首页 > 最新文献

Int. J. Cloud Appl. Comput.最新文献

英文 中文
SCEF: A Model for Prevention of DDoS Attacks From the Cloud SCEF:一种防止来自云的DDoS攻击的模型
Pub Date : 2020-07-01 DOI: 10.4018/ijcac.2020070104
G. Shidaganti, A. Inamdar, Sindhuja V. Rai, Anagha M. Rajeev
Distributed denial of service (DDoS) attacks are some of the biggest threats to network performance and security today. With the advent of cloud computing, these attacks can be performed remotely on rented virtual machines (VMs), potentially increasing their capabilities and making them harder to trace and mitigate, and negatively affecting the cloud service provider as well. By analyzing packet transmission statistics, attacks can be detected on a virtual machine monitor (VMM) that controls the behavior of the VMs. This article proposes a solution to stop such detected attacks from the source, and analyses solutions proposed for a few different types of such attacks. The authors propose a model called selective cloud egress filter (SCEF) which implements specific modules to deal with detected attacks. If an attack is detected, the SCEF relays information to the VMM about which VMs are participating in the attack, allowing for specific corrective action.
分布式拒绝服务(DDoS)攻击是当今网络性能和安全的最大威胁之一。随着云计算的出现,这些攻击可以在租用的虚拟机(vm)上远程执行,这可能会增加它们的功能,并使它们更难以跟踪和缓解,同时也会对云服务提供商产生负面影响。通过分析报文传输统计信息,可以在控制虚拟机行为的VMM (virtual machine monitor)上发现攻击行为。本文提出了一种从源头阻止此类检测到的攻击的解决方案,并分析了针对几种不同类型的此类攻击提出的解决方案。作者提出了一种称为选择性云出口过滤器(SCEF)的模型,该模型实现了特定模块来处理检测到的攻击。如果检测到攻击,SCEF将哪些虚拟机参与攻击的信息转发给VMM,以便采取特定的纠正措施。
{"title":"SCEF: A Model for Prevention of DDoS Attacks From the Cloud","authors":"G. Shidaganti, A. Inamdar, Sindhuja V. Rai, Anagha M. Rajeev","doi":"10.4018/ijcac.2020070104","DOIUrl":"https://doi.org/10.4018/ijcac.2020070104","url":null,"abstract":"Distributed denial of service (DDoS) attacks are some of the biggest threats to network performance and security today. With the advent of cloud computing, these attacks can be performed remotely on rented virtual machines (VMs), potentially increasing their capabilities and making them harder to trace and mitigate, and negatively affecting the cloud service provider as well. By analyzing packet transmission statistics, attacks can be detected on a virtual machine monitor (VMM) that controls the behavior of the VMs. This article proposes a solution to stop such detected attacks from the source, and analyses solutions proposed for a few different types of such attacks. The authors propose a model called selective cloud egress filter (SCEF) which implements specific modules to deal with detected attacks. If an attack is detected, the SCEF relays information to the VMM about which VMs are participating in the attack, allowing for specific corrective action.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133422443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Merkle Tree and Blockchain-Based Cloud Data Auditing 默克尔树和基于区块链的云数据审计
Pub Date : 2020-07-01 DOI: 10.4018/ijcac.2020070103
A. Mohan, R. MohamedAsfak, Angelin Gladston
Cloud computing is the fastest growing and most promising field in the service provisioning segment. It has become a challenging task to provide security in the cloud. The purpose of this article is to suggest a better and efficient integrity verification technique for data referred to as cloud audit. The deployment of cloud storage services has significant benefits in the management of data for users. However, this raises many security concerns, and one of them is data integrity. Though public verification techniques serve the purpose they are vulnerable to procrastinating auditors who may not perform verifications on time. In this article, a cloud data auditing system is proposed. The proposed cloud data auditing system integrates Merkle Tree-based Cloud audit and the blockchain-based audit recording system, thus the core idea is to record each verification result into a blockchain as a transaction. Utilizing the time-sensitive nature of blockchain, the verifications are time-stamped after the corresponding transaction is recorded into the blockchain, which enables users to check whether auditors have performed the verifications at the prescribed time. The proposed cloud data auditing system is experimentally validated. The investigations with varied dataset size revealed less time taken, on an average of 0.25 milliseconds with the use of Merkle Tree. Further results reveal consistency of the data integrity checking.
