. P. Jaini
The on-demand, pay-per-use, and scalable services provided in cloud model guarantee to reduce capital as well as running expenditures for both hardware and software. In cloud environment, users can remotely store their data and access them from a shared pool of configurable computing resources, without local data storage burden. We discuss various methods related to the security and privacy capabilities in cloud paradigm especially data storage in multi cloud environment. We provide three models in form of multicloud architectures which allow categorizing the schemes and analyze them according to their security benefits. The different methods include, resource replication, split application system into tiers based on PIR methods, split both application logic and data into segments. In addition, since the integrity protection of data is a fearsome task in Cloud computing for users with limited computing resources, vulnerabilities in user data privacy are also possible in third party auditing. So we propose a safe cloud storage methodology which supports privacy-preserving third party auditing. And we study the outcomes to perform audits concurrently for multiple users in an efficient manner. Experimental results show that the third party auditing computation time is better than existing approach.
云模式提供的按需、按使用付费和可扩展的服务保证了减少硬件和软件的资本和运行支出。在云环境中,用户可以远程存储数据,并从可配置的计算资源共享池中访问数据,无需承担本地数据存储的负担。我们讨论了与云范式中的安全和隐私功能相关的各种方法,特别是多云环境中的数据存储。我们以多云架构的形式提供了三种模型,允许对方案进行分类并根据其安全效益进行分析。不同的方法包括:资源复制、基于PIR方法的应用系统分层、应用逻辑和数据分段。此外,对于计算资源有限的用户来说,云计算中数据的完整性保护是一项艰巨的任务,因此第三方审计也可能存在用户数据隐私漏洞。因此,我们提出了一种安全的云存储方法,支持保护隐私的第三方审计。我们还研究了结果,以便以有效的方式对多个用户并发地执行审计。实验结果表明,第三方审计的计算时间优于现有的审计方法。
{"title":"Privacy Preserving Third Party Auditing in Multi Cloud Storage Environment","authors":"M. Shashidhara, C. P. Jaini","doi":"10.1109/CCEM.2014.7015495","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015495","url":null,"abstract":"The on-demand, pay-per-use, and scalable services provided in cloud model guarantee to reduce capital as well as running expenditures for both hardware and software. In cloud environment, users can remotely store their data and access them from a shared pool of configurable computing resources, without local data storage burden. We discuss various methods related to the security and privacy capabilities in cloud paradigm especially data storage in multi cloud environment. We provide three models in form of multicloud architectures which allow categorizing the schemes and analyze them according to their security benefits. The different methods include, resource replication, split application system into tiers based on PIR methods, split both application logic and data into segments. In addition, since the integrity protection of data is a fearsome task in Cloud computing for users with limited computing resources, vulnerabilities in user data privacy are also possible in third party auditing. So we propose a safe cloud storage methodology which supports privacy-preserving third party auditing. And we study the outcomes to perform audits concurrently for multiple users in an efficient manner. Experimental results show that the third party auditing computation time is better than existing approach.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133535593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Contracts in Cloud Computing 云计算合同
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015489
Irene Kafeza, E. Kafeza, E. Panas
In an increasingly integrated global economy the importance as well as the growing availability of Cloud Providers has provided companies, individuals and the Governmental agencies with a variety of benefits such as significant cost reduction. As the role and number of Cloud Providers has increased a novel set of issues has emerged. These novel issues refer to a variety of legal complexities from the initial choice of the proper Cloud Provider as well as the appropriate contract for the deployment of its services. This paper is concerned with the novel issues arising of the deployment of Cloud Computing contracts. It presents the related issues and discusses ways and suggestions by which the legal framework could be demystified so that the contracts conducted in the Cloud Computing environment can be conducted efficiently and in a legal manner, for the benefit of the private as well as the public sector. It is concerned that the current legal framework cannot provide solution for effective deployment of Cloud Computing contracts and drawing on this evidence, it discusses the steps that Cloud Computing participants need to take to correctly identify their contractual rights and obligations.
