138 research outputs found
A performance study of routing protocols for mobile grid environment
Integration of mobile wireless consumer devices into the Grid initially seems unlikely due to limitation such as CPU performance,small secondary storage, heightened battery consumption sensitivity and unreliable low-bandwidth communication. The current grid architecture and algorithm also do not take into account the mobile computing environment since mobile devices have not been seriously considered as valid computing resources or interfaces in grid communities. This paper presents the results
of simulation done in identifying a suitable ad hoc routing
protocol that can be used for the target grid application in mobile environment. The simulation comparing three ad hoc routing protocols named DSDV, DSR and AODV
An optimised cuckoo-based discrete symbiotic organisms search strategy for tasks scheduling in cloud computing environment
Currently, the cloud computing paradigm is experiencing rapid growth as there
is a shift from other distributed computing methods and traditional IT
infrastructure towards it. Consequently, optimised task scheduling techniques
have become crucial in managing the expanding cloud computing environment. In
cloud computing, numerous tasks need to be scheduled on a limited number of
diverse virtual machines to minimise the imbalance between the local and global
search space; and optimise system utilisation. Task scheduling is a challenging
problem known as NP-complete, which means that there is no exact solution, and
we can only achieve near-optimal results, particularly when using large-scale
tasks in the context of cloud computing. This paper proposes an optimised
strategy, Cuckoo-based Discrete Symbiotic Organisms Search (C-DSOS) that
incorporated with Levy-Flight for optimal task scheduling in the cloud
computing environment to minimise degree of imbalance. The strategy is based on
the Standard Symbiotic Organism Search (SOS), which is a nature-inspired
metaheuristic optimisation algorithm designed for numerical optimisation
problems. SOS simulates the symbiotic relationships observed in ecosystems,
such as mutualism, commensalism, and parasitism. To evaluate the proposed
technique, the CloudSim toolkit simulator was used to conduct experiments. The
results demonstrated that C-DSOS outperforms the Simulated Annealing Symbiotic
Organism Search (SASOS) algorithm, which is a benchmarked algorithm commonly
used in task scheduling problems. C-DSOS exhibits a favourable convergence
rate, especially when using larger search spaces, making it suitable for task
scheduling problems in the cloud. For the analysis, a t-test was employed,
reveals that C-DSOS is statistically significant compared to the benchmarked
SASOS algorithm, particularly for scenarios involving a large search space.Comment: 21 pages, 5 figures, 2 algorithms, 6 table
Agent-based pricing determination for cloud services in multi-tenant environment
Cloud computing acts as a resource sharing pool that provides services to multiple customers, which are called tenants through the Internet. One of the big challenges in cloud is providing a price for leasing the services while adapting with budget limit of the tenants. In order to meet the rapidly growing and dynamic demands of tenants, this paper proposes a pricing determination scheme for cloud services using mathematical analysis. It aims to balance satisfaction between tenants and service provider in terms of budget and profit. Specifically, our pricing determination procedure aggregated the budget constraint of tenants and service cost to calculate the potential price of service. Service level agreement (SLA) is handled by an agent for determining minimum and maximum prices that represent in a range. Hence, the service cost that charged by the provider is identified within the price range in order to meet tenants’ requests. The results from our simulation demonstrate that the proposed pricing determination scheme provides better tenant satisfaction while sustaining provider profitability
Overview of cross site request forgery and client-side protection
As long as internet and web application are a part of our
lives to let us to live as easy as we moved like: online
market, online bank, online shop and many more, it take
attention of malicious to take an advantage of our easy
life. Lately there are many types of attacks on web
application but so far mostly focused Cross Site Scripting
and SQL injection attacks. However there is less attention
to prevent Cross Site Request. Cross Site Request Forgery
permits malicious to make a request on behalf of user
without his/her knowledge. The attack used the
authentication between the target website and user
through the internet browser. In this paper we would
present how Cross Site Request forgery attack works. In
additional we present our approach to mitigate Cross Site
Request forgery by PCSRF Framework (Prevent Cross
Site Request forgery) on Firefox. We propose client side
protection. We had experimental test of our framework
functionality. From 134 numbers of attacks which
contains Post, Get and other methods, we successfully
managed to prevent over 79% of attack through three
different test sections
The idle resource items workload and implication on different weight balance rate in grid scheduling
