首页 > 最新文献

2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)最新文献

英文 中文
Dog ORAM: A Distributed and Shared Oblivious RAM Model with Server Side Computation Dog ORAM:一个具有服务器端计算的分布式共享遗忘内存模型
Alexandre Pujol, Christina Thorpe
Outsourcing to the Cloud is becoming an attractive option for many organisations dealing with large amounts of data. However, there is still a reluctance amongst companies dealing with highly regulated data because traditional Cloud storage does not support the level of privacy required to prevent access pattern leakage. Oblivious Random Access Machines (ORAM) have been a hot topic of research over the past number of years, proposing various cryptographic techniques to obtain the privacy levels required. We propose a new model, Dog ORAM - a distributed and shared oblivious RAM model with server side computation, that merges several models existing in the literature and includes a new method of access right management for multi-party data access. To achieve this, we use an additive homomorphic encryption scheme and a chameleon signature.
对于许多处理大量数据的组织来说,外包到云正在成为一个有吸引力的选择。然而,处理高度监管的数据的公司仍然不愿意这样做,因为传统的云存储不支持防止访问模式泄漏所需的隐私级别。在过去的几年里,遗忘随机存取机(ORAM)一直是研究的热点,提出了各种加密技术来获得所需的隐私级别。我们提出了一个新的模型,Dog ORAM——一个具有服务器端计算的分布式共享遗忘内存模型,该模型融合了已有的几种模型,并包含了一种用于多方数据访问的访问权限管理的新方法。为了实现这一点,我们使用了一个加性同态加密方案和一个变色龙签名。
{"title":"Dog ORAM: A Distributed and Shared Oblivious RAM Model with Server Side Computation","authors":"Alexandre Pujol, Christina Thorpe","doi":"10.1109/UCC.2015.109","DOIUrl":"https://doi.org/10.1109/UCC.2015.109","url":null,"abstract":"Outsourcing to the Cloud is becoming an attractive option for many organisations dealing with large amounts of data. However, there is still a reluctance amongst companies dealing with highly regulated data because traditional Cloud storage does not support the level of privacy required to prevent access pattern leakage. Oblivious Random Access Machines (ORAM) have been a hot topic of research over the past number of years, proposing various cryptographic techniques to obtain the privacy levels required. We propose a new model, Dog ORAM - a distributed and shared oblivious RAM model with server side computation, that merges several models existing in the literature and includes a new method of access right management for multi-party data access. To achieve this, we use an additive homomorphic encryption scheme and a chameleon signature.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Securing Cryptographic Keys in the IaaS Cloud Model 在IaaS云模型中保护加密密钥
Bushra AlBelooshi, K. Salah, T. Martin, E. Damiani
Infrastructure-as-a-Service (IaaS) is a widespread cloud computing provisioning model where ICT infrastructure, including servers, storage and networking, is supplied on-demand, in a pay-as-you-go fashion. IaaS cloud providers give their clients virtual machines (VMs) that are controlled by cloud administrators who can run, stop, restore and migrate the VMs. A typical threat to IaaS is unauthorized access of untrustworthy administrators to cloud users' sensitive information residing in VMs' memory. In this paper we focus on the threat of users' cryptographic keys being stolen from the RAM of the VM they provision. We propose a decrypt-scatter/gather-decrypt technique that allows users to carry our encryption/decryption while protecting keys from unauthorized peeks on the part of cloud administrators. Our technique does not require modification to the current cloud architecture, but only the availability of a Trusted Platform Module (TPM) capable of creating and holding a TPM-protected public/private key pair. It lends itself to security-as-a-service scenarios where third parties perform encryption/decryption on behalf of data owners.
