Cloud Computing

云计算
  • 文章类型: Journal Article
    随着信息化的快速发展,大量数据不断产生和积累,导致云存储服务的出现。然而,存储在云中的数据超出了用户的控制范围,带来各种安全隐患。云数据审计技术可以实现云端数据完整性的检测,无需下载数据。其中,公共审计计划由于能够避免额外的用户审计费用而经历了快速发展。然而,恶意第三方审计人员可能损害数据隐私。本文提出了一种改进的基于身份的云审计方案,该方案可以抵抗恶意审计。该方案也是在基于身份的公共审计方案上构建的,使用区块链来防止恶意审计。我们发现该方案不安全,因为恶意云服务器可以为外包数据块伪造身份验证标签,虽然我们的计划没有这些安全漏洞。通过安全证明和性能分析,我们进一步证明我们的计划是安全和有效的。此外,我们的方案有典型的应用场景。
    With the rapid development of informatization, a vast amount of data is continuously generated and accumulated, leading to the emergence of cloud storage services. However, data stored in the cloud is beyond the control of users, posing various security risks. Cloud data auditing technology enables the inspection of data integrity in the cloud without the necessity of data downloading. Among these, public auditing schemes have experienced rapid development due to their ability to avoid additional user auditing expenses. However, malicious third-party auditors can compromise data privacy. This paper proposes an improved identity-based cloud auditing scheme that can resist malicious auditors. This scheme is also constructed on an identity-based public auditing scheme using blockchain to prevent malicious auditing. We found the scheme is not secure because a malicious cloud server can forge authentication tags for outsourced data blocks, while our scheme has not these security flaws. Through security proofs and performance analysis, we further demonstrate that our scheme is secure and efficient. Additionally, our scheme has typical application scenarios.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    车联网(IoV)在通过连接人们来推进智能交通方面至关重要,车辆,基础设施,和云服务器(CS)。然而,IoV内的开放接入无线信道容易受到恶意攻击。因此,认证密钥协商协议对于确保车辆通信安全和保护车辆隐私至关重要。然而,尽管小组中的车辆遭到破坏,它们仍然可以更新组密钥并获得现有组密钥协商协议中的通信内容。因此,保证妥协后的前向安全性(PCFS)仍然具有挑战性。动态密钥轮换是实现PCFS的常用方法,这带来了沉重的计算和通信负担。为了解决这些问题,为IoV设计了一种高效、鲁棒的PCFS连续组密钥协商(ER-CGKA)方案。提出和提交流程用于支持异步组密钥更新。此外,基于TreeKEM架构,计算成本和通信开销显著降低。此外,我们采用阈值机制来抵抗恶意车辆的串通攻击,这增强了ER-CGKA方案的鲁棒性。安全性分析表明,该方案满足IoV的所有基本安全要求,并实现了PCFS。性能评估结果表明,我们的ER-CGKA方案的计算成本降低了18.82%(客户端)和33.18%(CS),由于假名被用来实现有条件的隐私保护,通信开销增加了约55.57%。因此,我们的ER-CGKA方案是安全和实用的。
    The Internet of Vehicles (IoV) counts for much in advancing intelligent transportation by connecting people, vehicles, infrastructures, and cloud servers (CS). However, the open-access wireless channels within the IoV are susceptible to malicious attacks. Therefore, an authentication key agreement protocol becomes essential to ensure secure vehicular communications and protect vehicle privacy. Nevertheless, although the vehicles in the group are compromised, they can still update the group key and obtain the communication content in the existing group key agreement protocols. Therefore, it is still challenging to guarantee post-compromise forward security (PCFS). Dynamic key rotation is a common approach to realizing PCFS, which brings a heavy computation and communication burden. To address these issues, an efficient and robust continuous group key agreement (ER-CGKA) scheme with PCFS is designed for IoV. The propose-and-commit flow is employed to support asynchronous group key updates. Besides, the computation cost and communication overhead are significantly reduced based on the TreeKEM architecture. Furthermore, we adopt the threshold mechanism to resist the collusion attacks of malicious vehicles, which enhances the ER-CGKA scheme\'s robustness. Security analysis indicates that the proposed scheme satisfies all the fundamental security requirements of the IoV and achieves PCFS. The performance evaluation results show that our ER-CGKA scheme demonstrates a reduction in the computation cost of 18.82% (Client) and 33.18% (CS) approximately, and an increase in communication overhead of around 55.57% since pseudonyms are utilized to achieve conditional privacy-preserving. Therefore, our ER-CGKA scheme is secure and practical.