为了解决IaaS(Infrastructure as a Service)云的工作流调度优化问题,提出基于预算约束的工作流调度算法。以最小化工作流调度时长为目标,算法分调度任务选择和虚拟机实例选择两阶段进行。第一阶段将工作流任务依据依赖关系作层次划分,...为了解决IaaS(Infrastructure as a Service)云的工作流调度优化问题,提出基于预算约束的工作流调度算法。以最小化工作流调度时长为目标,算法分调度任务选择和虚拟机实例选择两阶段进行。第一阶段将工作流任务依据依赖关系作层次划分,同层次组成包任务,以Min-Max方法对层次任务估算时间作标准化处理,定义最迟完成时间与最早完成时间差值最大者为调度任务;第二阶段在期望预算下以最早完成时间最小为标准选择资源,实现任务与资源间的映射。利用算例阐述了算法实现过程,并通过仿真实验测试了算法性能。结果证实,改进算法执行效率与调度成功率优于同类算法。展开更多
IaaS (Infrastructure as a Platform) public cloud is one mainstream service mode for public cloud computing. The design aim of one IaaS public cloud is to enlarge the hardware-usage of whole platform, optimize the virt...IaaS (Infrastructure as a Platform) public cloud is one mainstream service mode for public cloud computing. The design aim of one IaaS public cloud is to enlarge the hardware-usage of whole platform, optimize the virtual machine deployment and enhance the accept rate of service demand. In this paper we create one service model for IaaS public cloud, and based on the waiting-line theory to optimize the service model, the queue length and the configuration of scheduling server. And create one demand-vector based scheduling model, to filter the available host machine according to the match of demand and metadata of available resource. The scheduling model can be bonded with the virtual machine motion to reallocate the resources to guarantee the available rate of the whole platform. The feasibility of the algorithm is verified on our own IaaS public cloud computing platform.展开更多
Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing o...Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency.展开更多
The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data services.It utilizes on-demand resource pr...The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data services.It utilizes on-demand resource provisioning,but the necessitated constraints of rapid turnaround time,minimal execution cost,high rate of resource utilization and limited makespan transforms the Load Balancing(LB)process-based Task Scheduling(TS)problem into an NP-hard optimization issue.In this paper,Hybrid Prairie Dog and Beluga Whale Optimization Algorithm(HPDBWOA)is propounded for precise mapping of tasks to virtual machines with the due objective of addressing the dynamic nature of cloud environment.This capability of HPDBWOA helps in decreasing the SLA violations and Makespan with optimal resource management.It is modelled as a scheduling strategy which utilizes the merits of PDOA and BWOA for attaining reactive decisions making with respect to the process of assigning the tasks to virtual resources by considering their priorities into account.It addresses the problem of pre-convergence with wellbalanced exploration and exploitation to attain necessitated Quality of Service(QoS)for minimizing the waiting time incurred during TS process.It further balanced exploration and exploitation rates for reducing the makespan during the task allocation with complete awareness of VM state.The results of the proposed HPDBWOA confirmed minimized energy utilization of 32.18% and reduced cost of 28.94% better than approaches used for investigation.The statistical investigation of the proposed HPDBWOA conducted using ANOVA confirmed its efficacy over the benchmarked systems in terms of throughput,system,and response time.展开更多
