期刊文献+
共找到1,978篇文章
< 1 2 99 >
每页显示 20 50 100
Joint Resource Allocation Using Evolutionary Algorithms in Heterogeneous Mobile Cloud Computing Networks 被引量:10
1
作者 Weiwei Xia Lianfeng Shen 《China Communications》 SCIE CSCD 2018年第8期189-204,共16页
The problem of joint radio and cloud resources allocation is studied for heterogeneous mobile cloud computing networks. The objective of the proposed joint resource allocation schemes is to maximize the total utility ... The problem of joint radio and cloud resources allocation is studied for heterogeneous mobile cloud computing networks. The objective of the proposed joint resource allocation schemes is to maximize the total utility of users as well as satisfy the required quality of service(QoS) such as the end-to-end response latency experienced by each user. We formulate the problem of joint resource allocation as a combinatorial optimization problem. Three evolutionary approaches are considered to solve the problem: genetic algorithm(GA), ant colony optimization with genetic algorithm(ACO-GA), and quantum genetic algorithm(QGA). To decrease the time complexity, we propose a mapping process between the resource allocation matrix and the chromosome of GA, ACO-GA, and QGA, search the available radio and cloud resource pairs based on the resource availability matrixes for ACOGA, and encode the difference value between the allocated resources and the minimum resource requirement for QGA. Extensive simulation results show that our proposed methods greatly outperform the existing algorithms in terms of running time, the accuracy of final results, the total utility, resource utilization and the end-to-end response latency guaranteeing. 展开更多
关键词 heterogeneous mobile cloud computing networks resource allocation genetic algorithm ant colony optimization quantum genetic algorithm
下载PDF
Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing
2
作者 A.S.Anakath R.Kannadasan +2 位作者 Niju P.Joseph P.Boominathan G.R.Sreekanth 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期479-492,共14页
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information quickly.The use of cloud computing has realized the rapid increase ... Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information quickly.The use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing efficiently.This cloud is nowadays highly affected by internal threats of the user.Sensitive applications such as banking,hospital,and business are more likely affected by real user threats.An intruder is presented as a user and set as a member of the network.After becoming an insider in the network,they will try to attack or steal sensitive data during information sharing or conversation.The major issue in today's technological development is identifying the insider threat in the cloud network.When data are lost,compromising cloud users is difficult.Privacy and security are not ensured,and then,the usage of the cloud is not trusted.Several solutions are available for the external security of the cloud network.However,insider or internal threats need to be addressed.In this research work,we focus on a solution for identifying an insider attack using the artificial intelligence technique.An insider attack is possible by using nodes of weak users’systems.They will log in using a weak user id,connect to a network,and pretend to be a trusted node.Then,they can easily attack and hack information as an insider,and identifying them is very difficult.These types of attacks need intelligent solutions.A machine learning approach is widely used for security issues.To date,the existing lags can classify the attackers accurately.This information hijacking process is very absurd,which motivates young researchers to provide a solution for internal threats.In our proposed work,we track the attackers using a user interaction behavior pattern and deep learning technique.The usage of mouse movements and clicks and keystrokes of the real user is stored in a database.The deep belief neural network is designed using a restricted Boltzmann machine(RBM)so that the layer of RBM communicates with the previous and subsequent layers.The result is evaluated using a Cooja simulator based on the cloud environment.The accuracy and F-measure are highly improved compared with when using the existing long short-term memory and support vector machine. 展开更多
关键词 cloud computing security insider attack network security PRIVACY user interaction behavior deep belief neural network
下载PDF
Research on the Cloud Computing Technology Application Based on Ubiquitous Network
3
作者 Kexing Cao 《International English Education Research》 2014年第3期109-111,共3页
