2015 International Conference on Cloud Technologies and Applications (CloudTech)最新文献

筛选
英文 中文
A conceptual framework for personalization of mobile cloud services 移动云服务个性化的概念框架
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-11-30 DOI: 10.1109/CLOUDTECH.2015.7336992
E. Badidi, Hayat Routaib
{"title":"A conceptual framework for personalization of mobile cloud services","authors":"E. Badidi, Hayat Routaib","doi":"10.1109/CLOUDTECH.2015.7336992","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336992","url":null,"abstract":"Over the last few years, we are witnessing the proliferation of mobile Internet devices (MIDs) and the wide spread adoption of cloud computing for both personal and corporate usages. These technologies are converging in what is known as mobile cloud computing (MCC) paradigm. This paradigm aims at addressing resource poverty of mobile devices. Several works investigated the challenges of mobile cloud computing. With the growing heterogeneity of mobile devices, personalization of services remains a challenging issue. In this paper, we propose a conceptual framework to address the issue of personalization in a mobile cloud computing environment. It aims at satisfying the mobile user needs and preferences for service provisioning. The mobile cloud service provider composes its service from a set of in-house services and from third party services using a composition plan, which adapts services by taking into account the user's profile and preferences.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129961495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data-as-a-service solution for building graph social networks 构建图形社交网络的大数据即服务解决方案
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-11-30 DOI: 10.1109/CLOUDTECH.2015.7337009
Siham Yousfi, D. Chiadmi
{"title":"Big Data-as-a-service solution for building graph social networks","authors":"Siham Yousfi, D. Chiadmi","doi":"10.1109/CLOUDTECH.2015.7337009","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337009","url":null,"abstract":"Big Data analytics and Cloud Computing are the new trending that submerged the IT industry. In fact, Big Data technology is providing methods and tools for storing managing and analyzing a large amount of data, and cloud computing provides IT services in a scalable way via internet to a number of clients at low costs. While big data environment requires powerful cluster infrastructure, new ideas about combining this two paradigms were born to enhance business agility and productivity and enable greater efficiencies and reduce costs. Big data as-a-service (BDAAS) refers to common big data services provided as cloud hosted services. These services are intended to provide Big Data features in the cloud. The objective of our research is to describe a BDAAS solution based on Hadoop ecosystem that extracts data from social network and constructs a graph that could be used later for further analysis. As a prototype, we built a graph representing the feeling of a citizen toward a particular deputy. The analysis of the resulting graph will allow citizens and political parties identifying the most popular deputy by analyzing the most significant node.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117240310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security challenges in intrusion detection 入侵检测中的安全挑战
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-11-30 DOI: 10.1109/CLOUDTECH.2015.7337012
Mohammed Jouad, S. Diouani, H. Houmani, Ali Zaki
{"title":"Security challenges in intrusion detection","authors":"Mohammed Jouad, S. Diouani, H. Houmani, Ali Zaki","doi":"10.1109/CLOUDTECH.2015.7337012","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337012","url":null,"abstract":"Organizations and governments consider security as a must-have due to the increasing rate of attacks which is threatening both security and privacy. In this paper, we present a survey of IDPS which led us to perform a classification of methods depending on the techniques used in intrusions detection and prevention systems. We also discuss the advantages and drawbacks of these methods. Afterwards, we discuss the various problems complicating the proper functionality and efficiency of the current IDPS and also analyze its challenges in cloud computing, smart-phones and smart cities.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126022001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Data extraction for user profile management based on behavior 基于行为的用户配置文件管理数据提取
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336972
C. Loubna, Ezziyyani Mostafa, E. Annas, H. Mohammed
{"title":"Data extraction for user profile management based on behavior","authors":"C. Loubna, Ezziyyani Mostafa, E. Annas, H. Mohammed","doi":"10.1109/CLOUDTECH.2015.7336972","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336972","url":null,"abstract":"Despite the large and spectacular development in the field of vehicle safety, particularly in the context of driver safety needs, solutions remain insufficient and independent. In this paper, we propose a new system that has been dubbed 3SD \"Security and Surveillance System for Drivers\". It is a multifunction system as a complete package based on intelligent sensors and cameras that constantly monitor the vehicle's environment and the behavior of the driver to detect early so potentially dangerous situations. In critical driving situations, these systems alert and actively help the driver; if necessary, they automatically intervene to prevent or mitigate the consequences of an accident. The package proposed includes an application comprising a set of pre-registered drivers in a specialized social network interconnected to a geolocation server for distributed real-time sharing of information and data useful for security and traffic. The system is founded mainly on learning systems for face recognition based on advanced algorithms “Viola and Jones method” and “PCA method” as well as management of drivers profiles based on preferences to provide the following features: early detection of sleep, unconsciousness and poor driver behavior, security against theft of vehicles, driver comfort and control and sharing of traffic information in real time between the conductors.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123587110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combining multi-agent systems and MDE approach for monitoring SLA violations in the Cloud Computing 结合多代理系统和MDE方法监测云计算中的SLA违规
