Based on the features of marine environmental data and processing requirements, a cloud computing archi- tecture of marine environment information is proposed, which provides a new cloud technology framework for the i...Based on the features of marine environmental data and processing requirements, a cloud computing archi- tecture of marine environment information is proposed, which provides a new cloud technology framework for the integration and sharing of marine environmental information resources. A physical layer, software platform layer and an application layer are illustrated systematically, at the same time, a corresponding solu- tions for many difficult technical problems such as parallel query processing of multi-dimensional, spatio- temporal information, data slice storage, software service flow customization, analysis, reorganization and so on. A prototype system is developed and many different data-size experiments and a comparative analy- sis are done based on it. The experiment results show that the cloud platform based on this framework can achieve high performance and scalability when dealing with large-scale marine data.展开更多
Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces m...Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion.展开更多
This paper discussed the differences of context-aware service between the cloud computing environment and the traditional service system.Given the above differences,the paper subsequently analyzed the changes of conte...This paper discussed the differences of context-aware service between the cloud computing environment and the traditional service system.Given the above differences,the paper subsequently analyzed the changes of context-aware service during preparation,organization and delivery,as well as the resulting changes in service acceptance of consumers.Because of these changes,the context-aware service modes in the cloud computing environment change are intelligent,immersive,highly interactive,and real-time.According to active and responded service,and authorization and non-authorized service,the paper drew a case diagram of context-aware service in Unified Modeling Language(UML) and established four categories of context-aware service modes.展开更多
After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtuali...After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtualization. This study also compares Microsoft, Trend Micro, and the proposed unified cloud computing architecture to show that the proposed unified framework of the cloud computing service model is comprehensive and appropriate for the current complexities of businesses. The findings of this study can contribute to the knowledge for academics and practitioners to understand, assess, and analyze a cloud computing service application.展开更多
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloudbased technologies,such as the Internet of Things.With increasing industr...Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloudbased technologies,such as the Internet of Things.With increasing industry adoption and migration of traditional computing services to the cloud,one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies.This work proposes a Data Security Framework for cloud computing services(CCS)that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS.This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation.The paper presents the design details of the framework,which consists of three stages:identification of data security requirements,management of data security risks and evaluation of data security performance in CCS.展开更多
Cloud computing is becoming a hot topic of the information industry in recent years. Many companies provide the cloud services, such as Google Apps and Apple multimedia services. In general, by applying the virtulizat...Cloud computing is becoming a hot topic of the information industry in recent years. Many companies provide the cloud services, such as Google Apps and Apple multimedia services. In general, by applying the virtulization technologies, the data center is built for cloud computing to provide users with the eomputing and storage resources, as well as the software environment. Thus, the quality of service (QoS) must be considered to satisfy users' requirements. This paper proposes a high efficiency scheduling scheme for supporting cloud computing. The virtual machine migration technique has been applied to the proposed scheduling scheme for improving the resources utilization and satisfying the QoS requirement of users. The experimental results show that in addition to satisfying the QoS requirement of users, the proposed scheme can improve the resources utilization effectively.展开更多
Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers...Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers, the main characteristics of cloud computing is being dynamic, high power in computing and storage. Also cloud computing is a cost benefit and effective way for representation of web-based spatial data and complex analysis. Furthermore, cloud computing is a way to facilitate distributed computing and store different data. One of the main features of cloud computing is ability in powerful computing and dynamic storage with an affordable expense and secure web. In this paper we further investigate the methodologies, services, issues and deployed techniques also, about situation of cloud computing in the past, present and future is probed and some issues concerning the security is expressed. Undoubtedly cloud computing is vital for spatial data infrastructure and consequently the cloud computing is able to expand the interactions for spatial data infrastructure in the future.展开更多