Ubiquitous breadth of applications and data to quantify the sea and other features need an efficient means to provide information processing technology ensure. This paper analyzes the ubiquitous network application pl... Ubiquitous breadth of applications and data to quantify the sea and other features need an efficient means to provide information processing technology ensure. This paper analyzes the ubiquitous network application platform and its initial request for all kinds of computing and network resources. The current cloud computing technology distributed processing capabilities, which were assessed. And cloud computing in the future will provide a reference to the proposed application of research on cloud computing technology application and a new application fields. 展开更多
关键词 Ubiquitous network cloud computing network Architecture
下载PDF
Job Scheduling for Cloud Computing Using Neural Networks 被引量:1
4
作者 Mahmoud Maqableh Huda Karajeh Ra’ed Masa’deh 《Communications and Network》 2014年第3期191-200,共10页
Cloud computing aims to maximize the benefit of distributed resources and aggregate them to achieve higher throughput to solve large scale computation problems. In this technology, the customers rent the resources and... Cloud computing aims to maximize the benefit of distributed resources and aggregate them to achieve higher throughput to solve large scale computation problems. In this technology, the customers rent the resources and only pay per use. Job scheduling is one of the biggest issues in cloud computing. Scheduling of users’ requests means how to allocate resources to these requests to finish the tasks in minimum time. The main task of job scheduling system is to find the best resources for user’s jobs, taking into consideration some statistics and dynamic parameters restrictions of users’ jobs. In this research, we introduce cloud computing, genetic algorithm and artificial neural networks, and then review the literature of cloud job scheduling. Many researchers in the literature tried to solve the cloud job scheduling using different techniques. Most of them use artificial intelligence techniques such as genetic algorithm and ant colony to solve the problem of job scheduling and to find the optimal distribution of resources. Unfortunately, there are still some problems in this research area. Therefore, we propose implementing artificial neural networks to optimize the job scheduling results in cloud as it can find new set of classifications not only search within the available set. 展开更多
关键词 cloud computing JOB Scheduling Artificial INTELLIGENCE Artificial NEURAL networks
下载PDF
Underground Disease Detection Based on Cloud Computing and Attention Region Neural Network 被引量:1
5
作者 Pinjie Xu Ce Li +3 位作者 Liguo Zhang Feng Yang Jing Zheng Jingwu Feng 《Journal on Artificial Intelligence》 2019年第1期9-18,共10页
Detecting the underground disease is very crucial for the roadbed health monitoring and maintenance of transport facilities,since it is very closely related to the structural health and reliability with the rapid deve... Detecting the underground disease is very crucial for the roadbed health monitoring and maintenance of transport facilities,since it is very closely related to the structural health and reliability with the rapid development of road traffic.Ground penetrating radar(GPR)is widely used to detect road and underground diseases.However,it is still a challenging task due to data access anywhere,transmission security and data processing on cloud.Cloud computing can provide scalable and powerful technologies for large-scale storage,processing and dissemination of GPR data.Combined with cloud computing and radar detection technology,it is possible to locate the underground disease quickly and accurately.This paper deploys the framework of a ground disease detection system based on cloud computing and proposes an attention region convolution neural network for object detection in the GPR images.Experimental results of the precision and recall metrics show that the proposed approach is more efficient than traditional objection detection method in ground disease detection of cloud based system. 展开更多
关键词 cloud computing ground PENETRATING radar CONVOLUTION NEURAL network
下载PDF
Observing Network Performance and Congestion on Managing Assets with RFID and Cloud Computing
6
作者 Leandro Andrioli Rodrigo da Rosa Righi +1 位作者 Cristiano André da Costa Lucas Graebin 《Journal of Computer and Communications》 2017年第9期43-66,共24页
