Many applications require localized computation in order to ensure better performance, security, and lower costs. In recent years, the emergence of internet-of-Things (IoT) devices has caused a paradigm shift in compu...
详细信息
ISBN:
(纸本)9781479989775
Many applications require localized computation in order to ensure better performance, security, and lower costs. In recent years, the emergence of internet-of-Things (IoT) devices has caused a paradigm shift in computing and communication. IoT devices are making our physical environment and infrastructures smarter, bringing pervasive computing to the mainstream. With billions of such devices slated to be deployed in the next five years, we have the opportunity to utilize these devices in converting our physical environment into interactive, smart, and intelligent computing infrastructures. In this paper, we present Aura - a highly localized IoT based cloud computing model. Aura allows clients to create ad hoc clouds using the IoT and other computing devices in the nearby physical environment, while providing the flexibility of cloud computing. Aura provides localized computation capability from untapped computing resources. Computations done on Aura are highly flexible, giving clients full control to start, stop, migrate, and restart computations in nearby devices as the clients move between different physical locations. To demonstrate the feasibility of Aura, we have ported a lightweight version of MapReduce to run on IoT devices, and evaluated its performance.
The ongoing convergence of cloud computing and the IoT gives rise to the proliferation of diverse, large-scale IoT and mobile cloud systems. Such novel IoT cloud systems offer numerous advantages for all involved stak...
详细信息
ISBN:
(纸本)9781479989775
The ongoing convergence of cloud computing and the IoT gives rise to the proliferation of diverse, large-scale IoT and mobile cloud systems. Such novel IoT cloud systems offer numerous advantages for all involved stakeholders. However, due to scale, complexity, and inherent geographical distribution of such systems, governing new IoT cloud resources poses numerous challenges. In this paper we introduce rtGovOps, a novel framework for on-demand runtime operational governance of software-defined IoT cloud systems. To illustrate the feasibility of our framework and its practical applicability to implement and execute operational governance processes in large-scale software-defined IoT cloud system, we evaluate our approach using a realworld case study on managing fleets of electric vehicles.
Detection of faulty relay nodes in two tier wireless sensor network (WSN) is an important issue. In this paper, we present a distributed fault detection algorithm for the upper tier of a cluster based WSN. Any faulty ...
详细信息
ISBN:
(纸本)9783319120126;9783319120119
Detection of faulty relay nodes in two tier wireless sensor network (WSN) is an important issue. In this paper, we present a distributed fault detection algorithm for the upper tier of a cluster based WSN. Any faulty relay node is identified by its neighbors on the basis of the neighboring table associated with them. Time redundancy is used to tolerate transient faults and to minimize the false alarms. The algorithm has O(m) message complexity in the worst case for a WSN with m relay nodes. Simulation results are presented and analyzed with various performance metrics, including detection accuracy and false alarm rate.
Topology control mechanism plays a vital role while designing wireless sensor network and mobile ad-hoc control. Topology control mechanism should create topology with lower transmission power, sparser connectivity, w...
详细信息
ISBN:
(纸本)9783319119328
Topology control mechanism plays a vital role while designing wireless sensor network and mobile ad-hoc control. Topology control mechanism should create topology with lower transmission power, sparser connectivity, with smaller node degree. Proposed paper presents analysis of different topology control mechanisms at present. Energy conservation is one of the main aim behind the topology control. This paper presents distributed topology control mechanism which is energy efficient and provides increases network lifetime. Proposed topology control algorithm gives better results in energy conservation as compared to existing algorithm.
The recent proliferation of smartphones and tablets leads to consider such devices as means for the execution of cyber-attacks. This scenario has rarely been considered earlier, since mobile devices always represented...
详细信息
ISBN:
(纸本)9781467381031
The recent proliferation of smartphones and tablets leads to consider such devices as means for the execution of cyber-attacks. This scenario has rarely been considered earlier, since mobile devices always represented a target for cyber-criminals, rather than a vector to exploit. In this paper we introduce an innovative mobile botnet infrastructure, composed by mobile agents, for the execution of denial of service attacks. We prove that the chance of involving mobile bots is possible, comparing the proposed infrastructure to Low-Orbit Ion Cannon (LOIC), a well-known system in this context. Results show that in virtue of reduced resource consumption the proposed system is particularly addicted to the mobile environment. The idea of a mobile botnet is unexplored until now, therefore, the proposed system represents an important step in the mobile and cyber-security field.
In spite of the fact that Cloud computing Environments (CCE) host many I/O intensive applications such as web services, big data and virtual desktops, virtual machine monitors like Xen impose high overhead on CCE39;...