云计算是服务供应领域中增长最快、最有前途的领域。在云中提供安全性已成为一项具有挑战性的任务。本文的目的是提出一种更好、更有效的数据完整性验证技术,称为云审计。部署云存储服务对用户的数据管理有很大的好处。然而,这引起了许多安全问题,其中之一就是数据完整性。尽管公共验证技术服务于目的,但它们容易受到拖延的审计员的影响,这些审计员可能无法按时执行验证。本文提出了一种云数据审计系统。提出的云数据审计系统集成了基于默克尔树的云审计和基于区块链的审计记录系统,其核心思想是将每个验证结果作为交易记录到区块链中。利用区块链的时间敏感特性,在相应的交易被记录到区块链之后,验证会被打上时间戳,这使得用户能够检查审计人员是否在规定的时间执行了验证。实验验证了所提出的云数据审计系统。对不同数据集大小的调查显示,使用Merkle Tree所花费的时间更少,平均为0.25毫秒。进一步的结果显示了数据完整性检查的一致性。
{"title":"Merkle Tree and Blockchain-Based Cloud Data Auditing","authors":"A. Mohan, R. MohamedAsfak, Angelin Gladston","doi":"10.4018/ijcac.2020070103","DOIUrl":"https://doi.org/10.4018/ijcac.2020070103","url":null,"abstract":"Cloud computing is the fastest growing and most promising field in the service provisioning segment. It has become a challenging task to provide security in the cloud. The purpose of this article is to suggest a better and efficient integrity verification technique for data referred to as cloud audit. The deployment of cloud storage services has significant benefits in the management of data for users. However, this raises many security concerns, and one of them is data integrity. Though public verification techniques serve the purpose they are vulnerable to procrastinating auditors who may not perform verifications on time. In this article, a cloud data auditing system is proposed. The proposed cloud data auditing system integrates Merkle Tree-based Cloud audit and the blockchain-based audit recording system, thus the core idea is to record each verification result into a blockchain as a transaction. Utilizing the time-sensitive nature of blockchain, the verifications are time-stamped after the corresponding transaction is recorded into the blockchain, which enables users to check whether auditors have performed the verifications at the prescribed time. The proposed cloud data auditing system is experimentally validated. The investigations with varied dataset size revealed less time taken, on an average of 0.25 milliseconds with the use of Merkle Tree. Further results reveal consistency of the data integrity checking.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115911619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Efficient Strategies of VMs Scheduling Based on Physicals Resources and Temperature Thresholds 基于物理资源和温度阈值的高效虚拟机调度策略
Pub Date : 2020-07-01 DOI: 10.4018/ijcac.2020070105
Djouhra Dad, Ghalem Belalem
Cloud computing offers a variety of services, including the dynamic availability of computing resources. Its infrastructure is designed to support the accessibility and availability of various consumer services via the Internet. The number of data centers allow the allocation of the applications, and the process of data in the cloud is increasing over time. This implies high energy consumption, thus contributing to large emissions of CO2 gas. For this reason, solutions are needed to minimize this power consumption, such as virtualization, migration, consolidation, and efficient traffic-aware virtual machine scheduling. In this article, the authors propose two efficient strategies for VM scheduling. SchedCT approach is based on dynamic CPU utilization and temperature thresholds. SchedCR approach takes into consideration dynamic CPU utilization, RAM capacity, and temperature thresholds. These approaches have efficiently decreased the energy consumption of the data centers, the number of VM migrations, and SLA violations, and this reduces, therefore, the emission of CO2 gas.