Cloud computing is high technology, which fulfills needs of common as well as enterprise level to meet their information and communication technology requirements and so on. Cloud computing extends existing informatio...Cloud computing is high technology, which fulfills needs of common as well as enterprise level to meet their information and communication technology requirements and so on. Cloud computing extends existing information technology capabilities and requirements. Many technologies are being merged with cloud computing, same as that orchestrations can boost cloud service provisioning process. The usage of orchestrations can play vital role to provision cloud services. Cloud service providers can create scalable cloud services at low cost by organizing cloud infrastructure by using cloud orchestrations. Dynamic orchestration flows can generate required cloud computing services to meet service level agreements and quality of services. There is a need to understand issues and barriers involved to integrate cloud orchestrations with cloud service provisioning process. There is also need to understand business related problems bordering cloud computing technology. There is much capacity to do targeted research work for cloud orchestrations and its integration with service level agreements as well as with SLI (service level integration) layer. In this article we have elaborated detailed analysis and identified a number of issues that will affect the cloud service users as well as cloud service providers and cloud service provisioning system. We are defining an approach to orchestrate cloud infrastructure by using orchestration flows, to generate cloud services in order to meet service level agreements and quality of standard.展开更多
Big Data applications are pervading more and more aspects of our life, encompassing commercial and scientific uses at increasing rates as we move towards exascale analytics. Examples of Big Data applications include s...Big Data applications are pervading more and more aspects of our life, encompassing commercial and scientific uses at increasing rates as we move towards exascale analytics. Examples of Big Data applications include storing and accessing user data in commercial clouds, mining of social data, and analysis of large-scale simulations and experiments such as the Large Hadron Collider. An increasing number of such data—intensive applications and services are relying on clouds in order to process and manage the enormous amounts of data required for continuous operation. It can be difficult to decide which of the many options for cloud processing is suitable for a given application;the aim of this paper is therefore to provide an interested user with an overview of the most important concepts of cloud computing as it relates to processing of Big Data.展开更多
Enhancements in technology always follow Consumer requirements. Consumer requires best of service with least possible mismatch and on time. Numerous applications available today are based on Web Services and Cloud Com...Enhancements in technology always follow Consumer requirements. Consumer requires best of service with least possible mismatch and on time. Numerous applications available today are based on Web Services and Cloud Computing. Recently, there exist many Web Services with similar functional characteristics. Choosing “a-right” Service from group of similar Web Service is a complicated task for Service Consumer. In that case, Service Consumer can discover the required Web Service using non functional attributes of the Web Services such as QoS. Proposed layered architecture and Web Service-Cloud, i.e. WS-Cloud computing Framework synthesizes the non functional attributes that includes reliability, availability, response time, latency etc. The Service Consumer is projected to provide the QoS requirements as part of Service discovery query. This framework will discover and filter the Web Services form the cloud and rank them according to Service Consumer preferences to facilitate Service on time.展开更多
Data pre-deployment in the HDFS (Hadoop distributed file systems) is more complicated than that in traditional file systems. There are many key issues need to be addressed, such as determining the target location of...Data pre-deployment in the HDFS (Hadoop distributed file systems) is more complicated than that in traditional file systems. There are many key issues need to be addressed, such as determining the target location of the data prefetching, the amount of data to be prefetched, the balance between data prefetching services and normal data accesses. Aiming to solve these problems, we employ the characteristics of digital ocean information service flows and propose a deployment scheme which combines input data prefetching with output data oriented storage strategies. The method achieves the parallelism of data preparation and data processing, thereby massively reducing I/O time cost of digital ocean cloud computing platforms when processing multi-source information synergistic tasks. The experimental results show that the scheme has a higher degree of parallelism than traditional Hadoop mechanisms, shortens the waiting time of a running service node, and significantly reduces data access conflicts.展开更多
This study presents a clear evolution of computing and its key applications. Cloud computing services evolved from distributed, grid, and utility computing. Critical companies such as Salesforce,Amazon, Google, and Mi...This study presents a clear evolution of computing and its key applications. Cloud computing services evolved from distributed, grid, and utility computing. Critical companies such as Salesforce,Amazon, Google, and Microsoft play important roles in cloud computing. Dramatic changes in the technology environment have created new challenges for current information technologies. This study discusses four significant challenges for cloud computing services,including the next-generation Internet, data synchronization, cloud security, and competitive advantages.And then it also discusses how managers can learn about the future of cloud computing services.展开更多
It is argued in this article to shed light on service supply chain issues associated with cloud computing by examining several interrelated questions:service supply chain architecture from service perspective;basic cl...It is argued in this article to shed light on service supply chain issues associated with cloud computing by examining several interrelated questions:service supply chain architecture from service perspective;basic clouds of service supply chain and development of managerial insights into these clouds.In particular,to demonstrate how those services can be utilized and the processes involved in their utilization,a hypothetical meta-modeling service of cloud computing can be given.Moreover,the paper defines the architecture of cloud managed for SV or ISP in infrastructure of cloud computing in service supply chain:IT services,business services,business processes,which creates atomic and composite software services that are used to perform business processes with business service choreographies.展开更多
