Pub Date : 2019-06-25DOI: 10.1007/978-3-030-23502-4_16
Zhuo Tang, Wei Xiao, Bin Lu, Youfei Zuo, Yuan Zhou, Keqin Li
{"title":"A Parallel Algorithm for Bayesian Text Classification Based on Noise Elimination and Dimension Reduction in Spark Computing Environment","authors":"Zhuo Tang, Wei Xiao, Bin Lu, Youfei Zuo, Yuan Zhou, Keqin Li","doi":"10.1007/978-3-030-23502-4_16","DOIUrl":"https://doi.org/10.1007/978-3-030-23502-4_16","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"24 1","pages":"222-239"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81361210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1007/978-3-030-23502-4_4
H. Kanemitsu, M. Hanada, H. Nakazato
{"title":"Multiple Workflow Scheduling with Offloading Tasks to Edge Cloud","authors":"H. Kanemitsu, M. Hanada, H. Nakazato","doi":"10.1007/978-3-030-23502-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-23502-4_4","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"31 1","pages":"38-52"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72758810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/CloudCom2018.2018.00054
Leonardo Winter Pereira, Luis Felipe Mazzuchetti Ortiz, Douglas Costa Rossi, M. Rosa, K. Fonseca, Charles B. Prado, L. D. C. Carmo, Andrey Elísio Monteiro-Brito, R. Riella
In this work we propose a strategy using Intel SGX processors to guarantee the use of audited applications in insecure environments. A cloud-based toolchain allows auditors to assess if the user's application meets specifications and standards, to generate the final binaries, and to cryptographically sign them. It also generates a manifesto containing information to verify the authenticity of the audited software binaries. A SGX-based binary loader (inserted by the cloud-based toolchain during the applications building process) writes down auditing data that is encrypted and sealed by SGX functions to form reliable proofs that the original audited software is the one running. As a proof-of-concept, a Linux kernel was modified in order to cryptographically measure all processes being executed and send these results to a SGX application. An analysis was carried out to measure the performance of the altered system. On average, a system consistently running the audit increased the execution time of each process by 20 to 30%.
{"title":"Using Intel SGX to Enforce Auditing of Running Software in Insecure Environments","authors":"Leonardo Winter Pereira, Luis Felipe Mazzuchetti Ortiz, Douglas Costa Rossi, M. Rosa, K. Fonseca, Charles B. Prado, L. D. C. Carmo, Andrey Elísio Monteiro-Brito, R. Riella","doi":"10.1109/CloudCom2018.2018.00054","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00054","url":null,"abstract":"In this work we propose a strategy using Intel SGX processors to guarantee the use of audited applications in insecure environments. A cloud-based toolchain allows auditors to assess if the user's application meets specifications and standards, to generate the final binaries, and to cryptographically sign them. It also generates a manifesto containing information to verify the authenticity of the audited software binaries. A SGX-based binary loader (inserted by the cloud-based toolchain during the applications building process) writes down auditing data that is encrypted and sealed by SGX functions to form reliable proofs that the original audited software is the one running. As a proof-of-concept, a Linux kernel was modified in order to cryptographically measure all processes being executed and send these results to a SGX application. An analysis was carried out to measure the performance of the altered system. On average, a system consistently running the audit increased the execution time of each process by 20 to 30%.","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"1 1","pages":"243-246"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83764602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents an ontological analysis of the terminology associated with the concept of vulnerability in the energy sector. The ontology of vulnerabilities is proposed. This ontology reflects the interrelationships between this concept and other cyber security concepts. Classification of vulnerabilities is presented. Possible means of protection for ensuring information security and cyber security in the energy sector are considered.
{"title":"Ontological Analysis of Vulnerabilities in the Energy Sector","authors":"Tatiana Vorozhtsova, S. Skripkin","doi":"10.2991/IWCI-18.2018.35","DOIUrl":"https://doi.org/10.2991/IWCI-18.2018.35","url":null,"abstract":"The paper presents an ontological analysis of the terminology associated with the concept of vulnerability in the energy sector. The ontology of vulnerabilities is proposed. This ontology reflects the interrelationships between this concept and other cyber security concepts. Classification of vulnerabilities is presented. Possible means of protection for ensuring information security and cyber security in the energy sector are considered.","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01Epub Date: 2018-09-10DOI: 10.1109/cloud.2018.00124
Enis Afgan, Vahid Jalili, Nuwan Goonasekera, James Taylor, Jeremy Goecks
Biomedical data exploration requires integrative analyses of large datasets using a diverse ecosystem of tools. For more than a decade, the Galaxy project (https://galaxyproject.org) has provided researchers with a web-based, user-friendly, scalable data analysis framework complemented by a rich ecosystem of tools (https://usegalaxy.org/toolshed) used to perform genomic, proteomic, metabolomic, and imaging experiments. Galaxy can be deployed on the cloud (https://launch.usegalaxy.org), institutional computing clusters, and personal computers, or readily used on a number of public servers (e.g., https://usegalaxy.org). In this paper, we present our plan and progress towards creating Galaxy-as-a-Service-a federation of distributed data and computing resources into a panoptic analysis platform. Users can leverage a pool of public and institutional resources, in addition to plugging-in their private resources, helping answer the challenge of resource divergence across various Galaxy instances and enabling seamless analysis of biomedical data.
{"title":"Federated Galaxy: Biomedical Computing at the Frontier.","authors":"Enis Afgan, Vahid Jalili, Nuwan Goonasekera, James Taylor, Jeremy Goecks","doi":"10.1109/cloud.2018.00124","DOIUrl":"10.1109/cloud.2018.00124","url":null,"abstract":"<p><p>Biomedical data exploration requires integrative analyses of large datasets using a diverse ecosystem of tools. For more than a decade, the Galaxy project (https://galaxyproject.org) has provided researchers with a web-based, user-friendly, scalable data analysis framework complemented by a rich ecosystem of tools (https://usegalaxy.org/toolshed) used to perform genomic, proteomic, metabolomic, and imaging experiments. Galaxy can be deployed on the cloud (https://launch.usegalaxy.org), institutional computing clusters, and personal computers, or readily used on a number of public servers (e.g., https://usegalaxy.org). In this paper, we present our plan and progress towards creating Galaxy-as-a-Service-a federation of distributed data and computing resources into a panoptic analysis platform. Users can leverage a pool of public and institutional resources, in addition to plugging-in their private resources, helping answer the challenge of resource divergence across various Galaxy instances and enabling seamless analysis of biomedical data.</p>","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"2018 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8356149/pdf/nihms-1689939.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39305842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-25DOI: 10.1007/978-3-319-94295-7_8
Kejiang Ye, Yangyang Liu, Guoyao Xu, Chengzhong Xu
{"title":"Fault Injection and Detection for Artificial Intelligence Applications in Container-Based Clouds","authors":"Kejiang Ye, Yangyang Liu, Guoyao Xu, Chengzhong Xu","doi":"10.1007/978-3-319-94295-7_8","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_8","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"76 1","pages":"112-127"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88180333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-25DOI: 10.1007/978-3-319-94295-7_15
Mingyi Zhu, Kejiang Ye, Chengzhong Xu
{"title":"Network Anomaly Detection and Identification Based on Deep Learning Methods","authors":"Mingyi Zhu, Kejiang Ye, Chengzhong Xu","doi":"10.1007/978-3-319-94295-7_15","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_15","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"5 1","pages":"219-234"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81695119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-25DOI: 10.1007/978-3-319-94295-7_24
Chenghao Wei, Salman Salloum, Tamer Z. Emara, Xiaoliang Zhang, J. Huang, Yulin He
{"title":"A Two-Stage Data Processing Algorithm to Generate Random Sample Partitions for Big Data Analysis","authors":"Chenghao Wei, Salman Salloum, Tamer Z. Emara, Xiaoliang Zhang, J. Huang, Yulin He","doi":"10.1007/978-3-319-94295-7_24","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_24","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"12 1","pages":"347-364"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75866082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-25DOI: 10.1007/978-3-319-94295-7_16
Menghan Zheng, Yubin Zhao, Xi Zhang, Cheng-Zhong Xu, Xiaofan Li
{"title":"A Feedback Prediction Model for Resource Usage and Offloading Time in Edge Computing","authors":"Menghan Zheng, Yubin Zhao, Xi Zhang, Cheng-Zhong Xu, Xiaofan Li","doi":"10.1007/978-3-319-94295-7_16","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_16","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"88 1","pages":"235-247"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83815741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-25DOI: 10.1007/978-3-319-94295-7_7
R. Schulze
{"title":"Cloud Service Brokerage and Service Arbitrage for Container-Based Cloud Services","authors":"R. Schulze","doi":"10.1007/978-3-319-94295-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_7","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"66 1","pages":"97-111"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89503339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}