In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers ha...In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers have studied the Cyber Mimic Defense(CMD)technologies of the cloud services.However,there is a shortage of tools that enable researchers to evaluate their newly proposed cloud service CMD mechanisms,such as scheduling and decision mechanisms.To fill this gap,we propose MimicCloudSim as a mimic cloud service simulation system based on the basic functionalities of CloudSim.MimicCloudSim supports the simulation of dynamic heterogeneous redundancy(DHR)structure which is the core architecture of CMD technology,and provides an extensible interface to help researchers implement new scheduling and decision mechanisms.In this paper,we firstly describes the architecture and implementation of MimicCloudSim,and then discusses the simulation process.Finally,we demonstrate the capabilities of MimicCloudSim by using a decision mechanism.In addition,we tested the performance of MimicCloudSim,the conclusion shows that MimicCloudSim is highly scalable.展开更多
Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payme...Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies.展开更多
With the fast growing of cloud computing infrastructure, learning from cloud services has become more and more convenient for people worldwide. In order to integrate the cloud computing technology and different e-lear...With the fast growing of cloud computing infrastructure, learning from cloud services has become more and more convenient for people worldwide. In order to integrate the cloud computing technology and different e-learning platforms including variant mobile apps, Windows and web-based applications, we develop our Chinese learning system "analytic Chinese helper" with a service-oriented architecture (SOA). Based on the new architecture we designed and developed a cloud service for the e-learning of Chinese language on the Internet as a convenient resource for foreign students, especially in the reading of Chinese texts. There are two Chinese phonetic systems: Pinyin and Zhuyin. Pinyin is the official Romanization of Chinese characters, and Zhuyin incorporates additional Bopomofo symbols which transcribe precise sounds of Chinese characters. The proposed analytic Chinese helper provides real-time annotations with Pinyin or Zhuyin symbols, and thereby the annotated articles can be used as e-learning objects in learning Chinese.展开更多
In this paper, we present a cloud service model of multilingual home-school communications (MHSC) with the Drupal framework to provide a friendly learning environment for the students from transnational marriages. T...In this paper, we present a cloud service model of multilingual home-school communications (MHSC) with the Drupal framework to provide a friendly learning environment for the students from transnational marriages. The transnational marriage is a phenomenon with ever-increasing in Taiwan and around the world. For a student who has a transnational foreign mother, home-school communication is often an obstacle because the foreign mother has language difficulty understanding the delivered messages in the communication book from teachers. In order to improve parent-teacher communications for the transnational families, we designed and constructed the cloud service platform with online multilingual communications and translation service functions, such that teachers can prepare different sheets of multilingual messages for home-school communication books and foreign mothers can read the messages from the teachers in their native languages through the web interface.展开更多
Over-the-top services and cloud services have created great challenges for telecom operators. To better meet the requirements of cloud services, we propose a decoupled network architecture. Software-defined networkin...Over-the-top services and cloud services have created great challenges for telecom operators. To better meet the requirements of cloud services, we propose a decoupled network architecture. Software-defined networking/network function virtualization (SDN/ NFV) will be vital in the construction of cloud-oriented broadband infrastructure, especially within data centers and for intercon nection between data centers. We also propose introducing SDN/NFV in the broadband access network in order to realize a virtu- alized residential gateway (VRG). We discuss the deployment modes of VRG.展开更多
After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtuali...After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtualization. This study also compares Microsoft, Trend Micro, and the proposed unified cloud computing architecture to show that the proposed unified framework of the cloud computing service model is comprehensive and appropriate for the current complexities of businesses. The findings of this study can contribute to the knowledge for academics and practitioners to understand, assess, and analyze a cloud computing service application.展开更多
This study presents a clear evolution of computing and its key applications. Cloud computing services evolved from distributed, grid, and utility computing. Critical companies such as Salesforce,Amazon, Google, and Mi...This study presents a clear evolution of computing and its key applications. Cloud computing services evolved from distributed, grid, and utility computing. Critical companies such as Salesforce,Amazon, Google, and Microsoft play important roles in cloud computing. Dramatic changes in the technology environment have created new challenges for current information technologies. This study discusses four significant challenges for cloud computing services,including the next-generation Internet, data synchronization, cloud security, and competitive advantages.And then it also discusses how managers can learn about the future of cloud computing services.展开更多
Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial....Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial. Therefore, it is a critical challenge to guarantee the service reliability. Fault-tolerance strategies, such as checkpoint, are commonly employed. Because of the failure of the edge switches, the checkpoint image may become inaccessible. Therefore, current checkpoint-based fault tolerance method cannot achieve the best effect. In this paper, we propose an optimal checkpoint method with edge switch failure-aware. The edge switch failure-aware checkpoint method includes two algorithms. The first algorithm employs the data center topology and communication characteristic for checkpoint image storage server selection. The second algorithm employs the checkpoint image storage characteristic as well as the data center topology to select the recovery server. Simulation experiments are performed to demonstrate the effectiveness of the proposed method.展开更多
To prevent possible accidents,the study of data-driven analytics to predict hidden dangers in cloud service-based intelligent industrial production management has been the subject of increasing interest recently.A mac...To prevent possible accidents,the study of data-driven analytics to predict hidden dangers in cloud service-based intelligent industrial production management has been the subject of increasing interest recently.A machine learning algorithm that uses timeliness managing extreme learning machine is utilized in this article to achieve the above prediction.Compared with traditional learning algorithms,extreme learning machine(ELM) exhibits high performance because of its unique feature of a high generalization capability at a fast learning speed.Timeliness managing ELM is proposed by incorporating timeliness management scheme into ELM.When using the timeliness managing ELM scheme to predict hidden dangers,newly incremental data could be added prior to the historical data to maximize the contribution of the newly incremental training data,because the incremental data may be able to contribute reasonable weights to represent the current production situation according to practical analysis of accidents in some industrial productions.Experimental results from a coal mine show that the use of timeliness managing ELM can improve the prediction accuracy of hidden dangers with better stability compared with other similar machine learning methods.展开更多
With the development and revolution of network in recent years,the scale and complexity of network have become big issues.Traditional hardware based network security solution has shown some significant disadvantages i...With the development and revolution of network in recent years,the scale and complexity of network have become big issues.Traditional hardware based network security solution has shown some significant disadvantages in cloud computing based Internet data centers(IDC),such as high cost and lack of flexibility.With the implementation of software defined networking(SDN),network security solution could be more flexible and efficient,such as SDN based firewall service and SDN based DDoS-attack mitigation service.Moreover,combined with cloud computing and SDN technology,network security services could be lighter-weighted,more flexible,and on-demanded.This paper analyzes some typical SDN based network security services,and provide a research on SDN based cloud security service(network security service pool)and its implementation in IDCs.展开更多
基金This work was supported by the National Science and Technology Major Project of China(No.2018ZX03002002)the Foundation for Innovative Research Groups of the National Natural Science Foundation of China(No.61521003).
文摘In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers have studied the Cyber Mimic Defense(CMD)technologies of the cloud services.However,there is a shortage of tools that enable researchers to evaluate their newly proposed cloud service CMD mechanisms,such as scheduling and decision mechanisms.To fill this gap,we propose MimicCloudSim as a mimic cloud service simulation system based on the basic functionalities of CloudSim.MimicCloudSim supports the simulation of dynamic heterogeneous redundancy(DHR)structure which is the core architecture of CMD technology,and provides an extensible interface to help researchers implement new scheduling and decision mechanisms.In this paper,we firstly describes the architecture and implementation of MimicCloudSim,and then discusses the simulation process.Finally,we demonstrate the capabilities of MimicCloudSim by using a decision mechanism.In addition,we tested the performance of MimicCloudSim,the conclusion shows that MimicCloudSim is highly scalable.
文摘Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies.
基金supports from the Department of Computer Science and Information Engineering, Asia University
文摘With the fast growing of cloud computing infrastructure, learning from cloud services has become more and more convenient for people worldwide. In order to integrate the cloud computing technology and different e-learning platforms including variant mobile apps, Windows and web-based applications, we develop our Chinese learning system "analytic Chinese helper" with a service-oriented architecture (SOA). Based on the new architecture we designed and developed a cloud service for the e-learning of Chinese language on the Internet as a convenient resource for foreign students, especially in the reading of Chinese texts. There are two Chinese phonetic systems: Pinyin and Zhuyin. Pinyin is the official Romanization of Chinese characters, and Zhuyin incorporates additional Bopomofo symbols which transcribe precise sounds of Chinese characters. The proposed analytic Chinese helper provides real-time annotations with Pinyin or Zhuyin symbols, and thereby the annotated articles can be used as e-learning objects in learning Chinese.