This paper discusses the impact of background workload for idle re-source items of computing elements in grid computing. Most of the previous re-search did not consider this factor. A resource item may be processing local system operations when the grid perceives them to be idle, thus upsetting grid processing activities. The introduction of the resource items and background load factor in this study will reveal the true computing capability of computing elements. This background load factor, represented in the form of weightage on resource item, is tested to seek overall grid performance. By allocating the right balance of workload weightage of resource item in a computing element, a significant improvement in processing performance is achieved
Dynamic load balancing policy with communication and computation elements in grid computing with multi-agent system integration
The policy in dynamic load balancing, classification and function are variety based on the focus study for each research. They are different but employing the same strategy to obtain the load balancing. The communication processes between policies are explored within the dynamic load balancing and decentralized approaches. At the same time the computation processes also take into consideration for further steps. Multi-agent system characteristics and capabilities are explored too. The unique capabilities offered by multi-agent systems can be integrated or combined with the structure of dynamic load balancing to produce a better strategy and better load balancing algorithm
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
BYOD is a practice by many organizations where employees can use their personal devices for work purpose. BYOD may bring a lot of advantages, but it also leads to security issues such as data leakages. Data can be leaked because of the weak authentication technique used to verify the user and the device. A secure authentication technique is what the organization needs that equip with high security features. Blockchain is the answer to this because blockchain used cryptographic technology that’s not easy for hacker to break. This research proposes a user trust model that includes multifactor authentication combining with public and private key generated by blockchain and an agentless device trust model that can scan for malware and detect the device location. In order to secure the record and sensitive data, the record keeping model is built using blockchain technology where every activity related to the record is recorded in the digital ledger. This ledger can be used as evidence collection for further investigation. It is hoped the proposed BYOD trust model solution can help organizations to minimize the number of cases in data leakage while allowing BYOD concept
Revocable and non-invertible multibiometric template protection based on matrix transformation
Biometric authentication refers to the use of measurable characteristics (or features) of the human body to provide secure, reliable and convenient access to a computer system or physical environment. These features (physiological or behavioural) are unique to individual subjects because they are usually obtained directly from their owner's body. Multibiometric authentication systems use a combination of two or more biometric modalities to provide improved performance accuracy without offering adequate protection against security and privacy attacks. This paper proposes a multibiometric matrix transformation based technique, which protects users of multibiometric systems from security and privacy attacks. The results of security and privacy analyses show that the approach provides high-level template security and user privacy compared to previous one-way transformation techniques
Workload utilization dissemination on grid resources for simulation environment
This paper discusses the workload utilization dissemination for grid computing. The CPU is a well-known resource item and it is an integral part in most literatures while other RI's may include memory, network and I/O overhead. The selection of resource variables and the number of RI's involved will result in different definitions of the workload. Various combination of computer RI's have been explored for studying the style of usage, techniques embedded and their capabilities. In contemplating the exploration, this study successfully describe the pattern of workload dissemination through the usage of the RI's and elicited the enhancement factors for systems performance. Among these factors are the manipulation of computer RI's, type of workload information with method of use, the workload dissemination direction along with implementation method and using certain algorithm to come out with new integrated scheduling with load balancing capability. A combination of these factors will help in developing an optimized scheduling or load balancing algorithm
State of the Art in Biometric Key Binding and Key Generation Schemes
Direct storage of biometric templates in databases exposes the authentication system and legitimate users to numerous security and privacy challenges. Biometric cryptosystems or template protection schemes are used to overcome the security and privacy challenges associated with the use of biometrics as a means of authentication. This paper presents a review of previous works in biometric key binding and key generation schemes. The review focuses on key binding techniques such as biometric encryption, fuzzy commitment scheme, fuzzy vault and shielding function. Two categories of key generation schemes considered are private template and quantization schemes. The paper also discusses the modes of operations, strengths and weaknesses of various kinds of key-based template protection schemes. The goal is to provide the reader with a clear understanding of the current and emerging trends in key-based biometric cryptosystems
- …