In this study,we developed a real-time connected vehicle(CV)speed advisory application that uses public cloud services,and tested it on a simulated signalized corridor for different roadway traffic conditions.First,we...In this study,we developed a real-time connected vehicle(CV)speed advisory application that uses public cloud services,and tested it on a simulated signalized corridor for different roadway traffic conditions.First,we developed a scalable serverless cloud computing architecture leveraging public cloud services offered by Amazon Web Services(AWS)to support the requirements of a real-time CV application.Second,we developed an optimization-based real-time CV speed advisory algorithm by taking a modular design approach,which makes the application automatically scalable and deployable in the cloud using the serverless architecture.Third,we developed a cloud-in-the-loop simulation testbed using AWS and an open-source microscopic roadway traffic simulator called sim-ulation of urban mobility(SUMO).Our analyses based on different roadway traffic condi-tions showed that the serverless CV speed advisory application meets the latency requirement of real-time CV mobility applications.Besides,our serverless CV speed advi-sory application reduced the average stopped delay(by 77%)and the aggregated risk of col-lision(by 21%)at the signalized intersections of a corridor.These prove the feasibility as well as the efficacy of utilizing public cloud infrastructure to implement real-time roadway traffic management applications in a CV environment.展开更多
Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better l...Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose different strategies for different situations. The algorithm applies the game theory to the load balancing strategy to improve the efficiency in the public cloud environment.展开更多
Public clouds favor sharing of storage resources,in which many tenants acquire bandwidth and storage capacity from a shared storage pool.To provide high availability,data are often encoded to provide fault tolerance w...Public clouds favor sharing of storage resources,in which many tenants acquire bandwidth and storage capacity from a shared storage pool.To provide high availability,data are often encoded to provide fault tolerance with low storage costs.Regarding this,efficiently organizing an encoded storage system for shared I/Os is critical for application performance.This is usually hard to achieve as different applications have different stripe configurations and fault tolerance levels.In this paper,we first study the block trace from the Alibaba cloud,and find that I/O patterns of modern applications prefer the resource sharing scheme.Based on this,we propose a globally shared resource paradigm for encoded storage system in the public cloud.The globally shared resource paradigm can provide balanced load and fault tolerance for numerous disk pool sizes and arbitrary application stripe configurations.Furthermore,we demonstrate with two case studies that our theory can help address the device-specific problems of HDD and SSD RAID arrays with slight modifications:comparing the existing resource partition and resource sharing methods,our theory can promote the rebuild speed of the HDD RAID arrays by 2.5,and reduce the P99 tail latency of the SSD arrays by up to two orders of magnitude.展开更多
Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects...Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects together. However, these schemes either only support plaintext data file or have been proved insecure. In this paper, we propose a public auditing scheme for cloud storage systems, in which deduplication of encrypted data and data integrity checking can be achieved within the same framework. The cloud server can correctly check the ownership for new owners and the auditor can correctly check the integrity of deduplicated data. Our scheme supports deduplication of encrypted data by using the method of proxy re-encryption and also achieves deduplication of data tags by aggregating the tags from different owners. The analysis and experiment results show that our scheme is provably secure and efficient.展开更多
Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing o...Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency.展开更多
The purpose of this paper is to provide a better knowledge of the cloud computing as well as to suggest relevant research paths in this growing field. Also, we will go through the future benefits of cloud computing an...The purpose of this paper is to provide a better knowledge of the cloud computing as well as to suggest relevant research paths in this growing field. Also, we will go through the future benefits of cloud computing and the upcoming possible challenges we will have. Intext Cloud, performance, cloud computing, architecture, scale-up, and big data are all terms used in this context. Cloud computing offers a wide range of architectural configurations, including the number of processors, memory, and nodes. Cloud computing has already changed the way we store, process, and access data, and it is expected to continue to have a significant impact on the future of information technology. Cloud computing enables organizations to scale their IT resources up or down quickly and easily, without the need for costly hardware upgrades. This can help organizations to respond more quickly to changing business needs and market conditions. By moving IT resources to the cloud, organizations can reduce their