Int. J. Cloud Appl. Comput.最新文献

筛选
英文 中文
SCEF: A Model for Prevention of DDoS Attacks From the Cloud SCEF:一种防止来自云的DDoS攻击的模型
Int. J. Cloud Appl. Comput. Pub Date : 2020-07-01 DOI: 10.4018/ijcac.2020070104
G. Shidaganti, A. Inamdar, Sindhuja V. Rai, Anagha M. Rajeev
{"title":"SCEF: A Model for Prevention of DDoS Attacks From the Cloud","authors":"G. Shidaganti, A. Inamdar, Sindhuja V. Rai, Anagha M. Rajeev","doi":"10.4018/ijcac.2020070104","DOIUrl":"https://doi.org/10.4018/ijcac.2020070104","url":null,"abstract":"Distributed denial of service (DDoS) attacks are some of the biggest threats to network performance and security today. With the advent of cloud computing, these attacks can be performed remotely on rented virtual machines (VMs), potentially increasing their capabilities and making them harder to trace and mitigate, and negatively affecting the cloud service provider as well. By analyzing packet transmission statistics, attacks can be detected on a virtual machine monitor (VMM) that controls the behavior of the VMs. This article proposes a solution to stop such detected attacks from the source, and analyses solutions proposed for a few different types of such attacks. The authors propose a model called selective cloud egress filter (SCEF) which implements specific modules to deal with detected attacks. If an attack is detected, the SCEF relays information to the VMM about which VMs are participating in the attack, allowing for specific corrective action.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133422443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Merkle Tree and Blockchain-Based Cloud Data Auditing 默克尔树和基于区块链的云数据审计
Int. J. Cloud Appl. Comput. Pub Date : 2020-07-01 DOI: 10.4018/ijcac.2020070103
A. Mohan, R. MohamedAsfak, Angelin Gladston
{"title":"Merkle Tree and Blockchain-Based Cloud Data Auditing","authors":"A. Mohan, R. MohamedAsfak, Angelin Gladston","doi":"10.4018/ijcac.2020070103","DOIUrl":"https://doi.org/10.4018/ijcac.2020070103","url":null,"abstract":"Cloud computing is the fastest growing and most promising field in the service provisioning segment. It has become a challenging task to provide security in the cloud. The purpose of this article is to suggest a better and efficient integrity verification technique for data referred to as cloud audit. The deployment of cloud storage services has significant benefits in the management of data for users. However, this raises many security concerns, and one of them is data integrity. Though public verification techniques serve the purpose they are vulnerable to procrastinating auditors who may not perform verifications on time. In this article, a cloud data auditing system is proposed. The proposed cloud data auditing system integrates Merkle Tree-based Cloud audit and the blockchain-based audit recording system, thus the core idea is to record each verification result into a blockchain as a transaction. Utilizing the time-sensitive nature of blockchain, the verifications are time-stamped after the corresponding transaction is recorded into the blockchain, which enables users to check whether auditors have performed the verifications at the prescribed time. The proposed cloud data auditing system is experimentally validated. The investigations with varied dataset size revealed less time taken, on an average of 0.25 milliseconds with the use of Merkle Tree. Further results reveal consistency of the data integrity checking.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115911619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Efficient Strategies of VMs Scheduling Based on Physicals Resources and Temperature Thresholds 基于物理资源和温度阈值的高效虚拟机调度策略
Int. J. Cloud Appl. Comput. Pub Date : 2020-07-01 DOI: 10.4018/ijcac.2020070105
Djouhra Dad, Ghalem Belalem
