2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems最新文献

筛选
英文 中文
A simple fully homomorphic encryption scheme available in cloud computing 一种在云计算中可用的简单的全同态加密方案
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664399
Jian Li, DanJie Song, Sicong Chen, Xiaofeng Lu
{"title":"A simple fully homomorphic encryption scheme available in cloud computing","authors":"Jian Li, DanJie Song, Sicong Chen, Xiaofeng Lu","doi":"10.1109/CCIS.2012.6664399","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664399","url":null,"abstract":"With continuous expansion of cloud computing, problems of third-party data security become increasingly prominent. However, effective retrieval of encrypted data and other operations are difficult to achieve by traditional cryptogram systems. Thus, a practical simple fully homomorphic encryption scheme, using only elementary modular arithmetic, derived from Gentry cryptosystem is put forward to ensure the privacy-preserving in cloud storage, in which encrypted data can be operated directly without affecting the confidentiality of the encryption systems, so that it can excellently realize the need of cipertext retrieval and other processing in untrusted servers. Compared with the previous protocols Marten van Dijk et al. proposed at Advances in Cryptology-EUROCRYPT 2010 and Craig Gentry proposed in the March 2010 issue of Communications of the ACM, especially in the aspect of cipertext retrieval, the proposed scheme is much more secure and feasible. And the performance evaluation and security analysis demonstrate the practice and validity of the proposed scheme.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A pedestrian detection method based on Dirichlet distribution and histogram of components 一种基于Dirichlet分布和分量直方图的行人检测方法
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664318
Xu Li, Xiaoru Wang, Jia Long, Lingpu Gong
{"title":"A pedestrian detection method based on Dirichlet distribution and histogram of components","authors":"Xu Li, Xiaoru Wang, Jia Long, Lingpu Gong","doi":"10.1109/CCIS.2012.6664318","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664318","url":null,"abstract":"Pedestrian detection is a hot topic in computer vision recently. It is a challenging issue to detect the pedestrian in images accurately and quickly. In this paper, we propose a quick and accurate pedestrian detection method based on Dirichlet distribution and histogram of components. This method can find out the pedestrian in images accurately. Because of the introduction of Dirichlet distribution and histogram of components, our method reduces the time cost on detecting pedestrian. The experiment also showed that it can detect the pedestrian sheltered from other object or in the complicated background.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The research of a resource-aware cloud computing architecture based on web security 基于web安全的资源感知云计算体系结构研究
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664444
Xiaoni Wang, Xuedong Gao
{"title":"The research of a resource-aware cloud computing architecture based on web security","authors":"Xiaoni Wang, Xuedong Gao","doi":"10.1109/CCIS.2012.6664444","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664444","url":null,"abstract":"Web hosting has a lot of problems, such as low security, waste of bandwidth resource or sudden lack of resource. A self-adaptive cloud computing architecture - RA-Cloud architecture (Resource-aware Cloud Computing Architecture) based on web security in resource-aware situation is proposed. This architecture uses cloud computing technology and self-adaptive linear regression model to estimate the dynamic migration threshold and to search the most suitable neighbor node for data migration. This platform and algorithm distributes the huge amount of computing resource to many server “end” according to the resource constrained self-adaptive policy. The new method increases the user access speed, enhances the anti-attack ability, blocks the attacks effectively and improves the web site security.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126809315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A security assessment method for Android applications based on permission model 一种基于权限模型的Android应用安全评估方法
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664265
Danyang Jiang, Xiangling Fu, Maoqiang Song, Yidong Cui
{"title":"A security assessment method for Android applications based on permission model","authors":"Danyang Jiang, Xiangling Fu, Maoqiang Song, Yidong Cui","doi":"10.1109/CCIS.2012.6664265","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664265","url":null,"abstract":"Permission-based security model of Android restricts applications to access specific resources, but malicious applications can invade more easily in such user-centric pattern. Through the analysis of the Android Permission-based security model and the permission features of Android applications, we establish the permission model to quantify the functional characteristics of the application, and then provide an assessment method in which we use the network visualization techniques and clustering algorithm to determine whether the testing application is potentially malicious application or not so as to help users choose applications before installation. We test the assessment method on 873 applications available online and do the statistic and analysis of the results to find that this method can do efforts in finding potentially malicious applications.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127964593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
VNMC for network virtualization in OpenFlow network OpenFlow网络中网络虚拟化的VNMC
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664285
Yang Chen, Xiangyang Gong, Wendong Wang, Xirong Que
{"title":"VNMC for network virtualization in OpenFlow network","authors":"Yang Chen, Xiangyang Gong, Wendong Wang, Xirong Que","doi":"10.1109/CCIS.2012.6664285","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664285","url":null,"abstract":"Network virtualization provides an efficient way to share physical network infrastructure so that multiple virtual slices can run concurrently. OpenFlow is a promising and successful future networking technology which enables network innovation efficiently. However, the existing network virtualization methods in OpenFlow network usually have limitations such as introducing a proxy, flow entry conflicts, lacking of extensibility. In this paper, we present VNMC, a Virtual Network Management Component for rapidly creating, configuring and managing virtual networks in OpenFlow network. It has the following features: VNMC is implemented in a single controller without a middle layer. VNMC provides bandwidth guarantee, topology isolation, flow isolation and control isolation. It resolves flow entry conflicts from different controllers using the multiple flow tables mechanism defined in the latest OpenFlow standard. It manages the virtual networks in a modular way, which brings great extensibility to add new functionalities to virtual networks.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129036164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mining and analyzing the characteristic of projects collaborative relationship in open source software 挖掘和分析开源软件中项目协作关系的特点
