-
Workload time series prediction in storage systems: a deep learning based approach Cluster Comput. (IF 3.458) Pub Date : 2021-01-13 Li Ruan, Yu Bai, Shaoning Li, Shuibing He, Limin Xiao
Storage workload prediction is a critical step for fine-grained load balancing and job scheduling in realtime and adaptive cluster systems. However, how to perform workload time series prediction based on a deep learning method has not yet been thoroughly studied. In this paper, we propose a storage workload prediction method called CrystalLP based on deep learning. CrystalLP includes workload collecting
-
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection Cluster Comput. (IF 3.458) Pub Date : 2021-01-13 Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
Intrusion detection is one of the most crucial activities for security infrastructures in network environments, and it is widely used to detect, identify and track malicious threats. A common approach in intrusion detection systems (IDSs) specifically in anomaly detection is evolutionary algorithm that works as intrusion detector. Still, it has been challenging to design a precise and reliable IDS
-
Truthful online double auction based dynamic resource provisioning for multi-objective trade-offs in IaaS clouds Cluster Comput. (IF 3.458) Pub Date : 2021-01-11 Yashwant Singh Patel, Zahra Malwi, Animesh Nighojkar, Rajiv Misra
Auction designs have recently been adopted for static and dynamic resource provisioning in IaaS clouds, such as Microsoft Azure and Amazon EC2. However, the existing mechanisms are mostly restricted to simple auctions, single-objective, offline setting, one-sided interactions either among cloud users or cloud service providers (CSPs), and possible misreports of cloud user’s private information. This
-
Delay-aware optimization of energy consumption for task offloading in fog environments using metaheuristic algorithms Cluster Comput. (IF 3.458) Pub Date : 2021-01-11 Maryam Keshavarznejad, Mohammad Hossein Rezvani, Sepideh Adabi
Due to the limitations associated with the processing capability of mobile devices in cloud environments, various tasks are offloaded to the cloud server. This has led to an increase in the efficiency of mobile applications in the two decades since the advent of the cloud paradigm. However, task offloading may not be a suitable option for delay-sensitive mobile applications because the cloud server
-
DiG: enabling out-of-band scalable high-resolution monitoring for data-center analytics, automation and control (extended) Cluster Comput. (IF 3.458) Pub Date : 2021-01-07 Antonio Libri, Andrea Bartolini, Luca Benini
Data centers are increasing in size and complexity, and we need scalable approaches to support their automated analysis and control. Performance counters and power consumption are their key “vital signs”. State-of-the-Art (SoA) monitoring systems provide built-in tools to collect performance measurements, and custom solutions to get insight on their power consumption. However, with the increase in
-
Energy and cost trade-off for computational tasks offloading in mobile multi-tenant clouds Cluster Comput. (IF 3.458) Pub Date : 2021-01-07 Yashwant Singh Patel, Manoj Reddy, Rajiv Misra
Mobile cloud computing augments smart-phones with computation capabilities by offloading computations to the cloud. Recent works only consider the energy savings of mobile devices while neglecting the cost incurred to the tasks which are offloaded. We might offload several tasks to minimize the total energy consumption of mobile devices; however, this could incur a huge monetary cost. Furthermore,
-
Collective periodic pattern discovery for understanding human mobility Cluster Comput. (IF 3.458) Pub Date : 2021-01-04 Tantan Shi, Genlin Ji, Zhaoyuan Yu, Bin Zhao
Periodic behaviors are essential to understanding objects’ movements. In real world situations, the collective movement of moving objects hides useful periodic patterns that people are more interested in. Discovering such periodic patterns is helpful in exploring human mobility, which can benefit many applications, such as urban planning, traffic management and public security. However, the previous
-
Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system Cluster Comput. (IF 3.458) Pub Date : 2021-01-03 Jasleen Kaur, Supreet Kaur