IT infrastructure costs and improve their operational efficiency. Cloud computing also allows organizations to pay only for the resources they use, rather than investing in expensive hardware and software licenses. Cloud providers invest heavily in security and compliance measures, which can help to protect organizations from cyber threats and ensure regulatory compliance. Cloud computing provides a scalable platform for AI and machine learning applications, enabling organizations to build and deploy these technologies more easily and cost-effectively. A task, an application, and its input can take up to 20 times longer or cost 10 times more than optimal. Cloud products’ ready adaptability has resulted in a paradigm change. Previously, an application was optimized for a specific cluster;however, in the cloud, the architectural configuration is tuned for the workload. The evolution of cloud computing from the era of mainframes and dumb terminals has been significant, but there are still many advancements to come. As we look towards the future, IT leaders and the companies they serve will face increasingly complex challenges in order to stay competitive in a constantly evolving cloud computing landscape. Additionally, it will be crucial to remain compliant with existing regulations as well as new regulations that may emerge in the future. It is safe to say that the next decade of cloud computing will be just as dramatic as the last where many internet services are becoming cloud-based, and huge enterprises will struggle to fund physical infrastructure. Cloud computing is significantly used in business innovation and because of its agility and adaptability, cloud technology enables new ways of working, operating, and running a business. The service enables users to access files and applications stored in the cloud from anywhere, removing the requirement for users to be always physically close to actual hardware. Cloud computing makes the connection available from anywhere because they are kept on a network of hosted computers that carry data over the internet. Cloud computing has shown to be advantageous to both consumers and corporations. To be more specific, the cloud has altered our way of life. Overall, cloud computing is likely to continue to play a significant role in the future of IT, enabling organizations to become more agile, efficient, and innovative in the face of rapid technological change. This is likely to drive further innovation in AI and machine learning in the coming years.展开更多
On the basis of the discussion on main functions of logistics public information platform, and the summary of general functions of some typical cases at home and abroad, such as China electronic port and TradeLink, th...On the basis of the discussion on main functions of logistics public information platform, and the summary of general functions of some typical cases at home and abroad, such as China electronic port and TradeLink, the logistics public information platform architecture is introduced from a technical point of view. It contains multiple levels, such as cloud computing platform and data storage layer, and discusses some new technologies available. Finally, the important trend of the logistics public information platform development is discussed.展开更多
A number of proposals have been suggested to tackle data integrity and privacy concerns in cloud storage in which some existing schemes suffer from vulnerabilities in data dynamics. In this paper, we propose an improv...A number of proposals have been suggested to tackle data integrity and privacy concerns in cloud storage in which some existing schemes suffer from vulnerabilities in data dynamics. In this paper, we propose an improved fairness and dynamic provable data possession scheme that supports public verification and batch auditing while preserves data privacy. The rb23Tree is utilized to facilitate data dynamics. Moreover, the fairness is considered to prevent a dishonest user from accusing the cloud service provider of manipulating the data. The scheme allows a third party auditor (TPA) to verify the data integrity without learning any information about the data content during the auditing process. Furthermore, our scheme also allows batch auditing, which greatly accelerates the auditing process when there are multiple auditing requests. Security analysis and extensive experimental evaluations show that our scheme is secure and efficient.展开更多
P2P2B模式下云服务投入是工业互联网(industrial internet of things,IIoT)平台的关键战略决策之一.构建由IIoT平台、龙头企业、潜在客户构成的演化博弈模型,研究IIoT平台在公有云研发投入和私有云研发投入中的策略选择,及其与龙头企业...P2P2B模式下云服务投入是工业互联网(industrial internet of things,IIoT)平台的关键战略决策之一.构建由IIoT平台、龙头企业、潜在客户构成的演化博弈模型,研究IIoT平台在公有云研发投入和私有云研发投入中的策略选择,及其与龙头企业的生态合作问题.结果表明:虽然公有云存在数据泄露隐患,但较高的规模收益仍会吸引IIoT平台投入公有云研发,而平台搭建期内龙头企业的高合作意愿会促使平台投入私有云,随着龙头企业合作研发的比例增加,平台又将改变其投入策略.驱动龙头企业合作的因素可以是成本收益、技术提升等直接因素,也可以是规模收益、数据泄露概率等间接因素.最后,基于平台生命周期探讨了初创期、平台搭建期与生态系统期IIoT平台的系统稳定策略,并得到相应的管理启示.展开更多
This paper analyzes the characteristics of cloud computing and IOT (internet of things), introduce a logistics operation based on cloud computing and IOT, which establish a logistics information interchange, data exch...This paper analyzes the characteristics of cloud computing and IOT (internet of things), introduce a logistics operation based on cloud computing and IOT, which establish a logistics information interchange, data exchange to meet the business requirements of the various types of logistics public information platform.展开更多
