Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

+ Advanced search
126 articles

Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication

Zhou Yongkai, Chen Xiao, Yin Xinxing, Zhu Yan, Li Fangbiao, Pang Liang, Xue Zhi
In this paper, we considered the joint maskedbeamforming in secure wireless transmission in which artificial noise is sent by the transmitter (Alice) and the receiver (Bob) jointly. A new and efficient optimization scheme is proposed to separately allocate the power ratio for Alice and assign the transmit...

A RESTful Web Service for Information Platform of Intelligent Transportation

Wu Ming, Liu Min, Lu Jianfeng
With the development of intelligent transportation, a large amount of heterogeneous data has emerged from various sensors and terminal applications. An efficient approach to process data is needed in information platform of intelligent transportation system (ITS). This paper presents a lightweight Representational...

Intelligent Resources Dispatching System of Urban Emergency Based on SOA and Cloud Computing

Yu Xi, Wang Can
Quick and efficient resources dispatching is the core of urban emergency processing system. In the traditional urban emergency processing system, there is a problem that resources could not be dispatched in time between all departments. In this paper, an intelligent resources dispatching system of urban...

Application of An Improved DBSCAN Algorithm in Web Text Mining

Ping Xie, Lin Zhang, Ying Wang, Qinqian Li
This paper studies the characteristics and key technology of Web text mining, and puts forward an improved DBSCAN density clustering algorithm.The algorithm combines the characteristics of hierarchical clustering effectively, it can confirmed class center well,and make the neighborhood parameter r self-adapt...

Space Target Identification based on RBF Neural Network Ensembles

Zhao Jubo
Space target identification is very important to space security. In practice, identification of satellites from space images is very useful and difficult. After preprocessing of space images, the object in the space images need to be classified as satellites or not using classification algorithms. In...

The Research on Information Collection and Retrieval Technology of Big Data based Cloud Computing

Chen Hongjun, Huang Kun
Abstract— with the rapid development of cloud computing, information shows explosive growth. The Cheap cloud storage and computing power, also contributed to the generation and applications of big data. The big data is unstructured data more than 50%, so much of them are stored as files in the file system....

Research on the Model for Cloud Security Based on SLA

Tang Guo-Chun, Wu Yan-Ping
The cloud computing applications brings a new set of information security problems. The cloud security model based on SLA (Service Level Agreement) was studied. From the security challenges of cloud computing , cloud computing security threats was analyzed comprehensively, the service level agreements...

The SLA Framework Based on Cloud Computing

Liu Xuan, Xu Feng
Service Level Agreement was put forward to protect the service quality of telecommunications. With the development of science and technology, users are increasingly concerned about the service quality of cloud computing. Service Level Agreement is not limited to the telecommunications industry. Cloud...

A Mechanism for Dependability Processing of Information Flow in Cloud Computing

Liu Hao, Huang Linpeng, Li Chen, Chen Luxi
As cloud computing becomes more and more common among enterprises and users, the dependability problem on cloud environment,especially in terms ofcorrectness, reliability, security and performance, attracts an ever increasing attention. It is therefore necessary to provide a comprehensive mechanism to...

Architectural Support for Lease-Regulated Secret Data

Ren Lanfang, Bai Hongtao, Liu Fei
Contemporary cloud software stack is large and complex, where security vulnerabilities are routinely discovered. Hence, it is hard or even impossible to place trust on such a fragile platform to process some security-critical data. In this paper, we propose an architectural solution that extends processors...

The Strategy of Classification Mining Based on Cloud Computing

Zhang Lijuan, Zhao Shuguang
Cloud computing provides cheap and efficient solutions of storing and analyzing mass data. It is very important to research the data mining strategy based on cloud computing from the theoretical view and practical view. In this paper, the strategy of classification mining in cloud computing environment...

Distributed Hybrid Cloud Architecture Based on China Education Research Network for Common Computer Test

Shi Gang, Wang Chongguo
This paper provides a hybrid cloud architecture for Computer Grade Test for Universities in Xinjiang based on China Research Education Network (CERNET), gives the resolving scheme for security, load balancing and disaster backup and develops the prototype system. The hybrid cloud architecture for Xinjiang...

The Research and Design of Cloud Computing Framework Model Based on SOA

Hui-min Zhang, Hai-rong Hu, Yang-xia Xiang, Lu-lu Fang
Cloud Computing is a new service-oriented computing paradigm.As the inheritance and development of SOA(service oriented architecture), it has become the hot point of cyber research.After introducing the characteristics of SOA and Cloud Computing,this paper analyses the relation between the SOA and Cloud...

