首页 > 最新文献

2015 International Conference on Cloud Technologies and Applications (CloudTech)最新文献

英文 中文
Big data in healthcare: Challenges and opportunities 医疗保健中的大数据:挑战与机遇
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337020
Hiba Asri, H. Mousannif, H. Al Moatassime, T. Noel
Mobile phones, sensors, patients, hospitals, researchers, providers and organizations are nowadays, generating huge amounts of healthcare data. The real challenge in healthcare systems is how to find, collect, analyze and manage information to make people's lives healthier and easier, by contributing not only to understand new diseases and therapies but also to predict outcomes at earlier stages and make real-time decisions. In this paper, we explain the potential benefits of big data to healthcare and explore how it improves treatment and empowers patients, providers and researchers. We also describe the ability of reality mining in collecting large amounts of data to understand people's habits, detect and predict outcomes, and illustrate the benefits of big data analytics through five effective new pathways that could be adopted to promote patients' health, enhance medicine, reduce cost and improve healthcare value and quality. We cover some big data solutions in healthcare and we shed light on implementations, such as Electronic Healthcare Record (HER) and Electronic Healthcare Predictive Analytics (e-HPA) in US hospitals. Furthermore, we complete the picture by highlighting some challenges that big data analytics faces in healthcare.
如今,移动电话、传感器、患者、医院、研究人员、供应商和组织正在产生大量的医疗保健数据。医疗保健系统的真正挑战是如何发现、收集、分析和管理信息,使人们的生活更健康、更轻松,不仅有助于了解新的疾病和治疗方法,还有助于在早期阶段预测结果并做出实时决策。在本文中,我们解释了大数据对医疗保健的潜在好处,并探讨了它如何改善治疗并赋予患者、提供者和研究人员权力。我们还描述了现实挖掘在收集大量数据以了解人们的习惯、检测和预测结果方面的能力,并通过五种有效的新途径说明了大数据分析的好处,这些途径可用于促进患者健康、增强药物、降低成本和提高医疗保健价值和质量。我们介绍了医疗保健中的一些大数据解决方案,并介绍了实施情况,例如美国医院的电子医疗记录(HER)和电子医疗预测分析(e-HPA)。此外,我们通过强调大数据分析在医疗保健领域面临的一些挑战来完成这一图景。
{"title":"Big data in healthcare: Challenges and opportunities","authors":"Hiba Asri, H. Mousannif, H. Al Moatassime, T. Noel","doi":"10.1109/CLOUDTECH.2015.7337020","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337020","url":null,"abstract":"Mobile phones, sensors, patients, hospitals, researchers, providers and organizations are nowadays, generating huge amounts of healthcare data. The real challenge in healthcare systems is how to find, collect, analyze and manage information to make people's lives healthier and easier, by contributing not only to understand new diseases and therapies but also to predict outcomes at earlier stages and make real-time decisions. In this paper, we explain the potential benefits of big data to healthcare and explore how it improves treatment and empowers patients, providers and researchers. We also describe the ability of reality mining in collecting large amounts of data to understand people's habits, detect and predict outcomes, and illustrate the benefits of big data analytics through five effective new pathways that could be adopted to promote patients' health, enhance medicine, reduce cost and improve healthcare value and quality. We cover some big data solutions in healthcare and we shed light on implementations, such as Electronic Healthcare Record (HER) and Electronic Healthcare Predictive Analytics (e-HPA) in US hospitals. Furthermore, we complete the picture by highlighting some challenges that big data analytics faces in healthcare.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"388 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133847586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
An ontology-based guidance for privacy enforcement in a multi-authority cloud environment 用于在多权威云环境中实施隐私的基于本体的指南
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337015
Maherzia Belaazi, H. B. Rahmouni, A. Bouhoula
Despite its attractive benefits, cloud adoption is challenged by some criteria of security and privacy. Access Control is one of the traditional and essential security tools of data protection. The decision to grant access to a resource must ensure secure management with a specific attention to privacy and data protection regulations. In particular, the challenge is more important with public clouds as many governing authorities could be involved in one cloud scenario. This implies a difficulty to work out which regulation should be applicable in case of conflict. In recent years, many access control models were proposed. Despite increasing legislative pressure, few of these propositions take care of privacy requirements in their security policies specification and enforcement. In this paper, we propose to enforce privacy compliance in access control policies for the context of public cloud. Throughout the use of ontology tools, we propose an approach for checking privacy enforcement with access control conditions. We also suggest the use of privacy safeguards notification where the threat to privacy protection is related to the secondary usage of personal data more than just the data access itself.
