首页 > 最新文献

2015 International Conference on Cloud Technologies and Applications (CloudTech)最新文献

英文 中文
Crop management using Big Data 利用大数据进行作物管理
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337003
Younes Oulad Sayad, H. Mousannif, M. Le Page
Crops management might be a hard task especially in semi-arid environments, where crops are not getting enough water by rainfall or natural drainages. Providing additional water resources to crops by irrigation comes with many challenges. On the one hand, too much irrigation will imply losses by evaporation or percolation, while a lack of irrigation can cause water stress. On the other hand, the application of the exact amount of water needed requires the knowledge of numerous parameters such as soil cond itions, plant development, and weather. This paper addresses such issues by providing an efficient strategy for crops and water resources management. The strategy makes use of Big Data and remote sensing to process satellite images over large areas and extract insights from the collected data to help farmers in managing their crops and taking irrigation decisions. We implemented a web service that allows farmers to perform all above-mentioned tasks online.
作物管理可能是一项艰巨的任务,特别是在半干旱的环境中,作物无法从降雨或自然排水中获得足够的水分。通过灌溉为农作物提供额外的水资源面临许多挑战。一方面,过多的灌溉将意味着蒸发或渗透损失,而缺乏灌溉会造成水资源紧张。另一方面,应用所需的确切水量需要许多参数的知识,如土壤条件,植物发育和天气。本文通过提供作物和水资源管理的有效策略来解决这些问题。该战略利用大数据和遥感处理大面积的卫星图像,并从收集的数据中提取见解,以帮助农民管理作物和制定灌溉决策。我们实现了一个web服务,允许农民在线执行上述所有任务。
{"title":"Crop management using Big Data","authors":"Younes Oulad Sayad, H. Mousannif, M. Le Page","doi":"10.1109/CLOUDTECH.2015.7337003","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337003","url":null,"abstract":"Crops management might be a hard task especially in semi-arid environments, where crops are not getting enough water by rainfall or natural drainages. Providing additional water resources to crops by irrigation comes with many challenges. On the one hand, too much irrigation will imply losses by evaporation or percolation, while a lack of irrigation can cause water stress. On the other hand, the application of the exact amount of water needed requires the knowledge of numerous parameters such as soil cond itions, plant development, and weather. This paper addresses such issues by providing an efficient strategy for crops and water resources management. The strategy makes use of Big Data and remote sensing to process satellite images over large areas and extract insights from the collected data to help farmers in managing their crops and taking irrigation decisions. We implemented a web service that allows farmers to perform all above-mentioned tasks online.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cloud SaaS using MDA approach on a multiview models generate a SaaS from a colored Petri Net using view PNML 在多视图模型上使用MDA方法的云SaaS使用视图PNML从彩色Petri网生成SaaS
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336977
Zeddari Abderrazzak, Ettalbi Ahmed
In this paper, we continue improving our MDA Framework whose aim is to generate a SaaS (Software as a Service) inside a Cloud Environment from a multiview model using a Colored Petri Nets. This framework is composed of 4 modules, we will focus on the 3rd one which design an extended PNML based on a multiview system who is supporting views.
在本文中,我们继续改进我们的MDA框架,其目标是在云环境中使用彩色Petri网从多视图模型生成SaaS(软件即服务)。该框架由4个模块组成,我们将重点关注第三个模块,它基于支持视图的多视图系统设计了一个扩展的PNML。
{"title":"Cloud SaaS using MDA approach on a multiview models generate a SaaS from a colored Petri Net using view PNML","authors":"Zeddari Abderrazzak, Ettalbi Ahmed","doi":"10.1109/CLOUDTECH.2015.7336977","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336977","url":null,"abstract":"In this paper, we continue improving our MDA Framework whose aim is to generate a SaaS (Software as a Service) inside a Cloud Environment from a multiview model using a Colored Petri Nets. This framework is composed of 4 modules, we will focus on the 3rd one which design an extended PNML based on a multiview system who is supporting views.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123572482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A cloud security framework based on trust model and mobile agent 基于信任模型和移动代理的云安全框架
Pub Date : 2015-06-02 DOI: 10.1109/CloudTech.2015.7336962
Saddek Benabied, Abdelhafid Zitouni, M. Djoudi
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud., Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.