Recently Mobile adhoc networks (MANETs) have received the great attention of researchers as these models provide a wide range of applications. But MANET nodes are prone to various security threats. To overcome this issue, many trust management frameworks have been implemented in the literature. It has been found that the use of machine learning can predict trust values more efficiently. However, machine
-
Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing Cluster Comput. (IF 3.458) Pub Date : 2021-01-02 S. Krishnaveni, S. Sivamohan, S. S. Sridhar, S. Prabakaran
Cloud computing is a preferred option for organizations around the globe, it offers scalable and internet-based computing resources as a flexible service. Security is a key concern factor in any cloud solution due to its distributed nature. Security and privacy are huge obstacles faced in its success of the on-demand service as it is easily vulnerable to intruders for any kind of attack. A huge upsurge
-
Quality evaluation method of agricultural product packaging image based on structural similarity and MTF Cluster Comput. (IF 3.458) Pub Date : 2021-01-02 Li Quan
With the rapid development of multimedia and communication technologies, image technology has become more and more widely used in agriculture. Aiming at the advantages of structural similarity and MTF combined algorithm, this paper proposes an image quality evaluation algorithm based on structural similarity and MTF, which mainly adopts improved gamma correction method, dual homomorphic filter correction
-
Early DGA-based botnet identification: pushing detection to the edges Cluster Comput. (IF 3.458) Pub Date : 2021-01-02 Mattia Zago, Manuel Gil Pérez, Gregorio Martínez Pérez
With the first commercially available 5G infrastructures, worldwide’s attention is shifting to the next generation of theorised technologies that might be finally deployable. In this context, the cybersecurity of edge equipment and end-devices must be a top priority as botnets see their spread remarkably increase. Most of them rely on algorithmically generated domain names (AGDs) to evade detection
-
A divide and conquer approach to deadline constrained cost-optimization workflow scheduling for the cloud Cluster Comput. (IF 3.458) Pub Date : 2021-01-02 Ghazaleh Khojasteh Toussi, Mahmoud Naghibzadeh
The modeling of complex computational applications as giant computational workflows has been a critically effective means of better understanding the intricacies of applications and of determining the best approach to their realization. It is a challenging assignment to schedule such workflows in the cloud while also considering users’ different quality of service requirements. The present paper introduces
-
SaMW: a probabilistic meta-heuristic algorithm for job scheduling in heterogeneous distributed systems powered by microservices Cluster Comput. (IF 3.458) Pub Date : 2021-01-02 Dimitrios Tychalas, Helen Karatza
Applications are evolving in ways that demand geographically distributed resources to co-operate in order to give users better Quality of Service (QoS). There is a plethora of ways to implement such systems, but a Heterogeneous Distributed System such as Jungle Computing System is the one that fits the above scenario the most. Additionally, utilizing the Microservices paradigm results in a dynamic
-
Smart contract based policies for the Internet of Things Cluster Comput. (IF 3.458) Pub Date : 2021-01-01 Vikram Puri, Ishaani Priyadarshini, Raghvendra Kumar, Chung Van Le
Internet of Things (IoT) is one of the most powerful platforms that incorporates several other technological components within itself. The IoT ecosystem comprises devices, communications, protocols, analytics, cloud, automation, etc. Its magnitude keeps on increasing with the addition of tools and services. While IoT has many advantages like connectivity, efficiency, and convenience, it is a known
-
PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems Cluster Comput. (IF 3.458) Pub Date : 2021-01-01 Kamalakanta Sethi, Ankit Pradhan, Padmalochan Bera
Attribute-based encryption (ABE) has evolved as an efficient and secure method for storage of data with fine-grained access control in cloud platforms. In recent years, increasing diversification in the design of ABE schemes has led to significant research in the assimilation of properties like traceability, revocation, and outsourcing decryption. However, most of the recent ABE schemes incorporate