Today, we observe that more and more, radio frequency identification (RFID) technology has been used to identify and track objects in enterprises and institutions. In addition, we also perceive the growing adoption of... Today, we observe that more and more, radio frequency identification (RFID) technology has been used to identify and track objects in enterprises and institutions. In addition, we also perceive the growing adoption of cloud computing, either public or private, to process and store data from the objects. In this context, the literature does not present an initiative that looks into the network on enterprise-cloud interactions, so neglecting network performance and congestion information when transmitting data to the cloud. Thus, we are presenting a model named ACMA—Automatic Control and Management of Assets. ACMA employs context awareness to control and monitor corporate assets in companies with multiple units. ACMA provides a centralized point of access in the cloud in which interested actors can get online data about each corporate asset. In particular, our scientific contribution consists in considering network congestion to control dynamically the data updating interval from sensors to the cloud. The idea is to search for reliability and integrity of operations, without losing or corrupting data when updating the information to cloud. Thus, this article describes the ACMA model, its architecture, algorithms and features. In addition, we describe the evaluation methodology and the results obtained through experiments and simulations based on the developed prototype. 展开更多
关键词 Internet of THINGS RFID cloud computing network CONGESTION Adaptivity ASSETS
下载PDF
Research on the Big Data Cloud Computing Based on the Network Data Mining
7
作者 ZHANG Haiyang ZHANG Zhiwei 《International English Education Research》 2019年第2期72-74,共3页
The big data cloud computing is a new computing mode,which integrates the distributed processing,the parallel processing,the network computing,the virtualization technology,the load balancing and other network technol... The big data cloud computing is a new computing mode,which integrates the distributed processing,the parallel processing,the network computing,the virtualization technology,the load balancing and other network technologies.Under the operation of the big data cloud computing system,the computing resources can be distributed in a resource pool composed of a large number of the computers,allowing users to connect with the remote computer systems according to their own data information needs. 展开更多
关键词 network DATA MINING BIG DATA cloud computing technology processing
下载PDF
Enhancing Reliability via Checkpointing in Cloud Computing Systems 被引量:4
8
作者 Ao Zhou Qibo Sun Jinglin Li 《China Communications》 SCIE CSCD 2017年第7期108-117,共10页
Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial.... Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial. Therefore, it is a critical challenge to guarantee the service reliability. Fault-tolerance strategies, such as checkpoint, are commonly employed. Because of the failure of the edge switches, the checkpoint image may become inaccessible. Therefore, current checkpoint-based fault tolerance method cannot achieve the best effect. In this paper, we propose an optimal checkpoint method with edge switch failure-aware. The edge switch failure-aware checkpoint method includes two algorithms. The first algorithm employs the data center topology and communication characteristic for checkpoint image storage server selection. The second algorithm employs the checkpoint image storage characteristic as well as the data center topology to select the recovery server. Simulation experiments are performed to demonstrate the effectiveness of the proposed method. 展开更多
关键词 cloud computing cloud service RELIABILITY fault tolerance data center network
下载PDF
Development of Crisis Management Models Combined with Cloud Computing
9
作者 刘奕 王雪娅 《Journal of Donghua University(English Edition)》 EI CAS 2016年第3期483-489,共7页
Three monitor models of enterprise crisis were introduced,i.e.,the monitoring model of enterprise crisis based on intelligent Meta search,the enterprise crisis management model based on artificial neural network and t... Three monitor models of enterprise crisis were introduced,i.e.,the monitoring model of enterprise crisis based on intelligent Meta search,the enterprise crisis management model based on artificial neural network and the combined early-warning model.Combined with the advantages of cloud computing,the prominent crisis management models are improved and more efficient,comprehensive and accurate in enterprise crisis management.Through the empirical study of the models,cloud computing makes the early warning structures of enterprise crisis tend to be more simple and efficient,cloud computing can effectively enhance the recognition ability and learning ability of the crisis management,and cloud computing can keep data information updating and realize the dynamic management of enterprise joint early-warning.At the same time,according to the comparative analysis and the experimental result,the crisis management models based on cloud computing also need some improvements. 展开更多
关键词 cloud computing intelligent metasearch artificial neural network(ANN) joint early-warning model crisis management models
