Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336981
C. Rossi, Alfredo Favenza, F. Scullino, V. Macchia, Giovanni Luca Spoto, Fabrizio Dominci
Despite the growing development of space-based systems aimed at monitoring and studying natural hazards, floods continue to harm humankind worldwide, causing enormous human and economic losses. In a view of improving the timeliness of existing flood emergency systems, we propose FLOODIS: a novel service that exploits existing space technologies together with mobile sensing and state-of-the-art cloud computing platforms in order to provide a fast, flexible and scalable flood emergency system. We evaluate the performance of our service oriented cloud-based architecture with a real prototype, achieving real-time performances at scale.
{"title":"Evaluating FLOODIS: Mobile sensing for a flood emergency service in the cloud","authors":"C. Rossi, Alfredo Favenza, F. Scullino, V. Macchia, Giovanni Luca Spoto, Fabrizio Dominci","doi":"10.1109/CLOUDTECH.2015.7336981","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336981","url":null,"abstract":"Despite the growing development of space-based systems aimed at monitoring and studying natural hazards, floods continue to harm humankind worldwide, causing enormous human and economic losses. In a view of improving the timeliness of existing flood emergency systems, we propose FLOODIS: a novel service that exploits existing space technologies together with mobile sensing and state-of-the-art cloud computing platforms in order to provide a fast, flexible and scalable flood emergency system. We evaluate the performance of our service oriented cloud-based architecture with a real prototype, achieving real-time performances at scale.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126146465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7337002
Mostapha Derfouf, Amina Mimouni, M. Eleuldj
Nowadays, Cloud computing is a major trend. It is a new data hosting technology that becomes very popular lately thanks to the amortization of costs induced to companies. Since this concept is still in its first stages, new security risks start to appear. This paper will set forth the major security issues in cloud computing and propound a new solution to secure data, storage in the cloud environment.
{"title":"Vulnerabilities and storage security in cloud computing","authors":"Mostapha Derfouf, Amina Mimouni, M. Eleuldj","doi":"10.1109/CLOUDTECH.2015.7337002","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337002","url":null,"abstract":"Nowadays, Cloud computing is a major trend. It is a new data hosting technology that becomes very popular lately thanks to the amortization of costs induced to companies. Since this concept is still in its first stages, new security risks start to appear. This paper will set forth the major security issues in cloud computing and propound a new solution to secure data, storage in the cloud environment.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"29 16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127501422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336971
Salheddine Kabou, S. Benslimane
Cloud computing can be considered a new computing paradigm due to its diverse benefits such as the sharing of computing resources and the data containing personal, information across multiple distributed and private databases. However, privacy and security concerns are among the main obstacles facing the widespread adoption of this new technology. Data Anonymization makes data worthless to anyone except the owner of the data. It is one of the methods for transforming the data in such a way that it prevents identification of key information from an unauthorized person. Most of the existing works use a k-anonymat model for preserving privacy for data subject that offers lower utility. Motivated by this, we develop a new distributed anonymization protocol to satisfy multiple data providers privacy requirements based on a k-concealment model that offers a higher utility.
{"title":"Building virtual anonymized databases for the Cloud","authors":"Salheddine Kabou, S. Benslimane","doi":"10.1109/CLOUDTECH.2015.7336971","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336971","url":null,"abstract":"Cloud computing can be considered a new computing paradigm due to its diverse benefits such as the sharing of computing resources and the data containing personal, information across multiple distributed and private databases. However, privacy and security concerns are among the main obstacles facing the widespread adoption of this new technology. Data Anonymization makes data worthless to anyone except the owner of the data. It is one of the methods for transforming the data in such a way that it prevents identification of key information from an unauthorized person. Most of the existing works use a k-anonymat model for preserving privacy for data subject that offers lower utility. Motivated by this, we develop a new distributed anonymization protocol to satisfy multiple data providers privacy requirements based on a k-concealment model that offers a higher utility.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125391596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336993
Hind Bangui, S. Rakrak, S. Raghay
In recent years a new concept, called “mobile cloud computing” (MCC), has been put forward, it can build more powerful mobile cloud applications, and it is considered as one of the most highly discussed topics in terms of both academic community and computing industry. In this paper, we aim to understand why mobile computing chooses cloud computing as an external source. Thus, this paper presents a review on the concepts of cloud computing and grid computing. Then, it provides a comparison between both of the concepts regarding principles, functionalities, performance, as well as other critical features. Finally, it presents comprehensive overview of mobile cloud computing, and several open challenges that require future researches.