-
Privacy protection for fog computing and the internet of things data based on blockchain Cluster Comput. (IF 3.458) Pub Date : 2020-10-15 Yanhui Liu, Jianbiao Zhang, Jing Zhan
With the development of the Internet of Things (IoT) field, more and more data are generated by IoT devices and transferred over the network. However, a large amount of IoT data is sensitive, and the leakage of such data is a privacy breach. The security of sensitive IoT data is a big issue, as the data is shared over an insecure network channel. Current solutions include symmetric encryption and access
-
Event-driven IoT architecture for data analysis of reliable healthcare application using complex event processing Cluster Comput. (IF 3.458) Pub Date : 2020-10-15 Amir Masoud Rahmani, Zahra Babaei, Alireza Souri
Internet of Things (IoT) is enhancing the intelligence of the societies through a rapid transition to a smarter, automatic, responsive world due to the dramatic increase in the number of sensors deployed around the world. Collecting, modeling, and reasoning data generated by sensors play a crucial role in data analysis. Analyzing and interpreting real-time information transmitted through heterogeneous
-
A survey on boosting IoT security and privacy through blockchain Cluster Comput. (IF 3.458) Pub Date : 2020-10-06 Omar Alfandi, Salam Khanji, Liza Ahmad, Asad Khattak
The constant development of interrelated computing devices and the emergence of new network technologies have caused a dramatic growth in the number of Internet of Things (IoT) devices. It has brought great convenience to people’s lives where its applications have been leveraged to revolutionize everyday objects connected in different life aspects such as smart home, healthcare, transportation, environment
-
A parallel sparse triangular solve algorithm based on dependency elimination of the solution vector Cluster Comput. (IF 3.458) Pub Date : 2020-10-03 Song Jin, Songwei Pei, Yu Wang, Yincheng Qi
Sparse triangular solve (SpTRSV) is an important kernel in many scientific computing applications. In traditional viewpoints, accelerating SpTRSV by parallelizing the solution process is a challenging task. Dependencies among the variables that exist in the solution process not only restrict the parallelism that can be achieved, but also introduce large synchronization overhead among the parallel tasks
-
Power efficient virtual machine placement in cloud data centers with a discrete and chaotic hybrid optimization algorithm Cluster Comput. (IF 3.458) Pub Date : 2020-09-28 Sasan Gharehpasha, Mohammad Masdari, Ahmad Jafarian
Cloud computing is a new computation technology that provides services to consumers and businesses. The main idea of Cloud computing is to present software and hardware services through the Internet to the users and organizations at all levels. In Cloud computing, the users pay for the services, which means a usage-based payment system is used in this technology. Using virtualization technology in
-
An efficient content placement scheme based on normalized node degree in content centric networking Cluster Comput. (IF 3.458) Pub Date : 2020-09-22 Sumit Kumar, Rajeev Tiwari
Content-centric networking (CCN) becomes an imminent Internet architecture that emphasizes the data-centric approach for information retrieval instead of searching for the hosts in the network. CCN offers data (content) caching and its distribution capabilities to reduce average latency, the load of data servers, and improve network bandwidth utilization during content delivery. In this direction,
-
Simultaneous application assignment and virtual machine placement via ant colony optimization for energy-efficient enterprise data centers Cluster Comput. (IF 3.458) Pub Date : 2020-09-21 Fares Alharbi, Yu-Chu Tian, Maolin Tang, Md Hasanul Ferdaus, Wei-Zhe Zhang, Zu-Guo Yu
Enterprise cloud data centers consume a tremendous amount of energy due to the large number of physical machines (PMs). These PMs host a huge number of virtual machines (VMs), on which a vast number of applications are deployed. Existing research uses two separate layers to manage data center resources: application assignment to VMs, and VM placement to PMs, each of which is a bin packing problem.
