首页 > 最新文献

Int. J. Cloud Appl. Comput.最新文献

英文 中文
A Bio-Inspired and Heuristic-Based Hybrid Algorithm for Effective Performance With Load Balancing in Cloud Environment 云环境下负载均衡的生物启发和启发式混合算法
Pub Date : 2021-10-01 DOI: 10.4018/IJCAC.2021100104
Soumen Swarnakar, Souvik Bhattacharya, Chandan Banerjee
In a cloud computing environment, effective scheduling policies and load balancing have always been the aim. An efficient task scheduler must be proficient in a dynamically distributed environment and to the policy of efficient scheduling of jobs based upon the workload. In this research, a novel hybrid heuristic algorithm is developed for balancing the load among cloud nodes. This is achieved by hybridizing the existing ant colony optimization (ACO), artificial bee colony algorithm (ABC), and AHP (analytical hierarchy process) algorithm. The AHP algorithm and the artificial bee colony (ABC) algorithm is used for figuring out the best servers suitable for a particular job, and the ant colony algorithm is used to find the most efficient path to that particular server. The proposed algorithm is better in resource utilization. It also performs better load balancing, which keeps on improving with time. The result analysis shows better average response time and better average makespan time compared to other two existing algorithms.
在云计算环境中,有效的调度策略和负载平衡一直是目标。高效的任务调度器必须精通动态分布式环境和基于工作负载的高效作业调度策略。在本研究中,提出了一种新的混合启发式算法来平衡云节点之间的负载。这是通过混合现有的蚁群优化(ACO)、人工蜂群算法(ABC)和层次分析法(AHP)算法来实现的。采用AHP算法和人工蜂群(artificial bee colony, ABC)算法计算出适合某一特定作业的最佳服务器,采用蚁群算法寻找到该特定服务器的最有效路径。该算法具有较好的资源利用率。它还具有更好的负载平衡,并且随着时间的推移而不断改进。结果分析表明,与其他两种现有算法相比,该算法具有更好的平均响应时间和平均完工时间。
{"title":"A Bio-Inspired and Heuristic-Based Hybrid Algorithm for Effective Performance With Load Balancing in Cloud Environment","authors":"Soumen Swarnakar, Souvik Bhattacharya, Chandan Banerjee","doi":"10.4018/IJCAC.2021100104","DOIUrl":"https://doi.org/10.4018/IJCAC.2021100104","url":null,"abstract":"In a cloud computing environment, effective scheduling policies and load balancing have always been the aim. An efficient task scheduler must be proficient in a dynamically distributed environment and to the policy of efficient scheduling of jobs based upon the workload. In this research, a novel hybrid heuristic algorithm is developed for balancing the load among cloud nodes. This is achieved by hybridizing the existing ant colony optimization (ACO), artificial bee colony algorithm (ABC), and AHP (analytical hierarchy process) algorithm. The AHP algorithm and the artificial bee colony (ABC) algorithm is used for figuring out the best servers suitable for a particular job, and the ant colony algorithm is used to find the most efficient path to that particular server. The proposed algorithm is better in resource utilization. It also performs better load balancing, which keeps on improving with time. The result analysis shows better average response time and better average makespan time compared to other two existing algorithms.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131489784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure Healthcare Monitoring Sensor Cloud With Attribute-Based Elliptical Curve Cryptography 使用基于属性的椭圆曲线加密保护医疗监控传感器云
Pub Date : 2021-07-01 DOI: 10.4018/IJCAC.2021070101
Rajendra Kumar Dwivedi, Rakesh Kumar, R. Buyya
Sensor networks are integrated with cloud in many internet of things (IoT) applications for various benefits. Healthcare monitoring sensor cloud is one of the application that allows storing the patients' health data generated by their wearable sensors at cloud and facilitates the authorized doctors to monitor and advise them remotely. Patients' data at cloud must be secure. Existing security schemes (e.g., key policy attribute-based encryption [KP-ABE] and ciphertext policy attribute-based encryption [CP-ABE]) have higher computational overheads. In this paper, a security mechanism called attribute-based elliptical curve cryptography (ABECC) is proposed that guarantees data integrity, data confidentiality, and fine-grained access control. It also reduces the computational overheads. ABECC is implemented in .NET framework. Use of elliptical curve cryptography (ECC) in ABECC reduces the key length, thereby improving the encryption, decryption, and key generation time. It is observed that ABECC is 1.7 and 1.4 times faster than the existing approaches of KP-ABE and CP-ABE, respectively.