在日益一体化的全球经济中,云提供商的重要性和日益增加的可用性为公司、个人和政府机构提供了各种好处,例如大幅降低成本。随着云提供商的角色和数量的增加,出现了一系列新的问题。这些新问题涉及从最初选择合适的云提供商到部署其服务的适当合同的各种法律复杂性。本文关注的是云计算契约部署中出现的新问题。报告提出了相关问题,并讨论了消除法律框架神秘性的方法和建议,以便在云计算环境中进行的合同能够以合法的方式有效地进行,使私营部门和公共部门都能从中受益。委员会关切的是,目前的法律框架无法为有效部署云计算合同提供解决办法,并根据这一证据讨论了云计算参与者为正确确定其合同权利和义务所需采取的步骤。
{"title":"Contracts in Cloud Computing","authors":"Irene Kafeza, E. Kafeza, E. Panas","doi":"10.1109/CCEM.2014.7015489","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015489","url":null,"abstract":"In an increasingly integrated global economy the importance as well as the growing availability of Cloud Providers has provided companies, individuals and the Governmental agencies with a variety of benefits such as significant cost reduction. As the role and number of Cloud Providers has increased a novel set of issues has emerged. These novel issues refer to a variety of legal complexities from the initial choice of the proper Cloud Provider as well as the appropriate contract for the deployment of its services. This paper is concerned with the novel issues arising of the deployment of Cloud Computing contracts. It presents the related issues and discusses ways and suggestions by which the legal framework could be demystified so that the contracts conducted in the Cloud Computing environment can be conducted efficiently and in a legal manner, for the benefit of the private as well as the public sector. It is concerned that the current legal framework cannot provide solution for effective deployment of Cloud Computing contracts and drawing on this evidence, it discusses the steps that Cloud Computing participants need to take to correctly identify their contractual rights and obligations.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125612341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Protocol to Secure the Cloud from Insider Threats 保护云免受内部威胁的混合协议
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015476
M. Sriram, V. Patel, D. Harishma, N. Lakshmanan
Data Outsourcing has evolved rapidly with the advent of cloud computing wherein third parties provide storage services. Insider attacks still continue to haunt cloud users as they tend to cause unprecedented damage, especially when privileged users who have access to sensitive information go rogue. Many proposals have been made to Secure the Cloud from Insider threat Attacks and most of the standard approaches have been proven to fail from time to time. In this paper, an implementation of a Hybrid protocol that uses Selective Encryption with data cleaning, Enhanced Neural Network based user profiling and decoy technology to combat the insider threat has been proposed. The proposed system gave unprecedented level of security.
随着云计算的出现,数据外包迅速发展,其中第三方提供存储服务。内部攻击仍然继续困扰着云计算用户,因为它们往往会造成前所未有的损害,特别是当有权访问敏感信息的特权用户擅自行动时。为了保护云免受内部威胁攻击,已经提出了许多建议,但大多数标准方法已被证明不时失败。在本文中,提出了一种混合协议的实现,该协议使用选择性加密与数据清洗,基于增强神经网络的用户分析和诱饵技术来对抗内部威胁。拟议中的系统提供了前所未有的安全级别。
{"title":"A Hybrid Protocol to Secure the Cloud from Insider Threats","authors":"M. Sriram, V. Patel, D. Harishma, N. Lakshmanan","doi":"10.1109/CCEM.2014.7015476","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015476","url":null,"abstract":"Data Outsourcing has evolved rapidly with the advent of cloud computing wherein third parties provide storage services. Insider attacks still continue to haunt cloud users as they tend to cause unprecedented damage, especially when privileged users who have access to sensitive information go rogue. Many proposals have been made to Secure the Cloud from Insider threat Attacks and most of the standard approaches have been proven to fail from time to time. In this paper, an implementation of a Hybrid protocol that uses Selective Encryption with data cleaning, Enhanced Neural Network based user profiling and decoy technology to combat the insider threat has been proposed. The proposed system gave unprecedented level of security.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132908499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Novel Bio-Inspired Load Balancing of Virtualmachines in Cloud Environment 云环境下一种基于生物的虚拟机负载平衡方法
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015477
T. Ashwin, Shridhar G. Domanal, R. R. Guddeti
Load Balancing plays an important role in managing the software and the hardware components of cloud. In this present scenario the load balancing algorithm should be efficient in allocating the requested resource and also in the usage of the resources so that the over/underutilization of the resources will not occur in the cloud environment. In the present work, the allocation of all the available Virtual Machines is done in an efficient manner by Particle Swarm Optimization load balancing algorithm. Further, we have used cloudsim simulator to compare and analyze the performance of our algorithm. Simulation results demonstrate that the proposed algorithm distributes the load on all the available virtual machines uniformly i.e, without any under/over utilization and also the average response time is better compared to all existing scheduling algorithms.
