随着市场竞争的日趋激烈,基础设施即服务(IaaS:Infrastructure as a Service)提供商要在竞争中胜出,很大程度上取决于其对产品的合理定价。考察一个拥有两种互补云计算资源的IaaS提供商,针对预留类产品的三种销售模式(单独销售、捆绑销...随着市场竞争的日趋激烈,基础设施即服务(IaaS:Infrastructure as a Service)提供商要在竞争中胜出,很大程度上取决于其对产品的合理定价。考察一个拥有两种互补云计算资源的IaaS提供商,针对预留类产品的三种销售模式(单独销售、捆绑销售和混合销售),比较不同模式下的最优定价和IaaS提供商的利润情况。研究表明:(1)对于IaaS提供商而言,选择混合销售时利润最大,若其只能选择非混合销售,则当资源间互补性较强、且用户对捆绑折扣价格较为敏感时,选择捆绑销售,否则选择单独销售。(2)对于用户而言,捆绑产品用户最偏好捆绑销售,非捆绑产品用户最偏好混合销售。(3)灵敏度分析的结果表明,当资源间互补系数越小时,IaaS提供商的利润越大,混合销售的盈利优势越不明显。展开更多
At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model ...At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method.展开更多
<b>Purpose: </b><span style="font-family:;" "="">An element of poor service delivery concerns the quality of management on the maintenance of services like water, electricity...<b>Purpose: </b><span style="font-family:;" "="">An element of poor service delivery concerns the quality of management on the maintenance of services like water, electricity, roads, schools and clinics. This is a relevant and topical issue for research because of the current situatio<span>n regarding these provisions in South Africa. This research took place in a Municipality situated in Limpopo Province, South Africa. It is the responsibility of municipalities to ensure that they fulfil their constitutional obligations in the delivery of maintainable, operative and well-organised</span> municipal services through the maintenance of infrastructure. As this country has been subjected to a large number of service delivery complaints, this has led to the motivation of this study. The purpose of this study is to analyse maintenance on municipal infrastructure and service delivery in a local municipality, in particular focusing on the water supply. This research study is aimed at analysing how local municipality conducts its maintenance of municipal infrastructure, seeking to understand the challenge of maintenance on service provided to the communities. <b>Design/Methodology/Approach: </b>To achieve the success of this research, both qualitative and quantitative methods were adopted. A survey questionnaire and structured interview questions were conducted with communities and employees in a municipality in Limpopo Province. <b>Findings: </b>The results of the study revealed that residents are facing water difficulties due to a lack of maintenance and absence of water supply. People are fetching water from the rivers in the nearby community, water which unfortunately is not purified. Furthermore, people have experienced this poor maintenance and service delivery for years, negatively impacting on the community’s standard of living. <b>Originality/Value: </b>The original contribution of this work was to analyse the types of maintenance being used in local municipalities and how it will benefit the communities. To the best of the authors’ understanding</span><span style="font-family:;" "="">,</span><span style="font-family:;" "=""> there are no studies that have been conducted in South Africa regarding the impact of maintenance on municipal infrastructure, and this paper aim</span><span style="font-family:;" "="">s</span><span style="font-family:;" "=""> to fill this gap.</span>展开更多
The controlling and processing service and supporting environment for the enterprise business processes in HIT-IIS, a prototype of the CIM-OSA-IIS, are introduced.The detailed design about the business process service...The controlling and processing service and supporting environment for the enterprise business processes in HIT-IIS, a prototype of the CIM-OSA-IIS, are introduced.The detailed design about the business process services and the front-end services of HIT-IIS art given. It is focused on the structure, organization and workflow of the services ard environment.展开更多
