首页 > 最新文献

Journal of Cloud Computing最新文献

英文 中文
A cost-efficient content distribution optimization model for fog-based content delivery networks 基于雾的内容分发网络的低成本高效率内容分发优化模型
Pub Date : 2024-09-17 DOI: 10.1186/s13677-024-00695-9
Prateek Yadav, Subrat Kar
The massive data demand requires content distribution networks (CDNs) to use evolving techniques for efficient content distribution with guaranteed quality of service (QoS). The distributed fog-based CDN model, with optimal fog node placements, is a suggested aproach by researchers to meet this demand. While many studies have focused on improving QoS by optimizing fog node placement, they have rarely considered the impact on content distribution, affected by placement, usage changes, and delivery rates. Therefore, the practical approach to fog node placement for CDN services must examine its impact on content distribution. Further, current research on fog-based CDN lacks formal methods to address key challenges: R1) strategic placement of fog nodes to process end-user requests; R2) construction of a content distribution path with guaranteed QoS; R3) cost minimization of building a fog-based CDN model. We construct this as a joint optimization problem by considering four parameters: geographical regions, open public Wi-Fi access points (OPWAPs) locations, QoS, and cost to achieve research objectives R1–R3. As a solution, we propose a dual-step framework. First, a heuristic for optimal fog node placement based on geographic regions and OPWAP locations is proposed. Second, we propose two algorithms, Greedy Performance-based Node Selection (GPDS) and Greedy Fog Node Selection algorithm (GFNSA), for selecting fog nodes, minimizing the cost of building a fog-based CDN while achieving optimal content distribution paths. The results demonstrate that the proposed methods outperform the baseline techniques and provide near-optimal solutions to the problem.
海量数据需求要求内容分发网络(CDN)采用不断发展的技术,在保证服务质量(QoS)的前提下高效分发内容。为满足这一需求,研究人员建议采用基于分布式雾的 CDN 模型,并优化雾节点位置。虽然许多研究都侧重于通过优化雾节点位置来提高 QoS,但很少考虑到受位置、使用变化和传输速率影响的内容分发。因此,CDN 服务的雾节点布局实用方法必须考虑其对内容分发的影响。此外,目前对基于雾的 CDN 的研究缺乏应对关键挑战的正式方法:R1) 处理终端用户请求的雾节点战略布局;R2) 构建有 QoS 保证的内容分发路径;R3) 构建基于雾的 CDN 模型的成本最小化。为了实现 R1-R3 的研究目标,我们将其构建为一个联合优化问题,考虑了四个参数:地理区域、开放式公共 Wi-Fi 接入点(OPWAP)位置、QoS 和成本。作为解决方案,我们提出了一个双步骤框架。首先,我们提出了基于地理区域和 OPWAP 位置的最佳雾节点位置启发式。其次,我们提出了两种选择雾节点的算法,即基于性能的贪婪节点选择算法(GPDS)和贪婪雾节点选择算法(GFNSA),在实现最佳内容分发路径的同时,最大限度地降低构建基于雾的 CDN 的成本。结果表明,所提出的方法优于基线技术,并为问题提供了接近最优的解决方案。
{"title":"A cost-efficient content distribution optimization model for fog-based content delivery networks","authors":"Prateek Yadav, Subrat Kar","doi":"10.1186/s13677-024-00695-9","DOIUrl":"https://doi.org/10.1186/s13677-024-00695-9","url":null,"abstract":"The massive data demand requires content distribution networks (CDNs) to use evolving techniques for efficient content distribution with guaranteed quality of service (QoS). The distributed fog-based CDN model, with optimal fog node placements, is a suggested aproach by researchers to meet this demand. While many studies have focused on improving QoS by optimizing fog node placement, they have rarely considered the impact on content distribution, affected by placement, usage changes, and delivery rates. Therefore, the practical approach to fog node placement for CDN services must examine its impact on content distribution. Further, current research on fog-based CDN lacks formal methods to address key challenges: R1) strategic placement of fog nodes to process end-user requests; R2) construction of a content distribution path with guaranteed QoS; R3) cost minimization of building a fog-based CDN model. We construct this as a joint optimization problem by considering four parameters: geographical regions, open public Wi-Fi access points (OPWAPs) locations, QoS, and cost to achieve research objectives R1–R3. As a solution, we propose a dual-step framework. First, a heuristic for optimal fog node placement based on geographic regions and OPWAP locations is proposed. Second, we propose two algorithms, Greedy Performance-based Node Selection (GPDS) and Greedy Fog Node Selection algorithm (GFNSA), for selecting fog nodes, minimizing the cost of building a fog-based CDN while achieving optimal content distribution paths. The results demonstrate that the proposed methods outperform the baseline techniques and provide near-optimal solutions to the problem.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward security quantification of serverless computing 实现无服务器计算的安全量化
Pub Date : 2024-09-17 DOI: 10.1186/s13677-024-00703-y
Kan Ni, Subrota Kumar Mondal, H M Dipu Kabir, Tian Tan, Hong-Ning Dai
Serverless computing is one of the recent compelling paradigms in cloud computing. Serverless computing can quickly run user applications and services regardless of the underlying server architecture. Despite the availability of several commercial and open-source serverless platforms, there are still some open issues and challenges to address. One of the key concerns in serverless computing platforms is security. Therefore, in this paper, we present a multi-layer abstract model of serverless computing for an security investigation. We conduct a quantitative analysis of security risks for each layer. We observe that the Attack Tree and Attack-Defense Tree methodologies are viable approaches in this regard. Consequently, we make use of the Attack Tree and the Attack-Defense Tree to quantify the security risks and countermeasures of serverless computing. We also propose a novel measure called the Relative Risk Matrix (RRM) to quantify the probability of attack success. Stakeholders including application developers, researchers, and cloud providers can potentially apply these findings and implications to better understand and further enhance the security of serverless computing.
