2015 International Conference on Cloud Technologies and Applications (CloudTech)最新文献

筛选
英文 中文
Crop management using Big Data 利用大数据进行作物管理
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337003
Younes Oulad Sayad, H. Mousannif, M. Le Page
{"title":"Crop management using Big Data","authors":"Younes Oulad Sayad, H. Mousannif, M. Le Page","doi":"10.1109/CLOUDTECH.2015.7337003","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337003","url":null,"abstract":"Crops management might be a hard task especially in semi-arid environments, where crops are not getting enough water by rainfall or natural drainages. Providing additional water resources to crops by irrigation comes with many challenges. On the one hand, too much irrigation will imply losses by evaporation or percolation, while a lack of irrigation can cause water stress. On the other hand, the application of the exact amount of water needed requires the knowledge of numerous parameters such as soil cond itions, plant development, and weather. This paper addresses such issues by providing an efficient strategy for crops and water resources management. The strategy makes use of Big Data and remote sensing to process satellite images over large areas and extract insights from the collected data to help farmers in managing their crops and taking irrigation decisions. We implemented a web service that allows farmers to perform all above-mentioned tasks online.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cloud SaaS using MDA approach on a multiview models generate a SaaS from a colored Petri Net using view PNML 在多视图模型上使用MDA方法的云SaaS使用视图PNML从彩色Petri网生成SaaS
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336977
Zeddari Abderrazzak, Ettalbi Ahmed
{"title":"Cloud SaaS using MDA approach on a multiview models generate a SaaS from a colored Petri Net using view PNML","authors":"Zeddari Abderrazzak, Ettalbi Ahmed","doi":"10.1109/CLOUDTECH.2015.7336977","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336977","url":null,"abstract":"In this paper, we continue improving our MDA Framework whose aim is to generate a SaaS (Software as a Service) inside a Cloud Environment from a multiview model using a Colored Petri Nets. This framework is composed of 4 modules, we will focus on the 3rd one which design an extended PNML based on a multiview system who is supporting views.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123572482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A cloud security framework based on trust model and mobile agent 基于信任模型和移动代理的云安全框架
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CloudTech.2015.7336962
Saddek Benabied, Abdelhafid Zitouni, M. Djoudi
{"title":"A cloud security framework based on trust model and mobile agent","authors":"Saddek Benabied, Abdelhafid Zitouni, M. Djoudi","doi":"10.1109/CloudTech.2015.7336962","DOIUrl":"https://doi.org/10.1109/CloudTech.2015.7336962","url":null,"abstract":"Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud., Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Friendship based storage allocation for online social networks cloud computing 基于友谊的在线社交网络云计算存储分配
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336970
M. E. Elsaid, C. Meinel
{"title":"Friendship based storage allocation for online social networks cloud computing","authors":"M. E. Elsaid, C. Meinel","doi":"10.1109/CLOUDTECH.2015.7336970","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336970","url":null,"abstract":"Online Social Networks (OSN) is one of the booming technologies started in the last decade with significant influence in people internet usage and daily life. Billions of individuals and organizations can share their status, news, photos, videos and files in a free open online world wide community. During the last few years, social networks became a key player in the media sector, advertisement, politics and online gaming. Social networks are a special kind of networks; where the users access not only their own data but their friends' data as well. So each user may access many datacenters in few minutes while browsing his/her friends' feeds., Cloud computing is the new era of datacenter that offers IT as a service. In this paper, we propose a storage allocation mechanism in cloud computing that considers the OSN characteristics such as the friendship matrix and users' locations in order to utilize cloud computing usage for social networks. The proposed algorithm minimizes the average users' data access latency in OSN.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133069149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative study of simulators for cloud computing 云计算模拟器的比较研究
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336989
A. Maarouf, A. Marzouk, A. Haqiq
{"title":"Comparative study of simulators for cloud computing","authors":"A. Maarouf, A. Marzouk, A. Haqiq","doi":"10.1109/CLOUDTECH.2015.7336989","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336989","url":null,"abstract":"Recent years have seen a significant increase in cloud computing simulation tools. They are essential to evaluate cloud computing services and applications. Indeed, they can help to test, evaluate, and replicate the assumptions cost-effectively before a cloud platform is deployed in a real environment. It also provides an option to change and control the bottlenecks of the performance prior to implementing on an actual cloud platform. The simulation tools for cloud computing are also important to help users choose which cloud computing service is suitable for their requirements as deploying and operating a cloud platform in a real environment are often expensive, time consuming, or even impractical due to multiple test runs in different conditions and requirements. This paper surveys the various simulation platforms and tools of cloud computing. We identify the characteristics of the tools highlighting their strengths and weaknesses. Finally, the paper notes the challenges and the future research directions.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"30 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130521115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Log-based change data capture from schema-free document stores using MapReduce 使用MapReduce从无模式文档存储中捕获基于日志的更改数据
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336969
Kun Ma, Bo Yang