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    近年来,由于边缘和云计算的结合,边缘云计算受到了越来越多的关注。任务调度仍然是提高边缘云服务质量和资源效率的主要挑战之一。尽管已经对调度问题进行了一些研究,它们的应用仍然需要解决的问题,例如,忽略资源异质性,只关注一种请求。因此,在本文中,我们的目标是提供一种异构感知的任务调度算法,以提高具有截止日期限制的边缘云的任务完成率和资源利用率。由于调度问题的NP硬度,我们利用遗传算法(GA),最具代表性和广泛使用的元启发式算法之一,为了解决将任务完成率和资源利用率作为主要和次要优化目标的问题,分别。在我们基于GA的调度算法中,基因指示其对应的任务由哪个资源处理。为了提高GA的性能,我们建议利用偏斜突变算子,其中基因在种群进化过程中与资源异质性相关。我们进行了大量的实验来评估我们算法的性能,结果验证了算法在任务完成率方面的优越性,与其他13种经典和最新的调度算法相比。
    Recent years, edge-cloud computing has attracted more and more attention due to benefits from the combination of edge and cloud computing. Task scheduling is still one of the major challenges for improving service quality and resource efficiency of edge-clouds. Though several researches have studied on the scheduling problem, there remains issues needed to be addressed for their applications, e.g., ignoring resource heterogeneity, focusing on only one kind of requests. Therefore, in this paper, we aim at providing a heterogeneity aware task scheduling algorithm to improve task completion rate and resource utilization for edge-clouds with deadline constraints. Due to NP-hardness of the scheduling problem, we exploit genetic algorithm (GA), one of the most representative and widely used meta-heuristic algorithms, to solve the problem considering task completion rate and resource utilization as major and minor optimization objectives, respectively. In our GA-based scheduling algorithm, a gene indicates which resource that its corresponding task is processed by. To improve the performance of GA, we propose to exploit a skew mutation operator where genes are associated to resource heterogeneity during the population evolution. We conduct extensive experiments to evaluate the performance of our algorithm, and results verify the performance superiority of our algorithm in task completion rate, compared with other thirteen classical and up-to-date scheduling algorithms.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    将敏捷方法纳入创建可持续产品的重要性已被广泛讨论。这种方法可以加强创新整合,提高对不断变化的发展环境的适应性,并提高产品开发过程的效率和质量。虽然许多敏捷方法起源于软件开发环境,并基于成功的软件项目制定,他们经常由于不正确的程序和缺乏接受而失败,防止深度融入这个过程。此外,市场评估决策往往受到不明确和主观信息的阻碍。因此,这项研究介绍了用于可持续产品开发的扩展TOPSIS(通过与理想解决方案相似的订单性能技术)方法。该方法利用云模型理论解决随机性和不确定性(内不确定性)的优点以及粗糙集理论在不需要额外信息的情况下灵活处理市场需求不确定性的优点。该研究提出了一种综合加权方法,该方法考虑了主观和客观权重,以确定综合标准权重。它还提出了一个新的框架,名为“产品开发的可持续敏捷性”(SAPD),旨在评估可持续产品开发的评估标准。为了验证该方法的有效性,以中国中小企业为例进行了研究。获得的结果表明,公司需要进行产品结构研究和开发以实现新的产品功能。
    The importance of incorporating an agile approach into creating sustainable products has been widely discussed. This approach can enhance innovation integration, improve adaptability to changing development circumstances, and increase the efficiency and quality of the product development process. While many agile methods have originated in the software development context and have been formulated based on successful software projects, they often fail due to incorrect procedures and a lack of acceptance, preventing deep integration into the process. Additionally, decision-making for market evaluation is often hindered by unclear and subjective information. Therefore, this study introduces an extended TOPSIS (Technique for Order Performance by Similarity to Ideal Solution) method for sustainable product development. This method leverages the benefits of cloud model theory to address randomness and uncertainty (intrapersonal uncertainty) and the advantages of rough set theory to flexibly handle market demand uncertainty without requiring extra information. The study proposes an integrated weighting method that considers both subjective and objective weights to determine comprehensive criteria weights. It also presents a new framework, named Sustainable Agility of Product Development (SAPD), which aims to evaluate criteria for assessing sustainable product development. To validate the effectiveness of this proposed method, a case study is conducted on small and medium enterprises in China. The obtained results show that the company needs to conduct product structure research and development to realize new product functions.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    雾计算的蓬勃发展的领域引入了变革性的计算范式,在不同的领域具有广泛的应用。这种模式的核心在于边缘服务器的关键作用,它们被赋予关键的计算和存储功能。这些服务器存储容量的优化成为增强雾计算基础架构功效的关键因素。本文提出了一种新的存储优化算法,被称为LIRU(最近使用的低干扰),它综合了LIRS(低干扰近期集)和LRU(最近最少使用)替换算法的优势。在存储资源受限的背景下,这项研究致力于制定一种优化存储空间利用率的算法,提高数据访问效率,并减少访问延迟。该调查启动了对边缘服务器上可用存储资源的全面分析,指出优化算法的基本考虑因素:存储资源利用率和数据访问频率。然后,该研究构建了一个优化模型,该模型将数据频率与缓存容量进行协调,采用优化理论来辨别存储最大化的最优解。随后对LIRU算法的实验验证强调了其优于传统替换算法的优越性,展示了存储利用率的显著提高,数据访问效率,并减少访问延迟。值得注意的是,LIRU算法相对于LFU算法在一跳命中率中注册5%的增量,比LRU算法提高了66%,与LRU算法相比,系统命中率提高了14%。此外,与LRU和LFU算法相比,它将平均系统响应时间减少了2.4%和16.5%,分别,特别是在涉及大缓存大小的场景中。这项研究不仅揭示了边缘服务器存储优化的复杂性,而且还大大推动了更广泛的雾计算生态系统的性能和效率。通过这些见解,这项研究为增强雾计算架构内的数据管理策略提供了一个有价值的框架,标志着该领域的显著进步。
    The burgeoning field of fog computing introduces a transformative computing paradigm with extensive applications across diverse sectors. At the heart of this paradigm lies the pivotal role of edge servers, which are entrusted with critical computing and storage functions. The optimization of these servers\' storage capacities emerges as a crucial factor in augmenting the efficacy of fog computing infrastructures. This paper presents a novel storage optimization algorithm, dubbed LIRU (Low Interference Recently Used), which synthesizes the strengths of the LIRS (Low Interference Recency Set) and LRU (Least Recently Used) replacement algorithms. Set against the backdrop of constrained storage resources, this research endeavours to formulate an algorithm that optimizes storage space utilization, elevates data access efficiency, and diminishes access latencies. The investigation initiates a comprehensive analysis of the storage resources available on edge servers, pinpointing the essential considerations for optimization algorithms: storage resource utilization and data access frequency. The study then constructs an optimization model that harmonizes data frequency with cache capacity, employing optimization theory to discern the optimal solution for storage maximization. Subsequent experimental validations of the LIRU algorithm underscore its superiority over conventional replacement algorithms, showcasing significant improvements in storage utilization, data access efficiency, and reduced access delays. Notably, the LIRU algorithm registers a 5% increment in one-hop hit ratio relative to the LFU algorithm, a 66% enhancement over the LRU algorithm, and a 14% elevation in system hit ratio against the LRU algorithm. Moreover, it curtails the average system response time by 2.4% and 16.5% compared to the LRU and LFU algorithms, respectively, particularly in scenarios involving large cache sizes. This research not only sheds light on the intricacies of edge server storage optimization but also significantly propels the performance and efficiency of the broader fog computing ecosystem. Through these insights, the study contributes a valuable framework for enhancing data management strategies within fog computing architectures, marking a noteworthy advancement in the field.