首页 > 最新文献

2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)最新文献

英文 中文
Network Telemetry Anonymization for Cloud Based Security Analysis - Best Practices 基于云的安全分析的网络遥测匿名化-最佳实践
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015493
Sashank Dara
Availability of network telemetry data aides in identifying security compromises, malicious traffic patterns, malware spread etc. There are varieties of Cloud based security services available for consumers to benefit from but on another hand there is a compelling need for ensuring privacy of sensitive fields before data is shared with any cloud provider. Anonymization techniques based on micro-data or macro-data have challenges in terms of attacks possible, scalability and practicality. In this paper we discuss challenges in privacy-preserving cloudification of network telemetry data. We present practical and scalable techniques for network data anonymization. These techniques ensure the privacy of the sensitive fields while retaining the ability to perform security forensics and analytics. We also provide best practices for ensuring successful data anonymization.
网络遥测数据的可用性有助于识别安全漏洞、恶意流量模式、恶意软件传播等。有多种基于云的安全服务可供消费者使用,但另一方面,在与任何云提供商共享数据之前,迫切需要确保敏感字段的隐私。基于微数据或宏观数据的匿名化技术在攻击可能性、可扩展性和实用性方面都存在挑战。本文讨论了网络遥测数据的隐私保护云化所面临的挑战。我们提出了实用和可扩展的网络数据匿名化技术。这些技术确保敏感字段的隐私,同时保留执行安全取证和分析的能力。我们还提供了确保数据匿名化成功的最佳实践。
{"title":"Network Telemetry Anonymization for Cloud Based Security Analysis - Best Practices","authors":"Sashank Dara","doi":"10.1109/CCEM.2014.7015493","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015493","url":null,"abstract":"Availability of network telemetry data aides in identifying security compromises, malicious traffic patterns, malware spread etc. There are varieties of Cloud based security services available for consumers to benefit from but on another hand there is a compelling need for ensuring privacy of sensitive fields before data is shared with any cloud provider. Anonymization techniques based on micro-data or macro-data have challenges in terms of attacks possible, scalability and practicality. In this paper we discuss challenges in privacy-preserving cloudification of network telemetry data. We present practical and scalable techniques for network data anonymization. These techniques ensure the privacy of the sensitive fields while retaining the ability to perform security forensics and analytics. We also provide best practices for ensuring successful data anonymization.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131073015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Client Requirement Modeling Using Resource Broker Architecture in Cloud Computing Environment 云计算环境下基于资源代理体系结构的客户端需求建模
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015484
Chetan Awasthi, P. Kanungo
The Cloud has become platform to provide variety of services and a broker is needed for quality service at competitive rate and to help the vendors in increasing revenue by keeping their resources. In this paper, we have proposed a resource broker mechanism that will help the vendors to identify frequent clients (FC) and provide quality services thereby improving trust on client side. The broker mechanism helps the clients and vendors in locating, resources and increasing their revenue respectively.
云已经成为提供各种服务的平台,需要代理以具有竞争力的价格提供高质量的服务,并帮助供应商通过保留其资源来增加收入。在本文中,我们提出了一种资源代理机制,该机制将帮助供应商识别频繁客户端(FC)并提供高质量的服务,从而提高客户端的信任。代理机制帮助客户和供应商分别找到资源和增加收益。
{"title":"Client Requirement Modeling Using Resource Broker Architecture in Cloud Computing Environment","authors":"Chetan Awasthi, P. Kanungo","doi":"10.1109/CCEM.2014.7015484","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015484","url":null,"abstract":"The Cloud has become platform to provide variety of services and a broker is needed for quality service at competitive rate and to help the vendors in increasing revenue by keeping their resources. In this paper, we have proposed a resource broker mechanism that will help the vendors to identify frequent clients (FC) and provide quality services thereby improving trust on client side. The broker mechanism helps the clients and vendors in locating, resources and increasing their revenue respectively.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Cloud Computing Service Level Agreement Framework with Negotiation and Secure Monitoring 具有协商和安全监控的云计算服务水平协议框架
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015474
V. Binu, N. D. Gangadhar
Service Level Agreements (SLAs) are essential to the service oriented business model of Cloud Computing. SLA Frameworks for cloud computing need methodology for negotiation and monitoring of service delivery. The success and acceptability of SLAs requires their trusted and secure monitoring. In this paper an SLA Framework which incorporates negotiation and secure monitoring mechanism involving a third-party is developed. A reference implementation of the Framework is carried out and used to develop a case study of video transcoding service by a provider hosted on a cloud. The case study illustrates the effectiveness of the developed framework in creating SLAs for complex scenarios encountered in cloud computing services. Workload characterization is used to characterise the SLA service parameters which are employed in defining services.
