Pub Date : 2015-08-20DOI: 10.1109/Trustcom.2015.408
Kim Thuat Nguyen, Nouha Oualha, M. Laurent-Maknavicius
In this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things. Our solution has several advantages. First, the scheme is provably secure in the random oracle model. Second, it provides the following security properties: outsider/insider confidentiality and unforgeability, non-repudiation and public verifiability, while being efficient in terms of communication and computation costs. Third, the scheme offers the certificateless feature, so certificates are not needed to verify the user's public keys. For illustration, we conducted experimental evaluation based on a sensor Wismote platform and compared the performance of the proposed scheme to concurrent schemes. We wish these experimental results be helpful at a larger extent to the scientific community usually prone to work with realistic performance figures.
在物联网背景下,我们提出了一种基于标准化签名KCDSA (Korean Certificate-based Digital signature Algorithm)的椭圆曲线签名加密方案。我们的解决方案有几个优点。首先,证明了该方案在随机oracle模型下的安全性。其次,它提供了以下安全属性:外部/内部的机密性和不可伪造性,不可否认性和公共可验证性,同时在通信和计算成本方面效率很高。第三,该方案提供了无证书特性,因此不需要证书来验证用户的公钥。为了说明这一点,我们基于传感器Wismote平台进行了实验评估,并将所提出的方案与并发方案的性能进行了比较。我们希望这些实验结果在更大程度上对通常倾向于使用实际性能数据的科学界有所帮助。
{"title":"Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things","authors":"Kim Thuat Nguyen, Nouha Oualha, M. Laurent-Maknavicius","doi":"10.1109/Trustcom.2015.408","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.408","url":null,"abstract":"In this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things. Our solution has several advantages. First, the scheme is provably secure in the random oracle model. Second, it provides the following security properties: outsider/insider confidentiality and unforgeability, non-repudiation and public verifiability, while being efficient in terms of communication and computation costs. Third, the scheme offers the certificateless feature, so certificates are not needed to verify the user's public keys. For illustration, we conducted experimental evaluation based on a sensor Wismote platform and compared the performance of the proposed scheme to concurrent schemes. We wish these experimental results be helpful at a larger extent to the scientific community usually prone to work with realistic performance figures.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131021338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/Trustcom.2015.403
Sivadon Chaisiri, R. Ko, D. Niyato
Security-as-a-Service (SECaaS), pay-per-use cloud-based services that provides information security measures via the cloud, are increasingly used by corporations to maintain their systems' security posture. Customers often have to provision these SECaaS services based on the potential subscription costs incurred. However, these security services are unable to deal with all possible types of threats. A single threat (e.g. malicious insiders) can result in the loss of valuable data and revenue. Hence, it is also common to see corporations (i.e. cloud customers) manage their risks by purchasing cyber insurance to cover costs and liabilities due to unforeseen losses. A balance between service allocation cost and insurance is often required but not well studied. In this paper, we propose an optimized SECaaS provisioning framework that enables customers to optimally allocate security services from SECaaS providers to their applications, while managing risks from information security breaches via purchasing cyber insurance policies. Finding the right balance is a great challenge, and the solutions of the security service allocation and insurance management are obtained through solving an optimization model derived from stochastic programming with a three-stage recourse. Simulations were conducted to evaluate this optimization model. We exposed our model to several uncertain information parameters and the results are promising -- demonstrating an effective approach to balance customers' security requirements while keeping service subscription and insurance policy costs low.
{"title":"A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management","authors":"Sivadon Chaisiri, R. Ko, D. Niyato","doi":"10.1109/Trustcom.2015.403","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.403","url":null,"abstract":"Security-as-a-Service (SECaaS), pay-per-use cloud-based services that provides information security measures via the cloud, are increasingly used by corporations to maintain their systems' security posture. Customers often have to provision these SECaaS services based on the potential subscription costs incurred. However, these security services are unable to deal with all possible types of threats. A single threat (e.g. malicious insiders) can result in the loss of valuable data and revenue. Hence, it is also common to see corporations (i.e. cloud customers) manage their risks by purchasing cyber insurance to cover costs and liabilities due to unforeseen losses. A balance between service allocation cost and insurance is often required but not well studied. In this paper, we propose an optimized SECaaS provisioning framework that enables customers to optimally allocate security services from SECaaS providers to their applications, while managing risks from information security breaches via purchasing cyber insurance policies. Finding the right balance is a great challenge, and the solutions of the security service allocation and insurance management are obtained through solving an optimization model derived from stochastic programming with a three-stage recourse. Simulations were conducted to evaluate this optimization model. We exposed our model to several uncertain information parameters and the results are promising -- demonstrating an effective approach to balance customers' security requirements while keeping service subscription and insurance policy costs low.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127896488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/Trustcom.2015.433
Zhengping Wu, Lifeng Wang
Mutual trust has been the most important factor for users to do business with each other. But the trustworthiness of an entire system provides assurance for users to choose a particular e-commerce platform at the first place. As a difficult-to-observe property of an e-commerce system, the measurement of overall trustworthiness is obstructed by quantification, accuracy and reliability. This paper proposes a fuzzy hybrid multi-criteria analysis approach to measure the trustworthiness of e-commerce systems. Trust factors involved in e-commerce systems are collected and grouped. Then, these factors are quantified and placed in a designated trust space using customized fuzzy membership functions. Based on the nature of various trust factors and alternatives, multi-criteria analysis is applied. After all relevant factors are filtered, categorized and quantified, the proposed multi-criteria analysis method will process all trust factors and analyze their features from different perspectives. To precisely process the proposed trustworthiness measurements, feature categorization, membership function adjustment, criteria function and priority voting function adaptation are also used. Finally, a combination of fuzzy quantified factors and multi-criteria analysis can expose the credibility of all e-commerce system aspects. Experiment results show that the proposed measurements can evaluate and rank e-commerce system trustworthiness accurately and effectively.