尽管云计算带来了诱人的好处,但它的采用受到了一些安全和隐私标准的挑战。访问控制是数据保护的传统和必不可少的安全工具之一。授予资源访问权限的决定必须确保安全管理,并特别注意隐私和数据保护法规。特别是,公共云的挑战更为重要,因为一个云场景中可能涉及许多管理机构。这意味着很难确定在发生冲突的情况下应适用哪条规定。近年来,提出了许多访问控制模型。尽管立法压力越来越大,但这些提案中很少在其安全策略规范和执行中考虑到隐私要求。在本文中,我们建议在公共云环境下的访问控制策略中强制执行隐私遵从性。在本体工具的使用过程中,我们提出了一种通过访问控制条件检查隐私强制执行的方法。我们还建议使用隐私保障通知,如果对隐私保护的威胁与个人数据的二次使用有关,而不仅仅是数据访问本身。
{"title":"An ontology-based guidance for privacy enforcement in a multi-authority cloud environment","authors":"Maherzia Belaazi, H. B. Rahmouni, A. Bouhoula","doi":"10.1109/CLOUDTECH.2015.7337015","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337015","url":null,"abstract":"Despite its attractive benefits, cloud adoption is challenged by some criteria of security and privacy. Access Control is one of the traditional and essential security tools of data protection. The decision to grant access to a resource must ensure secure management with a specific attention to privacy and data protection regulations. In particular, the challenge is more important with public clouds as many governing authorities could be involved in one cloud scenario. This implies a difficulty to work out which regulation should be applicable in case of conflict. In recent years, many access control models were proposed. Despite increasing legislative pressure, few of these propositions take care of privacy requirements in their security policies specification and enforcement. In this paper, we propose to enforce privacy compliance in access control policies for the context of public cloud. Throughout the use of ontology tools, we propose an approach for checking privacy enforcement with access control conditions. We also suggest the use of privacy safeguards notification where the threat to privacy protection is related to the secondary usage of personal data more than just the data access itself.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134537806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A multi-criteria analysis of intrusion detection architectures in cloud environments 云环境下入侵检测体系结构的多准则分析
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336967
M. Zbakh, Khalil Elmahdi, R. Cherkaoui, Saad Enniari
Cloud computing promises to increase innovation and the velocity with which applications are deployed all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantage of those opportunities while minimizing risks, we argue that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed in 1980s. Since that time IDSs are evolving. However, even several efforts have been made in the area of Intrusion Detection Systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi-criteria analysis and a comparative study between several IDS architectures designed to work in cloud computing environments. To achieve this objective, in the first place we will search in the state of the art for several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi-criteria decision analysis MacBeth (Measuring Attractiveness by a Categorical Based Evaluation Technique) we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.
云计算承诺增加创新和应用程序部署的速度,同时帮助任何企业以更低的总拥有成本和更高的投资回报满足大多数IT服务需求。随着云计算的发展,它带来了新的机遇和新的安全挑战。为了充分利用这些机会,同时将风险降到最低,我们认为集成在云中的入侵检测系统(IDS)是当今该领域现有的最佳解决方案之一。入侵检测的概念由来已久,最早于20世纪80年代提出。从那时起,ids就在不断发展。然而,尽管在针对云计算环境的入侵检测系统领域做出了一些努力,许多攻击仍然盛行。因此,本文提出了一种多标准分析和设计用于云计算环境的几种IDS体系结构之间的比较研究。为了实现这一目标,首先,我们将在最新的技术中寻找用于在云环境中工作的几种一致的IDS体系结构。然而,在第二步中,我们将建立对体系结构评估有用的标准。随后,使用多标准决策分析麦克白(衡量吸引力的分类基于评估技术)的方法,我们将评估标准,并根据其在云计算IDS架构领域的重要性为每个标准分配适当的权重。最后一步是根据标准评估体系结构,并收集在前面步骤中构造的模型的结果。
{"title":"A multi-criteria analysis of intrusion detection architectures in cloud environments","authors":"M. Zbakh, Khalil Elmahdi, R. Cherkaoui, Saad Enniari","doi":"10.1109/CLOUDTECH.2015.7336967","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336967","url":null,"abstract":"Cloud computing promises to increase innovation and the velocity with which applications are deployed all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantage of those opportunities while minimizing risks, we argue that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed in 1980s. Since that time IDSs are evolving. However, even several efforts have been made in the area of Intrusion Detection Systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi-criteria analysis and a comparative study between several IDS architectures designed to work in cloud computing environments. To achieve this objective, in the first place we will search in the state of the art for several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi-criteria decision analysis MacBeth (Measuring Attractiveness by a Categorical Based Evaluation Technique) we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114306530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security on RFID technology RFID技术的安全性
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336997
Nabil Kannouf, Youssef Douzi, M. Benabdellah, A. Azizi
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Latest technologies have brought costs down and standards are being developed. Actually, RFID is mostly used as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, and supporting automated checkout. The use of RFID is limited by security concerns and delays in standardization. This paper presents some research done on RFID, the RFID applications and RFID data security.