{"title":"External sources for mobile computing: The state-of-the-art, challenges, and future research","authors":"Hind Bangui, S. Rakrak, S. Raghay","doi":"10.1109/CLOUDTECH.2015.7336993","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336993","url":null,"abstract":"In recent years a new concept, called “mobile cloud computing” (MCC), has been put forward, it can build more powerful mobile cloud applications, and it is considered as one of the most highly discussed topics in terms of both academic community and computing industry. In this paper, we aim to understand why mobile computing chooses cloud computing as an external source. Thus, this paper presents a review on the concepts of cloud computing and grid computing. Then, it provides a comparison between both of the concepts regarding principles, functionalities, performance, as well as other critical features. Finally, it presents comprehensive overview of mobile cloud computing, and several open challenges that require future researches.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123247202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336980
Asmae Benali, Bouchra El Asrihouda, Houda Kriouile
In this paper, we present a task scheduling management based on the utility model which is used in economics to represent the needs of both the client and the provider. Indeed, our work copes with two man parameters that affect the broker, the cost of virtual machine instances and their response time. Minimizing those two objectives give the best quality of service to the customers and offer the broker an important profit. In fact, we consider the virtual machines as a product line and use the feature models to represent the virtual machines configurations to select the efficient resources that suit customer requirements and try at same time to minimize virtual machine cost. An efficient task scheduling mechanism can not only fit client's requirements, but also improve the resource utilization, be aware of the changing environment and intends to try to balance the system. Thus, our work is based on Artificial Bee Colony to optimize the scheduling of tasks on virtual machine in cloud computing by analyzing the difference of virtual machine load balancing algorithm.
{"title":"A pareto-based Artificial Bee Colony and product line for optimizing scheduling of VM on cloud computing","authors":"Asmae Benali, Bouchra El Asrihouda, Houda Kriouile","doi":"10.1109/CLOUDTECH.2015.7336980","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336980","url":null,"abstract":"In this paper, we present a task scheduling management based on the utility model which is used in economics to represent the needs of both the client and the provider. Indeed, our work copes with two man parameters that affect the broker, the cost of virtual machine instances and their response time. Minimizing those two objectives give the best quality of service to the customers and offer the broker an important profit. In fact, we consider the virtual machines as a product line and use the feature models to represent the virtual machines configurations to select the efficient resources that suit customer requirements and try at same time to minimize virtual machine cost. An efficient task scheduling mechanism can not only fit client's requirements, but also improve the resource utilization, be aware of the changing environment and intends to try to balance the system. Thus, our work is based on Artificial Bee Colony to optimize the scheduling of tasks on virtual machine in cloud computing by analyzing the difference of virtual machine load balancing algorithm.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7337019
Houda Kriouile, B. El Asri, M'barek El Haloui, Asmae Benali
The approach of User-Aware Tenancy integrates the high configurability of multi-tenant applications with the flexibility and the functional variability of Rich-Variant Component use. Multi-tenancy concept consists in sharing instances among a large group of customers, called tenants. Multi-tenancy is a tool to exploit economies of scale widely promoted by Software as a Service (SaaS) models. However, the ability of a SaaS application to be adapted to individual tenant's needs seem to be a major requirement. Thus, our approach focuses on more flexibility and more reusability for Multi-tenant SaaS application using the multiview notion of Rich-Variant Components. The approach consists in a user-aware tenancy for SaaS. In this paper, we provide an application of an algorithm deriving the necessary instances of Rich-Variant Components building the application in a scalable and performing manner. The algorithm is based on fundamental concepts from the graph theory, and is accompanied by a reduced school management application as an illustrating example.
