166 results
Search Results
2. Research on Cloud Servicer Dynamically Select Models in Music VoD Hybrid Network Environment
- Author
-
Ya Lin Zhang
- Subjects
Service (systems architecture) ,Application server ,business.industry ,Computer science ,Video server ,Cloud computing ,General Medicine ,computer.software_genre ,Upload ,Mode (computer interface) ,Server farm ,Internet Authentication Service ,Operating system ,business ,computer ,Computer network - Abstract
Video server providers invest more and more on the server, for how to provide a stable and low-cost continuous service to users of this problem. In this paper, hybrid architecture in the user how to choose a cloud server in-depth analysis. And how to choose a cloud server for this problem, this paper analyzes the current server selection method, coupled with P2P mode users the ability to upload and server memory on this basis for modeling, then verified through simulation experiments proposed the effectiveness of the method.
- Published
- 2015
3. Dynamic Remote Attestation on CP-ABE Algorithm
- Author
-
Shun Yao Yang
- Subjects
Security analysis ,Measure (data warehouse) ,Computer science ,business.industry ,Distributed computing ,Node (networking) ,Cloud computing ,Access control ,General Medicine ,computer.software_genre ,Virtual machine ,Direct Anonymous Attestation ,State (computer science) ,business ,computer ,Algorithm - Abstract
Current remote attestation schemes in trusted cloud computing lack of dynamic measure scheme of virtual computing nodes. In this paper, by the analysis and comparison of existing remote attestation technology, we propose a trust measure of virtual computing node running state, and a remote attestation scheme based on the trust measure results and CP-ABE attribute access control. By RO security analysis, and a simulation, we verify the security and efficiency of the program. The trust measure of platform running state is mainly based on the trust rating of the programs running on the platform, and a total trust value of the platform by an algorithm. The trust measure of virtual computing node running state is mainly based on the trust measure of the programs running on the platform and CP-ABE attribute access control. The remote attestation for the trust measure of platform running state is based on CDH problem. In this paper, we carry out simulation experiment with different proportions of non-credible nodes and the experiment results verify the trust evaluation efficiency of the scheme on the virtual machine.
- Published
- 2014
4. Construction on Virtualized Environment for Digital Library Based on Cloud Computing Technology
- Author
-
Jun Jun Liu
- Subjects
Cloud computing security ,Computer science ,business.industry ,Information technology ,Cloud computing ,General Medicine ,computer.software_genre ,Virtualization ,Digital library ,Shared resource ,Utility computing ,Virtual machine ,Cloud testing ,Service catalog ,Operating system ,The Internet ,business ,computer - Abstract
Cloud computing technology is emerging technology in the field of information technology, and its technical advantage has brought new opportunities and challenges for the development and service of digital library in the Internet era. Virtualization is the key technology of cloud computing, and the paper discusses the virtualization of digital library in the cloud computing environment from technical level. Firstly, the paper introduced cloud computing and virtualization technology; then created a virtualized environment for digital library based on the cloud computing technology, and described the function of various levels; finally, the capacity of virtual machines appointment scheduling can be calculated according to formulas. The paper has great significance in enhancing the efficiency and quality of library service, constructing resource sharing system of digital library.
- Published
- 2014
5. Design of Information System of Electrical Power School Based on Cloud Computing
- Author
-
Shi Meng Tong, Cheng Long Hao, Shou Ze Ren, Feng Sun, and Yong Zhi Wang
- Subjects
business.industry ,Computer science ,Distributed computing ,Information technology ,Cloud computing ,General Medicine ,computer.software_genre ,Power (physics) ,Management information systems ,Data model ,Operating system ,Information system ,Electric power ,Web service ,business ,computer - Abstract
In order to adapt to the demand of integration and sharing about electrical power school and to break the limitation of "Islands of information", it is necessary to develop a loosely coupled information system. This paper introduces the system application demand of electrical power school, and designs the functions of the system and scientific object-oriented data model. A concept of operating mode information system is designed based on cloud computing. Object-oriented programming language C# is used to develop the prototype of the system. The result of application is showed in various UI. This paper provides a valuable reference for the information technology future about electrical power school
- Published
- 2014
6. Brief Analysis of Cloud Computing Security
- Author
-
Jing Qiu, Da Yu, Ping He, Ma Jie, and Feng Ge Shao
- Subjects
Cloud computing security ,Utility computing ,Computer science ,business.industry ,Cloud computing ,General Medicine ,Computer security model ,business ,Computer security ,computer.software_genre ,Reference model ,computer - Abstract
The safety issue of cloud computing arouses much attention recently. In this paper, it is firstly introduced the related concepts, then it is introduced the current situation of cloud computing as well as potential safety hazards and security reference model. The conclusion is drawn in the end of this paper.
- Published
- 2014
7. Study on the Architecture of Mobile Campus Digital Library System
- Author
-
Chang Liu, Dan Shi, and Chang Li Sun
- Subjects
Multimedia ,business.industry ,Computer science ,Mobile computing ,Cloud computing ,Mobile Web ,General Medicine ,Digital library ,computer.software_genre ,World Wide Web ,Mobile station ,Mobile database ,Mobile payment ,Mobile search ,Mobile technology ,business ,computer - Abstract
Cloud computing and mobile Internet is a new computing model based on Internet business that is a mixture of many technical results, it has the advantage of safe and reliable, massive information storage, fast and convenient. This paper mainly discusses the advantages of mobile digital library, and puts forward the mode of constructing the cloud computing and mobile Internet library based on information platform, analyzes the basic architecture of mobile library, in-depth study cloud computing and mobile Internet in library information platform access model and database model, finally the paper gives general idea to construct digital library using mobile WAP Technology.