e-Infrastructures became critical platforms that integrate computational resources, facilities and repositories globally. The coordination and harmonization of advanced e-Infrastructure project developed with partners...e-Infrastructures became critical platforms that integrate computational resources, facilities and repositories globally. The coordination and harmonization of advanced e-Infrastructure project developed with partners from Europe, Latin America, Arabia, Africa, China, and India contributed to developing interoperable platforms based on identity federation and science gateway technologies. This paper presents these technologies to support key services in the development of Arabia networking and services platform for research and education. The platform provides scientists, teachers, and students with seamless access to a variety of advanced resources, services, and applications available at regional e-Infrastructures in Europe and elsewhere. Users simply enter the credentials provided by their home institutions to get authenticated and do not need digital certificate-based mechanisms. Twenty applications from five scientific domains were deployed and integrated. Results showed that on average about 35,000 monthly jobs are running for a total of about 17,500 CPU wall-clock hours. Therefore, seamlessly integrated e-Infrastructures for regional e-Science activities are important resources that support scientists, students, and faculty with computational services and linkage to global research communities.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
基础设施即服务(infrastructure as a service,IaaS)模式"云训练"是基于IaaS云计算提出的武器装备系统模拟训练的模式,根据用户需求对训练资源进行预测调度是提高训练效果的重要保证。分析了"云训练"中用户任务、...基础设施即服务(infrastructure as a service,IaaS)模式"云训练"是基于IaaS云计算提出的武器装备系统模拟训练的模式,根据用户需求对训练资源进行预测调度是提高训练效果的重要保证。分析了"云训练"中用户任务、资源需求特点,采用阈值法进行预处理,通过动态权值系综模型得到预处理结果。在此基础上,提出基于减法-模糊聚类的模糊神经网络的资源需求预测方法(subtractive-fuzzy clustering based fuzzy neural network,SFCFNN),并引入自适应学习率和动量项以提升收敛速度和稳定性。调度器根据预测结果实现用户需求与资源之间的动态匹配。实验表明该方法可精确预测用户资源需求,实现资源动态调度,有效提高资源利用率与训练效果。展开更多
针对虚拟化IaaS(Infrastructure as a Service)环境下的安全隔离及访问控制问题进行了研究,通过系统地研究IaaS环境下的安全隔离与访问控制需求,以安全域划分原则为指导,从网络基础设施、域边界管控、安全支撑性基础设施方面综合考虑,...针对虚拟化IaaS(Infrastructure as a Service)环境下的安全隔离及访问控制问题进行了研究,通过系统地研究IaaS环境下的安全隔离与访问控制需求,以安全域划分原则为指导,从网络基础设施、域边界管控、安全支撑性基础设施方面综合考虑,系统地构建了IaaS平台网络安全域模型;并重点针对IaaS平台特有的共享多租户环境,抽象了租户域要素并构建了租户域模型.进一步地,在所构建的安全域模型的基础上,结合云计算环境下资源动态性、云资源具有时效性等因素,从用户业务会话访问控制的角度出发,基于RBAC(Role-Based Access Control)模型及UCON(Usage CONtrol)模型构建了包括用户、角色、权限、资源、授权规则等元素的云资源访问控制模型CloudAC,从而保障虚拟化IaaS环境下用户对云资源访问的安全性.实践表明,依据提出的安全域模型构建的云计算IaaS环境,可以有效地保障不同业务功能网络的安全隔离;利用基于租户域或租户子域构建的隔离网络环境,可以在较小的管理与资源开销下为租户提供灵活的域划分能力,让租户可以依据业务安全需求自主构建隔离与边界可控的网络环境,消除了传统方式下进行网络分段时对物理网络或物理防火墙的配置需求;并使业务环境具有纵深防御能力.同时,依据所构建的云资源访问控制模型,可以灵活构建具有权限分离、用户属性与云资源属性约束、云资源租赁时间约束、虚拟机资源隔离性增强特性的云资源访问控制系统,且相关属性与约束元素可结合业务需求按需扩充,从而能够更好地满足云环境下具有多租户共享、动态特性的云资源访问控制需求.展开更多
通过总结所有IaaS(infrastructure as a service)云服务定价的方法,明确了pay-per-use和subscription是目前业界普遍采用的两种定价方法,分析了IaaS云服务定价影响因素,并把IaaS云计算服务的五大基础参数(初始投资、合同期限、资源折旧...通过总结所有IaaS(infrastructure as a service)云服务定价的方法,明确了pay-per-use和subscription是目前业界普遍采用的两种定价方法,分析了IaaS云服务定价影响因素,并把IaaS云计算服务的五大基础参数(初始投资、合同期限、资源折旧、服务质量和资源年限)映射到BSM模型中,利用复利摩尔定律和BSM模型公式计算出IaaS云服务在两种定价方法(pay-per-use和subscription)下相对应的价格范围,并分析了两种定价方法的适应范围,更好地解决了现阶段对于IaaS云服务定价中只有云计算服务提供商单边定价的弊端,并从云计算服务提供商和用户两者的角度提供了对于IaaS服务价格的衡量标准。展开更多