负载平衡在管理云的软件和硬件组件方面起着重要的作用。在当前的场景中,负载平衡算法在分配所请求的资源和使用资源方面应该是有效的,以便在云环境中不会出现资源的过度/不足利用。在本工作中,采用粒子群优化负载均衡算法对所有可用的虚拟机进行有效的分配。此外,我们还使用cloudsim模拟器来比较和分析我们的算法的性能。仿真结果表明,该算法将负载均匀地分配到所有可用的虚拟机上,不会出现利用率不足或过高的情况,并且平均响应时间也优于现有的调度算法。
{"title":"A Novel Bio-Inspired Load Balancing of Virtualmachines in Cloud Environment","authors":"T. Ashwin, Shridhar G. Domanal, R. R. Guddeti","doi":"10.1109/CCEM.2014.7015477","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015477","url":null,"abstract":"Load Balancing plays an important role in managing the software and the hardware components of cloud. In this present scenario the load balancing algorithm should be efficient in allocating the requested resource and also in the usage of the resources so that the over/underutilization of the resources will not occur in the cloud environment. In the present work, the allocation of all the available Virtual Machines is done in an efficient manner by Particle Swarm Optimization load balancing algorithm. Further, we have used cloudsim simulator to compare and analyze the performance of our algorithm. Simulation results demonstrate that the proposed algorithm distributes the load on all the available virtual machines uniformly i.e, without any under/over utilization and also the average response time is better compared to all existing scheduling algorithms.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126149356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
SLA-Aware Provisioning and Scheduling of Cloud Resources for Big Data Analytics 面向大数据分析的基于sla的云资源配置与调度
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015497
Mohammed Alrokayan, Amir Vahid Dastjerdi, R. Buyya
The stunning growth in data has immensely impacted organizations. Their infrastructure and traditional data management system could not keep up to scale of Big Data. They have to either invest heavily on their infrastructure or move their Big Data analytics to Cloud where they can benefit from both on-demand scalability and contemporary data management techniques. However, to make Cloud hosted Big Data analytics available to wider range of enterprises, we have to carefully capture their preferences in terms of budget and service level objectives. Therefore, this study aims at proposing a SLA and cost-aware resource provisioning and task scheduling approach tailored for Big Data applications in the Cloud. Current approaches assume that data is pre-stored in cluster nodes prior to deployment of Big Data applications. In addition, their focus is purely on task scheduling, and not virtual machine provisioning. We argue that in the Cloud computing context this is not applicable, because the nodes are provisioned dynamically (data cannot be pre-stored) and leaving provisioning to user may lead to under or over provisioning that can both lead to SLA or budget constraint violations. Therefore,in this study we first model the user request, which consist of Big Data analytics jobs with budget and deadline. Then, we model infrastructures as a list of data centers, virtual machines (offered in a pay-as-you-go model), data sources, and network throughputs. After that, to address the aforementioned issues, we propose and compare cost-aware and SLA-based algorithms which provision cloud resources and schedule analytics tasks.