- Published
- 2014
8. Research of Automatic Software Test Platform with Virtualization Technology
- Author
-
Li Zhi Cai, Zhen Yu Liu, and Wen Jie Chen
- Subjects
Test design ,business.industry ,Computer science ,Full virtualization ,Cloud computing ,General Medicine ,computer.software_genre ,Virtualization ,Service virtualization ,Test harness ,Software ,Build verification test ,Virtual machine ,Cloud testing ,Software construction ,Test Management Approach ,Software engineering ,business ,computer - Abstract
This paper studies the software automatic test in virtual machine environment. The existing software automatic testing technology is not compatible for virtual machine. Cloud-based virtual environment provides a new means for the software test. A novel testing framework is proposed in this paper. The new technology combined cloud-based virtual environment and related the software automation tool. The fully test procedure are provided with test design, test develop, test execute and test result collection. The character for different application could be supported in this framework. The virtualization technology is used to test some applications and proved effective.
- Published
- 2014
9. Improved Ant Colony Algorithm on Scheduling Optimization of Cloud Computing Resources
- Author
-
Xian Wei Zhou and Xiao Xi Hu
- Subjects
business.industry ,Computer science ,Distributed computing ,Ant colony optimization algorithms ,Real-time computing ,Cloud computing ,General Medicine ,Dynamic priority scheduling ,computer.software_genre ,Fair-share scheduling ,Scheduling (computing) ,Virtual machine ,Data center ,business ,computer - Abstract
To address the problem of high occupancy of resources and slow response of current scheduling of cloud computing resources, this paper proposes a scheduling optimization algorithm based improved ant colony algorithm. It makes resource reservation through migration of virtual machine, uses dynamic trend prediction algorithm to forecast the load changes of data center, and puts forward the concrete complement to adjust reduction. Experiments show that the combination algorithm proposed in this paper are efficient to improve the performance of data center, accelerate the response speed and increase the precision.
- Published
- 2014
10. The Research on Knowledge Sharing in the Small and Medium-Sized Enterprise Based on Cloud Computing
- Author
-
Xiang Wen Yang and Ji Chao Hu
- Subjects
Structure of Management Information ,Computer science ,Enterprise integration ,Enterprise architecture ,Cloud computing ,computer.software_genre ,Enterprise information management ,Utility computing ,Enterprise architecture management ,End-user computing ,Cloud testing ,Information system ,Enterprise information system ,Cloud computing security ,Database ,business.industry ,General Medicine ,Enterprise information security architecture ,Virtualization ,Service-oriented modeling ,Knowledge sharing ,Management information systems ,business ,Software engineering ,computer ,Workflow management system ,Enterprise software ,Data virtualization - Abstract
The paper combine cloud computing with knowledge management, and classify the knowledge management of enterprise information management system, finally the paper plan and design the overall architecture of enterprise management information system. According to the model of cloud computing, establish the cloud computing platform based on the construction of cloud computing and virtualization technology, in order to achieve the overall architecture of the management information system of enterprise that migrate to the cloud computing environment. This paper mainly introduced in the cloud computing architecture of enterprise management information system under the environment of cloud computing and implementation of knowledge management system.
- Published
- 2014
11. Research of Power Communication Network System’s Reliability Based on Cloud Model and Fuzzy Petri Nets
- Author
-
Fen Fang Li, Zhan Jun Hao, and Hong Zhang Zhao
- Subjects
Computer science ,business.industry ,Cloud computing ,General Medicine ,Communications system ,Telecommunications network ,Reliability engineering ,Power (physics) ,Factor (programming language) ,business ,Fuzzy petri nets ,computer ,Reliability (statistics) ,computer.programming_language - Abstract
For the varied circumstances in the evaluation of complex power communication systems, this paper proposes a reliable evaluation method based on normal cloud model and fuzzy Petri net. The simulation results show that the model in this paper can effectively evaluate the system reliability when compared with the other models for the same factor.
- Published
- 2014
12. Simulation Research on Dynamic Security Model of Information System in Cloud Computing Environment
- Author
-
Si Ping Liu
- Subjects
Cloud computing security ,Computer science ,business.industry ,Distributed computing ,Cloud computing ,General Medicine ,Information security ,Factor analysis of information risk ,Computer security model ,Computer security ,computer.software_genre ,Data sharing ,Software ,Information system ,Risk assessment ,business ,computer - Abstract
Cloud computing can dynamically allocate the software or hardware resource and information resource in accordance with the needs of different computer users, so as to expand the virtual resources of computer, but data information exists a big security risk in the process of data parallel calculation or the data sharing, so it needs to carry out the risk assessment on the security of signal. In cloud computing, this paper introduces the second-order difference quotient calculation principle in the model of information risk assessment that has accelerated the speed of information risk assessment, and adopts second order linear security authentication model that has strengthened the security of the cloud computing. In order to verify the validity and reliability of the model, this paper uses C program language to design the algorithm and inspects the cloud data with possible existing risk, and then it obtains the deviation curve of numerical calculation and theoretical value, which provides the technical reference for the research of cloud information security technology.
- Published
- 2014
13. Minimize the Replication for Secure Cloud Data Storage Systems Using Error Correction Codes
- Author
-
C. Christopher Seldev and Jose G. Sahaya Stalin
- Subjects
Computer science ,business.industry ,Cloud computing ,Data_CODINGANDINFORMATIONTHEORY ,General Medicine ,computer.software_genre ,Replication (computing) ,Reed–Solomon error correction ,Distributed data store ,Operating system ,Tornado code ,Error detection and correction ,business ,Erasure code ,Cloud storage ,computer ,Computer network - Abstract
Cloud data centers should be flexible and available to the data forever. The replication method is used to achieve high availability and durability of cloud data center, if there is any failure to recover the messages from the cloud databases. The concern of this replication technology is that, the replica size is equal to the size of the original data object. When Error Detection Schemes were used, there is a reduction in the number of cloud distributed storage systems. The scope of this paper is to store the data efficiently in cloud data centers unlike the previous schemes which used erasure codes such as Reed Solomon codes only with a view to store data in datacenters. This paper proposes to encrypt the message using DES and to encode the message using Reed Solomon code before storing the message. Storing time is convincingly good in Reed Solomon code when compared with tornado code.
