this study describes a preliminary research on Information Retrieval (IR) systems. We developed a prototype tool that runs on a master-slave model and uses distributed processing in order to decentralize the workload ...
详细信息
ISBN:
(纸本)9781467308946;9788994364261
this study describes a preliminary research on Information Retrieval (IR) systems. We developed a prototype tool that runs on a master-slave model and uses distributed processing in order to decentralize the workload while retrieving information from the internet. Later, its viability is demonstrated with a set of executions and the discussion follows with an analysis of the master process overload versus the number of slaves connected.
Withthe development of the internet of things technology, more and more large-scale distributedinternet of things applications emerge, to which system communication and collaboration is crucial. Traditional messagin...
详细信息
ISBN:
(纸本)9781467302395
Withthe development of the internet of things technology, more and more large-scale distributedinternet of things applications emerge, to which system communication and collaboration is crucial. Traditional messaging middleware can not meet the development needs of internet of things. Based on open-source Hadoop cloud computing platforms, we designed a messaging middleware system: Cloudqueue. In the cloud computing era, it can provide high-performance, high reliability and large capacity of internet-scale messaging service for the internet of things applications. through the asynchronous communication, reliable transmission and cross-data center features provided by the Cloudqueue platform, the system integration of internet of things applications and massive data processing will be more flexible and efficient.
As a novel computing model, network computingthe computing resources distributed on the internet, and providing required service through the unified interface, which bring great convenience to people's daily life...
详细信息
ISBN:
(纸本)9781467302395
As a novel computing model, network computingthe computing resources distributed on the internet, and providing required service through the unified interface, which bring great convenience to people's daily life. However, the existence of security related threats in internet hinder the further application of network computing. Regarding this problem, this paper propose a security enhancing technology based on periodic security condition monitoring, which is aware the security state of network computing environment and suitable action is chosen for the security defending of network domain.
Cloud computing (CC) has generated interest from both industry and academia over these years. As an extension of Grid computing and distributedcomputing, CC aims to provide users with flexible services in a transpare...
详细信息
ISBN:
(纸本)9781467353250;9781908320087
Cloud computing (CC) has generated interest from both industry and academia over these years. As an extension of Grid computing and distributedcomputing, CC aims to provide users with flexible services in a transparent manner. the distributed implementation of CC creates a suitable environment for easy targets, vulnerable and prone to sophisticated attacks. Commonly virtualization is the most utilized technology to implement a Cloud environment with a massive multi-tenancy usage, opening a door to a whole other level of security issues. this creates new targets for intrusion due to the complexity of access and difficulty in monitoring all interconnection points between systems, applications, and data sets. this raises many questions about the appropriate infrastructure, processes, and strategy for enacting detection and response to intrusion in a Cloud environment. this article discusses the security and the visibility issues of inter-VM traffic and solutions for it within a Cloud environment context, by proposing an approach relying on distributed intrusion detection technique and packet inspection. (Abstract)
Withthe development of cloud computing, it needs high performance, availability and scalability of storage service. In shared storage environment based on the opening storage architecture, due to the inadaptability o...
详细信息
ISBN:
(纸本)9781467353250;9781908320087
Withthe development of cloud computing, it needs high performance, availability and scalability of storage service. In shared storage environment based on the opening storage architecture, due to the inadaptability of the cache management, cache located on access paths provides performance acceleration, but limits availability and scalability of cloud storage system. this paper studies previous cache management technology of cluster or distributed system, and puts emphasis on availability and consistency, which bring down availability and scalability of cloud storage system. Moreover, this paper also analyzes the adaptability of previous cache management technology for shared storage environment.
In recent years, remarkable advances have been made in internettechnology. People obtain information not only from the newspaper and the television but also from internet. therefore, many data files are stored in rep...
详细信息
ISBN:
(纸本)9781467308946;9788994364261
In recent years, remarkable advances have been made in internettechnology. People obtain information not only from the newspaper and the television but also from internet. therefore, many data files are stored in repositories on the network. Lots of network storage providers make use of the distributed file system to manage data files with a stable service. the problem about the overload of one file server still exists in the distributed file system. Hence, the file replication strategy is adopted to lighten the load of the file server and to balance the load of the whole system. In this paper, we shall observe each file access growth trend. the system creates and stores file replicas in some suitable repositories according to the growth trend. If a file server crashes, the user will find the requested file by the file replication strategy. through the strategy, the replicas will be stored in suitable repositories, and users almost can access needed files in local servers to decrease the file transmission delay.
In this paper we describe the architecture of a quality-of-service (QoS) infrastructure for achieving controlled application performance over NoSQL distributed storage systems. We present an implementation of our arch...
详细信息
there are many services on internetthat people can enjoy them everywhere. these services all need a large-scale storage system to store thousands of data. Although the large-scale storage system provides large storag...
详细信息
ISBN:
(纸本)9781467308946;9788994364261
there are many services on internetthat people can enjoy them everywhere. these services all need a large-scale storage system to store thousands of data. Although the large-scale storage system provides large storage capability, it also consumes much energy. the traditional energy-efficient storage system usually spins down the hard-disk rotation rate to reduce the energy consumption. However, only spinning down the hard-disk rotation rate can only save little energy. In this paper, we propose an energy-efficient storage system. the system reduces the consumption of energy by switching the server state into the sleep mode. We also propose two scheduling algorithms to handle the offline and online scheduling modes. the experimental result shows the proposed energy-efficient storage system can save about 50%similar to 75% of the energy.
Withthe rapid development of the internet, SaaS applications delivered as services through internet become an important alternative of traditional software. While using the services, users need real time usage inform...
详细信息
ISBN:
(纸本)9781467302395
Withthe rapid development of the internet, SaaS applications delivered as services through internet become an important alternative of traditional software. While using the services, users need real time usage information, and they also need to dig out useful knowledge. As a result, data processing and data mining techniques are designed to cope with such problems, and using log data is an effective method to record the SaaS usage information in a standard format. However, as the size of data grows, traditional distributed log data processing systems are not able to processing massive log data from SaaS applications with millions of users. this paper proposes a mass log data processing and data mining methods based on Hadoop to achieve scalability and performance. the model, process, architecture, and implementation of the data processing and mining methods are proposed, and the experimental results is shown and analyzed to prove the effectiveness of the methods.
Most cloud computing service providers secure their offered cloud services by username/password schemes, which have been proven to be weak. While such schemes m ay be sufficient for simple personalized services, e-Gov...
详细信息
ISBN:
(纸本)9781467353250;9781908320087
Most cloud computing service providers secure their offered cloud services by username/password schemes, which have been proven to be weak. While such schemes m ay be sufficient for simple personalized services, e-Government or e-Health applications in the cloud require more reliable and stronger mechanisms. One of such mechanisms are electronic IDs (eID), which allow for unique qualified identification and strong authentication. EIDs have been rolled-out in many EU Member States since years. In this paper we present how various national eIDs can be used for secure cloud authentication. We therefore extended the STORK eID interoperability framework, which will be the relevant identification and authentication framework across Europe in future. Furthermore, we increased usability by additionally applying single sign-on (SSO). Single sign-on defines the ability to authenticate just once in a distributed environment and gain access to several protected services. In fact, by our extended STORK architecture citizens of 18 EU Member States those Member States that support STORK - are able to use seamless authentication at different cloud service providers by using their own national eID.
暂无评论