首页 > 最新文献

Int. J. Cloud Appl. Comput.最新文献

英文 中文
Migration From DevOps to DevSecOps: A Complete Migration Framework, Challenges, and Evaluation 从DevOps到DevSecOps的迁移:一个完整的迁移框架、挑战和评估
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.2022010102
T. Nisha, Amit Khandebharad
DevOps development strategy is based on lean and agile principles and developed to ensure faster delivery. It ensures the collaboration of all stakeholders in the software development process and incorporates user’s feedback in a faster manner. This strategy is developed to guarantee customer satisfaction, increased business value, reduced time for bagging the feedback and adjusting the deliverables. They identified a requirement of prioritizing security in DevOps and started conferring about security to be embedded in DevOps. This introduced a mission-critical issue in many organizations as it requires breaking down of the barriers of operations and security team and review of many security policies in place. The challenge is to find the best way in DevOps can still perform Continuous Integration and Continuous Delivery after implanting security in a DevOps environment. This paper introduces a complete migration framework from DevOps to DevSecOps.This paper also identifies the attributes on which the migration framework can be evaluated.
DevOps开发策略基于精益和敏捷原则,旨在确保更快的交付。它确保了软件开发过程中所有涉众的协作,并以更快的方式整合了用户的反馈。开发此策略是为了保证客户满意度,增加业务价值,减少打包反馈和调整可交付成果的时间。他们确定了在DevOps中优先考虑安全性的需求,并开始讨论在DevOps中嵌入安全性。这在许多组织中引入了关键任务问题,因为它需要打破操作和安全团队的障碍,并审查许多适当的安全策略。挑战在于,在DevOps环境中植入安全性后,如何在DevOps中找到执行持续集成和持续交付的最佳方法。本文介绍了一个完整的DevOps到DevSecOps的迁移框架。本文还确定了可以对迁移框架进行评估的属性。
{"title":"Migration From DevOps to DevSecOps: A Complete Migration Framework, Challenges, and Evaluation","authors":"T. Nisha, Amit Khandebharad","doi":"10.4018/ijcac.2022010102","DOIUrl":"https://doi.org/10.4018/ijcac.2022010102","url":null,"abstract":"DevOps development strategy is based on lean and agile principles and developed to ensure faster delivery. It ensures the collaboration of all stakeholders in the software development process and incorporates user’s feedback in a faster manner. This strategy is developed to guarantee customer satisfaction, increased business value, reduced time for bagging the feedback and adjusting the deliverables. They identified a requirement of prioritizing security in DevOps and started conferring about security to be embedded in DevOps. This introduced a mission-critical issue in many organizations as it requires breaking down of the barriers of operations and security team and review of many security policies in place. The challenge is to find the best way in DevOps can still perform Continuous Integration and Continuous Delivery after implanting security in a DevOps environment. This paper introduces a complete migration framework from DevOps to DevSecOps.This paper also identifies the attributes on which the migration framework can be evaluated.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123810452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cloud-Based Model for Driver Drowsiness Detection and Prediction Based on Facial Expressions and Activities 基于面部表情和活动的驾驶员睡意检测和预测的云模型
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.312565
A. Jain, Aakash Yadav, Manish Kumar, F. García-Peñalvo, Kwok Tai Chui, Domenico Santaniello
This paper proposes an efficient approach to detecting and predicting drivers' drowsiness based on the cloud. This work focuses on the behavioral as well as facial expressions of the driver to detect drowsiness. This paper proposes an efficient approach to predicting drivers' drowsiness based on facial expressions and activities. Four different models with distinct features were experimented upon. Of these, two were VGG and the others were CNN and ResNet. VGG models were used to detect the movement of lips (yawning) and to detect facial behavior. A CNN model was used to capture the details of the eyes. ResNet detects the nodding of the driver. The proposed approach also exceeds the results set by the benchmark mode and provides high accuracy, an easy-to-use framework for embedded devices in real-time drowsiness detection. To train the proposed model, the authors have used the National Tsing Hua University (NTHU) Drivers Drowsiness data set. The overall accuracy of the proposed approach is 90.1%.