- Published
- 2014
14. Reinforcement Learning for Cloud Computing Digital Library
- Author
-
Lin Xu
- Subjects
Multimedia ,business.industry ,Computer science ,media_common.quotation_subject ,Cloud computing ,General Medicine ,Digital library ,computer.software_genre ,Data science ,Software deployment ,Data exchange ,Reinforcement learning ,Quality (business) ,business ,computer ,media_common - Abstract
This paper proposes a new framework of combining reinforcement learning with cloud computing digital library. Unified self-learning algorithms, which includes reinforcement learning, artificial intelligence and etc, have led to many essential advances. Given the current status of highly-available models, analysts urgently desire the deployment of write-ahead logging. In this paper we examine how DNS can be applied to the investigation of superblocks, and introduce the reinforcement learning to improve the quality of current cloud computing digital library. The experimental results show that the method works more efficiency.
- Published
- 2014
15. Virtual Software Testing Service Based on Cloud Computing
- Author
-
Shu Kun Liu, Jin Peng Tang, Qiao Yan Kuang, Mei Ling Cai, Ji Feng Chen, Ling Lin Li, Shan Duan, and De Peng Hu
- Subjects
Computer science ,business.industry ,Software as a service ,Software performance testing ,Cloud computing ,General Medicine ,computer.software_genre ,Virtualization ,Service virtualization ,Software quality ,Software ,Cloud testing ,Software construction ,Operating system ,Software verification and validation ,business ,Software engineering ,computer ,System integration testing - Abstract
Clouding computing and virtualization technology have brought immense effects to software organizations including software testing region. At the same time the method and related technology will be changed a lot. Some concepts, structures and characters are described in this paper. Software testing should be regarded as a service. Four typical patterns of cloud testing and the relations among them are showed in the paper. Combined with the virtualization technology, the frame of TaaS (Testing as a Service) is defined too. In the meantime, cloud testing and traditional software testing is compared with each other. At last, the main research contents about software testing in virtualization environment are summarized.
- Published
- 2014
16. Automatic Classification Method of Web Services in Cloud Environment
- Author
-
Li Wen Mu, Jun Rong Li, Wen Bo Zhou, Tong Yu Yin, and Yuan Li Feng
- Subjects
medicine.medical_specialty ,Database ,Computer science ,business.industry ,Services computing ,Cloud computing ,General Medicine ,computer.software_genre ,World Wide Web ,Resource (project management) ,Utility computing ,Cloud testing ,medicine ,Web service ,business ,computer ,Web modeling - Abstract
Different cloud services need different resources, how to use the resources efficiently has become one of the hot research topics about cloud computing. In order to improve the utilization of resources in cloud, this paper proposes an automatic cloud service classification method, which uses an artificial neural network to predict the type of service resource requirements, and classifies services based on the predicting result. In this paper, we do classification experiments on three groups of Web services on Web service site. The experiment results show that, the method is effective and can predict the type of resource requirements for Web services automatically.
- Published
- 2014
17. TCFI4J: A Trust Enhanced Control Flow Integrity in Java Virtual Machine
- Author
-
Songzhu Mei, Zhi Ying Wang, Yu Liang Zhao, Jiang Chun Ren, Jiang Jiang Wu, Yong Cheng, and Jun Ma
- Subjects
User information ,Java ,business.industry ,Computer science ,strictfp ,Cloud computing ,General Medicine ,Java concurrency ,World Wide Web ,Software ,Real time Java ,Cross-platform ,Enterprise information system ,Software engineering ,business ,computer ,computer.programming_language - Abstract
Along with the developing of information technology, Java platform a plays more and more important role in building enterprise information system. Especially after the cloud computing emerged, Java applications are used as kinds of services to provide the users some function. Users use these services remotely, and the applications should give the users some trust evidence. Control-flow integrity endows the software the ability to show the applications' behaviors conform to the users' expectations. But the Java virtual machine's memory organization is different from physical machine and hinders the application of CFI. This paper gives out the a novel way to enforce the control flow integrity to the Java applications based on the memory organization of the Java virtual machine. The method presented in this paper can provide the user information about an applications behavior, and significantly improve the security of a Java application.
- Published
- 2014
18. The Data Allocation Strategy Based on Load in NoSQL Database
- Author
-
Shuang Tan, Zhi Kun Chen, Li He, Shu Qiang Yang, Ge Zhang, Hui Zhao, and Huiyu Yang
- Subjects
Database ,business.industry ,Computer science ,Big data ,Cloud computing ,General Medicine ,computer.software_genre ,Data allocation ,NoSQL ,High availability ,Scalability ,The Internet ,business ,computer - Abstract
With the development of Internet technology and Cloud Computing, more and more applications have to be confronted with the challenges of big data. NoSQL Database is fit to the management of big data because of the characteristics of high scalability, high availability and high fault-tolerance. And it is one of the technologies of the management of big data. We will improve the performance of massive data processing of NoSQL Database through the large scale data parallel data processing and data localize of computing. So how to allocate the data will be a big challenge of NoSQL Database. In this paper we will propose a data allocation strategy based on the nodes load, which can adjust the data allocation strategy by the execute status of the system. And it can keep the balance of data allocation by a small cost. At last we will use some experiments to verify the effectiveness of the strategy which is proposed in this paper. The experiments show that it can improve the systems performance than other allocation strategy.