云计算作为一种潜在的范例为企业提供了巨大的优势。有了云计算,市场的进入时间缩短了,计算能力增强了,计算能力真的是无限的。通常,要使用云计算的全部功能,云用户必须依赖外部云服务提供商来管理他们的数据。然而,数据和服务的管理可能并不完全值得信赖。因此,数据所有者不愿意将他们的敏感数据放在他们自己的系统之外。,在云端。在云模型中引入透明度、可信度和安全性,以满足客户的需求仍在进行中。为了实现这一目标,本文引入了两层安全框架:云服务提供商(CSP)和云服务用户(CSU)。每个级别负责一个特定的安全任务。CSU级别包括一个代理代理和一个信任代理,用于处理第一个验证。然后在CSP级别执行第二次验证。该框架结合了一个信任模型来监控用户的行为。移动代理的使用将利用其固有的特性,如移动性、深思熟虑的本地化和安全的通信通道提供。该模式旨在保护用户的敏感信息不受其他内部或外部用户和黑客的攻击。此外,它还可以检测策略违反,在发生恶意访问或恶意活动时通知用户,以便采取必要的行动。
{"title":"A cloud security framework based on trust model and mobile agent","authors":"Saddek Benabied, Abdelhafid Zitouni, M. Djoudi","doi":"10.1109/CloudTech.2015.7336962","DOIUrl":"https://doi.org/10.1109/CloudTech.2015.7336962","url":null,"abstract":"Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud., Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Friendship based storage allocation for online social networks cloud computing 基于友谊的在线社交网络云计算存储分配
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336970
M. E. Elsaid, C. Meinel
Online Social Networks (OSN) is one of the booming technologies started in the last decade with significant influence in people internet usage and daily life. Billions of individuals and organizations can share their status, news, photos, videos and files in a free open online world wide community. During the last few years, social networks became a key player in the media sector, advertisement, politics and online gaming. Social networks are a special kind of networks; where the users access not only their own data but their friends' data as well. So each user may access many datacenters in few minutes while browsing his/her friends' feeds., Cloud computing is the new era of datacenter that offers IT as a service. In this paper, we propose a storage allocation mechanism in cloud computing that considers the OSN characteristics such as the friendship matrix and users' locations in order to utilize cloud computing usage for social networks. The proposed algorithm minimizes the average users' data access latency in OSN.
在线社交网络(Online Social Networks, OSN)是近十年来兴起的新兴技术之一,对人们的网络使用和日常生活产生了重大影响。数十亿个人和组织可以在一个免费开放的全球在线社区中分享他们的状态、新闻、照片、视频和文件。在过去的几年里,社交网络成为媒体、广告、政治和在线游戏领域的关键角色。社交网络是一种特殊的网络;用户不仅可以访问自己的数据,还可以访问朋友的数据。因此,每个用户可以在几分钟内访问多个数据中心,同时浏览他/她的朋友的feed。云计算是提供IT即服务的数据中心的新时代。在本文中,我们提出了一种云计算中的存储分配机制,该机制考虑了OSN的特征,如友谊矩阵和用户的位置,以利用云计算在社交网络中的使用。该算法最大限度地降低了OSN中用户的平均数据访问时延。
{"title":"Friendship based storage allocation for online social networks cloud computing","authors":"M. E. Elsaid, C. Meinel","doi":"10.1109/CLOUDTECH.2015.7336970","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336970","url":null,"abstract":"Online Social Networks (OSN) is one of the booming technologies started in the last decade with significant influence in people internet usage and daily life. Billions of individuals and organizations can share their status, news, photos, videos and files in a free open online world wide community. During the last few years, social networks became a key player in the media sector, advertisement, politics and online gaming. Social networks are a special kind of networks; where the users access not only their own data but their friends' data as well. So each user may access many datacenters in few minutes while browsing his/her friends' feeds., Cloud computing is the new era of datacenter that offers IT as a service. In this paper, we propose a storage allocation mechanism in cloud computing that considers the OSN characteristics such as the friendship matrix and users' locations in order to utilize cloud computing usage for social networks. The proposed algorithm minimizes the average users' data access latency in OSN.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133069149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative study of simulators for cloud computing 云计算模拟器的比较研究
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336989
A. Maarouf, A. Marzouk, A. Haqiq
Recent years have seen a significant increase in cloud computing simulation tools. They are essential to evaluate cloud computing services and applications. Indeed, they can help to test, evaluate, and replicate the assumptions cost-effectively before a cloud platform is deployed in a real environment. It also provides an option to change and control the bottlenecks of the performance prior to implementing on an actual cloud platform. The simulation tools for cloud computing are also important to help users choose which cloud computing service is suitable for their requirements as deploying and operating a cloud platform in a real environment are often expensive, time consuming, or even impractical due to multiple test runs in different conditions and requirements. This paper surveys the various simulation platforms and tools of cloud computing. We identify the characteristics of the tools highlighting their strengths and weaknesses. Finally, the paper notes the challenges and the future research directions.