无服务器计算是近期云计算领域引人注目的范例之一。无服务器计算可以不受底层服务器架构的限制,快速运行用户应用程序和服务。尽管已有多个商用和开源无服务器平台,但仍有一些开放性问题和挑战需要解决。无服务器计算平台的关键问题之一是安全性。因此,在本文中,我们提出了无服务器计算的多层抽象模型,以进行安全调查。我们对每一层的安全风险进行了定量分析。我们发现,攻击树和攻击防御树方法在这方面是可行的。因此,我们利用攻击树和攻击防御树来量化无服务器计算的安全风险和对策。我们还提出了一种名为 "相对风险矩阵"(RRM)的新方法来量化攻击成功的概率。包括应用开发人员、研究人员和云提供商在内的利益相关者可以应用这些发现和影响,更好地理解和进一步增强无服务器计算的安全性。
{"title":"Toward security quantification of serverless computing","authors":"Kan Ni, Subrota Kumar Mondal, H M Dipu Kabir, Tian Tan, Hong-Ning Dai","doi":"10.1186/s13677-024-00703-y","DOIUrl":"https://doi.org/10.1186/s13677-024-00703-y","url":null,"abstract":"Serverless computing is one of the recent compelling paradigms in cloud computing. Serverless computing can quickly run user applications and services regardless of the underlying server architecture. Despite the availability of several commercial and open-source serverless platforms, there are still some open issues and challenges to address. One of the key concerns in serverless computing platforms is security. Therefore, in this paper, we present a multi-layer abstract model of serverless computing for an security investigation. We conduct a quantitative analysis of security risks for each layer. We observe that the Attack Tree and Attack-Defense Tree methodologies are viable approaches in this regard. Consequently, we make use of the Attack Tree and the Attack-Defense Tree to quantify the security risks and countermeasures of serverless computing. We also propose a novel measure called the Relative Risk Matrix (RRM) to quantify the probability of attack success. Stakeholders including application developers, researchers, and cloud providers can potentially apply these findings and implications to better understand and further enhance the security of serverless computing.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud SMedIR:基于 ConvNeXt 的索引和可搜索云加密的安全医学图像检索框架
Pub Date : 2024-09-14 DOI: 10.1186/s13677-024-00702-z
Arun Amaithi Rajan, Vetriselvi V, Mayank Raikwar, Reshma Balaraman
The security and privacy of medical images are crucial due to their sensitive nature and the potential for severe consequences from unauthorized modifications, including data breaches and inaccurate diagnoses. This paper introduces a method for lossless medical image retrieval from encrypted images stored on third-party clouds. The proposed approach employs a symmetric integrity-centric image encryption scheme, leveraging multiple chaotic maps and cryptographic hash techniques, to ensure lossless image reconstruction. Medical images are first encrypted by the image owners and converted into hashcodes encapsulating essential features using a deep hashing technique with the ConvNeXt network as the backbone in parallel. To ensure index privacy, these hashcodes are encrypted in a searchable manner. The encrypted medical images, along with a secure index, are subsequently uploaded to cloud storage. Authorized medical image users can request similar medical images for diagnostic purposes by submitting a query image, from which a search trapdoor is generated and sent to the cloud. The retrieval process involves a secure similar image search over the encrypted indexes, followed by decryption along with integrity verification of the retrieved images. The proposed method has been rigorously tested on three standard medical datasets, demonstrating an improvement of 5-20% in retrieval accuracy compared to standard baselines. Formal security analysis and experimental results indicate that the proposed scheme offers enhanced security and retrieval accuracy, making it an effective solution for the encrypted storage and secure retrieval of medical image data.
