2015 International Conference on Cloud Technologies and Applications (CloudTech)最新文献

筛选
英文 中文
A performance comparison between parallel and lazy fetching in vertically distributed cloud databases 垂直分布的云数据库中并行抓取和延迟抓取的性能比较
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337005
J. Kohler, Thomas Specht
{"title":"A performance comparison between parallel and lazy fetching in vertically distributed cloud databases","authors":"J. Kohler, Thomas Specht","doi":"10.1109/CLOUDTECH.2015.7337005","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337005","url":null,"abstract":"The following work focuses on the severe performance issues that come along with the vertical data distribution approach of the SeDiCo framework. SeDiCo (A Secure and Distributed Cloud Data Store) is a framework that vertically distributes database data across several clouds in order to maintain data security, protection and privacy. However, this vertical data distribution requires joining data together before any client access. This join is extremely time-consuming and thus, this approach is currently not feasible in practical usage scenarios. In order to overcome those performance issues, this work proposes the introduction of a data cache architecture and two corresponding fetch procedures, i.e. lazy and parallel fetching. We further implemented both strategies, measured their performance and compared them to each other. Our results show that the parallel fetch strategy by far outperforms the lazy fetch strategy. Above that, this work outlines the entire caching architecture of our approach and discusses the two strategies in detail. Finally, this work concludes the measured results and discusses further challenges in the context of the SeDiCo framework as future work tasks.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Big data in healthcare: Challenges and opportunities 医疗保健中的大数据:挑战与机遇
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337020
Hiba Asri, H. Mousannif, H. Al Moatassime, T. Noel
{"title":"Big data in healthcare: Challenges and opportunities","authors":"Hiba Asri, H. Mousannif, H. Al Moatassime, T. Noel","doi":"10.1109/CLOUDTECH.2015.7337020","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337020","url":null,"abstract":"Mobile phones, sensors, patients, hospitals, researchers, providers and organizations are nowadays, generating huge amounts of healthcare data. The real challenge in healthcare systems is how to find, collect, analyze and manage information to make people's lives healthier and easier, by contributing not only to understand new diseases and therapies but also to predict outcomes at earlier stages and make real-time decisions. In this paper, we explain the potential benefits of big data to healthcare and explore how it improves treatment and empowers patients, providers and researchers. We also describe the ability of reality mining in collecting large amounts of data to understand people's habits, detect and predict outcomes, and illustrate the benefits of big data analytics through five effective new pathways that could be adopted to promote patients' health, enhance medicine, reduce cost and improve healthcare value and quality. We cover some big data solutions in healthcare and we shed light on implementations, such as Electronic Healthcare Record (HER) and Electronic Healthcare Predictive Analytics (e-HPA) in US hospitals. Furthermore, we complete the picture by highlighting some challenges that big data analytics faces in healthcare.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"388 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133847586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
A multi-criteria analysis of intrusion detection architectures in cloud environments 云环境下入侵检测体系结构的多准则分析
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336967
M. Zbakh, Khalil Elmahdi, R. Cherkaoui, Saad Enniari
{"title":"A multi-criteria analysis of intrusion detection architectures in cloud environments","authors":"M. Zbakh, Khalil Elmahdi, R. Cherkaoui, Saad Enniari","doi":"10.1109/CLOUDTECH.2015.7336967","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336967","url":null,"abstract":"Cloud computing promises to increase innovation and the velocity with which applications are deployed all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantage of those opportunities while minimizing risks, we argue that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed in 1980s. Since that time IDSs are evolving. However, even several efforts have been made in the area of Intrusion Detection Systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi-criteria analysis and a comparative study between several IDS architectures designed to work in cloud computing environments. To achieve this objective, in the first place we will search in the state of the art for several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi-criteria decision analysis MacBeth (Measuring Attractiveness by a Categorical Based Evaluation Technique) we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114306530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security on RFID technology RFID技术的安全性
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336997
Nabil Kannouf, Youssef Douzi, M. Benabdellah, A. Azizi
{"title":"Security on RFID technology","authors":"Nabil Kannouf, Youssef Douzi, M. Benabdellah, A. Azizi","doi":"10.1109/CLOUDTECH.2015.7336997","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336997","url":null,"abstract":"RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Latest technologies have brought costs down and standards are being developed. Actually, RFID is mostly used as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, and supporting automated checkout. The use of RFID is limited by security concerns and delays in standardization. This paper presents some research done on RFID, the RFID applications and RFID data security.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124628350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Some tools of QSAR/QSPR and drug development: Wiener and Terminal Wiener indices QSAR/QSPR和药物开发的一些工具:Wiener和终端Wiener指数
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336963
Meryam Zeryouh, M. El Marraki, M. Essalih
