首页 > 最新文献

2015 International Conference on Cloud Technologies and Applications (CloudTech)最新文献

英文 中文
A performance comparison between parallel and lazy fetching in vertically distributed cloud databases 垂直分布的云数据库中并行抓取和延迟抓取的性能比较
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337005
J. Kohler, Thomas Specht
The following work focuses on the severe performance issues that come along with the vertical data distribution approach of the SeDiCo framework. SeDiCo (A Secure and Distributed Cloud Data Store) is a framework that vertically distributes database data across several clouds in order to maintain data security, protection and privacy. However, this vertical data distribution requires joining data together before any client access. This join is extremely time-consuming and thus, this approach is currently not feasible in practical usage scenarios. In order to overcome those performance issues, this work proposes the introduction of a data cache architecture and two corresponding fetch procedures, i.e. lazy and parallel fetching. We further implemented both strategies, measured their performance and compared them to each other. Our results show that the parallel fetch strategy by far outperforms the lazy fetch strategy. Above that, this work outlines the entire caching architecture of our approach and discusses the two strategies in detail. Finally, this work concludes the measured results and discusses further challenges in the context of the SeDiCo framework as future work tasks.
下面的工作主要关注SeDiCo框架的垂直数据分布方法带来的严重性能问题。SeDiCo(安全分布式云数据存储)是一个框架,它将数据库数据垂直分布在多个云上,以维护数据的安全性、保护和隐私。但是,这种垂直数据分布需要在任何客户机访问之前将数据连接在一起。这种连接非常耗时,因此,这种方法目前在实际使用场景中是不可行的。为了克服这些性能问题,本工作建议引入一个数据缓存架构和两个相应的获取过程,即延迟和并行获取。我们进一步实施了这两种策略,测量了它们的表现并相互比较。我们的结果表明,并行获取策略远远优于延迟获取策略。在此之上,本文概述了我们方法的整个缓存架构,并详细讨论了这两种策略。最后,本工作总结了测量结果,并讨论了SeDiCo框架背景下的进一步挑战,作为未来的工作任务。
{"title":"A performance comparison between parallel and lazy fetching in vertically distributed cloud databases","authors":"J. Kohler, Thomas Specht","doi":"10.1109/CLOUDTECH.2015.7337005","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337005","url":null,"abstract":"The following work focuses on the severe performance issues that come along with the vertical data distribution approach of the SeDiCo framework. SeDiCo (A Secure and Distributed Cloud Data Store) is a framework that vertically distributes database data across several clouds in order to maintain data security, protection and privacy. However, this vertical data distribution requires joining data together before any client access. This join is extremely time-consuming and thus, this approach is currently not feasible in practical usage scenarios. In order to overcome those performance issues, this work proposes the introduction of a data cache architecture and two corresponding fetch procedures, i.e. lazy and parallel fetching. We further implemented both strategies, measured their performance and compared them to each other. Our results show that the parallel fetch strategy by far outperforms the lazy fetch strategy. Above that, this work outlines the entire caching architecture of our approach and discusses the two strategies in detail. Finally, this work concludes the measured results and discusses further challenges in the context of the SeDiCo framework as future work tasks.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Big data in healthcare: Challenges and opportunities 医疗保健中的大数据:挑战与机遇
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337020
Hiba Asri, H. Mousannif, H. Al Moatassime, T. Noel
Mobile phones, sensors, patients, hospitals, researchers, providers and organizations are nowadays, generating huge amounts of healthcare data. The real challenge in healthcare systems is how to find, collect, analyze and manage information to make people's lives healthier and easier, by contributing not only to understand new diseases and therapies but also to predict outcomes at earlier stages and make real-time decisions. In this paper, we explain the potential benefits of big data to healthcare and explore how it improves treatment and empowers patients, providers and researchers. We also describe the ability of reality mining in collecting large amounts of data to understand people's habits, detect and predict outcomes, and illustrate the benefits of big data analytics through five effective new pathways that could be adopted to promote patients' health, enhance medicine, reduce cost and improve healthcare value and quality. We cover some big data solutions in healthcare and we shed light on implementations, such as Electronic Healthcare Record (HER) and Electronic Healthcare Predictive Analytics (e-HPA) in US hospitals. Furthermore, we complete the picture by highlighting some challenges that big data analytics faces in healthcare.
