Proceedings of the International Conference on Internet of things and Cloud Computing最新文献

筛选
英文 中文
Interoperability in the Heterogeneous Cloud Environment: A Survey of Recent User-centric Approaches 异构云环境中的互操作性:最近以用户为中心的方法的调查
I. Mansour, R. Sahandi, K. Cooper, A. Warman
{"title":"Interoperability in the Heterogeneous Cloud Environment: A Survey of Recent User-centric Approaches","authors":"I. Mansour, R. Sahandi, K. Cooper, A. Warman","doi":"10.1145/2896387.2896447","DOIUrl":"https://doi.org/10.1145/2896387.2896447","url":null,"abstract":"Cloud computing provides users the ability to access shared, online computing resources. However, providers often offer their own proprietary applications, interfaces, APIs and infrastructures, resulting in a heterogeneous cloud environment. This heterogeneous environment makes it difficult for users to change cloud service providers; exploring capabilities to support the automated migration from one provider to another is an active, open research area. Many standards bodies (IEEE, NIST, DMTF and SNIA), industry (middleware) and academia have been pursuing approaches to reduce the impact of vendor lock-in by investigating the cloud migration problem at the level of the VM. However, the migration downtime, decoupling VM from underlying systems and security of live channels remain open issues. This paper focuses on analysing recently proposed live, cloud migration approaches for VMs at the infrastructure level in the cloud architecture. The analysis reveals issues with flexibility, performance, and security of the approaches, including additional loads to the CPU and disk I/O drivers of the physical machine where the VM initially resides. The next steps of this research are to develop and evaluate a new approach LibZam (Libya Zamzem) that will work towards addressing the identified limitations.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133514175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Authentication as a Service for Cloud Computing 认证即云计算服务
Alshaimaa Abo-Alian, N. Badr, M. Tolba
{"title":"Authentication as a Service for Cloud Computing","authors":"Alshaimaa Abo-Alian, N. Badr, M. Tolba","doi":"10.1145/2896387.2896395","DOIUrl":"https://doi.org/10.1145/2896387.2896395","url":null,"abstract":"Traditional authentication techniques such as static passwords are vulnerable to replay and guessing attacks. Recently, many studies have been conducted on keystroke dynamics as a promising behavioral biometrics for strengthening user authentication, however, current keystroke based solutions suffer from a numerous number of features with an insufficient number of samples which lead to a high verification error rate and high verification time. In this paper, a keystroke dynamics based authentication system is proposed for cloud environments that supports fixed and free text samples. The proposed system utilizes the ReliefF dimensionality reduction method, as a preprocessing step, to minimize the feature space dimensionality. The proposed system applies clustering to users' profile templates to reduce the verification time. The proposed system is applied to two different benchmark datasets. Experimental results prove the effectiveness and efficiency of the proposed system.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A privacy-preserving Proximity Detection Method in social network 社交网络中保护隐私的接近检测方法
Qiuling Chen, Ayong Ye, Li Xu
{"title":"A privacy-preserving Proximity Detection Method in social network","authors":"Qiuling Chen, Ayong Ye, Li Xu","doi":"10.1145/2896387.2900320","DOIUrl":"https://doi.org/10.1145/2896387.2900320","url":null,"abstract":"Proximity detection is a fundamental service in social network. Most of traditional proximity detection methods need users' locations for location server to find their neighbors by calculating relative distance among them. However, this mechanism has caused similarly serious concerns on the potential privacy leakage if server is untrusted. To solve this problem, we propose a proximity detection method which is based on wireless APs (Access Point). Each request user only needs to submit a nearby AP list to social network server, which called SNS in this paper. After that, the SNS finds neighbors of request users by judging whether their nearby AP lists have a common item. In addition, since most existing APs may be uneven distribution and have risks of the location leakage, we also present a distributed Beacon Node Rotating Mechanism---each user acts as a beacon node, which is similar to AP to be a reference of neighbor discovery in proximity detection. Our method works well without requiring user's location information, which enhances the security of location privacy. Finally, we experimentally demonstrate the effectiveness and feasibility of the method.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A DBMS-Based System for Integrating Grids and Clouds: Anatomy, Models, Functionalities 基于dbms的网格与云集成系统:剖析、模型、功能
M. Mariotti, O. Gervasi, Flavio Vella, A. Costantini, A. Cuzzocrea