在许多物联网(IoT)应用中,传感器网络与云集成以获得各种好处。医疗监测传感器云是将可穿戴传感器生成的患者健康数据存储在云上,方便授权医生远程监测和建议的应用程序之一。病人在云端的数据必须是安全的。现有的安全方案(例如,基于密钥策略属性的加密[KP-ABE]和基于密文策略属性的加密[CP-ABE])具有更高的计算开销。本文提出了一种基于属性的椭圆曲线加密(ABECC)安全机制,以保证数据完整性、数据机密性和细粒度访问控制。它还减少了计算开销。ABECC是在。net框架中实现的。在ABECC中使用椭圆曲线加密(ECC),减少了密钥长度,从而提高了加密、解密和密钥生成时间。ABECC分别比现有的KP-ABE和CP-ABE方法快1.7倍和1.4倍。
{"title":"Secure Healthcare Monitoring Sensor Cloud With Attribute-Based Elliptical Curve Cryptography","authors":"Rajendra Kumar Dwivedi, Rakesh Kumar, R. Buyya","doi":"10.4018/IJCAC.2021070101","DOIUrl":"https://doi.org/10.4018/IJCAC.2021070101","url":null,"abstract":"Sensor networks are integrated with cloud in many internet of things (IoT) applications for various benefits. Healthcare monitoring sensor cloud is one of the application that allows storing the patients' health data generated by their wearable sensors at cloud and facilitates the authorized doctors to monitor and advise them remotely. Patients' data at cloud must be secure. Existing security schemes (e.g., key policy attribute-based encryption [KP-ABE] and ciphertext policy attribute-based encryption [CP-ABE]) have higher computational overheads. In this paper, a security mechanism called attribute-based elliptical curve cryptography (ABECC) is proposed that guarantees data integrity, data confidentiality, and fine-grained access control. It also reduces the computational overheads. ABECC is implemented in .NET framework. Use of elliptical curve cryptography (ECC) in ABECC reduces the key length, thereby improving the encryption, decryption, and key generation time. It is observed that ABECC is 1.7 and 1.4 times faster than the existing approaches of KP-ABE and CP-ABE, respectively.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117234068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting Compromised Social Network Accounts Using Deep Learning for Behavior and Text Analyses 使用深度学习进行行为和文本分析来检测受损的社交网络帐户
Pub Date : 2021-04-01 DOI: 10.4018/IJCAC.2021040106
Steven Yen, M. Moh, Teng-Sheng Moh
Social networks allow people to connect to one another. Over time, these accounts become an essential part of one's online identity. The account stores various personal data and contains one's network of acquaintances. Attackers seek to compromise user accounts for various malicious purposes, such as distributing spam, phishing, and much more. Timely detection of compromises becomes crucial for protecting users and social networks. This article proposes a novel system for detecting compromises of a social network account by considering both post behavior and textual content. A deep multi-layer perceptron-based autoencoder is leveraged to consolidate diverse features and extract underlying relationships. Experiments show that the proposed system outperforms previous techniques that considered only behavioral information. The authors believe that this work is well-timed, significant especially in the world that has been largely locked down by the COVID-19 pandemic and thus depends much more on reliable social networks to stay connected.
