所有提交的EM系统将被重定向到网上投稿系统.作者被要求将文章直接提交给网上投稿系统各自的日志。

云计算的发展:一个最新的调查

K.Deepika1,纳文·普拉萨德1, Prof.S.Balamurugan1, S.Charanyaa2
  1. 印度泰米尔纳德邦哥印拜陀,Kalaignar Karunanidhi理工学院IT系
  2. 高级软件工程师大型机技术前,Larsen & Tubro (L&T)信息技术,金奈,泰米尔纳德邦,印度
有关文章载于Pubmed谷歌学者

更多相关文章请访问国际计算机与通信工程创新研究杂志

摘要

本文回顾了从2008年雷竞技苹果下载到2009年开发的匿名数据方法。为广泛研究和其他目的发布人口普查或患者数据等微观数据是政府机构和其他社会协会关注的一个重要问题领域。通过文献调查发现,传统的方法从微数据中剔除社保号等唯一标识字段,但仍然会导致敏感数据的泄露,k-匿名优化算法在某些情况下似乎是有前景和强大的,但仍然存在优化的k-匿名是np难的限制,从而导致严重的计算挑战。k-匿名面临着同质性攻击和背景知识攻击的问题。为了解决这个问题,文献中提出的ldiversity概念也提出了一些约束,因为它被证明是低效的,无法防止属性泄露(偏度攻击和相似攻击),l-多样性难以实现,并且可能无法对跨等价类的敏感属性提供足够的隐私保护,可以大大改善信息披露限制技术(如采样单元抑制舍入和数据交换和扰动)的隐私。本文旨在讨论一种高效的匿名化方法,该方法需要划分微数据等价类,通过核平滑最小化接近度,通过控制敏感属性在微数据中的分布模式并保持多样性来确定以太移动距离。

关键字

数据匿名化,微数据,k匿名,身份披露,属性披露,多样性

介绍

近年来,向公众公布敏感数据的需求急剧增长。虽然发布有其必要性,但发布的社交网络数据不能泄露个人隐私是有限制的。因此,保护个人隐私和确保社交网络数据的效用成为一个具有挑战性和有趣的研究课题。考虑一个图形模型[35],其中顶点表示敏感标签,可以开发算法来发布非表格数据,而不损害个人隐私。虽然KDLD序列生成[35]后的数据是用图形模型表示的,但数据容易受到同质性攻击、背景知识攻击、相似性攻击等多种攻击。本文对文献中常见的攻击和可能的解决方法进行了研究,并对其有效性进行了分析。

云计算和网格计算360度对比

在分布式系统的情况下,云计算已经成为web 2.0之后的另一个流行词。云计算并不是一个全新的概念,它已经开始连接到相对较新的但十三年建立的网格计算范式和其他相关技术,如效用计算、集群计算和分布式系统。本文试图从多个角度对云计算和网格计算进行比较和对比,深入了解云计算和网格计算的本质特征。云计算预示着未来我们将不再使用本地计算机进行计算。但我们将专注于由第三方和存储设施运营的集中式设施。作者说,在20世纪90年代中期,术语网格被用来描述允许消费按需获得计算能力的技术。网格适用于大型联邦系统,如开放科学网格、Tera网格,它们不仅提供计算能力,还提供按需数据和软件。作者给出的答案是,云计算是网格的新名称?作者说,是的,因为通过将计算机从我们自己购买和操作的东西转变为由第三方操作的东西,可以降低计算成本,提高可靠性和灵活性。作者说,如果现在的情况与10年前不同,答案似乎是否定的。 We people need to analyze massive data, thus motivating greatly increased demand for computing. The authors says that the answer is nevertheless, yes as because the problems are mostly the same in clouds and grids. There is a common need to be able to manage large facility. Details differ, but the two communities are struggling with many of the same issues. A related definition for cloud computing is given by the authors. That definition has a few points in it. Cloud computing is a specialized distributed computing paradigm. It is an massively scalable, can be encapsulated as an abstract entity that delivers differ levels of to customers outside the cloud and it is driven by economics of scale.
云计算的定义与许多现有技术有重叠,例如网格计算、效用计算、服务计算和分布式计算。作者说,云计算不仅与网格计算有重叠,它确实是从网格计算发展而来的,并依赖于网格计算作为它的骨干和基础设施支持。
作者比较了六种不同模型中的云计算和网格计算。最初,作者比较了业务模型中的两种范式。在商业模式方面,基于云的商业模式有客户按消费付费的需求。但是网格的商业模式是面向项目的,其中用户是由提案代表的社区,他们可以花费一定数量的服务单位。然后,从体系结构上比较了这两种范式。网格计算是一个五层架构,包括结构层、连接层、资源层、集合层和应用层。但它在云计算范式上有所不同。云计算是一个四层架构,包括结构层、统一资源层、平台层和应用层。除了体系结构之外,还涉及到资源管理。在该模型中,作者定义了两种范式的计算模型、数据模型、可视化、监控和来源。 Fourthly, the authors discussed the similarities of two paradigms based on programming perfectly. Fifthly, application model for two paradigms are discussed. Finally, security model for cloud and grid is discussed by the authors. Hereby, the author concluded that clouds and grids share a common functionalities in their vision, architecture and technology. But the clouds and grids differs various aspects such as security, programming model, business model, computing model, data mode, application model and abstraction. The authors also stated the opportunities and challenges in both clouds and grids. And also we will meet the centralized scale of today’s cloud utilities, and the distribution and interoperability of today’s grid facilities.