文摘随着市场竞争的日趋激烈,基础设施即服务(IaaS:Infrastructure as a Service)提供商要在竞争中胜出,很大程度上取决于其对产品的合理定价。考察一个拥有两种互补云计算资源的IaaS提供商,针对预留类产品的三种销售模式(单独销售、捆绑销售和混合销售),比较不同模式下的最优定价和IaaS提供商的利润情况。研究表明:(1)对于IaaS提供商而言,选择混合销售时利润最大,若其只能选择非混合销售,则当资源间互补性较强、且用户对捆绑折扣价格较为敏感时,选择捆绑销售,否则选择单独销售。(2)对于用户而言,捆绑产品用户最偏好捆绑销售,非捆绑产品用户最偏好混合销售。(3)灵敏度分析的结果表明,当资源间互补系数越小时,IaaS提供商的利润越大,混合销售的盈利优势越不明显。
基金National Natural Science Foundation of China(No.61462070)the"ChunHui Plan"Project of Educational Department,China(No.Z2009-1-01062)the Research of Evaluation Technology of Security and Reliability of Cloud Computing and the Built of Testing Platform That is a Technology Plan Project of Inner Mongolia,China
文摘At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method.
文摘<b>Purpose: </b><span style="font-family:;" "="">An element of poor service delivery concerns the quality of management on the maintenance of services like water, electricity, roads, schools and clinics. This is a relevant and topical issue for research because of the current situatio<span>n regarding these provisions in South Africa. This research took place in a Municipality situated in Limpopo Province, South Africa. It is the responsibility of municipalities to ensure that they fulfil their constitutional obligations in the delivery of maintainable, operative and well-organised</span> municipal services through the maintenance of infrastructure. As this country has been subjected to a large number of service delivery complaints, this has led to the motivation of this study. The purpose of this study is to analyse maintenance on municipal infrastructure and service delivery in a local municipality, in particular focusing on the water supply. This research study is aimed at analysing how local municipality conducts its maintenance of municipal infrastructure, seeking to understand the challenge of maintenance on service provided to the communities. <b>Design/Methodology/Approach: </b>To achieve the success of this research, both qualitative and quantitative methods were adopted. A survey questionnaire and structured interview questions were conducted with communities and employees in a municipality in Limpopo Province. <b>Findings: </b>The results of the study revealed that residents are facing water difficulties due to a lack of maintenance and absence of water supply. People are fetching water from the rivers in the nearby community, water which unfortunately is not purified. Furthermore, people have experienced this poor maintenance and service delivery for years, negatively impacting on the community’s standard of living. <b>Originality/Value: </b>The original contribution of this work was to analyse the types of maintenance being used in local municipalities and how it will benefit the communities. To the best of the authors’ understanding</span><span style="font-family:;" "="">,</span><span style="font-family:;" "=""> there are no studies that have been conducted in South Africa regarding the impact of maintenance on municipal infrastructure, and this paper aim</span><span style="font-family:;" "="">s</span><span style="font-family:;" "=""> to fill this gap.</span>
文摘The controlling and processing service and supporting environment for the enterprise business processes in HIT-IIS, a prototype of the CIM-OSA-IIS, are introduced.The detailed design about the business process services and the front-end services of HIT-IIS art given. It is focused on the structure, organization and workflow of the services ard environment.