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664590
Bai Wang, Meng Shi
{"title":"Mining and analyzing the characteristic of projects collaborative relationship in open source software","authors":"Bai Wang, Meng Shi","doi":"10.1109/CCIS.2012.6664590","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664590","url":null,"abstract":"This paper focus on the relationship between projects that have same participants. A definition of projects collaborative relationship has been presented, and a projects collaborative network model is constructed. By mining and analyzing more than 10000 projects from sourceforge.net, we find that the projects collaborative relationship of software has a great impact on software trustworthiness. The number of project's collaborative project and the proportion of project's participants, who also join in other projects, are mostly important factors of projects collaborative network.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130507824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure network coding based on homomorpuic signature against pollution attacks 基于同态签名的安全网络编码对抗污染攻击
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664551
Zhen Cheng, Kaikai Chi, Xianzhong Tian, Yanjun Li
{"title":"Secure network coding based on homomorpuic signature against pollution attacks","authors":"Zhen Cheng, Kaikai Chi, Xianzhong Tian, Yanjun Li","doi":"10.1109/CCIS.2012.6664551","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664551","url":null,"abstract":"The network coding systems are vulnerable to pollution attacks, in which the adversary forwarders can inject polluted or forged messages into networks. In this paper, we propose a homomorphic signature scheme to provide security protection against pollution attacks, which mainly uses the homomorphic property of signature based on Paillier cryptosystem. On one hand, it guarantees the forwarders to verify the received messages effectively. If the verification is failed, the message is assumed to be polluted and should be discarded. On the other hand, the proposed scheme can generate the valid signatures for its output messages from the signatures of input ones without knowing the source's private key such that extra secure channels are not needed. We also make the security analysis and prove that our signature scheme is secure enough to defend against pollution attacks.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116584108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Synthetic evaluation on the performance of network coordinate systems 网络坐标系性能的综合评价
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664253
Yifei Zhang, Hongli Zhang
{"title":"Synthetic evaluation on the performance of network coordinate systems","authors":"Yifei Zhang, Hongli Zhang","doi":"10.1109/CCIS.2012.6664253","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664253","url":null,"abstract":"Network coordinate systems can improve the performance of large distributed applications on the Internet. However, the current methods for performance evaluation on network coordinate systems are based on static and individual indicators, which cannot fully show their performance. In this paper, we firstly study some evaluation indicators on network distance prediction, and point out their disadvantages. Then, a synthetic evaluation indicator is proposed to evaluate the performance of network coordinate systems. At last we give an example to show how the synthetic evaluation indicator works.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131394531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Self-learning algorithm for predicting bus arrival time based on historical data model 基于历史数据模型的公交到达时间预测自学习算法
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664555
Jian Pan, X. Dai, Xiaoqi Xu, Yanjun Li
{"title":"A Self-learning algorithm for predicting bus arrival time based on historical data model","authors":"Jian Pan, X. Dai, Xiaoqi Xu, Yanjun Li","doi":"10.1109/CCIS.2012.6664555","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664555","url":null,"abstract":"The provision of timely and accurate bus arrive time information is very important. It helps to attract additional ridership and increase the satisfaction of transit users. In this paper, a self-learning prediction algorithm is proposed based on historical data model. Locations and speeds of the bus are periodically obtained from GPS senor installed on the bus and stored in database. Historical travel time in all road sections is collected. These historical data are trained using BP neural network to predict the average speed and arrival time of the road sections. Experimental results indicate that the proposed algorithm achieves outstanding prediction accuracy compared with general solutions based on historical travel time.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131532378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A clustering routing algorithm in wireless sensor netwroks 无线传感器网络中的聚类路由算法
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664543
Han Li, Qiuxin Wu
{"title":"A clustering routing algorithm in wireless sensor netwroks","authors":"Han Li, Qiuxin Wu","doi":"10.1109/CCIS.2012.6664543","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664543","url":null,"abstract":"Wireless sensor networks (WSNs) pose new research challenges related to the design of algorithms, network protocols, and software that will enable the development of applications based on sensor devices. In this paper, we propose a clustering routing algorithm to reduce the energy consumption and prolong network lifetime. In order to avoid nodes with low residual energy becoming cluster heads, CRA selects residual energy as an energy-control factor to balance the energy consumption. Through the introduction of CH-weight, non-CH nodes select appropriate CH and join the corresponding cluster. After cluster formation, a CH routing tree over all of the cluster heads is constructed. Through the multi-hop transmission way, it reduces the number of CHs to connect directly with BS in communication. Simulation results show CRA is more efficient to reduce and balance energy consumption and hence prolong the lifetime of WSN.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132897861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信