首页 > 最新文献

Int. J. Cloud Appl. Comput.最新文献

英文 中文
Quality of Service-Based Resource Management in Fog Computing: A Systematic Review 雾计算中基于服务质量的资源管理:系统综述
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.309934
Vibha Jain, B. Kumar
In recent years, the emergence of the internet of things (IoT) has accelerated the quality of day-to-day tasks. With the rapid development of IoT devices, the cloud computing paradigm has become an attractive solution by facilitating on-demand services. However, the remote location of third-party cloud reduces the overall user experience while increasing the latency involved. Fog computing has been introduced as a promising solution by improving the overall service quality. Fog computing comprises distributed and heterogeneous fog nodes with limited resource capabilities. Therefore, managing fog resources while satisfying users' service quality is a challenging task. This study attempts to conduct a systematic review by examining high-quality research papers published between 2018 and April 2022. This paper aims to address current trends, challenges, and theoretical gaps with a wide range of open issues to guide the researchers and practitioners interested in carrying out the further research in the current domain.
近年来,物联网(IoT)的出现加速了日常任务的质量。随着物联网设备的快速发展,云计算范式通过促进按需服务成为一种有吸引力的解决方案。然而,第三方云的远程位置降低了整体用户体验,同时增加了所涉及的延迟。雾计算作为一种很有前途的解决方案被引入,它可以提高整体服务质量。雾计算包括具有有限资源能力的分布式和异构雾节点。因此,在满足用户服务质量的同时管理雾资源是一项具有挑战性的任务。本研究试图对2018年至2022年4月期间发表的高质量研究论文进行系统评价。本文旨在解决当前的趋势,挑战和广泛的开放性问题的理论差距,以指导有兴趣在当前领域开展进一步研究的研究人员和实践者。
{"title":"Quality of Service-Based Resource Management in Fog Computing: A Systematic Review","authors":"Vibha Jain, B. Kumar","doi":"10.4018/ijcac.309934","DOIUrl":"https://doi.org/10.4018/ijcac.309934","url":null,"abstract":"In recent years, the emergence of the internet of things (IoT) has accelerated the quality of day-to-day tasks. With the rapid development of IoT devices, the cloud computing paradigm has become an attractive solution by facilitating on-demand services. However, the remote location of third-party cloud reduces the overall user experience while increasing the latency involved. Fog computing has been introduced as a promising solution by improving the overall service quality. Fog computing comprises distributed and heterogeneous fog nodes with limited resource capabilities. Therefore, managing fog resources while satisfying users' service quality is a challenging task. This study attempts to conduct a systematic review by examining high-quality research papers published between 2018 and April 2022. This paper aims to address current trends, challenges, and theoretical gaps with a wide range of open issues to guide the researchers and practitioners interested in carrying out the further research in the current domain.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134394871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Heuristic-Based Task Scheduling Policy for QoS Improvement in Cloud 一种基于启发式的云服务质量改进任务调度策略
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.295238
Gaurav Tripathi, Rakesh Kumar
Cloud computing is a big step in the parallel and distributed computing that offers pervasive access to the entire stack of computing resources located in the data center via the Internet in a virtualized manner. QoS is an important research direction in the cloud and is a collection of constraints that meets the service level agreement (SLA) between the users and service providers. These constraints are waiting time, completion time, response time, makespan, resource utilization, effective utilization of bandwidth, and load balancing. This work presents a distribution plan for transferring task loads to different virtual machines (VMs) with an efficient load balancing mechanism that is best suited in heterogeneous environments and improve the QoS parameter of users and cloud vendors simultaneously. In this paper, the expected uniform load of tasks that can be mapped to a particular VMs is calculated and after that, the optimal average completion time (OACT) of expected uniform tasks load to each VM is calculated.
