所有提交的电磁系统将被重定向到在线手稿提交系统。作者请直接提交文章在线手稿提交系统各自的杂志。

云计算的进化:State-ofthe——艺术的调查

K.Deepika1,N。内维普拉萨德1,Prof.S.Balamurugan1,S.Charanyaa2
  1. 部门,Kalaignar卡鲁纳尼迪理工学院,哥印拜陀,TamilNadu、印度
  2. 高级软件工程师大型机技术前,Larsen & Tubro (L&T)信息技术,钦奈,印度TamilNadu
相关文章Pubmed,谷歌学者

访问更多的相关文章国际期刊的创新在计算机和通信工程的研究

文摘

本文综述方法为匿名化开雷竞技苹果下载发的数据从2008年到2009年。出版微数据,如人口普查或病人数据的广泛研究和其他目的是一个重要的问题区域集中的政府机构和其他社会关联。传统方法通过文献调查表明,消除的方法确定独特的识别等领域社会安全号码从微数据,仍然导致披露敏感数据,k-anonymization优化算法,似乎前途和强大的在某些情况下,仍然带着优化k-anonymity赋权的限制,从而导致严重的计算挑战。k-anonimity面临同质性攻击和背景知识攻击的问题。ldiversity的概念提出了在文献中解决这个问题也是一个数量的限制,因为它是低效的,以防止属性披露(偏斜攻击和相似性攻击),l-diversity很难实现,可能无法提供足够的隐私保护对敏感属性在等价类可以大大提高隐私信息披露限制技术,如抽样细胞抑制舍入和数据交换和pertubertation。本文旨在讨论高效的微数据匿名化方法需要划分等价类,通过最小化亲密内核平滑和确定醚移动距离通过控制微数据敏感属性的分布格局,也保持多样性。

关键字

数据匿名化、微数据k-anonymity、身份信息披露,披露属性,多样性

介绍

需要发布敏感数据在最近几年公共变得奢侈。虽然发布的要求需要有一个限制,出版社会网络数据不应该透露个人隐私信息。因此保护个人隐私和保证社会networ效用数据成为一个具有挑战性和有趣的研究课题。考虑图形模型[35]顶点表示敏感标签算法可以开发出版non-tabular数据对个人隐私的前提下。虽然数据在图形化模型表示KDLD序列生成[35]数据容易受到一些攻击如同质性攻击,相似背景知识攻击,攻击和许多更多。在本文中,我们做了一个调查在攻击和可能的解决方法提出了文学和效率是一样的。

云计算和网格计算360度比较

在分布式系统的情况下,云计算已经成为web 2.0后另一个术语。云计算不是全新的概念,它有initicate连接相对较新的但13年建立网格计算模式和其他相关技术,如效用计算,集群计算和分布式系统。本文以上作者力求比较和对比云计算与网格计算从不同角度给洞察两云计算和网格计算的基本特征。云计算是暗示未来我们不会计算在本地计算机上。但我们会集中精力集中的设施由第三方运营和存储设施。作者说,在1990年代中期,电网这个术语是用来描述技术将允许使用按需获取计算能力。网格等大型联邦系统开放科学网格、Tera网格不仅提供计算能力,而且数据和软件需求。作者给的答案,云计算是网格的新名字吗?作者说,是的,因为降低计算成本,提高可靠性和增加灵活性将电脑从我们购买和运营自己的东西是由第三方。作者说,答案似乎是否定的,如果事情是不同的比10年。 We people need to analyze massive data, thus motivating greatly increased demand for computing. The authors says that the answer is nevertheless, yes as because the problems are mostly the same in clouds and grids. There is a common need to be able to manage large facility. Details differ, but the two communities are struggling with many of the same issues. A related definition for cloud computing is given by the authors. That definition has a few points in it. Cloud computing is a specialized distributed computing paradigm. It is an massively scalable, can be encapsulated as an abstract entity that delivers differ levels of to customers outside the cloud and it is driven by economics of scale.
云计算的定义与许多现有技术如网格计算、效用计算、服务计算和分布式计算。不仅作者说,云计算与网格计算,确实是从网格计算和依赖于网格计算的支柱和基础设施支持。
作者比较了云计算和网格计算在六个不同的模型。最初,作者比较两种不同的范例在商业模式。在商业模式的情况下,基于云的业务模式的需要支付的客户消费的基础上。但电网的商业模式是项目面向的用户社区为代表的提案有若干服务单位可以花。接下来,两个范例比较基于体系结构。网格计算是一个五层架构包含织物层,连接层、资源层、集体层和应用程序层。但它在云计算模式有所不同。云计算是一个四层体系结构包含织物层,统一资源,平台层和应用程序层。旁边的体系结构、资源管理。作者定义的计算模型,在这个模型中,数据模型,可视化,监测和范式的起源。 Fourthly, the authors discussed the similarities of two paradigms based on programming perfectly. Fifthly, application model for two paradigms are discussed. Finally, security model for cloud and grid is discussed by the authors. Hereby, the author concluded that clouds and grids share a common functionalities in their vision, architecture and technology. But the clouds and grids differs various aspects such as security, programming model, business model, computing model, data mode, application model and abstraction. The authors also stated the opportunities and challenges in both clouds and grids. And also we will meet the centralized scale of today’s cloud utilities, and the distribution and interoperability of today’s grid facilities.