{"title":"Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis","authors":"Zhengping Wu, Lifeng Wang","doi":"10.1109/Trustcom.2015.433","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.433","url":null,"abstract":"Mutual trust has been the most important factor for users to do business with each other. But the trustworthiness of an entire system provides assurance for users to choose a particular e-commerce platform at the first place. As a difficult-to-observe property of an e-commerce system, the measurement of overall trustworthiness is obstructed by quantification, accuracy and reliability. This paper proposes a fuzzy hybrid multi-criteria analysis approach to measure the trustworthiness of e-commerce systems. Trust factors involved in e-commerce systems are collected and grouped. Then, these factors are quantified and placed in a designated trust space using customized fuzzy membership functions. Based on the nature of various trust factors and alternatives, multi-criteria analysis is applied. After all relevant factors are filtered, categorized and quantified, the proposed multi-criteria analysis method will process all trust factors and analyze their features from different perspectives. To precisely process the proposed trustworthiness measurements, feature categorization, membership function adjustment, criteria function and priority voting function adaptation are also used. Finally, a combination of fuzzy quantified factors and multi-criteria analysis can expose the credibility of all e-commerce system aspects. Experiment results show that the proposed measurements can evaluate and rank e-commerce system trustworthiness accurately and effectively.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129189508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/Trustcom.2015.395
A. Almuhaideb, B. Srinivasan, P. D. Le, Mohammed A. Alhabeeb, Waleed M. Alfehaid
The development in mobile devices and wireless technologies (e.g Cellular, Wi-Fi) has facilitated a growth in mobile services. As mobile users are usually moving, roaming services are deployed to allow users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, such as performance issues and security vulnerabilities. In this paper a novel hybrid mobile authentication model is proposed, with its realisation through suitable protocols that combine the advantages of both distributed and centralised models. The proposed Passport and Visa tokens assist a foreign network in authenticating and authorising visiting mobile users. These tokens also offer a unique solution to achieving secure and efficient key management. Most importantly, the proposed solution provides an efficient technique, using recency evidence (a Passport Stamp), to tackle the problem of a user revocation status check. The security and performance analysis demonstrates that the proposed protocols efficiently ensure secure roaming, greatly enhance computation speed, and reduce communication costs.
{"title":"A Hybrid Mobile Authentication Model for Ubiquitous Networking","authors":"A. Almuhaideb, B. Srinivasan, P. D. Le, Mohammed A. Alhabeeb, Waleed M. Alfehaid","doi":"10.1109/Trustcom.2015.395","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.395","url":null,"abstract":"The development in mobile devices and wireless technologies (e.g Cellular, Wi-Fi) has facilitated a growth in mobile services. As mobile users are usually moving, roaming services are deployed to allow users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, such as performance issues and security vulnerabilities. In this paper a novel hybrid mobile authentication model is proposed, with its realisation through suitable protocols that combine the advantages of both distributed and centralised models. The proposed Passport and Visa tokens assist a foreign network in authenticating and authorising visiting mobile users. These tokens also offer a unique solution to achieving secure and efficient key management. Most importantly, the proposed solution provides an efficient technique, using recency evidence (a Passport Stamp), to tackle the problem of a user revocation status check. The security and performance analysis demonstrates that the proposed protocols efficiently ensure secure roaming, greatly enhance computation speed, and reduce communication costs.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125505363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/Trustcom.2015.369
Wei Zhou, Yang Xu, Guojun Wang
In some group-oriented applications, users can access several data resources according to their respective willingness. So, how to effectively access the data resources is a challenge in multi-privileged group communications. Some key management schemes for hierarchical access control are proposed. In this paper, we discuss the challenges of key management. Then, we present a list of evaluation criteria for secure key management for multi-privileged group communications, and investigate the features of some typical schemes. The schemes can be divided into several classes according to some separate dimensions, such as the topology of key model, the rekeying method, the rekeying policy and the encryption method of data resources. We analyze them comparatively regarding to the secure distribution and renewal of key materials.