如今,移动电话、传感器、患者、医院、研究人员、供应商和组织正在产生大量的医疗保健数据。医疗保健系统的真正挑战是如何发现、收集、分析和管理信息,使人们的生活更健康、更轻松,不仅有助于了解新的疾病和治疗方法,还有助于在早期阶段预测结果并做出实时决策。在本文中,我们解释了大数据对医疗保健的潜在好处,并探讨了它如何改善治疗并赋予患者、提供者和研究人员权力。我们还描述了现实挖掘在收集大量数据以了解人们的习惯、检测和预测结果方面的能力,并通过五种有效的新途径说明了大数据分析的好处,这些途径可用于促进患者健康、增强药物、降低成本和提高医疗保健价值和质量。我们介绍了医疗保健中的一些大数据解决方案,并介绍了实施情况,例如美国医院的电子医疗记录(HER)和电子医疗预测分析(e-HPA)。此外,我们通过强调大数据分析在医疗保健领域面临的一些挑战来完成这一图景。
{"title":"Big data in healthcare: Challenges and opportunities","authors":"Hiba Asri, H. Mousannif, H. Al Moatassime, T. Noel","doi":"10.1109/CLOUDTECH.2015.7337020","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337020","url":null,"abstract":"Mobile phones, sensors, patients, hospitals, researchers, providers and organizations are nowadays, generating huge amounts of healthcare data. The real challenge in healthcare systems is how to find, collect, analyze and manage information to make people's lives healthier and easier, by contributing not only to understand new diseases and therapies but also to predict outcomes at earlier stages and make real-time decisions. In this paper, we explain the potential benefits of big data to healthcare and explore how it improves treatment and empowers patients, providers and researchers. We also describe the ability of reality mining in collecting large amounts of data to understand people's habits, detect and predict outcomes, and illustrate the benefits of big data analytics through five effective new pathways that could be adopted to promote patients' health, enhance medicine, reduce cost and improve healthcare value and quality. We cover some big data solutions in healthcare and we shed light on implementations, such as Electronic Healthcare Record (HER) and Electronic Healthcare Predictive Analytics (e-HPA) in US hospitals. Furthermore, we complete the picture by highlighting some challenges that big data analytics faces in healthcare.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"388 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133847586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
A multi-criteria analysis of intrusion detection architectures in cloud environments 云环境下入侵检测体系结构的多准则分析
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336967
M. Zbakh, Khalil Elmahdi, R. Cherkaoui, Saad Enniari
Cloud computing promises to increase innovation and the velocity with which applications are deployed all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantage of those opportunities while minimizing risks, we argue that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed in 1980s. Since that time IDSs are evolving. However, even several efforts have been made in the area of Intrusion Detection Systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi-criteria analysis and a comparative study between several IDS architectures designed to work in cloud computing environments. To achieve this objective, in the first place we will search in the state of the art for several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi-criteria decision analysis MacBeth (Measuring Attractiveness by a Categorical Based Evaluation Technique) we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.
云计算承诺增加创新和应用程序部署的速度,同时帮助任何企业以更低的总拥有成本和更高的投资回报满足大多数IT服务需求。随着云计算的发展,它带来了新的机遇和新的安全挑战。为了充分利用这些机会,同时将风险降到最低,我们认为集成在云中的入侵检测系统(IDS)是当今该领域现有的最佳解决方案之一。入侵检测的概念由来已久,最早于20世纪80年代提出。从那时起,ids就在不断发展。然而,尽管在针对云计算环境的入侵检测系统领域做出了一些努力,许多攻击仍然盛行。因此,本文提出了一种多标准分析和设计用于云计算环境的几种IDS体系结构之间的比较研究。为了实现这一目标,首先,我们将在最新的技术中寻找用于在云环境中工作的几种一致的IDS体系结构。然而,在第二步中,我们将建立对体系结构评估有用的标准。随后,使用多标准决策分析麦克白(衡量吸引力的分类基于评估技术)的方法,我们将评估标准,并根据其在云计算IDS架构领域的重要性为每个标准分配适当的权重。最后一步是根据标准评估体系结构,并收集在前面步骤中构造的模型的结果。
{"title":"A multi-criteria analysis of intrusion detection architectures in cloud environments","authors":"M. Zbakh, Khalil Elmahdi, R. Cherkaoui, Saad Enniari","doi":"10.1109/CLOUDTECH.2015.7336967","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336967","url":null,"abstract":"Cloud computing promises to increase innovation and the velocity with which applications are deployed all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantage of those opportunities while minimizing risks, we argue that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed in 1980s. Since that time IDSs are evolving. However, even several efforts have been made in the area of Intrusion Detection Systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi-criteria analysis and a comparative study between several IDS architectures designed to work in cloud computing environments. To achieve this objective, in the first place we will search in the state of the art for several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi-criteria decision analysis MacBeth (Measuring Attractiveness by a Categorical Based Evaluation Technique) we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114306530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security on RFID technology RFID技术的安全性
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336997
Nabil Kannouf, Youssef Douzi, M. Benabdellah, A. Azizi
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Latest technologies have brought costs down and standards are being developed. Actually, RFID is mostly used as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, and supporting automated checkout. The use of RFID is limited by security concerns and delays in standardization. This paper presents some research done on RFID, the RFID applications and RFID data security.