以市场为导向的云计算:愿景、类型和现实提供IT服务作为计算工具

这是一个主题的论文。在本文中,作者提出一个21世纪的幻影计算。本文作者指出,伦纳德·克莱因岩石的首席科学家之一原高级研究计划局网络(ARPANET)项目的互联网上,说:“到目前为止,计算机网络仍处于初级阶段,但是随着他们长大,变得成熟,我们可能会看到的传播”计算机实用工具”,就像目前的电力和电话公用事业,将服务全国个人住房和办公室”。同样,计算服务使用称为消费者需要支付提供商只有他们计算服务的访问。也是消费者不再需要大力投资在建设遇到的困难维持复杂的IT基础设施。本文确定了各种计算范例承诺提供视觉计算机实用工具。它定义了云计算和云提供了建立以市场为导向的架构通过最大化技术如虚拟机并提供思想基于市场的资源管理策略。这些策略连接客户驱动的服务管理和计算风险管理来维持服务水平协议存在一些代表云平台特别是发达产业与云的实现以市场为导向的资源配置。特别是,客户可以通过服务质量参数的确定所需的服务水平和服务水平协议的所有这些计算范例,似乎两个最有前途的网格计算和云计算。网格使共享,选择和技术科学、工程和商业。 To make greater impact on the 21st century as much as the electric power grid did on the 20th century, grid computing has been hailed as the next revolution after the internet and web. But today the latest paradigm to emerge is that of cloud computing. Cloud computing promises reliable services delivered through next generation data centers that are built on compute and storage virtualization technologies. As per this technology, consumers will be able access application and data from a “Clouds” anywhere in the world on demand. It can also be stated as the cloud appears to be a single point of access for all the computing needs of consumers. In this paper, the authors defined the perfect definition for the cloud. hereby, A cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisional and presented as on or more unified computing resources based on service level agreements established through negotiation between the service provider and consumers. The author states and presents a high level architecture for supporting market-oriented resource allocation in data center and clouds. The high level architecture contains basically four main entities such as users/brokers, SLA resource allocator, virtual machines and physical machines. The authors defined the global cloud exchange and market infrastructure for trading services. It includes enterprise IT consumer, which is connected with the intermediate brokers from one to 'N'. Global cloud Market which includes 2 compute cloud, 2 storage cloud and directory, bank, auctioner. As of now, cloud computing is a new and promising paradigm delivering IT services as computing utilities. As clouds are designed to provide services to external users, provides needs to be compensated for sharing their resources and capabilities. In this paper, the authors proposed architecture with representative platforms for cloud computing covering the state of the cut. As cloud platforms becomes ubiquitous, the authors expected the need for internetworking them to create a market oriented global cloud exchange for trading services. several challenges need to be addressed to realize this vision. This includes market-marker for bringing services providers and consumers; market registry for publishing and discovering cloud house service providers and their services; clearing house and brokers for mapping service requests to providers who can meet QOS expectations and payment Management and accounting infrastructure for trading services. Finally, the authors stated that they need to address regulatory and legal issues, which go beyond technical issues. It is concluded that with the need for convergence of cloud computing IT paradigms for delivered our 21st century vision.