The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud se...The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets.展开更多
针对Iaa S(infrastructure as a service)环境下虚拟机通信数据在共享网络基础设施中的安全性问题,提出了一种虚拟机无代理通信加密机制。该机制通过加载于虚拟化节点内的加密模块与平台统一加密控制器间的协作,实现了Iaa S环境下虚拟...针对Iaa S(infrastructure as a service)环境下虚拟机通信数据在共享网络基础设施中的安全性问题,提出了一种虚拟机无代理通信加密机制。该机制通过加载于虚拟化节点内的加密模块与平台统一加密控制器间的协作,实现了Iaa S环境下虚拟机通信无代理按需加密;同时,引入通信加密策略有效性保障机制,保障了虚拟机全生命周期内的通信加密策略有效性。实验结果表明,该机制在引入较小性能开销的前提下,可以有效实现虚拟机通信加密,并保障虚拟机全生命周期内加密策略的有效性。展开更多
针对网络化模拟训练真实感不强,训练效率低等问题,提出了一种Iaa S(Infrastructure as a Service)模式的"云训练"。阐述了"云训练"的体系结构和运行模式,研究了"云训练"的3项核心技术。通过GPU虚拟化技...针对网络化模拟训练真实感不强,训练效率低等问题,提出了一种Iaa S(Infrastructure as a Service)模式的"云训练"。阐述了"云训练"的体系结构和运行模式,研究了"云训练"的3项核心技术。通过GPU虚拟化技术解决云环境中终端用户3D图形图像处理能力弱的问题。根据模拟训练特点,建立用户需求模型,将模糊理论引入资源调度技术中,实现虚拟资源的动态调度;结合检查点回滚、虚拟机备份和虚拟机迁移技术,实现系统高效动态容错,保证了系统的稳定性与可靠性。实验证明,"云训练"系统改善了传统模拟训练系统中资源的按需共享能力,提升了资源利用率,保证了模拟训练效果。展开更多
针对IaaS(Infrastructure as a Service)云平台中用户异常行为的检测问题,提出了一种基于用户行为模型和神经网络相结合的异常检测方法.该方法通过构造一种基于时间、地点和事件的用户行为模型,在此基础上建立用户的正常行为模式,并与...针对IaaS(Infrastructure as a Service)云平台中用户异常行为的检测问题,提出了一种基于用户行为模型和神经网络相结合的异常检测方法.该方法通过构造一种基于时间、地点和事件的用户行为模型,在此基础上建立用户的正常行为模式,并与神经网络算法相结合,将用户当前行为网络输出值与给定阈值进行比较,以此来判断用户的行为是否异常,从而实现用户行为的异常检测.实验结果表明,相比其它类似的用户行为检测方法,该方法能更有效发现用户的异常行为.展开更多
基础设施即服务(infrastructure as a service,IaaS)模式"云训练"是基于IaaS云计算提出的武器装备系统模拟训练的模式,根据用户需求对训练资源进行预测调度是提高训练效果的重要保证。分析了"云训练"中用户任务、...基础设施即服务(infrastructure as a service,IaaS)模式"云训练"是基于IaaS云计算提出的武器装备系统模拟训练的模式,根据用户需求对训练资源进行预测调度是提高训练效果的重要保证。分析了"云训练"中用户任务、资源需求特点,采用阈值法进行预处理,通过动态权值系综模型得到预处理结果。在此基础上,提出基于减法-模糊聚类的模糊神经网络的资源需求预测方法(subtractive-fuzzy clustering based fuzzy neural network,SFCFNN),并引入自适应学习率和动量项以提升收敛速度和稳定性。调度器根据预测结果实现用户需求与资源之间的动态匹配。实验表明该方法可精确预测用户资源需求,实现资源动态调度,有效提高资源利用率与训练效果。展开更多
文摘为了解决IaaS(Infrastructure as a Service)云的工作流调度优化问题,提出基于预算约束的工作流调度算法。以最小化工作流调度时长为目标,算法分调度任务选择和虚拟机实例选择两阶段进行。第一阶段将工作流任务依据依赖关系作层次划分,同层次组成包任务,以Min-Max方法对层次任务估算时间作标准化处理,定义最迟完成时间与最早完成时间差值最大者为调度任务;第二阶段在期望预算下以最早完成时间最小为标准选择资源,实现任务与资源间的映射。利用算例阐述了算法实现过程,并通过仿真实验测试了算法性能。结果证实,改进算法执行效率与调度成功率优于同类算法。
文摘IaaS (Infrastructure as a Platform) public cloud is one mainstream service mode for public cloud computing. The design aim of one IaaS public cloud is to enlarge the hardware-usage of whole platform, optimize the virtual machine deployment and enhance the accept rate of service demand. In this paper we create one service model for IaaS public cloud, and based on the waiting-line theory to optimize the service model, the queue length and the configuration of scheduling server. And create one demand-vector based scheduling model, to filter the available host machine according to the match of demand and metadata of available resource. The scheduling model can be bonded with the virtual machine motion to reallocate the resources to guarantee the available rate of the whole platform. The feasibility of the algorithm is verified on our own IaaS public cloud computing platform.