下载PDF
A Cloud Computing Perspective for Distributed Routing in Vehicular Environments
10
作者 Smitha Shivshankar Abbas Jamalipour 《ZTE Communications》 2016年第3期36-44,共9页
Vehicular networks have been envisioned to provide us with numerous interesting services such as dissemination of real-time safety warnings and commercial advertisements via car-to-car communication. However, efficien... Vehicular networks have been envisioned to provide us with numerous interesting services such as dissemination of real-time safety warnings and commercial advertisements via car-to-car communication. However, efficient routing is a research challenge due to the highly dynamic nature of these networks. Nevertheless, the availability of connections imposes additional constraint. Our earlier works in the area of efficient dissemination integrates the advantages of middleware operations with muhicast routing to de- sign a framework for distributed routing in vehicular networks. Cloud computing makes use of pools of physical computing resourc- es to meet the requirements of such highly dynamic networks. The proposed solution in this paper applies the principles of cloud computing to our existing framework. The routing protocol works at the network layer for the formation of clouds in specific geo- graphic regions. Simulation results present the effieiency of the model in terms of serviee discovery, download time and the queu- ing delay at the controller nodes. 展开更多
关键词 cloud computing distributed routing vehicular networks
下载PDF
Analysis of Critical Factors in Manufacturing by Adopting a Cloud Computing Service
11
作者 Hsin-Pin Fu Tsung-Sheng Chang +1 位作者 Chien-Hung Liu Li-Chun Liu 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期213-227,共15页
The advantages of a cloud computing service are cost advantages,availability,scalability,flexibility,reduced time to market,and dynamic access to computing resources.Enterprises can improve the successful adoption rate... The advantages of a cloud computing service are cost advantages,availability,scalability,flexibility,reduced time to market,and dynamic access to computing resources.Enterprises can improve the successful adoption rate of cloud computing services if they understand the critical factors.Tofind critical factors,this studyfirst reviewed the literature and established a three-layer hierarch-ical factor table for adopting a cloud computing service based on the Technology-Organization-Environment framework.Then,a hybrid method that combines two multi-criteria decision-making tools—called the Fuzzy Analytic Network Process method and the concept of VlseKriterijumska Optimizacija I Kompromisno Resenje acceptable advantage—was used to objectively identify critical factors for the adop-tion of a cloud computing service,replacing the subjective decision of the authors.The results of this study determinedfive critical factors,namely data access secur-ity,information transmission security,senior management support,fallback cloud management,and employee acceptance.Finally,the paper presents thefindings and implications of the study. 展开更多
关键词 cloud computing service multi-criteria decision-making critical factors fuzzy analytic network process vlseKriterijumska optimizacija i kompromisno resenje technology-organization-environment
下载PDF
Power Grid Islands Service Restoration Based on Cloud Computing 被引量:14
12
作者 ZHANG Hao HE Jinghan +2 位作者 YIN Hang BO Zhiqian B Kirby 《中国电机工程学报》 EI CSCD 北大核心 2011年第34期I0007-I0007,9,共1页
提出了一种基于云计算思想的电网恢复重构方法,利用网络中大量的分布式计算资源加速求取孤岛间网络恢复重构的最优解。利用电力系统分层分布式体系结构将含有多个微网的复杂配电网络视为不同的子云计算区,每个子云计算区根据自身情况将... 提出了一种基于云计算思想的电网恢复重构方法,利用网络中大量的分布式计算资源加速求取孤岛间网络恢复重构的最优解。利用电力系统分层分布式体系结构将含有多个微网的复杂配电网络视为不同的子云计算区,每个子云计算区根据自身情况将重构的服务请求分解为多个可独立处理的计算块并提交分布的计算节点进行并行处理和结果取优。相关联子云计算区之间可通信以协调不同区域间的负荷转供,最终实现故障恢复重构的目标。算例分析结果验证了该方法的有效性。 展开更多
关键词 英文摘要 内容介绍 编辑工作 期刊
下载PDF
Security Implications of Edge Computing in Cloud Networks 被引量:1
13
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge computing cloud networks Artificial Intelligence Machine Learning cloud Security
下载PDF
Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System 被引量:8
14
作者 Zhen Chen Fuye Han +2 位作者 Junwei Cao Xin Jiang Shuo Chen 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期40-50,共11页
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bot... Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud- based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively. 展开更多
关键词 cloud computing overlay network collaborative network security system computer forensics anti-botnet ANTI-PHISHING hadoop file system EUCALYPTUS amazon web service
原文传递
Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing 被引量:5
15
作者 Zhen Chen Wenyu Dong +3 位作者 Hang Li Peng Zhang Xinming Chen Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第1期82-94,共13页