基础设施即服务(IaaS)是一种广泛的云计算供应模式,其中ICT基础设施(包括服务器、存储和网络)以按需付费的方式按需提供。IaaS云提供商为其客户提供由云管理员控制的虚拟机(vm),这些管理员可以运行、停止、恢复和迁移虚拟机。IaaS面临的一个典型威胁是,不可信的管理员未经授权访问云用户在虚拟机内存中的敏感信息。在本文中,我们主要研究用户的加密密钥从他们提供的VM的RAM中被盗的威胁。我们提出了一种解密-分散/收集-解密技术,允许用户携带我们的加密/解密,同时保护密钥不被云管理员未经授权的窥视。我们的技术不需要修改当前的云架构,只需要一个可信平台模块(TPM)的可用性,该模块能够创建和保存受TPM保护的公钥/私钥对。它适合于第三方代表数据所有者执行加密/解密的安全即服务场景。
{"title":"Securing Cryptographic Keys in the IaaS Cloud Model","authors":"Bushra AlBelooshi, K. Salah, T. Martin, E. Damiani","doi":"10.1109/UCC.2015.64","DOIUrl":"https://doi.org/10.1109/UCC.2015.64","url":null,"abstract":"Infrastructure-as-a-Service (IaaS) is a widespread cloud computing provisioning model where ICT infrastructure, including servers, storage and networking, is supplied on-demand, in a pay-as-you-go fashion. IaaS cloud providers give their clients virtual machines (VMs) that are controlled by cloud administrators who can run, stop, restore and migrate the VMs. A typical threat to IaaS is unauthorized access of untrustworthy administrators to cloud users' sensitive information residing in VMs' memory. In this paper we focus on the threat of users' cryptographic keys being stolen from the RAM of the VM they provision. We propose a decrypt-scatter/gather-decrypt technique that allows users to carry our encryption/decryption while protecting keys from unauthorized peeks on the part of cloud administrators. Our technique does not require modification to the current cloud architecture, but only the availability of a Trusted Platform Module (TPM) capable of creating and holding a TPM-protected public/private key pair. It lends itself to security-as-a-service scenarios where third parties perform encryption/decryption on behalf of data owners.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Controlling the Katz-Bonacich Centrality in Social Network: Application to Gossip in Online Social Networks 控制社交网络中的Katz-Bonacich中心性:在线社交网络中的八卦应用
Alexandre Reiffers, E. Altman, Y. Hayel
Recent papers studied the control of spectral centrality measures of a network by manipulating the topology of the network. We extend these works by focusing on a specific spectral centrality measure, the Katz-Bonacich centrality. The optimization of the Katz-Bonacich centrality using a topological control is called the Katz-Bonacich optimization problem. We first prove that this problem is equivalent to a linear optimization problem. Thus, in the context of large graphs, we can use state of the art algorithms. We provide a specific applications of the Katz-Bonacich centrality minimization problem based on the minimization of gossip propagation and make some experiments on real networks.
最近的论文研究了通过操纵网络的拓扑结构来控制网络的频谱中心性度量。我们通过专注于一个特定的光谱中心性度量,即卡茨-博纳奇中心性来扩展这些工作。利用拓扑控制对Katz-Bonacich中心性进行优化称为Katz-Bonacich优化问题。首先证明了该问题等价于一个线性优化问题。因此,在大型图的背景下,我们可以使用最先进的算法。给出了基于最小化八卦传播的卡兹-波那契中心性最小化问题的一个具体应用,并在实际网络上进行了一些实验。
{"title":"Controlling the Katz-Bonacich Centrality in Social Network: Application to Gossip in Online Social Networks","authors":"Alexandre Reiffers, E. Altman, Y. Hayel","doi":"10.1109/UCC.2015.79","DOIUrl":"https://doi.org/10.1109/UCC.2015.79","url":null,"abstract":"Recent papers studied the control of spectral centrality measures of a network by manipulating the topology of the network. We extend these works by focusing on a specific spectral centrality measure, the Katz-Bonacich centrality. The optimization of the Katz-Bonacich centrality using a topological control is called the Katz-Bonacich optimization problem. We first prove that this problem is equivalent to a linear optimization problem. Thus, in the context of large graphs, we can use state of the art algorithms. We provide a specific applications of the Katz-Bonacich centrality minimization problem based on the minimization of gossip propagation and make some experiments on real networks.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experiences in Building Micro-cloud Provider Federation in the Guifi Community Network 贵非社区网微云提供商联盟建设经验
Roger Baig, Felix Freitag, A. Moll, Leandro Navarro-Moldes, R. P. Centelles, Vladimir Vlassov
Cloud federation is foreseen to happen among large cloud providers. The resulting interoperability of cloud services among these providers will then increase even more the elasticity of cloud services. The cloud provisioned that is targeted by this scenario is mainly one which combines the cloud services offered by large enterprises. Cloud computing, however, has started moving to the edge. We now increasingly see the tendency to fullfil cloud computing requirements by multiple levels and different kind of infrastructures, where the Fog Computing paradigm has started playing its role. For this scenario of edge computing, we show in this paper the case of the federation of multiple independent micro-cloud providers within a community network, where providers pool their resources and services into a community cloud. Federation happens here primarily at the service level and the domain of trust is the community of practice. While we can today already report this case in the context of community networks, IPv6 deployment in the Internet will principally allow micro-cloud providers to appear everywhere, needing cloud federation mechanisms. We describe for a real case how this micro-cloud provider federation has been built and argue why micro-cloud provider should be considered for the integration in cloud federations.
