High availability is a critical mission for business system. At first, an instance of business system OPENSTOCK for pharmacy is introduced including both client and server sides. Secondly, a solution to the high avail...High availability is a critical mission for business system. At first, an instance of business system OPENSTOCK for pharmacy is introduced including both client and server sides. Secondly, a solution to the high availability of this system is given in detail, including design and implementation. The essentiality of this solution consists of scope of system information, system parameter tables of service status, schedule strategies of load ba lance and how to acquire system parameters and detect service states. The solution proposed is scalable and application oriented and supporting load balance for high performance and fault tolerate for high reliability. This application system has been applied and verified realistically, and the features of this business system derived in this paper have been achieved.展开更多
The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of...The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of what IAD will be or could be, we should firstexamine what is currently available. This research focuses on an investigation of selected Webvendors, which are typical and most influential in providing Internet related services for the AECindustry. By comparing and analyzing their functionality, services provided, business models,technology and financial situation, we have seen that Internet application in the AEC industry isstill in early stage, especially in the area of on-line engineering consulting for architects.展开更多
The collector managed inventory(CMI)management idea is introduced based on the comparison of manufacturer and third-party logistics(3PL)implementing vendor managed inventory(VMI)services.Considering recovery costs,the...The collector managed inventory(CMI)management idea is introduced based on the comparison of manufacturer and third-party logistics(3PL)implementing vendor managed inventory(VMI)services.Considering recovery costs,the service pricing strategies for 3PL corporations implementing VMI are studied to meet two conditions of participation constraints and incentive-compatibility constraints.The numerical simulation results indicate that the supply chain partners' profits change after considering recovery costs,and the 3PL corporation's profits and the total profits increase first,and then decrease.The retailers' and manufacturers' profits also increase.The total profits of the supply chain have a characteristic of increasing first and then decreasing with the increase of the callback ratio of unsold products.The concrete extremum point is codetermined by price flexibility,service pricing of the 3PL corporation,callback price and callback ratio.展开更多
The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in...The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants.展开更多
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system...Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.展开更多
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for ...With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely.展开更多
文摘High availability is a critical mission for business system. At first, an instance of business system OPENSTOCK for pharmacy is introduced including both client and server sides. Secondly, a solution to the high availability of this system is given in detail, including design and implementation. The essentiality of this solution consists of scope of system information, system parameter tables of service status, schedule strategies of load ba lance and how to acquire system parameters and detect service states. The solution proposed is scalable and application oriented and supporting load balance for high performance and fault tolerate for high reliability. This application system has been applied and verified realistically, and the features of this business system derived in this paper have been achieved.
文摘The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of what IAD will be or could be, we should firstexamine what is currently available. This research focuses on an investigation of selected Webvendors, which are typical and most influential in providing Internet related services for the AECindustry. By comparing and analyzing their functionality, services provided, business models,technology and financial situation, we have seen that Internet application in the AEC industry isstill in early stage, especially in the area of on-line engineering consulting for architects.
基金The National Key Technology R&D Program of China during the11th Five-Year Plan Period(No.2006BAH02A06).
文摘The collector managed inventory(CMI)management idea is introduced based on the comparison of manufacturer and third-party logistics(3PL)implementing vendor managed inventory(VMI)services.Considering recovery costs,the service pricing strategies for 3PL corporations implementing VMI are studied to meet two conditions of participation constraints and incentive-compatibility constraints.The numerical simulation results indicate that the supply chain partners' profits change after considering recovery costs,and the 3PL corporation's profits and the total profits increase first,and then decrease.The retailers' and manufacturers' profits also increase.The total profits of the supply chain have a characteristic of increasing first and then decreasing with the increase of the callback ratio of unsold products.The concrete extremum point is codetermined by price flexibility,service pricing of the 3PL corporation,callback price and callback ratio.
基金supported in part by the National Nature Science Foundation of China under Grant No.61402413 and 61340058 the "Six Kinds Peak Talents Plan" project of Jiangsu Province under Grant No.ll-JY-009+2 种基金the Nature Science Foundation of Zhejiang Province under Grant No.LY14F020019, Z14F020006 and Y1101183the China Postdoctoral Science Foundation funded project under Grant No.2012M511732Jiangsu Province Postdoctoral Science Foundation funded project Grant No.1102014C
文摘The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants.
基金partially supported by grants from the China 863 High-tech Program (Grant No. 2015AA016002)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20131103120001)+2 种基金the National Key Research and Development Program of China (Grant No. 2016YFB0800204)the National Science Foundation of China (No. 61502017)the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024)
文摘Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.
基金supported in part by NSFC under Grant No.61172090National Science and Technology Major Project under Grant 2012ZX03002001+3 种基金Research Fund for the Doctoral Program of Higher Education of China under Grant No.20120201110013Scientific and Technological Project in Shaanxi Province under Grant(No.2012K06-30, No.2014JQ8322)Basic Science Research Fund in Xi'an Jiaotong University(No. XJJ2014049,No.XKJC2014008)Shaanxi Science and Technology Innovation Project (2013SZS16-Z01/P01/K01)
文摘With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely.