首页 > 最新文献

2015 International Conference on Cloud Technologies and Applications (CloudTech)最新文献

英文 中文
A comprehensive cloud-based IoT software infrastructure for Ambient Assisted Living 为环境辅助生活提供全面的基于云的物联网软件基础设施
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336998
B. Gomes, L. Muniz, F. J. da Silva e Silva, Luis Eduardo Talavera Rios, M. Endler
Ambient Assisted Living (AAL) is a research field whose main objective is to develop health monitoring systems for elderly patients at home, increasing the degree of patient independence during chronic diseases treatment. AAL systems are composed by several technologies: medical sensors and actuators, computer and mobile devices, Wireress Sensors Networks (WSN), computer networks, software infrastructure and applications. A comprehensive software infrastructure for AAL systems should use these technologies in an integrated manner and be able to cover scenarios involving several patient mobility level, patient locations, and levels of physical and cognitive abilities. The integration of AAL with the Internet of Things (IoT) technologies expands the scope of these systems with the ability to connect various sensors and actuators, integrating them into a single network that serves the purpose of patient health monitoring. In this context, the contribution of this paper is to present a comprehensive Cloud based IoT softwre infrastructure for Ambient Assisted Living. The main components of this software infrastructure are the M-Hub and the SDDL middleware. Preliminary results show that the proposed infrastructure has the potential to be applied in a wide range of health monitoring scenarios.
环境辅助生活(AAL)是一个研究领域,其主要目标是为家中的老年患者开发健康监测系统,提高患者在慢性病治疗期间的独立程度。AAL系统由几种技术组成:医疗传感器和执行器、计算机和移动设备、无线传感器网络(WSN)、计算机网络、软件基础设施和应用。AAL系统的综合软件基础设施应该以集成的方式使用这些技术,并能够涵盖涉及多个患者活动水平、患者位置以及身体和认知能力水平的场景。AAL与物联网(IoT)技术的集成扩展了这些系统的范围,能够连接各种传感器和执行器,将它们集成到一个单一的网络中,用于患者健康监测。在此背景下,本文的贡献是为环境辅助生活提供一个全面的基于云的物联网软件基础设施。该软件基础设施的主要组件是M-Hub和SDDL中间件。初步结果表明,拟议的基础设施具有广泛应用于健康监测场景的潜力。
{"title":"A comprehensive cloud-based IoT software infrastructure for Ambient Assisted Living","authors":"B. Gomes, L. Muniz, F. J. da Silva e Silva, Luis Eduardo Talavera Rios, M. Endler","doi":"10.1109/CLOUDTECH.2015.7336998","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336998","url":null,"abstract":"Ambient Assisted Living (AAL) is a research field whose main objective is to develop health monitoring systems for elderly patients at home, increasing the degree of patient independence during chronic diseases treatment. AAL systems are composed by several technologies: medical sensors and actuators, computer and mobile devices, Wireress Sensors Networks (WSN), computer networks, software infrastructure and applications. A comprehensive software infrastructure for AAL systems should use these technologies in an integrated manner and be able to cover scenarios involving several patient mobility level, patient locations, and levels of physical and cognitive abilities. The integration of AAL with the Internet of Things (IoT) technologies expands the scope of these systems with the ability to connect various sensors and actuators, integrating them into a single network that serves the purpose of patient health monitoring. In this context, the contribution of this paper is to present a comprehensive Cloud based IoT softwre infrastructure for Ambient Assisted Living. The main components of this software infrastructure are the M-Hub and the SDDL middleware. Preliminary results show that the proposed infrastructure has the potential to be applied in a wide range of health monitoring scenarios.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133115346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Management platform for Cloud Computing 云计算管理平台
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336968
Omar Sefraoui, Mohammed Aissaoui, M. Eleuldj
The Cloud Computing is a new concept in which dynamically scalable resources, virtualized and provided to users as a service over the Internet. It is primarily intended to meet the needs of users and allow them access to virtually unlimited resources. In fact, many researchers are motivated to develop solutions to improve performance and give users more tools to control the use of cloud computing. The cloud services offered is very diverse in terms of hardware and software, providing a wide range of configurations, and great flexibility., In this paper we propose a Management platform for Cloud Computing (Man4CC platform), aimed to act as an intermediate between users and Cloud environment. The main purpose of the Man4CC platform is to support cloud environment and offering additional components that enhance the functionality. The Man4CC platform is open source solution, scalable, interoperable and extensible. Also dealing with a management platform specification approach by capturing the user specifications and translate them into rules that will help to generate the cloud settings.
云计算是一个新概念,其中动态可伸缩的资源被虚拟化,并通过Internet作为服务提供给用户。它的主要目的是满足用户的需要,使他们能够获得几乎无限的资源。事实上,许多研究人员都有动力开发解决方案来提高性能,并为用户提供更多工具来控制云计算的使用。所提供的云服务在硬件和软件方面非常多样化,提供了广泛的配置和极大的灵活性。在本文中,我们提出了一个云计算管理平台(Man4CC平台),旨在充当用户和云环境之间的中介。Man4CC平台的主要目的是支持云环境,并提供增强功能的附加组件。Man4CC平台是一个开源的解决方案,具有可扩展性、互操作性和可扩展性。另外,通过捕获用户规范并将其转换为有助于生成云设置的规则来处理管理平台规范方法。
{"title":"Management platform for Cloud Computing","authors":"Omar Sefraoui, Mohammed Aissaoui, M. Eleuldj","doi":"10.1109/CLOUDTECH.2015.7336968","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336968","url":null,"abstract":"The Cloud Computing is a new concept in which dynamically scalable resources, virtualized and provided to users as a service over the Internet. It is primarily intended to meet the needs of users and allow them access to virtually unlimited resources. In fact, many researchers are motivated to develop solutions to improve performance and give users more tools to control the use of cloud computing. The cloud services offered is very diverse in terms of hardware and software, providing a wide range of configurations, and great flexibility., In this paper we propose a Management platform for Cloud Computing (Man4CC platform), aimed to act as an intermediate between users and Cloud environment. The main purpose of the Man4CC platform is to support cloud environment and offering additional components that enhance the functionality. The Man4CC platform is open source solution, scalable, interoperable and extensible. Also dealing with a management platform specification approach by capturing the user specifications and translate them into rules that will help to generate the cloud settings.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Toward a trusted framework for cloud computing 为云计算建立一个可信的框架
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337013
Hicham Toumi, M. Talea, K. Sabiri, A. Eddaoui
Cloud Computing is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business. However, Cloud Computing is still a matter of great concern for a cloud user to trust security and reliability of cloud services. Cloud Computing is undergoing an incontestable success, which could be indeed compromised by concerns about the risks related to potential misuse of this model aimed at conducting illegal activities. There is major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To overcome these kinds of attacks, we propose a framework of cooperative Hybrid Intrusion Detection System (Hy-IDS) and Mobile Agents. Then, our Hybrid IDS consists of two types of IDS, which are dispatched over three layer of cloud computing. Therefore, in the first layer our framework allows to collect, analyze and detect malicious data using the first type of IDS and Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures, based on a Signature Generation Algorithm (SGA) and network intrusion detection system (NIDS). However, these new signatures are used to update the database of the IDS. The mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. Therefore, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. Applying this close-loop control, the collaborative network security management framework could identify and address new distributed attacks more quickly and effectively.
云计算正在发展成为共享资源(包括基础设施、软件、应用程序和业务)的关键计算平台。然而,云计算的安全性和可靠性仍然是云用户非常关心的问题。云计算正在取得无可争议的成功,但人们担心这种模式可能被滥用以进行非法活动,因此这种成功确实可能受到损害。为了让客户满意,在云模型中引入安全性、透明性和可靠性是非常重要的。安全问题之一是如何减少这种环境中任何类型的入侵的影响。为了克服这类攻击,我们提出了一种基于移动代理的协同混合入侵检测系统(Hy-IDS)框架。然后,我们的混合IDS由两种类型的IDS组成,它们通过三层云计算进行调度。因此,在第一层,我们的框架允许使用第一种类型的IDS和移动代理收集、分析和检测恶意数据。在攻击发生的情况下,我们在第二层收集第一层检测到的所有恶意数据,并基于签名生成算法(SGA)和网络入侵检测系统(NIDS)生成新的签名。但是,这些新签名用于更新IDS的数据库。移动代理在这种协作中起着重要的作用。它们在我们的框架中用于主机调查,恶意传输数据以及在云中传输相邻IDS数据库的更新。因此,邻近的IDS将使用这些新签名来保护其控制区域免受相同类型的攻击。应用这种闭环控制,协作网络安全管理框架可以更快速有效地识别和应对新的分布式攻击。
{"title":"Toward a trusted framework for cloud computing","authors":"Hicham Toumi, M. Talea, K. Sabiri, A. Eddaoui","doi":"10.1109/CLOUDTECH.2015.7337013","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337013","url":null,"abstract":"Cloud Computing is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business. However, Cloud Computing is still a matter of great concern for a cloud user to trust security and reliability of cloud services. Cloud Computing is undergoing an incontestable success, which could be indeed compromised by concerns about the risks related to potential misuse of this model aimed at conducting illegal activities. There is major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To overcome these kinds of attacks, we propose a framework of cooperative Hybrid Intrusion Detection System (Hy-IDS) and Mobile Agents. Then, our Hybrid IDS consists of two types of IDS, which are dispatched over three layer of cloud computing. Therefore, in the first layer our framework allows to collect, analyze and detect malicious data using the first type of IDS and Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures, based on a Signature Generation Algorithm (SGA) and network intrusion detection system (NIDS). However, these new signatures are used to update the database of the IDS. The mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. Therefore, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. Applying this close-loop control, the collaborative network security management framework could identify and address new distributed attacks more quickly and effectively.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127841246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Connectivity-aware service provision in vehicular cloud 车载云中的连接感知服务提供
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337017
Rayane El Sibai, T. Atéchian, J. B. Abdo, R. Tawil, J. Demerjian
In the last twenty years, vehicles have become equipped with various sensors and resources, making them capable to communicate, to share resources and to behave cooperatively. This gave rise to the concept of vehicular cloud (VC). Vehicular cloud can be described from the standpoint of applications and services offered by vehicles that belong to a Vehicular Ad hoc Network (VANET). Because of the limitation of computation, storage and bandwidth resources for complex in-vehicle multimedia, entertainment applications, it is important to request services from service provider vehicles in the network, forming a cloud. However, the main challenge of vehicular networks is how to maintain the connectivity between the vehicles during service provision process. It is important to note that, to fully provide a service without interruption, it is necessary to ensure that the connectivity duration between the requestor and the service provider vehicles is sufficient for a complete end-to-end transmission. In this paper, a connectivity-aware service provision mechanism is proposed for VANET, where the service provider vehicle is selected based on several parameters such as the availability of the requested service and the mobility of the vehicles.
在过去的二十年里,车辆已经配备了各种传感器和资源,使它们能够通信,共享资源和合作行为。这就产生了车载云(VC)的概念。车辆云可以从属于车辆自组织网络(VANET)的车辆提供的应用程序和服务的角度来描述。由于复杂的车载多媒体、娱乐应用的计算、存储和带宽资源的限制,向网络中的服务提供商车辆请求服务,形成云是很重要的。然而,车辆网络的主要挑战是如何在服务提供过程中保持车辆之间的连通性。值得注意的是,要完全不中断地提供服务,有必要确保请求者和服务提供者车辆之间的连接持续时间足以完成端到端传输。本文提出了一种基于连接感知的服务提供机制,该机制基于所请求服务的可用性和车辆的移动性等多个参数选择服务提供者车辆。
{"title":"Connectivity-aware service provision in vehicular cloud","authors":"Rayane El Sibai, T. Atéchian, J. B. Abdo, R. Tawil, J. Demerjian","doi":"10.1109/CLOUDTECH.2015.7337017","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337017","url":null,"abstract":"In the last twenty years, vehicles have become equipped with various sensors and resources, making them capable to communicate, to share resources and to behave cooperatively. This gave rise to the concept of vehicular cloud (VC). Vehicular cloud can be described from the standpoint of applications and services offered by vehicles that belong to a Vehicular Ad hoc Network (VANET). Because of the limitation of computation, storage and bandwidth resources for complex in-vehicle multimedia, entertainment applications, it is important to request services from service provider vehicles in the network, forming a cloud. However, the main challenge of vehicular networks is how to maintain the connectivity between the vehicles during service provision process. It is important to note that, to fully provide a service without interruption, it is necessary to ensure that the connectivity duration between the requestor and the service provider vehicles is sufficient for a complete end-to-end transmission. In this paper, a connectivity-aware service provision mechanism is proposed for VANET, where the service provider vehicle is selected based on several parameters such as the availability of the requested service and the mobility of the vehicles.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126244830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Challenges of using homomorphic encryption to secure cloud computing 使用同态加密保护云计算的挑战
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337011
Khalid El Makkaoui, Abdellah Ezzati, A. B. Hssane
With the emergence of cloud computing, the concept of information security has become a major issue. Indeed, the security of such a system is the greatest concern of computer scientists, providers of cloud and organizations who want to adopt and benefit from these services. Cloud computing providers must implement concepts ensuring network security, hardware, data storage and strategies of control and access to services. All these elements help to preserve data security and ensuring the availability of services associated with the Cloud, to better satisfy clients and acquire and build their trust. However, even if the data storage security in cloud servers is assured, reluctance remain when it comes to process the confidential data. Indeed, the fear that sensitive data is being used is a major obstacle in the adoption of cloud services by enterprises. To overcome this obstacle, the use of methods that can perform operations on encrypted data without knowing the secret key, seems to be an effective way to strengthen the confidentiality of information. In this paper we will examine the challenges facing Homomorphic Encryption methods to allow suppliers of cloud to perform operations on encrypted data, and provide the same results after treatment, as if they were performing calculations on raw data.
随着云计算的出现,信息安全的概念已经成为一个重大问题。事实上,这样一个系统的安全性是计算机科学家、云计算提供商和希望采用这些服务并从中受益的组织最关心的问题。云计算提供商必须实施确保网络安全、硬件、数据存储以及控制和访问服务策略的概念。所有这些元素都有助于保护数据安全性,确保与云相关的服务的可用性,从而更好地满足客户,获得并建立他们的信任。然而,即使云服务器中的数据存储安全得到保证,在处理机密数据时仍然存在不情愿的情况。事实上,对敏感数据被使用的担忧是企业采用云服务的主要障碍。为了克服这一障碍,使用可以在不知道密钥的情况下对加密数据执行操作的方法似乎是加强信息机密性的有效方法。在本文中,我们将研究同态加密方法所面临的挑战,这些方法允许云供应商对加密数据执行操作,并在处理后提供相同的结果,就像他们在原始数据上执行计算一样。
{"title":"Challenges of using homomorphic encryption to secure cloud computing","authors":"Khalid El Makkaoui, Abdellah Ezzati, A. B. Hssane","doi":"10.1109/CLOUDTECH.2015.7337011","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337011","url":null,"abstract":"With the emergence of cloud computing, the concept of information security has become a major issue. Indeed, the security of such a system is the greatest concern of computer scientists, providers of cloud and organizations who want to adopt and benefit from these services. Cloud computing providers must implement concepts ensuring network security, hardware, data storage and strategies of control and access to services. All these elements help to preserve data security and ensuring the availability of services associated with the Cloud, to better satisfy clients and acquire and build their trust. However, even if the data storage security in cloud servers is assured, reluctance remain when it comes to process the confidential data. Indeed, the fear that sensitive data is being used is a major obstacle in the adoption of cloud services by enterprises. To overcome this obstacle, the use of methods that can perform operations on encrypted data without knowing the secret key, seems to be an effective way to strengthen the confidentiality of information. In this paper we will examine the challenges facing Homomorphic Encryption methods to allow suppliers of cloud to perform operations on encrypted data, and provide the same results after treatment, as if they were performing calculations on raw data.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128436447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Security model for cloud database as a service (DBaaS) 云数据库即服务(DBaaS)的安全模型
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336974
K. Munir
Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this paper, I propose a security model for cloud Database as a service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed framework for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.
数据库即服务(database -as-a-service, DBaaS)是一种云计算服务模型,它为用户提供对数据库的某种形式的访问,而不需要设置物理硬件、安装软件或配置性能。由于消费者在云上托管数据,DBaaS提供商应该能够保证数据所有者的数据将受到保护,免受所有潜在的安全威胁。保护大型web和移动应用程序的应用程序数据可能很复杂;尤其是分布式和NoSQL数据库。数据中心不再局限于企业内部。越来越多的企业将他们的数据放到云端,但是在这样做的时候忘记调整他们的安全管理实践。未经授权访问数据资源、滥用存储在第三方平台上的数据、数据机密性、完整性和可用性是所有这些新兴云服务模型面临的一些主要安全挑战,这些挑战阻碍了DBaaS的广泛采用。在本文中,我提出了一个云数据库即服务(DBaaS)的安全模型。用户可以随时更改他/她的密码。此外,安全性分析验证了所提出的DBaaS框架的可行性和有效性。这将有助于云社区深入了解安全策略的最新进展、不足之处和可能的未来方向。
{"title":"Security model for cloud database as a service (DBaaS)","authors":"K. Munir","doi":"10.1109/CLOUDTECH.2015.7336974","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336974","url":null,"abstract":"Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this paper, I propose a security model for cloud Database as a service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed framework for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122643324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Decentralized attribute-based encryption scheme with scalable revocation for sharing data in public cloud servers 分布式基于属性的加密方案,具有可伸缩的撤销,用于在公共云服务器中共享数据
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336985
Adel Binbusayyis, Ning Zhang
With the rapid development of cloud computing, it is attractive for enterprise companies to outsource their data files for sharing in cloud servers, as cloud computing can offer desirable characteristics, such as on-demand self-service, broad network access, and rapid elasticity. However, by uploading data files onto cloud servers, data owners (i.e. the companies) will lose control over their own data. This makes it essential to use Attribute-based encryption (ABE) because it can help to protect the data confidentiality by uploading data files in encrypted form. In addition, it can help to facilitate granting access to data by allowing only authorized users to decrypt the encrypted data files based on a set of attributes. However, this ABE approach includes three key issues. The first one is the complexity of user secret key management for large-scale cloud environments. The second is the complexity of revoking the users access rights. The third is the computational complexity involved in assigning user rights, encrypting and accessing data files. This paper addresses these three issues by proposing a decentralized ciphertext-policy ABE scheme (CP-DABE) for a large-scale cooperative cloud environment. The scheme reduces the complexity of user secret key management by providing a secure attribute delegation services between a master authority and a number of multiple attribute authorities. The scheme also reduces the complexity of revocation process by using Proxy Re-encryption technique to revoke any users access right. In addition, by comparing with most relative work, the scheme reduces the computational requirements for assigning user rights, encrypting and accessing data files. The scheme can support any LSSS access structure. In this paper, the cryptographic construction of the CP-DABE scheme is presented, and its efficiency is analyzed and compared with most relative work. The security of the CP-DABE scheme is discussed and selectively proved against chosen-plaintext attacks under the decisional Bilinear Diffie-Hellman Exponent assumption. Finally, ideas to extend the CP-DABE scheme are discussed.
随着云计算的快速发展,将其数据文件外包到云服务器中共享对企业公司具有很大的吸引力,因为云计算可以提供所需的特性,如按需自助服务、广泛的网络访问和快速的弹性。然而,通过将数据文件上传到云服务器,数据所有者(即公司)将失去对自己数据的控制。这使得使用基于属性的加密(ABE)变得至关重要,因为它可以通过以加密形式上传数据文件来帮助保护数据机密性。此外,通过只允许授权用户基于一组属性解密加密的数据文件,它可以帮助简化对数据的访问。然而,这种ABE方法包括三个关键问题。第一个问题是大规模云环境中用户秘密密钥管理的复杂性。二是撤销用户访问权限的复杂性。第三是分配用户权限、加密和访问数据文件所涉及的计算复杂性。针对这三个问题,本文提出了一种用于大规模协作云环境的去中心化密文策略ABE方案(CP-DABE)。该方案通过在主授权机构和多个多属性授权机构之间提供安全的属性委托服务,降低了用户秘密密钥管理的复杂性。该方案还通过使用代理重加密技术撤销任何用户的访问权限,降低了撤销过程的复杂性。此外,与大多数相关工作相比,该方案减少了分配用户权限、加密和访问数据文件的计算量。该方案支持任意的LSSS访问结构。本文给出了CP-DABE方案的密码结构,并对其有效性进行了分析和比较。在决策双线性Diffie-Hellman指数假设下,讨论了CP-DABE方案的安全性,并有选择地证明了其抗选择明文攻击的安全性。最后,对CP-DABE方案的扩展进行了讨论。
{"title":"Decentralized attribute-based encryption scheme with scalable revocation for sharing data in public cloud servers","authors":"Adel Binbusayyis, Ning Zhang","doi":"10.1109/CLOUDTECH.2015.7336985","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336985","url":null,"abstract":"With the rapid development of cloud computing, it is attractive for enterprise companies to outsource their data files for sharing in cloud servers, as cloud computing can offer desirable characteristics, such as on-demand self-service, broad network access, and rapid elasticity. However, by uploading data files onto cloud servers, data owners (i.e. the companies) will lose control over their own data. This makes it essential to use Attribute-based encryption (ABE) because