云计算提供各种服务,包括计算资源的动态可用性。它的基础设施旨在通过Internet支持各种消费者服务的可访问性和可用性。数据中心的数量允许应用程序的分配,并且云中的数据处理随着时间的推移而增加。这意味着高能耗,从而导致大量二氧化碳气体排放。出于这个原因,需要最小化这种功耗的解决方案,例如虚拟化、迁移、整合和高效的流量感知虚拟机调度。在本文中,作者提出了两种有效的虚拟机调度策略。SchedCT方法基于动态CPU利用率和温度阈值。SchedCR方法考虑了动态CPU利用率、RAM容量和温度阈值。这些方法有效地降低了数据中心的能耗、VM迁移数量和SLA违规,从而减少了CO2气体的排放。
{"title":"Efficient Strategies of VMs Scheduling Based on Physicals Resources and Temperature Thresholds","authors":"Djouhra Dad, Ghalem Belalem","doi":"10.4018/ijcac.2020070105","DOIUrl":"https://doi.org/10.4018/ijcac.2020070105","url":null,"abstract":"Cloud computing offers a variety of services, including the dynamic availability of computing resources. Its infrastructure is designed to support the accessibility and availability of various consumer services via the Internet. The number of data centers allow the allocation of the applications, and the process of data in the cloud is increasing over time. This implies high energy consumption, thus contributing to large emissions of CO2 gas. For this reason, solutions are needed to minimize this power consumption, such as virtualization, migration, consolidation, and efficient traffic-aware virtual machine scheduling. In this article, the authors propose two efficient strategies for VM scheduling. SchedCT approach is based on dynamic CPU utilization and temperature thresholds. SchedCR approach takes into consideration dynamic CPU utilization, RAM capacity, and temperature thresholds. These approaches have efficiently decreased the energy consumption of the data centers, the number of VM migrations, and SLA violations, and this reduces, therefore, the emission of CO2 gas.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Factors Influencing the Adoption of Cloud Computing in Small and Medium Enterprises in Jordan 影响约旦中小企业采用云计算的因素
Pub Date : 2020-07-01 DOI: 10.4018/ijcac.2020070106
K. Rababah, Bilal Ali Yaseen Al-Nassar, Sana'a Nawaf Al-Nsour
ThefactorsofCloudcomputing(CC)adoptionamongsmallandmediumenterprises(SMEs)have notbeenidentifiedintheJordaniancontext.Therefore,theaimofthisstudyistoexaminethefactors influencingtheadoptionofCCinSMEsinJordan.Throughanextensivereviewoftheliterature, theresearchmodelwasconstructedbasedontheTOEframework.Inordertovalidatetheresearch modelandtesttheproposedhypotheses,aquantitativeresearchmethodologyfollowedinwhicha surveyquestionnairewasutilizedtocollectthedata.Outofthe350distributedquestionnaires,92 questionnaireswerevalidfortheanalysis.ThePLS-SEMtechniquewasusedforthedataanalysis. TheresultsapprovedtheinfluenceofsixvariablesontheadoptionofCCbymanufacturingSMEs inJordan,namely;compatibility,security,topmanagementsupport,technologicalreadiness,prior ITexperience,andcompetitivepressure.Onlytheinfluenceoftheperceivedbenefitshasnotbeen supported.ThestudyhastheoreticalimplicationsandpracticalimplicationstoSMEsinJordan. KEywoRdS Compatibility, Competitive Pressure, Perceived Benefits, Prior IT Experience, Security, Technological Readiness, TOE Framework, Top Management Support
ThefactorsofCloudcomputing(CC)adoptionamongsmallandmediumenterprises(中小企业)have notbeenidentifiedintheJordaniancontext。Therefore,theaimofthisstudyistoexaminethefactors influencingtheadoptionofCCinSMEsinJordan。Throughanextensivereviewoftheliterature, theresearchmodelwasconstructedbasedontheTOEframework。Inordertovalidatetheresearch modelandtesttheproposedhypotheses,aquantitativeresearchmethodologyfollowedinwhicha surveyquestionnairewasutilizedtocollectthedata。Outofthe350distributedquestionnaires,92 questionnaireswerevalidfortheanalysis.ThePLS-SEMtechniquewasusedforthedataanalysis。TheresultsapprovedtheinfluenceofsixvariablesontheadoptionofCCbymanufacturingSMEs inJordan,namely;compatibility,security,topmanagementsupport,technologicalreadiness,prior ITexperience,andcompetitivepressure。Onlytheinfluenceoftheperceivedbenefitshasnotbeen supported.ThestudyhastheoreticalimplicationsandpracticalimplicationstoSMEsinJordan。关键词兼容性,竞争压力,感知利益,先前的IT经验,安全,技术准备,TOE框架,高层管理支持