详细信息
ISBN:
(纸本)9781467381031
In spite of the fact that Cloud computing Environments (CCE) host many I/O intensive applications such as web services, big data and virtual desktops, virtual machine monitors like Xen impose high overhead on CCE's delivered performance hosting such applications. Studies have shown that hypervisors such as Xen favor compute intensive workloads while their performance for I/O intensive tasks is far from satisfactory. In this paper we present a new mechanism called cCluster to mitigate I/O processing delay in CCEs. To this end, cCluster classifies running virtual machines into I/O and computation VMs, and based on this classification, it dynamically classifies exiting physical cores into I/O and computation cores too. It then schedules I/O virtual CPUs (vCPU) on I/O cores and computation vCPUs on computation cores. Empirical results demonstrate that cCluster remarkably reduces the I/O response time and thus improves the network throughput.
The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. In July 2012 The U.S. Department of Defense released its Cloud computing Strategy noting t...
详细信息
ISBN:
(纸本)9781910810620
The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. In July 2012 The U.S. Department of Defense released its Cloud computing Strategy noting that "delivering an enterprise cloud computing strategy will require strong governance authority and continued commitment to greater transparency through regular and open reporting." Shortly thereafter in September 2012, the European Commission adopted a strategy for "unleashing the Potential of Cloud computing in Europe." The strategy is designed to speed up and increase the use of cloud computing across all economic sectors. This strategy is the result of an analysis of the overall policy, regulatory and technology landscapes and of a wide consultation with stakeholders, to identify ways to maximize the potential offered by the cloud. Since 2012 numerous policies, standards, regulations, directives and risk assessments have been issued by the United States, the EU and many countries worldwide. Nations are constantly facing the tensions of how to expedite the economic benefits of cloud computing and the internet economy while, at the same time, protecting intellectual property and privacy (data protection), securing critical infrastructure, and providing for defense of the homeland. Any approach to cloud security needs to consider the following 'three dimensions' for policy development: (1) the international, (2) the national and (3) the government. The laws and policies governing cyber security, data protection and privacy vary from one country to another and can be subject to differing interpretations. This paper explores the issues impacting a cohesive, integrated, unified cloud security strategy among regional and national governments including the issues of governance, privacy, security, risk sharing and the transnational nature of cyberspace. To understand better the challenges of developing a unified system of cloud governance, a comparative anal
The success and continuation of cloud computing depends to a large extent on the quality and performance of the offered services. We propose in this paper a novel architecture for cloud computing called Community-base...
详细信息
ISBN:
(纸本)9781467381031
The success and continuation of cloud computing depends to a large extent on the quality and performance of the offered services. We propose in this paper a novel architecture for cloud computing called Community-based Cloud computing whose main goal is to improve the quality and performance of the cloud services. In this architecture, cloud services sharing the same domain of interest are partitioned into a set of communities led by a central entity called master. The advantages of such an architecture are (1) facilitating the discovery of cloud services, (2) providing efficient means for better QoS management and resources utilization, and (3) easing intra-layer and cross-layer compositions. However, one of the serious challenges against the success of such an architecture is the presence of malicious services that launch attacks either against the whole community or against some partners in that community. Therefore, we address this problem by proposing a misbehavior detection framework based on the Support Vector Machine (SVM) learning technique. In this framework, the master of the community monitors the behavior of its community members to populate the training set of the classifier. Thereafter, SVM is used to analyze this set and predict the final classes of the cloud services. Simulation results show that our framework is able to produce highly accurate classifiers, while maximizing the attack detection rate and minimizing the false alarms. They show also that the framework is quite resilient to the increase in the number of malicious services.
Analyze the restrictive factors of internet of things major in the curriculum system in according with present market demand situation of internet of things talent. It is suggested that practice be combined with theor...
详细信息
Analyze the restrictive factors of internet of things major in the curriculum system in according with present market demand situation of internet of things talent. It is suggested that practice be combined with theory. Students' practice ability should be improved. Diverse curriculum should be created and a new training mode and training objective should be established to improve teaching effect of internet of things major curriculum.
The main objective of deploying large scale Mobile Cloud computing (MCC) systems using the cloudlet based infrastructure is to reduce the total power consumption and the network delay while satisfying the Service Leve...
详细信息
ISBN:
(纸本)9781467381031
The main objective of deploying large scale Mobile Cloud computing (MCC) systems using the cloudlet based infrastructure is to reduce the total power consumption and the network delay while satisfying the Service Level Agreement (SLA). However, this objective is challenging to achieve due to the limited capabilities of the cloudlet system which limit the number of available services on each cloudlet system. This will force different cloudlets to cooperate in order to meet the users demands for different types of services. Moreover, the cooperation will require routing of user requests from the local cloudlet to a remote cloudlet that provide the requested service using a backbone network. This cooperation will increase the total power consumption per request which will include both the user to the local cloudlet power consumption and the power consumption for routing the request to a remote cloudlet. In this paper, we address the problem of optimizing the power consumption for large scale cooperative cloudlets deployments. The evaluation of the proposed model under different realistic scenarios shows that it can be used to accurately optimize power consumption in large scale MCC systems.
暂无评论