RFID(无线射频识别)系统由于其低成本和广泛的适用性,正在成为历史上最普及的计算技术之一。最新的技术降低了成本,标准正在制定中。实际上,RFID主要用作许多任务的媒介,包括管理供应链、跟踪牲畜、防止假冒、控制建筑物访问和支持自动结账。RFID的使用受到安全问题和标准化延迟的限制。本文介绍了RFID、RFID应用和RFID数据安全方面的研究进展。
{"title":"Security on RFID technology","authors":"Nabil Kannouf, Youssef Douzi, M. Benabdellah, A. Azizi","doi":"10.1109/CLOUDTECH.2015.7336997","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336997","url":null,"abstract":"RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Latest technologies have brought costs down and standards are being developed. Actually, RFID is mostly used as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, and supporting automated checkout. The use of RFID is limited by security concerns and delays in standardization. This paper presents some research done on RFID, the RFID applications and RFID data security.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124628350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Some tools of QSAR/QSPR and drug development: Wiener and Terminal Wiener indices QSAR/QSPR和药物开发的一些工具:Wiener和终端Wiener指数
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336963
Meryam Zeryouh, M. El Marraki, M. Essalih
Result of the increases in the size of molecular databases, big-data becomes a very important field of research in the discovery of a new drug. To predict chemical and biological properties of novel molecules based on their structural representations, the QSAR/QSPR models have been build. The Qualitative Structure Activity (resp. property) Relationships are based on the search for a relationship between a set of real numbers, molecular descriptors, and the property or activity that we want to predict. In this paper we recall the principle of QSAR/QSPR models, we discus a kind of molecular descriptors called topological indices, that is calculated from a graph representing a molecule. Then we give some results concerning the calculation of the Terminal Wiener index of some molecular graphs, and in the end we give an application for calculating the Terminal Wiener index of dendrimer graph.
由于分子数据库规模的增加,大数据成为新药发现的一个非常重要的研究领域。为了根据新分子的结构表征来预测其化学和生物学特性,我们建立了QSAR/QSPR模型。定性结构活动(参见。关系是基于对一组实数、分子描述符和我们想要预测的性质或活动之间的关系的搜索。本文回顾了QSAR/QSPR模型的基本原理,讨论了一种分子描述符——拓扑指标,它是由表示分子的图计算得到的。然后给出了一些分子图的终端维纳指数的计算结果,最后给出了计算树突图终端维纳指数的一个应用。
{"title":"Some tools of QSAR/QSPR and drug development: Wiener and Terminal Wiener indices","authors":"Meryam Zeryouh, M. El Marraki, M. Essalih","doi":"10.1109/CLOUDTECH.2015.7336963","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336963","url":null,"abstract":"Result of the increases in the size of molecular databases, big-data becomes a very important field of research in the discovery of a new drug. To predict chemical and biological properties of novel molecules based on their structural representations, the QSAR/QSPR models have been build. The Qualitative Structure Activity (resp. property) Relationships are based on the search for a relationship between a set of real numbers, molecular descriptors, and the property or activity that we want to predict. In this paper we recall the principle of QSAR/QSPR models, we discus a kind of molecular descriptors called topological indices, that is calculated from a graph representing a molecule. Then we give some results concerning the calculation of the Terminal Wiener index of some molecular graphs, and in the end we give an application for calculating the Terminal Wiener index of dendrimer graph.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130462627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach for privacy policies negotiation in mobile health-Cloud environments 移动医疗云环境中的隐私策略协商方法
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336983
Souad Sadki, Hanan El Bakkali
Mobile technologies continue to improve patients' quality of care. Particularly, with the emergence of Cloud-based mobile services and applications, patients can easily communicate with their physicians and receive the care they deserve. However, due to the increased number of privacy threats in mobile and Cloud computing environments, maximizing patients' control over their data becomes a necessity. Thus, formal languages to express their privacy preferences are needed. Besides, because of the diversity of actors involved in patient's care, conflict among privacy policies can take place. In this paper, we present an approach that aims to resolve the problem of conflicting privacy policies based on a Security Policy Negotiation Framework. The major particularity of our solution is that it considers the patient to be a crucial actor in the negotiation process. The different steps of our approach are illustrated through an example of three conflicting privacy policies with different privacy languages.