it can help to protect the data confidentiality by uploading data files in encrypted form. In addition, it can help to facilitate granting access to data by allowing only authorized users to decrypt the encrypted data files based on a set of attributes. However, this ABE approach includes three key issues. The first one is the complexity of user secret key management for large-scale cloud environments. The second is the complexity of revoking the users access rights. The third is the computational complexity involved in assigning user rights, encrypting and accessing data files. This paper addresses these three issues by proposing a decentralized ciphertext-policy ABE scheme (CP-DABE) for a large-scale cooperative cloud environment. The scheme reduces the complexity of user secret key management by providing a secure attribute delegation services between a master authority and a number of multiple attribute authorities. The scheme also reduces the complexity of revocation process by using Proxy Re-encryption technique to revoke any users access right. In addition, by comparing with most relative work, the scheme reduces the computational requirements for assigning user rights, encrypting and accessing data files. The scheme can support any LSSS access structure. In this paper, the cryptographic construction of the CP-DABE scheme is presented, and its efficiency is analyzed and compared with most relative work. The security of the CP-DABE scheme is discussed and selectively proved against chosen-plaintext attacks under the decisional Bilinear Diffie-Hellman Exponent assumption. Finally, ideas to extend the CP-DABE scheme are discussed.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133718405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementing knowledge management systems in cloud-based environments: A case study in a computer science high school 在基于云的环境中实现知识管理系统:一所计算机科学高中的案例研究
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337008
M. Mostefai, Amina Annane, Lylia Kissoum, M. Ahmed-Nacer
Knowledge Management Systems are a special class of information systems that support the knowledge management processes. One of the most important barriers that could compromise the KMS implementation is the cost related to the acquisition and the maintenance of the required IT infrastructure. This paper presents how cloud computing could be an alternative to traditional on-premise based implementation project and discusses a case study where a KMS has been implemented in a high school context using a cloud-based environment.
知识管理系统是支持知识管理过程的一类特殊信息系统。可能危及KMS实现的最重要障碍之一是与所需IT基础设施的获取和维护相关的成本。本文介绍了云计算如何成为传统的基于内部部署的实施项目的替代方案,并讨论了一个案例研究,该案例研究使用基于云的环境在高中环境中实现了KMS。
{"title":"Implementing knowledge management systems in cloud-based environments: A case study in a computer science high school","authors":"M. Mostefai, Amina Annane, Lylia Kissoum, M. Ahmed-Nacer","doi":"10.1109/CLOUDTECH.2015.7337008","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337008","url":null,"abstract":"Knowledge Management Systems are a special class of information systems that support the knowledge management processes. One of the most important barriers that could compromise the KMS implementation is the cost related to the acquisition and the maintenance of the required IT infrastructure. This paper presents how cloud computing could be an alternative to traditional on-premise based implementation project and discusses a case study where a KMS has been implemented in a high school context using a cloud-based environment.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129653154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An overview of variability management in cloud services 云服务中可变性管理的概述
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336976
Khadija Aouzal, H. Hafiddi, Mohamed Dahchour
The Cloud Computing paradigm has enabled the multi-tenancy architectural approach in Cloud applications. In a multi-tenant application, one single instance is shared by many tenants (users). Since each client has its own and particular requirements and context, that are exposed to change in time, the process of realizing customizable and adaptable services becomes complex and difficult to handle. Handling variability has been subject of many research works in the domain of Service Oriented Computing, while less interest was given to variability in Cloud services. Therefore, managing variability in Cloud applications can take benefit from related works in service-oriented computing. In this paper, we present an overview of variability management in Cloud applications, in order to assess the pertinence of the different approaches proposed to tackle this issue.