Research of Replica Replacement Strategy Oriented Cloud Storage

Bian Genqing, Li Rong, Gong PeiJiao
The long latency on reading the files from remote node of cloud storage leads to degrade the whole system service performance and waste the network resource. In order to improve the speed of data access, replica management ability and optimize the whole system performance, the dissertation proposes a...

A new SS-closedness in L-topological spaces

Bai Shi-Zhong, Zhang Fang-Juan
By means of strongly semi-open L-sets and their inequality, a new form of SS-closedness is introduced in L- topological spaces, where L is a complete De Morgan algebra. This new form does not depend on the structure of basis lattice L and L does not require any distributivity. When L is a completely...

The platform design of the cloud instructional resources based on the Hadoop framework

Dong Xu, Huiqin Wei, Xiaoxin Zhang
With the continuous development of Internet technology, the national colleges are actively building own teaching platform and the instructional resource database. And the construction of the instructional resource platform has played a good role in improve the teaching quality. Under the background of...

Adaptive Watermarking Algorithm for Digital Image Based on Discrete Cosine Transform

Zou Xinguo, Li Na
In this paper, an adaptive watermarking algorithm is proposed for digital image based on Discrete Cosine Transform. The algorithm uses the common resampling method (bilinear interpolation) to adaptively adjust the size of the binary watermark, and scrambles it via the encryption key, finally embeds it...

Decode-and-forward plus cooperative jamming based cooperation for wireless physical layer security

Huang Shuanglin, Tan Jianjun
Abstract—In this paper, the case of one source-destination pair with the help of multiple cooperating nodes in the presence of one eavesdropper was considered to improve the performance of secure wireless communications. A novel cooperative scheme decode-and-forward plus cooperative jamming(DFCJ) was...

The Application of Cloud Computing in Large-Scale Statistic

Xiuli SUN, Ying LI, Baofang HU, Hongfeng SUN
The main challenge in current statistical work is the huge pressure of the statistical analysis along with the huge amount and diversity of the statistical data. This paper established a framework model of large-scale data processing by bringing in cloud computing. By studying the resource allocation...

Dynamic Constraint Definition Method in Cloud Databases

Xian Hequn, Li Jing, Lu Xiuqing
A dynamic database constraint definition method is presented based on metadata design, which facilitates client-side configuration of cloud database schema and consistency definition. The proposed scheme simplifies the conceptual schema designing process for cloud databases and offers more data administrative...

CRYPTO AS A SERVICE

Wang Mengzhen, Liu Li
Cloud security is one of the most important issues in practice of cloud computing. In this paper, we proposed a crypto cloud infrastructure which is inherently constructed using asymmetric cryptography. Different to the prevalent public key infrastructure (PKI) system, the crypto cloud is based on a...

On User Capacity Optimization Strategy of Server Computing Based Desktop Cloud

Ningjiang Chen, Bin Xu, Dandan Hu, Yimin Wan
Cloud computing is an emerging technology. On the basis of intensive resource management and sharing, it provides on-demand resources to reduce costs and optimizes the IT services. Though the desktop cloud platform can allocate resource flexibly, its efficiency is restricted by the limited system resource....

Access Control Framework for Android System

Guo Tao, Zhang Puhan, Liang Hongliang
Protection for confidentiality and integrity of information is a very critical requirement for many mobile device users. Currently, malicious software on the Android platform often achieve the purpose of privacy theft and malicious chargeback by sending short messages, making phone calls or network communication...

Research and application of the location information in the intelligent transportation

Wang Junhan, Qiao Fei, Lu Jianfeng
the traffic system is becoming quite complicated due to the increasing of roads and vehicles. Many countries realized Intelligent Transport Systems to make better use of existing transport resources. As Intelligent Transport Systems has mass traffic information data, it is a worthy study problem that...

Cryptographic classification of quasigroups of order 4

Liu Guohao, Xu Yunqing
Edon80 is a stream cipher design that had adva-nced to the third and last phase of the eSTREAM project. The core of the cipher consists quasigroup string e-transformations and it employs four quasigroups of order 4. The employed qua-sigroups have influence on the period of the key-stream. There are 576...