A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile... A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile applications for millions of users by taking advantage of the scale and flexibility of shared physical infrastructures provided by cloud computing. In this scenario, multiple tenants save their data and applications in shared data centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used n a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet nspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for ntelligence flow processing to protect from possible network attacks inside a data center network 展开更多
关键词 data center network network security software defined network collaborative network security multi- tenant network virtualization intelligent flow processing cloud computing
原文传递
Review:Data center network architecture in cloud computing:review, taxonomy, and open research issues 被引量:2
16
作者 Han QI Muhammad SHIRAZ +3 位作者 Jie-yao LIU Abdullah GANI Zulkanain ABDUL RAHMAN Torki A.ALTAMEEM 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2014年第9期776-793,共18页
The data center network(DCN), which is an important component of data centers, consists of a large number of hosted servers and switches connected with high speed communication links. A DCN enables the deployment of r... The data center network(DCN), which is an important component of data centers, consists of a large number of hosted servers and switches connected with high speed communication links. A DCN enables the deployment of resources centralization and on-demand access of the information and services of data centers to users. In recent years, the scale of the DCN has constantly increased with the widespread use of cloud-based services and the unprecedented amount of data delivery in/between data centers, whereas the traditional DCN architecture lacks aggregate bandwidth, scalability, and cost effectiveness for coping with the increasing demands of tenants in accessing the services of cloud data centers. Therefore, the design of a novel DCN architecture with the features of scalability, low cost, robustness, and energy conservation is required. This paper reviews the recent research findings and technologies of DCN architectures to identify the issues in the existing DCN architectures for cloud computing. We develop a taxonomy for the classification of the current DCN architectures, and also qualitatively analyze the traditional and contemporary DCN architectures. Moreover, the DCN architectures are compared on the basis of the significant characteristics, such as bandwidth, fault tolerance, scalability, overhead, and deployment cost. Finally, we put forward open research issues in the deployment of scalable, low-cost, robust, and energy-efficient DCN architecture, for data centers in computational clouds. 展开更多
关键词 Data center network cloud computing ARCHITECTURE network topology
原文传递
Research on multi-terminal traveling wave fault location method in complicated networks based on cloud computing platform 被引量:12
17
作者 Feng Deng Xiangjun Zeng Lanlan Pan 《Protection and Control of Modern Power Systems》 2017年第1期199-210,共12页
Cloud computing technology is used in traveling wave fault location,which establishes a new technology platform for multi-terminal traveling wave fault location in complicated power systems.In this paper,multi-termina... Cloud computing technology is used in traveling wave fault location,which establishes a new technology platform for multi-terminal traveling wave fault location in complicated power systems.In this paper,multi-terminal traveling wave fault location network is developed,and massive data storage,management,and algorithm realization are implemented in the cloud computing platform.Based on network topology structure,the section connecting points for any lines and corresponding detection placement in the loop are determined first.The loop is divided into different sections,in which the shortest transmission path for any of the fault points is directly and uniquely obtained.In order to minimize the number of traveling wave acquisition unit(TWU),multi-objective optimal configuration model for TWU is then set up based on network full observability.Finally,according to the TWU distribution,fault section can be located by using temporal correlation,and the final fault location point can be precisely calculated by fusing all the times recorded in TWU.PSCAD/EMTDC simulation results show that the proposed method can quickly,accurately,and reliably locate the fault point under limited TWU with optimal placement. 展开更多
关键词 Wide Area network Fault location Traveling wave Junction Point between Sections cloud computing platform
原文传递
Computing Power Network:The Architecture of Convergence of Computing and Networking towards 6G Requirement 被引量:32