服务水平协议(sla)对于云计算面向服务的业务模型至关重要。云计算的SLA框架需要协商和监控服务交付的方法。sla的成功和可接受性需要对其进行可信和安全的监视。本文提出了一个集协商和第三方安全监控机制于一体的SLA框架。该框架的参考实现被执行,并用于开发由托管在云上的提供商提供的视频转码服务的案例研究。案例研究说明了开发的框架在为云计算服务中遇到的复杂场景创建sla方面的有效性。工作负载表征用于描述用于定义服务的SLA服务参数。
{"title":"A Cloud Computing Service Level Agreement Framework with Negotiation and Secure Monitoring","authors":"V. Binu, N. D. Gangadhar","doi":"10.1109/CCEM.2014.7015474","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015474","url":null,"abstract":"Service Level Agreements (SLAs) are essential to the service oriented business model of Cloud Computing. SLA Frameworks for cloud computing need methodology for negotiation and monitoring of service delivery. The success and acceptability of SLAs requires their trusted and secure monitoring. In this paper an SLA Framework which incorporates negotiation and secure monitoring mechanism involving a third-party is developed. A reference implementation of the Framework is carried out and used to develop a case study of video transcoding service by a provider hosted on a cloud. The case study illustrates the effectiveness of the developed framework in creating SLAs for complex scenarios encountered in cloud computing services. Workload characterization is used to characterise the SLA service parameters which are employed in defining services.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121762808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MultiPaaS - PaaS on Multiple Clouds MultiPaaS——多云上的PaaS
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015492
S. Sahni, Vasudeva Varma
Current PaaS solutions use an underlying IaaS provider and restrict themselves to a few geographical regions. They operate in one/two zones only and use others for failover or disaster recovery. In this paper, we present the design of MultiPaaS, a PaaS solution which runs on multiple cloud/IaaS providers and leverages the combined global span. Unlike traditional scaling techniques where app servers are scaled up or down in a specific region or data center, we present a design to perform it on a global scale. Origin of the request burst is identified and instances are booted in a data center closest to it. It ensures database persistence and cross-region scalability via a combination of replication techniques. We identify common features available across all IaaS providers and use that as a provider interface to ensure interoperability, but use provider specific extensions to leverage unique offerings and benefits.
当前的PaaS解决方案使用底层IaaS提供商,并将自身限制在少数地理区域。它们仅在一个/两个区域中运行,并使用其他区域进行故障转移或灾难恢复。在本文中,我们介绍了MultiPaaS的设计,这是一种运行在多个云/IaaS提供商上并利用组合的全球跨度的PaaS解决方案。与传统的应用服务器在特定区域或数据中心扩展或缩小的扩展技术不同,我们提出了一种在全球范围内执行它的设计。识别请求突发的来源,并在离它最近的数据中心启动实例。它通过组合复制技术确保数据库持久性和跨区域可伸缩性。我们确定所有IaaS提供商可用的公共特性,并将其用作提供商接口以确保互操作性,但使用特定于提供商的扩展来利用独特的产品和优势。
{"title":"MultiPaaS - PaaS on Multiple Clouds","authors":"S. Sahni, Vasudeva Varma","doi":"10.1109/CCEM.2014.7015492","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015492","url":null,"abstract":"Current PaaS solutions use an underlying IaaS provider and restrict themselves to a few geographical regions. They operate in one/two zones only and use others for failover or disaster recovery. In this paper, we present the design of MultiPaaS, a PaaS solution which runs on multiple cloud/IaaS providers and leverages the combined global span. Unlike traditional scaling techniques where app servers are scaled up or down in a specific region or data center, we present a design to perform it on a global scale. Origin of the request burst is identified and instances are booted in a data center closest to it. It ensures database persistence and cross-region scalability via a combination of replication techniques. We identify common features available across all IaaS providers and use that as a provider interface to ensure interoperability, but use provider specific extensions to leverage unique offerings and benefits.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130690637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
DBMLE: Distance-Based Multi-Level Elliptic Routing Protocol for Ad Hoc Networks 用于自组织网络的基于距离的多级椭圆路由协议
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015490