社交网络允许人们彼此联系。随着时间的推移,这些账户成为一个人在线身份的重要组成部分。该账户存储了各种个人数据,并包含了一个人的熟人网络。攻击者试图破坏用户帐户,以达到各种恶意目的,例如分发垃圾邮件、网络钓鱼等等。及时发现威胁对于保护用户和社交网络至关重要。本文提出了一种通过考虑帖子行为和文本内容来检测社交网络帐户妥协的新系统。利用深度多层感知器的自编码器来整合不同的特征并提取潜在的关系。实验表明,所提出的系统优于先前仅考虑行为信息的技术。作者认为,这项工作恰逢其时,尤其是在因COVID-19大流行而基本上被封锁的世界,因此更多地依赖于可靠的社交网络来保持联系,这一点尤为重要。
{"title":"Detecting Compromised Social Network Accounts Using Deep Learning for Behavior and Text Analyses","authors":"Steven Yen, M. Moh, Teng-Sheng Moh","doi":"10.4018/IJCAC.2021040106","DOIUrl":"https://doi.org/10.4018/IJCAC.2021040106","url":null,"abstract":"Social networks allow people to connect to one another. Over time, these accounts become an essential part of one's online identity. The account stores various personal data and contains one's network of acquaintances. Attackers seek to compromise user accounts for various malicious purposes, such as distributing spam, phishing, and much more. Timely detection of compromises becomes crucial for protecting users and social networks. This article proposes a novel system for detecting compromises of a social network account by considering both post behavior and textual content. A deep multi-layer perceptron-based autoencoder is leveraged to consolidate diverse features and extract underlying relationships. Experiments show that the proposed system outperforms previous techniques that considered only behavioral information. The authors believe that this work is well-timed, significant especially in the world that has been largely locked down by the COVID-19 pandemic and thus depends much more on reliable social networks to stay connected.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129584848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Gaussian Distribution-Based Machine Learning Scheme for Anomaly Detection in Healthcare Sensor Cloud 基于高斯分布的医疗传感器云异常检测机器学习方案
Pub Date : 2021-01-01 DOI: 10.4018/ijcac.2021010103
Rajendra Kumar Dwivedi, Rakesh Kumar, R. Buyya
Smart information systems are based on sensors that generate a huge amount of data. This data can be stored in cloud for further processing and efficient utilization. Anomalous data might be present within the sensor data due to various reasons (e.g., malicious activities by intruders, low quality sensors, and node deployment in harsh environments). Anomaly detection is crucial in some applications such as healthcare monitoring systems, forest fire information systems, and other internet of things (IoT) systems. This paper proposes a Gaussian distribution-based supervised machine learning scheme of anomaly detection (GDA) for healthcare monitoring sensor cloud, which is an integration of various body sensors of different patients and cloud. This work is implemented in Python. Use of Gaussian statistical model in the proposed scheme improves precision, throughput, and efficiency. GDA provides 98% efficiency with 3% and 4% improvements as compared to the other supervised learning-based anomaly detection schemes (e.g., support vector machine [SVM] and self-organizing map [SOM], respectively).
智能信息系统是基于产生大量数据的传感器。这些数据可以存储在云中,以便进一步处理和有效利用。由于各种原因(例如,入侵者的恶意活动、低质量传感器和恶劣环境中的节点部署),传感器数据中可能存在异常数据。异常检测在医疗监控系统、森林火灾信息系统和其他物联网(IoT)系统等应用中至关重要。本文提出了一种基于高斯分布的医疗监测传感器云异常检测(GDA)监督机器学习方案,该方案是不同患者的各种身体传感器与云的集成。这项工作是用Python实现的。该方案采用高斯统计模型,提高了精度、吞吐量和效率。与其他基于监督学习的异常检测方案(例如,支持向量机[SVM]和自组织映射[SOM])相比,GDA提供了98%的效率,分别提高了3%和4%。
{"title":"Gaussian Distribution-Based Machine Learning Scheme for Anomaly Detection in Healthcare Sensor Cloud","authors":"Rajendra Kumar Dwivedi, Rakesh Kumar, R. Buyya","doi":"10.4018/ijcac.2021010103","DOIUrl":"https://doi.org/10.4018/ijcac.2021010103","url":null,"abstract":"Smart information systems are based on sensors that generate a huge amount of data. This data can be stored in cloud for further processing and efficient utilization. Anomalous data might be present within the sensor data due to various reasons (e.g., malicious activities by intruders, low quality sensors, and node deployment in harsh environments). Anomaly detection is crucial in some applications such as healthcare monitoring systems, forest fire information systems, and other internet of things (IoT) systems. This paper proposes a Gaussian distribution-based supervised machine learning scheme of anomaly detection (GDA) for healthcare monitoring sensor cloud, which is an integration of various body sensors of different patients and cloud. This work is implemented in Python. Use of Gaussian statistical model in the proposed scheme improves precision, throughput, and efficiency. GDA provides 98% efficiency with 3% and 4% improvements as compared to the other supervised learning-based anomaly detection schemes (e.g., support vector machine [SVM] and self-organizing map [SOM], respectively).","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130778240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Robust and Efficient MCDM-Based Framework for Cloud Service Selection Using Modified TOPSIS 基于改进TOPSIS的基于mcdm的云服务选择框架
