20 research outputs found

    The design of efficient and secure P2PSIP systems

    Get PDF
    Doktorgradsavhandling i informasjons- og kommunikasjonsteknologi, Universitetet i Agder, Grimstad, 201

    Secure interworking with P2PSIP and IMS

    Get PDF
    Paper presented at the 2010 International Symposium on Collaborative Technologies and Systems (CTS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/CTS.2010.5478476In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3. party IMS Application Server (AS) in IMS network. The security is achieved by implementing Chord Secure Proxy (CSP) and enhanced with subjective logic based trust model. We also implement this system model and analyze it in several aspects: number of hops and delay, trust improvement and protection against malicious or compromised intermediate peers. We conclude that the proposed architecture is feasible and improves security. As far as we know our research is the first study that proposes secure internetworking P2PSIPS and IMS

    PSO-GA Based Resource AllocationStrategy for Cloud-Based SoftwareServices with Workload-Time Windows

    Get PDF
    Cloud-based software services necessitate adaptive resource allocation with the promise of dynamic resource adjustment for guaranteeing the Quality-of-Service (QoS) and reducing resource costs. However, it is challenging to achieve adaptive resource allocation for software services in complex cloud environments with dynamic workloads. To address this essential problem, we propose an adaptive resource allocation strategy for cloud-based software services with workload-time windows. Based on the QoS prediction, the proposed strategy first brings the current and future workloads into the process of calculating resource allocation plans. Next, the particle swarm optimization and genetic algorithm (PSO-GA) is proposed to make run time decisions for exploring the objective resource allocation plan. Using the RUBiS benchmark, the extensive simulation experiments are conducted to validate the effectiveness of the proposed strategy on improving the performance of resource allocation for cloud-based software services.The simulation results show that the proposed strategy can obtain a better trade-off between the QoS and resource costs than two classic resource allocation methods.publishedVersio

    Architecture-based integrated management of diverse cloud resources

    Get PDF
    Cloud management faces with great challenges, due to the diversity of Cloud resources and ever-changing management requirements. For constructing a management system to satisfy a specific management requirement, a redevelopment solution based on existing management systems is usually more practicable than developing the system from scratch. However, the difficulty and workload of redevelopment are also very high. As the architecture-based runtime model is causally connected with the corresponding running system automatically, constructing an integrated Cloud management system based on the architecture-based runtime models of Cloud resources can benefit from the model-specific natures, and thus reduce the development workload. In this paper, we present an architecture-based approach to managing diverse Cloud resources. First, manageability of Cloud resources is abstracted as runtime models, which could automatically and immediately propagate any observable runtime changes of target resources to corresponding architecture models, and vice versa. Second, a customized model is constructed according to the personalized management requirement and the synchronization between the customized model and Cloud resource runtime models is ensured through model transformation. Thus, all the management tasks could be carried out through executing programs on the customized model. The experiment on a real-world cloud demonstrates the feasibility, effectiveness and benefits of the new approach to integrated management of Cloud resources ? 2014, Chen et al.; licensee Springer.EI11-15

    Analysis of the Willingness and Factors Influencing the Residents to Choose Between Chinese Medicine and Western Medicine under the New Coronavirus Pandemic: A Study in Zhejiang Province Community Health Service Center

    Get PDF
    Objective: To understand the willingness of Chinese residents to choose between Chinese and Western medicine in the face of sudden outbreak, this study aims to investigate and analyze the willingness and factors influencing Chinese residents (taking Zhejiang Province as an example) to choose between Chinese and Western medicine under the new coronavirus pandemic. Methods: The present study performed a large-scale cross-sectional online survey among 666 random residents in Zhejiang Province. We used questionnaires to investigate the feedback form from residents seeking medical care. In addition, a multivariate logistic regression model was used to analyze the influence of gender, education, medical reimbursement, and age on the choice of Chinese and Western medicine. Results: Among the patients with mild disease, 55.9% patients chose traditional Chinese medicine, while 44.1% chose Western medicine. Moreover, the proportion of patients with severe diseases who chose traditional Chinese medicine was 7.0%, while the rate of Western medicine was 93.0%. Among the patients suffering from mild diseases, the proportion of men who chose traditional Chinese medicine (46.2%) was lower than that of women (53.8%). The usage of Chinese medicine was preferred among residents of all ages, income levels, and educational backgrounds. A total of 93.0% of patients who chose Western medicine for treatment were severely ill, and the residents with severe diseases preferred Western medicine to Chinese medicine. People with high education and young were more inclined toward Western medicine for treatment compared with Chinese medicine. It was noted that people paid most attention to the medical insurance reimbursement ratio, followed by the distance between the medical institution and the place of residence. Conclusion: The acceptance of Chinese medicine among patients has generally increased; however, gender, educational background, and income still exert a great influence on the choice between Chinese and Western medicine

    Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems

    Get PDF
    The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) technology breaks through the limitations of traditional terrestrial communications. The effective line-of-sight channel provided by UAVs can greatly improve the communication quality between edge servers and mobile devices (MDs). To further enhance the Quality-of-Service (QoS) of MEC systems, a multi-UAV-enabled MEC system model is designed. In the proposed model, UAVs are regarded as edge servers to offer computing services for MDs, aiming to minimize the average task response time by jointly optimizing UAV deployment and computation offloading. Based on the problem definition, a two-layer joint optimization method (PSO-GA-G) is proposed. First, the outer layer utilizes a Particle Swarm Optimization algorithm combined with Genetic Algorithm operators (PSO-GA) to optimize UAV deployment. Next, the inner layer adopts a greedy algorithm to optimize computation offloading. The extensive simulation experiments verify the feasibility and effectiveness of the proposed PSO-GA-G. The results show that the PSO-GA-G can achieve a lower average task response time than the other three baselines.publishedVersio

    Secure interworking with P2PSIP and IMS

    No full text
    Paper presented at the 2010 International Symposium on Collaborative Technologies and Systems (CTS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/CTS.2010.5478476In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3. party IMS Application Server (AS) in IMS network. The security is achieved by implementing Chord Secure Proxy (CSP) and enhanced with subjective logic based trust model. We also implement this system model and analyze it in several aspects: number of hops and delay, trust improvement and protection against malicious or compromised intermediate peers. We conclude that the proposed architecture is feasible and improves security. As far as we know our research is the first study that proposes secure internetworking P2PSIPS and IMS

    A survey on peer-to-peer SIP based communication systems

    Get PDF
    Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information on each participating peer without help of the central servers. The concept of self-configuration, self-establishment greatly improves the robustness of the network system compared with the traditional Client/Server based systems. In this paper, we survey P2PSIP solutions proposed recently both in the academic and industrial research. We consider technical issues that include Chord overlay topology, P2PSIP session initiation (including enrollment and bootstrap, NAT traversal, message routing, P2PSIP interworking, P2PSIP Client, etc), and security issues. Our survey is based on recent research publications. © 2010 Springer Science + Business Media, LLC
    corecore