- Published
- 2014
19. Cloud Computing Survey
- Author
-
Wenhua Zeng and Gang Lu
- Subjects
Information management ,World Wide Web ,business.industry ,Computer science ,Information technology ,Data-intensive computing ,Cloud computing ,General Medicine ,Virtual reality ,business ,Virtualization ,computer.software_genre ,computer - Abstract
Since the concept of cloud computing was proposed in 2006, cloud computing has been considered as the technology that probably drives the next-generation Internet revolution and rapidly becomes the hottest topic in the field of IT. The paper synthetically introduces cloud computing techniques, including the currently non-uniform definition and the characteristics of cloud computing; The paper also introduces the core techniques of cloud computing, such as data management techniques, data storage techniques, programming model and virtualization techniques. Then the 4-tie overall technique framework of general cloud computing is talked about. Finally, the paper talks about the obstacles and opportunities.
- Published
- 2014
20. A Evaluation Method of System Performance Based on Cloud Theory
- Author
-
Yi Qin
- Subjects
Computer science ,business.industry ,Distributed computing ,Process (computing) ,Cloud computing ,General Medicine ,computer.software_genre ,Field (computer science) ,Variable (computer science) ,Evaluation methods ,Information system ,Data mining ,business ,computer - Abstract
During the evaluation of multi-source information system, uncertainty exists widely. In order to use and process the uncertainty and improve the creditability of system evaluation, this paper based on the cloud theory, studied the mapping method between nature variable and quantity variable. At the same time, the paper promoted a novel evaluation method of system performance based on the cloud theory. Finally, an example validates the process and feasibility of the method. The method exploits new application field for the cloud theory.
- Published
- 2014
21. The Study of Intelligent Learning Website
- Author
-
Jing Wei Deng, Kai Ying Deng, Su Duo Li, and Ying Xing Li
- Subjects
Multimedia ,Trainer ,business.industry ,Computer science ,Cloud computing ,General Medicine ,Persona ,computer.software_genre ,Variety (cybernetics) ,World Wide Web ,Identification (information) ,The Internet ,business ,Goal setting ,computer - Abstract
The rapid development of Internet has given rise to many new applications. Natural language processing, cloud computing, personalized recommendation technologies and so on are improving the experience of using information resources for people greatly. This paper puts forward the idea of a kind of intelligent learning website, it includes a variety of functions such as goal setting, skills assessment, making study plan, recommending learning content, answering questions, recommending partners and projects, etc. Just like as if user has his own personal trainer. Related implementation techniques are discussed in this paper, and put forwards the algorithm of network user identification based on digitalized persona, it provides a new train of thought of identify users characteristic and demand for precisely personalized recommendation.
- Published
- 2014
22. Research on Reputation and Risk Evaluation-Trust for Cloud Environment
- Author
-
Xiao Lan Xie, De Jian Zhou, and Pei Yin
- Subjects
Cloud computing security ,Computer science ,business.industry ,media_common.quotation_subject ,Cheating ,Data_MISCELLANEOUS ,Cloud computing ,General Medicine ,Service provider ,Computer security ,computer.software_genre ,Risk evaluation ,Robustness (computer science) ,Computational trust ,business ,computer ,Reputation ,media_common - Abstract
This paper which starts from the characteristics of human social trust relationship, researches the trust in cloud computing environment. At present, the commercial cloud environment exist two main safe problems: one is the cloud platform trust security problems in their own special environment, the second is the security issues on the network of cheating, false, malicious ads and spam trust security . Aiming at solving this problem, on the basis of the existing trust models, this paper studies the cloud environment trust models according to the characteristics of the cloud environment, constructs a model of trust in the cloud environmentReputation and Risk Evaluation-Trust Model (RRE-Trust), and improves the trust evaluation algorithm. Finally, the experiment results show that, compared with the existing trust models, the proposed evaluate method of this model is closer to the real service behavior of service providers, resist effectively all kinds of malicious behaviors, shows a good robustness and ability in recognize.
- Published
- 2014
23. User Information Security Context-Aware Services in a Cloud Environment
- Author
-
Nan Ju Kim, Hoon Jeong, and Eui In Choi
- Subjects
User information ,Service (business) ,Cloud computing security ,business.industry ,Wireless network ,Computer science ,Cloud computing ,General Medicine ,Service provider ,Computer security ,computer.software_genre ,World Wide Web ,Security service ,business ,Mobile device ,computer ,Personally identifiable information - Abstract
Users in the ubiquitous mobile environment have provided services that match the surrounding context and the location of their own. As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. The development of mobile devices and the spread of wireless network help share and exchange information and resources more easily. Therefore users are able to use the information and service more free than previous wire network due to development of wireless network and device. Previous studies of these form was a study on the provided service mainly, but they did not regard on user's location, environment and preference. Therefore, this paper, we use the profile and the user's situation information that contains personal information security, preferences. We are able to provide more accurate service than previous techniques through techniques and systems suggested in this paper.
- Published
- 2013
24. Research on Compression Storage of Massive Agricultural Data Based on Cloud Environment
- Author
-
Rong Hua Gao and Hua Rui Wu
- Subjects
business.industry ,Computer science ,Real-time computing ,Cloud computing ,Data_CODINGANDINFORMATIONTHEORY ,General Medicine ,computer.software_genre ,Huffman coding ,symbols.namesake ,Parallel processing (DSP implementation) ,Computer data storage ,Scalability ,symbols ,Data mining ,business ,computer ,Cloud storage ,Data compression - Abstract
With the development of information technology, agriculture data show large amount of data, distributed, heterogeneous characteristics. It is difficult to access and management with the massive data are continuously increasing which affect the large-scale use of agricultural information data. In this paper, the method of compression algorithm is proposed which based on real-time and time space correlation characteristics. All data is divided into several categories by Huffman compression algorithm combines parallel processing cloud platform. Then, the massive agricultural data is compressed and reducing the data storage. Exprienment result show that cloud storage platform with dynamic scalability. Under the same experimental data, the method of this paper has higher compress ratio, and compression consuming less when a larger amount data, compared with the Huffman compress and dictionary-based data compression algorithm.