Cloud computing provides a new paradigm for hardware and software infrastructure design as well as planning and usage of information systems. It offers flexible, efficient, inexpensive, and quality services. This pape...Cloud computing provides a new paradigm for hardware and software infrastructure design as well as planning and usage of information systems. It offers flexible, efficient, inexpensive, and quality services. This paper proposes an on-demand service system using the cloud computing architecture and analyzes important issues such as organization, management, and monitoring of distributed service resources; context-aware on-demand service modeling, on-demand automated service composition in large-scale networks, and service system analysis based on complex system theory. Continuous Operating Reference Station (CORS) of a geo-spatial information system is taken as an example, and its architecture is analyzed from the perspective of cloud computing. Some fundamental questions are raised about its service.展开更多
Developments in service oriented architecture (SOA) have taken us near to the once fictional dream of forming and running an online business, such commercial activity in which most or all of its commercial roles are o...Developments in service oriented architecture (SOA) have taken us near to the once fictional dream of forming and running an online business, such commercial activity in which most or all of its commercial roles are outsourced to online services. The novel concept of cloud computing gives a understanding of SOA in which Information Technology assets are provided as services that are extra flexible, inexpensive and striking to commercial activities. In this paper, we concisely study developments in concept of cloud computing, and debate the advantages of using cloud services for commercial activities and trade-offs that they have to consider. Further we presented a layered architecture for online business, and then we presented a conceptual architecture for complete online business working atmosphere. Moreover, we discuss the prospects and research experiments that are ahead of us in realizing the technical components of this conceptual architecture. We conclude by giving the outlook and impact of cloud services on both large and small businesses.展开更多
At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model ...At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method.展开更多
Despite the rapid advances in mobile technology, many constraints still prevent mobile devices from running resource-demanding applications in mobile environments. Cloud computing with flexibility, stability and scala...Despite the rapid advances in mobile technology, many constraints still prevent mobile devices from running resource-demanding applications in mobile environments. Cloud computing with flexibility, stability and scalability enables access to unlimited resources for mobile devices, so more studies have focused on cloud computingbased mobile services. Due to the stability of wireless networks, changes of Quality of Service (QoS) level and user' real-time preferences, it is becoming challenging to determine how to adaptively choose the "appropriate" service in mobile cloud computing environments. In this paper, we present an adaptive service selection method. This method first extracts user preferences from a service's evaluation and calculates the similarity of the service with the weighted Euclidean distance. Then, they are combined with user context data and the most suitable service is recommended to the user. In addition, we apply the fuzzy cognitive imps-based model to the adaptive policy, which improves the efficiency and performance of the algorithm. Finally, the experiment and simulation demonstrate that our approach is effective.展开更多
The advantages of a cloud computing service are cost advantages,availability,scalability,flexibility,reduced time to market,and dynamic access to computing resources.Enterprises can improve the successful adoption rate...The advantages of a cloud computing service are cost advantages,availability,scalability,flexibility,reduced time to market,and dynamic access to computing resources.Enterprises can improve the successful adoption rate of cloud computing services if they understand the critical factors.Tofind critical factors,this studyfirst reviewed the literature and established a three-layer hierarch-ical factor table for adopting a cloud computing service based on the Technology-Organization-Environment framework.Then,a hybrid method that combines two multi-criteria decision-making tools—called the Fuzzy Analytic Network Process method and the concept of VlseKriterijumska Optimizacija I Kompromisno Resenje acceptable advantage—was used to objectively identify critical factors for the adop-tion of a cloud computing service,replacing the subjective decision of the authors.The results of this study determinedfive critical factors,namely data access secur-ity,information transmission security,senior management support,fallback cloud management,and employee acceptance.Finally,the paper presents thefindings and implications of the study.展开更多
基金the Ocean Public Welfare Scientific Research Project of State Oceanic Administration of China under contract No.201105033
文摘Based on the features of marine environmental data and processing requirements, a cloud computing archi- tecture of marine environment information is proposed, which provides a new cloud technology framework for the integration and sharing of marine environmental information resources. A physical layer, software platform layer and an application layer are illustrated systematically, at the same time, a corresponding solu- tions for many difficult technical problems such as parallel query processing of multi-dimensional, spatio- temporal information, data slice storage, software service flow customization, analysis, reorganization and so on. A prototype system is developed and many different data-size experiments and a comparative analy- sis are done based on it. The experiment results show that the cloud platform based on this framework can achieve high performance and scalability when dealing with large-scale marine data.