Cloud Storage Retrievability Based On Third Party Audit

Qin Zhongyuan, Song Yunyan, Zhang Qunfang, Huang Jie
Cloud storage can relieve users of the burden of local data storage and maintenance. How to ensure the integrity of data stored in Cloud is a key problem. Based on the state-of-the-art solutions, we present a scheme for data storage retrievability in Cloud Computing using third party audit (TPA) which...

Design of a Wireless Networks Detection and Management System Based on a Mobile Terminal

Zhang Zhen-jiang, Zhang Mei-kui, Xia Lei, Shi Hua-yu
In this paper, we present a wireless networks management system based on a mobile terminal detector. The system is designed on C/S architecture, consisting of client and server software, a centralized database and a data sharing in-sync mechanism. It helps to detect wireless access point devices automatically....

Performance Modeling for Helper Thread on Shared Cache CMPs

Cai Min, Gu Zhimin, Fu Yinxia
In data intensive applications of Cloud Computing such as XML parsing, large graph traversing and so on, there are a lot of operations to access irregular data. These data need be timely prefetched into the shared cache in CMPs by helper thread. However, a bad prefetching strategy of helper thread will...

Migration to Cloud Computing- The Impact on IT Management and Security

Alkhalil Adel, Sahandi Reza, John David
Cloud computing adoption has had a considerable impact on organisations, particularly Small and Medium Enterprises (SMEs), not only by increasing the efficiency of acquiring IT resources, but also on IT management roles and security. In this paper, we discuss the impact that cloud computing is having...

Multi-Attribute Decision-Making Based Trusted Multipath Routing in Mobile Ad Hoc Networks

Xue Qi, Dong Qingkuan, Li Qing
Mobile Ad Hoc networks (MANETs) are a kind of acentric and self-organizing multi-hop wireless network. Topology changes frequently in mobile Ad Hoc networks. Node’s energy, bandwidth and computation capability are limited. In addition, the open links are vulnerable to network attacks. Therefore the problems...

An Improved Multimedia Conference System with Load Balance

Yundu Zhang, Yanlei Shang
With the development of economics and the globalization of trade, the Multimedia Conference System is now widely used and the number of its users increases exponentially. But a single server can’t handle the high concurrent user requests effectively. In this paper, we improved the Multimedia Conference...

A method based on compressive sensing to detect community structure using deep belief network

Zhang Liangliang, Wu Haijia, Feng Jing, Zhang Xiongwei
A deep learning scheme based on compressive sensing to detect community structure of large-scale social network is presented. Our contributions in this work are as follows: First, we reduced the high-dimensional feature of social media data via compressive sensing by using random measurement matrix;...

Deployment and Performance Evaluation of Virtual Network based on OpenStack

Zhao Shaoka, Li Liyao, Yang Jiahai, Xu Cong, Ling Xiao, Huang Shuxiao
In the context of the ever-developing virtual network, OpenStack officially launches its new network component-Quantum, but the comparative performance between single-host and multi-host deployment is yet unknown. The paper introduces detailed deployment strategies of single-host and multi-host after...

A Detecting and Defending Method of Wormhole Attack Based on Time Ruler

Lv Guoyuan, Wang Yiming, Zhu Canyan, Chen Rong, Wang Lujie
Wormhole attack is a severe attack in mobile ad hoc networks, which is particularly challenging to defend against. In this paper, a new method defined as time ruler using distance measurement for detecting wormhole attack is proposed including its hypothetical model, the concept of time ruler and the...

PeANFIS-FARM Framework in Defending against Web Service Attacks

Chan Gaik-Yee, Lee Chien-Sing, Heng Swee-Huay
Internet-enabled Web Service (WS) applications, such as e-commerce, are facing eXtensible Markup Language (XML)-related security threats. However, network and host-based intrusion (ID) and prevention (IP) systems and Web Service Security (WSS) standards are inadequate in countering against these threats....

Improved Homomorphic String Bits Encryption Public-key Cryptosystem based on LWE

Jian Bai, Yatao Yang, Zichen Li
Accompany with the developing of the cloud computing, a public-key cryptosystem which is efficiency and homomorphic will have a wide application. Through analyzing the public-key cryptosystem, which is designed by Oded Regev and based on LWE (Learning with errors), in details, our main results are optimizing...

Short-term Load forecasting by a new hybrid model

Guo Hehong, Du Guiqing, Wu Liping, Hu Zhiqiang
Accurate short-term load forecasting (STLF) plays a vital role in power systems because it is the essential part of power system planning and operation. Considering that an individual forecasting model usually cannot work very well for STLF, a hybrid model based on the seasonal ARIMA model and BP neural...

