期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
MimicCloudSim:An Environment for Modeling and Simulation of Mimic Cloud Service 被引量:2
1
作者 Liming Pu Jiangxing Wu +2 位作者 Hailong Ma Yuhang Zhu Yingle Li 《China Communications》 SCIE CSCD 2021年第1期212-221,共10页
In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers ha... In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers have studied the Cyber Mimic Defense(CMD)technologies of the cloud services.However,there is a shortage of tools that enable researchers to evaluate their newly proposed cloud service CMD mechanisms,such as scheduling and decision mechanisms.To fill this gap,we propose MimicCloudSim as a mimic cloud service simulation system based on the basic functionalities of CloudSim.MimicCloudSim supports the simulation of dynamic heterogeneous redundancy(DHR)structure which is the core architecture of CMD technology,and provides an extensible interface to help researchers implement new scheduling and decision mechanisms.In this paper,we firstly describes the architecture and implementation of MimicCloudSim,and then discusses the simulation process.Finally,we demonstrate the capabilities of MimicCloudSim by using a decision mechanism.In addition,we tested the performance of MimicCloudSim,the conclusion shows that MimicCloudSim is highly scalable. 展开更多
关键词 cyber mimic defense mimic cloud service SIMULATION dynamic heterogeneous redundancy
在线阅读 下载PDF
Access Control Policy Analysis and Access Denial Method for Cloud Services 被引量:1
2
作者 Chi-Lun Liu 《Journal of Electronic Science and Technology》 CAS 2013年第2期176-180,共5页
Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payme... Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies. 展开更多
关键词 Access control cloud services ONTOLOGY PAYMENT service level agreement.
在线阅读 下载PDF
Design of a Cloud Service for Learning Chinese Pronunciation
3
作者 Hsueh-Ting Chu Wei-Shan Tsai Shao-Yu Lee 《Journal of Electronic Science and Technology》 CAS 2014年第1期54-58,共5页
With the fast growing of cloud computing infrastructure, learning from cloud services has become more and more convenient for people worldwide. In order to integrate the cloud computing technology and different e-lear... With the fast growing of cloud computing infrastructure, learning from cloud services has become more and more convenient for people worldwide. In order to integrate the cloud computing technology and different e-learning platforms including variant mobile apps, Windows and web-based applications, we develop our Chinese learning system "analytic Chinese helper" with a service-oriented architecture (SOA). Based on the new architecture we designed and developed a cloud service for the e-learning of Chinese language on the Internet as a convenient resource for foreign students, especially in the reading of Chinese texts. There are two Chinese phonetic systems: Pinyin and Zhuyin. Pinyin is the official Romanization of Chinese characters, and Zhuyin incorporates additional Bopomofo symbols which transcribe precise sounds of Chinese characters. The proposed analytic Chinese helper provides real-time annotations with Pinyin or Zhuyin symbols, and thereby the annotated articles can be used as e-learning objects in learning Chinese. 展开更多
关键词 Chinese-learning cloud service e-learning PINYIN Zhuyin.
在线阅读 下载PDF
A Cloud Service Model for Multilingual Home-School Communications
4
作者 Hsueh-Ting Chu Hsin-Li Lin Wen-Chien Su 《Journal of Electronic Science and Technology》 CAS 2014年第2期235-239,共5页
In this paper, we present a cloud service model of multilingual home-school communications (MHSC) with the Drupal framework to provide a friendly learning environment for the students from transnational marriages. T... In this paper, we present a cloud service model of multilingual home-school communications (MHSC) with the Drupal framework to provide a friendly learning environment for the students from transnational marriages. The transnational marriage is a phenomenon with ever-increasing in Taiwan and around the world. For a student who has a transnational foreign mother, home-school communication is often an obstacle because the foreign mother has language difficulty understanding the delivered messages in the communication book from teachers. In order to improve parent-teacher communications for the transnational families, we designed and constructed the cloud service platform with online multilingual communications and translation service functions, such that teachers can prepare different sheets of multilingual messages for home-school communication books and foreign mothers can read the messages from the teachers in their native languages through the web interface. 展开更多
关键词 cloud service home-school communication multilingual website transnational marriage
在线阅读 下载PDF
SDN-Based Broadband Network for Cloud Services
5
作者 Xiongyan Tang Pei Zhang Chang Cao 《ZTE Communications》 2014年第2期18-22,共5页
Over-the-top services and cloud services have created great challenges for telecom operators. To better meet the requirements of cloud services, we propose a decoupled network architecture. Software-defined networkin... Over-the-top services and cloud services have created great challenges for telecom operators. To better meet the requirements of cloud services, we propose a decoupled network architecture. Software-defined networking/network function virtualization (SDN/ NFV) will be vital in the construction of cloud-oriented broadband infrastructure, especially within data centers and for intercon nection between data centers. We also propose introducing SDN/NFV in the broadband access network in order to realize a virtu- alized residential gateway (VRG). We discuss the deployment modes of VRG. 展开更多
关键词 SDN NFV cloud services Broadband Network
在线阅读 下载PDF
A Unified Framework of the Cloud Computing Service Model 被引量:2
6
作者 Wen-Lung Shiau Chao-Ming Hsiao 《Journal of Electronic Science and Technology》 CAS 2013年第2期150-160,共11页
After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtuali... After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtualization. This study also compares Microsoft, Trend Micro, and the proposed unified cloud computing architecture to show that the proposed unified framework of the cloud computing service model is comprehensive and appropriate for the current complexities of businesses. The findings of this study can contribute to the knowledge for academics and practitioners to understand, assess, and analyze a cloud computing service application. 展开更多
关键词 cloud computing service model conceptual framework EVOLUTION information system.