RFID(无线射频识别)系统由于其低成本和广泛的适用性,正在成为历史上最普及的计算技术之一。最新的技术降低了成本,标准正在制定中。实际上,RFID主要用作许多任务的媒介,包括管理供应链、跟踪牲畜、防止假冒、控制建筑物访问和支持自动结账。RFID的使用受到安全问题和标准化延迟的限制。本文介绍了RFID、RFID应用和RFID数据安全方面的研究进展。
{"title":"Security on RFID technology","authors":"Nabil Kannouf, Youssef Douzi, M. Benabdellah, A. Azizi","doi":"10.1109/CLOUDTECH.2015.7336997","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336997","url":null,"abstract":"RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Latest technologies have brought costs down and standards are being developed. Actually, RFID is mostly used as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, and supporting automated checkout. The use of RFID is limited by security concerns and delays in standardization. This paper presents some research done on RFID, the RFID applications and RFID data security.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124628350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Some tools of QSAR/QSPR and drug development: Wiener and Terminal Wiener indices QSAR/QSPR和药物开发的一些工具:Wiener和终端Wiener指数
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336963
Meryam Zeryouh, M. El Marraki, M. Essalih
Result of the increases in the size of molecular databases, big-data becomes a very important field of research in the discovery of a new drug. To predict chemical and biological properties of novel molecules based on their structural representations, the QSAR/QSPR models have been build. The Qualitative Structure Activity (resp. property) Relationships are based on the search for a relationship between a set of real numbers, molecular descriptors, and the property or activity that we want to predict. In this paper we recall the principle of QSAR/QSPR models, we discus a kind of molecular descriptors called topological indices, that is calculated from a graph representing a molecule. Then we give some results concerning the calculation of the Terminal Wiener index of some molecular graphs, and in the end we give an application for calculating the Terminal Wiener index of dendrimer graph.
由于分子数据库规模的增加,大数据成为新药发现的一个非常重要的研究领域。为了根据新分子的结构表征来预测其化学和生物学特性,我们建立了QSAR/QSPR模型。定性结构活动(参见。关系是基于对一组实数、分子描述符和我们想要预测的性质或活动之间的关系的搜索。本文回顾了QSAR/QSPR模型的基本原理,讨论了一种分子描述符——拓扑指标,它是由表示分子的图计算得到的。然后给出了一些分子图的终端维纳指数的计算结果,最后给出了计算树突图终端维纳指数的一个应用。
{"title":"Some tools of QSAR/QSPR and drug development: Wiener and Terminal Wiener indices","authors":"Meryam Zeryouh, M. El Marraki, M. Essalih","doi":"10.1109/CLOUDTECH.2015.7336963","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336963","url":null,"abstract":"Result of the increases in the size of molecular databases, big-data becomes a very important field of research in the discovery of a new drug. To predict chemical and biological properties of novel molecules based on their structural representations, the QSAR/QSPR models have been build. The Qualitative Structure Activity (resp. property) Relationships are based on the search for a relationship between a set of real numbers, molecular descriptors, and the property or activity that we want to predict. In this paper we recall the principle of QSAR/QSPR models, we discus a kind of molecular descriptors called topological indices, that is calculated from a graph representing a molecule. Then we give some results concerning the calculation of the Terminal Wiener index of some molecular graphs, and in the end we give an application for calculating the Terminal Wiener index of dendrimer graph.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130462627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach for privacy policies negotiation in mobile health-Cloud environments 移动医疗云环境中的隐私策略协商方法
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336983
Souad Sadki, Hanan El Bakkali
Mobile technologies continue to improve patients' quality of care. Particularly, with the emergence of Cloud-based mobile services and applications, patients can easily communicate with their physicians and receive the care they deserve. However, due to the increased number of privacy threats in mobile and Cloud computing environments, maximizing patients' control over their data becomes a necessity. Thus, formal languages to express their privacy preferences are needed. Besides, because of the diversity of actors involved in patient's care, conflict among privacy policies can take place. In this paper, we present an approach that aims to resolve the problem of conflicting privacy policies based on a Security Policy Negotiation Framework. The major particularity of our solution is that it considers the patient to be a crucial actor in the negotiation process. The different steps of our approach are illustrated through an example of three conflicting privacy policies with different privacy languages.