医学影像具有敏感性,未经授权的修改可能造成严重后果,包括数据泄露和诊断不准确,因此医学影像的安全性和隐私性至关重要。本文介绍了一种从存储在第三方云上的加密图像中进行无损医学图像检索的方法。所提出的方法采用以对称完整性为中心的图像加密方案,利用多种混沌映射和加密哈希技术,确保无损图像重建。医学图像首先由图像所有者进行加密,然后利用深度散列技术,以 ConvNeXt 网络为骨干,并行将其转换为封装基本特征的散列码。为确保索引隐私,这些散列码以可搜索的方式进行加密。加密医学影像和安全索引随后上传到云存储。经授权的医学影像用户可通过提交查询图像请求类似的医学影像用于诊断,并由此生成搜索陷阱门并发送到云端。检索过程包括对加密索引进行安全的相似图像搜索,然后对检索到的图像进行解密和完整性验证。所提出的方法已在三个标准医疗数据集上进行了严格测试,结果表明与标准基线相比,检索准确率提高了 5-20%。正式的安全分析和实验结果表明,所提出的方案具有更高的安全性和检索准确性,是医疗图像数据加密存储和安全检索的有效解决方案。
{"title":"SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud","authors":"Arun Amaithi Rajan, Vetriselvi V, Mayank Raikwar, Reshma Balaraman","doi":"10.1186/s13677-024-00702-z","DOIUrl":"https://doi.org/10.1186/s13677-024-00702-z","url":null,"abstract":"The security and privacy of medical images are crucial due to their sensitive nature and the potential for severe consequences from unauthorized modifications, including data breaches and inaccurate diagnoses. This paper introduces a method for lossless medical image retrieval from encrypted images stored on third-party clouds. The proposed approach employs a symmetric integrity-centric image encryption scheme, leveraging multiple chaotic maps and cryptographic hash techniques, to ensure lossless image reconstruction. Medical images are first encrypted by the image owners and converted into hashcodes encapsulating essential features using a deep hashing technique with the ConvNeXt network as the backbone in parallel. To ensure index privacy, these hashcodes are encrypted in a searchable manner. The encrypted medical images, along with a secure index, are subsequently uploaded to cloud storage. Authorized medical image users can request similar medical images for diagnostic purposes by submitting a query image, from which a search trapdoor is generated and sent to the cloud. The retrieval process involves a secure similar image search over the encrypted indexes, followed by decryption along with integrity verification of the retrieved images. The proposed method has been rigorously tested on three standard medical datasets, demonstrating an improvement of 5-20% in retrieval accuracy compared to standard baselines. Formal security analysis and experimental results indicate that the proposed scheme offers enhanced security and retrieval accuracy, making it an effective solution for the encrypted storage and secure retrieval of medical image data.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A trusted IoT data sharing method based on secure multi-party computation 基于安全多方计算的可信物联网数据共享方法
Pub Date : 2024-09-13 DOI: 10.1186/s13677-024-00704-x
Li Ma, Binbin Duan, Bo Zhang, Yang Li, Yingxun Fu, Dongchao Ma
Edge computing nodes close to the perception layer of IoT systems are susceptible to data leaks and unauthorized access. To address these security concerns, this paper proposes a trusted IoT data sharing method based on secure multi-party computation (SMC). By running a reliable third-party blockchain service at edge computing nodes, the data computation relationships between IoT devices in the perception layer are registered in blockchain smart contracts. This constructs a publicly verifiable IoT data sharing method combining on-chain audit verification and off-chain SMC. Furthermore, a Bloom filter is maintained at the on-chain smart contract layer to track the trust status of IoT devices in the perception layer, filtering out non-trustworthy device requests and enabling secure data sharing among trusted devices. Comparative analysis and performance tests demonstrate the proposed method’s high computational efficiency for IoT device nodes.
靠近物联网系统感知层的边缘计算节点容易受到数据泄露和未经授权访问的影响。为了解决这些安全问题,本文提出了一种基于安全多方计算(SMC)的可信物联网数据共享方法。通过在边缘计算节点运行可靠的第三方区块链服务,将感知层中物联网设备之间的数据计算关系注册到区块链智能合约中。这就构建了一种可公开验证的物联网数据共享方法,将链上审计验证和链下 SMC 结合在一起。此外,在链上智能合约层维护一个布鲁姆过滤器,以跟踪感知层中物联网设备的信任状态,过滤掉不可信设备的请求,实现可信设备之间的安全数据共享。对比分析和性能测试表明,所提出的方法对物联网设备节点具有很高的计算效率。
{"title":"A trusted IoT data sharing method based on secure multi-party computation","authors":"Li Ma, Binbin Duan, Bo Zhang, Yang Li, Yingxun Fu, Dongchao Ma","doi":"10.1186/s13677-024-00704-x","DOIUrl":"https://doi.org/10.1186/s13677-024-00704-x","url":null,"abstract":"Edge computing nodes close to the perception layer of IoT systems are susceptible to data leaks and unauthorized access. To address these security concerns, this paper proposes a trusted IoT data sharing method based on secure multi-party computation (SMC). By running a reliable third-party blockchain service at edge computing nodes, the data computation relationships between IoT devices in the perception layer are registered in blockchain smart contracts. This constructs a publicly verifiable IoT data sharing method combining on-chain audit verification and off-chain SMC. Furthermore, a Bloom filter is maintained at the on-chain smart contract layer to track the trust status of IoT devices in the perception layer, filtering out non-trustworthy device requests and enabling secure data sharing among trusted devices. Comparative analysis and performance tests demonstrate the proposed method’s high computational efficiency for IoT device nodes.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wind power prediction method based on cloud computing and data privacy protection 基于云计算和数据隐私保护的风能预测方法
Pub Date : 2024-09-12 DOI: 10.1186/s13677-024-00679-9
Lei Zhang, Shaoming Zhu, Shen Su, Xiaofeng Chen, Yan Yang, Bing Zhou