{"title":"Factors Influencing the Adoption of Cloud Computing in Small and Medium Enterprises in Jordan","authors":"K. Rababah, Bilal Ali Yaseen Al-Nassar, Sana'a Nawaf Al-Nsour","doi":"10.4018/ijcac.2020070106","DOIUrl":"https://doi.org/10.4018/ijcac.2020070106","url":null,"abstract":"ThefactorsofCloudcomputing(CC)adoptionamongsmallandmediumenterprises(SMEs)have notbeenidentifiedintheJordaniancontext.Therefore,theaimofthisstudyistoexaminethefactors influencingtheadoptionofCCinSMEsinJordan.Throughanextensivereviewoftheliterature, theresearchmodelwasconstructedbasedontheTOEframework.Inordertovalidatetheresearch modelandtesttheproposedhypotheses,aquantitativeresearchmethodologyfollowedinwhicha surveyquestionnairewasutilizedtocollectthedata.Outofthe350distributedquestionnaires,92 questionnaireswerevalidfortheanalysis.ThePLS-SEMtechniquewasusedforthedataanalysis. TheresultsapprovedtheinfluenceofsixvariablesontheadoptionofCCbymanufacturingSMEs inJordan,namely;compatibility,security,topmanagementsupport,technologicalreadiness,prior ITexperience,andcompetitivepressure.Onlytheinfluenceoftheperceivedbenefitshasnotbeen supported.ThestudyhastheoreticalimplicationsandpracticalimplicationstoSMEsinJordan. KEywoRdS Compatibility, Competitive Pressure, Perceived Benefits, Prior IT Experience, Security, Technological Readiness, TOE Framework, Top Management Support","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132679480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Metaheuristic Population-Based and Deterministic Algorithm for Resource Provisioning Using Ant Colony Optimization and Spanning Tree 基于蚁群优化和生成树的高效元启发式种群确定性资源分配算法
Pub Date : 2020-04-01 DOI: 10.4018/ijcac.2020040101
Muhammad Aliyu, M. Murali, A. Gital, S. Boukari
Resourceprovisioningisthecorefunctionofcloudcomputingwhichisfacedwithseriouschallenges asdemandgrows.Severalstrategiesofcloudcomputingresourcesoptimizationwereconsidered bymanyresearchers.Optimizationalgorithmsusedarestillunderreckoningandmodificationso as toenhance theirpotentials.Assuch,adynamicscheme thatcancombineseveralalgorithms’ characteristicsisrequired.Quiteanumberofoptimizationtechniqueshavebeenreassessedbased onmetaheuristicsanddeterministictomapoutwiththechallengesofresourceprovisioninginthe Cloud.Thisresearchworkproposestoinvolvetheantcolonyoptimization(ACO)population-based mechanismbyextendingittoformahybridmeta-heuristicthroughdeterministicspanningtree(SPT) algorithm incorporation.Extensiveexperimentconducted in thecloudsimsimulatorprovidedan efficientresultintermsoffasterconvergence,andmakespantimeminimizationascomparedtoother population-basedanddeterministicalgorithmsasitsignificantlyimprovesperformance. KEywORDS Cloud Computing, Deterministic, Dynamic, Metaheuristics, Optimization, Scheduling
Resourceprovisioningisthecorefunctionofcloudcomputingwhichisfacedwithseriouschallenges asdemandgrows。Severalstrategiesofcloudcomputingresourcesoptimizationwereconsidered bymanyresearchers。Optimizationalgorithmsusedarestillunderreckoningandmodificationso as > toenhance theirpotentials。Assuch,adynamicscheme thatcancombineseveralalgorithms ' ' characteristicsisrequired。Quiteanumberofoptimizationtechniqueshavebeenreassessedbased onmetaheuristicsanddeterministictomapoutwiththechallengesofresourceprovisioninginthe Cloud.Thisresearchworkproposestoinvolvetheantcolonyoptimization(ACO)population-based mechanismbyextendingittoformahybridmeta-heuristicthroughdeterministicspanningtree(SPT)算法整合。Extensiveexperimentconducted in > thecloudsimsimulatorprovidedan efficientresultintermsoffasterconvergence,andmakespantimeminimizationascomparedtoother population-basedanddeterministicalgorithmsasitsignificantlyimprovesperformance。关键词云计算,确定性,动态,元启发式,优化,调度
{"title":"Efficient Metaheuristic Population-Based and Deterministic Algorithm for Resource Provisioning Using Ant Colony Optimization and Spanning Tree","authors":"Muhammad Aliyu, M. Murali, A. Gital, S. Boukari","doi":"10.4018/ijcac.2020040101","DOIUrl":"https://doi.org/10.4018/ijcac.2020040101","url":null,"abstract":"Resourceprovisioningisthecorefunctionofcloudcomputingwhichisfacedwithseriouschallenges asdemandgrows.Severalstrategiesofcloudcomputingresourcesoptimizationwereconsidered bymanyresearchers.Optimizationalgorithmsusedarestillunderreckoningandmodificationso as toenhance theirpotentials.Assuch,adynamicscheme thatcancombineseveralalgorithms’ characteristicsisrequired.Quiteanumberofoptimizationtechniqueshavebeenreassessedbased onmetaheuristicsanddeterministictomapoutwiththechallengesofresourceprovisioninginthe Cloud.Thisresearchworkproposestoinvolvetheantcolonyoptimization(ACO)population-based mechanismbyextendingittoformahybridmeta-heuristicthroughdeterministicspanningtree(SPT) algorithm incorporation.Extensiveexperimentconducted in thecloudsimsimulatorprovidedan efficientresultintermsoffasterconvergence,andmakespantimeminimizationascomparedtoother population-basedanddeterministicalgorithmsasitsignificantlyimprovesperformance. KEywORDS Cloud Computing, Deterministic, Dynamic, Metaheuristics, Optimization, Scheduling","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115651897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Multi Factor Two-way Hash-Based Authentication in Cloud Computing 云计算中的多因素双向哈希认证
Pub Date : 2020-04-01 DOI: 10.4018/ijcac.2020040104
K. DeviPriya, Sumalatha Lingamgunta
TheexpansionofCloudcomputingisinfluencingvariousdomainssuchaseducation,thebanking sector,industries,government,healthinformatics,andindividuals.Thecharacteristicsofaneasy interface,on-demandaccess,scalability,andlowinfrastructureinvestmenthavetoleadtothefast adaptationofCloudcomputingbasedupontheirneeds.Despitetheadvantages,Cloudcomputing isopentomoresecurityrisksandattacksespeciallyintermsofcommunicationduetothelackof secureauthenticationandprivacy.Inthisarticleispresentedanovelhash-basedmultifactorsecure mutual authentication scheme that includes mathematical hashing properties, certificates, nonce values,traditionaluserids,andpasswordmechanismsthatresistMITMattacks,replayattacks,and forgeryattacks.WeimplementedourproposedmethodintheMicrosoftAzurecloudandtheresults areevaluated.ThesecurityanalysisisdonebyusingtheScythertoolandwithaformalanalysisby usingGNYbelieflogic.Theresultsindicatetheproposedschemeiscapableofprovidingstrong secureauthentication. KeywoRdS Authentication, Cloud Computing, GNY belief logic, Hash-Based Algorithms, Microsoft Azure Cloud, Multifactor Authentication, Scyther tool, Security Attacks
TheexpansionofCloudcomputingisinfluencingvariousdomainssuchaseducation,thebanking部门,industries,government,healthinformatics,andindividuals。Thecharacteristicsofaneasy接口,on-demandaccess,scalability,andlowinfrastructureinvestmenthavetoleadtothefast adaptationofCloudcomputingbasedupontheirneeds。Despitetheadvantages,Cloudcomputing isopentomoresecurityrisksandattacksespeciallyintermsofcommunicationduetothelackof secureauthenticationandprivacy。Inthisarticleispresentedanovelhash-basedmultifactorsecure mutualauthenticationscheme,其中包括数学哈希属性,证书,nonce_值,traditionaluserids,andpasswordmechanismsthatresistMITMattacks,replayattacks,and forgeryattacks。WeimplementedourproposedmethodintheMicrosoftAzurecloudandtheresults areevaluated。ThesecurityanalysisisdonebyusingtheScythertoolandwithaformalanalysisby usingGNYbelieflogic。Theresultsindicatetheproposedschemeiscapableofprovidingstrong secureauthentication。关键词身份验证,云计算,GNY信念逻辑,哈希算法,微软Azure云,多因素身份验证,Scyther工具,安全攻击
{"title":"Multi Factor Two-way Hash-Based Authentication in Cloud Computing","authors":"K. DeviPriya, Sumalatha Lingamgunta","doi":"10.4018/ijcac.2020040104","DOIUrl":"https://doi.org/10.4018/ijcac.2020040104","url":null,"abstract":"TheexpansionofCloudcomputingisinfluencingvariousdomainssuchaseducation,thebanking sector,industries,government,healthinformatics,andindividuals.Thecharacteristicsofaneasy interface,on-demandaccess,scalability,andlowinfrastructureinvestmenthavetoleadtothefast adaptationofCloudcomputingbasedupontheirneeds.Despitetheadvantages,Cloudcomputing isopentomoresecurityrisksandattacksespeciallyintermsofcommunicationduetothelackof secureauthenticationandprivacy.Inthisarticleispresentedanovelhash-basedmultifactorsecure mutual authentication scheme that includes mathematical hashing properties, certificates, nonce values,traditionaluserids,andpasswordmechanismsthatresistMITMattacks,replayattacks,and forgeryattacks.WeimplementedourproposedmethodintheMicrosoftAzurecloudandtheresults areevaluated.ThesecurityanalysisisdonebyusingtheScythertoolandwithaformalanalysisby usingGNYbelieflogic.Theresultsindicatetheproposedschemeiscapableofprovidingstrong secureauthentication. KeywoRdS Authentication, Cloud Computing, GNY belief logic, Hash-Based Algorithms, Microsoft Azure Cloud, Multifactor Authentication, Scyther tool, Security Attacks","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125657320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Offloading as a Service Middleware for Mobile Cloud Apps 卸载作为移动云应用的服务中间件