云计算是并行和分布式计算的一大进步,它通过Internet以虚拟化的方式提供了对位于数据中心的整个计算资源堆栈的普遍访问。QoS是云计算中的一个重要研究方向,是满足用户和服务提供商之间服务水平协议(SLA)的约束集合。这些约束包括等待时间、完成时间、响应时间、最大完成时间、资源利用率、带宽的有效利用率和负载平衡。本文提出了一种将任务负载转移到不同虚拟机(vm)的分配方案,该方案具有最适合异构环境的高效负载平衡机制,同时提高了用户和云供应商的QoS参数。本文首先计算可映射到特定VM的任务的期望均匀负载,然后计算每个VM的期望均匀任务负载的最优平均完成时间(OACT)。
{"title":"A Heuristic-Based Task Scheduling Policy for QoS Improvement in Cloud","authors":"Gaurav Tripathi, Rakesh Kumar","doi":"10.4018/ijcac.295238","DOIUrl":"https://doi.org/10.4018/ijcac.295238","url":null,"abstract":"Cloud computing is a big step in the parallel and distributed computing that offers pervasive access to the entire stack of computing resources located in the data center via the Internet in a virtualized manner. QoS is an important research direction in the cloud and is a collection of constraints that meets the service level agreement (SLA) between the users and service providers. These constraints are waiting time, completion time, response time, makespan, resource utilization, effective utilization of bandwidth, and load balancing. This work presents a distribution plan for transferring task loads to different virtual machines (VMs) with an efficient load balancing mechanism that is best suited in heterogeneous environments and improve the QoS parameter of users and cloud vendors simultaneously. In this paper, the expected uniform load of tasks that can be mapped to a particular VMs is calculated and after that, the optimal average completion time (OACT) of expected uniform tasks load to each VM is calculated.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131154471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Server Consolidation Algorithms for Cloud Computing: Taxonomies and Systematic Analysis of Literature 云计算的服务器整合算法:分类和文献系统分析
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.311034
Hind Mikram, S. E. Kafhali, Y. Saadi
In recent years, companies and researchers have hosted and rented computer resources over ‎the ‎‎internet due to cloud computing, which led to an increase in the energy consumed by ‎data centers. This ‎‎consumption is considered one of the world's highest, ‎which pushed many ‎researchers to propose ‎several techniques such as server ‎consolidation (SC) to solve the‎‏ ‏trade‏-‏off‏ ‏‏‎between energy saving and ‎quality of service ‎‎(QoS). SC requires maintaining service level ‎agreements (SLA) violations and ‎minimizing ‎the number of active physical machines (PMs). ‎Furthermore, to achieve this balance and ‎‎avoid ‎increasing hardware costs, the SC challenge targets ‎placing new virtual machines ‎‎(VMs) in ‎suitable PMs. This work explored the existing SC algorithms ‎that include ‎CloudSim as a simulator ‎environment and PlanetLab as a dataset. The authors compared ‎the well-known optimization methods ‎and extracted the weaknesses of the main three deployed ‎‎approaches involved in the consolidation ‎process: bin-packing model, metaheuristics, ‎and machine ‎learning-based solutions.‎
近年来,由于云计算,公司和研究人员在互联网上托管和租用计算机资源,这导致数据中心消耗的能源增加。这一消耗被认为是世界上最高的,这促使许多研究人员提出了几种技术,如服务器整合(SC),以解决节能和服务质量(QoS)之间的交易。SC需要维护违反服务水平协议(SLA)的情况,并最小化活动物理机(pm)的数量。此外,为了实现这种平衡并避免增加硬件成本,SC挑战的目标是将新的虚拟机(vm)放置在合适的pm中。这项工作探索了现有的SC算法,包括CloudSim作为模拟器环境和PlanetLab作为数据集。作者比较了众所周知的优化方法,并提取了整合过程中涉及的主要三种部署方法的弱点:打包模型、元启发式和基于机器学习的解决方案
{"title":"Server Consolidation Algorithms for Cloud Computing: Taxonomies and Systematic Analysis of Literature","authors":"Hind Mikram, S. E. Kafhali, Y. Saadi","doi":"10.4018/ijcac.311034","DOIUrl":"https://doi.org/10.4018/ijcac.311034","url":null,"abstract":"In recent years, companies and researchers have hosted and rented computer resources over ‎the ‎‎internet due to cloud computing, which led to an increase in the energy consumed by ‎data centers. This ‎‎consumption is considered one of the world's highest, ‎which pushed many ‎researchers to propose ‎several techniques such as server ‎consolidation (SC) to solve the‎‏ ‏trade‏-‏off‏ ‏‏‎between energy saving and ‎quality of service ‎‎(QoS). SC requires maintaining service level ‎agreements (SLA) violations and ‎minimizing ‎the number of active physical machines (PMs). ‎Furthermore, to achieve this balance and ‎‎avoid ‎increasing hardware costs, the SC challenge targets ‎placing new virtual machines ‎‎(VMs) in ‎suitable PMs. This work explored the existing SC algorithms ‎that include ‎CloudSim as a simulator ‎environment and PlanetLab as a dataset. The authors compared ‎the well-known optimization methods ‎and extracted the weaknesses of the main three deployed ‎‎approaches involved in the consolidation ‎process: bin-packing model, metaheuristics, ‎and machine ‎learning-based solutions.‎","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133281122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles 在车联网中检测和预防行为不端的入侵者
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.295242
Richa Sharma, T. P. Sharma, A. Sharma
The advent of new vehicular advances and accessibility of new network access mediums have evolved service providers with heterogeneous-vehicular collaboration. The performance of heterogeneous-vehicular collaboration depends on the possibility of accurate, up-to-date vehicular information shared by Cooperative- Awareness Messages (CAMs) among neighboring vehicles. Although exchanging wrong mobility coordinates leading to disruption on the Internet of Vehicles (IoVs) applicability. To address these issues, a misbehavior detection approach is proposed which acts as a second wall of defense. Our scheme is divided into three phases context procurement, context sharing, and misbehavior detection. Mathematical modeling has been done to evaluate Sybil attack and false message generation attack detection under misbehavior detection. The proposed scheme attains 99% in detecting false message generation attacks and 98.5% in detecting Sybil attacks. Additionally, false-positive rate, overhead detection, and False-Measures are evaluated which demonstrates the effectiveness of our approach.
新的车载技术进步和新的网络接入介质的可访问性使得服务提供商具有异构车载协作能力。异构车辆协同的性能取决于相邻车辆之间通过协同感知消息(CAMs)共享准确、最新的车辆信息的可能性。虽然交换错误的移动坐标导致车辆互联网(IoVs)的适用性中断。为了解决这些问题,提出了一种不当行为检测方法,作为第二道防御墙。我们的方案分为三个阶段:上下文获取、上下文共享和错误行为检测。对错误行为检测下的Sybil攻击和假消息生成攻击检测进行了数学建模。该方案检测假消息生成攻击的准确率达到99%,检测虚消息生成攻击的准确率达到98.5%。此外,假阳性率,开销检测和假测量进行了评估,这证明了我们的方法的有效性。
{"title":"Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles","authors":"Richa Sharma, T. P. Sharma, A. Sharma","doi":"10.4018/ijcac.295242","DOIUrl":"https://doi.org/10.4018/ijcac.295242","url":null,"abstract":"The advent of new vehicular advances and accessibility of new network access mediums have evolved service providers with heterogeneous-vehicular collaboration. The performance of heterogeneous-vehicular collaboration depends on the possibility of accurate, up-to-date vehicular information shared by Cooperative- Awareness Messages (CAMs) among neighboring vehicles. Although exchanging wrong mobility coordinates leading to disruption on the Internet of Vehicles (IoVs) applicability. To address these issues, a misbehavior detection approach is proposed which acts as a second wall of defense. Our scheme is divided into three phases context procurement, context sharing, and misbehavior detection. Mathematical modeling has been done to evaluate Sybil attack and false message generation attack detection under misbehavior detection. The proposed scheme attains 99% in detecting false message generation attacks and 98.5% in detecting Sybil attacks. Additionally, false-positive rate, overhead detection, and False-Measures are evaluated which demonstrates the effectiveness of our approach.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122984485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Survey on Service Placement, Provisioning, and Composition for Fog-Based IoT Systems 基于雾的物联网系统的服务布局、供应和组成调查
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.305212
Thiruchadai Pandeeswari Sadatacharapandi, P. S.
