Network complexity is increasing, making network control and orchestration a challenging task. the proliferation of network information and tools for data analytics can provide an important insight into resource provi...
详细信息
ISBN:
(纸本)9781509055661
Network complexity is increasing, making network control and orchestration a challenging task. the proliferation of network information and tools for data analytics can provide an important insight into resource provisioning and optimisation. the network knowledge incorporated in software defined networking can facilitate the knowledge driven control, leveraging the network programmability. We present Seer: a flexible, highly configurable data analytics platform for network intelligence based on software defined networking and big data principles. Seer combines a computational engine with a distributed messaging system to provide a scalable, fault tolerant and real-time platform for knowledge extraction. Our first prototype uses Apache Spark for streaming analytics and open network operating system (ONOS) controller to program a network in real-time. the first application we developed aims to predict the mobility pattern of mobile devices inside a smart city environment.
Private information retrieval is an important application of homomorphic encryption. As a hot topic in recent years, homomorphic encryption scheme can operate on the ciphertext and the decryption result is equal to th...
详细信息
ISBN:
(纸本)9781509041237
Private information retrieval is an important application of homomorphic encryption. As a hot topic in recent years, homomorphic encryption scheme can operate on the ciphertext and the decryption result is equal to the same operation on the plaintext. Trivial PIR protocol faces the plaintext retrieval, so it could not guarantee the database privacy. In the cloud environment, it is unsafe to store the plaintext in the server. In order to settle the above problem, based on a somewhat homomorphic encryption scheme, we design a multi-server PIR. It can not only achieves the privacy and resisting the colluding attack, but also reaches the information-theoretic security.
We propose in this paper a software-defined security framework, for supporting the enforcement of security policies in distributed cloud environments. these ones require security mechanisms able to cape withtheir mul...
详细信息
ISBN:
(纸本)9781509014453
We propose in this paper a software-defined security framework, for supporting the enforcement of security policies in distributed cloud environments. these ones require security mechanisms able to cape withtheir multi-tenancy and multi-cloud properties. this framework relies on the autonomic paradigm to dynamically configure and adjust these mechanisms to distributed cloud constraints, and exploit the software-defined logic to express and propagate security policies to the considered cloud resources. the proposed framework is evaluated through a set of validation scenarios corresponding to a realistic use cases including cloud resource allocation/deallocation, cloud resource state change, and dynamic access control.
GTS is a new service in GANT that allows users to set up wide-area virtual networks via a web-based automatic provisioning system. the virtual networks are built within minutes over the underlying physical infrastruct...
详细信息
ISBN:
(纸本)9781509014453
GTS is a new service in GANT that allows users to set up wide-area virtual networks via a web-based automatic provisioning system. the virtual networks are built within minutes over the underlying physical infrastructure and thus allow the researcher to carry out network experiments with great flexibility and enable rapid prototyping and innovation. the individual network environments are isolated from other users and are assembled following the researcher's topology requirements. Currently a researcher can select GTS virtual machines (VMs), virtual links (VCs) and OpenFlow instances (OFXs) as network resources in the virtual network, but the architecture of GTS is scalable and can be expanded anytime with new resources. A user can also connect external facilities to such automatically provisioned environments or use GTS as connecting fabric between distributed labs. this paper provides an overview of GTS and describes upcoming versions with further developments and feature improvements.
Connectivity of everyday objects is on the rise forming the so-called Internet of things (IoT). Different domains such as vehicular and smart home networks will be linked together requiring new strategies to support i...
详细信息
Connectivity of everyday objects is on the rise forming the so-called Internet of things (IoT). Different domains such as vehicular and smart home networks will be linked together requiring new strategies to support interoperability. the Information-Centric networking (ICN) paradigm is a promising candidate to form a harmonized ecosystem across different IoT domains. As ICN exploits caching and does not rely on continuously available end-to-end connectivity between a producer and a consumer of data, enabling access control and other security features in an ICN is a special challenge. this paper introduces the mechanism EnCIRCLE - Encryption-based access Control for InfoRmation-centric Connected vehicLEs. EnCIRCLE is an approach which can provide access control and other security features in ICN-based IoT systems. We apply EnCIRCLE to a vehicular system, which is especially challenging due to mobile and intermittently connected network participants.
Vehicular Clouds processing is a new field of research that aims to exploit the vehicles' onboard computational resources as a part of a cooperative distributed cloud computing environment. In this paper, we propo...