- Published
- 2013
25. Research and Implementation of the Web E-Mail System Based on the Cloud Media Platform
- Author
-
San Xing Cao, Feng Yi Gou, and Bo Ran Li
- Subjects
World Wide Web ,Multimedia ,business.industry ,Computer science ,Operating environment ,Cloud testing ,Cloud computing ,The Internet ,General Medicine ,business ,computer.software_genre ,computer - Abstract
With the rise and development of cloud technology, cloud-based systems has been widely used in various fields of Internet-based applications. This paper discusses the application model of cloud technology in media platforms. The second section of the paper presents the operating environment of the cloud media platform. Finally, this paper analysis specifically the implementation of the web E-mail system based on the cloud media platform presented above.
- Published
- 2013
26. Design of High Performance Cloud Storage Platform Based on Cheap PC Clusters Using MongoDB and Hadoop
- Author
-
Tai Jun Liu, Jing Jing Zheng, Cheng Dai, and Yan Ye
- Subjects
Database ,Computer science ,business.industry ,Cloud computing ,Unstructured data ,General Medicine ,Construct (python library) ,computer.software_genre ,NoSQL ,Scalability ,Personal computer ,Key (cryptography) ,Operating system ,business ,Cloud storage ,computer - Abstract
To lay the foundation for the high performance private cloud storage platform, this paper proposes a new cloud storage structure with horizontal scalability using MongoDB and Hadoop. MongoDB is a powerful NOSQL database which is used to construct the cloud storage platform. In certain scenarios, the map-reduce provided by MongoDB can not meet the need of the complex data analysis, especially for the mass complex unstructured data such as videos and documents. This paper introduce the key technologies in MongoDB and Hadoop, then aggregate the advantages of them to build a high performance private cloud storage infrastructure based on cheap personal computer clusters. This infrastructure combines the high horizontal scalability of MongoDB and the high-performance analysis capability from Hadoop.
- Published
- 2013
27. The Application of Decision Tree Algorithm in Medical Field Based on Cloud Platform
- Author
-
Yuan Kai Yang, Jian Xi Peng, and Zhi Yuan Liu
- Subjects
Incremental decision tree ,business.industry ,Computer science ,Decision tree learning ,ID3 algorithm ,Decision tree ,Information technology ,Cloud computing ,General Medicine ,computer.software_genre ,Tree (data structure) ,Data mining ,business ,computer - Abstract
In the medical system, medical record is summarized, analyzed and predicted a patient seizure type and incidence. With the development of information technology, a large amount of data is to be processed. Traditional analysis algorithm could not be effectively processed to obtain the best predictive results as the data increasing. Decision tree algorithm based on cloud platform is used to record, analyze and predict patients medical data in this paper. A large number of experimental results show that distributed decision tree algorithm proposed in this paper is efficient and could complete prediction work in medical system. The algorithm has good expansibility, its very suitable for large-scale and multitude medical data process.
- Published
- 2013
28. Discovery Algorithm of Classification Characteristic Rule Based on Cloud Database
- Author
-
Xin Liu, Guang Kun Ma, Dan Zhang, and Tian Xiang Zhu
- Subjects
Information retrieval ,Feature data ,business.industry ,Computer science ,Rule-based system ,Cloud computing ,General Medicine ,computer.software_genre ,Database design ,Data model ,Knowledge extraction ,Cloud database ,Data mining ,business ,computer ,Algorithm ,Database model - Abstract
Massive data stored in a cloud database, in which lots of potential and valuable knowledge exist. In this paper, the data model of the cloud database is analyzed. Through analyzing, classifying, the common features of the data are extracted and form a feature data set, from which the new knowledge can be found. In the paper, the basic model based on the classification characteristic rules of the cloud database is defined, and the discovery algorithm of the classification characteristic rules is presented.
- Published
- 2013
29. Research on Cloud Computing Security Based on the Remote Attestation
- Author
-
Fu Xie and Yun Yun Du
- Subjects
Cloud computing security ,business.industry ,Computer science ,Distributed computing ,Cloud computing ,General Medicine ,Trusted Computing ,Service provider ,Computer security model ,computer.software_genre ,Computer security ,Grid computing ,Utility computing ,End-user computing ,Cloud testing ,Direct Anonymous Attestation ,business ,computer - Abstract
Cloud computing security has become a key problem of restricting the development of cloud computing, solving the cloud computing security problem has been extremely urgent. At present, it has become a new favorite in the cloud computing security research field that trusted computing is used to solve the cloud computing security, this paper uses remote attestation in trusted computing to solve the cloud computing security problems. In a cloud computing environment, the service provider not only needs to provide reliable components, but also needs to ensure that the computing platform system is reliable. In this paper, in view of the characteristics of the cloud computing platform, these two approaches are consolidated and improved, and a proof method based on the component properties and the system behavior (CPTBA) is put forward.
- Published
- 2013
30. Three Dimensional Vision Conversion Based on Cloud Computing
- Author
-
Yi Feng Chiang, Yu Cheng Fan, and Ching Min Lee
- Subjects
Computer science ,business.industry ,Computer graphics (images) ,Cloud computing ,General Medicine ,Image file formats ,computer.file_format ,Dimension (data warehouse) ,Space (commercial competition) ,business ,computer ,Field (computer science) - Abstract
In this paper, we propose a three dimensional vision conversion based on cloud computing. Three dimensional video and image system become an important technology in consumer electronics field in latest decade. There are numerous three dimensional video and image formats for different 3D products. However, the three dimensional vision contents that are manufactured by different standards are difficult to exchange without complete three dimensional vision converters. Therefore, how to perform the three dimensional vision format converters to interchange different kinds of three dimension vision becomes an important research topic in academic and industry. Nevertheless, three dimensional vision processor and converter have high computing complexity. It is hard to perform whole three dimensional vision converter according to all kinds of international standards in client machine and portable device. At the same time, three dimensional visions often require a large number of storage spaces. It is also very difficult to record all kinds of three dimensional visions in local device. The above problem should be solved adopting different concepts. Therefore, we proposed cloud computing concept that establishes a complete three dimensional vision converter in cloud computing server and storage space in three dimensional vision clouds. The customer access the three dimensional vision rely on three dimensional vision cloud. The approach methodology solves the problems of computing complexity and storage space of tradition three dimensional vision converters and storage. The presented intact framework of three dimensional vision converters also provides a solution of related research in this paper.