Pub Date : 2021-01-01 DOI: 10.4018/ijcac.2021010102
R. Tiwari, R. Kumar
Cloud computing has become a business model and organizations like Google, Amazon, etc. are investing huge capital on it. The availability of many organizations in the cloud has posed a challenge for cloud users to choose a best cloud service. To assist the cloud users, we have proposed a MCDM-based cloud service selection framework to choose a best service provider based on QoS requirement. The cloud service selection methods based on TOPSIS suffers from rank reversal problem as it ranks optimal service provider to non-optimal on addition or removal of a service provider and deludes the cloud user. Therefore, a robust and efficient TOPSIS (RE-TOPSIS)-based novel framework has been proposed to rank the cloud service providers using QoS provided by them and cloud user's priority for each QoS. The proposed framework is robust to rank reversal problem and its effectiveness has been demonstrated through a case study performed on a real dataset. Sensitivity analysis has also been performed to show the robustness against the rank reversal phenomenon.
云计算已经成为一种商业模式,像谷歌、亚马逊等公司都在云计算上投入了大量资金。云中的许多组织的可用性对云用户选择最佳云服务提出了挑战。为了帮助云用户,我们提出了一个基于mcdm的云服务选择框架,根据QoS需求选择最佳的服务提供商。基于TOPSIS的云服务选择方法在增加或删除服务提供商时将最优服务提供商排序为非最优服务提供商,从而使云用户产生错觉,存在排名反转问题。为此,提出了一种鲁棒高效的基于TOPSIS (RE-TOPSIS)的新框架,利用云服务提供商提供的QoS和云用户对每个QoS的优先级对云服务提供商进行排序。该框架对秩反转问题具有鲁棒性,并通过一个实际数据集的案例研究证明了其有效性。敏感性分析也被执行,以显示对秩反转现象的稳健性。
{"title":"A Robust and Efficient MCDM-Based Framework for Cloud Service Selection Using Modified TOPSIS","authors":"R. Tiwari, R. Kumar","doi":"10.4018/ijcac.2021010102","DOIUrl":"https://doi.org/10.4018/ijcac.2021010102","url":null,"abstract":"Cloud computing has become a business model and organizations like Google, Amazon, etc. are investing huge capital on it. The availability of many organizations in the cloud has posed a challenge for cloud users to choose a best cloud service. To assist the cloud users, we have proposed a MCDM-based cloud service selection framework to choose a best service provider based on QoS requirement. The cloud service selection methods based on TOPSIS suffers from rank reversal problem as it ranks optimal service provider to non-optimal on addition or removal of a service provider and deludes the cloud user. Therefore, a robust and efficient TOPSIS (RE-TOPSIS)-based novel framework has been proposed to rank the cloud service providers using QoS provided by them and cloud user's priority for each QoS. The proposed framework is robust to rank reversal problem and its effectiveness has been demonstrated through a case study performed on a real dataset. Sensitivity analysis has also been performed to show the robustness against the rank reversal phenomenon.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125546951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Determinants of Cloud Business Intelligence Adoption Among Ghanaian SMEs 加纳中小企业采用云商业智能的决定因素
Pub Date : 2020-10-01 DOI: 10.4018/IJCAC.2020100104
A. Owusu
This study explores the determinants of Cloud BI adoption among Ghanaian small-medium enterprises (SMEs). The study was guided by the technology-organization-environment (TOE) framework and information systems adoption model and employed the qualitative method through an in-depth interview with data collected from CEOs/key managers from 17 SMEs in Ghana. The results showed that technological characteristics (relative advantage, complexity, and compatibility), organizational characteristics (organization size and organizational readiness), environmental characteristics (competitive pressure and regulatory framework), and owner-manager characteristics (innovativeness and knowledge) influence the adoption of Cloud BI tools and services in Ghanaian SMEs. This study contributes to the body of knowledge by providing a Cloud BI adoption model from a developing country context. Practically, the study provides insights to vendors about the kind of Cloud BI Ghanaian SMEs require. Vendors can also use the findings to create awareness about the services they offer in terms of Cloud BI.