K. Dsouza, M. Sujatha
A critical challenge in the design of Ad Hoc networks is the development of an efficient routing protocol which provides high quality communication. The node's in MANET have limited communication resources such as bandwidth, buffer space, battery power etc. The resource constraints in MANET require the traffic to be properly distributed among the mobile host. The distance based multi-level elliptic routing protocol proposed in this paper is an efficient method of selecting the node as a next hop node, while communicating in a mobile Ad hoc network. The proposed method selects the node's which are orthogonal to the centroid. Here the node uses the position information to identify the nodes which lie in orthogonal direction. The node obtains location information from the GPS location service. The GPS location service fails to give accurate position information in constrained environments such as node not exposed to GPS satellites. In these scenarios, the node fails to get the location information. The error caused leads to locating the node to improper position. Therefore DBMLE protocol used in this paper uses communication signal strength along with the GPS information. The nodes keep track of neighbor node's position, velocity and signal strength information.
Ad Hoc网络设计的一个关键挑战是开发一种高效的路由协议,以提供高质量的通信。在MANET中,节点的通信资源有限,如带宽、缓冲空间、电池电量等。MANET中的资源限制要求流量在移动主机之间合理分配。本文提出的基于距离的多级椭圆路由协议是移动自组网通信中选择节点作为下一跳节点的一种有效方法。该方法选择与质心正交的节点。在这里,节点使用位置信息来识别位于正交方向的节点。节点从GPS定位服务中获取位置信息。GPS定位服务在不暴露于GPS卫星的节点等受限环境中无法提供准确的位置信息。在这种情况下,节点获取位置信息失败。该错误将导致节点定位错误。因此本文采用的DBMLE协议利用了GPS信息的通信信号强度。节点跟踪邻居节点的位置、速度和信号强度信息。
{"title":"DBMLE: Distance-Based Multi-Level Elliptic Routing Protocol for Ad Hoc Networks","authors":"K. Dsouza, M. Sujatha","doi":"10.1109/CCEM.2014.7015490","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015490","url":null,"abstract":"A critical challenge in the design of Ad Hoc networks is the development of an efficient routing protocol which provides high quality communication. The node's in MANET have limited communication resources such as bandwidth, buffer space, battery power etc. The resource constraints in MANET require the traffic to be properly distributed among the mobile host. The distance based multi-level elliptic routing protocol proposed in this paper is an efficient method of selecting the node as a next hop node, while communicating in a mobile Ad hoc network. The proposed method selects the node's which are orthogonal to the centroid. Here the node uses the position information to identify the nodes which lie in orthogonal direction. The node obtains location information from the GPS location service. The GPS location service fails to give accurate position information in constrained environments such as node not exposed to GPS satellites. In these scenarios, the node fails to get the location information. The error caused leads to locating the node to improper position. Therefore DBMLE protocol used in this paper uses communication signal strength along with the GPS information. The nodes keep track of neighbor node's position, velocity and signal strength information.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129324854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Cloud Computing Model for Patient Record Management in South Africa 南非患者记录管理的增强型云计算模型
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015480
R. Millham
Cloud computing provides low initial cost for clients, scalability, and the ability to optimally use and share computing resources which makes cloud computing particularly attractive for emerging countries. In this paper, we provide several concrete examples of how cloud computing enhances the business/social environment of the client emerging nation, particularly in the areas of supply chain management, education, and health care. The field of healthcare, within cloud computing, in South Africa is examined in particular due to its need of sharing of patient data in order to improve the processes of patient transfer and to allocate health care resources optionally. An enhanced model to share patient data is present with increased capacity for the sharing of data and with improved security.