Pub Date : 2020-04-01 DOI: 10.4018/ijcac.2020040103
Hamid Jadad, A. Touzene, K. Day
Recently,muchresearchhasfocusedontheimprovementofmobileappperformanceandtheirpower optimization,byoffloadingcomputationfrommobiledevicestopubliccloudcomputingplatforms. However,thescalabilityoftheseoffloadingservicesonalargescaleisstillachallenge.Thisarticle describesasolutiontothisscalabilityproblembyproposingamiddlewarethatprovidesoffloading asaservice(OAS)tolarge-scaleimplementationofmobileusersandapps.Theproposedmiddleware OAS uses adaptive VM allocation and deallocation algorithms based on a CPU rate prediction model. Furthermore, it dynamically schedules the requests using a load-balancing algorithm to ensuremeetingQoSrequirementsatalowercost.Theauthorshavetestedtheproposedalgorithm byconductingmultiplesimulationsandcomparedourresultswithstate-of-the-artalgorithmsbased onvariousperformancemetricsundermultipleloadconditions.TheresultsshowthatOASachieves betterresponsetimewithaminimumnumberofVMsandreduces50%ofthecostcomparedto existingapproaches. KeywORdS Apps, Load Balancing, Mobile Cloud, Offloading, Scheduling
最近,muchresearchhasfocusedontheimprovementofmobileappperformanceandtheirpower优化,byoffloadingcomputationfrommobiledevicestopubliccloudcomputingplatforms。然而,thescalabilityoftheseoffloadingservicesonalargescaleisstillachallenge。Thisarticle describesasolutiontothisscalabilityproblembyproposingamiddlewarethatprovidesoffloading asaservice(美洲组织)tolarge-scaleimplementationofmobileusersandapps。Theproposedmiddleware oas采用了基于cpu rate预测模型的adaptivevmallocation和deallocation算法。此外,它还使用负载平衡算法动态地调度请求到ensuremeetingQoSrequirementsatalowercost。Theauthorshavetestedtheproposedalgorithm byconductingmultiplesimulationsandcomparedourresultswithstate-of-the-artalgorithmsbased onvariousperformancemetricsundermultipleloadconditions。TheresultsshowthatOASachieves betterresponsetimewithaminimumnumberofVMsandreduces50%ofthecostcomparedto existingapproaches。关键词应用程序,负载平衡,移动云,卸载,调度
{"title":"Offloading as a Service Middleware for Mobile Cloud Apps","authors":"Hamid Jadad, A. Touzene, K. Day","doi":"10.4018/ijcac.2020040103","DOIUrl":"https://doi.org/10.4018/ijcac.2020040103","url":null,"abstract":"Recently,muchresearchhasfocusedontheimprovementofmobileappperformanceandtheirpower optimization,byoffloadingcomputationfrommobiledevicestopubliccloudcomputingplatforms. However,thescalabilityoftheseoffloadingservicesonalargescaleisstillachallenge.Thisarticle describesasolutiontothisscalabilityproblembyproposingamiddlewarethatprovidesoffloading asaservice(OAS)tolarge-scaleimplementationofmobileusersandapps.Theproposedmiddleware OAS uses adaptive VM allocation and deallocation algorithms based on a CPU rate prediction model. Furthermore, it dynamically schedules the requests using a load-balancing algorithm to ensuremeetingQoSrequirementsatalowercost.Theauthorshavetestedtheproposedalgorithm byconductingmultiplesimulationsandcomparedourresultswithstate-of-the-artalgorithmsbased onvariousperformancemetricsundermultipleloadconditions.TheresultsshowthatOASachieves betterresponsetimewithaminimumnumberofVMsandreduces50%ofthecostcomparedto existingapproaches. KeywORdS Apps, Load Balancing, Mobile Cloud, Offloading, Scheduling","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"55 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113988119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Conceptual Framework Towards Implementing a Cloud-Based Dynamic Load Balancer Using a Weighted Round-Robin Algorithm 使用加权轮循算法实现基于云的动态负载均衡器的概念框架
Pub Date : 2020-04-01 DOI: 10.4018/ijcac.2020040102
S. Sahana, Tanmoy Mukherjee, D. Sarddar