本文提出了一种基于云的驾驶员睡意检测与预测的有效方法。这项工作的重点是司机的行为和面部表情,以检测困倦。本文提出了一种基于面部表情和活动来预测驾驶员睡意的有效方法。实验了四种具有不同特征的模型。其中两家是VGG,另外两家是CNN和ResNet。VGG模型被用来检测嘴唇的运动(打哈欠)和面部行为。一个CNN模型被用来捕捉眼睛的细节。ResNet检测驱动程序的点头。该方法也超过了基准模式设定的结果,为嵌入式设备的实时嗜睡检测提供了高精度,易于使用的框架。为了训练所提出的模型,作者使用了国立清华大学(NTHU)驾驶员嗜睡数据集。该方法的总体精度为90.1%。
{"title":"A Cloud-Based Model for Driver Drowsiness Detection and Prediction Based on Facial Expressions and Activities","authors":"A. Jain, Aakash Yadav, Manish Kumar, F. García-Peñalvo, Kwok Tai Chui, Domenico Santaniello","doi":"10.4018/ijcac.312565","DOIUrl":"https://doi.org/10.4018/ijcac.312565","url":null,"abstract":"This paper proposes an efficient approach to detecting and predicting drivers' drowsiness based on the cloud. This work focuses on the behavioral as well as facial expressions of the driver to detect drowsiness. This paper proposes an efficient approach to predicting drivers' drowsiness based on facial expressions and activities. Four different models with distinct features were experimented upon. Of these, two were VGG and the others were CNN and ResNet. VGG models were used to detect the movement of lips (yawning) and to detect facial behavior. A CNN model was used to capture the details of the eyes. ResNet detects the nodding of the driver. The proposed approach also exceeds the results set by the benchmark mode and provides high accuracy, an easy-to-use framework for embedded devices in real-time drowsiness detection. To train the proposed model, the authors have used the National Tsing Hua University (NTHU) Drivers Drowsiness data set. The overall accuracy of the proposed approach is 90.1%.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133858548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Case Study of Cloud Computing Service Models for the General Computing Environment in a University 面向高校通用计算环境的云计算服务模型案例研究
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.297096
Ho Yeon Kang, Jong Yun Lee, S. Noh
Cloud computing technology has emerged as the basic infrastructure technology in the 4thindustrial revolution and has been utilized in various fields. Therefore, the authors analyze the requirements of academic and administrative affairs, education affairs, and affiliated institutions in the university. Proposed cloud computing service models in the universities are implemented using an OpenStack in CentOS 7.3 and Windows. To evaluate the performance, the author compares various performance factors including launching time, booting time, ping time, and software installation time. Lastly, the economic benefits in the university will be evaluated by comparing the adoption cost, maintenance cost, and total cost between the existing client-server system and cloud computing system. Future work aims to implement a cloud computing system that can be applied to the entire university. Finally, based on these studies, the authors will implement a regional base cloud system that can connect all universities in the region with one cloud computing system.
云计算技术已成为第四次工业革命的基础设施技术,并被广泛应用于各个领域。在此基础上,分析了学校教务、教务、附属机构的需求。提出的高校云计算服务模型采用OpenStack在centos7.3和Windows环境下实现。为了评估性能,作者比较了各种性能因素,包括启动时间、启动时间、ping时间和软件安装时间。最后,通过比较现有的客户端-服务器系统和云计算系统的采用成本、维护成本和总成本来评估大学的经济效益。未来的工作目标是实现一个可以应用于整个大学的云计算系统。最后,在此基础上,笔者将实现一个区域基础云系统,该系统可以通过一个云计算系统连接区域内的所有大学。
{"title":"A Case Study of Cloud Computing Service Models for the General Computing Environment in a University","authors":"Ho Yeon Kang, Jong Yun Lee, S. Noh","doi":"10.4018/ijcac.297096","DOIUrl":"https://doi.org/10.4018/ijcac.297096","url":null,"abstract":"Cloud computing technology has emerged as the basic infrastructure technology in the 4thindustrial revolution and has been utilized in various fields. Therefore, the authors analyze the requirements of academic and administrative affairs, education affairs, and affiliated institutions in the university. Proposed cloud computing service models in the universities are implemented using an OpenStack in CentOS 7.3 and Windows. To evaluate the performance, the author compares various performance factors including launching time, booting time, ping time, and software installation time. Lastly, the economic benefits in the university will be evaluated by comparing the adoption cost, maintenance cost, and total cost between the existing client-server system and cloud computing system. Future work aims to implement a cloud computing system that can be applied to the entire university. Finally, based on these studies, the authors will implement a regional base cloud system that can connect all universities in the region with one cloud computing system.