文摘Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency.
文摘The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data services.It utilizes on-demand resource provisioning,but the necessitated constraints of rapid turnaround time,minimal execution cost,high rate of resource utilization and limited makespan transforms the Load Balancing(LB)process-based Task Scheduling(TS)problem into an NP-hard optimization issue.In this paper,Hybrid Prairie Dog and Beluga Whale Optimization Algorithm(HPDBWOA)is propounded for precise mapping of tasks to virtual machines with the due objective of addressing the dynamic nature of cloud environment.This capability of HPDBWOA helps in decreasing the SLA violations and Makespan with optimal resource management.It is modelled as a scheduling strategy which utilizes the merits of PDOA and BWOA for attaining reactive decisions making with respect to the process of assigning the tasks to virtual resources by considering their priorities into account.It addresses the problem of pre-convergence with wellbalanced exploration and exploitation to attain necessitated Quality of Service(QoS)for minimizing the waiting time incurred during TS process.It further balanced exploration and exploitation rates for reducing the makespan during the task allocation with complete awareness of VM state.The results of the proposed HPDBWOA confirmed minimized energy utilization of 32.18% and reduced cost of 28.94% better than approaches used for investigation.The statistical investigation of the proposed HPDBWOA conducted using ANOVA confirmed its efficacy over the benchmarked systems in terms of throughput,system,and response time.
文摘The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets.
文摘针对Iaa S(infrastructure as a service)环境下虚拟机通信数据在共享网络基础设施中的安全性问题,提出了一种虚拟机无代理通信加密机制。该机制通过加载于虚拟化节点内的加密模块与平台统一加密控制器间的协作,实现了Iaa S环境下虚拟机通信无代理按需加密;同时,引入通信加密策略有效性保障机制,保障了虚拟机全生命周期内的通信加密策略有效性。实验结果表明,该机制在引入较小性能开销的前提下,可以有效实现虚拟机通信加密,并保障虚拟机全生命周期内加密策略的有效性。
文摘针对网络化模拟训练真实感不强,训练效率低等问题,提出了一种Iaa S(Infrastructure as a Service)模式的"云训练"。阐述了"云训练"的体系结构和运行模式,研究了"云训练"的3项核心技术。通过GPU虚拟化技术解决云环境中终端用户3D图形图像处理能力弱的问题。根据模拟训练特点,建立用户需求模型,将模糊理论引入资源调度技术中,实现虚拟资源的动态调度;结合检查点回滚、虚拟机备份和虚拟机迁移技术,实现系统高效动态容错,保证了系统的稳定性与可靠性。实验证明,"云训练"系统改善了传统模拟训练系统中资源的按需共享能力,提升了资源利用率,保证了模拟训练效果。
文摘针对IaaS(Infrastructure as a Service)云平台中用户异常行为的检测问题,提出了一种基于用户行为模型和神经网络相结合的异常检测方法.该方法通过构造一种基于时间、地点和事件的用户行为模型,在此基础上建立用户的正常行为模式,并与神经网络算法相结合,将用户当前行为网络输出值与给定阈值进行比较,以此来判断用户的行为是否异常,从而实现用户行为的异常检测.实验结果表明,相比其它类似的用户行为检测方法,该方法能更有效发现用户的异常行为.
文摘基础设施即服务(infrastructure as a service,IaaS)模式"云训练"是基于IaaS云计算提出的武器装备系统模拟训练的模式,根据用户需求对训练资源进行预测调度是提高训练效果的重要保证。分析了"云训练"中用户任务、资源需求特点,采用阈值法进行预处理,通过动态权值系综模型得到预处理结果。在此基础上,提出基于减法-模糊聚类的模糊神经网络的资源需求预测方法(subtractive-fuzzy clustering based fuzzy neural network,SFCFNN),并引入自适应学习率和动量项以提升收敛速度和稳定性。调度器根据预测结果实现用户需求与资源之间的动态匹配。实验表明该方法可精确预测用户资源需求,实现资源动态调度,有效提高资源利用率与训练效果。