CloudloadbalancinghasbecomeoneofthemostvitalaspectsofCloudcomputingthathascaptured theattentionofITorganizationsandbusinessfirmsinrecentyears.Amongtheissuesrelatedtothis particularaspect,onesuchissuewhichneedstobeaddressedistheissueofeffectivelyservingthe clients’requestsamongmultipleserversusinganappropriateloadbalancer.Previoussurveypapers discussed various issues of cloud load balancing and accordingly devised various methods and techniquestoaddressthoseissueswiththeobjectivesofreductionofprocessingtimeandresponse timealongwithoptimizationofcosts.Inthisarticle,wehavediscussedaneffectiveloadbalancing techniqueusingtheweightedRound-Robinalgorithmwhichcanprocesstheclientrequestsamong multipleserverswithminimalresponsetime.Consideringalltheseaspects,acloud-baseddynamic loadbalancerisbeingusedtosolvetheproblemofloadbalancinginthecloudinfrastructure. KeyWoRDS Client Machines, Cloud-Based Dynamic Load Balancer, Database, Server Machines, Weighted RoundRobin Algorithm
CloudloadbalancinghasbecomeoneofthemostvitalaspectsofCloudcomputingthathascaptured theattentionofITorganizationsandbusinessfirmsinrecentyears。Amongtheissuesrelatedtothis particularaspect、onesuchissuewhichneedstobeaddressedistheissueofeffectivelyservingthe客户端requestsamongmultipleserversusinganappropriateloadbalancer。Previoussurveypapers讨论了云负载平衡的各种问题,并相应地设计了各种方法和techniquestoaddressthoseissueswiththeobjectivesofreductionofprocessingtimeandresponse timealongwithoptimizationofcosts。Inthisarticle,wehavediscussedaneffectiveloadbalancing techniqueusingtheweightedRound-Robinalgorithmwhichcanprocesstheclientrequestsamong multipleserverswithminimalresponsetime。Consideringalltheseaspects,acloud-baseddynamic loadbalancerisbeingusedtosolvetheproblemofloadbalancinginthecloudinfrastructure。关键词客户端机器,基于云的动态负载平衡器,数据库,服务器机器,加权轮询算法
{"title":"A Conceptual Framework Towards Implementing a Cloud-Based Dynamic Load Balancer Using a Weighted Round-Robin Algorithm","authors":"S. Sahana, Tanmoy Mukherjee, D. Sarddar","doi":"10.4018/ijcac.2020040102","DOIUrl":"https://doi.org/10.4018/ijcac.2020040102","url":null,"abstract":"CloudloadbalancinghasbecomeoneofthemostvitalaspectsofCloudcomputingthathascaptured theattentionofITorganizationsandbusinessfirmsinrecentyears.Amongtheissuesrelatedtothis particularaspect,onesuchissuewhichneedstobeaddressedistheissueofeffectivelyservingthe clients’requestsamongmultipleserversusinganappropriateloadbalancer.Previoussurveypapers discussed various issues of cloud load balancing and accordingly devised various methods and techniquestoaddressthoseissueswiththeobjectivesofreductionofprocessingtimeandresponse timealongwithoptimizationofcosts.Inthisarticle,wehavediscussedaneffectiveloadbalancing techniqueusingtheweightedRound-Robinalgorithmwhichcanprocesstheclientrequestsamong multipleserverswithminimalresponsetime.Consideringalltheseaspects,acloud-baseddynamic loadbalancerisbeingusedtosolvetheproblemofloadbalancinginthecloudinfrastructure. KeyWoRDS Client Machines, Cloud-Based Dynamic Load Balancer, Database, Server Machines, Weighted RoundRobin Algorithm","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121965079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System 基于区块链的银行系统敏感属性存储与访问监控
Pub Date : 2020-04-01 DOI: 10.4018/ijcac.2020040105
M. Sumathi, S. Sangeetha
In earlier banking systems, the data owners were unable to access or update their financial information. Nowadays, user financial information is stored in Cloud storage instead of traditional storage, but security risks are high in financial sectors. Sometimes, Cloud services providers and public auditors modify the user sensitive attribute values. Hence, the decentralized storage system is required for providing better security and integrity of user sensitive attribute values. Blockchain is a decentralized technology for providing tamper-proof storage for sensitive attribute values. Hence, the account holder information is segregated as sensitive and non-sensitive attributes. Before storing into off-chain mode of blocks, the sensitive attributes are grouped into ‘n' number of groups and encrypted by separate group key. The non-encrypted, non-sensitive attributes are stored in cloud storage. The access information is stored in the on-chain mode of the block for easy monitoring. Hence, the security and integrity of sensitive information are preserved.