近年来,云计算模拟工具有了显著的增长。它们对于评估云计算服务和应用程序至关重要。实际上,在将云平台部署到真实环境之前,它们可以帮助测试、评估和经济有效地复制假设。它还提供了在实际云平台上实现之前更改和控制性能瓶颈的选项。用于云计算的模拟工具对于帮助用户选择适合其需求的云计算服务也很重要,因为在真实环境中部署和操作云平台通常昂贵、耗时,甚至不切实际,因为要在不同条件和需求下进行多次测试运行。本文综述了云计算的各种仿真平台和工具。我们确定了工具的特点,突出了它们的优点和缺点。最后,指出了面临的挑战和未来的研究方向。
{"title":"Comparative study of simulators for cloud computing","authors":"A. Maarouf, A. Marzouk, A. Haqiq","doi":"10.1109/CLOUDTECH.2015.7336989","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336989","url":null,"abstract":"Recent years have seen a significant increase in cloud computing simulation tools. They are essential to evaluate cloud computing services and applications. Indeed, they can help to test, evaluate, and replicate the assumptions cost-effectively before a cloud platform is deployed in a real environment. It also provides an option to change and control the bottlenecks of the performance prior to implementing on an actual cloud platform. The simulation tools for cloud computing are also important to help users choose which cloud computing service is suitable for their requirements as deploying and operating a cloud platform in a real environment are often expensive, time consuming, or even impractical due to multiple test runs in different conditions and requirements. This paper surveys the various simulation platforms and tools of cloud computing. We identify the characteristics of the tools highlighting their strengths and weaknesses. Finally, the paper notes the challenges and the future research directions.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"30 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130521115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Log-based change data capture from schema-free document stores using MapReduce 使用MapReduce从无模式文档存储中捕获基于日志的更改数据
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336969
Kun Ma, Bo Yang
Change data capture (CDC) is an approach to data integration that is used to determine and track the data that has changed so that action can be taken using the change data. However, the state of art of change data capture (CDC) in the context of document-oriented NoSQL databases is not mature. Therefore, it is urgent to require a NoSQL CDC solution. Although some manufacturers of NoSQL databases start to research on CDC for NoSQL, these approaches are just for the specific product. In our paper, we propose a log-based CDC approach from abstract schema-free document stores using MapReduce. The process is divided into map and reduce procedures, benefited from MapReduce framework, to generate cell state models (CSMs). In order to infinitely look back to any revision, we enable our proposed CSM to support copy-modify-merge model to manage the revisions of change data. Finally, experimental results show that this approach is independent and appropriate for document stores, with high performance and throughput capacity.
变更数据捕获(CDC)是一种数据集成方法,用于确定和跟踪已更改的数据,以便可以使用变更数据采取行动。然而,在面向文档的NoSQL数据库环境中,变更数据捕获(CDC)的技术水平还不成熟。因此,迫切需要一个NoSQL CDC解决方案。虽然一些NoSQL数据库厂商开始研究针对NoSQL的CDC,但这些方法都是针对特定产品的。在我们的论文中,我们提出了一种基于日志的CDC方法,该方法使用MapReduce从抽象的无模式文档存储中获取。该过程分为map和reduce两个过程,利用MapReduce框架生成细胞状态模型(csm)。为了无限地回顾任何修订,我们使我们建议的CSM支持复制-修改-合并模型来管理更改数据的修订。实验结果表明,该方法是独立的,适用于文档存储,具有较高的性能和吞吐能力。
{"title":"Log-based change data capture from schema-free document stores using MapReduce","authors":"Kun Ma, Bo Yang","doi":"10.1109/CLOUDTECH.2015.7336969","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336969","url":null,"abstract":"Change data capture (CDC) is an approach to data integration that is used to determine and track the data that has changed so that action can be taken using the change data. However, the state of art of change data capture (CDC) in the context of document-oriented NoSQL databases is not mature. Therefore, it is urgent to require a NoSQL CDC solution. Although some manufacturers of NoSQL databases start to research on CDC for NoSQL, these approaches are just for the specific product. In our paper, we propose a log-based CDC approach from abstract schema-free document stores using MapReduce. The process is divided into map and reduce procedures, benefited from MapReduce framework, to generate cell state models (CSMs). In order to infinitely look back to any revision, we enable our proposed CSM to support copy-modify-merge model to manage the revisions of change data. Finally, experimental results show that this approach is independent and appropriate for document stores, with high performance and throughput capacity.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122390480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Use of O-MaSE methodology for designing efficient intrusion detection based on MAS to learn new attacks 利用O-MaSE方法设计基于MAS的高效入侵检测,学习新的攻击