云联盟预计将发生在大型云提供商之间。这些提供商之间云服务的互操作性将进一步提高云服务的弹性。此场景所提供的云主要是大型企业提供的云服务的组合。然而,云计算已经开始向边缘移动。我们现在越来越多地看到,通过多层次和不同类型的基础设施来满足云计算需求的趋势,雾计算范式已经开始发挥作用。对于这种边缘计算场景,我们在本文中展示了社区网络中多个独立微云提供商联合的情况,其中提供商将其资源和服务汇集到社区云中。这里的联合主要发生在服务级别,而信任的领域是实践社区。虽然我们今天已经可以在社区网络的背景下报告这种情况,但IPv6在互联网上的部署将主要允许微云提供商无处不在,需要云联合机制。我们通过一个实际案例描述了如何构建这个微云提供商联盟,并讨论了为什么应该考虑将微云提供商集成到云联盟中。
{"title":"Experiences in Building Micro-cloud Provider Federation in the Guifi Community Network","authors":"Roger Baig, Felix Freitag, A. Moll, Leandro Navarro-Moldes, R. P. Centelles, Vladimir Vlassov","doi":"10.1109/UCC.2015.92","DOIUrl":"https://doi.org/10.1109/UCC.2015.92","url":null,"abstract":"Cloud federation is foreseen to happen among large cloud providers. The resulting interoperability of cloud services among these providers will then increase even more the elasticity of cloud services. The cloud provisioned that is targeted by this scenario is mainly one which combines the cloud services offered by large enterprises. Cloud computing, however, has started moving to the edge. We now increasingly see the tendency to fullfil cloud computing requirements by multiple levels and different kind of infrastructures, where the Fog Computing paradigm has started playing its role. For this scenario of edge computing, we show in this paper the case of the federation of multiple independent micro-cloud providers within a community network, where providers pool their resources and services into a community cloud. Federation happens here primarily at the service level and the domain of trust is the community of practice. While we can today already report this case in the context of community networks, IPv6 deployment in the Internet will principally allow micro-cloud providers to appear everywhere, needing cloud federation mechanisms. We describe for a real case how this micro-cloud provider federation has been built and argue why micro-cloud provider should be considered for the integration in cloud federations.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125086430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using the Cloud to Teach Computer Networks 使用云来教授计算机网络
Mhd Wael Bazzaza, K. Salah
STEM education can enormously benefit from cloud technology. The cloud can offer instructors and students (whether local or remote) on-demand, dedicated, isolated, unlimited, and easily configurable compute and storage resources. The cloud can significantly reduce cost and expenditure on lab construction and maintenance. Due to these features, the cloud has been widely adopted by many universities and schools throughout the world. In this paper, we show how the cloud can be utilized to replace traditional physical computer networks laboratories. In particular, we demonstrate how cloud-based laboratory exercises related to computer networks can greatly help students in acquiring almost all crucial computer networks skills. The cloud we used for this course was the Amazon Web Services (AWS) public cloud. However, the use cases and approaches are equally applicable to other cloud platforms.
STEM教育可以从云技术中受益匪浅。云可以为教师和学生(无论是本地还是远程)提供按需、专用、隔离、无限和易于配置的计算和存储资源。云计算可以显著降低实验室建设和维护的成本和支出。由于这些特性,云已经被世界各地的许多大学和学校广泛采用。在本文中,我们展示了如何利用云来取代传统的物理计算机网络实验室。特别是,我们展示了与计算机网络相关的基于云的实验室练习如何极大地帮助学生获得几乎所有关键的计算机网络技能。我们在本课程中使用的云是亚马逊网络服务(AWS)公共云。然而,这些用例和方法同样适用于其他云平台。
{"title":"Using the Cloud to Teach Computer Networks","authors":"Mhd Wael Bazzaza, K. Salah","doi":"10.1109/UCC.2015.49","DOIUrl":"https://doi.org/10.1109/UCC.2015.49","url":null,"abstract":"STEM education can enormously benefit from cloud technology. The cloud can offer instructors and students (whether local or remote) on-demand, dedicated, isolated, unlimited, and easily configurable compute and storage resources. The cloud can significantly reduce cost and expenditure on lab construction and maintenance. Due to these features, the cloud has been widely adopted by many universities and schools throughout the world. In this paper, we show how the cloud can be utilized to replace traditional physical computer networks laboratories. In particular, we demonstrate how cloud-based laboratory exercises related to computer networks can greatly help students in acquiring almost all crucial computer networks skills. The cloud we used for this course was the Amazon Web Services (AWS) public cloud. However, the use cases and approaches are equally applicable to other cloud platforms.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122532989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Clouds4Coordination: Managing Project Collaboration in Federated Clouds Clouds4Coordination:在联邦云中管理项目协作
I. Petri, O. Rana, T. Beach, Y. Rezgui, A. Sutton
The use of cloud computing for AEC (Architecture/ Engineering/ Construction) projects has been intensively explored in recent research. Companies have adopted cloud computing for storing the massive amount of data that the AEC industry generates. In most cases these cloud systems are private, isolated and limited in terms of the actual computing operations. With the emergence of "multi-Clouds" or Cloud-of-Clouds environments it has become possible to link such systems and create a distributed environment. The key benefits suggested for such an aggregation is: (i) reduced reliance on a single cloud infrastructure, (ii) improved fault tolerance (whereby failure in one Cloud system does not render the entire infrastructure inoperable), (iii) improved security -- similar argument to fault tolerance, i.e. a breach in one Cloud system does not impact the entire infrastructure, (iv) the ability to utilise capability (and data) that may only be available in one Cloud system and not be easily transferable to another. Such infrastructure becomes efficacious when multiple individuals and organisations work collaboratively. In this paper we present a coordination model for distributed clouds where the interacting parties are represented by AEC industry organisations. We present the underlying architecture that has been implemented as part of the "Clouds-for-Coordination"(C4C) project and provide a real use case where different organisations work jointly on an AEC project. We validate our system by measuring an "aggregated time-to-complete" metric over a number of different scenarios.
云计算在AEC(建筑/工程/建设)项目中的应用在最近的研究中得到了深入的探讨。企业已经采用云计算来存储AEC行业产生的大量数据。在大多数情况下,这些云系统是私有的、孤立的,并且在实际计算操作方面受到限制。随着“多云”或云的云环境的出现,连接这些系统并创建分布式环境已经成为可能。这种聚合的主要好处是:(i)减少对单一云基础设施的依赖,(ii)提高容错性(即一个云系统的故障不会导致整个基础设施无法运行),(iii)提高安全性——与容错性类似,即一个云系统的漏洞不会影响整个基础设施,(iv)利用可能仅在一个云系统中可用且不易转移到另一个云系统的能力(和数据)的能力。当多个个人和组织协同工作时,这样的基础设施变得有效。在本文中,我们提出了一个分布式云的协调模型,其中交互各方由AEC行业组织代表。我们展示了作为“协调云”(C4C)项目的一部分实现的底层架构,并提供了不同组织在AEC项目上共同工作的真实用例。我们通过测量多个不同场景的“聚合完成时间”度量来验证我们的系统。
{"title":"Clouds4Coordination: Managing Project Collaboration in Federated Clouds","authors":"I. Petri, O. Rana, T. Beach, Y. Rezgui, A. Sutton","doi":"10.1109/UCC.2015.88","DOIUrl":"https://doi.org/10.1109/UCC.2015.88","url":null,"abstract":"The use of cloud computing for AEC (Architecture/ Engineering/ Construction) projects has been intensively explored in recent research. Companies have adopted cloud computing for storing the massive amount of data that the AEC industry generates. In most cases these cloud systems are private, isolated and limited in terms of the actual computing operations. With the emergence of \"multi-Clouds\" or Cloud-of-Clouds environments it has become possible to link such systems and create a distributed environment. The key benefits suggested for such an aggregation is: (i) reduced reliance on a single cloud infrastructure, (ii) improved fault tolerance (whereby failure in one Cloud system does not render the entire infrastructure inoperable), (iii) improved security -- similar argument to fault tolerance, i.e. a breach in one Cloud system does not impact the entire infrastructure, (iv) the ability to utilise capability (and data) that may only be available in one Cloud system and not be easily transferable to another. Such infrastructure becomes efficacious when multiple individuals and organisations work collaboratively. In this paper we present a coordination model for distributed clouds where the interacting parties are represented by AEC industry organisations. We present the underlying architecture that has been implemented as part of the \"Clouds-for-Coordination\"(C4C) project and provide a real use case where different organisations work jointly on an AEC project. We validate our system by measuring an \"aggregated time-to-complete\" metric over a number of different scenarios.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vehicular Cloud Networks: Architecture, Applications and Security Issues 车载云网络:架构、应用和安全问题
Farhan Ahmad, Muhammad Kazim, A. Adnane, Abir Awad
Vehicular Ad Hoc Networks (VANET) are the largest real life application of ad-hoc networks where nodes are represented via fast moving vehicles. This paper introduces the future emerging technology, i.e., Vehicular Cloud Networking (VCN) where vehicles and adjacent infrastructure merge with traditional internet clouds to offer different applications ranging from low sized applications to very complex applications. VCN is composed of three types of clouds: Vehicular cloud, Infrastructure cloud and traditional Back-End (IT) cloud. We introduced these clouds via a three tier architecture along with their operations and characteristics. We have proposed use cases of each cloud tier that explain how it is practically created and utilised while taking the vehicular mobility in consideration. Moreover, it is critical to ensure security, privacy and trust of VCN network and its assets. Therefore, to describe the security of VCN, we have provided an in-depth analysis of different threats related to each tier of VCN. The threats related to vehicular cloud and infrastructure cloud are categorized according to their assets, i.e., vehicles, adjacent infrastructure, wireless communication, vehicular messages, and vehicular cloud threats. Similarly, the Back-End cloud threats are categorized into data and network threats. The possible implications of these threats and their effects on various components of VCN are also explained in detail.