{"title":"Efficient Strategies of VMs Scheduling Based on Physicals Resources and Temperature Thresholds","authors":"Djouhra Dad, Ghalem Belalem","doi":"10.4018/ijcac.2020070105","DOIUrl":"https://doi.org/10.4018/ijcac.2020070105","url":null,"abstract":"Cloud computing offers a variety of services, including the dynamic availability of computing resources. Its infrastructure is designed to support the accessibility and availability of various consumer services via the Internet. The number of data centers allow the allocation of the applications, and the process of data in the cloud is increasing over time. This implies high energy consumption, thus contributing to large emissions of CO2 gas. For this reason, solutions are needed to minimize this power consumption, such as virtualization, migration, consolidation, and efficient traffic-aware virtual machine scheduling. In this article, the authors propose two efficient strategies for VM scheduling. SchedCT approach is based on dynamic CPU utilization and temperature thresholds. SchedCR approach takes into consideration dynamic CPU utilization, RAM capacity, and temperature thresholds. These approaches have efficiently decreased the energy consumption of the data centers, the number of VM migrations, and SLA violations, and this reduces, therefore, the emission of CO2 gas.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Factors Influencing the Adoption of Cloud Computing in Small and Medium Enterprises in Jordan 影响约旦中小企业采用云计算的因素
Int. J. Cloud Appl. Comput. Pub Date : 2020-07-01 DOI: 10.4018/ijcac.2020070106
K. Rababah, Bilal Ali Yaseen Al-Nassar, Sana'a Nawaf Al-Nsour
{"title":"Factors Influencing the Adoption of Cloud Computing in Small and Medium Enterprises in Jordan","authors":"K. Rababah, Bilal Ali Yaseen Al-Nassar, Sana'a Nawaf Al-Nsour","doi":"10.4018/ijcac.2020070106","DOIUrl":"https://doi.org/10.4018/ijcac.2020070106","url":null,"abstract":"ThefactorsofCloudcomputing(CC)adoptionamongsmallandmediumenterprises(SMEs)have notbeenidentifiedintheJordaniancontext.Therefore,theaimofthisstudyistoexaminethefactors influencingtheadoptionofCCinSMEsinJordan.Throughanextensivereviewoftheliterature, theresearchmodelwasconstructedbasedontheTOEframework.Inordertovalidatetheresearch modelandtesttheproposedhypotheses,aquantitativeresearchmethodologyfollowedinwhicha surveyquestionnairewasutilizedtocollectthedata.Outofthe350distributedquestionnaires,92 questionnaireswerevalidfortheanalysis.ThePLS-SEMtechniquewasusedforthedataanalysis. TheresultsapprovedtheinfluenceofsixvariablesontheadoptionofCCbymanufacturingSMEs inJordan,namely;compatibility,security,topmanagementsupport,technologicalreadiness,prior ITexperience,andcompetitivepressure.Onlytheinfluenceoftheperceivedbenefitshasnotbeen supported.ThestudyhastheoreticalimplicationsandpracticalimplicationstoSMEsinJordan. KEywoRdS Compatibility, Competitive Pressure, Perceived Benefits, Prior IT Experience, Security, Technological Readiness, TOE Framework, Top Management Support","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132679480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Metaheuristic Population-Based and Deterministic Algorithm for Resource Provisioning Using Ant Colony Optimization and Spanning Tree 基于蚁群优化和生成树的高效元启发式种群确定性资源分配算法
Int. J. Cloud Appl. Comput. Pub Date : 2020-04-01 DOI: 10.4018/ijcac.2020040101
Muhammad Aliyu, M. Murali, A. Gital, S. Boukari
{"title":"Efficient Metaheuristic Population-Based and Deterministic Algorithm for Resource Provisioning Using Ant Colony Optimization and Spanning Tree","authors":"Muhammad Aliyu, M. Murali, A. Gital, S. Boukari","doi":"10.4018/ijcac.2020040101","DOIUrl":"https://doi.org/10.4018/ijcac.2020040101","url":null,"abstract":"Resourceprovisioningisthecorefunctionofcloudcomputingwhichisfacedwithseriouschallenges asdemandgrows.Severalstrategiesofcloudcomputingresourcesoptimizationwereconsidered bymanyresearchers.Optimizationalgorithmsusedarestillunderreckoningandmodificationso as toenhance theirpotentials.Assuch,adynamicscheme thatcancombineseveralalgorithms’ characteristicsisrequired.Quiteanumberofoptimizationtechniqueshavebeenreassessedbased onmetaheuristicsanddeterministictomapoutwiththechallengesofresourceprovisioninginthe Cloud.Thisresearchworkproposestoinvolvetheantcolonyoptimization(ACO)population-based mechanismbyextendingittoformahybridmeta-heuristicthroughdeterministicspanningtree(SPT) algorithm incorporation.Extensiveexperimentconducted in thecloudsimsimulatorprovidedan efficientresultintermsoffasterconvergence,andmakespantimeminimizationascomparedtoother population-basedanddeterministicalgorithmsasitsignificantlyimprovesperformance. KEywORDS Cloud Computing, Deterministic, Dynamic, Metaheuristics, Optimization, Scheduling","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115651897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Multi Factor Two-way Hash-Based Authentication in Cloud Computing 云计算中的多因素双向哈希认证