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133988965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Optimization of Multi-Hop Routing Protocols With Clustering-Based Hybrid Networking Architecture in Mobile Adhoc Cloud Networks 移动自组织云网络中基于聚类的混合网络架构的多跳路由协议性能优化
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.309932
Deepak Srivastava, Ajay Kumar, Anupama Mishra, Varsa Arya, Ammar Almomani, Ching-Hsien Hsu, Domenico Santaniello
Mobile networks, in particular, are composed of wireless cellular communication nodes (MANET). Communication between these mobile nodes is not under centric systems. MANET is a network of randomly traveling nodes that self-configure and self-organize. Routing is a fundamental topic of MANET, and performance analysis of routing protocols is the focus of this study. AODV, DSR, and WRP are three routing protocols that are compared in this article. Glomosim will be used for simulation. The throughput, average end-to-end latency, and packet delivery ratio of various routing systems are all examined. Two scenarios depending on mobility and node density are considered in this research. As node density rises, PDR and throughput rise with it. Low node density resulted in the shortest delay. AODV has a higher packet delivery ratio and throughput in both scenarios, while WRP has the shortest delay. The authors also analyzed the average energy consumption with a best routing protocol that was decided by the result and conclude the efficiency of the ad-hoc network.
特别是,移动网络由无线蜂窝通信节点(MANET)组成。这些移动节点之间的通信不在中心系统下。MANET是一种随机移动的自配置和自组织节点网络。路由是MANET的一个基本主题,路由协议的性能分析是本研究的重点。AODV、DSR和WRP是本文中比较的三种路由协议。Glomosim将用于模拟。研究了各种路由系统的吞吐量、平均端到端延迟和分组传送率。本研究考虑了两种基于迁移率和节点密度的场景。随着节点密度的增加,PDR和吞吐量也随之增加。低节点密度导致了最短的延迟。在这两种场景下,AODV都具有更高的分组分发率和吞吐量,而WRP具有最短的延迟。在此基础上,分析了采用最佳路由协议时的平均能耗,得出了ad-hoc网络的效率。
{"title":"Performance Optimization of Multi-Hop Routing Protocols With Clustering-Based Hybrid Networking Architecture in Mobile Adhoc Cloud Networks","authors":"Deepak Srivastava, Ajay Kumar, Anupama Mishra, Varsa Arya, Ammar Almomani, Ching-Hsien Hsu, Domenico Santaniello","doi":"10.4018/ijcac.309932","DOIUrl":"https://doi.org/10.4018/ijcac.309932","url":null,"abstract":"Mobile networks, in particular, are composed of wireless cellular communication nodes (MANET). Communication between these mobile nodes is not under centric systems. MANET is a network of randomly traveling nodes that self-configure and self-organize. Routing is a fundamental topic of MANET, and performance analysis of routing protocols is the focus of this study. AODV, DSR, and WRP are three routing protocols that are compared in this article. Glomosim will be used for simulation. The throughput, average end-to-end latency, and packet delivery ratio of various routing systems are all examined. Two scenarios depending on mobility and node density are considered in this research. As node density rises, PDR and throughput rise with it. Low node density resulted in the shortest delay. AODV has a higher packet delivery ratio and throughput in both scenarios, while WRP has the shortest delay. The authors also analyzed the average energy consumption with a best routing protocol that was decided by the result and conclude the efficiency of the ad-hoc network.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Taxonomical Challenges for Cyber Incident Response Threat Intelligence: A Review 网络事件响应威胁情报的分类挑战:综述
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.300770
M. Ammi, Oluwasegun A. Adedugbe, Fahad M. Al-Harby, E. Benkhelifa