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336987
Mohssine El Ajjouri, S. Benhadou, H. Medromi
The agents used in the intrusion detection architectures have multiple characteristics namely delegation, cooperation and communication. However, an important property of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. For this, normal profiles are built in a dedicated training phase, these profiles are then compared with the current activity. Thus, the IDS does not have the ability to detect new attacks., In this paper, we propose a new architecture for intrusion detection based in MAS adding a learning feature abnormal behaviors that correspond to new attack patterns. To learn a new attack, the architecture must detect at first and then update the base of attack patterns. For the detection step, the approach adopted is based on the technique of Case-Based Reasoning (CBR). The proposed architecture is based on a hierarchical and distributed strategy where features are structured and separated into layers., We focus after on the modeling of our Multi agent systems Architecture, for reasons of simplicity, we use the methodology O-MaSE.
入侵检测体系结构中使用的代理具有委托、协作和通信等多重特征。然而,代理的一个重要属性:学习没有被使用。学习的概念在现有的ids中一般用于学习系统的正常行为以确保安全。为此,在专门的训练阶段构建正常的配置文件,然后将这些配置文件与当前活动进行比较。因此,IDS不具备检测新攻击的能力。在本文中,我们提出了一种新的基于MAS的入侵检测体系结构,增加了与新的攻击模式相对应的异常行为的学习特征。为了学习新的攻击,该体系结构必须首先检测并更新攻击模式基础。对于检测步骤,采用基于案例推理(Case-Based Reasoning, CBR)的方法。所提出的体系结构基于分层和分布式策略,其中特征被结构化并分离到层中。之后,我们将重点放在我们的多智能体系统架构的建模上,为了简单起见,我们使用了O-MaSE方法。
{"title":"Use of O-MaSE methodology for designing efficient intrusion detection based on MAS to learn new attacks","authors":"Mohssine El Ajjouri, S. Benhadou, H. Medromi","doi":"10.1109/CLOUDTECH.2015.7336987","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336987","url":null,"abstract":"The agents used in the intrusion detection architectures have multiple characteristics namely delegation, cooperation and communication. However, an important property of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. For this, normal profiles are built in a dedicated training phase, these profiles are then compared with the current activity. Thus, the IDS does not have the ability to detect new attacks., In this paper, we propose a new architecture for intrusion detection based in MAS adding a learning feature abnormal behaviors that correspond to new attack patterns. To learn a new attack, the architecture must detect at first and then update the base of attack patterns. For the detection step, the approach adopted is based on the technique of Case-Based Reasoning (CBR). The proposed architecture is based on a hierarchical and distributed strategy where features are structured and separated into layers., We focus after on the modeling of our Multi agent systems Architecture, for reasons of simplicity, we use the methodology O-MaSE.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117004841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A privacy-ensuring scheme for health data outsourcing 医疗数据外包的隐私保障方案
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336982
R. Gonçalves, E. Leonova, R. Puttini, Anderson C. A. Nascimento
Despite the movement towards cloud computing, the involvement of a third-party is quite challenging when dealing with sensitive information. This article proposes a practical scheme for making possible to outsource medical data to fully malicious clouds while preserving privacy, resulting in a ready-to-go architecture based on hybrid encryption carried out at the client-side. Standard efficient cryptographic primitives are used to provide dynamic key management with no further assumptions about the data structure. We also encompass two-factor authentication to combine passwords with tokens generated by mobile devices, averting cumbersome smart cards or biometrics. The resulting framework is evaluated through a real-world cloud application, producing a full-featured prototype with a controllable shared access model not exploitable by any opponents.
