In out data-driven society more and more personal and sensitive data is processed and stored making it virtually impossible for end-users to comprehend what happens to their data. Although in health care strict regula...
详细信息
ISBN:
(纸本)9781728133164
In out data-driven society more and more personal and sensitive data is processed and stored making it virtually impossible for end-users to comprehend what happens to their data. Although in health care strict regulations for the processing of personal data already existed, the General Data Protection Regulation (GDPR) provides a EU-wide regulation. Despite these regulations, it still exists a lack of transparency due to high complexity and missing details of privacy policies. The lack of transparency increases when various services are integrated sharing their data and forming virtual data marketplaces with various stakeholders. We argue for the strategic usage of privacy languages, i.e. the Layered Privacy Language (LPL), to formalize and present privacy policies transparently to users, enable consent management, and personalization of privacy requirements. Therefore, LPL policies are intended to fill the gap between the statement of privacy and its realization. Although LPL has been designed with the requirements of privacy policies considering GDPR, real-life privacy policies are required to be expressible with its vocabulary. Therefore, LPL will be validated against a meaningful real-life privacy policy example, that can reflect the future of integrated health care services to demonstrate capabilities, compliance and limitations of privacy languages.
In the past few years, data continuously increase and in various forms called Big Data. Besides, data analytics play an important role more and more in most organizations. From these reasons, many efficiently distribu...
详细信息
ISBN:
(纸本)9781728116518
In the past few years, data continuously increase and in various forms called Big Data. Besides, data analytics play an important role more and more in most organizations. From these reasons, many efficiently distributed messaging systems have been introducing to handle Big Data in real-time. However, choosing the appropriate and efficient methods and tools to transfer Big Data is still challenging. Therefore, this paper purposes of comparing the architecture, performance, and resource utilization between Apache Kafka which is one of the favorite tools for Big Data and Apache Pulsar which is similar to Kafka and become one of the latest tools for big data. After we implemented both systems in the same environment, the results show that Pulsar outperforms in throughput, latency, and average resource utilization especially when the size of messages is small (such as 1 KB and 1MB).
The amount of data collected in various IT systems has grown exponentially in the recent years. So the challenge rises how we can process those huge datasets with the fulfillment of strict time criteria and of effecti...
详细信息
ISBN:
(纸本)9781728148328
The amount of data collected in various IT systems has grown exponentially in the recent years. So the challenge rises how we can process those huge datasets with the fulfillment of strict time criteria and of effective resource consumption, usually posed by the service consumers. This problem is not yet resolved with the appearance of edge computing as widearea networking and all its well-known issues come into play and affect the performance of the applications scheduled in a hybrid edge-cloud infrastructure. In this paper, we present the steps we made towards network-aware big data task scheduling over such distributed systems. We propose different resource orchestration algorithms for two potential challenges we identify related to network resources of a geographically distributed topology: decreasing end-to-end latency and effectively allocating network bandwidth. The heuristic algorithms we propose provide better big data application performance compared to the default methods. We implement our solutions in our simulation environment and show the improved quality of big data applications.
Before the invention of computers, humans tend to find the calculation, remembrance of information difficult. Even though the computer reduced the burden of humans, the invent of distributedcomputing helped the compu...
详细信息
ISBN:
(纸本)9781538682593
Before the invention of computers, humans tend to find the calculation, remembrance of information difficult. Even though the computer reduced the burden of humans, the invent of distributedcomputing helped the computers to distribute the workload to other computers within the network. To optimize and evade the disadvantages of distributedcomputing, Cloud computing was developed. Cloud computing tends to provide services like IaaS, PaaS through internet. To improve the scalability and dynamic feature of Cloud, the Software Defined Network can be embedded to form SDN Cloud. For the purpose of better understanding and representation a Self-Organizing Map is used for reducing the higher level representation data to lower level representation data. One type of Self Organizing Maps is known as Recursive Self Organizing Maps in which the time is represented using the feedback. DDoS attacks, Data Breach and Data Loss are some of the several security flaws that arc used by unauthorized users for illegal access into the cloud. This paper presents an extensive survey of the Recursive Self Organizing Maps and DDoS mitigation in SDN and cloud network.