As attackers continue to devise new means of exploiting vulnerabilities in computer systems,security personnel are doing their best to identify loopholes and threats.Analysis of threats to come up with effective mitigation techniques requires all-encompassing information about them.Security analysts can represent and share cyber threat information with semantic knowledge graphs within cyber security space to access. However, there should be no conflicting information because the response to threats must be immediate.This calls for a standardized taxonomy that is generally accepted within the cybersecurity space to represent information,ultimately making cyber threat intelligence (CTI) credible.This review looks into existing CTI-based ontologies,taxonomies,and knowledge graphs.The absence of standardized taxonomy identified could be responsible for limited taxonomy encoding and integration among existing CTI-based ontologies, as well as missing interconnections between taxonomies and existing ontologies. Hence, the development of a standardized taxonomy will enhance CTI effectiveness
随着攻击者不断设计利用计算机系统漏洞的新手段,安全人员正在尽最大努力识别漏洞和威胁。对威胁进行分析以提出有效的缓解技术需要有关威胁的全面信息。安全分析人员可以在网络安全空间内使用语义知识图表示和共享网络威胁信息。但是,不应该有相互矛盾的信息,因为对威胁的反应必须是立即的。这就需要一种在网络安全领域被普遍接受的标准化分类法来表示信息,最终使网络威胁情报(CTI)可信。这篇综述着眼于现有的基于cti的本体、分类法和知识图。由于没有确定标准化的分类法,可能导致现有基于cti的本体之间的分类法编码和集成受限,以及分类法和现有本体之间缺少互连。因此,标准化分类法的发展将提高CTI的有效性
{"title":"Taxonomical Challenges for Cyber Incident Response Threat Intelligence: A Review","authors":"M. Ammi, Oluwasegun A. Adedugbe, Fahad M. Al-Harby, E. Benkhelifa","doi":"10.4018/ijcac.300770","DOIUrl":"https://doi.org/10.4018/ijcac.300770","url":null,"abstract":"As attackers continue to devise new means of exploiting vulnerabilities in computer systems,security personnel are doing their best to identify loopholes and threats.Analysis of threats to come up with effective mitigation techniques requires all-encompassing information about them.Security analysts can represent and share cyber threat information with semantic knowledge graphs within cyber security space to access. However, there should be no conflicting information because the response to threats must be immediate.This calls for a standardized taxonomy that is generally accepted within the cybersecurity space to represent information,ultimately making cyber threat intelligence (CTI) credible.This review looks into existing CTI-based ontologies,taxonomies,and knowledge graphs.The absence of standardized taxonomy identified could be responsible for limited taxonomy encoding and integration among existing CTI-based ontologies, as well as missing interconnections between taxonomies and existing ontologies. Hence, the development of a standardized taxonomy will enhance CTI effectiveness","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130985834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Fault-Tolerant Algorithm Based on Replication and Preemptive Migration in Cloud Computing 云计算中一种基于复制和抢占迁移的容错算法
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.305214
Abderraziq Semmoud, M. Hakem, B. Benmammar, Jean-Claude Charr
Cloud computing is a promising paradigm that provides users higher computation advantages in terms of cost, flexibility, and availability. Nevertheless, with potentially thousands of connected machines, faults become more frequent. Consequently, fault-tolerant load balancing becomes necessary in order to optimize resources utilization while ensuring the reliability of the system. Common fault tolerance techniques in cloud computing have been proposed in the literature. However, they suffer from several shortcomings: some fault tolerance techniques use checkpoint-recovery which increases the average waiting time and thus the mean response time. While other models rely on task replication which reduces the cloud's efficiency in terms of resource utilization under variable loads. To address these deficiencies, an efficient and adaptive fault tolerant algorithm for load balancing is proposed. Based on the CloudSim simulator, some series of test-bed scenarios are considered to assess the behavior of the proposed algorithm.
