In recent years, computing environment has changed a lot by rapid development of computingtechnology and adoption of cloud computing is increasing. The social consensus by introduction of smartwork based on this clou...
详细信息
ISBN:
(纸本)9781479965410
In recent years, computing environment has changed a lot by rapid development of computingtechnology and adoption of cloud computing is increasing. The social consensus by introduction of smartwork based on this cloud computing environment is increasing. Especially, smartwork which can work freely anytime and anywhere has been noted as a new business model while broadband communication infrastructure becomes popular. But, large inhibitory factor is that various security problems by new information technology applied in smartwork environment can occur and smartwork is vulnerable to information leaks. In this paper, we look at smart network security element for the activation of the smartwork environment and organize to prepare in security vulnerabilities. The content present in this paper is applied to comprehensive security model.
convergence essentially can be defined as at least two discernible entities moving toward union and is prominent in the ICT sector where combinations of different products and services have resulted in many meaningful...
详细信息
ISBN:
(纸本)9781890843328
convergence essentially can be defined as at least two discernible entities moving toward union and is prominent in the ICT sector where combinations of different products and services have resulted in many meaningful innovations. Since convergence is triggered by knowledge convergence, we explore this phenomenon between cloud computing and big data by employing keyword co-occurrence analysis on scientific publications. Following that, this paper explores the case of Malaysia as cloud computing service sector has emerged and there is focus on adoption of big data. Subsequently, new opportunities for cloud service providers in Malaysia are derived from the result of knowledge convergence.
In this article there is viewed the strategy of how Virtual Learning Environment (VLE) for general secondary education can be gradually transformed from digital resources located in schools to overall Cloud computing ...
详细信息
ISBN:
(纸本)9781467308946;9788994364261
In this article there is viewed the strategy of how Virtual Learning Environment (VLE) for general secondary education can be gradually transformed from digital resources located in schools to overall Cloud computing application, comprehending this process as convergence from the VLE located in schools to the one disposed on Cloud. There are divided VLE functional blocks and described Unified computing facility structure, which is meant to be as Cloud computing resource.
Public auditing has vital significance in cloud computing. However, current auditing scheme are costly. This paper brings out an AAA based public auditing architecture for cloud computing, which is much more efficient...
详细信息
ISBN:
(纸本)9781467308946;9788994364261
Public auditing has vital significance in cloud computing. However, current auditing scheme are costly. This paper brings out an AAA based public auditing architecture for cloud computing, which is much more efficient than current schemes.
Internet of Things (IoT), currently cloud IoT infrastructure is shifting toward fog computing through the task offloading process. Fog computing provides computing capabilities that bring closer to the IoT devices. By...
详细信息
ISBN:
(纸本)9781665423830
Internet of Things (IoT), currently cloud IoT infrastructure is shifting toward fog computing through the task offloading process. Fog computing provides computing capabilities that bring closer to the IoT devices. By task offloading shifting to the fog, nodes can avoid high network congestion. Fog computing can improve the quality of service, especially for delay-sensitive applications by enabling low latency requirements. In the IoT infrastructure, low-cost devices are used for less expensive infrastructure deployments. Raspberry pi is used for computing infrastructure with cheaper development. A small single-board computer not only has high computing capacity but also allows high portability.
The recent trend of military is to combined Internet of Things (IoT) knowledge to their field for enhancing the impact in battlefield. That's why Internet of battlefield (IoBT) is our concern. This paper discusses...
详细信息
ISBN:
(纸本)9781728108933
The recent trend of military is to combined Internet of Things (IoT) knowledge to their field for enhancing the impact in battlefield. That's why Internet of battlefield (IoBT) is our concern. This paper discusses how Fog Radio Access Network(F-RAN) can provide support for local computing in Industrial IoT and IoBT. F-RAN can play a vital role because of IoT devices are becoming popular and the fifth generation (5G) communication is also an emerging issue with ultra-low latency, energy consumption, bandwidth efficiency and wide range of coverage area. To overcome the disadvantages of cloud radio access networks (C-RAN) F-RAN can be introduced where a large number of F-RAN nodes can take part in joint distributed computing and content sharing scheme. The F-RAN in IoBT is effective for enhancing the computing ability with fog computing and edge computing at the network edge. Since the computing capability of the fog equipment are weak, to overcome the difficulties of fog computing in IoBT this paper illustrates some challenging issues and solutions to improve battlefield efficiency. Therefore, the distributed computing load balancing problem of the F-RAN is researched. The simulation result indicates that the load balancing strategy has better performance for F-RAN architecture in the battlefield.
The integration of fog computingtechnology into the IoT-enabled systems is expected to improve the computing performance of system in terms of delay through task offloading mechanisms. However, to gain such a benefit...
详细信息
ISBN:
(纸本)9781665423830
The integration of fog computingtechnology into the IoT-enabled systems is expected to improve the computing performance of system in terms of delay through task offloading mechanisms. However, to gain such a benefit, the schemes must consider many factors including the heterogeneity nature of fog computing environment, a variety of task requirements and characteristics. In some scenarios, many of single fogs cannot process heavy tasks due to lack of available resources or limited computing capabilities. Meanwhile, fogs with richer resources may have long queues of waiting tasks, thus probably increasing the overall delay of task execution. This paper proposes to use a task splitting to cope with the issues and investigate this impact on the delay of task offloading.
Multi-access Edge computing (MEC) technology is a key technology for realizing 5G B2B service, which is a market that domestic and foreign mobile network providers strategically target. Since MEC systems operate as op...
详细信息
ISBN:
(纸本)9781728167589
Multi-access Edge computing (MEC) technology is a key technology for realizing 5G B2B service, which is a market that domestic and foreign mobile network providers strategically target. Since MEC systems operate as open systems capable of running third-party application programs based on cloud and virtualization technologies, they can be a major target of security threats, and the development of detection and response technologies are required. This paper examines the structure and features of the framework, focusing on ETSI's MEC standards, and presents security threats from several perspectives.
At present, with the rapid development of big data processing technology, streaming data processing and real-time data analysis have gradually become new research hotspots. Both the industry and the academia have inve...
详细信息
ISBN:
(纸本)9781538673089
At present, with the rapid development of big data processing technology, streaming data processing and real-time data analysis have gradually become new research hotspots. Both the industry and the academia have invested a lot of research into the efficient processing methods of massive data generated in the environment such as the Internet and e-commerce. Meanwhile, high-performance computingtechnology and supercomputers are also looking for new business growth points. The convergence of big data processing and high performance computingtechnology is the general trend of big data analysis in the future. This paper will give a brief overview of typical technologies in the fusion process of big data processing and high-performance computing.
Prior load balancing heuristics for edge computing require additional efforts for collecting and analyzing the global knowledge on a system. To this end, we propose a sandpile based load distribution scheme, which con...
详细信息
ISBN:
(纸本)9781538650417
Prior load balancing heuristics for edge computing require additional efforts for collecting and analyzing the global knowledge on a system. To this end, we propose a sandpile based load distribution scheme, which confidently guarantees that the entire edge resources naturally evolve towards the most stable state in a natural fashion. Our scheme is evaluated with three heuristic strategies and their performance is discussed in terms of avalanche behavior, latency minimization, and self-organized criticality.
暂无评论