车辆自组织网络(VANET)是自组织网络在现实生活中的最大应用,其中节点通过快速移动的车辆表示。本文介绍了未来的新兴技术,即车辆云网络(VCN),其中车辆和相邻的基础设施与传统的互联网云合并,以提供从小型应用到非常复杂的应用的不同应用。VCN由三种类型的云:车辆的云,云基础设施云和传统的后端(IT)。我们通过三层架构介绍了这些云,以及它们的操作和特征。我们提出了每个云层的用例,解释了在考虑车辆移动性的同时如何实际创建和使用它。此外,确保VCN网络及其资产的安全、隐私和信任至关重要。因此,为了描述VCN的安全,我们提供了一个深入分析不同的威胁与每层VCN有关。与车辆云和基础设施云相关的威胁根据其资产进行分类,即车辆、相邻基础设施、无线通信、车辆消息和车辆云威胁。同样,后端云威胁也分为数据威胁和网络威胁。还详细解释了这些威胁的可能含义及其对VCN各组成部分的影响。
{"title":"Vehicular Cloud Networks: Architecture, Applications and Security Issues","authors":"Farhan Ahmad, Muhammad Kazim, A. Adnane, Abir Awad","doi":"10.1109/UCC.2015.101","DOIUrl":"https://doi.org/10.1109/UCC.2015.101","url":null,"abstract":"Vehicular Ad Hoc Networks (VANET) are the largest real life application of ad-hoc networks where nodes are represented via fast moving vehicles. This paper introduces the future emerging technology, i.e., Vehicular Cloud Networking (VCN) where vehicles and adjacent infrastructure merge with traditional internet clouds to offer different applications ranging from low sized applications to very complex applications. VCN is composed of three types of clouds: Vehicular cloud, Infrastructure cloud and traditional Back-End (IT) cloud. We introduced these clouds via a three tier architecture along with their operations and characteristics. We have proposed use cases of each cloud tier that explain how it is practically created and utilised while taking the vehicular mobility in consideration. Moreover, it is critical to ensure security, privacy and trust of VCN network and its assets. Therefore, to describe the security of VCN, we have provided an in-depth analysis of different threats related to each tier of VCN. The threats related to vehicular cloud and infrastructure cloud are categorized according to their assets, i.e., vehicles, adjacent infrastructure, wireless communication, vehicular messages, and vehicular cloud threats. Similarly, the Back-End cloud threats are categorized into data and network threats. The possible implications of these threats and their effects on various components of VCN are also explained in detail.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132591922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Analytical Modelling and Performability Analysis for Cloud Computing Using Queuing System 基于排队系统的云计算分析建模与性能分析
Yonal Kirsal, Y. K. Ever, L. Mostarda, O. Gemikonakli
In recent years, cloud computing becomes a new computing model emerged from the rapid development of the internet. Users can reach their resources with high flexibility using the cloud computing systems all over the world. However, such systems are prone to failures. In order to obtain realistic quality of service (QoS) measurements, failure and recovery behaviours of the system should be considered. System's failures and repairs are associated with availability context in QoS measurements. In this paper, performance issues are considered with the availability of the system. Markov Reward Model (MRM) method is used to get QoS measurements. The mean queue length (MQL) results are calculated using the MRM. The results explicitly show that failures and repairs affect the system performance significantly.
近年来,随着互联网的快速发展,云计算成为一种新的计算模式。用户可以使用遍布全球的云计算系统以高度的灵活性访问他们的资源。然而,这样的系统容易出现故障。为了获得真实的服务质量(QoS)度量,必须考虑系统的故障和恢复行为。系统的故障和修复与QoS测量中的可用性上下文相关。在本文中,性能问题考虑了系统的可用性。采用马尔可夫奖励模型(MRM)方法进行QoS度量。使用MRM计算平均队列长度(MQL)结果。结果表明,故障和维修对系统性能有显著影响。
{"title":"Analytical Modelling and Performability Analysis for Cloud Computing Using Queuing System","authors":"Yonal Kirsal, Y. K. Ever, L. Mostarda, O. Gemikonakli","doi":"10.1109/UCC.2015.115","DOIUrl":"https://doi.org/10.1109/UCC.2015.115","url":null,"abstract":"In recent years, cloud computing becomes a new computing model emerged from the rapid development of the internet. Users can reach their resources with high flexibility using the cloud computing systems all over the world. However, such systems are prone to failures. In order to obtain realistic quality of service (QoS) measurements, failure and recovery behaviours of the system should be considered. System's failures and repairs are associated with availability context in QoS measurements. In this paper, performance issues are considered with the availability of the system. Markov Reward Model (MRM) method is used to get QoS measurements. The mean queue length (MQL) results are calculated using the MRM. The results explicitly show that failures and repairs affect the system performance significantly.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132959797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards Secure SDN Policy Management 迈向安全的SDN策略管理
Nicolae Paladi
Software-Defined Networking (SDN) has emerged as a novel network architectural model that facilitates management of large-scale networks, enables efficient network virtualization and scalable network multi-tenancy. Centralized network controllers, an important component in the SDN paradigm, deploy on the data plane devices network policies from several independent sources, defined based on a global network view. While this approach allows to efficiently manage network connectivity and reduce the time and cost of deploying new configurations, it also increases the risk for errors -- either introduced by accident, through a combination with previous policies, or by a motivated adversary. In this position paper we review the state of the art for network policy verification for SDN deployments, identify existing challenges and outline a secure framework for network policy management in SDN deployments. Combined with existing work on cloud platform and storage security, this will contribute towards creating secure and trusted cloud deployments.