基金supported by National Information Security Program under Grant No.2009A112
文摘Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion.
基金the National Key Basic Research Program of China,the National Natural Science Foundation of China,the Ministry of Education of the People's Republic of China,the Fundamental Research Funds for the Central Universities of China
文摘This paper discussed the differences of context-aware service between the cloud computing environment and the traditional service system.Given the above differences,the paper subsequently analyzed the changes of context-aware service during preparation,organization and delivery,as well as the resulting changes in service acceptance of consumers.Because of these changes,the context-aware service modes in the cloud computing environment change are intelligent,immersive,highly interactive,and real-time.According to active and responded service,and authorization and non-authorized service,the paper drew a case diagram of context-aware service in Unified Modeling Language(UML) and established four categories of context-aware service modes.
文摘After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtualization. This study also compares Microsoft, Trend Micro, and the proposed unified cloud computing architecture to show that the proposed unified framework of the cloud computing service model is comprehensive and appropriate for the current complexities of businesses. The findings of this study can contribute to the knowledge for academics and practitioners to understand, assess, and analyze a cloud computing service application.
文摘Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloudbased technologies,such as the Internet of Things.With increasing industry adoption and migration of traditional computing services to the cloud,one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies.This work proposes a Data Security Framework for cloud computing services(CCS)that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS.This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation.The paper presents the design details of the framework,which consists of three stages:identification of data security requirements,management of data security risks and evaluation of data security performance in CCS.
文摘Cloud computing is becoming a hot topic of the information industry in recent years. Many companies provide the cloud services, such as Google Apps and Apple multimedia services. In general, by applying the virtulization technologies, the data center is built for cloud computing to provide users with the eomputing and storage resources, as well as the software environment. Thus, the quality of service (QoS) must be considered to satisfy users' requirements. This paper proposes a high efficiency scheduling scheme for supporting cloud computing. The virtual machine migration technique has been applied to the proposed scheduling scheme for improving the resources utilization and satisfying the QoS requirement of users. The experimental results show that in addition to satisfying the QoS requirement of users, the proposed scheme can improve the resources utilization effectively.
文摘Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers, the main characteristics of cloud computing is being dynamic, high power in computing and storage. Also cloud computing is a cost benefit and effective way for representation of web-based spatial data and complex analysis. Furthermore, cloud computing is a way to facilitate distributed computing and store different data. One of the main features of cloud computing is ability in powerful computing and dynamic storage with an affordable expense and secure web. In this paper we further investigate the methodologies, services, issues and deployed techniques also, about situation of cloud computing in the past, present and future is probed and some issues concerning the security is expressed. Undoubtedly cloud computing is vital for spatial data infrastructure and consequently the cloud computing is able to expand the interactions for spatial data infrastructure in the future.