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    人工智能(AI)辅助的药物设计对现代药物发现显示出前所未有的影响,但是仍然迫切需要用户友好的界面来弥合这些复杂的工具和科学家之间的差距,尤其是那些不太精通电脑的人。在这里,我们展示了DrugFlow,一个人工智能驱动的一站式平台,提供一个干净的,方便,和基于云的界面来简化早期药物发现工作流程。通过无缝集成一系列创新的AI算法,涵盖分子对接,定量结构-活性关系建模,分子生成,ADMET(吸收,分布,新陈代谢,排泄和毒性)预测,和虚拟筛选,DrugFlow可以为早期药物发现的几乎所有关键阶段提供有效的AI解决方案。包括命中识别和命中/线索优化。我们希望该平台能够提供足够有价值的指导,以帮助真实的药物设计和发现。该平台可在https://drugflow.com上获得。
    Artificial intelligence (AI)-aided drug design has demonstrated unprecedented effects on modern drug discovery, but there is still an urgent need for user-friendly interfaces that bridge the gap between these sophisticated tools and scientists, particularly those who are less computer savvy. Herein, we present DrugFlow, an AI-driven one-stop platform that offers a clean, convenient, and cloud-based interface to streamline early drug discovery workflows. By seamlessly integrating a range of innovative AI algorithms, covering molecular docking, quantitative structure-activity relationship modeling, molecular generation, ADMET (absorption, distribution, metabolism, excretion and toxicity) prediction, and virtual screening, DrugFlow can offer effective AI solutions for almost all crucial stages in early drug discovery, including hit identification and hit/lead optimization. We hope that the platform can provide sufficiently valuable guidance to aid real-word drug design and discovery. The platform is available at https://drugflow.com.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    大学新商业课程中用于企业管理的跨学科虚拟模拟平台是基于场景驱动任务的主动实践框架。然而,仿真企业快速的运营周期及其激烈的竞争与对运营数据实时分析的战略需求之间存在着突出的冲突。基于这样的需求,本研究以广州华商学院模拟企业管理驾驶舱的开发方法为例。采用基于云模型的组合加权法确定指标权重,然后从五个方面进行定性和定量数据分析:“商业,财务和运营“,“客户管理和营销”,“内部运营目标”,“产品开发战略”,以及“团队建设和管理”。该方法实现了对企业管理过程的综合评价和预警。具体来说,主观权重由层次分析法确定,而熵权法的客观权重,最后通过云模型评价其总体指标表现。该设计可以通过基于云的应用程序和数字驾驶舱来评估企业管理指标和学生活动参与的综合绩效,从而全面呈现企业的整体管理水平,通过不同颜色的指针判断是否合理。此外,与指标相关的明显特征也被用来评估未来的决策方向。最后,这种综合方法可以及时优化运营策略,并促进未来发展的预算分配。
    The cross-disciplinary virtually simulated platform for enterprise management in universities\' new business courses is an initiative practical framework based on scenario-driven tasks. However, there is a prominent conflict between the rapid operating cycle of simulation enterprises plus their fierce competitions and the strategic demand for real-time analysis for operational data. Based on such demand, this study takes the development method of the simulated enterprise management cockpit from Guangzhou Huashang College as an example. It adopts the combined weighting method based on cloud models to determine indicator weights, then qualitative and quantitative data analyses are conducted from five aspects: \"business, finance and operation\", \"customer management and marketing\", \"internal operational objectives\", \"product development strategy\", along with \"team building and management\". This approach achieves a comprehensive evaluation and early warning of the enterprise management process. Specifically, the subjective weights are determined by the Analytic Hierarchy Process, while the objective weights by the entropy weight