Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between e-commerce trading partners in cloud environment. In this highly competitive and distrib...
详细信息
Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between e-commerce trading partners in cloud environment. In this highly competitive and distributed service environment, the assurances are insufficient for the consumers to identify the dependable and trustworthy Cloud providers. Due to these limitations, potential consumers are not sure whether they can trust the Cloud providers in offering dependable services. In this paper, we propose a multi-faceted trust management system architecture for cloud computing marketplaces, to support customers in identifying trustworthy cloud providers. This paper presents the important threats to a trust system and proposed a method for tackling these threats. It described the desired feature of a trust management system. It security components to determine the trustworthiness of e- commerce participants to helps online customers to decide whether or not to proceed with a transaction. Based on this framework, we proposed an approach for filtering out malicious feedbacks and a trust metric to evaluate the trustworthiness of service provider. Results of various simulation experiments show that the proposed multi-attribute trust management system can be highly effective in identifying risky transaction in electronic market places.
With the introduction of digital library services, the quality of service (QoS) has become paramount importance for evaluating the performance of the digital library service provisioning. Various models and frameworks...
详细信息
With the introduction of digital library services, the quality of service (QoS) has become paramount importance for evaluating the performance of the digital library service provisioning. Various models and frameworks have been proposed to evaluate digital library QoS. However, the prevalent research concentration in QoS for digital library is on the dimensions of the perspective of users’ perception. In this paper, we address the same research problem from a different dimension which is from the perspective of the digital service providers. To this end, we propose a new model suitable for evaluating the performance of digital library services. We argue that the level of QoS provided by the digital service providers have direct impact on the perception and satisfaction of the digital service end-users.
Issue resolution is a central task for software development. The efficiency of issue fixing largely relies on the issue report quality. Stack Overflow, which hosts rich and real-Time posts about programming-specific p...
详细信息
Approaching a comprehensive performance benchmark for on-line transaction processing (OLTP) applications in a cloud environment is a challenging task. Fundamental features of clouds, such as the pay-as-you-go pricing ...
详细信息
ISBN:
(纸本)9781479954711
Approaching a comprehensive performance benchmark for on-line transaction processing (OLTP) applications in a cloud environment is a challenging task. Fundamental features of clouds, such as the pay-as-you-go pricing model and unknown underlying configuration of the system, are contrary to the basic assumptions of available benchmarks such as TPC-W or RUBiS. In this paper, we introduce a systematic performance benchmark approach for OLTP applications on public clouds that use virtual machines(VMs). We propose WPress benchmark, which is based on the widespread blogging software, WordPress, as a representative OLTP application and implement an open source workload generator. Furthermore, we utilize a CPU micro-benchmark to investigate CPU performance of cloud-based VMs in greater detail. Average response time and total VM cost are the performance metrics measured by WPress. We evaluate small and large instance types of three real-life cloud providers, Amazon EC2, Microsoft Azure and Rackspace cloud. Results imply that Rackspace cloud has better average response times and total VM cost on small instances. However, Microsoft Azure is preferable for large instance type.
Despite significant advancements in wireless sensor networks (WSNs), energy conservation remains one of the most important research challenges. Proper organization of nodes (clustering) is one of the major techniques ...
详细信息
The growing scale and complexity of component interactions in cloud computing systems post great challenges for operators to understand the characteristics of system performance. Profiling has long been proved to be a...
详细信息
The growing scale and complexity of component interactions in cloud computing systems post great challenges for operators to understand the characteristics of system performance. Profiling has long been proved to be an effective approach to performance analysis; however, existing approaches confront new challenges that emerge in cloud computing systems. First, the efficiency of the profiling becomes of critical concern; second, service-oriented profiling should be considered to support separation-of-concerns performance analysis. To address the above issues, in this paper, we present P-Tracer, an online performance profiling tool specifically tailored for cloud computing systems. P-Tracer constructs a specific search engine that proactively processes performance logs and generates a particular index for fast queries; second, for each service, P-Tracer retrieves a statistical insight of performance characteristics from multi-dimensions and provides operators with a suite of web-based interfaces to query the critical information. We evaluate P- Tracer in the aspects of tracing overheads, data preprocessing scalability and querying efficiency. Three real-world case studies that happened in Alibaba cloud computing platform demonstrate that P-Tracer can help operators understand soft-ware behaviors and localize the primary causes of performance anomalies effectively and efficiently.