云计算是一种很有前途的范例,它在成本、灵活性和可用性方面为用户提供了更高的计算优势。然而,由于可能有数千台连接的机器,故障变得更加频繁。因此,为了在保证系统可靠性的同时优化资源利用率,容错负载平衡变得非常必要。文献中已经提出了云计算中常见的容错技术。然而,它们有几个缺点:一些容错技术使用检查点恢复,这会增加平均等待时间,从而增加平均响应时间。而其他模型依赖于任务复制,这会降低云在可变负载下的资源利用效率。针对这些不足,提出了一种高效、自适应的负载均衡容错算法。基于CloudSim模拟器,考虑了一系列测试平台场景来评估所提出算法的行为。
{"title":"A New Fault-Tolerant Algorithm Based on Replication and Preemptive Migration in Cloud Computing","authors":"Abderraziq Semmoud, M. Hakem, B. Benmammar, Jean-Claude Charr","doi":"10.4018/ijcac.305214","DOIUrl":"https://doi.org/10.4018/ijcac.305214","url":null,"abstract":"Cloud computing is a promising paradigm that provides users higher computation advantages in terms of cost, flexibility, and availability. Nevertheless, with potentially thousands of connected machines, faults become more frequent. Consequently, fault-tolerant load balancing becomes necessary in order to optimize resources utilization while ensuring the reliability of the system. Common fault tolerance techniques in cloud computing have been proposed in the literature. However, they suffer from several shortcomings: some fault tolerance techniques use checkpoint-recovery which increases the average waiting time and thus the mean response time. While other models rely on task replication which reduces the cloud's efficiency in terms of resource utilization under variable loads. To address these deficiencies, an efficient and adaptive fault tolerant algorithm for load balancing is proposed. Based on the CloudSim simulator, some series of test-bed scenarios are considered to assess the behavior of the proposed algorithm.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm 基于异或和遗传算法的云计算数据加解密
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.297101
H. A. Issa, Mustafa Hamzeh Al-Jarah, Ammar Almomani, Ahmad Al Nawasrah
Cloud computing is a very large storage space, can be accessed via an internet connection, this concept has appeared to facilitate the preservation of personal and corporate data and the easily of sharing, and this data can also be accessed from anywhere in the world as long as it is on the Internet, large gaps have emerged around data theft and viewing. Accordingly, researchers have developed algorithms and methods to protect this data, but the attempts to penetrate the data did not stop. In this research, we developed a method that combines XOR and Genetic algorithm to protect the data on the cloud through encryption operations and keep the key from being lost or stolen. The data that is uploaded to cloud computing may be important and we should not allow any party to see it or steal it. Therefore, it became imperative to protect this data and encrypt it. We have developed an algorithm that uses XOR and genetic algorithms in the encryption process.
云计算是一个非常大的存储空间,可以通过互联网连接访问,这个概念的出现促进了个人和企业数据的保存和易于共享,而且这些数据也可以从世界上任何地方访问,只要它在互联网上,在数据盗窃和查看方面出现了很大的差距。因此,研究人员开发了算法和方法来保护这些数据,但试图渗透数据的行为并没有停止。在本研究中,我们开发了一种结合异或和遗传算法的方法,通过加密操作来保护云上的数据,防止密钥丢失或被盗。上传到云计算的数据可能很重要,我们不应该允许任何一方看到或窃取它。因此,必须保护这些数据并对其进行加密。我们开发了一种算法,在加密过程中使用异或和遗传算法。
{"title":"Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm","authors":"H. A. Issa, Mustafa Hamzeh Al-Jarah, Ammar Almomani, Ahmad Al Nawasrah","doi":"10.4018/ijcac.297101","DOIUrl":"https://doi.org/10.4018/ijcac.297101","url":null,"abstract":"Cloud computing is a very large storage space, can be accessed via an internet connection, this concept has appeared to facilitate the preservation of personal and corporate data and the easily of sharing, and this data can also be accessed from anywhere in the world as long as it is on the Internet, large gaps have emerged around data theft and viewing. Accordingly, researchers have developed algorithms and methods to protect this data, but the attempts to penetrate the data did not stop. In this research, we developed a method that combines XOR and Genetic algorithm to protect the data on the cloud through encryption operations and keep the key from being lost or stolen. The data that is uploaded to cloud computing may be important and we should not allow any party to see it or steal it. Therefore, it became imperative to protect this data and encrypt it. We have developed an algorithm that uses XOR and genetic algorithms in the encryption process.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124412858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Future of Internet of Things: Enhancing Cloud-Based IoT Using Artificial Intelligence 物联网的未来:利用人工智能增强基于云的物联网
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.297094
Sana Khanam, Safdar Tanweer, S. Khalid
Internet has become the most significant technology with tremendous impact on everyday human life, where IOT is a major technology which uses internet applications to make everything around us ‘Smart’ providing ease of accessibility of physical devices and reducing human effort. In this paper we analyze the role of Artificial Intelligence in field of Internet of Things or the IOT. .AI makes the network more ‘intelligent’ increasing the scope of its connectivity and vast data streams. In this paper, we will analyze the critical impact of Artificial Intelligence deployed in IOT. We will also provide a quick overview on the current approaches of IOT and the challenges faced. Later we discuss how IOT and Artificial Intelligence (AI) together play a vital role in the coming years with the emergence of Internet of Intelligent Things (IoIT) that make these devices even smarter.
