At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model ...At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method.展开更多
The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data services.It utilizes on-demand resource pr...The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data services.It utilizes on-demand resource provisioning,but the necessitated constraints of rapid turnaround time,minimal execution cost,high rate of resource utilization and limited makespan transforms the Load Balancing(LB)process-based Task Scheduling(TS)problem into an NP-hard optimization issue.In this paper,Hybrid Prairie Dog and Beluga Whale Optimization Algorithm(HPDBWOA)is propounded for precise mapping of tasks to virtual machines with the due objective of addressing the dynamic nature of cloud environment.This capability of HPDBWOA helps in decreasing the SLA violations and Makespan with optimal resource management.It is modelled as a scheduling strategy which utilizes the merits of PDOA and BWOA for attaining reactive decisions making with respect to the process of assigning the tasks to virtual resources by considering their priorities into account.It addresses the problem of pre-convergence with wellbalanced exploration and exploitation to attain necessitated Quality of Service(QoS)for minimizing the waiting time incurred during TS process.It further balanced exploration and exploitation rates for reducing the makespan during the task allocation with complete awareness of VM state.The results of the proposed HPDBWOA confirmed minimized energy utilization of 32.18% and reduced cost of 28.94% better than approaches used for investigation.The statistical investigation of the proposed HPDBWOA conducted using ANOVA confirmed its efficacy over the benchmarked systems in terms of throughput,system,and response time.展开更多
基础设施即服务(infrastructure as a service,IaaS)模式"云训练"是基于IaaS云计算提出的武器装备系统模拟训练的模式,根据用户需求对训练资源进行预测调度是提高训练效果的重要保证。分析了"云训练"中用户任务、...基础设施即服务(infrastructure as a service,IaaS)模式"云训练"是基于IaaS云计算提出的武器装备系统模拟训练的模式,根据用户需求对训练资源进行预测调度是提高训练效果的重要保证。分析了"云训练"中用户任务、资源需求特点,采用阈值法进行预处理,通过动态权值系综模型得到预处理结果。在此基础上,提出基于减法-模糊聚类的模糊神经网络的资源需求预测方法(subtractive-fuzzy clustering based fuzzy neural network,SFCFNN),并引入自适应学习率和动量项以提升收敛速度和稳定性。调度器根据预测结果实现用户需求与资源之间的动态匹配。实验表明该方法可精确预测用户资源需求,实现资源动态调度,有效提高资源利用率与训练效果。展开更多
Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services effectively.Under this system,Platform as a Service(PaaS)offers a medium headed for a web de...Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services effectively.Under this system,Platform as a Service(PaaS)offers a medium headed for a web development platform that uniformly distributes the requests and resources.Hackers using Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks abruptly interrupt these requests.Even though several existing methods like signature-based,statistical anomaly-based,and stateful protocol analysis are available,they are not sufficient enough to get rid of Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks and hence there is a great need for a definite algorithm.Concerning this issue,we propose an improved hybrid algorithm which is a combination of Multivariate correlation analysis,Spearman coefficient,and mitigation technique.It can easily differentiate common traffic and attack traffic.Not only that,it greatly helps the network to distribute the resources only for authenticated requests.The effects of comparing with the normalized information have shown an extra encouraging detection accuracy of 99%for the numerous DoS attack as well as DDoS attacks.展开更多
Cloud computing has attracted great interest from both academic and industrial communities. Different paradigms, architectures and applications based on the concept of cloud have emerged. Although many of them have be...Cloud computing has attracted great interest from both academic and industrial communities. Different paradigms, architectures and applications based on the concept of cloud have emerged. Although many of them have been quite successful, efforts are mainly focusing on the study and implementation of particular setups. However, a generic and more flexible solution for cloud construction is missing. In this paper, we present a composition-based approach for cloud computing (compositional cloud) using Imperial College Cloud (IC Cloud) as a demonstration example. Instead of studying a specific cloud computing system, our approach aims to enable a generic framework where wrious cloud computing architectures and implementation strategies can be systematically studied. With our approach, cloud computing providers/adopters are able to design and compose their own systems in a quick and flexible manner. Cloud computing systems will no longer be in fixed shapes but will be dynamic and adjustable according to the requirements of different application domains.展开更多
云计算为能够为用户提供基础作为服务(IaaS,Infrastructure as a Service)的计算能力,使得用户能够在使用高效、可靠、经济的计算资源的同时,不用增加额外的购置、维护资源的开销,这在很大程度上要依赖对虚拟资源的使用。因此如何有效...云计算为能够为用户提供基础作为服务(IaaS,Infrastructure as a Service)的计算能力,使得用户能够在使用高效、可靠、经济的计算资源的同时,不用增加额外的购置、维护资源的开销,这在很大程度上要依赖对虚拟资源的使用。因此如何有效地管理虚拟资源,使其使用率最大化并保证用户对资源使用的有效性,已成了眼下的攻关难题。针对这一问题,文章提出了一种面向虚拟资源的云计算资源管理机制,通过对虚拟资源的划分、预留及调度策略,为用户提供有效的IaaS服务。通过仿真实验结果表明,该方法能够提高虚拟资源的使用率及保证用户对资源使用的有效性。展开更多
基金National Natural Science Foundation of China(No.61462070)the"ChunHui Plan"Project of Educational Department,China(No.Z2009-1-01062)the Research of Evaluation Technology of Security and Reliability of Cloud Computing and the Built of Testing Platform That is a Technology Plan Project of Inner Mongolia,China
文摘At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method.