数据的惊人增长极大地影响了组织。他们的基础设施和传统的数据管理系统已经跟不上大数据的规模。他们要么在基础设施上投入巨资,要么将大数据分析转移到云端,在那里他们可以从按需可扩展性和现代数据管理技术中受益。然而,为了让更广泛的企业可以使用云托管的大数据分析,我们必须在预算和服务水平目标方面仔细捕捉他们的偏好。因此,本研究旨在为云中的大数据应用提出一种SLA和成本意识资源配置和任务调度方法。目前的方法假设数据在部署大数据应用程序之前预先存储在集群节点中。此外,它们的重点纯粹是任务调度,而不是虚拟机供应。我们认为,在云计算上下文中,这是不适用的,因为节点是动态供应的(数据不能预先存储),将供应留给用户可能会导致供应不足或供应过剩,从而导致违反SLA或预算约束。因此,在本研究中,我们首先对用户请求进行建模,其中包括具有预算和截止日期的大数据分析工作。然后,我们将基础设施建模为数据中心、虚拟机(在即用即付模型中提供)、数据源和网络吞吐量的列表。之后,为了解决上述问题,我们提出并比较了提供云资源和调度分析任务的成本感知算法和基于sla的算法。
{"title":"SLA-Aware Provisioning and Scheduling of Cloud Resources for Big Data Analytics","authors":"Mohammed Alrokayan, Amir Vahid Dastjerdi, R. Buyya","doi":"10.1109/CCEM.2014.7015497","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015497","url":null,"abstract":"The stunning growth in data has immensely impacted organizations. Their infrastructure and traditional data management system could not keep up to scale of Big Data. They have to either invest heavily on their infrastructure or move their Big Data analytics to Cloud where they can benefit from both on-demand scalability and contemporary data management techniques. However, to make Cloud hosted Big Data analytics available to wider range of enterprises, we have to carefully capture their preferences in terms of budget and service level objectives. Therefore, this study aims at proposing a SLA and cost-aware resource provisioning and task scheduling approach tailored for Big Data applications in the Cloud. Current approaches assume that data is pre-stored in cluster nodes prior to deployment of Big Data applications. In addition, their focus is purely on task scheduling, and not virtual machine provisioning. We argue that in the Cloud computing context this is not applicable, because the nodes are provisioned dynamically (data cannot be pre-stored) and leaving provisioning to user may lead to under or over provisioning that can both lead to SLA or budget constraint violations. Therefore,in this study we first model the user request, which consist of Big Data analytics jobs with budget and deadline. Then, we model infrastructures as a list of data centers, virtual machines (offered in a pay-as-you-go model), data sources, and network throughputs. After that, to address the aforementioned issues, we propose and compare cost-aware and SLA-based algorithms which provision cloud resources and schedule analytics tasks.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129171241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Cloud Based Self Driving Cars 基于云的自动驾驶汽车
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015485
Naveen Shivaramu Yeshodara, Namratha S. Nagojappa, Nikhitha Kishore
This paper presents a novel idea for reducing the data storage problems in the self-driving cars. Self-driving cars is a technology that is observed by the modern word with most curiosity. However the vulnerability with the car is the growing data and the approach for handling such huge amount of data growth. This paper proposes a cloud based self-driving car which can optimize the data storage problems in such cars. The idea is to not store any data in the car, rather download everything from the cloud as per the need of the travel. This allows the car to not keep a huge amount of data and rely on a cloud infrastructure for the drive.