云计算为客户提供了较低的初始成本、可扩展性以及以最佳方式使用和共享计算资源的能力,这使得云计算对新兴国家特别有吸引力。在本文中,我们提供了几个具体的示例,说明云计算如何增强新兴国家客户的商业/社会环境,特别是在供应链管理、教育和医疗保健领域。对南非云计算中的医疗保健领域进行了特别审查,因为它需要共享患者数据,以便改进患者转诊流程并有选择地分配医疗保健资源。提供了一个增强的共享患者数据的模型,增加了共享数据的容量,并提高了安全性。
{"title":"An Enhanced Cloud Computing Model for Patient Record Management in South Africa","authors":"R. Millham","doi":"10.1109/CCEM.2014.7015480","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015480","url":null,"abstract":"Cloud computing provides low initial cost for clients, scalability, and the ability to optimally use and share computing resources which makes cloud computing particularly attractive for emerging countries. In this paper, we provide several concrete examples of how cloud computing enhances the business/social environment of the client emerging nation, particularly in the areas of supply chain management, education, and health care. The field of healthcare, within cloud computing, in South Africa is examined in particular due to its need of sharing of patient data in order to improve the processes of patient transfer and to allocate health care resources optionally. An enhanced model to share patient data is present with increased capacity for the sharing of data and with improved security.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data Infrastructure for Aviation Data Analytics 航空数据分析的大数据基础设施
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015483
A. Murugan, D. Mylaraswamy, Brian Xu, P. Dietrich
This paper describes our approach towards developing and using a big data infrastructure for analyzing aviation data. In this paper, we briefly introduce our data sources, nature of data collected, cluster design, data loading and storage strategy and our language and library of choice for analytics and visualization. We present some of the analytics we have implemented for health monitoring of auxiliary power units (APUs) using our big data infrastructure. Best practices to implement big data analytics and pitfalls are discussed and substantiated with our experiences.
本文描述了我们开发和使用大数据基础设施来分析航空数据的方法。在本文中,我们简要介绍了我们的数据源、数据收集的性质、集群设计、数据加载和存储策略以及我们用于分析和可视化的语言和库。我们将介绍一些利用我们的大数据基础设施对辅助动力装置(apu)进行健康监测的分析。本文讨论了实施大数据分析和陷阱的最佳实践,并结合我们的经验加以证实。
{"title":"Big Data Infrastructure for Aviation Data Analytics","authors":"A. Murugan, D. Mylaraswamy, Brian Xu, P. Dietrich","doi":"10.1109/CCEM.2014.7015483","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015483","url":null,"abstract":"This paper describes our approach towards developing and using a big data infrastructure for analyzing aviation data. In this paper, we briefly introduce our data sources, nature of data collected, cluster design, data loading and storage strategy and our language and library of choice for analytics and visualization. We present some of the analytics we have implemented for health monitoring of auxiliary power units (APUs) using our big data infrastructure. Best practices to implement big data analytics and pitfalls are discussed and substantiated with our experiences.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115278185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Cloud-Based Collaborative Platform Supporting Serviced-Enhanced Products for Emerging Markets 基于云的协作平台,支持面向新兴市场的服务增强产品
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015475
Bholanathsingh Surajbali, Adrian Juan-Verdejo, S. Alexakis, H. Bar, M. Bauer
Collaboration through sharing competencies and resources has been a key approach to both creating new competitive environments, as well as achieving the needed agility to rapidly answer to emerging market demands. Establishing proper collaborative networks for service-enhanced products is challenging given the wide diversity of business operations and involved resources. The creation of software solutions to support such collaboration is an effort-intensive task, especially when these solutions are designed to run in the cloud and to be highly customizable to different end-user scenarios. In this paper we describe how a cloud- based platform can support the creation of software solutions for the collaborative development and operation of highly customized and service-enhanced products. The platform has been designed based on numerous key requirements that have been generated from the analysis of different business scenarios from various use cases and domains, as well as general key requirements a cloud-based platform should provide to support collaboration among organizations.