尽管向云计算发展,但在处理敏感信息时,第三方的参与是相当具有挑战性的。本文提出了一种实用的方案,可以将医疗数据外包给完全恶意的云,同时保留隐私,从而产生基于在客户端执行的混合加密的现成架构。标准高效的加密原语用于提供动态密钥管理,而无需对数据结构进行进一步假设。我们还包含双因素认证,将密码与移动设备生成的令牌结合起来,避免了繁琐的智能卡或生物识别技术。最终的框架通过一个真实的云应用程序进行评估,产生一个具有可控共享访问模型的全功能原型,不被任何对手利用。
{"title":"A privacy-ensuring scheme for health data outsourcing","authors":"R. Gonçalves, E. Leonova, R. Puttini, Anderson C. A. Nascimento","doi":"10.1109/CLOUDTECH.2015.7336982","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336982","url":null,"abstract":"Despite the movement towards cloud computing, the involvement of a third-party is quite challenging when dealing with sensitive information. This article proposes a practical scheme for making possible to outsource medical data to fully malicious clouds while preserving privacy, resulting in a ready-to-go architecture based on hybrid encryption carried out at the client-side. Standard efficient cryptographic primitives are used to provide dynamic key management with no further assumptions about the data structure. We also encompass two-factor authentication to combine passwords with tokens generated by mobile devices, averting cumbersome smart cards or biometrics. The resulting framework is evaluated through a real-world cloud application, producing a full-featured prototype with a controllable shared access model not exploitable by any opponents.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117140828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multiview SOA: Extending SOA using a private cloud computing as SaaS 多视图SOA:使用私有云计算作为SaaS扩展SOA
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337016
B. Rida, Ettalbi Ahmed
This work is based on two major areas, the Multiview Service Oriented Architecture and the combination between the computing cloud and MVSOA. Thus, it is suggested to extend firstly the service oriented architecture (SOA) into an architecture called MVSOA by adding two components, the Multiview service generator, whose role is to transform the classic service into Multiview service, and the data base, this component seeks to stock all of consumer service information. It is also suggested to combine the computing cloud and Multiview Service Oriented Architecture MV-SOA. To reach such combination, the MV-SOA architecture was taken and we added to the client-side a private cloud in SAAS.
这项工作基于两个主要领域,即多视图面向服务的体系结构和计算云和MVSOA之间的结合。因此,建议首先将面向服务的体系结构(SOA)扩展为一个称为MVSOA的体系结构,方法是添加两个组件:Multiview服务生成器(其作用是将经典服务转换为Multiview服务)和数据库(该组件寻求存储所有消费者服务信息)。建议将计算云和多视图面向服务体系结构MV-SOA相结合。为了实现这样的组合,我们采用了MV-SOA体系结构,并向客户端添加了SAAS中的私有云。
{"title":"Multiview SOA: Extending SOA using a private cloud computing as SaaS","authors":"B. Rida, Ettalbi Ahmed","doi":"10.1109/CLOUDTECH.2015.7337016","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337016","url":null,"abstract":"This work is based on two major areas, the Multiview Service Oriented Architecture and the combination between the computing cloud and MVSOA. Thus, it is suggested to extend firstly the service oriented architecture (SOA) into an architecture called MVSOA by adding two components, the Multiview service generator, whose role is to transform the classic service into Multiview service, and the data base, this component seeks to stock all of consumer service information. It is also suggested to combine the computing cloud and Multiview Service Oriented Architecture MV-SOA. To reach such combination, the MV-SOA architecture was taken and we added to the client-side a private cloud in SAAS.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130657085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud computing & the organizational performance different approach of assessment 云计算&组织绩效的不同评估方法
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337007
Abdelhamid El Alami, Hicham Sadok, Naima Elhaoud
This paper introduces a nutshell of the cloud computing with its different deployment and delivery models. Additionally, it presents an assessment of the impact of the cloud computing on the organizational performance from many points of view.
本文简要介绍了云计算及其不同的部署和交付模型。此外,它还从多个角度评估了云计算对组织绩效的影响。
{"title":"Cloud computing & the organizational performance different approach of assessment","authors":"Abdelhamid El Alami, Hicham Sadok, Naima Elhaoud","doi":"10.1109/CLOUDTECH.2015.7337007","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337007","url":null,"abstract":"This paper introduces a nutshell of the cloud computing with its different deployment and delivery models. Additionally, it presents an assessment of the impact of the cloud computing on the organizational performance from many points of view.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2015 International Conference on Cloud Technologies and Applications (CloudTech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1