- Published
- 2013
31. Study on Cloud Computing
- Author
-
Dong Xin Lu and Wei Li
- Subjects
Cloud computing security ,business.industry ,Computer science ,Software as a service ,Data_MISCELLANEOUS ,Cloud computing ,General Medicine ,Computer security ,computer.software_genre ,ComputingMilieux_GENERAL ,Utility computing ,Cloud testing ,business ,computer - Abstract
This paper summarizes some issues occurred in the development of cloud computing. First we introduce the background of cloud computing and the difference between cloud computing and others. Then we talk about the architecture and the characteristics of cloud computing. In the end of this paper, we discuss some issues in cloud computing.
- Published
- 2012
32. The Design and Implementation of Cloud Services Callback Mobile Device
- Author
-
Tong Zhu and Zhuo Gao
- Subjects
Cloud computing security ,Computer science ,Java Native Interface ,business.industry ,Operating system ,Callback ,Cloud computing ,General Medicine ,Android (operating system) ,computer.software_genre ,business ,Mobile device ,computer - Abstract
This template explains and demonstrates how to prepare your camera-ready paper for Trans Tech Publications. The best is to read these instructions and follow the outline of this text. This paper presents a solution of private cloud security accessing issues by utilizing callbacks of mobile terminal application through cloud service, as well as an implementation of JNI (Java Native Interface) based on Android system. This solution enables the third party application to access the private cloud service transparently.
- Published
- 2012
33. Challenges of Cloud Computing Evaluation
- Author
-
Peng Shi, Yi Bo Ai, and Li Xin Zhang
- Subjects
Focus (computing) ,Cloud computing security ,Computer science ,business.industry ,media_common.quotation_subject ,Cloud computing ,General Medicine ,Payment ,computer.software_genre ,Data science ,World Wide Web ,Utility computing ,Cloud testing ,Benchmark (computing) ,Web service ,business ,computer ,media_common - Abstract
Cloud computing is one of the hottest topics of IT research and industry because of its easy usage and flexible payment. At present, many researchers and projects focus on improving the efficiency and performance of cloud computing. Few researchers have recognized the importance the evaluation of cloud computing and started to investigate the evaluation methods. This paper first surveys research papers and technology reports about cloud computing evaluation. Then the characteristics and influential factors of cloud computing are analyzed. Some important unsolved issues of cloud computing evaluation are proposed. Finally, this paper gives some advice and points out future open problems of evaluation.
- Published
- 2012
34. Cloudbased Production Optimization - Potential and Limits Today
- Author
-
Roger Feist
- Subjects
0209 industrial biotechnology ,Database ,business.industry ,Computer science ,Big data ,Production optimization ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Cloud computing ,02 engineering and technology ,General Medicine ,NoSQL ,computer.software_genre ,020303 mechanical engineering & transports ,020901 industrial engineering & automation ,0203 mechanical engineering ,Analytics ,Production (economics) ,business ,computer - Abstract
This paper shows how a databased approach towards production optimization was realized with the help of cloud-technologies. Several uncertainties, either in the manufacturing of the producing machines or in the production on these machines can be systematically reduced. In this way a significant improvement in production amount, but also in produced quality can be reached.
- Published
- 2018
35. Introduction to Basic Integration of Measurement Devices with Cloud Computing Services
- Author
-
Tomasz Cieplak and Piotr Muryjas
- Subjects
Cloud computing services ,Computer science ,business.industry ,Cloud computing ,General Medicine ,Computer security ,computer.software_genre ,Web of Things ,Middleware ,Middleware (distributed applications) ,Systems engineering ,Internet of Things ,business ,Communications protocol ,computer - Abstract
This paper presents generic concept of using measuring devices of using cloud-based services as a basic application of the Internet of Things (IoT) model. This type of applications will become a base of future of the Web of Things paradigm. A high level of operational infrastructure is outlined and corresponding technologies are illustrated. To demonstrate the data provision, a cloud-based solution is described along with details of its design and operation. A number of technology, including communication protocols, transportation protocols and middleware are depicted as a basic introduction of implementation of future WoT solutions.
- Published
- 2015
36. Improved OpenID Authorization Registration Process
- Author
-
Yao Chung Chang, Tzay-Farn Shih, Chin-Ling Chen, and De Kui Li
- Subjects
Authentication ,Computer science ,business.industry ,Process (engineering) ,Internet privacy ,Vulnerability ,Authorization ,Cloud computing ,General Medicine ,Computer security ,computer.software_genre ,Identity (object-oriented programming) ,Blind signature ,Confidentiality ,OpenID ,business ,Private information retrieval ,computer - Abstract
Cloud technology has undergone significant and rapid growth in recent years, providing users with ever more Cloud resources. The services offered are based on users’ usage habits, so users come to rely ever more on Cloud applications. OpenID Union proposed an authorization method, allowing the authorized transfer of users’ personal data from one Cloud to another, using personal registration information. However, since providers do not protect users’ private information, attackers can easily intercept and tamper with confidential messages. In this paper, we use the characteristics of the blind signature to support user verification of the registering provider, to protect the user’s identity, and to address known vulnerabilities in the system.
- Published
- 2015
37. Study on Cloud Service Evaluation Index System Based on QoS
- Author
-
Ai Qing Chen and Cong Cheng
- Subjects
Service quality ,Index (economics) ,Database ,Index system ,Computer science ,business.industry ,Quality of service ,Analytic network process ,Cloud computing ,General Medicine ,Mobile QoS ,computer.software_genre ,Computer security ,Field (computer science) ,business ,computer - Abstract
It is extremely urgent to study on the scientific and reasonable evaluation index system in this field when small and medium-sized enterprises start turning to purchase cloud services instead of IT hardware. By making use of analytic network process, based on characteristics of cloud services, referring to common QoS properties in cloud service evaluation, 11 cloud service evaluation indexes are established in this paper and each index is quantified.