In the modern IoT era, time and resource critical applications are more prevalent. Though cloud computing enables fast processing of data and producing results, the time and network overhead are huge. Fog based solutions have proved to eliminate this overhead. However, establishing a scalable fog based architecture for IoT applications involves a number of challenges such as guaranteeing QoS, reducing operational costs etc. Hence a viable fog based architecture must involve optimal service placement facilitated by suitable schemes for resource estimation and reservation, QoS monitoring, data interchange and integration. This paper surveys various service placement and optimization approaches proposed in the literature and compares them. This paper also explores various components that are required for composing a viable fog based architecture and presents a representative fog provisioning framework. Relevance of modern technologies and tools such as RESTful architecture, SDN, Kafka, RabbitMQ, Zookeeper in establishing an efficient framework for fog based IoT applications is discussed
在现代物联网时代,时间和资源关键型应用更加普遍。虽然云计算可以快速处理数据并产生结果,但时间和网络开销是巨大的。基于雾的解决方案已经被证明可以消除这种开销。然而,为物联网应用程序建立可扩展的基于雾的架构涉及许多挑战,例如保证QoS,降低运营成本等。因此,一个可行的基于雾的体系结构必须包括最优的服务布局,通过适当的方案来促进资源估计和保留、QoS监控、数据交换和集成。本文综述了文献中提出的各种服务布局和优化方法,并对它们进行了比较。本文还探讨了组成一个可行的基于雾的体系结构所需的各种组件,并提出了一个具有代表性的雾供应框架。讨论了现代技术和工具(如RESTful架构、SDN、Kafka、RabbitMQ、Zookeeper)在为基于雾的物联网应用建立高效框架中的相关性
{"title":"Survey on Service Placement, Provisioning, and Composition for Fog-Based IoT Systems","authors":"Thiruchadai Pandeeswari Sadatacharapandi, P. S.","doi":"10.4018/ijcac.305212","DOIUrl":"https://doi.org/10.4018/ijcac.305212","url":null,"abstract":"In the modern IoT era, time and resource critical applications are more prevalent. Though cloud computing enables fast processing of data and producing results, the time and network overhead are huge. Fog based solutions have proved to eliminate this overhead. However, establishing a scalable fog based architecture for IoT applications involves a number of challenges such as guaranteeing QoS, reducing operational costs etc. Hence a viable fog based architecture must involve optimal service placement facilitated by suitable schemes for resource estimation and reservation, QoS monitoring, data interchange and integration. This paper surveys various service placement and optimization approaches proposed in the literature and compares them. This paper also explores various components that are required for composing a viable fog based architecture and presents a representative fog provisioning framework. Relevance of modern technologies and tools such as RESTful architecture, SDN, Kafka, RabbitMQ, Zookeeper in establishing an efficient framework for fog based IoT applications is discussed","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning 基于数字水印的云资源分配密码系统
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.311033
Sarvesh Kumar, Surendra Kumar, Nikhil Ranjan, Shivam Tiwari, T. R. Kumar, Dinesh Goyal, G. Sharma, Varsha Arya, M. Rafsanjani
Cloud computing resource privacy is important and it becomes stronger when image-based security is applied. Most cloud service providers provision resources for images to the end users. Numerous encryption strategies are applied to safeguard information of the image while empowering visual component extractions. The work uses wavelet domain technique, visual cryptography, and Arnold transformation. This scheme provides additional security features to the secret share image at the trusted authority side for copyright protection of digital images. The proposed technique is robust against some selected attacks like scaling, blurring, etc. This technique protects the copyright of digital data over the cloud. It is a need and necessary to protect and prevent the illegal copying, redistribution, and copyright infringement of multimedia. This research work aims at increasing robustness and security of the digital image copyright scheme. The proposed scheme is a hybrid authentication framework that will perform better in the watermarking system of security using simulation over MATLAB.
