The paper presents the cloud computing system designed for monitoring the state of roads by processing data packages covering such data as the car39;s acceleration and position acquired by mobile devices (smartphone...
详细信息
ISBN:
(纸本)9783319392073;9783319392066
The paper presents the cloud computing system designed for monitoring the state of roads by processing data packages covering such data as the car's acceleration and position acquired by mobile devices (smartphones and tablets) mounted in cars and implemented on IBM BlueMix platform. Such data are being directly sent to the cloud system, where they are being saved and processed online. The system is capable of performing the authors' pothole detection algorithm which is characterized by high detection rate, but on continuously arriving data. Finally, the system is presenting its results in the form of website and data packages sent back to mobile devices.
Cloud computing is the fast growing and the dominant field of Information technology (IT) industry. It proposes on demand and cost effective services such as Software as a Service (SaaS), Platform as a Service (PaaS) ...
详细信息
ISBN:
(纸本)9783319459394;9783319459400
Cloud computing is the fast growing and the dominant field of Information technology (IT) industry. It proposes on demand and cost effective services such as Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Many security challenges are drawn from these services in cloud environment such as abuse of cloud services, data security, malicious insider and cyber-attacks. Although various access control policies and models such as Mandatory Access Control (MAC) and Role Based Access Control (RBAC) are existing, but these are not suitable for Cloud access control requirements. In this paper, we analyze and identify different important gaps of the conventional access control schemes based on the their demerits and cloud access requirements. We also propose a Combinatorial Batch Codes Based Access Control (CBCBAC) model, which fulfill all the cloud access control requirements. Our approach ensures the secure and efficient sharing of resources among various non-trusted tenants and also has the capacity to support different access permission to the same user for using multiple services securely. We also implement a prototype of our work which depicts the effective access control in the cloud environment.
The technological innovation of Industry4.0 opens up new possibilities for bespoke and unique designs all rooted in the same technology and supported by the same services. Taken together, Cyber-Physical Systems, Cloud...
详细信息
The technological innovation of Industry4.0 opens up new possibilities for bespoke and unique designs all rooted in the same technology and supported by the same services. Taken together, Cyber-Physical Systems, Cloud computing and internet of Things offer a neutral platform for the creation of hybrid digital physical objects. The economy of scale is reached by sharing the same technology across different projects and potentially very different domains. This vision is illustrated by the work done in the meSch project and its platform for the production of novel interactive experiences in museums. Six installations designed by recombining the same electronic components and the same services are used as a case study. They show how the meSch platform is aligned with Industry4.0 principles of enabling dynamic composition, supporting distributed production, and monitoring use for service improvement. As a platform it supports single-piece production and empowers designers to create bespoke solutions with the same technological core.
Cloud computing is a paradigm of both parallel processing and distributedcomputing. It offers computing facilities as a utility service in pay as par use manner. Virtualization, selfservice provisioning, elasticity a...
详细信息
ISBN:
(纸本)9781509052561
Cloud computing is a paradigm of both parallel processing and distributedcomputing. It offers computing facilities as a utility service in pay as par use manner. Virtualization, selfservice provisioning, elasticity and pay per use are the key features of Cloud computing. It provides different types of resources over the internet to perform user submitted tasks. In cloud environment, huge number of tasks are executed simultaneously, an effective Task Scheduling is required to gain better performance of the cloud system. Various Cloud-based Task Scheduling algorithms are available that schedule the user's task to resources for execution. Due to the novelty of Cloud computing, traditional scheduling algorithms cannot satisfy the cloud's needs, the researchers are trying to modify traditional algorithms that can fulfil the cloud requirements like rapid elasticity, resource pooling and on-demand self-service. In this paper the current state of Task Scheduling algorithms has been discussed and compared on the basis of various scheduling parameters like execution time, throughput, makespan, resource utilization, quality of service, energy consumption, response time and cost.
Large-scale internet applications provide service to end users with servers, which may be located at geographically distributed data centers. Users may require different delay constraints for different services. To me...
详细信息
ISBN:
(纸本)9781509009473
Large-scale internet applications provide service to end users with servers, which may be located at geographically distributed data centers. Users may require different delay constraints for different services. To meet the service delay requirements to end users, the data centers must provide enough server resources which incur a large amount of electricity and dollars cost. In this paper, we tackle the problem of minimizing electricity cost under diverse delay requirements of different services for different users in a multi-electricity-market environment. We propose two algorithms to reduce the electricity cost, taking into account the location diversity and the time diversity of electricity price. Our simulation results demonstrated that the proposed algorithms were effective in terms of the reduction of the electricity cost while satisfying the diverse delay constraints.
The human activity recognition in the IoT environment plays the central role in the ambient assisted living, where the human activities can be represented as a concatenated event stream generated from various smart ob...
详细信息
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. With the continuous evolution of global information processes, cloud ...
详细信息
ISBN:
(纸本)9781510821934
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. With the continuous evolution of global information processes, cloud computing has become a new internet service model following distributedcomputing, parallel computing and grid computing and it has attracted widespread concern from the industry and the government. Starting from the concept and development status of cloud computing, this paper proposes the connotation and two forms of cloud computing security with respect to services and data analysis, then it makes an in-depth analysis of the cloud computing security challenges encountered in the development process, and presents the critical technologies of security protection including data backup strategy, data partial encryption scheme and module design at last.
Virtual network management is a basic component provided by cloud computing system. In cloud environment, the fact that VMs in the same subnet are located in different hosts, the traffic of VMs attached to different u...
详细信息
ISBN:
(纸本)9781509009473
Virtual network management is a basic component provided by cloud computing system. In cloud environment, the fact that VMs in the same subnet are located in different hosts, the traffic of VMs attached to different users should be isolated, the VM would be migrated to other hosts makes network management different from that in physical network. technology like overlay and SDN is usually introduced to establish a reliable and efficient virtual network management scheme. However, there are many drawbacks such as flexibility and hardware costs in most schemes introducing technology above-mentioned. We addressing these problems by designing a scheme on the hyper-visor layer of physical hosts based on overlay and SDN technology, which means the tradition virtual network can be easily transformed to our system without purchasing new devices supported OpenFlow or VXLAN(a kind of technology in overlay) protocol. Besides additional functions like monitor and traffic mirror can be customized by users' needs for the system's flexibility and scalability the SDN technology endowing. We also design a distributed Virtual Router(DVR) on each host to solve the general problem of traffic between internet and Intranet concentrating in most schemes. The experimental evaluation shows that our system has achieve the basic intercommunication under the situation of tenant isolation and its performance of communication between internet and Intranet acts obviously better than that in OpenStack scheme for our DVR design.
In today scenario of internet world, mining of data from large amount of database is a big challenges, for this finding the relationship from the database is also a big problem, for reduction of this type of problems ...
详细信息
In today scenario of internet world, mining of data from large amount of database is a big challenges, for this finding the relationship from the database is also a big problem, for reduction of this type of problems the association rule mining concept is used to mining the whole dataset from the distributed database for solving this type of problem the Apriori algorithms is used to reduce the data mining concept. The primary goal of this paper is to provide the high privacy and security in the distributed database environment to prevent the unauthorized access from the third site user for providing the high privacy, to providing the high privacy two well define algorithm is used first one is hash based algorithm and second one is sign based algorithm for with and without trusted site in both wired and wireless environments. This paper divided the centralized database into the distributed database by using the horizontally partitioned algorithm to reduce the data leakage with highest privacy.
Cloud computing is an internet-based distributed system architecture to provide the customers with services and resources in a scalable and self-manageable fashion. Whatever the user needs and wherever he demands it-C...
详细信息
暂无评论