- Published
- 2015
38. Research on the Construction of Digital Library Virtual Environment Based on the Cloud Computing Technology
- Author
-
Xing Yan Qian
- Subjects
Cloud computing security ,Computer science ,business.industry ,Information processing ,Cloud computing ,General Medicine ,computer.software_genre ,Digital library ,Virtualization ,World Wide Web ,Utility computing ,Virtual machine ,Cloud testing ,business ,computer - Abstract
With the growth in demand for information processing, considering that cloud computing technology and virtual digital libraries have common goal. In this paper, take the cloud computing as the basis of virtual digital libraries, firstly, research the digital library virtualization under the circumstance of cloud computing; secondly, study digital books Museum of virtualized resources in a cloud computing environment integration and sharing mechanism; finally, creating digital library environment with cloud computing virtualization technology driven.
- Published
- 2015
39. The Application of Cloud Computing in the E-Government Data Management
- Author
-
Fen Fen Wan, Yan Li, and Xiao Qiang Hu
- Subjects
Structure of Management Information ,Government ,Cloud computing security ,Database ,business.industry ,Computer science ,Data management ,Information sharing ,Cloud computing ,General Medicine ,computer.software_genre ,Utility computing ,Risk analysis (engineering) ,Data exchange ,Data efficiency ,business ,computer ,Data virtualization - Abstract
With the thorough development and utilization of electronic government information resources, some phenomena are presented, such as: a large amount of data and data concentration, insufficient sharing of information resources and unsafe data exchange and so on. The construction and operation of traditional e-government data management can't meet those needs. Cloud computing is mainly aimed at intensive work load of mass data. It can allocate resources dynamically and adjust the load. This paper mainly deals with how to use cloud computing model to reduce the cost and risk of information sharing in e-government data management, so as to improve the operational efficiency of e-government data management.
- Published
- 2015
40. Cloud Storage Virtualization Technology and its Architecture
- Author
-
Lu Wang, Xiao Dong Zhang, and Yuan Yuan Hu
- Subjects
Computer science ,business.industry ,EMC Invista ,Cloud computing ,General Medicine ,Storage virtualization ,computer.software_genre ,Virtualization ,Storage area network ,Backup ,Cloud testing ,Converged storage ,Embedded system ,Data_FILES ,Operating system ,business ,Cloud storage ,computer - Abstract
Based on cloud computing and cloud storage, this paper discussed three kinds of typical virtualization technology in cloud computing, that is, storage virtualization based on host or server, storage virtualization based on storage devices, and storage virtualization based on Storage Area Network (SAN). In addition, application value of storage virtualization technology was discussed. What’s more, platform architecture model of cloud storage was proposed, and the characteristics of cloud backup were discussed as an example.
- Published
- 2015
41. A Universal Storage Architecture for Heterogeneous Data of Internet of Things
- Author
-
Yong Lin Leng, Qing Chen Zhang, and Yue Wang
- Subjects
Database ,business.industry ,Computer science ,Distributed computing ,Cloud computing ,General Medicine ,Information repository ,computer.software_genre ,Missing data ,Computer data storage ,Imputation (statistics) ,Data pre-processing ,Data architecture ,Cluster analysis ,business ,computer - Abstract
With the rapid development of the Internet of Things technology, IOT terminal equipments collect a large amount of data. So the preprocessing and storage become a big challenge. In this paper we presents a universal preprocessing and storage architecture for IOT data in cloud environment. In the data preprocessing module, with the sensor equipments are not stable, a large number of mistake, missing data will be produced, so we propose a imputation algorithm based on clustering to perform data preprocessing. For the data storage module, because of the existence of a large number of unstructured and semi-structured data, we present a storage architecture for heterogeneous data in cloud environment. Experiments show that our architecture can effectively complete the data preprocessing and storage, for the subsequent work, such as query data provides good support.
- Published
- 2015
42. A Two-Layer Hybrid Trust Mechanism Based on Agent Trust
- Author
-
Jianwei Ye, Xu Lu Jiao, and Zhi Kai Xu
- Subjects
Cloud computing security ,business.industry ,Computer science ,Data_MISCELLANEOUS ,Cloud computing ,General Medicine ,Computer security ,computer.software_genre ,Shared resource ,Resource (project management) ,Web of trust ,Trust anchor ,The Internet ,Computational trust ,business ,computer - Abstract
Trust is the foundation of all kinds of Internet activity. As a more open resource sharing model, cloud computing environment consists of mass resource owners and users belonged to different control domain. Therefore, the establishment of the trust relationship among the participants and the guarantee of security and efficiency in the computing process are one of the most fundamental problems of cloud computing security. This paper proposes a two-Layer hybrid trust mechanism based on agent trust. In my proposition, trust relationship is relayed and secure computing environment is established among the different participants by the various existing trust methods.
- Published
- 2014
43. Researches on the Virtual Security Issues Based on Xen Cloud Computing Platform
- Author
-
Bo En Jiang
- Subjects
Cloud computing security ,Hardware virtualization ,business.industry ,Computer science ,Full virtualization ,Cloud computing ,General Medicine ,Virtualization ,computer.software_genre ,Computer security ,Service virtualization ,Cloud computing architecture ,Operating system ,business ,computer ,Data virtualization - Abstract
With the development of cloud computing, its security problem gets more and more attention. This article comprehensively analyses many problems about cloud computing and virtualization security, elaborates the research status of virtualization security and puts forward the development direction in the future. This paper first describes cloud computing architecture, and then introduces the virtualization technology, focusing on virtualization security issues and research status, and takes Xen platform for example, introduces the Xen virtualization security issues, finally the future development was prospected.