With the support of our government’s commitment to the energy sector, the installed capacity of wind power will continue to grow. However, due to the instability of wind power, accurate prediction of wind power output is essential for effective grid dispatch. In addition, data privacy and protection have become paramount in today’s society. Traditional wind forecasting methods rely on centralized data, which raises concerns about data privacy and data silos. To address these challenges, we propose a hybrid approach that combines federated learning and deep learning for wind power forecasting. In our proposed method, we use a bidirectional long short-term memory (BILSTM) neural network as the basic prediction model to improve the prediction accuracy. Then, the model is integrated into the federated learning framework to form the Fed-BILSTM prediction method. In addition, we have introduced cloud computing technology into the Fed-BILSTM method, using cloud resources for model training and parameter update. Participants share model parameters instead of sharing raw data, which solves data privacy concerns. We compared Fed-BILSTM with traditional forecasting methods. Experimental results show that the proposed Fed-BILSTM is better than the traditional prediction method in terms of prediction accuracy. What’s more, Fed-BILSTM can effectively protect data privacy compared to traditional centralized forecasting methods while ensuring prediction performance.
在我国政府对能源行业承诺的支持下,风电装机容量将继续增长。然而,由于风力发电的不稳定性,准确预测风力发电量对于有效的电网调度至关重要。此外,数据隐私和保护在当今社会已变得至关重要。传统的风能预测方法依赖于集中式数据,这引发了人们对数据隐私和数据孤岛的担忧。为了应对这些挑战,我们提出了一种将联合学习和深度学习相结合的混合方法,用于风能预测。在我们提出的方法中,我们使用双向长短期记忆(BILSTM)神经网络作为基本预测模型,以提高预测精度。然后,将该模型集成到联合学习框架中,形成 Fed-BILSTM 预测方法。此外,我们还在 Fed-BILSTM 方法中引入了云计算技术,利用云资源进行模型训练和参数更新。参与者共享模型参数,而不是共享原始数据,从而解决了数据隐私问题。我们将 Fed-BILSTM 与传统预测方法进行了比较。实验结果表明,所提出的 Fed-BILSTM 在预测准确率方面优于传统预测方法。此外,与传统的集中式预测方法相比,Fed-BILSTM 能在保证预测性能的同时有效保护数据隐私。
{"title":"Wind power prediction method based on cloud computing and data privacy protection","authors":"Lei Zhang, Shaoming Zhu, Shen Su, Xiaofeng Chen, Yan Yang, Bing Zhou","doi":"10.1186/s13677-024-00679-9","DOIUrl":"https://doi.org/10.1186/s13677-024-00679-9","url":null,"abstract":"With the support of our government’s commitment to the energy sector, the installed capacity of wind power will continue to grow. However, due to the instability of wind power, accurate prediction of wind power output is essential for effective grid dispatch. In addition, data privacy and protection have become paramount in today’s society. Traditional wind forecasting methods rely on centralized data, which raises concerns about data privacy and data silos. To address these challenges, we propose a hybrid approach that combines federated learning and deep learning for wind power forecasting. In our proposed method, we use a bidirectional long short-term memory (BILSTM) neural network as the basic prediction model to improve the prediction accuracy. Then, the model is integrated into the federated learning framework to form the Fed-BILSTM prediction method. In addition, we have introduced cloud computing technology into the Fed-BILSTM method, using cloud resources for model training and parameter update. Participants share model parameters instead of sharing raw data, which solves data privacy concerns. We compared Fed-BILSTM with traditional forecasting methods. Experimental results show that the proposed Fed-BILSTM is better than the traditional prediction method in terms of prediction accuracy. What’s more, Fed-BILSTM can effectively protect data privacy compared to traditional centralized forecasting methods while ensuring prediction performance.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependency-aware online task offloading based on deep reinforcement learning for IoV 基于深度强化学习的物联网车依赖感知在线任务卸载
Pub Date : 2024-09-05 DOI: 10.1186/s13677-024-00701-0
Chunhong Liu, Huaichen Wang, Mengdi Zhao, Jialei Liu, Xiaoyan Zhao, Peiyan Yuan
The convergence of artificial intelligence and in-vehicle wireless communication technologies, promises to fulfill the pressing communication needs of the Internet of Vehicles (IoV) while promoting the development of vehicle applications. However, making real-time dependency-aware task offloading decisions is difficult due to the high mobility of vehicles and the dynamic nature of the network environment. This leads to additional application computation time and energy consumption, increasing the risk of offloading failures for computationally intensive and latency-sensitive applications. In this paper, an offloading strategy for vehicle applications that jointly considers latency and energy consumption in the base station cooperative computing model is proposed. Firstly, we establish a collaborative offloading model involving multiple vehicles, multiple base stations, and multiple edge servers. Transferring vehicular applications to the application queue of edge servers and prioritizing them based on their completion deadlines. Secondly, each vehicular application is modeled as a directed acyclic graph (DAG) task with data dependency relationships. Subsequently, we propose a task offloading method based on task dependency awareness in deep reinforcement learning (DAG-DQN). Tasks are assigned to edge servers at different base stations, and edge servers collaborate to process tasks, minimizing vehicle application completion time and reducing edge server energy consumption. Finally, simulation results show that compared with the heuristic method, our proposed DAG-DQN method reduces task completion time by 16%, reduces system energy consumption by 19%, and improves decision-making efficiency by 70%.