基金supports from the Department of Computer Science and Information Engineering, Asia University
文摘In this paper, we present a cloud service model of multilingual home-school communications (MHSC) with the Drupal framework to provide a friendly learning environment for the students from transnational marriages. The transnational marriage is a phenomenon with ever-increasing in Taiwan and around the world. For a student who has a transnational foreign mother, home-school communication is often an obstacle because the foreign mother has language difficulty understanding the delivered messages in the communication book from teachers. In order to improve parent-teacher communications for the transnational families, we designed and constructed the cloud service platform with online multilingual communications and translation service functions, such that teachers can prepare different sheets of multilingual messages for home-school communication books and foreign mothers can read the messages from the teachers in their native languages through the web interface.
文摘Over-the-top services and cloud services have created great challenges for telecom operators. To better meet the requirements of cloud services, we propose a decoupled network architecture. Software-defined networking/network function virtualization (SDN/ NFV) will be vital in the construction of cloud-oriented broadband infrastructure, especially within data centers and for intercon nection between data centers. We also propose introducing SDN/NFV in the broadband access network in order to realize a virtu- alized residential gateway (VRG). We discuss the deployment modes of VRG.
文摘After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtualization. This study also compares Microsoft, Trend Micro, and the proposed unified cloud computing architecture to show that the proposed unified framework of the cloud computing service model is comprehensive and appropriate for the current complexities of businesses. The findings of this study can contribute to the knowledge for academics and practitioners to understand, assess, and analyze a cloud computing service application.
基金supported by the NSC under Grant No.102-2410-H-130-038
文摘This study presents a clear evolution of computing and its key applications. Cloud computing services evolved from distributed, grid, and utility computing. Critical companies such as Salesforce,Amazon, Google, and Microsoft play important roles in cloud computing. Dramatic changes in the technology environment have created new challenges for current information technologies. This study discusses four significant challenges for cloud computing services,including the next-generation Internet, data synchronization, cloud security, and competitive advantages.And then it also discusses how managers can learn about the future of cloud computing services.
基金supported by Beijing Natural Science Foundation (4174100)NSFC(61602054)the Fundamental Research Funds for the Central Universities
文摘Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial. Therefore, it is a critical challenge to guarantee the service reliability. Fault-tolerance strategies, such as checkpoint, are commonly employed. Because of the failure of the edge switches, the checkpoint image may become inaccessible. Therefore, current checkpoint-based fault tolerance method cannot achieve the best effect. In this paper, we propose an optimal checkpoint method with edge switch failure-aware. The edge switch failure-aware checkpoint method includes two algorithms. The first algorithm employs the data center topology and communication characteristic for checkpoint image storage server selection. The second algorithm employs the checkpoint image storage characteristic as well as the data center topology to select the recovery server. Simulation experiments are performed to demonstrate the effectiveness of the proposed method.
基金partially supported by the National Key Technologies R&D Program of China under Grant No.2015BAK38B01the National Natural Science Foundation of China under Grant Nos.61174103 and 61272357the Fundamental Research Funds for the Central Universities under Grant No.06500025
文摘To prevent possible accidents,the study of data-driven analytics to predict hidden dangers in cloud service-based intelligent industrial production management has been the subject of increasing interest recently.A machine learning algorithm that uses timeliness managing extreme learning machine is utilized in this article to achieve the above prediction.Compared with traditional learning algorithms,extreme learning machine(ELM) exhibits high performance because of its unique feature of a high generalization capability at a fast learning speed.Timeliness managing ELM is proposed by incorporating timeliness management scheme into ELM.When using the timeliness managing ELM scheme to predict hidden dangers,newly incremental data could be added prior to the historical data to maximize the contribution of the newly incremental training data,because the incremental data may be able to contribute reasonable weights to represent the current production situation according to practical analysis of accidents in some industrial productions.Experimental results from a coal mine show that the use of timeliness managing ELM can improve the prediction accuracy of hidden dangers with better stability compared with other similar machine learning methods.
文摘With the development and revolution of network in recent years,the scale and complexity of network have become big issues.Traditional hardware based network security solution has shown some significant disadvantages in cloud computing based Internet data centers(IDC),such as high cost and lack of flexibility.With the implementation of software defined networking(SDN),network security solution could be more flexible and efficient,such as SDN based firewall service and SDN based DDoS-attack mitigation service.Moreover,combined with cloud computing and SDN technology,network security services could be lighter-weighted,more flexible,and on-demanded.This paper analyzes some typical SDN based network security services,and provide a research on SDN based cloud security service(network security service pool)and its implementation in IDCs.