互联网已经成为对人类日常生活产生巨大影响的最重要的技术,其中物联网是一项主要技术,它使用互联网应用程序使我们周围的一切变得“智能”,提供物理设备的易于访问性并减少人力。本文分析了人工智能在物联网(IOT)领域的作用。人工智能使网络更加“智能”,增加了其连接范围和庞大的数据流。在本文中,我们将分析人工智能在物联网中部署的关键影响。我们还将快速概述物联网的当前方法和面临的挑战。稍后我们将讨论物联网和人工智能(AI)如何在未来几年随着智能物联网(IoIT)的出现而共同发挥至关重要的作用,使这些设备更加智能。
{"title":"Future of Internet of Things: Enhancing Cloud-Based IoT Using Artificial Intelligence","authors":"Sana Khanam, Safdar Tanweer, S. Khalid","doi":"10.4018/ijcac.297094","DOIUrl":"https://doi.org/10.4018/ijcac.297094","url":null,"abstract":"Internet has become the most significant technology with tremendous impact on everyday human life, where IOT is a major technology which uses internet applications to make everything around us ‘Smart’ providing ease of accessibility of physical devices and reducing human effort. In this paper we analyze the role of Artificial Intelligence in field of Internet of Things or the IOT. .AI makes the network more ‘intelligent’ increasing the scope of its connectivity and vast data streams. In this paper, we will analyze the critical impact of Artificial Intelligence deployed in IOT. We will also provide a quick overview on the current approaches of IOT and the challenges faced. Later we discuss how IOT and Artificial Intelligence (AI) together play a vital role in the coming years with the emergence of Internet of Intelligent Things (IoIT) that make these devices even smarter.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115227207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fog Computing for Delay Minimization and Load Balancing 延迟最小化和负载平衡的雾计算
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.312563
W. Akram, Z. Najar, A. Sarwar, Iraq Ahmad Reshi
Cloud is used to store and process data at a very high rate. Moreover, nearly everyone in this world is using the cloud. However, the problem arises that the data centers are not positioned well. The data reach the cloud by passing through the various links, due to which more delays occur. So this world is now moving into fog. Fog computing provides us the capability to process data nearer to the IoT devices. During the past decade, IoT devices have been growing rapidly, resulting in the production of a tremendous amount of data every day. For the processing of this ever-growing data, efficient algorithms are required to reduce the load on the cloud and give the results in a faster and more precise manner. The processing should be done on the fog node to handle this issue. In this paper, the authors study load balancing on fog nodes with a novel technique so that they distribute the load among different fog nodes so that none of the fog nodes remains idle while other takes time for processing the data.