人工智能与车载无线通信技术的融合有望满足车联网(IoV)的迫切通信需求,同时促进车辆应用的发展。然而,由于车辆的高流动性和网络环境的动态性质,很难做出实时依赖感知任务卸载决策。这会导致额外的应用计算时间和能耗,增加计算密集型和延迟敏感型应用卸载失败的风险。本文提出了一种在基站协同计算模型中联合考虑延迟和能耗的车辆应用卸载策略。首先,我们建立了一个涉及多个车辆、多个基站和多个边缘服务器的协作卸载模型。将车辆应用转移到边缘服务器的应用队列中,并根据其完成期限确定优先级。其次,将每个车辆应用建模为具有数据依赖关系的有向无环图(DAG)任务。随后,我们在深度强化学习(DAG-DQN)中提出了一种基于任务依赖意识的任务卸载方法。将任务分配给不同基站的边缘服务器,边缘服务器协同处理任务,从而最大限度地缩短车辆应用的完成时间,降低边缘服务器的能耗。最后,仿真结果表明,与启发式方法相比,我们提出的 DAG-DQN 方法缩短了 16% 的任务完成时间,降低了 19% 的系统能耗,并提高了 70% 的决策效率。
{"title":"Dependency-aware online task offloading based on deep reinforcement learning for IoV","authors":"Chunhong Liu, Huaichen Wang, Mengdi Zhao, Jialei Liu, Xiaoyan Zhao, Peiyan Yuan","doi":"10.1186/s13677-024-00701-0","DOIUrl":"https://doi.org/10.1186/s13677-024-00701-0","url":null,"abstract":"The convergence of artificial intelligence and in-vehicle wireless communication technologies, promises to fulfill the pressing communication needs of the Internet of Vehicles (IoV) while promoting the development of vehicle applications. However, making real-time dependency-aware task offloading decisions is difficult due to the high mobility of vehicles and the dynamic nature of the network environment. This leads to additional application computation time and energy consumption, increasing the risk of offloading failures for computationally intensive and latency-sensitive applications. In this paper, an offloading strategy for vehicle applications that jointly considers latency and energy consumption in the base station cooperative computing model is proposed. Firstly, we establish a collaborative offloading model involving multiple vehicles, multiple base stations, and multiple edge servers. Transferring vehicular applications to the application queue of edge servers and prioritizing them based on their completion deadlines. Secondly, each vehicular application is modeled as a directed acyclic graph (DAG) task with data dependency relationships. Subsequently, we propose a task offloading method based on task dependency awareness in deep reinforcement learning (DAG-DQN). Tasks are assigned to edge servers at different base stations, and edge servers collaborate to process tasks, minimizing vehicle application completion time and reducing edge server energy consumption. Finally, simulation results show that compared with the heuristic method, our proposed DAG-DQN method reduces task completion time by 16%, reduces system energy consumption by 19%, and improves decision-making efficiency by 70%.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future 利用区块链和人工智能技术实现可持续、生物多样性和透明的未来渔业
Pub Date : 2024-08-26 DOI: 10.1186/s13677-024-00696-8
Naif Alsharabi, Jalel Ktari, Tarek Frikha, Abdulaziz Alayba, Abdullah J. Alzahrani, Amr jadi, Habib Hamam
This paper proposes a total fusion of blockchain and AI tech for tomorrow’s viable, rich in diversity and transparent fisheries. It outlines the main goal of tackling overfishing challenges due to lack of transparency and biodiversity depletion in the fisheries sector. With the use of blockchain technology, we can ensure that all fishery products are safely traced from their harvest up to when they get to the market— at the same time, AI algorithms are used in monitoring fish populations and predicting them plus decision-making processes which should be enhanced thus promoting bio-diversity and ensuring sustainability of fish stocks. Results show promise on using both technologies together: improving sustainability plus transparency in fisheries which would promote more fish biodiversity, while others including using an artificial intelligence system have not been confirmed yet by observations. The conclusion underscores the transformative nature of these technologies as having great implications towards fisheries management; this implies that there is a need for future observational studies aimed at validating such other findings.