移动技术不断提高患者的护理质量。特别是,随着基于云的移动服务和应用程序的出现,患者可以轻松地与医生沟通,并获得他们应得的护理。然而,由于移动和云计算环境中隐私威胁的增加,最大限度地提高患者对其数据的控制成为必要。因此,需要形式语言来表达他们的隐私偏好。此外,由于参与患者护理的行为者的多样性,隐私政策之间可能会发生冲突。在本文中,我们提出了一种基于安全策略协商框架的方法,旨在解决隐私策略冲突问题。我们的解决办法的主要特点是,它认为病人是谈判进程中的一个关键角色。通过一个使用不同隐私语言的三个相互冲突的隐私策略的示例来说明我们方法的不同步骤。
{"title":"An approach for privacy policies negotiation in mobile health-Cloud environments","authors":"Souad Sadki, Hanan El Bakkali","doi":"10.1109/CLOUDTECH.2015.7336983","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336983","url":null,"abstract":"Mobile technologies continue to improve patients' quality of care. Particularly, with the emergence of Cloud-based mobile services and applications, patients can easily communicate with their physicians and receive the care they deserve. However, due to the increased number of privacy threats in mobile and Cloud computing environments, maximizing patients' control over their data becomes a necessity. Thus, formal languages to express their privacy preferences are needed. Besides, because of the diversity of actors involved in patient's care, conflict among privacy policies can take place. In this paper, we present an approach that aims to resolve the problem of conflicting privacy policies based on a Security Policy Negotiation Framework. The major particularity of our solution is that it considers the patient to be a crucial actor in the negotiation process. The different steps of our approach are illustrated through an example of three conflicting privacy policies with different privacy languages.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129156975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
How can we design a cost-effective model that ensures a high level of data integrity protection? 我们如何设计一个经济有效的模型来确保高水平的数据完整性保护?
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336973
Alouane Nour-Eddine, Abouchabaka Jaafar, R. Najat
Everyone agree that data is more secured locally than when it is outsourced far away from their owners. But the growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solutions, but at the expense of security. So designing a lightweight system that can achieve a balance between cost and data security is really important. Several schemes and techniques has been proposed for securing, checking and repairing data, but unfortunately the majority doesn't respect and preserve the cost efficiency and profitability of cloud offers. In this paper we try to answer the question: how can we design a model that enables a high level of integrity check while preserving a minimum cost? We try also to analyze a new threat model regards the tracking of a file's fragments during a repair or a download operation, which can cause the total loss of customers data. The solution given in this paper is based on redistributing fragments locations after every data operation using a set of random values generated by a chaotic map. Finally, we provide a data loss insurance (data corruption as well) approach based on user estimation of data importance level that helps in reducing user concerns about data loss.
每个人都同意,数据在本地比在远离所有者的地方外包更安全。但是,每年本地数据量的增长意味着客户需要支付额外费用,这使得他们的业务放缓。云计算范式伴随着新技术而来,这些技术提供了非常经济和经济的解决方案,但以牺牲安全性为代价。所以设计一个轻量级的系统,在成本和数据安全之间取得平衡是非常重要的。已经提出了几种方案和技术来保护、检查和修复数据,但不幸的是,大多数方案和技术都不尊重和保留云提供的成本效率和盈利能力。在本文中,我们试图回答这样一个问题:我们如何设计一个模型,在保持最低成本的同时实现高水平的完整性检查?我们还试图分析一种新的威胁模型,即在修复或下载操作期间跟踪文件的碎片,这可能导致客户数据的全部丢失。本文给出的解决方案是利用混沌映射生成的一组随机值,在每次数据操作后重新分配碎片位置。最后,我们提供了一种基于用户对数据重要性级别的估计的数据丢失保险(数据损坏)方法,有助于减少用户对数据丢失的担忧。
{"title":"How can we design a cost-effective model that ensures a high level of data integrity protection?","authors":"Alouane Nour-Eddine, Abouchabaka Jaafar, R. Najat","doi":"10.1109/CLOUDTECH.2015.7336973","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336973","url":null,"abstract":"Everyone agree that data is more secured locally than when it is outsourced far away from their owners. But the growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solutions, but at the expense of security. So designing a lightweight system that can achieve a balance between cost and data security is really important. Several schemes and techniques has been proposed for securing, checking and repairing data, but unfortunately the majority doesn't respect and preserve the cost efficiency and profitability of cloud offers. In this paper we try to answer the question: how can we design a model that enables a high level of integrity check while preserving a minimum cost? We try also to analyze a new threat model regards the tracking of a file's fragments during a repair or a download operation, which can cause the total loss of customers data. The solution given in this paper is based on redistributing fragments locations after every data operation using a set of random values generated by a chaotic map. Finally, we provide a data loss insurance (data corruption as well) approach based on user estimation of data importance level that helps in reducing user concerns about data loss.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secured load balancing architecture for cloud computing based on multiple clusters 基于多集群的云计算安全负载均衡架构