A Strategy of Dynamic Replica Creation in Cloud Storage

Huang Mengxing, Ye Xianglong, Wei Sanpeng, Zhu Donghai
With the popularity of cloud storage, its reliability and access latency have become increasingly prominent. To solve this problem, a novel strategy of dynamic replica creation based on acceleration is presented for cloud storage by drawing lessons from the concept of acceleration. For reducing access...

A Parallel Clustering Method Study Based on MapReduce

Zhanquan Sun
Clustering is considered as one of the most important tasks in data mining. The goal of clustering is to determine the intrinsic grouping in a set of unlabeled data. It has been widely applied to many kinds of areas. Many clustering methods have been studied, such as k-means, Fisher clustering method,...

Study on Cloud Computing Data Center Infrastructure Best Practices

Qi Shuguang, Yu Bin
Cloud computing data center infrastructure new technologies and best practices are analyzed in this paper. First of all, modular cloud computing data center which is divided into building type and container type is described. In addition, principles and energy efficiencies of new cooling methods in practical...

The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation

Zhan-sheng Hou, Min Xu, Li-peng Zhu, Lin Peng, Bin Hu
This paper studied the SSL protocol and the principle of OpenVPN, proposed a hardware-based encryption access system OpenVPN, which drawn the block diagram of design structure, In view of the problem of OpenVPN concurrent test, general concurrent test based on the recording and playback mechanism, constitute...

The Feasibility Study of Building Sharing, Premium Teaching Repository Based on Cloud Computing

Nie Jing
The construction of sharing, premium teaching repository is an important constituent part in the development of both the Chinese Universities’ quality engineering and key higher vocational colleges. Given the status quo of the application of cloud computing in informatization development of higher education,...

Study on Similarity Compute and File Filtering Based on Cloud Computing Method

Yuanyuan Ma, Bo Zhang, Yufei Wang
Text similarity computing has been widely used in confidential document filtering to enhance the safety of an enterprise information system. And the accuracy rate and performance of the similarity computing has always been the crucial problem in the research of document filtering. With the approaching...

A replica pre-placement strategy based on correlation analysis in cloud environment

Wu Shaochun, Shuai Xiang, Chen Liang, Ye Ling, Yuan Bowen
Currently, The data placement of cloud storage environment encounters some problems. Based on analyzing the requests of upload files of users, we can dig out the relevance of files. For the purpose of increasing the efficiency of data access, we try to place the relevant files to the nodes that users...

Active Defense strategies selection for network mixed malicious action

Yong-qiang Chen, Xiao-ping WU, Yu Fu
In order to deal with the problems that defense measures are not been take into accounted and the return of the unit cost in network security analysis, a active defense strategies selection method for network mixed malicious actions was proposed. Firstly, a network security mixed game model was presented...

Future trend of integrating instrumentation into the cloud

He Hengjing, Zhao Wei, Huang Songling
Grid-enabled instrumentation has brought together different scientific labs for complicated cooperative experiments. Instrument resources sharing and managing remotely over the Internet are also realized by such systems. Nowadays the rise of cloud computing, which is developed from grid computing and...

A Network Registration Model with Hidden Real Name

Chen Kan, Xiong Yueshan, Zhu Peidong
The openness and anonymity of Internet allow people joining in without identity validation, resulting in a trustless environment and bringing about many security problems, such as privacy exposure, rumor spreading, deception and social panic making. The root of these problems is that users use pseudonyms...

Design of Web Course Based on Cloud Computing

Nong Zheng
Cloud Computing Assisted Instructions CCAI bring new transformation and development for the web course. The paper introduces the characteristic, the design technique and the design method of the network course based on cloud computing and the network course is design combining with Google Apps and WEB.

Detecting Machine Generated Domain Names Based on Morpheme Features

Wei-wei Zhang, Jian Gong, Qian Liu
To detect machine generated domain names, we proposed a method to exclude human generated domain names by analyzing the basic morphemes in the character strings of domain names (The basic morphemes in English are word roots and affixes while in Chinese are initials and finals). Experimental results show...

Optimizing Live Migration of Virtual Machines with Context Based Prediction Algorithm

Cui Yong, Lin Yusong, Guo Yi, Li Runzhi, Wang Zongmin
With the increasing use of Virtual Machine (VM) in data center, live migration of virtual machine has become a powerful and essential instrument for resource management. Although the prevailing Pre-copy algorithm might perform well on the stage of lightweight, it cannot guarantee a desirable performance...