详细信息
Vehicular Clouds processing is a new field of research that aims to exploit the vehicles' onboard computational resources as a part of a cooperative distributed cloud computing environment. In this paper, we propose a vehicular cloud network architecture where a group of vehicles near a traffic light cluster and form a temporal vehicular cloud by aggregating their computational resources in that cluster. the goal of the proposed architecture is to minimize the processing and network power consumed in the data center of a cloud operator. To this end, arriving processing tasks are optimally assigned to the centralized cloud and/or the formed vehicular clouds to reduce the total power consumption of the centralized cloud by reducing its average processing workload and network traffic. Furthermore, task assignment among vehicular clouds is constrained by tasks completion time. Our proposed system is analyzed using a mixed integer linear programming (MILP) model where two task assignment approaches were considered: single task assignment and distributed task assignment. In the first approach, each task is not split among multiple clouds, while splitting is allowed in the second approach. It was found that the power consumption of the centralized cloud is reduced by 45% (in the first approach) and 60% (in the second approach) compared to the case where all tasks are assigned to the centralized cloud only. the higher power saving of the centralized cloud in the second approach comes from the ability of vehicular clouds to host more processing workload, an average of 37% more workload, compared to the single task assignment approach.
Cloud computing offers readily available, scalable infrastructure to tackle problems involving high data volume and velocity. Discovering processes from event streams, especially when the business processes execute in...
详细信息
ISBN:
(纸本)9781509014453
Cloud computing offers readily available, scalable infrastructure to tackle problems involving high data volume and velocity. Discovering processes from event streams, especially when the business processes execute in a cloud environment, is such a problem. Event stream data is generated rapidly with varying volume and must be processed on-the-fly, making stream processing an important use case for cloud computing. this paper describes a distributed, streaming implementation of the flexible heuristics miner on Amazon Kinesis, a cloud-based event stream infrastructure, showing how mining methods can scale effortlessly to tens of millions of events per minute.
the Advanced Manufacturing Program 2.0 envisages a rejuvenationof the manufacturing infrastructure in the USA. Many of therejuvenated plants are not human-labor intensive; rather, thesefacilities have advanced capabil...
详细信息
ISBN:
(纸本)9781467391450
the Advanced Manufacturing Program 2.0 envisages a rejuvenationof the manufacturing infrastructure in the USA. Many of therejuvenated plants are not human-labor intensive; rather, thesefacilities have advanced capabilities that have automated machineswith a few human operators. As such programs are rolled outto revitalize the economy, we will have many small facilities thatare highly automated to execute specific tasks. However, whenthe market demands vary, it is very likely that the utilization ofsuch advanced plants with limited, highly optimized, capabilitieswill decrease. To mitigate the losses that can arise from such idleresources, we are investigating a new framework in which suchautomated and optimized plants can be reused and shared across arich variety of manufacturing applications. A cloud-hosted serviceoffers a front end for manufacturing tasks to be submitted whileit makes resource allocation and scheduling decisions across thegeographically distributed plants.
Cloud computing provides reliable and highlyscalable access to resources over the internet. But outsourcing sensitive data to an probably untrusted cloud provider (third party) requires cryptographic methods like encr...
详细信息
ISBN:
(纸本)9781509014453
Cloud computing provides reliable and highlyscalable access to resources over the internet. But outsourcing sensitive data to an probably untrusted cloud provider (third party) requires cryptographic methods like encryption. this paper presents a novel approach to a distributed cloud key management scheme. In a setting with a public cloud application, data is encrypted by a separate trusted adapter before storing somewhere else. the encryption key is not persistently stored at the adapter. Several entities share parts of the key that is computed and temporarily stored at the adapter if needed. this work describes how the key management is working during bootstrapping and runtime as well as how key recovery can be performed.
As the development in the cloud environment, virtual technology can consolidate multiple servers and abstract the hardware resources to each virtual machine. Memory is a well-known physical hardware resource, which ha...
详细信息
ISBN:
(纸本)9781509041237
As the development in the cloud environment, virtual technology can consolidate multiple servers and abstract the hardware resources to each virtual machine. Memory is a well-known physical hardware resource, which has various limitations because of its high cost and strong power. the size of memory in which virtual machines in the Cloud environment always changes dynamically. therefore, a flexible virtual memory management is supposed to adopt in Cloud environment so that the system allocates memory reasonably. In this paper, we observe the memory management system in Cloud environment and review the present situation of memory management.
暂无评论