文摘Cloud computing is high technology, which fulfills needs of common as well as enterprise level to meet their information and communication technology requirements and so on. Cloud computing extends existing information technology capabilities and requirements. Many technologies are being merged with cloud computing, same as that orchestrations can boost cloud service provisioning process. The usage of orchestrations can play vital role to provision cloud services. Cloud service providers can create scalable cloud services at low cost by organizing cloud infrastructure by using cloud orchestrations. Dynamic orchestration flows can generate required cloud computing services to meet service level agreements and quality of services. There is a need to understand issues and barriers involved to integrate cloud orchestrations with cloud service provisioning process. There is also need to understand business related problems bordering cloud computing technology. There is much capacity to do targeted research work for cloud orchestrations and its integration with service level agreements as well as with SLI (service level integration) layer. In this article we have elaborated detailed analysis and identified a number of issues that will affect the cloud service users as well as cloud service providers and cloud service provisioning system. We are defining an approach to orchestrate cloud infrastructure by using orchestration flows, to generate cloud services in order to meet service level agreements and quality of standard.
文摘Big Data applications are pervading more and more aspects of our life, encompassing commercial and scientific uses at increasing rates as we move towards exascale analytics. Examples of Big Data applications include storing and accessing user data in commercial clouds, mining of social data, and analysis of large-scale simulations and experiments such as the Large Hadron Collider. An increasing number of such data—intensive applications and services are relying on clouds in order to process and manage the enormous amounts of data required for continuous operation. It can be difficult to decide which of the many options for cloud processing is suitable for a given application;the aim of this paper is therefore to provide an interested user with an overview of the most important concepts of cloud computing as it relates to processing of Big Data.
文摘Enhancements in technology always follow Consumer requirements. Consumer requires best of service with least possible mismatch and on time. Numerous applications available today are based on Web Services and Cloud Computing. Recently, there exist many Web Services with similar functional characteristics. Choosing “a-right” Service from group of similar Web Service is a complicated task for Service Consumer. In that case, Service Consumer can discover the required Web Service using non functional attributes of the Web Services such as QoS. Proposed layered architecture and Web Service-Cloud, i.e. WS-Cloud computing Framework synthesizes the non functional attributes that includes reliability, availability, response time, latency etc. The Service Consumer is projected to provide the QoS requirements as part of Service discovery query. This framework will discover and filter the Web Services form the cloud and rank them according to Service Consumer preferences to facilitate Service on time.
基金The Ocean Public Welfare Scientific Research Project of State Oceanic Administration of China under contract No.20110533
文摘Data pre-deployment in the HDFS (Hadoop distributed file systems) is more complicated than that in traditional file systems. There are many key issues need to be addressed, such as determining the target location of the data prefetching, the amount of data to be prefetched, the balance between data prefetching services and normal data accesses. Aiming to solve these problems, we employ the characteristics of digital ocean information service flows and propose a deployment scheme which combines input data prefetching with output data oriented storage strategies. The method achieves the parallelism of data preparation and data processing, thereby massively reducing I/O time cost of digital ocean cloud computing platforms when processing multi-source information synergistic tasks. The experimental results show that the scheme has a higher degree of parallelism than traditional Hadoop mechanisms, shortens the waiting time of a running service node, and significantly reduces data access conflicts.
基金supported by the NSC under Grant No.102-2410-H-130-038
文摘This study presents a clear evolution of computing and its key applications. Cloud computing services evolved from distributed, grid, and utility computing. Critical companies such as Salesforce,Amazon, Google, and Microsoft play important roles in cloud computing. Dramatic changes in the technology environment have created new challenges for current information technologies. This study discusses four significant challenges for cloud computing services,including the next-generation Internet, data synchronization, cloud security, and competitive advantages.And then it also discusses how managers can learn about the future of cloud computing services.
基金funded by the National NaturalScience Foundation of China(No.70631003,No.70801024)
文摘It is argued in this article to shed light on service supply chain issues associated with cloud computing by examining several interrelated questions:service supply chain architecture from service perspective;basic clouds of service supply chain and development of managerial insights into these clouds.In particular,to demonstrate how those services can be utilized and the processes involved in their utilization,a hypothetical meta-modeling service of cloud computing can be given.Moreover,the paper defines the architecture of cloud managed for SV or ISP in infrastructure of cloud computing in service supply chain:IT services,business services,business processes,which creates atomic and composite software services that are used to perform business processes with business service choreographies.