在线阅读 下载PDF
An Evolution, Present, and Future Changes of Cloud Computing Services
7
作者 Wen-Lung Shiau 《Journal of Electronic Science and Technology》 CAS CSCD 2015年第1期54-59,共6页
This study presents a clear evolution of computing and its key applications. Cloud computing services evolved from distributed, grid, and utility computing. Critical companies such as Salesforce,Amazon, Google, and Mi... This study presents a clear evolution of computing and its key applications. Cloud computing services evolved from distributed, grid, and utility computing. Critical companies such as Salesforce,Amazon, Google, and Microsoft play important roles in cloud computing. Dramatic changes in the technology environment have created new challenges for current information technologies. This study discusses four significant challenges for cloud computing services,including the next-generation Internet, data synchronization, cloud security, and competitive advantages.And then it also discusses how managers can learn about the future of cloud computing services. 展开更多
关键词 cloud computing service competitive advantage next generation of Internet road map
在线阅读 下载PDF
Enhancing Reliability via Checkpointing in Cloud Computing Systems 被引量:4
8
作者 Ao Zhou Qibo Sun Jinglin Li 《China Communications》 SCIE CSCD 2017年第7期108-117,共10页
Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial.... Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial. Therefore, it is a critical challenge to guarantee the service reliability. Fault-tolerance strategies, such as checkpoint, are commonly employed. Because of the failure of the edge switches, the checkpoint image may become inaccessible. Therefore, current checkpoint-based fault tolerance method cannot achieve the best effect. In this paper, we propose an optimal checkpoint method with edge switch failure-aware. The edge switch failure-aware checkpoint method includes two algorithms. The first algorithm employs the data center topology and communication characteristic for checkpoint image storage server selection. The second algorithm employs the checkpoint image storage characteristic as well as the data center topology to select the recovery server. Simulation experiments are performed to demonstrate the effectiveness of the proposed method. 展开更多
关键词 cloud computing cloud service RELIABILITY fault tolerance data center network
在线阅读 下载PDF
A Novel Hidden Danger Prediction Method in CloudBased Intelligent Industrial Production Management Using Timeliness Managing Extreme Learning Machine
9
作者 Xiong Luo Xiaona Yang +3 位作者 Weiping Wang Xiaohui Chang Xinyan Wang Zhigang Zhao 《China Communications》 SCIE CSCD 2016年第7期74-82,共9页
To prevent possible accidents,the study of data-driven analytics to predict hidden dangers in cloud service-based intelligent industrial production management has been the subject of increasing interest recently.A mac... To prevent possible accidents,the study of data-driven analytics to predict hidden dangers in cloud service-based intelligent industrial production management has been the subject of increasing interest recently.A machine learning algorithm that uses timeliness managing extreme learning machine is utilized in this article to achieve the above prediction.Compared with traditional learning algorithms,extreme learning machine(ELM) exhibits high performance because of its unique feature of a high generalization capability at a fast learning speed.Timeliness managing ELM is proposed by incorporating timeliness management scheme into ELM.When using the timeliness managing ELM scheme to predict hidden dangers,newly incremental data could be added prior to the historical data to maximize the contribution of the newly incremental training data,because the incremental data may be able to contribute reasonable weights to represent the current production situation according to practical analysis of accidents in some industrial productions.Experimental results from a coal mine show that the use of timeliness managing ELM can improve the prediction accuracy of hidden dangers with better stability compared with other similar machine learning methods. 展开更多
关键词 prediction incremental learning extreme learning machine cloud service
在线阅读 下载PDF
SDN Based Security Services
10
作者 ZHANG Yunyong XU Lei TAO Ye 《ZTE Communications》 2018年第4期9-14,共6页
With the development and revolution of network in recent years,the scale and complexity of network have become big issues.Traditional hardware based network security solution has shown some significant disadvantages i... With the development and revolution of network in recent years,the scale and complexity of network have become big issues.Traditional hardware based network security solution has shown some significant disadvantages in cloud computing based Internet data centers(IDC),such as high cost and lack of flexibility.With the implementation of software defined networking(SDN),network security solution could be more flexible and efficient,such as SDN based firewall service and SDN based DDoS-attack mitigation service.Moreover,combined with cloud computing and SDN technology,network security services could be lighter-weighted,more flexible,and on-demanded.This paper analyzes some typical SDN based network security services,and provide a research on SDN based cloud security service(network security service pool)and its implementation in IDCs. 展开更多
关键词 SDN network security cloud security service
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部