At present, there are a lot of mature encryption mechanisms and access control models for the protection of the data content in cloud environment. However, the research on the privacy protection of data attributes in ...
详细信息
ISBN:
(纸本)9781509051540
At present, there are a lot of mature encryption mechanisms and access control models for the protection of the data content in cloud environment. However, the research on the privacy protection of data attributes in cloud is still in the initial stage, which can be classified as two types: one is the privacy protection of data attributes during data transmission, including routing information, generation time, size and frequency, etc.;the other is the privacy protection of data attributes as data storage, including relationships between attributes and distribution of attribute values. the current encryption mechanisms and access control models cannot solve the problem perfectly. In this paper, we try to analyze current protection schemes and algorithms for the protection of data attributes, and point out the future research directions.
the data mining issue in big data processing which is based on cloud computing has become a hot research topic. Generally, most of the previous work directly analyzes the data through the existing mining approaches, w...
详细信息
ISBN:
(纸本)9781467388184
the data mining issue in big data processing which is based on cloud computing has become a hot research topic. Generally, most of the previous work directly analyzes the data through the existing mining approaches, which may cause problems such as redundant computation, high time complexity, and large storage space. Based on this argument, a novel heuristic approach called PASS (Pre-processing based on Small Sample) has been proposed for finding a small sample composed of the most frequent transactions in big data pre-processing. Taking advantage of the cloud computing which can solve the bottleneck of data mining in distributed environment, PASS directly operates on the transaction database and groups all transactions according to different dimensions. By using the Bitmap-Sort, the most frequent transactions can be screened from each transaction set. Finally, the best-transaction-set is obtained through aggregating all the transaction-elects of each transaction set. the experimental results have shown that PASS significantly avoids producing plenty of candidate sets resulting from join operation, accelerates the maximal frequent itemsets mining, economizes the storage space, and improves the utilization rate of resources simultaneously.
In recent years, substantial research efforts have gone into investigating different approaches to the detection of events in real time from the Twitter data stream. Most of these approaches, however, suffer from a hi...
详细信息
Robust and optimized agent behavior can be achieved by allowing for learning mechanisms within the underlying adaptive control strategies. therefore, a classic feedback loop concept is used that chooses the best actio...
详细信息
An ageing population with increased social care needs has provided recent impetus for research into assisted living technologies, as the need for different approaches to providing supportive environments for senior ci...
详细信息
Fog computing is a promising paradigm in terms of extending cloud computing to an edge network. In a broad sense, fog computing in Internet-of-Vehicles(IoV) provides low-latency services since fog nodes are closely lo...
详细信息
Nowadays, mobile devices host many applications that are directly downloaded and installed from a store. the existence of such a large amount of apps for a myriad of purposes imposes a huge overhead on users, who are ...
详细信息
ISBN:
(纸本)9781509055661
Nowadays, mobile devices host many applications that are directly downloaded and installed from a store. the existence of such a large amount of apps for a myriad of purposes imposes a huge overhead on users, who are in charge of selecting, installing, executing the appropriate apps and deleting them when no longer needed. these applications have mostly neglected to take into account the user's context by proposing static non evolving scenarios of use. In order to address these concerns, comes the idea of a single application constantly executed on the mobile device while automatically handling software components according to the users' needs. Long Life Application is new way to respond to the user's needs in a dynamic and intelligent way. It evolves at run time (include/exclude business functionalities, update interactions mode, migrate executions) according to the user's need. While he/she moves in his/her surroundings, the app understands the occurring events and builds contextually described situations. thus, context awareness and contextual formulation are the main issues discussed in this paper.
Variable granulation rough set and D-S evidence theory are two kinds of complementary evidence fusion method. In this paper, we discuss the two theories in detail, and proposing an evidence fusion method based on vari...
详细信息
ISBN:
(纸本)9781509039067
Variable granulation rough set and D-S evidence theory are two kinds of complementary evidence fusion method. In this paper, we discuss the two theories in detail, and proposing an evidence fusion method based on variable granulation rough set according to the contact between the two theories. this method transforms the multi-source evidence fusion problem to the data analysis problem of multi-source information system. We use granulation space to represent evidence space, and use granulation distance to represent evidence distance, so that we can judge if there is a conflict between the evidences or not. And then the corresponding fusion rules are used to set the parameter beta and carry on the evidence fusion respectively. At the end of the paper, an example of calculation shows that the fusion method is effectively.
Cloud computing is an Internet-based distributed system architecture to provide the customers with services and resources in a scalable and self-manageable fashion. Whatever the user needs and wherever he demands it-C...
详细信息
Virtualization technology has been widely adopted in Cloud data centers for adaptive resource provisioning. With virtualization, multiple virtual machines (VMs) can be co-located on a single physical host to yield max...
详细信息
ISBN:
(纸本)9781509051540
Virtualization technology has been widely adopted in Cloud data centers for adaptive resource provisioning. With virtualization, multiple virtual machines (VMs) can be co-located on a single physical host to yield maximum efficiency. However, VMs which show high CPU utilization correlations to other co-located peers are more likely to trigger overloading incidents. this work provides an analysis on effects of correlation-based VM allocation criteria to Cloud data centers. the correlations among VMs' CPU utilizations are considered as parameters for decision making in VM allocation processes. three different expressions of correlation-based criteria are introduced and evaluated in this work. According to our simulation results obtained from CloudSim with real-world workload traces, Cloud data centers with correlation-based allocation criteria can perform better in terms of reducing energy consumption and avoid committing Service Level Agreements violations than those with power-based criteria.
暂无评论