虚拟化和基于硬件的安全

虚拟化的过程展示的东西是真正的,事实上它不是虚拟现实(即)。虚拟化可能涉及语言级运行时提供高层抽象的架构应用程序或硬件虚拟化层薄薄的软件地处之间的系统硬件和操作系统层提供逻辑视图来物理资源。尽管虚拟化有多种形式,包括过程、存储和网络虚拟化,本文侧重于安全性和硬件虚拟化层,通常称为虚拟机监视器或管理程序。作者首先关注虚拟化系统管理程序。早期的虚拟机基本计算环境模拟或仿真现有的主机系统硬件特性而仲裁对共享系统资源的访问。它允许多个实例。虚拟机监控程序成为一个有吸引力的选择大型数据中心和中型小型企业。除了增加利用率,现代虚拟机监控程序提供的通用的灵活性及其支持系统,已成为相对商品也明显的和明确的。集中管理程序及其安全作者指出,虚拟机监控程序是一个一些基本但很强。分离可通过使用不同的硬件设施等不同的工作负载的物理分离,分离逻辑涉及参考监视器的使用。 The authors defined the schematic diagram of a reference monitor which includes subject, security policy, object which are connected to the centralized reference monitor. Next, the authors focuses on Hardware virtualization support. Virtualization contains advantages like consolidation and isolation but it also contains disadvantages like large performance overhead to counter this disadvantage, the CPU manufacturers have been developing hardware support for virtualization where part or all of the emulation takes place in the CPU itself. The authors stated the architectural overview of a virtualized system. It includes Random Access Memory, central processing unit of virtual CPU's, PCI bridge IOMMU, Disk controller, Network controller and video controller located on a PCi bus. Then the author focuses on SHype-Hypervisor security architecture . The authors illustrated the Shype security architecture and its integration into a virtual machine Monitor environment. SHype is implemented in various stages for multiple hypervisors including Xen open source hypervisor. It includes the functions like strong isolation and mediates sharing, Attestation and integrity, resources control and accounting and secure services.Then the authors concentrated on SHype Access control architecture. They concluded the controlled sharing of direct VM to VM, VM to VM through local peripheral resources through resources VM and VM to VM through distributed networking resources. The purpose of virtualization and hypervisor security as discussed in this paper is the development of secure computing foundation. Enabling and managing what will essentially become a distributed trusted computing base, built upon the secure hardware and virtualization foundations discussed throughout this paper.

结论和未来的工作

各种方法为匿名化开发数据讨论了从2008年到2009年。出版微数据,如人口普查或病人数据的广泛研究和其他目的是一个重要的问题区域集中的政府机构和其他社会关联。传统方法通过文献调查表明,消除的方法确定独特的识别等领域社会安全号码从微数据,仍然导致披露敏感数据,k-anonymization优化算法,似乎前途和强大的在某些情况下,仍然带着优化k-anonymity赋权的限制,从而导致严重的计算挑战。k-anonimity面临同质性攻击和背景知识攻击的问题。ldiversity的概念提出了在文献中解决这个问题也是一个数量的限制,因为它是低效的,以防止属性披露(偏斜攻击和相似性攻击),l-diversity很难实现,可能无法提供足够的隐私保护对敏感属性在等价类可以大大提高隐私信息披露限制技术,如抽样细胞抑制舍入和数据交换和pertubertation。进化的数据匿名化技术和数据披露预防技术进行了较为详细的试验研究。数据匿名化技术的应用等几个光谱数据轨迹数据进行描述。这个调查将推动很多数据库匿名化领域的研究方向。

引用