-
A survey and classification of the security anomaly detection mechanisms in software defined networks Cluster Comput. (IF 3.458) Pub Date : 2020-09-18 Tohid Jafarian, Mohammad Masdari, Ali Ghaffari, Kambiz Majidzadeh
Software defined network (SDN) decouples the network control and data planes. Despite various advantages of SDNs, they are vulnerable to various security attacks such anomalies, intrusions, and Denial-of-Service (DoS) attacks and so on. On the other hand, any anomaly and intrusion in SDNs can affect many important domains such as banking system and national security. Therefore, the anomaly detection
-
A regression tree predictive model for virtual machine startup time in IaaS clouds Cluster Comput. (IF 3.458) Pub Date : 2020-09-17 Yatheendraprakash Govindaraju, Hector A. Duran-Limon, Efrén Mezura-Montes
Cloud computing provides effective ways to rapidly provision computing resources over the Internet. For a better management of resource provisioning, the system requires to predict service-level agreements (SLAs) such as virtual machine (VM) startup times under various conditions of computing resources. The VM startup time is an important SLA parameter, which can impact other SLA parameters such as
-
Predicting QoS of virtual machines via Bayesian network with XGboost-induced classes Cluster Comput. (IF 3.458) Pub Date : 2020-09-12 Jia Hao, Kun Yue, Liang Duan, Binbin Zhang, Xiaodong Fu
Quality of Service (QoS) of virtual machines (VMs) is guaranteed by the Service Level Agreements (SLAs) signed between users and service providers during the renting of VMs. A typical idea to ensure the SLAs being reached is to predict the QoS of VMs accurately and then take the appropriate measures according to the prediction results timely. However, the QoS is affected by multiple VM-related features
-
A novel arbitration mechanism for crossbar switch in wireless network-on-chip Cluster Comput. (IF 3.458) Pub Date : 2020-09-12 Farhad Rad, Midia Reshadi, Ahmad Khademzadeh
Wireless network-on-chip (WiNoC) has been introduced as an efficient communication paradigm that can provide high bandwidth and low latency wireless links among long-distance cores. However, the increase of demand for using these shared wireless links and the presence of few numbers of these channels on a chip leads to port contention in WiNoCs. This problem increases the average packet latency as
-
Defense against malware propagation in complex heterogeneous networks Cluster Comput. (IF 3.458) Pub Date : 2020-09-12 Soodeh Hosseini
Devising appropriate defense strategies against malware propagation in complex networks with minimal budget is a challenging problem in research community. This paper studies and compares various immunization strategies such as random immunization, targeted immunization, acquaintance immunization and high-risk immunization to prevent the outbreak of malware. Also, three measures of node centrality
-
Development of benchmark automation suite and evaluation of various high-performance computing systems Cluster Comput. (IF 3.458) Pub Date : 2020-09-10 Seungwoo Rho, Geunchul Park, Ji Eun Choi, Chan-Yeol Park
This study aimed to develop a dynamic benchmark automation suite to measure a range of benchmark performances and evaluate the various high-performance computing (HPC) systems. Our suite supports an automated scaling test and profiling data based on hardware performance counters to analyze the system characteristics. We selected four HPC benchmarks—STREAM, High-Performance Linpack, High-Performance
-
Hybridizing particle swarm optimization with simulated annealing and differential evolution Cluster Comput. (IF 3.458) Pub Date : 2020-09-10 Emad Mirsadeghi, Salman Khodayifar
Based on the algorithm structure, each metaheuristic algorithm may have its pros and cons, which may result in high performance in some problems and low functionality in some others. The idea is to hybridize two or more algorithms to cover each other’s weaknesses. In this study, particle swarm optimization (PSO), simulated annealing (SA) and differential evolution (DE) are combined to develop a more
-
Cloud services security-driven evaluation for multiple tenants Cluster Comput. (IF 3.458) Pub Date : 2020-09-09 Sarah Maroc, Jian Biao Zhang
Cloud Computing has become a reliable solution for outsourcing business data and operation with its cost-effective and resource-efficient services. A key part of the success of the cloud is the multi-tenancy architecture, where a single instance of a service can be shared between a large number of users, also known as tenants. Service selection for multiple tenants presents a real challenge that has
-
Response Surface Modelling for Performance Analysis of Scientific Workflow Application in Cloud Cluster Comput. (IF 3.458) Pub Date : 2020-09-09 Prathibha Soma, B. Latha