以市场为导向的云计算:作为计算公用事业提供云计算服务的愿景、类型和现实

这是主题论文之一。在这篇论文中,作者提出了一个21世纪的计算远景。在这篇论文中,作者指出,最初的高级研究项目机构网络(ARPANET)项目的首席科学家之一伦纳德·克莱因·洛克说:“到目前为止,计算机网络仍处于起步阶段,但随着它们的发展和成熟,我们可能会看到‘计算机公用事业’的普及,就像现在的电力和电话公用事业一样,将为全国各地的个人家庭和办公室服务。”类似地,计算服务使用称为消费者,需要向只有他们访问计算服务的提供商付费。此外,消费者不再需要大量投资,在构建维护复杂的IT基础设施时遇到了困难。本文确定了各种有望提供视觉计算机实用程序的计算范式。它定义了云计算,并提供了通过最大化虚拟机等技术来创建面向市场的云的架构,并对基于市场的资源管理策略提供了思考。这些策略将客户驱动的服务管理和计算风险管理相结合,以维持服务水平协议,这是一些具有代表性的云平台,特别是在发达行业,实现了云资源的市场化配置。特别是,客户可以通过所有这些计算范式的服务质量参数和服务水平协议来确定所需的服务水平,其中最有前途的是网格计算和云计算。网格使共享、选择和科学、工程和商业等技术成为可能。 To make greater impact on the 21st century as much as the electric power grid did on the 20th century, grid computing has been hailed as the next revolution after the internet and web. But today the latest paradigm to emerge is that of cloud computing. Cloud computing promises reliable services delivered through next generation data centers that are built on compute and storage virtualization technologies. As per this technology, consumers will be able access application and data from a “Clouds” anywhere in the world on demand. It can also be stated as the cloud appears to be a single point of access for all the computing needs of consumers. In this paper, the authors defined the perfect definition for the cloud. hereby, A cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisional and presented as on or more unified computing resources based on service level agreements established through negotiation between the service provider and consumers. The author states and presents a high level architecture for supporting market-oriented resource allocation in data center and clouds. The high level architecture contains basically four main entities such as users/brokers, SLA resource allocator, virtual machines and physical machines. The authors defined the global cloud exchange and market infrastructure for trading services. It includes enterprise IT consumer, which is connected with the intermediate brokers from one to 'N'. Global cloud Market which includes 2 compute cloud, 2 storage cloud and directory, bank, auctioner. As of now, cloud computing is a new and promising paradigm delivering IT services as computing utilities. As clouds are designed to provide services to external users, provides needs to be compensated for sharing their resources and capabilities. In this paper, the authors proposed architecture with representative platforms for cloud computing covering the state of the cut. As cloud platforms becomes ubiquitous, the authors expected the need for internetworking them to create a market oriented global cloud exchange for trading services. several challenges need to be addressed to realize this vision. This includes market-marker for bringing services providers and consumers; market registry for publishing and discovering cloud house service providers and their services; clearing house and brokers for mapping service requests to providers who can meet QOS expectations and payment Management and accounting infrastructure for trading services. Finally, the authors stated that they need to address regulatory and legal issues, which go beyond technical issues. It is concluded that with the need for convergence of cloud computing IT paradigms for delivered our 21st century vision.