In this paper, an approach for profiling email-born phishing activities is proposed. Profiling phishing activities are useful in determining the activity of an individual or a particular group of phishers. By generati...
详细信息
In this paper, an approach for profiling email-born phishing activities is proposed. Profiling phishing activities are useful in determining the activity of an individual or a particular group of phishers. By generating profiles, phishing activities can be well understood and observed. Typically, work in the area of phishing is intended at detection of phishing emails, whereas we concentrate on profiling the phishing email. We formulate the profiling problem as a clustering problem using the various features in the phishing emails as feature vectors. Further, we generate profiles based on clustering predictions. These predictions are further utilized to generate complete profiles of these emails. The performance of the clustering algorithms at the earlier stage is crucial for the effectiveness of this model. We carried out an experimental evaluation to determine the performance of many classification algorithms by incorporating clustering approach in our model. Our proposed profiling email-born phishing algorithm (ProEP) demonstrates promising results with the RatioSize rules for selecting the optimal number of clusters.
To protect from privacy disclosure, the social network graph is modified in order to hide the information that potentially be used to disclose person's identity. However, when the social network graph is changed, ...
详细信息
To protect from privacy disclosure, the social network graph is modified in order to hide the information that potentially be used to disclose person's identity. However, when the social network graph is changed, it is a great challenge to balance between the privacy gained and the loss of data utility. In this paper, we address this problem. We propose a new graph topological-based metric to improve utility preservation in social network graph anonymization. We compare the proposed approach with the amount-of-edge-change metric that popularly used in most of previous works. Experimental evaluation shows that our approach generates anonymized social network with improved utility preservation.
Despite significant advancements in wireless sensor networks (WSNs), energy conservation remains one of the most important research challenges. Proper organization of nodes (clustering) is one of the major techniques ...
详细信息
Despite significant advancements in wireless sensor networks (WSNs), energy conservation remains one of the most important research challenges. Proper organization of nodes (clustering) is one of the major techniques to expand the lifespan of the whole network through aggregating data at the cluster head. The cluster head is the backbone of the entire cluster. That means if a cluster head fails to accomplish its function, the received and collected data by cluster head can be lost. Moreover, the energy consumption following direct communications from sources to base stations will be increased. In this paper, we propose a type-2 fuzzy based self-configurable cluster head selection (SCCH) approach to not only consider the selection criterion of the cluster head but also present the cluster backup approach. Thus, in case of cluster failure, the system still works in an efficient way. The novelty of this protocol is the ability of handling communication uncertainty, which is an inherent operational aspect of sensor networks. The experiment results indicate SCCH performs better than other recently developed methods.
The endless transformation of technological innovation requires greater collaboration of Information Communication and Technology (ICT) in various areas especially in public sectors. Many attempts have been made in im...
详细信息
The endless transformation of technological innovation requires greater collaboration of Information Communication and Technology (ICT) in various areas especially in public sectors. Many attempts have been made in improving the quality of E-Government services, one of it is adopting the cloud computing technology. Successful-implementation of cloud computing technology can benefit the public sector in many ways one of it is cost reduction. Most government organizations especially in the developing countries are committed in adopting the cloud technology based on the increased demands in cloud adoption in E-Government services. Unfortunately, despite all the benefits, the cloud computing technology raises some major risks. The success of implementation of cloud computing technology is determined by how well the government tackles the challenges. Therefore, this paper specifically surveyed the associated challenges of adopting Cloud Technology for E-Government by choosing Malaysia as the case study.
暂无评论