本文提出了区块链与人工智能技术的全面融合,以实现未来可行、丰富多样和透明的渔业。它概述了应对渔业领域因缺乏透明度和生物多样性枯竭而造成的过度捕捞挑战的主要目标。通过使用区块链技术,我们可以确保所有渔业产品从收获到进入市场的整个过程都能被安全地追踪;与此同时,人工智能算法可用于监测鱼类种群数量、预测鱼类种群数量以及决策过程,这些过程应得到加强,从而促进生物多样性并确保鱼类种群的可持续性。研究结果表明,将这两种技术结合使用大有可为:提高渔业的可持续性和透明度,从而促进鱼类的生物多样性,而包括使用人工智能系统在内的其他技术尚未得到观察证实。结论强调了这些技术的变革性,认为它们对渔业管理具有重大影响;这意味着今后需要开展观察研究,以验证这些其他发现。
{"title":"Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future","authors":"Naif Alsharabi, Jalel Ktari, Tarek Frikha, Abdulaziz Alayba, Abdullah J. Alzahrani, Amr jadi, Habib Hamam","doi":"10.1186/s13677-024-00696-8","DOIUrl":"https://doi.org/10.1186/s13677-024-00696-8","url":null,"abstract":"This paper proposes a total fusion of blockchain and AI tech for tomorrow’s viable, rich in diversity and transparent fisheries. It outlines the main goal of tackling overfishing challenges due to lack of transparency and biodiversity depletion in the fisheries sector. With the use of blockchain technology, we can ensure that all fishery products are safely traced from their harvest up to when they get to the market— at the same time, AI algorithms are used in monitoring fish populations and predicting them plus decision-making processes which should be enhanced thus promoting bio-diversity and ensuring sustainability of fish stocks. Results show promise on using both technologies together: improving sustainability plus transparency in fisheries which would promote more fish biodiversity, while others including using an artificial intelligence system have not been confirmed yet by observations. The conclusion underscores the transformative nature of these technologies as having great implications towards fisheries management; this implies that there is a need for future observational studies aimed at validating such other findings.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation 利用模糊推断信任分值计算方法为云服务提供商建立数字孪生驱动的预测性信任模型
Pub Date : 2024-08-21 DOI: 10.1186/s13677-024-00694-w
Jomina John, John Singh K
Cloud computing has become integral to modern computing infrastructure, offering scalability, flexibility, and cost-effectiveness. Trust is a critical aspect of cloud computing, influencing user decisions in selecting Cloud Service Providers (CSPs). This paper provides a comprehensive review of existing trust models in cloud computing, including agreement-based, SLA-based, certificate-based, feedback-based, domain-based, prediction-based, and reputation-based models. Building on this foundation, we propose a novel methodology for creating a trust model in cloud computing using digital twins for CSPs. The digital twin is augmented with a fuzzy inference system, which computes the trust score of a CSP based on trust-related parameters. The architecture of the digital twin with the fuzzy inference system is detailed, outlining how it processes security parameter values obtained through penetration testing mechanisms. These parameter values are transformed into crisp values using a linear ridge regression function and then fed into the fuzzy inference system to calculate a final trust score for the CSP. The paper also presents the outputs of the fuzzy inference system, demonstrating how different security parameter inputs yield various trust scores. This methodology provides a robust framework for assessing CSP trustworthiness and enhancing decision-making processes in cloud service selection.