本文提出了一种减少自动驾驶汽车数据存储问题的新思路。自动驾驶汽车是现代世界最好奇的一项技术。然而,汽车的弱点是不断增长的数据和处理如此大量数据增长的方法。本文提出了一种基于云的自动驾驶汽车,可以优化自动驾驶汽车的数据存储问题。这个想法是不将任何数据存储在车内,而是根据旅行的需要从云端下载所有数据。这使得汽车不需要保存大量的数据,而是依靠云基础设施来驱动。
{"title":"Cloud Based Self Driving Cars","authors":"Naveen Shivaramu Yeshodara, Namratha S. Nagojappa, Nikhitha Kishore","doi":"10.1109/CCEM.2014.7015485","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015485","url":null,"abstract":"This paper presents a novel idea for reducing the data storage problems in the self-driving cars. Self-driving cars is a technology that is observed by the modern word with most curiosity. However the vulnerability with the car is the growing data and the approach for handling such huge amount of data growth. This paper proposes a cloud based self-driving car which can optimize the data storage problems in such cars. The idea is to not store any data in the car, rather download everything from the cloud as per the need of the travel. This allows the car to not keep a huge amount of data and rely on a cloud infrastructure for the drive.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116731111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Outsourcing Resource-Intensive Tasks from Mobile Apps to Clouds: Android and Aneka Integration 将资源密集型任务从移动应用程序外包到云:Android和Aneka集成
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015494
Tiago Justino, R. Buyya
Mobile Cloud Computing enables augmenting mobile device capabilities and increasing battery lifetime through the extension of cloud services and resources, resulting in an enhanced user experience. However, the development of a mobile cloud application is challenging because it involves dealing with different cloud providers and mobile platforms. To tackle the above issues, a mobile cloud architecture is proposed to asynchronously delegate resource-intensive mobile tasks in order to alleviate the mobile device load and, consequently, extend the battery life. We demonstrate this capability by developing an interface that supports the delegation of heavy tasks from mobile apps running under the Android mobile platform to a cloud computing environment managed by the Aneka Cloud Application Platform. The Aneka Mobile Client Library encapsulates the processes of communicating to cloud is provided, thus, the effort and complexity of developing a mobile cloud application is decreased. Two different resource-intensive mobile application are presented in order to show the library effectiveness. A performance evaluation is conducted showing the feasibility of architecture through the reduction of application execution time and extension of mobile device battery life.
移动云计算通过扩展云服务和资源,增强了移动设备的功能,延长了电池寿命,从而增强了用户体验。然而,移动云应用程序的开发是具有挑战性的,因为它涉及到处理不同的云提供商和移动平台。为了解决上述问题,提出了一种移动云架构,以异步委派资源密集型的移动任务,以减轻移动设备的负载,从而延长电池寿命。我们通过开发一个接口来展示这种能力,该接口支持将在Android移动平台下运行的移动应用程序的繁重任务委托给由Aneka云应用程序平台管理的云计算环境。Aneka移动客户端库封装了与云通信的过程,从而降低了开发移动云应用程序的工作量和复杂性。为了展示图书馆的有效性,给出了两种不同的资源密集型移动应用程序。通过减少应用程序执行时间和延长移动设备电池寿命,进行了性能评估,证明了该架构的可行性。
{"title":"Outsourcing Resource-Intensive Tasks from Mobile Apps to Clouds: Android and Aneka Integration","authors":"Tiago Justino, R. Buyya","doi":"10.1109/CCEM.2014.7015494","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015494","url":null,"abstract":"Mobile Cloud Computing enables augmenting mobile device capabilities and increasing battery lifetime through the extension of cloud services and resources, resulting in an enhanced user experience. However, the development of a mobile cloud application is challenging because it involves dealing with different cloud providers and mobile platforms. To tackle the above issues, a mobile cloud architecture is proposed to asynchronously delegate resource-intensive mobile tasks in order to alleviate the mobile device load and, consequently, extend the battery life. We demonstrate this capability by developing an interface that supports the delegation of heavy tasks from mobile apps running under the Android mobile platform to a cloud computing environment managed by the Aneka Cloud Application Platform. The Aneka Mobile Client Library encapsulates the processes of communicating to cloud is provided, thus, the effort and complexity of developing a mobile cloud application is decreased. Two different resource-intensive mobile application are presented in order to show the library effectiveness. A performance evaluation is conducted showing the feasibility of architecture through the reduction of application execution time and extension of mobile device battery life.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114623545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Achieving Energy Efficiency by Optimal Resource Utilisation in Cloud Environment 云环境下通过优化资源利用实现能源效率
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015479
Devwrat More, Sanket Vaibhav Mehta, Pooja Pathak, Lokesh Walase, J. Abraham
Emergence of cloud computing has provided an efficient platform for distributed utility computing. But, the huge amount of energy consumed in cloud environment has raised many environmental concerns. To solve the issue of energy consumption in cloud environment, the design of energy efficient mechanism must start to play a major role. The paper addresses this issue by proposing Energy Manager which governs activities in cloud to attain optimal energy utilization. The Energy Manager takes into account resource utilization, CPU frequency, supply voltage and effect of all these on response time. In a novel way, it uses soft scaling as a precursor to Dynamic Voltage and Frequency Scaling (DVFS) to enhance the effectiveness of DVFS in virtualized environment. It implements DVFS, Virtual Machine (VM) migration and consolidation, soft scaling, and power state switching techniques to achieve the objective.