云计算资源的隐私性非常重要,在应用基于图像的安全性时,它会变得更强。大多数云服务提供商为最终用户提供映像资源。许多加密策略应用于保护图像的信息,同时授权视觉组件提取。该作品采用了小波域技术、视觉密码学和阿诺德变换。该方案在可信权威端为秘密共享图像提供了额外的安全特性,实现了数字图像的版权保护。所提出的技术对某些选定的攻击(如缩放、模糊等)具有鲁棒性。这项技术保护了云上数字数据的版权。保护和防止多媒体的非法复制、再分发和侵犯版权是需要和必要的。本研究旨在提高数字图像版权方案的鲁棒性和安全性。该方案是一种混合认证框架,在安全水印系统中具有较好的性能。
{"title":"Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning","authors":"Sarvesh Kumar, Surendra Kumar, Nikhil Ranjan, Shivam Tiwari, T. R. Kumar, Dinesh Goyal, G. Sharma, Varsha Arya, M. Rafsanjani","doi":"10.4018/ijcac.311033","DOIUrl":"https://doi.org/10.4018/ijcac.311033","url":null,"abstract":"Cloud computing resource privacy is important and it becomes stronger when image-based security is applied. Most cloud service providers provision resources for images to the end users. Numerous encryption strategies are applied to safeguard information of the image while empowering visual component extractions. The work uses wavelet domain technique, visual cryptography, and Arnold transformation. This scheme provides additional security features to the secret share image at the trusted authority side for copyright protection of digital images. The proposed technique is robust against some selected attacks like scaling, blurring, etc. This technique protects the copyright of digital data over the cloud. It is a need and necessary to protect and prevent the illegal copying, redistribution, and copyright infringement of multimedia. This research work aims at increasing robustness and security of the digital image copyright scheme. The proposed scheme is a hybrid authentication framework that will perform better in the watermarking system of security using simulation over MATLAB.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Determinants of Customer Loyalty in a Cloud Computing Environment 云计算环境下客户忠诚度的决定因素
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.308278
T. Guimaraes, Mike Walton, K. Paranjape
This study's two objectives are first to assess the relationships between customer loyalty and potential determinants (customer satisfaction with the website, after sale customer service, and product return handling) in the special PaaS environment where users can produce a greater variety of website features compared to the more widely studied SaaS environment and second to test the impact of the website's customer decision support system as a potential moderator for the relationship between customer satisfaction with the website and customer loyalty. To test the hypotheses, 138 CC client organizations participated by collecting data from their website customers accessing their order entry website applications. The results confirmed the importance of the proposed relationships and enabled several important managerial insights, including the importance of client organization choosing the appropriate CC approach to improve customer loyalty to the website.
本研究的两个目标是首先评估客户忠诚度与潜在决定因素(客户对网站的满意度,售后客户服务,和产品退货处理)在特殊的PaaS环境中,与更广泛研究的SaaS环境相比,用户可以产生更多种类的网站功能,其次是为了测试网站的客户决策支持系统作为客户对网站满意度和客户忠诚度之间关系的潜在调节因素的影响。为了验证这些假设,138个CC客户组织通过收集访问其订单输入网站应用程序的网站客户的数据参与了研究。结果证实了所提议的关系的重要性,并使几个重要的管理见解成为可能,包括客户组织选择适当的CC方法来提高客户对网站的忠诚度的重要性。
{"title":"Determinants of Customer Loyalty in a Cloud Computing Environment","authors":"T. Guimaraes, Mike Walton, K. Paranjape","doi":"10.4018/ijcac.308278","DOIUrl":"https://doi.org/10.4018/ijcac.308278","url":null,"abstract":"This study's two objectives are first to assess the relationships between customer loyalty and potential determinants (customer satisfaction with the website, after sale customer service, and product return handling) in the special PaaS environment where users can produce a greater variety of website features compared to the more widely studied SaaS environment and second to test the impact of the website's customer decision support system as a potential moderator for the relationship between customer satisfaction with the website and customer loyalty. To test the hypotheses, 138 CC client organizations participated by collecting data from their website customers accessing their order entry website applications. The results confirmed the importance of the proposed relationships and enabled several important managerial insights, including the importance of client organization choosing the appropriate CC approach to improve customer loyalty to the website.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126859621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AFTTM: Agent-Based Fault Tolerance Trust Mechanism in Cloud Environment 云环境下基于agent的容错信任机制
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.297105
S. Jaswal, M. Malhotra
Cloud Computing has now successfully emerged as an integral trend in Information Technology market. It is internet-based concept of virtualization. Many failures can occur in computing environment that actually leads to non-availability and non-reliability upon service providers. To ensure this, a mechanism has been proposed in this paper which can deploy the checkpoint module so that faults can be detected timely and shall be removed in due course of time so that reliable and fault free cloud services can be provided to consumers. In this, fault tolerance agent has been used which actually is an intelligent and reliable agent that helps in detecting the malicious faults on time. The proposed framework considers throughout overheads, checkpoints overheads, monetary costs overheads and availability overheads in its performance validation. The proposed framework has been compared with other two frameworks and has been identified that AFTTM outperforms several on-going techniques in fault tolerant techniques.