云计算已成为现代计算基础设施不可或缺的一部分,具有可扩展性、灵活性和成本效益。信任是云计算的一个重要方面,影响着用户选择云服务提供商(CSP)的决策。本文全面回顾了云计算中现有的信任模型,包括基于协议、基于服务水平协议、基于证书、基于反馈、基于领域、基于预测和基于声誉的模型。在此基础上,我们提出了一种新颖的方法,利用 CSP 数字孪生创建云计算中的信任模型。数字孪生中增加了模糊推理系统,可根据信任相关参数计算 CSP 的信任分数。详细介绍了带有模糊推理系统的数字孪生的架构,概述了它如何处理通过渗透测试机制获得的安全参数值。这些参数值通过线性脊回归函数转化为清晰值,然后输入模糊推理系统,计算出 CSP 的最终信任度得分。本文还介绍了模糊推理系统的输出结果,展示了不同的安全参数输入如何产生不同的信任分值。该方法为评估 CSP 可信度和加强云服务选择的决策过程提供了一个稳健的框架。
{"title":"Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation","authors":"Jomina John, John Singh K","doi":"10.1186/s13677-024-00694-w","DOIUrl":"https://doi.org/10.1186/s13677-024-00694-w","url":null,"abstract":"Cloud computing has become integral to modern computing infrastructure, offering scalability, flexibility, and cost-effectiveness. Trust is a critical aspect of cloud computing, influencing user decisions in selecting Cloud Service Providers (CSPs). This paper provides a comprehensive review of existing trust models in cloud computing, including agreement-based, SLA-based, certificate-based, feedback-based, domain-based, prediction-based, and reputation-based models. Building on this foundation, we propose a novel methodology for creating a trust model in cloud computing using digital twins for CSPs. The digital twin is augmented with a fuzzy inference system, which computes the trust score of a CSP based on trust-related parameters. The architecture of the digital twin with the fuzzy inference system is detailed, outlining how it processes security parameter values obtained through penetration testing mechanisms. These parameter values are transformed into crisp values using a linear ridge regression function and then fed into the fuzzy inference system to calculate a final trust score for the CSP. The paper also presents the outputs of the fuzzy inference system, demonstrating how different security parameter inputs yield various trust scores. This methodology provides a robust framework for assessing CSP trustworthiness and enhancing decision-making processes in cloud service selection.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When wavelet decomposition meets external attention: a lightweight cloud server load prediction model 当小波分解遇到外部关注:轻量级云服务器负载预测模型
Pub Date : 2024-08-20 DOI: 10.1186/s13677-024-00698-6
Zhen Zhang, Chen Xu, Jinyu Zhang, Zhe Zhu, Shaohua Xu
Load prediction tasks aim to predict the dynamic trend of future load based on historical performance sequences, which are crucial for cloud platforms to make timely and reasonable task scheduling. However, existing prediction models are limited while capturing complicated temporal patterns from the load sequences. Besides, the frequently adopted global weighting strategy (e.g., the self-attention mechanism) in temporal modeling schemes has quadratic computational complexity, hindering the immediate response of cloud servers in complex real-time scenarios. To address the above limitations, we propose a Wavelet decomposition-enhanced External Transformer (WETformer) to provide accurate yet efficient load prediction for cloud servers. Specifically, we first incorporate discrete wavelet transform to progressively extract long-term trends, highlighting the intrinsic attributes of temporal sequences. Then, we propose a lightweight multi-head External Attention (EA) mechanism to simultaneously consider the inter-element relationships within load sequences and the correlations across different sequences. Such an external component has linear computational complexity, mitigating the encoding redundancy prevalent and enhancing prediction efficiency. Extensive experiments conducted on Alibaba Cloud’s cluster tracking dataset demonstrate that WETformer achieves superior prediction accuracy and the shortest inference time compared to several state-of-the-art baseline methods.
负载预测任务旨在根据历史性能序列预测未来负载的动态趋势,这对于云平台及时合理地进行任务调度至关重要。然而,现有的预测模型在捕捉负载序列中复杂的时间模式时存在局限性。此外,时序建模方案中经常采用的全局加权策略(如自我关注机制)具有二次计算复杂性,阻碍了云服务器在复杂的实时场景中做出即时响应。针对上述局限性,我们提出了小波分解增强外部变换器(WETformer),为云服务器提供准确而高效的负载预测。具体来说,我们首先结合离散小波变换逐步提取长期趋势,突出时间序列的内在属性。然后,我们提出了一种轻量级多头外部关注(EA)机制,以同时考虑负载序列内的元素间关系和不同序列间的相关性。这种外部组件具有线性计算复杂度,可减轻普遍存在的编码冗余,提高预测效率。在阿里巴巴云的集群跟踪数据集上进行的大量实验表明,与几种最先进的基线方法相比,WETformer 实现了更高的预测精度和最短的推理时间。
{"title":"When wavelet decomposition meets external attention: a lightweight cloud server load prediction model","authors":"Zhen Zhang, Chen Xu, Jinyu Zhang, Zhe Zhu, Shaohua Xu","doi":"10.1186/s13677-024-00698-6","DOIUrl":"https://doi.org/10.1186/s13677-024-00698-6","url":null,"abstract":"Load prediction tasks aim to predict the dynamic trend of future load based on historical performance sequences, which are crucial for cloud platforms to make timely and reasonable task scheduling. However, existing prediction models are limited while capturing complicated temporal patterns from the load sequences. Besides, the frequently adopted global weighting strategy (e.g., the self-attention mechanism) in temporal modeling schemes has quadratic computational complexity, hindering the immediate response of cloud servers in complex real-time scenarios. To address the above limitations, we propose a Wavelet decomposition-enhanced External Transformer (WETformer) to provide accurate yet efficient load prediction for cloud servers. Specifically, we first incorporate discrete wavelet transform to progressively extract long-term trends, highlighting the intrinsic attributes of temporal sequences. Then, we propose a lightweight multi-head External Attention (EA) mechanism to simultaneously consider the inter-element relationships within load sequences and the correlations across different sequences. Such an external component has linear computational complexity, mitigating the encoding redundancy prevalent and enhancing prediction efficiency. Extensive experiments conducted on Alibaba Cloud’s cluster tracking dataset demonstrate that WETformer achieves superior prediction accuracy and the shortest inference time compared to several state-of-the-art baseline methods.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins 基于合规性和反馈的模型来衡量托管数字双胞胎的云可信度