We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work...We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work, Ateniese et al. proposed a remote data integrity checking protocol that supports data partial dynamics. In this paper, we present a new remote data possession checking protocol which allows an unlimited number of file integrity verifications and efficiently supports dynamic operations, such as data modification, deletion, insertion and append. The proposed protocol supports public verifiability. In addition, the proposed protocol does not leak any private information to third-party verifiers. Through a specific analysis, we show the correctness and security of the protocol. After that, we demonstrate the proposed protocol has a good performance.展开更多
The purpose of this research is to show the instability and the security risks of the information system in Burkina-Faso public administration. In this paper, witnessing unsatisfactory services such as government mess...The purpose of this research is to show the instability and the security risks of the information system in Burkina-Faso public administration. In this paper, witnessing unsatisfactory services such as government messaging (mailer.gov.bf) as well as G-cloud services which are the government cloud were studied. The behavior of user agents on the administration’s IT infrastructures which could expose the information system to security risks was also studied. The expected result shows evidence of the weakness of the public administration information system and provides some recommendation.展开更多
文摘In this study,we developed a real-time connected vehicle(CV)speed advisory application that uses public cloud services,and tested it on a simulated signalized corridor for different roadway traffic conditions.First,we developed a scalable serverless cloud computing architecture leveraging public cloud services offered by Amazon Web Services(AWS)to support the requirements of a real-time CV application.Second,we developed an optimization-based real-time CV speed advisory algorithm by taking a modular design approach,which makes the application automatically scalable and deployable in the cloud using the serverless architecture.Third,we developed a cloud-in-the-loop simulation testbed using AWS and an open-source microscopic roadway traffic simulator called sim-ulation of urban mobility(SUMO).Our analyses based on different roadway traffic condi-tions showed that the serverless CV speed advisory application meets the latency requirement of real-time CV mobility applications.Besides,our serverless CV speed advi-sory application reduced the average stopped delay(by 77%)and the aggregated risk of col-lision(by 21%)at the signalized intersections of a corridor.These prove the feasibility as well as the efficacy of utilizing public cloud infrastructure to implement real-time roadway traffic management applications in a CV environment.
文摘Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose different strategies for different situations. The algorithm applies the game theory to the load balancing strategy to improve the efficiency in the public cloud environment.
基金supported by the National Natural Science Foundation of China(62025203).
文摘Public clouds favor sharing of storage resources,in which many tenants acquire bandwidth and storage capacity from a shared storage pool.To provide high availability,data are often encoded to provide fault tolerance with low storage costs.Regarding this,efficiently organizing an encoded storage system for shared I/Os is critical for application performance.This is usually hard to achieve as different applications have different stripe configurations and fault tolerance levels.In this paper,we first study the block trace from the Alibaba cloud,and find that I/O patterns of modern applications prefer the resource sharing scheme.Based on this,we propose a globally shared resource paradigm for encoded storage system in the public cloud.The globally shared resource paradigm can provide balanced load and fault tolerance for numerous disk pool sizes and arbitrary application stripe configurations.Furthermore,we demonstrate with two case studies that our theory can help address the device-specific problems of HDD and SSD RAID arrays with slight modifications:comparing the existing resource partition and resource sharing methods,our theory can promote the rebuild speed of the HDD RAID arrays by 2.5,and reduce the P99 tail latency of the SSD arrays by up to two orders of magnitude.
基金Supported by the National Natural Science Foundation of China(61373040,61173137)the Ph.D.Programs Foundation of Ministry of Education of China(20120141110002)the Key Project of Natural Science Foundation of Hubei Province(2010CDA004)
文摘Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects together. However, these schemes either only support plaintext data file or have been proved insecure. In this paper, we propose a public auditing scheme for cloud storage systems, in which deduplication of encrypted data and data integrity checking can be achieved within the same framework. The cloud server can correctly check the ownership for new owners and the auditor can correctly check the integrity of deduplicated data. Our scheme supports deduplication of encrypted data by using the method of proxy re-encryption and also achieves deduplication of data tags by aggregating the tags from different owners. The analysis and experiment results show that our scheme is provably secure and efficient.
文摘Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency.