{"title":"Log-based change data capture from schema-free document stores using MapReduce","authors":"Kun Ma, Bo Yang","doi":"10.1109/CLOUDTECH.2015.7336969","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336969","url":null,"abstract":"Change data capture (CDC) is an approach to data integration that is used to determine and track the data that has changed so that action can be taken using the change data. However, the state of art of change data capture (CDC) in the context of document-oriented NoSQL databases is not mature. Therefore, it is urgent to require a NoSQL CDC solution. Although some manufacturers of NoSQL databases start to research on CDC for NoSQL, these approaches are just for the specific product. In our paper, we propose a log-based CDC approach from abstract schema-free document stores using MapReduce. The process is divided into map and reduce procedures, benefited from MapReduce framework, to generate cell state models (CSMs). In order to infinitely look back to any revision, we enable our proposed CSM to support copy-modify-merge model to manage the revisions of change data. Finally, experimental results show that this approach is independent and appropriate for document stores, with high performance and throughput capacity.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122390480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Use of O-MaSE methodology for designing efficient intrusion detection based on MAS to learn new attacks 利用O-MaSE方法设计基于MAS的高效入侵检测,学习新的攻击
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336987
Mohssine El Ajjouri, S. Benhadou, H. Medromi
{"title":"Use of O-MaSE methodology for designing efficient intrusion detection based on MAS to learn new attacks","authors":"Mohssine El Ajjouri, S. Benhadou, H. Medromi","doi":"10.1109/CLOUDTECH.2015.7336987","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336987","url":null,"abstract":"The agents used in the intrusion detection architectures have multiple characteristics namely delegation, cooperation and communication. However, an important property of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. For this, normal profiles are built in a dedicated training phase, these profiles are then compared with the current activity. Thus, the IDS does not have the ability to detect new attacks., In this paper, we propose a new architecture for intrusion detection based in MAS adding a learning feature abnormal behaviors that correspond to new attack patterns. To learn a new attack, the architecture must detect at first and then update the base of attack patterns. For the detection step, the approach adopted is based on the technique of Case-Based Reasoning (CBR). The proposed architecture is based on a hierarchical and distributed strategy where features are structured and separated into layers., We focus after on the modeling of our Multi agent systems Architecture, for reasons of simplicity, we use the methodology O-MaSE.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117004841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A privacy-ensuring scheme for health data outsourcing 医疗数据外包的隐私保障方案
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336982
R. Gonçalves, E. Leonova, R. Puttini, Anderson C. A. Nascimento
{"title":"A privacy-ensuring scheme for health data outsourcing","authors":"R. Gonçalves, E. Leonova, R. Puttini, Anderson C. A. Nascimento","doi":"10.1109/CLOUDTECH.2015.7336982","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336982","url":null,"abstract":"Despite the movement towards cloud computing, the involvement of a third-party is quite challenging when dealing with sensitive information. This article proposes a practical scheme for making possible to outsource medical data to fully malicious clouds while preserving privacy, resulting in a ready-to-go architecture based on hybrid encryption carried out at the client-side. Standard efficient cryptographic primitives are used to provide dynamic key management with no further assumptions about the data structure. We also encompass two-factor authentication to combine passwords with tokens generated by mobile devices, averting cumbersome smart cards or biometrics. The resulting framework is evaluated through a real-world cloud application, producing a full-featured prototype with a controllable shared access model not exploitable by any opponents.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117140828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multiview SOA: Extending SOA using a private cloud computing as SaaS 多视图SOA:使用私有云计算作为SaaS扩展SOA
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337016
B. Rida, Ettalbi Ahmed
{"title":"Multiview SOA: Extending SOA using a private cloud computing as SaaS","authors":"B. Rida, Ettalbi Ahmed","doi":"10.1109/CLOUDTECH.2015.7337016","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337016","url":null,"abstract":"This work is based on two major areas, the Multiview Service Oriented Architecture and the combination between the computing cloud and MVSOA. Thus, it is suggested to extend firstly the service oriented architecture (SOA) into an architecture called MVSOA by adding two components, the Multiview service generator, whose role is to transform the classic service into Multiview service, and the data base, this component seeks to stock all of consumer service information. It is also suggested to combine the computing cloud and Multiview Service Oriented Architecture MV-SOA. To reach such combination, the MV-SOA architecture was taken and we added to the client-side a private cloud in SAAS.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130657085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud computing & the organizational performance different approach of assessment 云计算&组织绩效的不同评估方法
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337007
Abdelhamid El Alami, Hicham Sadok, Naima Elhaoud
{"title":"Cloud computing & the organizational performance different approach of assessment","authors":"Abdelhamid El Alami, Hicham Sadok, Naima Elhaoud","doi":"10.1109/CLOUDTECH.2015.7337007","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337007","url":null,"abstract":"This paper introduces a nutshell of the cloud computing with its different deployment and delivery models. Additionally, it presents an assessment of the impact of the cloud computing on the organizational performance from many points of view.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信