{"title":"Research on Key Management for Multi-privileged Group Communications","authors":"Wei Zhou, Yang Xu, Guojun Wang","doi":"10.1109/Trustcom.2015.369","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.369","url":null,"abstract":"In some group-oriented applications, users can access several data resources according to their respective willingness. So, how to effectively access the data resources is a challenge in multi-privileged group communications. Some key management schemes for hierarchical access control are proposed. In this paper, we discuss the challenges of key management. Then, we present a list of evaluation criteria for secure key management for multi-privileged group communications, and investigate the features of some typical schemes. The schemes can be divided into several classes according to some separate dimensions, such as the topology of key model, the rekeying method, the rekeying policy and the encryption method of data resources. We analyze them comparatively regarding to the secure distribution and renewal of key materials.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123040711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/Trustcom.2015.470
Ahmad Sabouri
Deploying the full ecosystem of Privacy-preserving Attribute-based Credentials requires the involved entities to employ and operate some software/hardware packages on their domains. This also holds for the Privacy-ABC users, as they need to run a User Agent, which acts on their behalf and performs some computations locally when authenticating towards Service Providers. If the user wishes to use multiple workstations, currently there is no solution other than installing the User Agent on every device. This introduces barriers to their mobility and causes inconvenience, which can negatively influence adoption of such technologies. In this paper, we aim at a Software-as-a-Service approach and suggest an install-free architecture that lifts the aforementioned barriers.
{"title":"A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential Users","authors":"Ahmad Sabouri","doi":"10.1109/Trustcom.2015.470","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.470","url":null,"abstract":"Deploying the full ecosystem of Privacy-preserving Attribute-based Credentials requires the involved entities to employ and operate some software/hardware packages on their domains. This also holds for the Privacy-ABC users, as they need to run a User Agent, which acts on their behalf and performs some computations locally when authenticating towards Service Providers. If the user wishes to use multiple workstations, currently there is no solution other than installing the User Agent on every device. This introduces barriers to their mobility and causes inconvenience, which can negatively influence adoption of such technologies. In this paper, we aim at a Software-as-a-Service approach and suggest an install-free architecture that lifts the aforementioned barriers.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/Trustcom.2015.456
Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan
A body area network is a network of small and portable devices around human bodies. It enables a number of interesting applications including elderly healthcare and chronic diseases monitoring. Since body area networks are used to collect sensitive information, they require proper security protections. IEEE Std 802.15.6 is a standard for body area networks, it also provides mechanisms for strong security. In this paper, security association protocols proposed in the standard are reviewed. First of all, several security flaws are found. In addition, we also get some interesting findings from the standpoint of performance and usability.
{"title":"A Study of IEEE 802.15.6 Association Protocols","authors":"Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan","doi":"10.1109/Trustcom.2015.456","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.456","url":null,"abstract":"A body area network is a network of small and portable devices around human bodies. It enables a number of interesting applications including elderly healthcare and chronic diseases monitoring. Since body area networks are used to collect sensitive information, they require proper security protections. IEEE Std 802.15.6 is a standard for body area networks, it also provides mechanisms for strong security. In this paper, security association protocols proposed in the standard are reviewed. First of all, several security flaws are found. In addition, we also get some interesting findings from the standpoint of performance and usability.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121081006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/Trustcom.2015.576
X. T. Tran, T. V. Do, Nam H. Do, L. Farkas, C. Rotter
YARN is an emerging resource management in the Hadoop ecosystem, where big data in the scale of petabytes/day are processed with the use of commercial off-the-shelf servers. At present YARN supports only RAM and CPU reservation/control. However, the reservation and the control of disk I/O throughput are also needed to provide a satisfactory performance for MapReduce applications. In this paper, we propose a solution with software components that can be integrated into YARN to support the reservation of disk I/O throughput in YARN. Experiments show that a proposed solution can provide a disk I/O throughput guarantee for MapReduce applications.