- Published
- 2014
44. A Teaching Resources Platform Based on Cloud Computing Technology
- Author
-
Jie Yu Li and Bin Wen Huang
- Subjects
Cloud computing security ,Multimedia ,business.industry ,Computer science ,media_common.quotation_subject ,Cloud computing ,General Medicine ,computer.software_genre ,World Wide Web ,Upload ,Resource (project management) ,Utility computing ,Cloud testing ,Public service ,business ,Function (engineering) ,computer ,media_common - Abstract
This paper gives a teaching resources platform that is a comprehensive feature rich, convenient use, strong interactivity based on cloud computing technology. Platform includes various cloud functions and cloud spaces such as identity authentication function, single sign-on function, resources upload/download function, resources collection function, resource integration function, instant communication function, teacher resource cloud space, student resources cloud space, theme resources cloud space, department resources cloud space and schools resources cloud space. Compared with available technology, we can build an no capacity constraints cloud platform for storage and sharing of teaching resources based on the cloud computing technology, this teaching resources cloud platform is an open, interactive public service platform of educational resources.
- Published
- 2014
45. Remote Attestation on Trusted Cloud Computing
- Author
-
Hao Guo and Bo Long Yang
- Subjects
Scheme (programming language) ,Security analysis ,Computer science ,business.industry ,Distributed computing ,Cloud computing ,General Medicine ,Authorization certificate ,Mode (computer interface) ,Ring signature ,Direct Anonymous Attestation ,business ,computer ,Anonymity ,computer.programming_language - Abstract
In the cloud computing mode TCCP, there exist shortcomings of overburdened trusted TC, the anonymity of nodes and configuration information of platform can’t be guaranteed. In this paper, we propose an anonymous scheme based on attribute certificate. The scheme is achieved by the trusted ring signature based on attribute certificate. By the security analysis, the anonymity and platform configuration information of computing nodes is guaranteed. By simulation experiment, we obtain the efficiency of the scheme. Comparing with Boneh ring signature based on ECC algorithm, this scheme has a great superiority in terms of large amount of ring signatures.
- Published
- 2014
46. Research on Security Mechanism of Agricultural Information Platform Based on Cloud Computing
- Author
-
Bo Yang and Li Na Zhang
- Subjects
Cloud computing security ,Computer science ,business.industry ,Information sharing ,Data security ,Cloud computing ,General Medicine ,Information security ,Computer security model ,Computer security ,computer.software_genre ,Virtualization ,Security information and event management ,ComputingMilieux_GENERAL ,Security service ,Information security management ,Network security policy ,business ,computer - Abstract
Cloud computing system uses new technologies such as the models of shared services and virtualization. Therefore, the security issues of cloud computing are also different with other systems. In order to guarantee the security of information sharing and interaction, we need to study the security of agricultural information sharing platform in depth direction. This paper will study the security protection system of agricultural information platform based on Cloud Computing, and the data security strategy and the service security strategy of agricultural information sharing platform.
- Published
- 2014
47. The Support Vector Machine Fault Diagnosis Algorithm Based on Cloud Computing
- Author
-
Si Jia Cheng, Shu Hao Cao, and Chang Hong Zhang
- Subjects
Scheme (programming language) ,Support vector machine ,Scale (ratio) ,Computer science ,business.industry ,Cloud computing ,General Medicine ,Data mining ,computer.software_genre ,business ,Fault (power engineering) ,computer ,computer.programming_language - Abstract
The paper puts forward the way to solve the problem of SVM training on the large scale firstly, Then perform the experiment to verify the feasibility of scheme. In the last section, SVM fault diagnosis method based on the Mapreduce is put forward.
- Published
- 2014
48. Design of Cloud Computing Environment for Online Open Course
- Author
-
Xiao Yong Zhao and Chun Rong Yang
- Subjects
Fabric computing ,Network security ,business.industry ,Computer science ,Distributed computing ,Cloud computing ,General Medicine ,computer.software_genre ,Shared resource ,Grid computing ,Utility computing ,Cloud testing ,End-user computing ,Data-intensive computing ,business ,computer - Abstract
The rise of Massive Open Online Course (MOOC) has enabled open courses to overcome the shortcomings of its traditional mode. Interactions and communications have become important elements in online open courses right now. Cloud computing is a new platform for MOOC development, which is extension of the distribution computing, the parallel computing and the grid computing, settling the problem of various resource sharing. In this paper, the design of cloud computing environments is showed with the cloud computing system structure, network security analysis of cloud computing, and map-reduce program mode, which forms the model of cloud computing environment.
- Published
- 2014
49. Research on Cloud Computing Services in Data Security Issues
- Author
-
Qin Li
- Subjects
Cloud computing security ,Computer science ,business.industry ,Data security ,Services computing ,Cloud computing ,General Medicine ,Computer security ,computer.software_genre ,Utility computing ,Cloud testing ,business ,Cloud storage ,computer - Abstract
This paper describes cloud computing services, analyzes the types of services and cloud computing services corresponding structural model; research focus on cloud computing data security issues were discussed in the service mode.
- Published
- 2014
50. Research on the Distributed Data Mining Cloud Framework Oriented Internet of Things
- Author
-
Hui Juan Lu, Jing Jing Chen, Jie Wu, and Wei Guan
- Subjects
World Wide Web ,Web of Things ,Computer science ,business.industry ,Cloud computing ,General Medicine ,Data mining ,Internet of Things ,business ,computer.software_genre ,computer - Abstract
The rapid development of Internet of Things imposes new requirements on the data mining system, due to the weak capability of traditional distributed networking data mining. To meet the needs of the Internet of Things, this paper proposes a novel distributed data-mining model to realize the seamless access between cloud computing and distributed data mining. The model is based on the cloud computing architecture, which belongs to the type of incredible nodes.
- Published
- 2014
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.