Scientific workflow applications are used by scientists to carry out research in various domains such as Physics, Chemistry, Astronomy etc. These applications require huge computational resources and currently cloud platform is used for efficiently running these applications. To improve the makespan and cost in workflow execution in cloud platform it requires to identify proper number of Virtual Machines
-
Budget-deadline constrained approach for scientific workflows scheduling in a cloud environment Cluster Comput. (IF 3.458) Pub Date : 2020-09-08 Naqin Zhou, Weiwei Lin, Wei Feng, Fang Shi, Xiongwen Pang
In cloud computing environments, it is a great challenge to schedule a workflow application because it is an NP-complete problem. Particularly, scheduling workflows with different Quality of Service (QoS) constraints makes the problem more complex. Several approaches have been proposed for QoS workflow scheduling, but most of them are focused on a single QoS constraint. Therefore, this paper presents
-
Autonomic task scheduling algorithm for dynamic workloads through a load balancing technique for the cloud-computing environment Cluster Comput. (IF 3.458) Pub Date : 2020-09-03 Fatemeh Ebadifard, Seyed Morteza Babamir
Applying the load balancing technique to allocate requests that dynamically enter the cloud environment is contributive in maintaining the system stability, reducing the response time, and increasing the resource productivity. One of the main challenges in dynamic load balancing is that it increases inter-VM communication overheads (swapping files between VMs). In most of the methods proposed for load
-
A dynamic task scheduler tolerant to multiple hibernations in cloud environments Cluster Comput. (IF 3.458) Pub Date : 2020-09-03 Luan Teylo, Luciana Arantes, Pierre Sens, Lucia M. A. Drummond
Cloud platforms usually offer several types of Virtual Machines (VMs) with different guarantees in terms of availability and volatility, provisioning the same resource through multiple pricing models. For instance, in the Amazon EC2 cloud, the user pays per use for on-demand VMs while spot VMs are instances available at lower prices. However, a spot VM can be terminated or hibernated by EC2 at any
-
A collective attestation scheme towards cloud system Cluster Comput. (IF 3.458) Pub Date : 2020-09-03 Yuan Song, Wenchang Shi, Bo Qin, Bin Liang
Considering cloud computing continues to grow and flourish, the increasing number of cloud infrastructures results in unlimited resources and convenient pay-as-you-go services, which makes it essential to ensure software integrity (including OS, apps, and configurations) on such massive devices to guarantee both privacy and safety. As a key technical solution, remote attestation allows a remote entity
-
Migrating legacy Web applications Cluster Comput. (IF 3.458) Pub Date : 2020-09-02 Viviana Cajas, Matias Urbieta, Gustavo Rossi, Yves Rybarczyk
Since the adoption of portable devices like smartphones or smartwatches, the usage of applications has rapidly increased for supporting diverse daily activities from connecting with friends to measuring running distance. Since the Apps are an ubiquitous tool in everyday life, it is also an opportunity for a new digital business model. However, there are legacy applications implementing the core business
-
TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things Cluster Comput. (IF 3.458) Pub Date : 2020-09-02 Abdul Jabbar Siddiqui, Azzedine Boukerche
In the recent years, the Internet of Things has been becoming a vulnerable target of intrusion attacks. As the academia and industry move towards bringing the Internet of Things (IoT) to every sector of our lives, much attention needs to be given to develop advanced Intrusion Detection Systems (IDS) to detect such attacks. In this work, we propose a novel network-based intrusion detection method which
-
Retail level Blockchain transformation for product supply chain using truffle development platform Cluster Comput. (IF 3.458) Pub Date : 2020-08-31 Rana M. Amir Latif, Muhammad Farhan, Osama Rizwan, Majid Hussain, Sohail Jabbar, Shahzad Khalid
In any business network for record transactions, validation, and track assets, we have used a Blockchain platform, which is shared a distributed ledger that used cryptography techniques. Globally, there are different rules and operating procedures in the supply chain network. These regulations are used for end-to-end tracking between industries of different countries. The major problem faced today
-
Platonica: an efficient and high-performance dual-centric data center network architecture Cluster Comput. (IF 3.458) Pub Date : 2020-08-29 Sara Nasirian, Farhad Faghani
The unprecedented growth in data volume results in an urgent need for a dramatic increase in the size of data center networks. Accommodating millions to even billions of servers in the structure of data center networks, while providing highly-efficient interconnecting architectures, is of prominent importance nowadays. Generally, high scalability, noticeable fault-tolerance, great network capacity