Int. J. Cloud Appl. Comput. Pub Date : 2020-04-01 DOI: 10.4018/ijcac.2020040104
K. DeviPriya, Sumalatha Lingamgunta
{"title":"Multi Factor Two-way Hash-Based Authentication in Cloud Computing","authors":"K. DeviPriya, Sumalatha Lingamgunta","doi":"10.4018/ijcac.2020040104","DOIUrl":"https://doi.org/10.4018/ijcac.2020040104","url":null,"abstract":"TheexpansionofCloudcomputingisinfluencingvariousdomainssuchaseducation,thebanking sector,industries,government,healthinformatics,andindividuals.Thecharacteristicsofaneasy interface,on-demandaccess,scalability,andlowinfrastructureinvestmenthavetoleadtothefast adaptationofCloudcomputingbasedupontheirneeds.Despitetheadvantages,Cloudcomputing isopentomoresecurityrisksandattacksespeciallyintermsofcommunicationduetothelackof secureauthenticationandprivacy.Inthisarticleispresentedanovelhash-basedmultifactorsecure mutual authentication scheme that includes mathematical hashing properties, certificates, nonce values,traditionaluserids,andpasswordmechanismsthatresistMITMattacks,replayattacks,and forgeryattacks.WeimplementedourproposedmethodintheMicrosoftAzurecloudandtheresults areevaluated.ThesecurityanalysisisdonebyusingtheScythertoolandwithaformalanalysisby usingGNYbelieflogic.Theresultsindicatetheproposedschemeiscapableofprovidingstrong secureauthentication. KeywoRdS Authentication, Cloud Computing, GNY belief logic, Hash-Based Algorithms, Microsoft Azure Cloud, Multifactor Authentication, Scyther tool, Security Attacks","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125657320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Offloading as a Service Middleware for Mobile Cloud Apps 卸载作为移动云应用的服务中间件
Int. J. Cloud Appl. Comput. Pub Date : 2020-04-01 DOI: 10.4018/ijcac.2020040103
Hamid Jadad, A. Touzene, K. Day
{"title":"Offloading as a Service Middleware for Mobile Cloud Apps","authors":"Hamid Jadad, A. Touzene, K. Day","doi":"10.4018/ijcac.2020040103","DOIUrl":"https://doi.org/10.4018/ijcac.2020040103","url":null,"abstract":"Recently,muchresearchhasfocusedontheimprovementofmobileappperformanceandtheirpower optimization,byoffloadingcomputationfrommobiledevicestopubliccloudcomputingplatforms. However,thescalabilityoftheseoffloadingservicesonalargescaleisstillachallenge.Thisarticle describesasolutiontothisscalabilityproblembyproposingamiddlewarethatprovidesoffloading asaservice(OAS)tolarge-scaleimplementationofmobileusersandapps.Theproposedmiddleware OAS uses adaptive VM allocation and deallocation algorithms based on a CPU rate prediction model. Furthermore, it dynamically schedules the requests using a load-balancing algorithm to ensuremeetingQoSrequirementsatalowercost.Theauthorshavetestedtheproposedalgorithm byconductingmultiplesimulationsandcomparedourresultswithstate-of-the-artalgorithmsbased onvariousperformancemetricsundermultipleloadconditions.TheresultsshowthatOASachieves betterresponsetimewithaminimumnumberofVMsandreduces50%ofthecostcomparedto existingapproaches. KeywORdS Apps, Load Balancing, Mobile Cloud, Offloading, Scheduling","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"55 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113988119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Conceptual Framework Towards Implementing a Cloud-Based Dynamic Load Balancer Using a Weighted Round-Robin Algorithm 使用加权轮循算法实现基于云的动态负载均衡器的概念框架
Int. J. Cloud Appl. Comput. Pub Date : 2020-04-01 DOI: 10.4018/ijcac.2020040102
S. Sahana, Tanmoy Mukherjee, D. Sarddar