18
作者 Xiongyan Tang Chang Cao +4 位作者 Youxiang Wang Shuai Zhang Ying Liu Mingxuan Li Tao He 《China Communications》 SCIE CSCD 2021年第2期175-185,共11页
In 6G era,service forms in which computing power acts as the core will be ubiquitous in the network.At the same time,the collaboration among edge computing,cloud computing and network is needed to support edge computi... In 6G era,service forms in which computing power acts as the core will be ubiquitous in the network.At the same time,the collaboration among edge computing,cloud computing and network is needed to support edge computing service with strong demand for computing power,so as to realize the optimization of resource utilization.Based on this,the article discusses the research background,key techniques and main application scenarios of computing power network.Through the demonstration,it can be concluded that the technical solution of computing power network can effectively meet the multi-level deployment and flexible scheduling needs of the future 6G business for computing,storage and network,and adapt to the integration needs of computing power and network in various scenarios,such as user oriented,government enterprise oriented,computing power open and so on. 展开更多
关键词 6G edge computing cloud computing convergence of cloud and network computing power network
下载PDF
A Novel Load Balancing Strategy of Software-Defined Cloud/Fog Networking in the Internet of Vehicles 被引量:13
19
作者 Xiuli He Zhiyuan Ren +1 位作者 Chenhua Shi Jian Fang 《China Communications》 SCIE CSCD 2016年第S2期140-149,共10页
The Internet of Vehicles(IoV)has been widely researched in recent years,and cloud computing has been one of the key technologies in the IoV.Although cloud computing provides high performance compute,storage and networ... The Internet of Vehicles(IoV)has been widely researched in recent years,and cloud computing has been one of the key technologies in the IoV.Although cloud computing provides high performance compute,storage and networking services,the IoV still suffers with high processing latency,less mobility support and location awareness.In this paper,we integrate fog computing and software defined networking(SDN) to address those problems.Fog computing extends computing and storing to the edge of the network,which could decrease latency remarkably in addition to enable mobility support and location awareness.Meanwhile,SDN provides flexible centralized control and global knowledge to the network.In order to apply the software defined cloud/fog networking(SDCFN) architecture in the IoV effectively,we propose a novel SDN-based modified constrained optimization particle swarm optimization(MPSO-CO) algorithm which uses the reverse of the flight of mutation particles and linear decrease inertia weight to enhance the performance of constrained optimization particle swarm optimization(PSO-CO).The simulation results indicate that the SDN-based MPSO-CO algorithm could effectively decrease the latency and improve the quality of service(QoS) in the SDCFN architecture. 展开更多
关键词 internet of vehicles cloud computing cloud/fog network software defined networking load balancing
下载PDF
An Anomalous Behavior Detection Model in Cloud Computing 被引量:5
20
作者 Xiaoming Ye Xingshu Chen +4 位作者 Haizhou Wang Xuemei Zeng Guolin Shao Xueyuan Yin Chun Xu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期322-332,共11页
This paper proposes an anomalous behavior detection model based on cloud computing. Virtual Machines (VMs) are one of the key components of cloud Infrastructure as a Service (laaS). The security of such VMs is cri... This paper proposes an anomalous behavior detection model based on cloud computing. Virtual Machines (VMs) are one of the key components of cloud Infrastructure as a Service (laaS). The security of such VMs is critical to laaS security. Many studies have been done on cloud computing security issues, but research into VM security issues, especially regarding VM network traffic anomalous behavior detection, remains inadequate. More and more studies show that communication among internal nodes exhibits complex patterns. Communication among VMs in cloud computing is invisible. Researchers find such issues challenging, and few solutions have been proposed--leaving cloud computing vulnerable to network attacks. This paper proposes a model that uses Software-Defined Networks (SDN) to implement traffic redirection. Our model can capture inter-VM traffic, detect known and unknown anomalous network behaviors, adopt hybrid techniques to analyze VM network behaviors, and control network systems. The experimental results indicate that the effectiveness of our approach is greater than 90%, and prove the feasibility of the model. 展开更多
关键词 virtual machine network behavior anomaly detection cloud computing
原文传递
上一页 1 2 99 下一页 到第
使用帮助 返回顶部