{"title":"Some tools of QSAR/QSPR and drug development: Wiener and Terminal Wiener indices","authors":"Meryam Zeryouh, M. El Marraki, M. Essalih","doi":"10.1109/CLOUDTECH.2015.7336963","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336963","url":null,"abstract":"Result of the increases in the size of molecular databases, big-data becomes a very important field of research in the discovery of a new drug. To predict chemical and biological properties of novel molecules based on their structural representations, the QSAR/QSPR models have been build. The Qualitative Structure Activity (resp. property) Relationships are based on the search for a relationship between a set of real numbers, molecular descriptors, and the property or activity that we want to predict. In this paper we recall the principle of QSAR/QSPR models, we discus a kind of molecular descriptors called topological indices, that is calculated from a graph representing a molecule. Then we give some results concerning the calculation of the Terminal Wiener index of some molecular graphs, and in the end we give an application for calculating the Terminal Wiener index of dendrimer graph.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130462627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach for privacy policies negotiation in mobile health-Cloud environments 移动医疗云环境中的隐私策略协商方法
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336983
Souad Sadki, Hanan El Bakkali
{"title":"An approach for privacy policies negotiation in mobile health-Cloud environments","authors":"Souad Sadki, Hanan El Bakkali","doi":"10.1109/CLOUDTECH.2015.7336983","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336983","url":null,"abstract":"Mobile technologies continue to improve patients' quality of care. Particularly, with the emergence of Cloud-based mobile services and applications, patients can easily communicate with their physicians and receive the care they deserve. However, due to the increased number of privacy threats in mobile and Cloud computing environments, maximizing patients' control over their data becomes a necessity. Thus, formal languages to express their privacy preferences are needed. Besides, because of the diversity of actors involved in patient's care, conflict among privacy policies can take place. In this paper, we present an approach that aims to resolve the problem of conflicting privacy policies based on a Security Policy Negotiation Framework. The major particularity of our solution is that it considers the patient to be a crucial actor in the negotiation process. The different steps of our approach are illustrated through an example of three conflicting privacy policies with different privacy languages.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129156975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
How can we design a cost-effective model that ensures a high level of data integrity protection? 我们如何设计一个经济有效的模型来确保高水平的数据完整性保护?
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336973
Alouane Nour-Eddine, Abouchabaka Jaafar, R. Najat
{"title":"How can we design a cost-effective model that ensures a high level of data integrity protection?","authors":"Alouane Nour-Eddine, Abouchabaka Jaafar, R. Najat","doi":"10.1109/CLOUDTECH.2015.7336973","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336973","url":null,"abstract":"Everyone agree that data is more secured locally than when it is outsourced far away from their owners. But the growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solutions, but at the expense of security. So designing a lightweight system that can achieve a balance between cost and data security is really important. Several schemes and techniques has been proposed for securing, checking and repairing data, but unfortunately the majority doesn't respect and preserve the cost efficiency and profitability of cloud offers. In this paper we try to answer the question: how can we design a model that enables a high level of integrity check while preserving a minimum cost? We try also to analyze a new threat model regards the tracking of a file's fragments during a repair or a download operation, which can cause the total loss of customers data. The solution given in this paper is based on redistributing fragments locations after every data operation using a set of random values generated by a chaotic map. Finally, we provide a data loss insurance (data corruption as well) approach based on user estimation of data importance level that helps in reducing user concerns about data loss.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secured load balancing architecture for cloud computing based on multiple clusters 基于多集群的云计算安全负载均衡架构
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336978
Mohamed Belkhouraf, A. Kartit, H. Ouahmane, H. K. Idrissi, Z. Kartit, M. El Marraki
{"title":"A secured load balancing architecture for cloud computing based on multiple clusters","authors":"Mohamed Belkhouraf, A. Kartit, H. Ouahmane, H. K. Idrissi, Z. Kartit, M. El Marraki","doi":"10.1109/CLOUDTECH.2015.7336978","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336978","url":null,"abstract":"Cloud computing is one of the new and very promising trends in the IT technology field, it is subject to a lot of research and continuous advances are made. Its main objectives are to deliver different services for users, such as infrastructure, platform or software with a reasonable and more and more decreasing cost for the clients. To achieve those goals, some matters have to be addressed, mainly using the available resources in an effective way in order to improve the overall performance, while taking into consideration the security and the availability sides of the cloud. Hence, one of the most studied aspects by researchers is load balancing in cloud computing, especially for the big distributed cloud systems that deal with many clients and big amounts of data and requests. In this paper, we address the subject of load balancing in cloud computing and present a semi centralized and multi cluster architecture. This proposed approach mainly ensures a better overall performance with efficient load balancing, the continuous availability and a security aspect.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132977154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
An adaptive anonymous authentication for cloud environment 云环境下的自适应匿名身份验证
2015 International Conference on Cloud Technologies and Applications (CloudTech) Pub Date : 2015-04-28 DOI: 10.1109/CLOUDTECH.2015.7337010
Amina Djellalbia, S. Benmeziane, N. Badache, Sihem Bensimessaoud
{"title":"An adaptive anonymous authentication for cloud environment","authors":"Amina Djellalbia, S. Benmeziane, N. Badache, Sihem Bensimessaoud","doi":"10.1109/CLOUDTECH.2015.7337010","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337010","url":null,"abstract":"Preserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user's usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud provider to learn which resources they access and how often they use a service by making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy through an anonymous authentication scheme.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"508 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133532028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信