软件定义网络(SDN)作为一种新型的网络体系结构模型,能够促进大规模网络的管理,实现高效的网络虚拟化和可扩展的网络多租户。集中式网络控制器是SDN范例中的一个重要组件,它在数据平面上部署来自多个独立来源的网络策略,这些策略是基于全局网络视图定义的。虽然这种方法可以有效地管理网络连接,并减少部署新配置的时间和成本,但它也增加了错误的风险——要么是由于意外引入的,要么是通过与以前的策略相结合引入的,要么是由有动机的对手引入的。在这篇立场文件中,我们回顾了SDN部署的网络策略验证的最新进展,确定了存在的挑战,并概述了SDN部署中网络策略管理的安全框架。结合云平台和存储安全方面的现有工作,这将有助于创建安全和可信的云部署。
{"title":"Towards Secure SDN Policy Management","authors":"Nicolae Paladi","doi":"10.1109/UCC.2015.106","DOIUrl":"https://doi.org/10.1109/UCC.2015.106","url":null,"abstract":"Software-Defined Networking (SDN) has emerged as a novel network architectural model that facilitates management of large-scale networks, enables efficient network virtualization and scalable network multi-tenancy. Centralized network controllers, an important component in the SDN paradigm, deploy on the data plane devices network policies from several independent sources, defined based on a global network view. While this approach allows to efficiently manage network connectivity and reduce the time and cost of deploying new configurations, it also increases the risk for errors -- either introduced by accident, through a combination with previous policies, or by a motivated adversary. In this position paper we review the state of the art for network policy verification for SDN deployments, identify existing challenges and outline a secure framework for network policy management in SDN deployments. Combined with existing work on cloud platform and storage security, this will contribute towards creating secure and trusted cloud deployments.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121635922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Trichotomic Search for Thermal-Aware Data Centre Workload Optimisation 热感知数据中心工作负载优化的三分体搜索
Ignacio Castiñeiras, Danuta Sorina Chisca, D. Mehta, B. O’Sullivan
The power consumption of a data centre (DC) can be attributed to the power consumed by running the servers and the power consumed for cooling them. The challenge is to optimally balance IT and cooling power requirements, which demands the minimisation of a non-linear energy utilisation function. In this paper we propose a problem decomposition-based approach to tackle a non-linear energy utilisation function and successfully apply it to minimising the energy consumption of a DC.
数据中心的功耗包括服务器运行所需的功耗和服务器冷却所需的功耗。挑战在于最佳地平衡IT和冷却功率需求,这需要最小化非线性能量利用功能。在本文中,我们提出了一种基于问题分解的方法来处理非线性能量利用函数,并成功地将其应用于最小化直流的能量消耗。
{"title":"Trichotomic Search for Thermal-Aware Data Centre Workload Optimisation","authors":"Ignacio Castiñeiras, Danuta Sorina Chisca, D. Mehta, B. O’Sullivan","doi":"10.1109/UCC.2015.94","DOIUrl":"https://doi.org/10.1109/UCC.2015.94","url":null,"abstract":"The power consumption of a data centre (DC) can be attributed to the power consumed by running the servers and the power consumed for cooling them. The challenge is to optimally balance IT and cooling power requirements, which demands the minimisation of a non-linear energy utilisation function. In this paper we propose a problem decomposition-based approach to tackle a non-linear energy utilisation function and successfully apply it to minimising the energy consumption of a DC.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124114862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1