云计算已经成功地成为信息技术市场的一个重要趋势。它是基于互联网的虚拟化概念。计算环境中可能发生许多故障,这些故障实际上会导致服务提供者的不可用性和不可靠性。为此,本文提出了一种机制,通过部署检查点模块,可以及时发现故障并及时排除故障,从而为消费者提供可靠、无故障的云服务。其中,容错代理是一种智能可靠的代理,能够及时检测出恶意故障。所建议的框架在其性能验证中考虑了总体开销、检查点开销、货币成本开销和可用性开销。将所提出的框架与其他两个框架进行了比较,并确定了AFTTM在容错技术方面优于几种正在进行的技术。
{"title":"AFTTM: Agent-Based Fault Tolerance Trust Mechanism in Cloud Environment","authors":"S. Jaswal, M. Malhotra","doi":"10.4018/ijcac.297105","DOIUrl":"https://doi.org/10.4018/ijcac.297105","url":null,"abstract":"Cloud Computing has now successfully emerged as an integral trend in Information Technology market. It is internet-based concept of virtualization. Many failures can occur in computing environment that actually leads to non-availability and non-reliability upon service providers. To ensure this, a mechanism has been proposed in this paper which can deploy the checkpoint module so that faults can be detected timely and shall be removed in due course of time so that reliable and fault free cloud services can be provided to consumers. In this, fault tolerance agent has been used which actually is an intelligent and reliable agent that helps in detecting the malicious faults on time. The proposed framework considers throughout overheads, checkpoints overheads, monetary costs overheads and availability overheads in its performance validation. The proposed framework has been compared with other two frameworks and has been identified that AFTTM outperforms several on-going techniques in fault tolerant techniques.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT 云辅助物联网的高效无配对身份签名加密方案
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.305216
M. Kiran, S. Pasupuleti, R. Eswari
The Internet of Things (IoT) has become a part of our everyday life. Due to limited storage and computational capabilities, data collected by IoT devices outsource to cloud servers. Although cloud servers provide many benefits, confidentiality and authenticity are the major issues. Signcryption is a cryptographic technique to address the above issues. Several identity-based signcryption schemes are proposed; however, these schemes create heavy computation and communication overhead because of bilinear pairings. This paper proposes an Efficient Pairing-Free Identity-based Signcryption (EPFIBSC) scheme based on Elliptic Curve Cryptography (ECC), which reduces computation and communication overhead. The EPFIBSC scheme's security is proven under Elliptic Curve Discrete Logarithm Problem (ECDLP). The scheme also meets the security requirements such as confidentiality, authenticity, and unforgeability. In performance analysis, the authors compare the scheme with some of the existing schemes; the comparison shows that this scheme is more efficient in computation and communication costs.