云计算的出现为分布式效用计算提供了一个高效的平台。但是,云环境中消耗的大量能源引起了许多环境问题。要解决云环境下的能源消耗问题,节能机制的设计必须开始发挥重要作用。本文通过提出管理云中的活动以达到最佳能源利用的能源管理器来解决这个问题。能源管理器考虑到资源利用率、CPU频率、电源电压以及所有这些对响应时间的影响。采用软标度作为动态电压频率标度(DVFS)的前身,提高了动态电压频率标度在虚拟环境中的有效性。它实现了DVFS、虚拟机(VM)迁移和整合、软扩展和电源状态切换技术来实现这一目标。
{"title":"Achieving Energy Efficiency by Optimal Resource Utilisation in Cloud Environment","authors":"Devwrat More, Sanket Vaibhav Mehta, Pooja Pathak, Lokesh Walase, J. Abraham","doi":"10.1109/CCEM.2014.7015479","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015479","url":null,"abstract":"Emergence of cloud computing has provided an efficient platform for distributed utility computing. But, the huge amount of energy consumed in cloud environment has raised many environmental concerns. To solve the issue of energy consumption in cloud environment, the design of energy efficient mechanism must start to play a major role. The paper addresses this issue by proposing Energy Manager which governs activities in cloud to attain optimal energy utilization. The Energy Manager takes into account resource utilization, CPU frequency, supply voltage and effect of all these on response time. In a novel way, it uses soft scaling as a precursor to Dynamic Voltage and Frequency Scaling (DVFS) to enhance the effectiveness of DVFS in virtualized environment. It implements DVFS, Virtual Machine (VM) migration and consolidation, soft scaling, and power state switching techniques to achieve the objective.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126778256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analyzing User Behavior Using Keystroke Dynamics to Protect Cloud from Malicious Insiders 使用击键动力学分析用户行为以保护云免受恶意内部人员的攻击
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015481
Mahesh Babu Bondada, S. M. Bhanu
Nowadays cloud computing is growing vastly as the number of companies are depending mostly on this technology due to its advantages. All the data are stored across the globe and maintained by the cloud service providers i.e., the responsibility of the data is in the hands of cloud providers. The data breach is a biggest problem in cloud as the data are shared across the globe and sensitive information of the customer is stored at some third party storage site. Security of the data is the major concern in cloud from outsiders as well as insiders. Insider attack is the most devastating threat due to the familiarity of the underlying system to the insiders. The proposed approach mitigates this threat by a host based user profiling technique where a key stroke dynamics is used for analyzing the user behavior and a retraining approach is also proposed as the imposter patterns are absent at the time of registration. Retraining boosts the overall system performance in mitigating the insider threat.