本研究探讨了加纳中小企业(SMEs)采用云商业智能的决定因素。该研究以技术-组织-环境(TOE)框架和信息系统采用模型为指导,并采用定性方法,通过深入访谈从加纳17家中小企业的首席执行官/主要经理那里收集的数据。结果表明,技术特征(相对优势、复杂性和兼容性)、组织特征(组织规模和组织准备程度)、环境特征(竞争压力和监管框架)和所有者-管理者特征(创新性和知识性)影响着加纳中小企业采用云商业智能工具和服务。本研究通过提供发展中国家背景下的云商业智能采用模型,为知识体系做出了贡献。实际上,该研究为供应商提供了关于加纳中小企业所需的云BI类型的见解。供应商还可以利用这些发现来提高他们在云商业智能方面提供的服务的知名度。
{"title":"Determinants of Cloud Business Intelligence Adoption Among Ghanaian SMEs","authors":"A. Owusu","doi":"10.4018/IJCAC.2020100104","DOIUrl":"https://doi.org/10.4018/IJCAC.2020100104","url":null,"abstract":"This study explores the determinants of Cloud BI adoption among Ghanaian small-medium enterprises (SMEs). The study was guided by the technology-organization-environment (TOE) framework and information systems adoption model and employed the qualitative method through an in-depth interview with data collected from CEOs/key managers from 17 SMEs in Ghana. The results showed that technological characteristics (relative advantage, complexity, and compatibility), organizational characteristics (organization size and organizational readiness), environmental characteristics (competitive pressure and regulatory framework), and owner-manager characteristics (innovativeness and knowledge) influence the adoption of Cloud BI tools and services in Ghanaian SMEs. This study contributes to the body of knowledge by providing a Cloud BI adoption model from a developing country context. Practically, the study provides insights to vendors about the kind of Cloud BI Ghanaian SMEs require. Vendors can also use the findings to create awareness about the services they offer in terms of Cloud BI.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116423832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Proposed Technique for Efficient Cloud Computing Model in Effective Digital Training Towards Sustainable Livelihoods for Unemployed Youths 为失业青年提供可持续生计的有效数字化培训的高效云计算模型建议技术
Pub Date : 2020-10-01 DOI: 10.4018/IJCAC.2020100102
Ritu Bansal, V. Singh
This research work seeks to suggest the development of an efficient cloud computing system to show that the various forms of effective online learning for sustainable livelihoods for unemployed youth are accountable for and lead to a number of factors. In the scope of sustainable livelihoods for unemployed people, it also aims to recognize certain fields of data analysis and their interrelationship. One question seems to bubble to the surface more than any other in the authors' discussions with clients, friends, and peers: How does successful online learning for sustainable living for unemployed youth explain switching to the cloud? Cloud computing could allow more adequate performance of its own efficient distributed tools through the SaaS system; therefore, both design the cloud computing SaaS distribution framework for unemployed youth talent learning. This article proposes an efficient cloud computing system strategy for active online learning for unemployed youth sustainable livelihoods.