物联网(IoT)已经成为我们日常生活的一部分。由于存储和计算能力有限,物联网设备收集的数据外包给云服务器。尽管云服务器提供了许多好处,但保密性和真实性是主要问题。签名加密是一种解决上述问题的加密技术。提出了几种基于身份的签名加密方案;然而,由于双线性配对,这些方案产生了沉重的计算和通信开销。提出了一种基于椭圆曲线密码学(ECC)的高效无配对身份签名加密(EPFIBSC)方案,减少了计算量和通信开销。在椭圆曲线离散对数问题(ECDLP)下证明了EPFIBSC方案的安全性。同时满足机密性、真实性、不可伪造性等安全要求。在性能分析中,将该方案与现有的一些方案进行了比较;比较表明,该方案在计算量和通信成本上都具有较高的效率。
{"title":"Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT","authors":"M. Kiran, S. Pasupuleti, R. Eswari","doi":"10.4018/ijcac.305216","DOIUrl":"https://doi.org/10.4018/ijcac.305216","url":null,"abstract":"The Internet of Things (IoT) has become a part of our everyday life. Due to limited storage and computational capabilities, data collected by IoT devices outsource to cloud servers. Although cloud servers provide many benefits, confidentiality and authenticity are the major issues. Signcryption is a cryptographic technique to address the above issues. Several identity-based signcryption schemes are proposed; however, these schemes create heavy computation and communication overhead because of bilinear pairings. This paper proposes an Efficient Pairing-Free Identity-based Signcryption (EPFIBSC) scheme based on Elliptic Curve Cryptography (ECC), which reduces computation and communication overhead. The EPFIBSC scheme's security is proven under Elliptic Curve Discrete Logarithm Problem (ECDLP). The scheme also meets the security requirements such as confidentiality, authenticity, and unforgeability. In performance analysis, the authors compare the scheme with some of the existing schemes; the comparison shows that this scheme is more efficient in computation and communication costs.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133613789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reservation System for Cloud Computing Resources (RSCC): Immediate Reservation of the Computing Mechanism 云计算资源预留系统(RSCC):计算机制的即时预留
Pub Date : 2022-01-01 DOI: 10.4018/ijcac.311502
Ashish Tiwari, R. Garg
The pay-and-use approach is the basis for the cloud computing services that are currently popular. Resource management is one of the more difficult tasks since it takes a while to identify requests and determine what kind of resources are needed to satisfy the customer's needs. Resource provisioning's goal is to identify and make available the right resources depending on user workload's QoS needs so that applications may make efficient use of the resources. The CSPs now offer advanced resource reserves for both short- and long-term periods. Cloud brokers are required to manage the on-demand cloud resource and maintain track of the SLA list of resource providers for their individual cloud customers in our suggested algorithm RSCC (Reservation System for Cloud Computing). According to the user's needs and cost, the RSCC algorithm functions as a flexible reservation that can accommodate a variety of services. The numerical findings demonstrated that the suggested long-term resource planning method was able to produce operational costs that were almost ideal.
付费使用方法是当前流行的云计算服务的基础。资源管理是比较困难的任务之一,因为它需要花费一些时间来识别请求并确定需要什么样的资源来满足客户的需求。资源配置的目标是根据用户工作负载的QoS需求确定并提供正确的资源,以便应用程序可以有效地利用资源。csp现在为短期和长期提供先进的资源储备。云代理需要管理按需云资源,并在我们建议的算法RSCC(云计算预订系统)中为其单个云客户维护资源提供商的SLA列表。根据用户的需求和成本,RSCC算法作为一种灵活的预约,可以容纳多种服务。数值结果表明,所建议的长期资源规划方法能够产生几乎理想的业务费用。
{"title":"Reservation System for Cloud Computing Resources (RSCC): Immediate Reservation of the Computing Mechanism","authors":"Ashish Tiwari, R. Garg","doi":"10.4018/ijcac.311502","DOIUrl":"https://doi.org/10.4018/ijcac.311502","url":null,"abstract":"The pay-and-use approach is the basis for the cloud computing services that are currently popular. Resource management is one of the more difficult tasks since it takes a while to identify requests and determine what kind of resources are needed to satisfy the customer's needs. Resource provisioning's goal is to identify and make available the right resources depending on user workload's QoS needs so that applications may make efficient use of the resources. The CSPs now offer advanced resource reserves for both short- and long-term periods. Cloud brokers are required to manage the on-demand cloud resource and maintain track of the SLA list of resource providers for their individual cloud customers in our suggested algorithm RSCC (Reservation System for Cloud Computing). According to the user's needs and cost, the RSCC algorithm functions as a flexible reservation that can accommodate a variety of services. The numerical findings demonstrated that the suggested long-term resource planning method was able to produce operational costs that were almost ideal.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128870522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Int. J. Cloud Appl. Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1