method, finally verified by cloud model evaluation of its overall indicator performance. The design can evaluate the comprehensive performance of enterprise management indicators and students\' activity participation through the cloud-based application and the digital cockpit, so as to fully presents the enterprise\'s overall management level, along with judgement of whether it is reasonable through pointers in different colors. In addition, apparent indicator-related characteristics are also utilized to assess future decision-making directions. Finally, this comprehensive approach can timely optimize operation strategies and facilitate budget allocation for future development.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    Objective: To explore the feasibility and safety of remote programming technology based on 5G cloud technology support platform in postoperative follow-up of cardiovascular implantable electronic devices(CIED). Methods: This study was a multicenter cross-sectional study. CIED patients from 12 hospitals lacking full-time follow-up specialists in Sichuan Province were enrolled from June 2021 to October 2021. All patients\' devices received remote inspecting and programming by the follow-up specialist of the remote follow-up center of the Third People\'s Hospital of Chengdu through 5G cloud technology support platform. The baseline data, device alarm events, device reprogramming events, adverse reactions and satisfaction questionnaire survey results were collected. Results: A total of 195 CIED implantation patients were included, with an age of (72.5±11.3) years, including 103 males (52.6%). All patients completed remote inspecting and programming successfully, with a duration of (5.8±4.0) min. Ninety-one patients\' CIED were reprogrammed, with a total of 104 parameter adjustments. No abnormal communication or adverse events occurred. The satisfaction questionnaire showed that 97.9%(191/195) of the patients trusted or relatively trusted remote follow-up and 86.7%(169/195) of the patients were willing to choose remote follow-up mode for device management. Conclusion: The remote programming based on 5G cloud technology support platform may be feasible and safe for postoperative follow-up of CIED patients.
    目的: 探索基于5G云技术支持平台的远程程控技术在心脏置入型电子器械(CIED)术后随访中的可行性和安全性。 方法: 本研究为多中心横断面研究。选取2021年6至10月在四川省12家暂缺随访专员的综合医院的CIED置入患者,由成都市第三人民医院远程随访中心的随访专员通过5G云技术支持平台对患者器械进行实时远程检查和远程程控。收集患者的基线资料、器械报警事件、再程控事件、不良反应及满意度问卷调查结果。 结果: 共纳入195例CIED置入患者,年龄(72.5±11.3)岁,男性103例(52.6%),所有患者均成功完成远程检查和程控,用时(5.8±4.0)min。根据随访结果,91例患者的CIED需要再程控,累计参数调整104次。所有程控过程通信情况无异常,患者未发生任何不良事件。满意度问卷调查显示,97.9%(191/195)的患者信任或比较信任远程随访,86.7%(169/195)的患者愿意选择远程随访模式进行设备管理。 结论: 基于5G云技术支持平台的远程程控技术在CIED患者术后随访中的临床应用可能是可行、安全的。.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    随着计算机视觉领域的进步,面部表情识别(FER)由于其广泛的实际应用而成为一个活跃的研究领域。它已被用于各个领域,包括教育,广告和营销,娱乐和游戏,健康,和交通。由于新的挑战,基于面部表情识别的系统正在迅速发展,并对情绪的基本和复合面部表情进行了重要的研究;然而,测量情绪是具有挑战性的。在FER系统最近的进步和挑战的推动下,在这篇文章中,我们已经讨论了FER和建筑元素的基础知识,FER应用程序和用例,基于FER的全球领先公司,FER之间的互连,物联网(IoT)和云计算,深入总结FER技术面临的开放挑战,通过利用系统评价和荟萃分析方法(PRISMA)的首选报告项目和未来方向。最后,结论和未来的思考。通过克服本研究中确定的挑战和未来方向,研究人员将在未来彻底改变面部表情识别的学科。