通过共享能力和资源进行协作是创造新的竞争环境以及实现快速响应新兴市场需求所需的敏捷性的关键方法。鉴于业务操作和相关资源的广泛多样性,为服务增强产品建立适当的协作网络是一项挑战。创建支持这种协作的软件解决方案是一项耗费大量精力的任务,特别是当这些解决方案被设计为在云中运行,并且可以根据不同的最终用户场景高度定制时。在本文中,我们描述了基于云的平台如何支持创建软件解决方案,以协同开发和运营高度定制和服务增强的产品。该平台的设计基于对来自各种用例和领域的不同业务场景的分析生成的大量关键需求,以及基于云的平台应该提供的支持组织之间协作的一般关键需求。
{"title":"A Cloud-Based Collaborative Platform Supporting Serviced-Enhanced Products for Emerging Markets","authors":"Bholanathsingh Surajbali, Adrian Juan-Verdejo, S. Alexakis, H. Bar, M. Bauer","doi":"10.1109/CCEM.2014.7015475","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015475","url":null,"abstract":"Collaboration through sharing competencies and resources has been a key approach to both creating new competitive environments, as well as achieving the needed agility to rapidly answer to emerging market demands. Establishing proper collaborative networks for service-enhanced products is challenging given the wide diversity of business operations and involved resources. The creation of software solutions to support such collaboration is an effort-intensive task, especially when these solutions are designed to run in the cloud and to be highly customizable to different end-user scenarios. In this paper we describe how a cloud- based platform can support the creation of software solutions for the collaborative development and operation of highly customized and service-enhanced products. The platform has been designed based on numerous key requirements that have been generated from the analysis of different business scenarios from various use cases and domains, as well as general key requirements a cloud-based platform should provide to support collaboration among organizations.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Secure Mutual Authentication Protocol for Cloud Computing Using Secret Sharing and Steganography 基于秘密共享和隐写的云计算安全互鉴协议
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015478
C. Vorugunti, M. Sarvabhatla, G. Murugan
Cloud computing is a collection of virtually massive distributed large scale computers to handle enormous enterprise computing, hardware, storage needs. An exponential advancement of communication and information technologies results in substantial traffic for accessing of cloud resources wired and mobile, through various communication devices like desktop, laptop, tabs, etc. via Internet. Significance of enterprise data and increased access rates from low-resource terminal devices demands for reliable and low cost authentication techniques. Lots of researchers have proposed authentication schemes based on password, biometric, steganography etc. with varied efficiencies. In 2014, Nimmy et al proposed a steganography based mutual authentication protocol for cloud computing and claimed that their scheme resists major cryptographic attacks. Unfortunately, in this paper we will show that Nimmy et al is vulnerable to offline password guessing attack and Denial of Service attack. As a part of our contribution, we propose a low cost steganography based authentication scheme which is strongly secure and best suited for asymmetric cloud computing environment.
云计算实际上是大量分布式大型计算机的集合,用于处理巨大的企业计算、硬件和存储需求。通信和信息技术的指数级发展导致了通过互联网通过各种通信设备(如台式机、笔记本电脑、标签等)访问有线和移动云资源的大量流量。企业数据的重要性和低资源终端设备访问速率的增加要求可靠和低成本的认证技术。许多研究人员提出了基于密码、生物识别、隐写等不同效率的认证方案。2014年,Nimmy等人提出了一种基于隐写术的云计算相互认证协议,并声称他们的方案能够抵抗主要的加密攻击。不幸的是,在本文中我们将证明Nimmy等人容易受到离线密码猜测攻击和拒绝服务攻击。作为我们贡献的一部分,我们提出了一种低成本的基于隐写术的认证方案,该方案具有很强的安全性,最适合非对称云计算环境。
{"title":"A Secure Mutual Authentication Protocol for Cloud Computing Using Secret Sharing and Steganography","authors":"C. Vorugunti, M. Sarvabhatla, G. Murugan","doi":"10.1109/CCEM.2014.7015478","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015478","url":null,"abstract":"Cloud computing is a collection of virtually massive distributed large scale computers to handle enormous enterprise computing, hardware, storage needs. An exponential advancement of communication and information technologies results in substantial traffic for accessing of cloud resources wired and mobile, through various communication devices like desktop, laptop, tabs, etc. via Internet. Significance of enterprise data and increased access rates from low-resource terminal devices demands for reliable and low cost authentication techniques. Lots of researchers have proposed authentication schemes based on password, biometric, steganography etc. with varied efficiencies. In 2014, Nimmy et al proposed a steganography based mutual authentication protocol for cloud computing and claimed that their scheme resists major cryptographic attacks. Unfortunately, in this paper we will show that Nimmy et al is vulnerable to offline password guessing attack and Denial of Service attack. As a part of our contribution, we propose a low cost steganography based authentication scheme which is strongly secure and best suited for asymmetric cloud computing environment.