这项研究工作旨在建议开发一种高效的云计算系统,以表明失业青年可持续生计的各种形式的有效在线学习是负责任的,并导致了许多因素。在失业人员可持续生计的范围内,它还旨在确认某些数据分析领域及其相互关系。在作者与客户、朋友和同行的讨论中,有一个问题似乎比其他任何问题都更容易浮出水面:失业青年可持续生活的成功在线学习如何解释转向云计算?云计算可以通过SaaS系统让自己的高效分布式工具发挥更充分的性能;因此,双方设计了面向失业青年人才学习的云计算SaaS分布框架。本文提出了一种有效的云计算系统策略,用于失业青年的主动在线学习和可持续生计。
{"title":"Proposed Technique for Efficient Cloud Computing Model in Effective Digital Training Towards Sustainable Livelihoods for Unemployed Youths","authors":"Ritu Bansal, V. Singh","doi":"10.4018/IJCAC.2020100102","DOIUrl":"https://doi.org/10.4018/IJCAC.2020100102","url":null,"abstract":"This research work seeks to suggest the development of an efficient cloud computing system to show that the various forms of effective online learning for sustainable livelihoods for unemployed youth are accountable for and lead to a number of factors. In the scope of sustainable livelihoods for unemployed people, it also aims to recognize certain fields of data analysis and their interrelationship. One question seems to bubble to the surface more than any other in the authors' discussions with clients, friends, and peers: How does successful online learning for sustainable living for unemployed youth explain switching to the cloud? Cloud computing could allow more adequate performance of its own efficient distributed tools through the SaaS system; therefore, both design the cloud computing SaaS distribution framework for unemployed youth talent learning. This article proposes an efficient cloud computing system strategy for active online learning for unemployed youth sustainable livelihoods.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130956117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Execution of Long-Duration Multi-Cloud Serverless Functions Using Selective Migration-Based Approach 使用基于选择性迁移的方法执行长时间多云无服务器功能
Pub Date : 2020-10-01 DOI: 10.4018/IJCAC.2020100105
B. Soltani, Afifa Ghenai, N. Zeghib
A relatively new paradigm for the Cloud-based software deployment is serverless computing. By adopting stateless loosely-coupled functions, the system can obtain many compositions for several purposes. Contrarily to monolithic approach, serverless computing facilitates the evolution of the applications, since the functions may be independently scheduled for reconstitution. Nevertheless, serverless computing dictates that function execution should be within a short duration (five minutes max in most Cloud platforms), after which the function is abruptly ended even if it has not completed its task. This leads to prevent functions requiring longer time from being adopted as Serverless functions. This paper deals with this drawback. It proposes a migration-based approach that promotes the execution of long-duration serverless functions: each running function that reaches the maximum time limit is repeatedly transferred to another cloud platform where it is carried on. At each migration step, the destination cloud is selected regarding the most relevant criteria.
基于云的软件部署的一个相对较新的范例是无服务器计算。通过采用无状态松耦合函数,系统可以获得多种用途的组合。与单片方法相反,无服务器计算促进了应用程序的发展,因为功能可以独立地安排重组。然而,无服务器计算要求函数的执行应该在很短的时间内(在大多数云平台中最多5分钟),在此之后,即使函数没有完成其任务,也会突然结束。这将防止需要较长时间的功能被采用为无服务器功能。本文论述了这一缺陷。它提出了一种基于迁移的方法,促进长时间无服务器功能的执行:每个达到最大时间限制的运行功能被反复转移到另一个云平台,在那里继续运行。在每个迁移步骤中,根据最相关的标准选择目标云。
{"title":"Execution of Long-Duration Multi-Cloud Serverless Functions Using Selective Migration-Based Approach","authors":"B. Soltani, Afifa Ghenai, N. Zeghib","doi":"10.4018/IJCAC.2020100105","DOIUrl":"https://doi.org/10.4018/IJCAC.2020100105","url":null,"abstract":"A relatively new paradigm for the Cloud-based software deployment is serverless computing. By adopting stateless loosely-coupled functions, the system can obtain many compositions for several purposes. Contrarily to monolithic approach, serverless computing facilitates the evolution of the applications, since the functions may be independently scheduled for reconstitution. Nevertheless, serverless computing dictates that function execution should be within a short duration (five minutes max in most Cloud platforms), after which the function is abruptly ended even if it has not completed its task. This leads to prevent functions requiring longer time from being adopted as Serverless functions. This paper deals with this drawback. It proposes a migration-based approach that promotes the execution of long-duration serverless functions: each running function that reaches the maximum time limit is repeatedly transferred to another cloud platform where it is carried on. At each migration step, the destination cloud is selected regarding the most relevant criteria.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130861103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-Factor Performance Comparison of Amazon Web Services Elastic Compute Cluster and Google Cloud Platform Compute Engine Amazon Web Services弹性计算集群与Google云平台计算引擎的多因素性能比较
Pub Date : 2020-07-01 DOI: 10.4018/ijcac.2020070101
S. Ahuja, Emily Czarnecki, Sean Willison
Cloud computing has rapidly become a viable competitor to on-premise infrastructure from both management and cost perspectives. This research provides insight into cluster computing performance and variability in cloud-provisioned infrastructure from two popular public cloud providers. A comparative examination of the two cloud platforms using synthetic benchmarks is provided. In this article, we compared the performance of Amazon Web Services Elastic Compute Cluster (EC2) to the Google Cloud Platform (GCP) Compute Engine using three benchmarks: STREAM, IOR, and NPB-EP. Experiments were conducted on clusters with increasing nodes from one to eight. We also performed experiments over the course of two weeks where benchmarks were run at similar times. The benchmarks provided performance metrics for bandwidth (STREAM), read and write performance (IOR), and operations per second (NPB-EP). We found that EC2 outperformed GCP for bandwidth. Both provided good scalability and reliability for bandwidth with GCP showing a slight deviation during the two-week trial. GCP outperformed EC2 in both the read and write tests (IOR) as well as the operations per second test. However, GCP was extremely variable during the read and write tests over the two-week trial. Overall, each platform excelled in different benchmarks and we found EC2 to be more reliable in general.
从管理和成本的角度来看,云计算已经迅速成为内部部署基础设施的有力竞争者。本研究提供了对来自两个流行的公共云提供商的云配置基础设施的集群计算性能和可变性的见解。本文使用综合基准对这两个云平台进行了比较分析。在本文中,我们使用三个基准测试:STREAM、IOR和NPB-EP,比较了Amazon Web Services Elastic Compute Cluster (EC2)和Google Cloud Platform (GCP)计算引擎的性能。在节点从1个增加到8个的集群上进行实验。我们还进行了为期两周的实验,在相似的时间运行基准测试。基准测试提供了带宽(STREAM)、读写性能(IOR)和每秒操作数(NPB-EP)的性能指标。我们发现EC2在带宽方面优于GCP。两者都提供了良好的带宽可扩展性和可靠性,在为期两周的试用期间,GCP略有偏差。GCP在读写测试(IOR)以及每秒操作数测试中都优于EC2。然而,在为期两周的试验中,GCP在读写测试期间变化很大。总的来说,每个平台在不同的基准测试中都表现出色,我们发现EC2总体上更可靠。