{"title":"Towards deployment of a user-aware tenancy using rich-variant components for SaaS applications","authors":"Houda Kriouile, B. El Asri, M'barek El Haloui, Asmae Benali","doi":"10.1109/CLOUDTECH.2015.7337019","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337019","url":null,"abstract":"The approach of User-Aware Tenancy integrates the high configurability of multi-tenant applications with the flexibility and the functional variability of Rich-Variant Component use. Multi-tenancy concept consists in sharing instances among a large group of customers, called tenants. Multi-tenancy is a tool to exploit economies of scale widely promoted by Software as a Service (SaaS) models. However, the ability of a SaaS application to be adapted to individual tenant's needs seem to be a major requirement. Thus, our approach focuses on more flexibility and more reusability for Multi-tenant SaaS application using the multiview notion of Rich-Variant Components. The approach consists in a user-aware tenancy for SaaS. In this paper, we provide an application of an algorithm deriving the necessary instances of Rich-Variant Components building the application in a scalable and performing manner. The algorithm is based on fundamental concepts from the graph theory, and is accompanied by a reduced school management application as an illustrating example.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127255037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336965
Jihane Lakhrouit, Meriem Benhaddi, Karim Baina
Enterprise architecture (EA) is a business and IT management tool that has grown in popularity during the last decade. It is based on models of business and IT with systematic frameworks. The scope of the enterprise architecture includes the people, processes, information and technology of the enterprise, and their relationships to one another and to the external environment. Evaluation of enterprise architecture enables, organizations to assess their current situation. Definitely, it allows optimizing the alignment, business strategy, organizational culture, business, people, process and technology. This architecture optimization provides a cost-effective and also helps to ensure the proper execution of objectives and organizational goals. In this regard, this paper provides an approach based on network analysis towards EA analysis, and especially towards the agility of enterprise architecture, we propose a method for assessing agility achievement of different TO-BE scenarios and using different indicators based on the archimate metamodels of the enterprise architecture layers.
{"title":"Enterprise architecture approach for agility evaluation","authors":"Jihane Lakhrouit, Meriem Benhaddi, Karim Baina","doi":"10.1109/CLOUDTECH.2015.7336965","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336965","url":null,"abstract":"Enterprise architecture (EA) is a business and IT management tool that has grown in popularity during the last decade. It is based on models of business and IT with systematic frameworks. The scope of the enterprise architecture includes the people, processes, information and technology of the enterprise, and their relationships to one another and to the external environment. Evaluation of enterprise architecture enables, organizations to assess their current situation. Definitely, it allows optimizing the alignment, business strategy, organizational culture, business, people, process and technology. This architecture optimization provides a cost-effective and also helps to ensure the proper execution of objectives and organizational goals. In this regard, this paper provides an approach based on network analysis towards EA analysis, and especially towards the agility of enterprise architecture, we propose a method for assessing agility achievement of different TO-BE scenarios and using different indicators based on the archimate metamodels of the enterprise architecture layers.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125358890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7337014
Naoual Boukil, A. Ibriz
Cloud Computing is becoming an attractive technology due to its dynamic scalability and effective usage of the resources; it can be utilized under circumstances as Remote Virtual Labs in the education field where the availability of resources is limited., This paper presents an opportunity offered by cloud architecture to support Remote Virtual Labs that can be viewed as a service in the cloud computing (RVLaaS). We show how to build a model of RVLaaS and its components in the cloud computing., This paper deal also with an application of our model on DHCP service, we give Business Project Management (BPM) models of process involved in this lab.