文摘The purpose of this paper is to provide a better knowledge of the cloud computing as well as to suggest relevant research paths in this growing field. Also, we will go through the future benefits of cloud computing and the upcoming possible challenges we will have. Intext Cloud, performance, cloud computing, architecture, scale-up, and big data are all terms used in this context. Cloud computing offers a wide range of architectural configurations, including the number of processors, memory, and nodes. Cloud computing has already changed the way we store, process, and access data, and it is expected to continue to have a significant impact on the future of information technology. Cloud computing enables organizations to scale their IT resources up or down quickly and easily, without the need for costly hardware upgrades. This can help organizations to respond more quickly to changing business needs and market conditions. By moving IT resources to the cloud, organizations can reduce their IT infrastructure costs and improve their operational efficiency. Cloud computing also allows organizations to pay only for the resources they use, rather than investing in expensive hardware and software licenses. Cloud providers invest heavily in security and compliance measures, which can help to protect organizations from cyber threats and ensure regulatory compliance. Cloud computing provides a scalable platform for AI and machine learning applications, enabling organizations to build and deploy these technologies more easily and cost-effectively. A task, an application, and its input can take up to 20 times longer or cost 10 times more than optimal. Cloud products’ ready adaptability has resulted in a paradigm change. Previously, an application was optimized for a specific cluster;however, in the cloud, the architectural configuration is tuned for the workload. The evolution of cloud computing from the era of mainframes and dumb terminals has been significant, but there are still many advancements to come. As we look towards the future, IT leaders and the companies they serve will face increasingly complex challenges in order to stay competitive in a constantly evolving cloud computing landscape. Additionally, it will be crucial to remain compliant with existing regulations as well as new regulations that may emerge in the future. It is safe to say that the next decade of cloud computing will be just as dramatic as the last where many internet services are becoming cloud-based, and huge enterprises will struggle to fund physical infrastructure. Cloud computing is significantly used in business innovation and because of its agility and adaptability, cloud technology enables new ways of working, operating, and running a business. The service enables users to access files and applications stored in the cloud from anywhere, removing the requirement for users to be always physically close to actual hardware. Cloud computing makes the connection available from anywhere because they are kept on a network of hosted computers that carry data over the internet. Cloud computing has shown to be advantageous to both consumers and corporations. To be more specific, the cloud has altered our way of life. Overall, cloud computing is likely to continue to play a significant role in the future of IT, enabling organizations to become more agile, efficient, and innovative in the face of rapid technological change. This is likely to drive further innovation in AI and machine learning in the coming years.
文摘On the basis of the discussion on main functions of logistics public information platform, and the summary of general functions of some typical cases at home and abroad, such as China electronic port and TradeLink, the logistics public information platform architecture is introduced from a technical point of view. It contains multiple levels, such as cloud computing platform and data storage layer, and discusses some new technologies available. Finally, the important trend of the logistics public information platform development is discussed.
基金Supported by the Doctoral Fund of the Ministry of Education priority Areas of Development Projects(20110141130006)the Natural Science Foundation of Hubei Province(ZRZ0041)
文摘A number of proposals have been suggested to tackle data integrity and privacy concerns in cloud storage in which some existing schemes suffer from vulnerabilities in data dynamics. In this paper, we propose an improved fairness and dynamic provable data possession scheme that supports public verification and batch auditing while preserves data privacy. The rb23Tree is utilized to facilitate data dynamics. Moreover, the fairness is considered to prevent a dishonest user from accusing the cloud service provider of manipulating the data. The scheme allows a third party auditor (TPA) to verify the data integrity without learning any information about the data content during the auditing process. Furthermore, our scheme also allows batch auditing, which greatly accelerates the auditing process when there are multiple auditing requests. Security analysis and extensive experimental evaluations show that our scheme is secure and efficient.
文摘P2P2B模式下云服务投入是工业互联网(industrial internet of things,IIoT)平台的关键战略决策之一.构建由IIoT平台、龙头企业、潜在客户构成的演化博弈模型,研究IIoT平台在公有云研发投入和私有云研发投入中的策略选择,及其与龙头企业的生态合作问题.结果表明:虽然公有云存在数据泄露隐患,但较高的规模收益仍会吸引IIoT平台投入公有云研发,而平台搭建期内龙头企业的高合作意愿会促使平台投入私有云,随着龙头企业合作研发的比例增加,平台又将改变其投入策略.驱动龙头企业合作的因素可以是成本收益、技术提升等直接因素,也可以是规模收益、数据泄露概率等间接因素.最后,基于平台生命周期探讨了初创期、平台搭建期与生态系统期IIoT平台的系统稳定策略,并得到相应的管理启示.
文摘This paper analyzes the characteristics of cloud computing and IOT (internet of things), introduce a logistics operation based on cloud computing and IOT, which establish a logistics information interchange, data exchange to meet the business requirements of the various types of logistics public information platform.
文摘We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work, Ateniese et al. proposed a remote data integrity checking protocol that supports data partial dynamics. In this paper, we present a new remote data possession checking protocol which allows an unlimited number of file integrity verifications and efficiently supports dynamic operations, such as data modification, deletion, insertion and append. The proposed protocol supports public verifiability. In addition, the proposed protocol does not leak any private information to third-party verifiers. Through a specific analysis, we show the correctness and security of the protocol. After that, we demonstrate the proposed protocol has a good performance.
文摘The purpose of this research is to show the instability and the security risks of the information system in Burkina-Faso public administration. In this paper, witnessing unsatisfactory services such as government messaging (mailer.gov.bf) as well as G-cloud services which are the government cloud were studied. The behavior of user agents on the administration’s IT infrastructures which could expose the information system to security risks was also studied. The expected result shows evidence of the weakness of the public administration information system and provides some recommendation.