云被用于以非常高的速率存储和处理数据。此外,这个世界上几乎每个人都在使用云。然而,问题出现了,数据中心没有很好地定位。数据通过各种链路到达云,因此会产生更多的延迟。所以这个世界现在正在进入迷雾之中。雾计算为我们提供了处理更靠近物联网设备的数据的能力。在过去的十年中,物联网设备一直在快速增长,导致每天产生大量的数据。为了处理这种不断增长的数据,需要高效的算法来减少云上的负载,并以更快、更精确的方式给出结果。处理应该在雾节点上完成,以处理这个问题。本文采用一种新颖的技术来研究雾节点的负载均衡,在不同的雾节点之间分配负载,使得每个雾节点都不会空闲,而其他雾节点则需要时间来处理数据。
{"title":"Fog Computing for Delay Minimization and Load Balancing","authors":"W. Akram, Z. Najar, A. Sarwar, Iraq Ahmad Reshi","doi":"10.4018/ijcac.312563","DOIUrl":"https://doi.org/10.4018/ijcac.312563","url":null,"abstract":"Cloud is used to store and process data at a very high rate. Moreover, nearly everyone in this world is using the cloud. However, the problem arises that the data centers are not positioned well. The data reach the cloud by passing through the various links, due to which more delays occur. So this world is now moving into fog. Fog computing provides us the capability to process data nearer to the IoT devices. During the past decade, IoT devices have been growing rapidly, resulting in the production of a tremendous amount of data every day. For the processing of this ever-growing data, efficient algorithms are required to reduce the load on the cloud and give the results in a faster and more precise manner. The processing should be done on the fog node to handle this issue. In this paper, the authors study load balancing on fog nodes with a novel technique so that they distribute the load among different fog nodes so that none of the fog nodes remains idle while other takes time for processing the data.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115411967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup 一种基于改进MD5-384位哈希函数和拟群的高效消息认证码
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.308275
Umesh Kumar, V. Venkaiah
Cryptographic hash functions and HMACs are used to achieve various security goals such as message integrity, message authentication, digital signatures, and entity authentication. This article proposes (1) a new hash function (QGMD5-384) and (2) an efficient message authentication code (QGMAC-384) based on a quasigroup. A quasigroup is a non-associative algebraic structure and its number grows exponentially with its order. Note that the existing hash functions and HMACs that use quasigroups are vulnerable to prefix and suffix attacks. The security of the proposed hash function is analyzed by comparing it with the MD5 and SHA-384. It is found that the proposed QGMD5-384 is more secure. Also, QGMAC-384 is analyzed against brute force and forgery attacks and it is found to be resistant to these attacks. The performance of the new schemes is compared with their counterparts, such as SHA-384 and HMAC-SHA-384. It is observed that QGMD5-384 and QGMAC-384 are slightly slower than MD5 and HMAC-MD5, respectively, but faster than both the SHA-384 and the HMAC-SHA-384.
加密哈希函数和hmac用于实现消息完整性、消息认证、数字签名和实体认证等各种安全目标。本文提出了(1)一个新的哈希函数(QGMD5-384)和(2)一个基于准群的高效消息认证码(QGMAC-384)。拟群是一种非结合代数结构,其数量随其阶数呈指数增长。请注意,现有的散列函数和使用准组的hmac很容易受到前缀和后缀攻击。通过与MD5和SHA-384的比较,分析了所提出的哈希函数的安全性。结果表明,提出的QGMD5-384具有更高的安全性。此外,QGMAC-384对暴力破解和伪造攻击进行了分析,发现它具有抵抗这些攻击的能力。并与现有的SHA-384和HMAC-SHA-384算法进行了性能比较。可以看出,QGMD5-384和QGMAC-384分别比MD5和HMAC-MD5略慢,但比SHA-384和HMAC-SHA-384都快。
{"title":"An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup","authors":"Umesh Kumar, V. Venkaiah","doi":"10.4018/ijcac.308275","DOIUrl":"https://doi.org/10.4018/ijcac.308275","url":null,"abstract":"Cryptographic hash functions and HMACs are used to achieve various security goals such as message integrity, message authentication, digital signatures, and entity authentication. This article proposes (1) a new hash function (QGMD5-384) and (2) an efficient message authentication code (QGMAC-384) based on a quasigroup. A quasigroup is a non-associative algebraic structure and its number grows exponentially with its order. Note that the existing hash functions and HMACs that use quasigroups are vulnerable to prefix and suffix attacks. The security of the proposed hash function is analyzed by comparing it with the MD5 and SHA-384. It is found that the proposed QGMD5-384 is more secure. Also, QGMAC-384 is analyzed against brute force and forgery attacks and it is found to be resistant to these attacks. The performance of the new schemes is compared with their counterparts, such as SHA-384 and HMAC-SHA-384. It is observed that QGMD5-384 and QGMAC-384 are slightly slower than MD5 and HMAC-MD5, respectively, but faster than both the SHA-384 and the HMAC-SHA-384.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Cloud Appl. Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1