-
Robust product recommendation system using modified grey wolf optimizer and quantum inspired possibilistic fuzzy C-means Cluster Comput. (IF 3.458) Pub Date : 2020-08-25 Likhesh Kolhe, Ashok Kumar Jetawat, Vaishali Khairnar
In recent years, several researchers have developed web-based product recommendation systems to assist customers in product search and selection during online shopping. In addition, the product recommendation systems deliver true personalization by recommending the products based on the other customer’s preferences. This study has investigated how the product recommendation system influences the customer’s
-
Parallel deterministic local search heuristic for minimum latency problem Cluster Comput. (IF 3.458) Pub Date : 2020-08-25 Pramod Yelmewad, Basavaraj Talawar
Minimum latency problem (MLP) is an NP-Hard combinatorial optimization problem. Metaheuristics use perturbation and randomization to arrive at a satisfactory solution under time constraints. The current work uses deterministic local search heuristic (DLSH) to identify a satisfactory solution without setting up metaheuristic parameters. A move evaluation procedure is proposed for the swap approach which
-
A model-driven engineering approach for the service integration of IoT systems Cluster Comput. (IF 3.458) Pub Date : 2020-08-24 Darwin Alulema, Javier Criado, Luis Iribarne, Antonio Jesús Fernández-García, Rosa Ayala
With the development of IoT devices and web services, the objects of the real world are more interconnected, which allows applications to extend their characteristics in different fields, including industrial or home environments, among other possible examples such as health, trade, transport, or agriculture. However, this development highlights the challenge of interoperability, because devices are
-
AutoWM: a novel domain-specific tool for universal multi-/many-core accelerations of the WRF cloud microphysics Cluster Comput. (IF 3.458) Pub Date : 2020-08-12 Peng Zhang, Chao Yang, Yulong Ao
In large-scale atmospheric simulations, microphysics parameterization often takes a large portion of simulation time and usually consists of dozens of parameterization schemes. Performance optimizing these schemes one by one on different hardware platforms is tedious and error-prone even for skilled programmers. In this work, we propose AutoWM, a novel domain-specific tool for universal performance
-
Apache Spark Implementation of Whale Optimization Algorithm Cluster Comput. (IF 3.458) Pub Date : 2020-08-12 Maryam AlJame, Imtiaz Ahmad, Mohammad Alfailakawi
Population-based meta-heuristic algorithms are among the dominant algorithms used to solve challenging real world problems in diverse fields. Whale Optimization Algorithm (WOA) is a recent swarm intelligence meta-heuristic algorithm based on the bubble-net feeding behavior of humpback whales. Despite its capability to solve complex optimization problems, WOA requires enormous amount of computations
-
An efficient power-aware VM allocation mechanism in cloud data centers: a micro genetic-based approach Cluster Comput. (IF 3.458) Pub Date : 2020-08-09 Mehran Tarahomi, Mohammad Izadi, Mostafa Ghobaei-Arani
Efficiency in cloud servers’ power consumption is of paramount importance. Power efficiency makes the reduction in greenhouse gases establishing the concept of green computing. One of the beneficial ways is to apply power-aware methods to decide where to allocate virtual machines (VMs) in data center physical resources. Virtualization is utilized as a promising technology for power-aware VM allocation
-
Multi-criteria HPC task scheduling on IaaS cloud infrastructures using meta-heuristics Cluster Comput. (IF 3.458) Pub Date : 2020-08-09 Amit Chhabra, Gurvinder Singh, Karanjeet Singh Kahlon
With the rapid increase in the use of cloud computing systems, an efficient task scheduling policy, which deals with the assignment of tasks to resources, is required to obtain maximum performance. Cloud task scheduling (CTS) is an established NP-Hard optimization problem that can be effectively tackled with meta-heuristic algorithms. The cuckoo search (CS) algorithm is a powerful swarm-intelligence
-
The optimal privacy strategy of cloud service based on evolutionary game Cluster Comput. (IF 3.458) Pub Date : 2020-08-08 Pan Jun Sun
Cloud service has great convenience, because of its complex structure and dynamic nature, it is difficult to choose the best cost-effective strategy in the process of security and privacy information. To solve this problem, we construct a quantitative benefit of game strategy, use evolutionary game theory to build a game model of attack protection, propose the optimal protection strategy selection
-