基金funded by the National Basic Research Program of China ("973" Program) under Grant No. 2007CB310805the National High Technology Research and Development Program of China ("863" Program) under Grant No. 2007AA12Z309
文摘Cloud computing provides a new paradigm for hardware and software infrastructure design as well as planning and usage of information systems. It offers flexible, efficient, inexpensive, and quality services. This paper proposes an on-demand service system using the cloud computing architecture and analyzes important issues such as organization, management, and monitoring of distributed service resources; context-aware on-demand service modeling, on-demand automated service composition in large-scale networks, and service system analysis based on complex system theory. Continuous Operating Reference Station (CORS) of a geo-spatial information system is taken as an example, and its architecture is analyzed from the perspective of cloud computing. Some fundamental questions are raised about its service.
文摘Developments in service oriented architecture (SOA) have taken us near to the once fictional dream of forming and running an online business, such commercial activity in which most or all of its commercial roles are outsourced to online services. The novel concept of cloud computing gives a understanding of SOA in which Information Technology assets are provided as services that are extra flexible, inexpensive and striking to commercial activities. In this paper, we concisely study developments in concept of cloud computing, and debate the advantages of using cloud services for commercial activities and trade-offs that they have to consider. Further we presented a layered architecture for online business, and then we presented a conceptual architecture for complete online business working atmosphere. Moreover, we discuss the prospects and research experiments that are ahead of us in realizing the technical components of this conceptual architecture. We conclude by giving the outlook and impact of cloud services on both large and small businesses.
基金National Natural Science Foundation of China(No.61462070)the"ChunHui Plan"Project of Educational Department,China(No.Z2009-1-01062)the Research of Evaluation Technology of Security and Reliability of Cloud Computing and the Built of Testing Platform That is a Technology Plan Project of Inner Mongolia,China
文摘At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method.
基金the third level of 2011 Zhejiang Province 151 Talent Project and National Natural Science Foundation of China under Grant No.61100043
文摘Despite the rapid advances in mobile technology, many constraints still prevent mobile devices from running resource-demanding applications in mobile environments. Cloud computing with flexibility, stability and scalability enables access to unlimited resources for mobile devices, so more studies have focused on cloud computingbased mobile services. Due to the stability of wireless networks, changes of Quality of Service (QoS) level and user' real-time preferences, it is becoming challenging to determine how to adaptively choose the "appropriate" service in mobile cloud computing environments. In this paper, we present an adaptive service selection method. This method first extracts user preferences from a service's evaluation and calculates the similarity of the service with the weighted Euclidean distance. Then, they are combined with user context data and the most suitable service is recommended to the user. In addition, we apply the fuzzy cognitive imps-based model to the adaptive policy, which improves the efficiency and performance of the algorithm. Finally, the experiment and simulation demonstrate that our approach is effective.
基金supported by the Ministry of Science and Technology(MOST),Taiwan,R.O.C.(104-2410-H-327-024-).
文摘The advantages of a cloud computing service are cost advantages,availability,scalability,flexibility,reduced time to market,and dynamic access to computing resources.Enterprises can improve the successful adoption rate of cloud computing services if they understand the critical factors.Tofind critical factors,this studyfirst reviewed the literature and established a three-layer hierarch-ical factor table for adopting a cloud computing service based on the Technology-Organization-Environment framework.Then,a hybrid method that combines two multi-criteria decision-making tools—called the Fuzzy Analytic Network Process method and the concept of VlseKriterijumska Optimizacija I Kompromisno Resenje acceptable advantage—was used to objectively identify critical factors for the adop-tion of a cloud computing service,replacing the subjective decision of the authors.The results of this study determinedfive critical factors,namely data access secur-ity,information transmission security,senior management support,fallback cloud management,and employee acceptance.Finally,the paper presents thefindings and implications of the study.