移动技术不断提高患者的护理质量。特别是,随着基于云的移动服务和应用程序的出现,患者可以轻松地与医生沟通,并获得他们应得的护理。然而,由于移动和云计算环境中隐私威胁的增加,最大限度地提高患者对其数据的控制成为必要。因此,需要形式语言来表达他们的隐私偏好。此外,由于参与患者护理的行为者的多样性,隐私政策之间可能会发生冲突。在本文中,我们提出了一种基于安全策略协商框架的方法,旨在解决隐私策略冲突问题。我们的解决办法的主要特点是,它认为病人是谈判进程中的一个关键角色。通过一个使用不同隐私语言的三个相互冲突的隐私策略的示例来说明我们方法的不同步骤。
{"title":"An approach for privacy policies negotiation in mobile health-Cloud environments","authors":"Souad Sadki, Hanan El Bakkali","doi":"10.1109/CLOUDTECH.2015.7336983","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336983","url":null,"abstract":"Mobile technologies continue to improve patients' quality of care. Particularly, with the emergence of Cloud-based mobile services and applications, patients can easily communicate with their physicians and receive the care they deserve. However, due to the increased number of privacy threats in mobile and Cloud computing environments, maximizing patients' control over their data becomes a necessity. Thus, formal languages to express their privacy preferences are needed. Besides, because of the diversity of actors involved in patient's care, conflict among privacy policies can take place. In this paper, we present an approach that aims to resolve the problem of conflicting privacy policies based on a Security Policy Negotiation Framework. The major particularity of our solution is that it considers the patient to be a crucial actor in the negotiation process. The different steps of our approach are illustrated through an example of three conflicting privacy policies with different privacy languages.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129156975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
How can we design a cost-effective model that ensures a high level of data integrity protection? 我们如何设计一个经济有效的模型来确保高水平的数据完整性保护?
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336973
Alouane Nour-Eddine, Abouchabaka Jaafar, R. Najat
Everyone agree that data is more secured locally than when it is outsourced far away from their owners. But the growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solutions, but at the expense of security. So designing a lightweight system that can achieve a balance between cost and data security is really important. Several schemes and techniques has been proposed for securing, checking and repairing data, but unfortunately the majority doesn't respect and preserve the cost efficiency and profitability of cloud offers. In this paper we try to answer the question: how can we design a model that enables a high level of integrity check while preserving a minimum cost? We try also to analyze a new threat model regards the tracking of a file's fragments during a repair or a download operation, which can cause the total loss of customers data. The solution given in this paper is based on redistributing fragments locations after every data operation using a set of random values generated by a chaotic map. Finally, we provide a data loss insurance (data corruption as well) approach based on user estimation of data importance level that helps in reducing user concerns about data loss.
每个人都同意,数据在本地比在远离所有者的地方外包更安全。但是,每年本地数据量的增长意味着客户需要支付额外费用,这使得他们的业务放缓。云计算范式伴随着新技术而来,这些技术提供了非常经济和经济的解决方案,但以牺牲安全性为代价。所以设计一个轻量级的系统,在成本和数据安全之间取得平衡是非常重要的。已经提出了几种方案和技术来保护、检查和修复数据,但不幸的是,大多数方案和技术都不尊重和保留云提供的成本效率和盈利能力。在本文中,我们试图回答这样一个问题:我们如何设计一个模型,在保持最低成本的同时实现高水平的完整性检查?我们还试图分析一种新的威胁模型,即在修复或下载操作期间跟踪文件的碎片,这可能导致客户数据的全部丢失。本文给出的解决方案是利用混沌映射生成的一组随机值,在每次数据操作后重新分配碎片位置。最后,我们提供了一种基于用户对数据重要性级别的估计的数据丢失保险(数据损坏)方法,有助于减少用户对数据丢失的担忧。
{"title":"How can we design a cost-effective model that ensures a high level of data integrity protection?","authors":"Alouane Nour-Eddine, Abouchabaka Jaafar, R. Najat","doi":"10.1109/CLOUDTECH.2015.7336973","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336973","url":null,"abstract":"Everyone agree that data is more secured locally than when it is outsourced far away from their owners. But the growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solutions, but at the expense of security. So designing a lightweight system that can achieve a balance between cost and data security is really important. Several schemes and techniques has been proposed for securing, checking and repairing data, but unfortunately the majority doesn't respect and preserve the cost efficiency and profitability of cloud offers. In this paper we try to answer the question: how can we design a model that enables a high level of integrity check while preserving a minimum cost? We try also to analyze a new threat model regards the tracking of a file's fragments during a repair or a download operation, which can cause the total loss of customers data. The solution given in this paper is based on redistributing fragments locations after every data operation using a set of random values generated by a chaotic map. Finally, we provide a data loss insurance (data corruption as well) approach based on user estimation of data importance level that helps in reducing user concerns about data loss.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secured load balancing architecture for cloud computing based on multiple clusters 基于多集群的云计算安全负载均衡架构