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"12 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134128174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Autonomic Characterization of Workloads Using Workload Fingerprinting 利用工作量指纹识别技术自主确定工作量特征
Pub Date : 2014-10-01 DOI: 10.1109/CCEM.2014.7015482
R. Khanna, M. Ganguli, Ananth S. Narayan, R. Abhiram, P. Gupta
In a cloud service management environment, service level agreements (SLA) define the expectation of quality (Quality-of-Service) for managing performance loss in a given service-hosting environment comprising of a pool of compute resources. Typically, complexity of resource inter-dependencies in a server system often results to sub-optimal behaviors leading to performance loss. A well behaved model can anticipate the demand patterns and proactively react to the dynamic stresses in a timely and well optimized manner. Dynamic characterization methods can synthesize self-correcting workload fingerprint code-book that facilitates phase prediction to achieve continuous tuning through proactive workload-allocation and load-balancing. In this paper we introduce the methodology that facilitates the coordinated tuning of the system resources through phase-assisted dynamic characterization. We describe the method to develop a multi-variate phase model by learning and classifying the run-time behavior of workloads. We demonstrate the workload phase forecasting method using phase extraction using a combination of machine learning approach. Results show the new model is about 98% accurate in phase identification and 97.15% accurate in forecasting the compute demands.
在云服务管理环境中,服务水平协议(SLA)定义了在由计算资源池组成的给定服务托管环境中管理性能损失的质量期望(服务质量)。通常,服务器系统中资源相互依赖的复杂性通常会导致次优行为,从而导致性能损失。一个性能良好的模型可以预测需求模式,并以及时和优化的方式主动响应动态应力。动态表征方法可以合成自校正的工作负载指纹码本,通过主动的工作负载分配和负载平衡来实现相位预测,从而实现连续调优。在本文中,我们介绍了一种通过相位辅助动态表征来促进系统资源协调调谐的方法。我们描述了通过学习和分类工作负载的运行时行为来开发多变量阶段模型的方法。我们展示了结合机器学习方法的工作负载阶段预测方法,该方法使用阶段提取。结果表明,该模型的相位识别准确率为98%,计算需求预测准确率为97.15%。
{"title":"Autonomic Characterization of Workloads Using Workload Fingerprinting","authors":"R. Khanna, M. Ganguli, Ananth S. Narayan, R. Abhiram, P. Gupta","doi":"10.1109/CCEM.2014.7015482","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015482","url":null,"abstract":"In a cloud service management environment, service level agreements (SLA) define the expectation of quality (Quality-of-Service) for managing performance loss in a given service-hosting environment comprising of a pool of compute resources. Typically, complexity of resource inter-dependencies in a server system often results to sub-optimal behaviors leading to performance loss. A well behaved model can anticipate the demand patterns and proactively react to the dynamic stresses in a timely and well optimized manner. Dynamic characterization methods can synthesize self-correcting workload fingerprint code-book that facilitates phase prediction to achieve continuous tuning through proactive workload-allocation and load-balancing. In this paper we introduce the methodology that facilitates the coordinated tuning of the system resources through phase-assisted dynamic characterization. We describe the method to develop a multi-variate phase model by learning and classifying the run-time behavior of workloads. We demonstrate the workload phase forecasting method using phase extraction using a combination of machine learning approach. Results show the new model is about 98% accurate in phase identification and 97.15% accurate in forecasting the compute demands.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127246368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1