{"title":"Architecture of remote virtual labs as a service in cloud computing","authors":"Naoual Boukil, A. Ibriz","doi":"10.1109/CLOUDTECH.2015.7337014","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337014","url":null,"abstract":"Cloud Computing is becoming an attractive technology due to its dynamic scalability and effective usage of the resources; it can be utilized under circumstances as Remote Virtual Labs in the education field where the availability of resources is limited., This paper presents an opportunity offered by cloud architecture to support Remote Virtual Labs that can be viewed as a service in the cloud computing (RVLaaS). We show how to build a model of RVLaaS and its components in the cloud computing., This paper deal also with an application of our model on DHCP service, we give Business Project Management (BPM) models of process involved in this lab.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130765309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7337004
Nawfal El Moukhi, Ikram El Azami, A. Mouloudi
The evolution of the computer world and the proliferation of storage devices has led to an explosion of available information, so that made their exploitation difficult. In addition, it has been found that a large part of this data will not be stored or used; however, it constitutes a precious raw material to understand the activity and anticipate its evolution., To cope with these problems, professionals implemented a decision making support systems (or decision support systems) and which allow a synthetic and multidimensional treatment of all available and stored information, hence the birth of the data warehouse and data mining techniques. This paper introduces the data warehousing, gives researchers terminologies necessary for understanding the process, and summarizes its evolution. It also presents an analysis of the latest research in the field, and explores the future trends. And therefore, this study provides a reference for researchers wishing to contribute in this area.
{"title":"Data warehouse state of the art and future challenges","authors":"Nawfal El Moukhi, Ikram El Azami, A. Mouloudi","doi":"10.1109/CLOUDTECH.2015.7337004","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337004","url":null,"abstract":"The evolution of the computer world and the proliferation of storage devices has led to an explosion of available information, so that made their exploitation difficult. In addition, it has been found that a large part of this data will not be stored or used; however, it constitutes a precious raw material to understand the activity and anticipate its evolution., To cope with these problems, professionals implemented a decision making support systems (or decision support systems) and which allow a synthetic and multidimensional treatment of all available and stored information, hence the birth of the data warehouse and data mining techniques. This paper introduces the data warehousing, gives researchers terminologies necessary for understanding the process, and summarizes its evolution. It also presents an analysis of the latest research in the field, and explores the future trends. And therefore, this study provides a reference for researchers wishing to contribute in this area.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132257502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336995
Meryeme Alouane, Hanan El Bakkali
"Use the computer without a computer," this is the dream of all managers who believe in "Cloud Computing". The Cloud has become a dream and an obsession for all fans of the computer because of the many benefits this service offers: availability of services and data is ensured, cost is relative to consumption, ease of deployment, technical infrastructure is adaptable to the volume of business activity, its convenience to the common business applications (CRM, HR, BI, ERP, mail, etc.), the fact that this service provides a business function and not the technical components requiring computer skills..., Besides these advantages, there are serious risks related to the use of Cloud computing, such as: temporary or permanent loss of data, security of data, lack of traceability and accountability... These risks are the main challenges faced while adopting a Cloud computing architecture., In this paper, we studied the literature focusing on three major notions on collaborative systems in Cloud computing: Security, privacy and trust. That's why we will try to bring out the main requirements regarding these three concepts from both points of view (user's and provider's), before presenting some related approaches which treat these three concepts.
{"title":"Security, privacy and trust in cloud computing: A comparative study","authors":"Meryeme Alouane, Hanan El Bakkali","doi":"10.1109/CLOUDTECH.2015.7336995","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336995","url":null,"abstract":"\"Use the computer without a computer,\" this is the dream of all managers who believe in \"Cloud Computing\". The Cloud has become a dream and an obsession for all fans of the computer because of the many benefits this service offers: availability of services and data is ensured, cost is relative to consumption, ease of deployment, technical infrastructure is adaptable to the volume of business activity, its convenience to the common business applications (CRM, HR, BI, ERP, mail, etc.), the fact that this service provides a business function and not the technical components requiring computer skills..., Besides these advantages, there are serious risks related to the use of Cloud computing, such as: temporary or permanent loss of data, security of data, lack of traceability and accountability... These risks are the main challenges faced while adopting a Cloud computing architecture., In this paper, we studied the literature focusing on three major notions on collaborative systems in Cloud computing: Security, privacy and trust. That's why we will try to bring out the main requirements regarding these three concepts from both points of view (user's and provider's), before presenting some related approaches which treat these three concepts.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128567513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}