{"title":"A DBMS-Based System for Integrating Grids and Clouds: Anatomy, Models, Functionalities","authors":"M. Mariotti, O. Gervasi, Flavio Vella, A. Costantini, A. Cuzzocrea","doi":"10.1145/2896387.2900327","DOIUrl":"https://doi.org/10.1145/2896387.2900327","url":null,"abstract":"This paper provides anatomy, models and functionalities of a DBMS-based systems for integrating Grids and Clouds. Our study starts from recognizing the similarity of some axioms of Grid and Cloud computing, still being these computational paradigms very different for what regards both computing and economic models. Our proposed system is centered along a well-designed DBMS schema that allows to obtain a seamless integration between Grids and IaaS Cloud providers. The paper details how images from a Cloud environment are deployed in reply to a specific task execution invoked from the (integrated) Grid environment, as well as other essential components of the proposed architecture (e.g., resource access and grant, user authorization, resource discovery and sharing, job and task management and distribution, integration with other computational platforms, and so forth).","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130045597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Routing in wireless Ad Hoc networks using the Skyline operator and an outranking method 无线自组织网络中的路由使用Skyline操作符和一种超越等级的方法
Manar Abourezq, A. Idrissi, Fadoua Yakine
{"title":"Routing in wireless Ad Hoc networks using the Skyline operator and an outranking method","authors":"Manar Abourezq, A. Idrissi, Fadoua Yakine","doi":"10.1145/2896387.2900333","DOIUrl":"https://doi.org/10.1145/2896387.2900333","url":null,"abstract":"The issue of routing in wireless networks has been widely addressed, but mostly using conventional routing protocols. We proposed, in a previous work, a new approach to routing using the Skyline operator, which allows us to find the routes that optimize Quality of Service (QoS) attributes related to routing, namely the number of hops, bandwidth, delay, and cost. Our approach showed some promising first results. In this paper, we introduce to use of an outranking method, the ELECTRE IS method, on top of the Skyline operator, to allow finding routes that optimize each QoS attribute in respect to its importance in the routing decision.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116884827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Providing Services in an Intelligent Environment: Smart Home Simulator based WoT 在智能环境中提供服务:基于WoT的智能家居模拟器
Wassila Guebli, Abdelkader Belkhir
{"title":"Providing Services in an Intelligent Environment: Smart Home Simulator based WoT","authors":"Wassila Guebli, Abdelkader Belkhir","doi":"10.1145/2896387.2896446","DOIUrl":"https://doi.org/10.1145/2896387.2896446","url":null,"abstract":"Smart house aims to offer the inhabitant the comfort and the security that they need and take in consideration the preferences and the needs of each member of the family. To do this, each household equipment is considered as a thing and it is connected to the internet. Using the concept of the Web of things, the user can control the home remotely, and activate many services. He can apply scenario, for example: \"sunny-day\" which consist to open all the curtains in the house or he can authorize a person to use or not a services like children. This is why we propose a smart house simulator based WoT, where the user can control his home remotely via the Web using his smart phone.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124949764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Framework for Optimum Selection of Online Social Network Management Systems 在线社交网络管理系统优化选择的框架
Mohammed Al-Hougbany, Muhammad Al-Qurishi, Mabrook S. Al-Rakhami, Majed Alrubaian, Atif Alamri
{"title":"A Framework for Optimum Selection of Online Social Network Management Systems","authors":"Mohammed Al-Hougbany, Muhammad Al-Qurishi, Mabrook S. Al-Rakhami, Majed Alrubaian, Atif Alamri","doi":"10.1145/2896387.2896409","DOIUrl":"https://doi.org/10.1145/2896387.2896409","url":null,"abstract":"Many Social Media Management Systems (SMMS) have been developed to utilize multiple accounts over different online social networks. Each system has advantages and disadvantages and can be more or less useful depending on its features and cost. However, the divers and lack of consensus in SMMS functionalities, lead to a problem for the decision makers to determine what platforms and tools they should be using. In this paper, we propose a new framework to select the most appropriate platform to manage multiple social network accounts. The proposed framework has two phases, namely, evaluation and ranking. The current practice of evaluation process involves expert users opinions on the systems to rate its importance based on the users' preferences which is measured on the efficiency of the tool for finding required results. The evaluation phase of the proposed technique combines the current practice with the weight of importance, where the later one has been calculated by applying statistical methods. The ranking phase has designed based on the well-known Analytic Hierarchy Process AHP algorithm. The results have been showed as a ranking list of the candidate SMMS.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124265876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Design Model for Things in Agents of Things 面向物的agent中的物的设计模型
Anas M. Mzahm, M. S. Ahmad, Alicia Y. C. Tang, Azhana Ahmad