{"title":"A Conceptual Framework Towards Implementing a Cloud-Based Dynamic Load Balancer Using a Weighted Round-Robin Algorithm","authors":"S. Sahana, Tanmoy Mukherjee, D. Sarddar","doi":"10.4018/ijcac.2020040102","DOIUrl":"https://doi.org/10.4018/ijcac.2020040102","url":null,"abstract":"CloudloadbalancinghasbecomeoneofthemostvitalaspectsofCloudcomputingthathascaptured theattentionofITorganizationsandbusinessfirmsinrecentyears.Amongtheissuesrelatedtothis particularaspect,onesuchissuewhichneedstobeaddressedistheissueofeffectivelyservingthe clients’requestsamongmultipleserversusinganappropriateloadbalancer.Previoussurveypapers discussed various issues of cloud load balancing and accordingly devised various methods and techniquestoaddressthoseissueswiththeobjectivesofreductionofprocessingtimeandresponse timealongwithoptimizationofcosts.Inthisarticle,wehavediscussedaneffectiveloadbalancing techniqueusingtheweightedRound-Robinalgorithmwhichcanprocesstheclientrequestsamong multipleserverswithminimalresponsetime.Consideringalltheseaspects,acloud-baseddynamic loadbalancerisbeingusedtosolvetheproblemofloadbalancinginthecloudinfrastructure. KeyWoRDS Client Machines, Cloud-Based Dynamic Load Balancer, Database, Server Machines, Weighted RoundRobin Algorithm","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121965079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System 基于区块链的银行系统敏感属性存储与访问监控
Int. J. Cloud Appl. Comput. Pub Date : 2020-04-01 DOI: 10.4018/ijcac.2020040105
M. Sumathi, S. Sangeetha
{"title":"Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System","authors":"M. Sumathi, S. Sangeetha","doi":"10.4018/ijcac.2020040105","DOIUrl":"https://doi.org/10.4018/ijcac.2020040105","url":null,"abstract":"In earlier banking systems, the data owners were unable to access or update their financial information. Nowadays, user financial information is stored in Cloud storage instead of traditional storage, but security risks are high in financial sectors. Sometimes, Cloud services providers and public auditors modify the user sensitive attribute values. Hence, the decentralized storage system is required for providing better security and integrity of user sensitive attribute values. Blockchain is a decentralized technology for providing tamper-proof storage for sensitive attribute values. Hence, the account holder information is segregated as sensitive and non-sensitive attributes. Before storing into off-chain mode of blocks, the sensitive attributes are grouped into ‘n' number of groups and encrypted by separate group key. The non-encrypted, non-sensitive attributes are stored in cloud storage. The access information is stored in the on-chain mode of the block for easy monitoring. Hence, the security and integrity of sensitive information are preserved.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"751 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133701670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Examining the Antecedents of Cloud Service Profitability 分析云服务盈利的前提
Int. J. Cloud Appl. Comput. Pub Date : 2019-10-01 DOI: 10.4018/IJCAC.2019100103
A. Herzfeldt, Sebastian Floerecke, Christoph Ertl, H. Krcmar
{"title":"Examining the Antecedents of Cloud Service Profitability","authors":"A. Herzfeldt, Sebastian Floerecke, Christoph Ertl, H. Krcmar","doi":"10.4018/IJCAC.2019100103","DOIUrl":"https://doi.org/10.4018/IJCAC.2019100103","url":null,"abstract":"In a fast growing but highly competitive market, some cloud service providers are significantly more profitable than others. In particular, numerous providers struggle to scale their cloud service delivery up from a one-time, project-based co-creation model to a platform delivery model, building on reusable resources. This study builds on the service (-dominant) logic and the resource-based view to develop a model of cloud service profitability. It is proposed that profitability results from the ability to manage costs of customer-specific value co-creation and efforts to build reusable resources, which facilitate future customer engagements. The results of a survey with 99 cloud providers show that value co-creation costs indeed mediate the effects of facilitation capability and complexity on cloud service profitability. However, facilitation capability has both direct and mediated effects on profitability. The results provide insights on which factors influence cloud service profitability and which resources should be established before offering a cloud service to future customers.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127148628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信