文摘e-Infrastructures became critical platforms that integrate computational resources, facilities and repositories globally. The coordination and harmonization of advanced e-Infrastructure project developed with partners from Europe, Latin America, Arabia, Africa, China, and India contributed to developing interoperable platforms based on identity federation and science gateway technologies. This paper presents these technologies to support key services in the development of Arabia networking and services platform for research and education. The platform provides scientists, teachers, and students with seamless access to a variety of advanced resources, services, and applications available at regional e-Infrastructures in Europe and elsewhere. Users simply enter the credentials provided by their home institutions to get authenticated and do not need digital certificate-based mechanisms. Twenty applications from five scientific domains were deployed and integrated. Results showed that on average about 35,000 monthly jobs are running for a total of about 17,500 CPU wall-clock hours. Therefore, seamlessly integrated e-Infrastructures for regional e-Science activities are important resources that support scientists, students, and faculty with computational services and linkage to global research communities.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
文摘基础设施即服务(infrastructure as a service,IaaS)模式"云训练"是基于IaaS云计算提出的武器装备系统模拟训练的模式,根据用户需求对训练资源进行预测调度是提高训练效果的重要保证。分析了"云训练"中用户任务、资源需求特点,采用阈值法进行预处理,通过动态权值系综模型得到预处理结果。在此基础上,提出基于减法-模糊聚类的模糊神经网络的资源需求预测方法(subtractive-fuzzy clustering based fuzzy neural network,SFCFNN),并引入自适应学习率和动量项以提升收敛速度和稳定性。调度器根据预测结果实现用户需求与资源之间的动态匹配。实验表明该方法可精确预测用户资源需求,实现资源动态调度,有效提高资源利用率与训练效果。
文摘针对虚拟化IaaS(Infrastructure as a Service)环境下的安全隔离及访问控制问题进行了研究,通过系统地研究IaaS环境下的安全隔离与访问控制需求,以安全域划分原则为指导,从网络基础设施、域边界管控、安全支撑性基础设施方面综合考虑,系统地构建了IaaS平台网络安全域模型;并重点针对IaaS平台特有的共享多租户环境,抽象了租户域要素并构建了租户域模型.进一步地,在所构建的安全域模型的基础上,结合云计算环境下资源动态性、云资源具有时效性等因素,从用户业务会话访问控制的角度出发,基于RBAC(Role-Based Access Control)模型及UCON(Usage CONtrol)模型构建了包括用户、角色、权限、资源、授权规则等元素的云资源访问控制模型CloudAC,从而保障虚拟化IaaS环境下用户对云资源访问的安全性.实践表明,依据提出的安全域模型构建的云计算IaaS环境,可以有效地保障不同业务功能网络的安全隔离;利用基于租户域或租户子域构建的隔离网络环境,可以在较小的管理与资源开销下为租户提供灵活的域划分能力,让租户可以依据业务安全需求自主构建隔离与边界可控的网络环境,消除了传统方式下进行网络分段时对物理网络或物理防火墙的配置需求;并使业务环境具有纵深防御能力.同时,依据所构建的云资源访问控制模型,可以灵活构建具有权限分离、用户属性与云资源属性约束、云资源租赁时间约束、虚拟机资源隔离性增强特性的云资源访问控制系统,且相关属性与约束元素可结合业务需求按需扩充,从而能够更好地满足云环境下具有多租户共享、动态特性的云资源访问控制需求.
文摘通过总结所有IaaS(infrastructure as a service)云服务定价的方法,明确了pay-per-use和subscription是目前业界普遍采用的两种定价方法,分析了IaaS云服务定价影响因素,并把IaaS云计算服务的五大基础参数(初始投资、合同期限、资源折旧、服务质量和资源年限)映射到BSM模型中,利用复利摩尔定律和BSM模型公式计算出IaaS云服务在两种定价方法(pay-per-use和subscription)下相对应的价格范围,并分析了两种定价方法的适应范围,更好地解决了现阶段对于IaaS云服务定价中只有云计算服务提供商单边定价的弊端,并从云计算服务提供商和用户两者的角度提供了对于IaaS服务价格的衡量标准。