Pub Date : 2024-08-19 DOI: 10.1186/s13677-024-00690-0
Syed Imran Akhtar, Abdul Rauf, Haider Abbas, Muhammad Faisal Amjad, Ifra Batool
Cloud-based digital twins use real-time data from various data sources to simulate the behavior and performance of their physical counterparts, enabling monitoring and analysis. However, one restraining factor in the use of cloud computing for digital twins is its users’ concerns about the security of their data. This data may be located anywhere in the cloud, with very limited control of the user to ensure its security. Cloud-based digital twins provide opportunities for researchers to collaborate yet security of such digital twins requires measures specific to cloud computing. To overcome this shortcoming, we need to devise a mechanism that not only ensures essential security safeguards but also computes a Trustworthiness value for Cloud Service Providers (CSP). This would give confidence to cloud users and enable them to choose the right CSP for their data-related interaction. This research proposes a solution, whereby the Trustworthiness of CSPs is calculated based on their Compliance with data security controls, User Feedback, and Auditor Rating. Two additional factors, Accuracy of Compliance Measurement and Control Significance Factor have been built in, to cater for other nonstandard conditions. Our implementation of Data Security Compliance Monitor and Data Trust as a Service, along with three CSPs, each with ten different settings, has supported our proposition through the devised formula. Experimental outcomes show changes in the trustworthiness value with changes in compliance level, user feedback and auditor rating. CSPs with better compliance have better trustworthiness values. However, if the Accuracy of Compliance Measurement and Control Significance Factor are low the trustworthiness is also proportionately less. This creates a balance and realism in our calculations. This model is unique and will help in creating users’ trust in cloud-based digital twins.
基于云计算的数字孪生利用来自各种数据源的实时数据来模拟其物理对应物的行为和性能,从而实现监控和分析。然而,将云计算用于数字孪生的一个限制因素是用户对其数据安全的担忧。这些数据可能位于云中的任何地方,用户对其安全性的控制非常有限。基于云计算的数字孪生为研究人员提供了合作机会,但此类数字孪生的安全性需要采取云计算特有的措施。为了克服这一缺陷,我们需要设计一种机制,它不仅能确保基本的安全保障,还能计算出云服务提供商(CSP)的可信度值。这将增强云用户的信心,使他们能够选择合适的 CSP 进行数据相关交互。本研究提出了一种解决方案,即根据数据安全控制合规性、用户反馈和审计员评级来计算 CSP 的可信度。此外,还加入了两个附加因素,即合规性测量的准确性和控制重要性因素,以满足其他非标准条件的要求。我们实施了数据安全合规性监控和数据信任即服务,并使用了三种 CSP(每种 CSP 有十种不同的设置),通过所设计的公式支持了我们的主张。实验结果表明,随着合规水平、用户反馈和审计员评级的变化,可信度值也会发生变化。合规性更好的 CSP 具有更好的可信度值。但是,如果合规性测量准确度和控制重要性系数较低,可信度也会相应降低。这为我们的计算提供了平衡和现实性。这个模型很独特,有助于建立用户对基于云的数字孪生的信任。
{"title":"Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins","authors":"Syed Imran Akhtar, Abdul Rauf, Haider Abbas, Muhammad Faisal Amjad, Ifra Batool","doi":"10.1186/s13677-024-00690-0","DOIUrl":"https://doi.org/10.1186/s13677-024-00690-0","url":null,"abstract":"Cloud-based digital twins use real-time data from various data sources to simulate the behavior and performance of their physical counterparts, enabling monitoring and analysis. However, one restraining factor in the use of cloud computing for digital twins is its users’ concerns about the security of their data. This data may be located anywhere in the cloud, with very limited control of the user to ensure its security. Cloud-based digital twins provide opportunities for researchers to collaborate yet security of such digital twins requires measures specific to cloud computing. To overcome this shortcoming, we need to devise a mechanism that not only ensures essential security safeguards but also computes a Trustworthiness value for Cloud Service Providers (CSP). This would give confidence to cloud users and enable them to choose the right CSP for their data-related interaction. This research proposes a solution, whereby the Trustworthiness of CSPs is calculated based on their Compliance with data security controls, User Feedback, and Auditor Rating. Two additional factors, Accuracy of Compliance Measurement and Control Significance Factor have been built in, to cater for other nonstandard conditions. Our implementation of Data Security Compliance Monitor and Data Trust as a Service, along with three CSPs, each with ten different settings, has supported our proposition through the devised formula. Experimental outcomes show changes in the trustworthiness value with changes in compliance level, user feedback and auditor rating. CSPs with better compliance have better trustworthiness values. However, if the Accuracy of Compliance Measurement and Control Significance Factor are low the trustworthiness is also proportionately less. This creates a balance and realism in our calculations. This model is unique and will help in creating users’ trust in cloud-based digital twins.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cloud Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1