The cloud computing market is dynamic, distributed, and lacks central authorization. In this environment, cloud resource providers are vulnerable to deception and cloud resources may be abused. How to implement effici...
详细信息
As the technologies leaning towards digitalization, there has been extensive scope for researches in the field of Software Defined networking. The architectural framework makes the life of network administrators easy ...
详细信息
ISBN:
(纸本)9781538678084
As the technologies leaning towards digitalization, there has been extensive scope for researches in the field of Software Defined networking. The architectural framework makes the life of network administrators easy by decoupling the data plane and the control plane. This architecture exploits easy configuration of network, thus providing programmable terminal for development of applications related to security, management and logging while the centralized controller gives much more control over entire network. This type of network is at risk due to attacks by the intruders with an intention to slow down or shut down the entire network. One such kind of attacks is DoS attack. DoS attack involves flooding of fake packet flows from a single source into the original packet flow. DDoS is a type of DoS attack where multiple compromised systems, which are often infected with malicious programs, are used to target a single system Hence to achieve security in distributed environment, it is important to reduce the effect of such attacks. In this paper an approach of mitigating distributed DoS has been discussed. Approach first detects DDoS using Entropy Detection attack and then uses Bandwidth Prediction method to mitigate it. Entropy is basically used for measuring randomness in the system and there are two essential components to DDoS detection using entropy;window size and threshold.
The proceedings contain 232 papers. The topics discussed include: convolutional neural network-based approach for citrus diseases recognition;using temporal conceptual graphs and neural networks for big data-based att...
ISBN:
(纸本)9781728143286
The proceedings contain 232 papers. The topics discussed include: convolutional neural network-based approach for citrus diseases recognition;using temporal conceptual graphs and neural networks for big data-based attack scenarios reconstruction;taxi demand prediction with LSTM-based combination model;counting attention based on classification confidence for visual question answering;an optimization method of WebP images lossy compression algorithm for FPGAs;self-adaptive address mapping mechanism for access pattern awareness on DRAM;a high-performance self-learning antelopes migration algorithm (SAMA) for global optimization;and using resource use data and system logs for HPC system error propagation and recovery diagnosis.
In wireless sensor networks, unbalanced energy consumption may shorten network lifespan. In this paper, a multi-objective distributed clustering algorithm using the analytic hierarchy process is developed to ensure th...
详细信息
ISBN:
(纸本)9781728116518
In wireless sensor networks, unbalanced energy consumption may shorten network lifespan. In this paper, a multi-objective distributed clustering algorithm using the analytic hierarchy process is developed to ensure that the energy expenditure of the cluster head nodes is balanced and the network lifespan is enhanced. By adopting the analytic hierarchy process model, our proposed algorithm aggregates multiple factors such as the node energy, the node centrality, and the node degree to search for an optimal clustering structure. Furthermore, a super cluster head is selected among the cluster head nodes based on the distance from the cluster head to the base station, which further minimizes the energy dissipation. Simulation results indicate that the proposed algorithm outperforms the other existing ones in terms of clustering structure and network lifespan.
The efforts exploring Named Data networking (NDN) have mainly focused on addressing the lack of scalable data distribution by today's Internet. In this paper, we argue that NDN offers a richer environment for edge...
详细信息
ISBN:
(纸本)9781728127002
The efforts exploring Named Data networking (NDN) have mainly focused on addressing the lack of scalable data distribution by today's Internet. In this paper, we argue that NDN offers a richer environment for edge computing applications. We consider a scenario, where applications need to discover the services running in the edge network. We demonstrate the design and implementation of a distributed service discovery mechanism over NDN through an example use-case of a mobile application for vision impairment patient. The paper discusses three main edge computing challenges, namely service discovery, service invocation, and user mobility management, to highlight NDN's architectural advantages for edge computing systems. Experimental results show that our framework design can effectively utilize the available resources at the network edge, being able to satisfy 95-98% of mobile users' service requests.
暂无评论