在早期的银行系统中,数据所有者无法访问或更新他们的财务信息。如今,用户的金融信息存储在云存储中,而不是传统的存储,但金融领域的安全风险很高。有时,云服务提供商和公共审计人员会修改用户敏感属性值。因此,需要分布式存储系统来提供更好的用户敏感属性值的安全性和完整性。区块链是一种分散的技术,用于为敏感属性值提供防篡改存储。因此,帐户持有人信息被划分为敏感属性和非敏感属性。在存储到区块的脱链模式之前,敏感属性被分组为“n”个组,并通过单独的组密钥进行加密。未加密、不敏感的属性存储在云存储中。访问信息以块的链上模式存储,便于监控。因此,敏感信息的安全性和完整性得以保证。
{"title":"Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System","authors":"M. Sumathi, S. Sangeetha","doi":"10.4018/ijcac.2020040105","DOIUrl":"https://doi.org/10.4018/ijcac.2020040105","url":null,"abstract":"In earlier banking systems, the data owners were unable to access or update their financial information. Nowadays, user financial information is stored in Cloud storage instead of traditional storage, but security risks are high in financial sectors. Sometimes, Cloud services providers and public auditors modify the user sensitive attribute values. Hence, the decentralized storage system is required for providing better security and integrity of user sensitive attribute values. Blockchain is a decentralized technology for providing tamper-proof storage for sensitive attribute values. Hence, the account holder information is segregated as sensitive and non-sensitive attributes. Before storing into off-chain mode of blocks, the sensitive attributes are grouped into ‘n' number of groups and encrypted by separate group key. The non-encrypted, non-sensitive attributes are stored in cloud storage. The access information is stored in the on-chain mode of the block for easy monitoring. Hence, the security and integrity of sensitive information are preserved.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"751 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133701670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Examining the Antecedents of Cloud Service Profitability 分析云服务盈利的前提
Pub Date : 2019-10-01 DOI: 10.4018/IJCAC.2019100103
A. Herzfeldt, Sebastian Floerecke, Christoph Ertl, H. Krcmar
In a fast growing but highly competitive market, some cloud service providers are significantly more profitable than others. In particular, numerous providers struggle to scale their cloud service delivery up from a one-time, project-based co-creation model to a platform delivery model, building on reusable resources. This study builds on the service (-dominant) logic and the resource-based view to develop a model of cloud service profitability. It is proposed that profitability results from the ability to manage costs of customer-specific value co-creation and efforts to build reusable resources, which facilitate future customer engagements. The results of a survey with 99 cloud providers show that value co-creation costs indeed mediate the effects of facilitation capability and complexity on cloud service profitability. However, facilitation capability has both direct and mediated effects on profitability. The results provide insights on which factors influence cloud service profitability and which resources should be established before offering a cloud service to future customers.
在一个快速增长但竞争激烈的市场中,一些云服务提供商的利润明显高于其他云服务提供商。特别是,许多提供商努力将其云服务交付从一次性的、基于项目的共同创建模型扩展到基于可重用资源的平台交付模型。本研究基于服务(主导)逻辑和基于资源的观点,构建了云服务盈利能力模型。有人提出,盈利能力来自于管理特定于客户的价值共同创造的成本的能力,以及构建可重用资源的努力,这有助于未来的客户约定。一项针对99家云服务提供商的调查结果显示,价值共同创造成本确实会调节促进能力和复杂性对云服务盈利能力的影响。然而,促进能力对盈利能力既有直接影响,也有中介影响。结果提供了影响云服务盈利能力的因素以及在向未来客户提供云服务之前应该建立哪些资源的见解。
{"title":"Examining the Antecedents of Cloud Service Profitability","authors":"A. Herzfeldt, Sebastian Floerecke, Christoph Ertl, H. Krcmar","doi":"10.4018/IJCAC.2019100103","DOIUrl":"https://doi.org/10.4018/IJCAC.2019100103","url":null,"abstract":"In a fast growing but highly competitive market, some cloud service providers are significantly more profitable than others. In particular, numerous providers struggle to scale their cloud service delivery up from a one-time, project-based co-creation model to a platform delivery model, building on reusable resources. This study builds on the service (-dominant) logic and the resource-based view to develop a model of cloud service profitability. It is proposed that profitability results from the ability to manage costs of customer-specific value co-creation and efforts to build reusable resources, which facilitate future customer engagements. The results of a survey with 99 cloud providers show that value co-creation costs indeed mediate the effects of facilitation capability and complexity on cloud service profitability. However, facilitation capability has both direct and mediated effects on profitability. The results provide insights on which factors influence cloud service profitability and which resources should be established before offering a cloud service to future customers.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127148628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Int. J. Cloud Appl. Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1