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336978
Mohamed Belkhouraf, A. Kartit, H. Ouahmane, H. K. Idrissi, Z. Kartit, M. El Marraki
Cloud computing is one of the new and very promising trends in the IT technology field, it is subject to a lot of research and continuous advances are made. Its main objectives are to deliver different services for users, such as infrastructure, platform or software with a reasonable and more and more decreasing cost for the clients. To achieve those goals, some matters have to be addressed, mainly using the available resources in an effective way in order to improve the overall performance, while taking into consideration the security and the availability sides of the cloud. Hence, one of the most studied aspects by researchers is load balancing in cloud computing, especially for the big distributed cloud systems that deal with many clients and big amounts of data and requests. In this paper, we address the subject of load balancing in cloud computing and present a semi centralized and multi cluster architecture. This proposed approach mainly ensures a better overall performance with efficient load balancing, the continuous availability and a security aspect.
云计算是IT技术领域中一个非常有前途的新趋势,它受到了大量的研究并不断取得进展。它的主要目标是为用户提供不同的服务,如基础设施、平台或软件,为客户提供合理且越来越低的成本。为了实现这些目标,必须解决一些问题,主要是以有效的方式使用可用资源以提高整体性能,同时考虑云的安全性和可用性方面。因此,研究人员研究最多的方面之一是云计算中的负载平衡,特别是对于处理许多客户端和大量数据和请求的大型分布式云系统。在本文中,我们讨论了云计算中的负载平衡问题,并提出了一种半集中式多集群架构。该方法主要通过有效的负载平衡、持续可用性和安全性来确保更好的整体性能。
{"title":"A secured load balancing architecture for cloud computing based on multiple clusters","authors":"Mohamed Belkhouraf, A. Kartit, H. Ouahmane, H. K. Idrissi, Z. Kartit, M. El Marraki","doi":"10.1109/CLOUDTECH.2015.7336978","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336978","url":null,"abstract":"Cloud computing is one of the new and very promising trends in the IT technology field, it is subject to a lot of research and continuous advances are made. Its main objectives are to deliver different services for users, such as infrastructure, platform or software with a reasonable and more and more decreasing cost for the clients. To achieve those goals, some matters have to be addressed, mainly using the available resources in an effective way in order to improve the overall performance, while taking into consideration the security and the availability sides of the cloud. Hence, one of the most studied aspects by researchers is load balancing in cloud computing, especially for the big distributed cloud systems that deal with many clients and big amounts of data and requests. In this paper, we address the subject of load balancing in cloud computing and present a semi centralized and multi cluster architecture. This proposed approach mainly ensures a better overall performance with efficient load balancing, the continuous availability and a security aspect.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132977154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
An adaptive anonymous authentication for cloud environment 云环境下的自适应匿名身份验证
Pub Date : 2015-04-28 DOI: 10.1109/CLOUDTECH.2015.7337010
Amina Djellalbia, S. Benmeziane, N. Badache, Sihem Bensimessaoud
Preserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user's usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud provider to learn which resources they access and how often they use a service by making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy through an anonymous authentication scheme.
保护身份隐私是云服务安全性面临的重大挑战。实际上,采用云服务的一个重要障碍是用户担心在云中丢失隐私。从隐私的角度来看,一个有趣的问题是隐藏用户的使用行为或元信息,其中包括访问服务时的访问模式和频率。用户可能不希望云提供商通过匿名来了解他们访问的资源以及他们使用服务的频率。在本文中,我们将提出一种自适应和灵活的方法,通过匿名认证方案来保护身份隐私。
{"title":"An adaptive anonymous authentication for cloud environment","authors":"Amina Djellalbia, S. Benmeziane, N. Badache, Sihem Bensimessaoud","doi":"10.1109/CLOUDTECH.2015.7337010","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337010","url":null,"abstract":"Preserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user's usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud provider to learn which resources they access and how often they use a service by making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy through an anonymous authentication scheme.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"508 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133532028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 International Conference on Cloud Technologies and Applications (CloudTech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1