云计算范式支持云应用程序中的多租户体系结构方法。在多租户应用程序中,单个实例由多个租户(用户)共享。由于每个客户端都有自己的特定需求和上下文,随时可能发生变化,因此实现可定制和可适应服务的过程变得复杂且难以处理。在面向服务的计算领域中,处理可变性一直是许多研究工作的主题,而对云服务中的可变性的兴趣较少。因此,管理云应用程序中的可变性可以从面向服务的计算中的相关工作中获益。在本文中,我们概述了云应用程序中的可变性管理,以评估提出的解决这一问题的不同方法的相关性。
{"title":"An overview of variability management in cloud services","authors":"Khadija Aouzal, H. Hafiddi, Mohamed Dahchour","doi":"10.1109/CLOUDTECH.2015.7336976","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336976","url":null,"abstract":"The Cloud Computing paradigm has enabled the multi-tenancy architectural approach in Cloud applications. In a multi-tenant application, one single instance is shared by many tenants (users). Since each client has its own and particular requirements and context, that are exposed to change in time, the process of realizing customizable and adaptable services becomes complex and difficult to handle. Handling variability has been subject of many research works in the domain of Service Oriented Computing, while less interest was given to variability in Cloud services. Therefore, managing variability in Cloud applications can take benefit from related works in service-oriented computing. In this paper, we present an overview of variability management in Cloud applications, in order to assess the pertinence of the different approaches proposed to tackle this issue.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132148817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An ontology-based guidance for privacy enforcement in a multi-authority cloud environment 用于在多权威云环境中实施隐私的基于本体的指南
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337015
Maherzia Belaazi, H. B. Rahmouni, A. Bouhoula
Despite its attractive benefits, cloud adoption is challenged by some criteria of security and privacy. Access Control is one of the traditional and essential security tools of data protection. The decision to grant access to a resource must ensure secure management with a specific attention to privacy and data protection regulations. In particular, the challenge is more important with public clouds as many governing authorities could be involved in one cloud scenario. This implies a difficulty to work out which regulation should be applicable in case of conflict. In recent years, many access control models were proposed. Despite increasing legislative pressure, few of these propositions take care of privacy requirements in their security policies specification and enforcement. In this paper, we propose to enforce privacy compliance in access control policies for the context of public cloud. Throughout the use of ontology tools, we propose an approach for checking privacy enforcement with access control conditions. We also suggest the use of privacy safeguards notification where the threat to privacy protection is related to the secondary usage of personal data more than just the data access itself.
尽管云计算带来了诱人的好处,但它的采用受到了一些安全和隐私标准的挑战。访问控制是数据保护的传统和必不可少的安全工具之一。授予资源访问权限的决定必须确保安全管理,并特别注意隐私和数据保护法规。特别是,公共云的挑战更为重要,因为一个云场景中可能涉及许多管理机构。这意味着很难确定在发生冲突的情况下应适用哪条规定。近年来,提出了许多访问控制模型。尽管立法压力越来越大,但这些提案中很少在其安全策略规范和执行中考虑到隐私要求。在本文中,我们建议在公共云环境下的访问控制策略中强制执行隐私遵从性。在本体工具的使用过程中,我们提出了一种通过访问控制条件检查隐私强制执行的方法。我们还建议使用隐私保障通知,如果对隐私保护的威胁与个人数据的二次使用有关,而不仅仅是数据访问本身。
{"title":"An ontology-based guidance for privacy enforcement in a multi-authority cloud environment","authors":"Maherzia Belaazi, H. B. Rahmouni, A. Bouhoula","doi":"10.1109/CLOUDTECH.2015.7337015","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337015","url":null,"abstract":"Despite its attractive benefits, cloud adoption is challenged by some criteria of security and privacy. Access Control is one of the traditional and essential security tools of data protection. The decision to grant access to a resource must ensure secure management with a specific attention to privacy and data protection regulations. In particular, the challenge is more important with public clouds as many governing authorities could be involved in one cloud scenario. This implies a difficulty to work out which regulation should be applicable in case of conflict. In recent years, many access control models were proposed. Despite increasing legislative pressure, few of these propositions take care of privacy requirements in their security policies specification and enforcement. In this paper, we propose to enforce privacy compliance in access control policies for the context of public cloud. Throughout the use of ontology tools, we propose an approach for checking privacy enforcement with access control conditions. We also suggest the use of privacy safeguards notification where the threat to privacy protection is related to the secondary usage of personal data more than just the data access itself.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134537806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 International Conference on Cloud Technologies and Applications (CloudTech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1