    With the cutting-edge advancements in computer vision, facial expression recognition (FER) is an active research area due to its broad practical applications. It has been utilized in various fields, including education, advertising and marketing, entertainment and gaming, health, and transportation. The facial expression recognition-based systems are rapidly evolving due to new challenges, and significant research studies have been conducted on both basic and compound facial expressions of emotions; however, measuring emotions is challenging. Fueled by the recent advancements and challenges to the FER systems, in this article, we have discussed the basics of FER and architectural elements, FER applications and use-cases, FER-based global leading companies, interconnection between FER, Internet of Things (IoT) and Cloud computing, summarize open challenges in-depth to FER technologies, and future directions through utilizing Preferred Reporting Items for Systematic reviews and Meta Analyses Method (PRISMA). In the end, the conclusion and future thoughts are discussed. By overcoming the identified challenges and future directions in this research study, researchers will revolutionize the discipline of facial expression recognition in the future.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    将数据外包给远程云提供商在组织和个人中变得越来越受欢迎。半可信服务器使用可搜索对称加密(SSE)来在搜索加密数据库时将搜索信息保持在可接受的泄漏级别。动态SSE(DSSE)方案允许通过执行更新查询来添加和删除文档,每次添加或删除记录时,某些信息都会泄漏到服务器。大多数现有DSSE方案中结构和密码原语的复杂性使其效率低下,在储存方面,和查询请求在智能设备客户端(SDC)端生成开销成本。为SDC实现恒定的存储成本增强了生存能力,效率,以及智能设备的轻松用户体验,促进它们在各种应用中的广泛采用,同时维护强大的隐私和安全标准。DSSE方案必须解决两个重要的隐私要求:向前和向后隐私。由于关键字越来越多,客户端的存储成本也在以线性速度增长。本文介绍了一种创新的,安全,和轻量级动态可搜索对称加密(DSSE)方案,确保II型向后和向前隐私,而不会产生持续的SDC存储成本和高成本的查询生成。拟议的方案,基于倒排索引结构,将哈希表与链接节点合并,链接所有哈希表中的加密关键字。实现一次性O(1)存储成本,无需SDC端的关键字计数器,该方案通过为每次更新生成一个新密钥来增强安全性。实验结果表明,在SDC侧生成低成本的查询(6,460纳秒),使其与资源有限的设备兼容。该方案优于现有方案,显著降低服务器端搜索成本。
    Outsourcing data to remote cloud providers is becoming increasingly popular amongst organizations and individuals. A semi-trusted server uses Searchable Symmetric Encryption (SSE) to keep the search information under acceptable leakage levels whilst searching an encrypted database. A dynamic SSE (DSSE) scheme enables the adding and removing of documents by performing update queries, where some information is leaked to the server each time a record is added or removed. The complexity of structures and cryptographic primitives in most existing DSSE schemes makes them inefficient, in terms of storage, and query requests generate overhead costs on the Smart Device Client (SDC) side. Achieving constant storage cost for SDCs enhances the viability, efficiency, and easy user experience of smart devices, promoting their widespread adoption in various applications while upholding robust privacy and security standards. DSSE schemes must address two important privacy requirements: forward and backward privacy. Due to the increasing number of keywords, the cost of storage on the client side is also increasing at a linear rate. This article introduces an innovative, secure, and lightweight Dynamic Searchable Symmetric Encryption (DSSE) scheme, ensuring Type-II backward and forward privacy without incurring ongoing storage costs and high-cost query generation for the SDC. The proposed scheme, based on an inverted index structure, merges the hash table with linked nodes, linking encrypted keywords in all hash tables. Achieving a one-time O(1) storage cost without keyword counters on the SDC side, the scheme enhances security by generating a fresh key for each update. Experimental results show low-cost query generation on the SDC side (6,460 nanoseconds), making it compatible with resource-limited devices. The scheme outperforms existing ones, reducing server-side search costs significantly.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

公众号