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336975
A. Maarouf, Mahmoud El Hamlaoui, A. Marzouk, A. Haqiq
{"title":"Combining multi-agent systems and MDE approach for monitoring SLA violations in the Cloud Computing","authors":"A. Maarouf, Mahmoud El Hamlaoui, A. Marzouk, A. Haqiq","doi":"10.1109/CLOUDTECH.2015.7336975","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336975","url":null,"abstract":"A Service Level Agreement (SLA) is a legal contract between parties to ensure the Quality of Service (QoS). It specifies one or more service level objectives (SLO), to ensure that the QoS delivered has met customer expectations. However, It becomes hard to guarantee QoS levels and detect SLA violations. Therefore, we propose to use MDE (Model Driven Engineering) to express the SLA contract requirements. This latter, created with a specific modeling language (DSML), will be used harmonically with a Multi-agent systems (MASs) in order to monitor SLA violations in real-time. Indeed, MASs are suitable tools for self-detection of failures and self-monitoring of cloud operations and services, QoS negotiation and SLA management. They are designed to operate in a dynamically changing environment. Our main motivation is firstly to use MDE technology for the creation of the SLA contract and then to integrate MASs in order to control the quality of service contract and guarantee transparency and symmetry with respect to the SLA contract between prospective signatories.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125532797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Big data open platform for water resources management 水资源管理大数据开放平台
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336964
Ridouane. Chalh, Z. Bakkoury, D. Ouazar, M. Hasnaoui
{"title":"Big data open platform for water resources management","authors":"Ridouane. Chalh, Z. Bakkoury, D. Ouazar, M. Hasnaoui","doi":"10.1109/CLOUDTECH.2015.7336964","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336964","url":null,"abstract":"Nowadays Big Data are becoming a popular topic and a comparatively new technological concept focused on many different disciplines like environmental science, social media and networks, industry and healthcare. Data volumes are on an upward trajectory associated with increased data velocity, and variety. Furthermore, they are needed to develop effective solutions to support intelligent, proactive and predictive processes. In this paper we exploit Big Data concepts for environmental sciences and water resources. The aim of this article is to present the concept and architecture of our Big Data Open Platform used for supporting Water Resources Management. This Platform has been designed to provide effective tools that allow water system managers to solve complex water resources systems, water modeling issues and help in decision making. The Platform brings a variety of information technology tools including stochastic aspects, high performance computing, simulation models, hydraulic and hydrological models, grid computing, decision tools, Big Data analysis system, communication and diffusion system, database management, geographic information system (GIS) and Knowledge based expert system. The operators' objectives of this Big Data Open Platform are to solve and discuss water resources problems that are featured by a huge volume of collected, analyzed and visualized data, to analyze the heterogeneity of data resulting from various sources including structured, unstructured and semi-structured data, also to prevent and/or avoid a catastrophic event related to floods and/or droughts, through hydraulic infrastructures designed for such purposes or strategic planning. This first paper will focus on the first part developed and based on J2EE platform and specifically the hypsometrical approach considered as a decision tool allowing users to compare the effects of different current and future management scenarios and make choice to preserve the environment and natural resources.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121887627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Malicious virtual machines detection through a clustering approach 通过集群方法检测恶意虚拟机
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336986
Mohammad-Mahdi Bazm, R. Khatoun, Y. Begriche, L. Khoukhi, Xiuzhen Chen, A. Serhrouchni