{"title":"Multi-Factor Performance Comparison of Amazon Web Services Elastic Compute Cluster and Google Cloud Platform Compute Engine","authors":"S. Ahuja, Emily Czarnecki, Sean Willison","doi":"10.4018/ijcac.2020070101","DOIUrl":"https://doi.org/10.4018/ijcac.2020070101","url":null,"abstract":"Cloud computing has rapidly become a viable competitor to on-premise infrastructure from both management and cost perspectives. This research provides insight into cluster computing performance and variability in cloud-provisioned infrastructure from two popular public cloud providers. A comparative examination of the two cloud platforms using synthetic benchmarks is provided. In this article, we compared the performance of Amazon Web Services Elastic Compute Cluster (EC2) to the Google Cloud Platform (GCP) Compute Engine using three benchmarks: STREAM, IOR, and NPB-EP. Experiments were conducted on clusters with increasing nodes from one to eight. We also performed experiments over the course of two weeks where benchmarks were run at similar times. The benchmarks provided performance metrics for bandwidth (STREAM), read and write performance (IOR), and operations per second (NPB-EP). We found that EC2 outperformed GCP for bandwidth. Both provided good scalability and reliability for bandwidth with GCP showing a slight deviation during the two-week trial. GCP outperformed EC2 in both the read and write tests (IOR) as well as the operations per second test. However, GCP was extremely variable during the read and write tests over the two-week trial. Overall, each platform excelled in different benchmarks and we found EC2 to be more reliable in general.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126438119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing 基于快速通量云计算的快速通量僵尸网络检测研究
Pub Date : 2020-07-01 DOI: 10.4018/ijcac.2020070102
Ahmad Al Nawasrah, Ammar Almomani, Samer H. Atawneh, Mohammad Alauthman
A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and control (C&C) servers are the backbone of botnet communications, in which bots send a report to the botmaster, and the latter sends attack orders to those bots. Botnets are also categorized according to their C&C protocols, such as internet relay chat (IRC) and peer-to-peer (P2P) botnets. A domain name system (DNS) method known as fast-flux is used by bot herders to cover malicious botnet activities and increase the lifetime of malicious servers by quickly changing the IP addresses of the domain names over time. Several methods have been suggested to detect fast-flux domains. However, these methods achieve low detection accuracy, especially for zero-day domains. They also entail a significantly long detection time and consume high memory storage. In this survey, we present an overview of the various techniques used to detect fast-flux domains according to solution scopes, namely, host-based, router-based, DNS-based, and cloud computing techniques. This survey provides an understanding of the problem, its current solution space, and the future research directions expected.
僵尸网络指的是一组被攻击者远程控制的受损机器。僵尸网络被认为是全球众多安全威胁的基础。命令和控制(C&C)服务器是僵尸网络通信的骨干,其中机器人向僵尸主机发送报告,后者向这些机器人发送攻击命令。僵尸网络还根据其C&C协议进行分类,例如互联网中继聊天(IRC)和点对点(P2P)僵尸网络。被称为快速通量的域名系统(DNS)方法被bot牧人使用,以覆盖恶意僵尸网络活动,并通过随着时间的推移快速更改域名的IP地址来增加恶意服务器的生命周期。提出了几种检测快通量域的方法。然而,这些方法的检测精度较低,特别是对于零日域。它们还需要很长的检测时间和消耗高内存存储。在本调查中,我们根据解决方案范围概述了用于检测快速通量域的各种技术,即基于主机的、基于路由器的、基于dns的和云计算技术。本调查提供了对问题的理解,目前的解决空间,以及未来的研究方向。
{"title":"A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing","authors":"Ahmad Al Nawasrah, Ammar Almomani, Samer H. Atawneh, Mohammad Alauthman","doi":"10.4018/ijcac.2020070102","DOIUrl":"https://doi.org/10.4018/ijcac.2020070102","url":null,"abstract":"A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and control (C&C) servers are the backbone of botnet communications, in which bots send a report to the botmaster, and the latter sends attack orders to those bots. Botnets are also categorized according to their C&C protocols, such as internet relay chat (IRC) and peer-to-peer (P2P) botnets. A domain name system (DNS) method known as fast-flux is used by bot herders to cover malicious botnet activities and increase the lifetime of malicious servers by quickly changing the IP addresses of the domain names over time. Several methods have been suggested to detect fast-flux domains. However, these methods achieve low detection accuracy, especially for zero-day domains. They also entail a significantly long detection time and consume high memory storage. In this survey, we present an overview of the various techniques used to detect fast-flux domains according to solution scopes, namely, host-based, router-based, DNS-based, and cloud computing techniques. This survey provides an understanding of the problem, its current solution space, and the future research directions expected.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129505725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Int. J. Cloud Appl. Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1