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336978
Mohamed Belkhouraf, A. Kartit, H. Ouahmane, H. K. Idrissi, Z. Kartit, M. El Marraki
Cloud computing is one of the new and very promising trends in the IT technology field, it is subject to a lot of research and continuous advances are made. Its main objectives are to deliver different services for users, such as infrastructure, platform or software with a reasonable and more and more decreasing cost for the clients. To achieve those goals, some matters have to be addressed, mainly using the available resources in an effective way in order to improve the overall performance, while taking into consideration the security and the availability sides of the cloud. Hence, one of the most studied aspects by researchers is load balancing in cloud computing, especially for the big distributed cloud systems that deal with many clients and big amounts of data and requests. In this paper, we address the subject of load balancing in cloud computing and present a semi centralized and multi cluster architecture. This proposed approach mainly ensures a better overall performance with efficient load balancing, the continuous availability and a security aspect.
云计算是IT技术领域中一个非常有前途的新趋势,它受到了大量的研究并不断取得进展。它的主要目标是为用户提供不同的服务,如基础设施、平台或软件,为客户提供合理且越来越低的成本。为了实现这些目标,必须解决一些问题,主要是以有效的方式使用可用资源以提高整体性能,同时考虑云的安全性和可用性方面。因此,研究人员研究最多的方面之一是云计算中的负载平衡,特别是对于处理许多客户端和大量数据和请求的大型分布式云系统。在本文中,我们讨论了云计算中的负载平衡问题,并提出了一种半集中式多集群架构。该方法主要通过有效的负载平衡、持续可用性和安全性来确保更好的整体性能。
{"title":"A secured load balancing architecture for cloud computing based on multiple clusters","authors":"Mohamed Belkhouraf, A. Kartit, H. Ouahmane, H. K. Idrissi, Z. Kartit, M. El Marraki","doi":"10.1109/CLOUDTECH.2015.7336978","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336978","url":null,"abstract":"Cloud computing is one of the new and very promising trends in the IT technology field, it is subject to a lot of research and continuous advances are made. Its main objectives are to deliver different services for users, such as infrastructure, platform or software with a reasonable and more and more decreasing cost for the clients. To achieve those goals, some matters have to be addressed, mainly using the available resources in an effective way in order to improve the overall performance, while taking into consideration the security and the availability sides of the cloud. Hence, one of the most studied aspects by researchers is load balancing in cloud computing, especially for the big distributed cloud systems that deal with many clients and big amounts of data and requests. In this paper, we address the subject of load balancing in cloud computing and present a semi centralized and multi cluster architecture. This proposed approach mainly ensures a better overall performance with efficient load balancing, the continuous availability and a security aspect.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132977154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
An adaptive anonymous authentication for cloud environment 云环境下的自适应匿名身份验证
Pub Date : 2015-04-28 DOI: 10.1109/CLOUDTECH.2015.7337010
Amina Djellalbia, S. Benmeziane, N. Badache, Sihem Bensimessaoud
Preserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user's usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud provider to learn which resources they access and how often they use a service by making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy through an anonymous authentication scheme.
保护身份隐私是云服务安全性面临的重大挑战。实际上,采用云服务的一个重要障碍是用户担心在云中丢失隐私。从隐私的角度来看,一个有趣的问题是隐藏用户的使用行为或元信息,其中包括访问服务时的访问模式和频率。用户可能不希望云提供商通过匿名来了解他们访问的资源以及他们使用服务的频率。在本文中,我们将提出一种自适应和灵活的方法,通过匿名认证方案来保护身份隐私。
{"title":"An adaptive anonymous authentication for cloud environment","authors":"Amina Djellalbia, S. Benmeziane, N. Badache, Sihem Bensimessaoud","doi":"10.1109/CLOUDTECH.2015.7337010","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337010","url":null,"abstract":"Preserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user's usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud provider to learn which resources they access and how often they use a service by making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy through an anonymous authentication scheme.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"508 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133532028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 International Conference on Cloud Technologies and Applications (CloudTech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1