To work out a solution for answering the question when it is suitable for emergency response strategies to be executed, an emergency algorithm for enhanced survivability of a key service is presented. First, based on ...To work out a solution for answering the question when it is suitable for emergency response strategies to be executed, an emergency algorithm for enhanced survivability of a key service is presented. First, based on the central limit theorem and the hypothesis testing theory, the confidence interval of each key service's history average service response time in the host server and the spare server can be figured out, respectively. This can also be updated dynamically by a proposed method using the method of time slide window. Then, according to the five kinds of distributed situations of the current service response time' s confidence interval in the host server and the spare server, the proposed algorithm can dynamically choose the appropriate emergency policies such as resource reconfiguration, service degradation or service drifting, etc. in fight time. Thus, the key service request can be finished within its expected deadline by users as far as possible. Furthermore, the whole process of dynamic configuration is transparent to users. Finally, simulation tests are performed to prove the feasibility.展开更多
In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all...In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all the keywords in the data collection.We then calculate the relevance scores of the elements in the similarity keyword sets by the widely used tf-idf theory.Leveraging both the similarity keyword sets and the relevance scores,we present a new secure and efficient treebased index structure for privacy-preserving top-k keyword similarity search.To prevent potential statistical attacks,we also introduce a two-server model to separate the association between the index structure and the data collection in cloud servers.Thorough analysis is given on the validity of search functionality and formal security proofs are presented for the privacy guarantee of our solution.Experimental results on real-world data sets further demonstrate the availability and efficiency of our solution.展开更多
基金Specialized Research Fund for the Doctoral Program of Higher Education (No20050217007)the Weaponry Equipment Foundation of PLA Equipment Ministry (No51416060104CB0101)
文摘To work out a solution for answering the question when it is suitable for emergency response strategies to be executed, an emergency algorithm for enhanced survivability of a key service is presented. First, based on the central limit theorem and the hypothesis testing theory, the confidence interval of each key service's history average service response time in the host server and the spare server can be figured out, respectively. This can also be updated dynamically by a proposed method using the method of time slide window. Then, according to the five kinds of distributed situations of the current service response time' s confidence interval in the host server and the spare server, the proposed algorithm can dynamically choose the appropriate emergency policies such as resource reconfiguration, service degradation or service drifting, etc. in fight time. Thus, the key service request can be finished within its expected deadline by users as far as possible. Furthermore, the whole process of dynamic configuration is transparent to users. Finally, simulation tests are performed to prove the feasibility.
基金supported partly by the following funding agencies:the National Natural Science Foundation(No.61170274)the Innovative Research Groups of the National Natural Science Foundation(No.61121061)+1 种基金the National Key Basic Research Program of China (No.2011CB302506)Youth Scientific Research and Innovation Plan of Beijing University of Posts and Telecommunications(No. 2013RC1101)
文摘In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all the keywords in the data collection.We then calculate the relevance scores of the elements in the similarity keyword sets by the widely used tf-idf theory.Leveraging both the similarity keyword sets and the relevance scores,we present a new secure and efficient treebased index structure for privacy-preserving top-k keyword similarity search.To prevent potential statistical attacks,we also introduce a two-server model to separate the association between the index structure and the data collection in cloud servers.Thorough analysis is given on the validity of search functionality and formal security proofs are presented for the privacy guarantee of our solution.Experimental results on real-world data sets further demonstrate the availability and efficiency of our solution.