基于生成对抗网络的云计算安全与应用:调查

IF 1.7 4区 计算机科学 Q3 TELECOMMUNICATIONS Telecommunication Systems Pub Date : 2024-06-04 DOI:10.1007/s11235-024-01166-x
Shiyu Wang, Ming Yin, Yiwen Liu, Guofeng He
{"title":"基于生成对抗网络的云计算安全与应用:调查","authors":"Shiyu Wang, Ming Yin, Yiwen Liu, Guofeng He","doi":"10.1007/s11235-024-01166-x","DOIUrl":null,"url":null,"abstract":"<p>To meet growing business needs and exponentially increasing development and maintenance costs, the concept of cloud computing has been proposed and developed rapidly. Cloud computing is a brand-new computing mode that can meet the needs of on-demand distribution and the rapid deployment of computing resources. It can provide strong scalability and applicability through virtualisation technology and elastic technology, and it can adapt to the needs of users in different environments and resources. Through the use of hardware such as cloud sensors, the data collected by various types of sensors can be directly uploaded to the cloud for processing and analysis, so that applications such as management, medical treatment and human–machine cooperation can be provided. However, applications in the cloud have upended traditional security boundaries and will face some unique security challenges. Due to the advantages of generating real data, generative adversarial networks (GANs) have attracted extensive attention in the field of cloud computing, such as data augmentation and encryption. Therefore, this paper reviews GAN-based security and applications in cloud computing. We compare the role of GANs in security and applications in the cloud from multiple dimensions. In addition, we analyse the research trends and future work prospects from the perspective of the algorithm itself, algorithm performance evaluation and cloud computing hardware.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"36 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Generative adversarial networks-based security and applications in cloud computing: a survey\",\"authors\":\"Shiyu Wang, Ming Yin, Yiwen Liu, Guofeng He\",\"doi\":\"10.1007/s11235-024-01166-x\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>To meet growing business needs and exponentially increasing development and maintenance costs, the concept of cloud computing has been proposed and developed rapidly. Cloud computing is a brand-new computing mode that can meet the needs of on-demand distribution and the rapid deployment of computing resources. It can provide strong scalability and applicability through virtualisation technology and elastic technology, and it can adapt to the needs of users in different environments and resources. Through the use of hardware such as cloud sensors, the data collected by various types of sensors can be directly uploaded to the cloud for processing and analysis, so that applications such as management, medical treatment and human–machine cooperation can be provided. However, applications in the cloud have upended traditional security boundaries and will face some unique security challenges. Due to the advantages of generating real data, generative adversarial networks (GANs) have attracted extensive attention in the field of cloud computing, such as data augmentation and encryption. Therefore, this paper reviews GAN-based security and applications in cloud computing. We compare the role of GANs in security and applications in the cloud from multiple dimensions. In addition, we analyse the research trends and future work prospects from the perspective of the algorithm itself, algorithm performance evaluation and cloud computing hardware.</p>\",\"PeriodicalId\":51194,\"journal\":{\"name\":\"Telecommunication Systems\",\"volume\":\"36 1\",\"pages\":\"\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2024-06-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Telecommunication Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11235-024-01166-x\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Telecommunication Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11235-024-01166-x","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

为了满足日益增长的业务需求,以及成倍增加的开发和维护成本,云计算的概念被提出并得到迅速发展。云计算是一种全新的计算模式,可以满足按需分配和快速部署计算资源的需求。它可以通过虚拟化技术和弹性技术提供强大的可扩展性和适用性,能够适应用户在不同环境和资源下的需求。通过云传感器等硬件的使用,各类传感器采集的数据可以直接上传到云端进行处理和分析,从而提供管理、医疗、人机协作等应用。然而,云中的应用颠覆了传统的安全边界,将面临一些独特的安全挑战。由于生成真实数据的优势,生成式对抗网络(GAN)在数据增强和加密等云计算领域引起了广泛关注。因此,本文回顾了基于生成式对抗网络的安全性以及在云计算中的应用。我们从多个维度比较了 GAN 在云计算安全和应用中的作用。此外,我们还从算法本身、算法性能评估和云计算硬件等角度分析了研究趋势和未来工作展望。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Generative adversarial networks-based security and applications in cloud computing: a survey

To meet growing business needs and exponentially increasing development and maintenance costs, the concept of cloud computing has been proposed and developed rapidly. Cloud computing is a brand-new computing mode that can meet the needs of on-demand distribution and the rapid deployment of computing resources. It can provide strong scalability and applicability through virtualisation technology and elastic technology, and it can adapt to the needs of users in different environments and resources. Through the use of hardware such as cloud sensors, the data collected by various types of sensors can be directly uploaded to the cloud for processing and analysis, so that applications such as management, medical treatment and human–machine cooperation can be provided. However, applications in the cloud have upended traditional security boundaries and will face some unique security challenges. Due to the advantages of generating real data, generative adversarial networks (GANs) have attracted extensive attention in the field of cloud computing, such as data augmentation and encryption. Therefore, this paper reviews GAN-based security and applications in cloud computing. We compare the role of GANs in security and applications in the cloud from multiple dimensions. In addition, we analyse the research trends and future work prospects from the perspective of the algorithm itself, algorithm performance evaluation and cloud computing hardware.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Telecommunication Systems
Telecommunication Systems 工程技术-电信学
CiteScore
5.40
自引率
8.00%
发文量
105
审稿时长
6.0 months
期刊介绍: Telecommunication Systems is a journal covering all aspects of modeling, analysis, design and management of telecommunication systems. The journal publishes high quality articles dealing with the use of analytic and quantitative tools for the modeling, analysis, design and management of telecommunication systems covering: Performance Evaluation of Wide Area and Local Networks; Network Interconnection; Wire, wireless, Adhoc, mobile networks; Impact of New Services (economic and organizational impact); Fiberoptics and photonic switching; DSL, ADSL, cable TV and their impact; Design and Analysis Issues in Metropolitan Area Networks; Networking Protocols; Dynamics and Capacity Expansion of Telecommunication Systems; Multimedia Based Systems, Their Design Configuration and Impact; Configuration of Distributed Systems; Pricing for Networking and Telecommunication Services; Performance Analysis of Local Area Networks; Distributed Group Decision Support Systems; Configuring Telecommunication Systems with Reliability and Availability; Cost Benefit Analysis and Economic Impact of Telecommunication Systems; Standardization and Regulatory Issues; Security, Privacy and Encryption in Telecommunication Systems; Cellular, Mobile and Satellite Based Systems.
期刊最新文献
Next-cell prediction with LSTM based on vehicle mobility for 5G mc-IoT slices Secure positioning of wireless sensor networks against wormhole attacks Safeguarding the Internet of Health Things: advancements, challenges, and trust-based solution Optimized task offloading for federated learning based on β-skeleton graph in edge computing Noise robust automatic speaker verification systems: review and analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1