文摘The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data services.It utilizes on-demand resource provisioning,but the necessitated constraints of rapid turnaround time,minimal execution cost,high rate of resource utilization and limited makespan transforms the Load Balancing(LB)process-based Task Scheduling(TS)problem into an NP-hard optimization issue.In this paper,Hybrid Prairie Dog and Beluga Whale Optimization Algorithm(HPDBWOA)is propounded for precise mapping of tasks to virtual machines with the due objective of addressing the dynamic nature of cloud environment.This capability of HPDBWOA helps in decreasing the SLA violations and Makespan with optimal resource management.It is modelled as a scheduling strategy which utilizes the merits of PDOA and BWOA for attaining reactive decisions making with respect to the process of assigning the tasks to virtual resources by considering their priorities into account.It addresses the problem of pre-convergence with wellbalanced exploration and exploitation to attain necessitated Quality of Service(QoS)for minimizing the waiting time incurred during TS process.It further balanced exploration and exploitation rates for reducing the makespan during the task allocation with complete awareness of VM state.The results of the proposed HPDBWOA confirmed minimized energy utilization of 32.18% and reduced cost of 28.94% better than approaches used for investigation.The statistical investigation of the proposed HPDBWOA conducted using ANOVA confirmed its efficacy over the benchmarked systems in terms of throughput,system,and response time.
文摘基础设施即服务(infrastructure as a service,IaaS)模式"云训练"是基于IaaS云计算提出的武器装备系统模拟训练的模式,根据用户需求对训练资源进行预测调度是提高训练效果的重要保证。分析了"云训练"中用户任务、资源需求特点,采用阈值法进行预处理,通过动态权值系综模型得到预处理结果。在此基础上,提出基于减法-模糊聚类的模糊神经网络的资源需求预测方法(subtractive-fuzzy clustering based fuzzy neural network,SFCFNN),并引入自适应学习率和动量项以提升收敛速度和稳定性。调度器根据预测结果实现用户需求与资源之间的动态匹配。实验表明该方法可精确预测用户资源需求,实现资源动态调度,有效提高资源利用率与训练效果。
文摘Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services effectively.Under this system,Platform as a Service(PaaS)offers a medium headed for a web development platform that uniformly distributes the requests and resources.Hackers using Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks abruptly interrupt these requests.Even though several existing methods like signature-based,statistical anomaly-based,and stateful protocol analysis are available,they are not sufficient enough to get rid of Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks and hence there is a great need for a definite algorithm.Concerning this issue,we propose an improved hybrid algorithm which is a combination of Multivariate correlation analysis,Spearman coefficient,and mitigation technique.It can easily differentiate common traffic and attack traffic.Not only that,it greatly helps the network to distribute the resources only for authenticated requests.The effects of comparing with the normalized information have shown an extra encouraging detection accuracy of 99%for the numerous DoS attack as well as DDoS attacks.
文摘Cloud computing has attracted great interest from both academic and industrial communities. Different paradigms, architectures and applications based on the concept of cloud have emerged. Although many of them have been quite successful, efforts are mainly focusing on the study and implementation of particular setups. However, a generic and more flexible solution for cloud construction is missing. In this paper, we present a composition-based approach for cloud computing (compositional cloud) using Imperial College Cloud (IC Cloud) as a demonstration example. Instead of studying a specific cloud computing system, our approach aims to enable a generic framework where wrious cloud computing architectures and implementation strategies can be systematically studied. With our approach, cloud computing providers/adopters are able to design and compose their own systems in a quick and flexible manner. Cloud computing systems will no longer be in fixed shapes but will be dynamic and adjustable according to the requirements of different application domains.
文摘云计算为能够为用户提供基础作为服务(IaaS,Infrastructure as a Service)的计算能力,使得用户能够在使用高效、可靠、经济的计算资源的同时,不用增加额外的购置、维护资源的开销,这在很大程度上要依赖对虚拟资源的使用。因此如何有效地管理虚拟资源,使其使用率最大化并保证用户对资源使用的有效性,已成了眼下的攻关难题。针对这一问题,文章提出了一种面向虚拟资源的云计算资源管理机制,通过对虚拟资源的划分、预留及调度策略,为用户提供有效的IaaS服务。通过仿真实验结果表明,该方法能够提高虚拟资源的使用率及保证用户对资源使用的有效性。