{"title":"Malicious virtual machines detection through a clustering approach","authors":"Mohammad-Mahdi Bazm, R. Khatoun, Y. Begriche, L. Khoukhi, Xiuzhen Chen, A. Serhrouchni","doi":"10.1109/CLOUDTECH.2015.7336986","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336986","url":null,"abstract":"Cloud computing aims to provide enormous resources and services, parallel processing and reliable access for users on the networks. The flexible resources of clouds could be used by malicious actors to attack other infrastructures. Cloud can be used as a platform to perform these attacks, a virtual machine(VM) in the Cloud can play the role of a malicious VM belonging to a Botnet and sends a heavy traffic to the victim. For cloud service providers, preventing their infrastructure from being turned into an attack platform is very challenging since it requires detecting attacks at the source, in a highly dynamic and heterogeneous environment. In this paper, an approach to detect these malicious behaviors in the Cloud based on the analysis of network parameters is proposed. This approach is a source-based attack detection, which applies both Entropy and clustering methods on network parameters. The environment of Cloud is simulated on Cloudsim. The data clustering allows achieving high performance, with a high percentage of correctly clustered VMs.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A cloud-based architecture for transactional services adaptation 用于事务服务适配的基于云的体系结构
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336966
Widad Ettazi, H. Hafiddi, M. Nassar, S. Ebersold
{"title":"A cloud-based architecture for transactional services adaptation","authors":"Widad Ettazi, H. Hafiddi, M. Nassar, S. Ebersold","doi":"10.1109/CLOUDTECH.2015.7336966","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336966","url":null,"abstract":"Advances in wireless communications and mobility have increased the use of smart mobile applications. As a result of the remarkable increase of mobile devices and the pervasive wireless networks, a large number of mobile users are requiring personalization services customized to their context. The mobile cloud-computing paradigm from a context-aware perspective aims to find effective ways to make cloud services aware of the context of their customers and applications. Another major challenge for context-aware cloud services is to exploit the benefits of cloud computing to manage transaction processing throughout the life cycle of a service. In this paper, we focused on the need of loosely coupled context-supporting components that work with a transaction-aware service infrastructure to adapt services to the context of the user and his mobile device. We propose a cloud-based middleware for transactional service adaptation (CM4TSA) by adding the “Adaptation as a Service” layer into basic cloud architecture, to perform the correct execution of transactional service according to the user context.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132335158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A SCA based model for resolving syntactic heterogeneity among clouds 一个基于SCA的模型,用于解决云之间的语法异构性
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337000
Meriem Thabet, M. Boufaida
{"title":"A SCA based model for resolving syntactic heterogeneity among clouds","authors":"Meriem Thabet, M. Boufaida","doi":"10.1109/CLOUDTECH.2015.7337000","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337000","url":null,"abstract":"Nowadays, companies are increasingly adopting the technology of cloud computing. This technology allows them to innovate and to improve their business. Plus, the presence of numerous cloud providers would be beneficial for providers and companies if some collaboration among clouds will be achieved. This collaboration lets companies to choose and to move their applications and data among clouds without being tied to any provider. We have embedded the Service Component Architecture in the cloud computing domain. The proposed model aims at facilitating the data sharing between multiple cloud service providers regardless their infrastructure, tools and platforms. Indeed, we have opted for SCA standard to promote the interoperability mechanism by moving and converting data formats exchanged among clouds. Our model allows many providers to interact among each other by overcoming the syntactic heterogeneity in order to satisfy companies' needs.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Big Data to Big Knowledge: The art of making Big Data alive 从大数据到大知识:让大数据活起来的艺术
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337001
Meryeme El Houari, Maryem Rhanoui, B. El Asri
{"title":"From Big Data to Big Knowledge: The art of making Big Data alive","authors":"Meryeme El Houari, Maryem Rhanoui, B. El Asri","doi":"10.1109/CLOUDTECH.2015.7337001","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337001","url":null,"abstract":"Nowadays Big Data becomes one of the biggest buzz concepts in IT world especially with the vertiginous development driving the increase of data encouraged by the emergence of high technologies of storage like cloud computing. Big Data can create efficient challenging solutions in health, security, government and more; and usher in a new era of analytics and decisions. Knowledge Management comprises a set of strategies and practices used to identify, create, represent, distribute, and enable creating experience that can constitute a real immaterial capital. However, to bring significant meaning to the perpetual tsunami of data and manage them, Big Data needs Knowledge Management. In the same way, to broaden the scope of its targeted analyzes, Knowledge Management requires Big Data. Thus, there is a complementary relation between these two major concepts. This paper presents a state of art where we try to explore Big Data within the context of Knowledge Management. We discuss the bi-directional relationship linking this two fundamental concepts and their strategic utility in making analytics valuable especially with the combination of their interactions which create an effective Big Knowledge to build experience.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信