基于虚拟化和硬件的安全性

虚拟化是指将某些东西呈现为真实的过程,而实际上它不是(即)虚拟现实。虚拟化可能涉及为应用程序提供高级抽象体系结构的语言级运行时,或者位于系统硬件和操作系统层之间的软件薄硬件虚拟化层,该层提供物理资源的逻辑视图。虽然虚拟化有多种形式,包括进程虚拟化、存储虚拟化和网络虚拟化,但本文侧重于安全性和硬件虚拟化层,通常称为虚拟机监视器或管理程序。作者首先关注管理程序虚拟化。早期的虚拟机本质上是模拟或模拟主机系统现有硬件特性的计算环境,同时仲裁对共享系统资源的访问。它允许多个实例。管理程序成为大型数据中心和中小型企业的一个有吸引力的选择。除了提高利用率之外,现代管理程序所提供的一般灵活性以及它们对已成为相对商品的系统的支持也是显而易见的。通过关注虚拟机监控程序及其安全性,作者指出虚拟机监控程序是一些基本的,但非常强大。分离可以通过对不同的工作负载使用不同的硬件设施来实现,如物理分离、逻辑分离(涉及使用参考监视器)。 The authors defined the schematic diagram of a reference monitor which includes subject, security policy, object which are connected to the centralized reference monitor. Next, the authors focuses on Hardware virtualization support. Virtualization contains advantages like consolidation and isolation but it also contains disadvantages like large performance overhead to counter this disadvantage, the CPU manufacturers have been developing hardware support for virtualization where part or all of the emulation takes place in the CPU itself. The authors stated the architectural overview of a virtualized system. It includes Random Access Memory, central processing unit of virtual CPU's, PCI bridge IOMMU, Disk controller, Network controller and video controller located on a PCi bus. Then the author focuses on SHype-Hypervisor security architecture . The authors illustrated the Shype security architecture and its integration into a virtual machine Monitor environment. SHype is implemented in various stages for multiple hypervisors including Xen open source hypervisor. It includes the functions like strong isolation and mediates sharing, Attestation and integrity, resources control and accounting and secure services.Then the authors concentrated on SHype Access control architecture. They concluded the controlled sharing of direct VM to VM, VM to VM through local peripheral resources through resources VM and VM to VM through distributed networking resources. The purpose of virtualization and hypervisor security as discussed in this paper is the development of secure computing foundation. Enabling and managing what will essentially become a distributed trusted computing base, built upon the secure hardware and virtualization foundations discussed throughout this paper.

结论及未来工作

讨论了从2008年到2009年为匿名数据开发的各种方法。为广泛研究和其他目的发布人口普查或患者数据等微观数据是政府机构和其他社会协会关注的一个重要问题领域。通过文献调查发现,传统的方法从微数据中剔除社保号等唯一标识字段,但仍然会导致敏感数据的泄露,k-匿名优化算法在某些情况下似乎是有前景和强大的,但仍然存在优化的k-匿名是np难的限制,从而导致严重的计算挑战。k-匿名面临着同质性攻击和背景知识攻击的问题。为了解决这个问题,文献中提出的ldiversity概念也提出了一些约束,因为它被证明是低效的,无法防止属性泄露(偏度攻击和相似攻击),l-多样性难以实现,并且可能无法对跨等价类的敏感属性提供足够的隐私保护,可以大大改善信息披露限制技术(如采样单元抑制舍入和数据交换和扰动)的隐私。详细讨论了数据匿名化技术和数据泄露防范技术的发展。介绍了数据匿名化技术在弹道数据等几种频谱数据中的应用。这项调查将促进数据库匿名化领域的许多研究方向。

参考文献



































































全球科技峰会