如今,由于云计算的优势,许多公司主要依赖于这种技术,因此云计算正在迅速增长。所有数据都存储在全球各地,并由云服务提供商维护,即数据的责任掌握在云提供商手中。数据泄露是云计算的最大问题,因为数据在全球范围内共享,客户的敏感信息存储在一些第三方存储站点。数据的安全性是云计算的主要关注点,无论是外部人士还是内部人士。内部攻击是最具破坏性的威胁,因为内部人员对底层系统非常熟悉。提出的方法通过基于主机的用户分析技术减轻了这种威胁,其中使用键击动态来分析用户行为,并且还提出了再训练方法,因为在注册时不存在冒名顶替模式。再培训在减轻内部威胁方面提高了系统的整体性能。
{"title":"Analyzing User Behavior Using Keystroke Dynamics to Protect Cloud from Malicious Insiders","authors":"Mahesh Babu Bondada, S. M. Bhanu","doi":"10.1109/CCEM.2014.7015481","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015481","url":null,"abstract":"Nowadays cloud computing is growing vastly as the number of companies are depending mostly on this technology due to its advantages. All the data are stored across the globe and maintained by the cloud service providers i.e., the responsibility of the data is in the hands of cloud providers. The data breach is a biggest problem in cloud as the data are shared across the globe and sensitive information of the customer is stored at some third party storage site. Security of the data is the major concern in cloud from outsiders as well as insiders. Insider attack is the most devastating threat due to the familiarity of the underlying system to the insiders. The proposed approach mitigates this threat by a host based user profiling technique where a key stroke dynamics is used for analyzing the user behavior and a retraining approach is also proposed as the imposter patterns are absent at the time of registration. Retraining boosts the overall system performance in mitigating the insider threat.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121540317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Cloudy with a Spot of Opportunity: Analysis of Spot-Priced VMs for Practical Job Scheduling 多云的机会点:现货定价虚拟机的实际作业调度分析
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015488
Vedsar Kushwaha, Yogesh L. Simmhan
Public Clouds offer elastic computing resources on- demand using a pay-as-you-go model. While this has opened up access to computing infrastructure, the costs for accessing Cloud resources can be a barrier to adoption in emerging markets. Spot- priced virtual machines (VMs) are offered at deep discounts for the same compute capability as fixed price on-demand VMs. But they can be reclaimed by the Cloud provider at any time, affecting reliability. This paper characterises the behaviour of spot-priced VM from Amazon Web Service for the Asia-Pacific and US East Regions, and analyses their practical impact on running jobs on spot VMs. Our simulation study using jobs of diverse sizes evaluates the trade-offs between cost savings over fixed price VMs and job resilience. Our results show that in most cases, for the workloads studied, we can achieve an effective bottom-line cost savings of 80 using spot VMs, with over 95 reliability.
公共云使用按需付费模式提供弹性计算资源。虽然这打开了对计算基础设施的访问,但访问云资源的成本可能成为新兴市场采用云计算的障碍。现货价格的虚拟机(vm)提供与固定价格的按需虚拟机相同的计算能力的大幅折扣。但是它们可以随时被云提供商回收,从而影响可靠性。本文描述了Amazon Web Service在亚太和美国东部地区的现货价格VM的行为,并分析了它们对现货VM上运行作业的实际影响。我们的模拟研究使用不同规模的工作来评估固定价格虚拟机的成本节约和工作弹性之间的权衡。我们的结果表明,在大多数情况下,对于所研究的工作负载,我们可以使用spot vm实现有效的底线成本节约80,可靠性超过95。
{"title":"Cloudy with a Spot of Opportunity: Analysis of Spot-Priced VMs for Practical Job Scheduling","authors":"Vedsar Kushwaha, Yogesh L. Simmhan","doi":"10.1109/CCEM.2014.7015488","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015488","url":null,"abstract":"Public Clouds offer elastic computing resources on- demand using a pay-as-you-go model. While this has opened up access to computing infrastructure, the costs for accessing Cloud resources can be a barrier to adoption in emerging markets. Spot- priced virtual machines (VMs) are offered at deep discounts for the same compute capability as fixed price on-demand VMs. But they can be reclaimed by the Cloud provider at any time, affecting reliability. This paper characterises the behaviour of spot-priced VM from Amazon Web Service for the Asia-Pacific and US East Regions, and analyses their practical impact on running jobs on spot VMs. Our simulation study using jobs of diverse sizes evaluates the trade-offs between cost savings over fixed price VMs and job resilience. Our results show that in most cases, for the workloads studied, we can achieve an effective bottom-line cost savings of 80 using spot VMs, with over 95 reliability.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1