{"title":"Towards a Design Model for Things in Agents of Things","authors":"Anas M. Mzahm, M. S. Ahmad, Alicia Y. C. Tang, Azhana Ahmad","doi":"10.1145/2896387.2896426","DOIUrl":"https://doi.org/10.1145/2896387.2896426","url":null,"abstract":"The Internet of Things (IoT) is poised to augment the Internet by enabling machine to machine (M2M) communication. However, the machines, or 'things' lack of self-reasoning capability limits their potential applications in other value-added services. Consequently, we introduce the concept of Agents of Things (AoT) as an extension to the IoT, in which the things are embedded with self-reasoning intelligent software agents to provide value-added services to humans. Two crucial issues in designing intelligent things are to determine what value-added services they should offer and the subsequent level of reasoning abilities for the things. Therefore, we need to find an optimal match between the hardware capabilities of the things and their software agents' reasoning abilities to deliver value-added services on top of performing their basic IoT functions. In this paper, we present the results of the software analyses represented by a software spectrum and the hardware analyses represented by a hardware spectrum. We then associate the two spectrums to form a structured hardware-software optimizer for the thing's design model.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121153131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Review of the Current Level of Support to Aid Decisions for Migrating to Cloud Computing 对当前支持水平的回顾,以帮助迁移到云计算的决策
A. Alkhalil, R. Sahandi, David John
{"title":"A Review of the Current Level of Support to Aid Decisions for Migrating to Cloud Computing","authors":"A. Alkhalil, R. Sahandi, David John","doi":"10.1145/2896387.2896443","DOIUrl":"https://doi.org/10.1145/2896387.2896443","url":null,"abstract":"Cloud computing provides an innovative delivery model that enables enterprises to reduce operational costs and improve flexibility and scalability. Organisations wishing to migrate their legacy systems to the cloud often need to go through a difficult and complicated decision-making process. This can be due to multiple factors including restructuring IT resources, the still evolving nature of the cloud environment, and the continuous expansion of the services offered. These have increased the requirement for tools and techniques to help the decision-making process for migration. Although significant contributions have been made in this area, there are still many aspects which require further support. This paper evaluates the existing level of support to aid the decision-making process. It examines the complexity of decisions, evaluates the current state of Decision Support Systems in respect of migrating to the cloud, and analyses three models that proposed support for the migration processes. This paper identifies the need for a coherent approach for supporting the whole decision-making process. Further, it explores possible new approaches for addressing the complex issues involved in decision-making for migrating to the cloud.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116773332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA 基于混合RSA的强大、高效、可靠的个人信息对等体系结构
A. Bhattacharjya, Xiaofeng Zhong, Jing Wang
{"title":"Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA","authors":"A. Bhattacharjya, Xiaofeng Zhong, Jing Wang","doi":"10.1145/2896387.2896431","DOIUrl":"https://doi.org/10.1145/2896387.2896431","url":null,"abstract":"Rivest- Shamir-Adleman (RSA) algorithm is the widespread encryption scheme that promises confidentiality and authenticity over an insecure communication channel. The RSA has drawbacks of various attacks like Brute force key search, Mathematical attacks, Timing attacks and Chosen Ciphertext attacks etc. So here a Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA for an active networked environment is proposed. The main peer to peer personal messaging architecture will be strong, efficient and reliable, and communication protocol will allow only one authenticated person to converse with the person who is in the server end, multiple chat clients can be connected to the server but has to wait for authenticated connection with secure server one by one. Also multiple servers with multiple clients can run for distributed strong, efficient and reliable messaging. As at the key exchange level, the Miller-Rabin test is done with pseudo random numbers generated and changing the keys synchronously with predefined time frames, these mechanisms make the keys absolutely strong and main RSA integration with shared RSA gives more statistical complexity here. In the decryption process, The Chinese Remainder Theorem (CRT) is used with shadows along with the strong prime of RSA criterion extended into domain of Gaussian Integer for very high efficiency. The Shared RSA adds more complexity in decryption. Public Key Cryptography Standards (PKCS) version 5 is used to tackle the Chosen cipher text attack when messaging is going on. The Efficient RSA with Rabin-Miller strong Primality test integration and pohligHellmanEncipher with salt and padding integration makes it strong and reliable.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125979840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信