{"title":"Provision of Disk I/O Guarantee for MapReduce Applications","authors":"X. T. Tran, T. V. Do, Nam H. Do, L. Farkas, C. Rotter","doi":"10.1109/Trustcom.2015.576","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.576","url":null,"abstract":"YARN is an emerging resource management in the Hadoop ecosystem, where big data in the scale of petabytes/day are processed with the use of commercial off-the-shelf servers. At present YARN supports only RAM and CPU reservation/control. However, the reservation and the control of disk I/O throughput are also needed to provide a satisfactory performance for MapReduce applications. In this paper, we propose a solution with software components that can be integrated into YARN to support the reservation of disk I/O throughput in YARN. Experiments show that a proposed solution can provide a disk I/O throughput guarantee for MapReduce applications.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/Trustcom.2015.572
Ni Xue, Huan He, Jun Liu, Q. Zheng, Tian Ma, Jianfei Ruan, B. Dong
In the era of internet, e-Learning has become vastly widespread and generated huge amount of log data of video viewing behavior. Through analyzing and mining these log data, significant Power Law Distribution (PLD) of viewing behavior is observed, which is different from small-scale e-Learning or traditional classroom environment. In this paper, we apply the mechanisms for generating the PLDs in analyzing log data of a large-scale e-Learning platform to discover the factors influencing the video viewing behavior. Firstly, four factors correlated to the video viewing behavior are discovered from log data, including the number of videos viewed, the start date of viewing videos, the date of final exam, and the duration of enrollment. Furthermore, we present a probabilistic model of viewing behavior based on the four factors. Finally, the accuracy of the model is validated with nine online courses in which each course enrolled more than 1,000 students. In addition, we analyze the application of the proposed model and provide some valuable suggestions for teachers to improve the performance of students.
{"title":"Probabilistic Modeling Towards Understanding the Power Law Distribution of Video Viewing Behavior in Large-Scale e-Learning","authors":"Ni Xue, Huan He, Jun Liu, Q. Zheng, Tian Ma, Jianfei Ruan, B. Dong","doi":"10.1109/Trustcom.2015.572","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.572","url":null,"abstract":"In the era of internet, e-Learning has become vastly widespread and generated huge amount of log data of video viewing behavior. Through analyzing and mining these log data, significant Power Law Distribution (PLD) of viewing behavior is observed, which is different from small-scale e-Learning or traditional classroom environment. In this paper, we apply the mechanisms for generating the PLDs in analyzing log data of a large-scale e-Learning platform to discover the factors influencing the video viewing behavior. Firstly, four factors correlated to the video viewing behavior are discovered from log data, including the number of videos viewed, the start date of viewing videos, the date of final exam, and the duration of enrollment. Furthermore, we present a probabilistic model of viewing behavior based on the four factors. Finally, the accuracy of the model is validated with nine online courses in which each course enrolled more than 1,000 students. In addition, we analyze the application of the proposed model and provide some valuable suggestions for teachers to improve the performance of students.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"152 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113986167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.1109/Trustcom.2015.641
A. Mousavi, V. Vyatkin, Y. Berezovskaya, Xiaojing Zhang
Modern data centers in many aspects are akin to industrial plants that generate a lot of heat by consuming substantial amount of energy and require powerful cooling and ventilation. Cooling system contributes with 30 to 50% of the total energy consumption of data centers. An effective way to address energy efficiency in such cooling systems is to apply advanced automation solutions, similar to that of industrial and building automation systems. However, existing automation solutions are not flexible enough to meet requirements of cooling systems in modern data centres. This paper is an endeavour to utilize distributed adaptive automation architecture in order to improve energy efficiency of cooling. The proposed automation algorithms are validated in a simulation environment which models the thermal behaviour of a server room and helps to find the most energy efficient control strategy for controlling the cooling devices. This paper describes the simulation tool comprising of thermal behaviour modelling in MATLAB/SIMULINK connected in closed-loop with the distributed control environment of IEC 61499 standard. Simulation of a typical server room under certain constraints using the proposed tool is described and the results are presented. The results demonstrate the potential of improving higher energy efficiency, flexibility and better decision-making ability for controlling the cooling systems.
{"title":"Cyber-physical Design of Data Centers Cooling Systems Automation","authors":"A. Mousavi, V. Vyatkin, Y. Berezovskaya, Xiaojing Zhang","doi":"10.1109/Trustcom.2015.641","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.641","url":null,"abstract":"Modern data centers in many aspects are akin to industrial plants that generate a lot of heat by consuming substantial amount of energy and require powerful cooling and ventilation. Cooling system contributes with 30 to 50% of the total energy consumption of data centers. An effective way to address energy efficiency in such cooling systems is to apply advanced automation solutions, similar to that of industrial and building automation systems. However, existing automation solutions are not flexible enough to meet requirements of cooling systems in modern data centres. This paper is an endeavour to utilize distributed adaptive automation architecture in order to improve energy efficiency of cooling. The proposed automation algorithms are validated in a simulation environment which models the thermal behaviour of a server room and helps to find the most energy efficient control strategy for controlling the cooling devices. This paper describes the simulation tool comprising of thermal behaviour modelling in MATLAB/SIMULINK connected in closed-loop with the distributed control environment of IEC 61499 standard. Simulation of a typical server room under certain constraints using the proposed tool is described and the results are presented. The results demonstrate the potential of improving higher energy efficiency, flexibility and better decision-making ability for controlling the cooling systems.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121856634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}