CCS-OSSR: A framework based on Hybrid MCDM for Optimal Service Selection and Ranking of Cloud Computing Services Cluster Comput. (IF 3.458) Pub Date : 2020-08-05 Rakesh Ranjan Kumar, Binita Kumari, Chiranjeev Kumar
With the exponential proliferation of cloud services, the decision of trustworthy cloud service selection has become tremendously challenging nowadays. It demands an accurate decision system to carry out a comprehensive assessment of cloud services from various aspects. The immense complexity and limitations of existing approaches reduce the credibility of the service selection process; thus, further
-
Blockchain-based e-cheque clearing framework with trust based consensus mechanism Cluster Comput. (IF 3.458) Pub Date : 2020-07-31 Nikita Singh, Tarun Kumar, Manu Vardhan
The cheque based banking transactions are widely used all over the world. The reason is that it is a hustle free and trusted way of money transaction. The existing cheque settlement process involves manual processing of submitted cheques, and large amounts of time for clearance. This paper proposes a framework to automate the cheque settlement process. This framework proposes cheque generation, cheque
-
Design and evaluation of a user authentication model for IoT networks based on app event patterns Cluster Comput. (IF 3.458) Pub Date : 2020-07-28 Yosef Ashibani, Qusay H. Mahmoud
Access to a variety of Internet of Things networks can be achieved through end-user devices such as smartphones or tablets. However, these devices are susceptible to theft, loss or unauthorized access. Although end-user devices are equipped with different means of authentication such as fingerprint readers, these methods are only employed at the time of access. Hence, an effective authentication mechanism
-
Increasing the quality of services and resource utilization in vehicular cloud computing using best host selection methods Cluster Comput. (IF 3.458) Pub Date : 2020-07-27 Reza Sookhtsaraei, Marzieh Iraji, Javad Artin, Mohammad Saber Iraji
One of the technology for increasing the safety and welfare of humans in roads is Vehicular Cloud Computing (VCC). This technology can utilize cloud computing advantages in the Vehicular Ad Hoc Network (VANET). VCC by utilizing modern equipment along with current vehicles, can play a significant role in the area of smart transportation systems. Given the potential of this technology, effective methods
-
Multi-task learning based on question–answering style reviews for aspect category classification and aspect term extraction on GPU clusters Cluster Comput. (IF 3.458) Pub Date : 2020-07-27 Hanqian Wu, Siliang Cheng, Zhike Wang, Shangbin Zhang, Feng Yuan
Cluster computing technologies are rapidly advancing and user-generated online reviews are booming in the current Internet and e-commerce environment. The latest question–answering (Q&A)-style reviews are novel, abundant and easily digestible product reviews that also contain massive valuable information for customers. In this paper, we mine valuable aspect information of products contained in these
-
Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities Cluster Comput. (IF 3.458) Pub Date : 2020-07-25 Akalanka Mailewa Dissanayaka, Susan Mengel, Lisa Gittner, Hafiz Khan
It is essential to ensure the data security of data analytical frameworks as any security vulnerability existing in the system can lead to a data loss or data breach. This vulnerability may occur due to attacks from live attackers as well as automated bots. However inside attacks are also becoming more frequent because of incorrectly implemented security requirements and access control policies. Thus
-
Design and implementation of an I/O isolation scheme for key-value store on multiple solid-state drives Cluster Comput. (IF 3.458) Pub Date : 2020-07-24 Hwajung Kim, Heon Young Yeom, Yongseok Son
High-performance storage devices, such as Non-Volatile Memory express Solid-State Drives (NVMe SSDs), have been widely adopted in data centers. Especially, multiple storage devices provide higher I/O performance compared with a single device. However, the performance can be reduced in the case of workloads with mixed read and write requests (e.g., key-value stores) even though multiple storage devices
-
Self-tuning serverless task farming using proactive elasticity control Cluster Comput. (IF 3.458) Pub Date : 2020-07-23 Stefan Kehrer, Dominik Zietlow, Jochen Scheffold, Wolfgang Blochinger
The cloud evolved into an attractive execution environment for parallel applications, which make use of compute resources to speed up the computation of large problems in science and industry. Whereas Infrastructure as a Service (IaaS) offerings have been commonly employed, more recently, serverless computing emerged as a novel cloud computing paradigm with the goal of freeing developers from resource
-
Energy and resource efficient workflow scheduling in a virtualized cloud environment Cluster Comput. (IF 3.458) Pub Date : 2020-07-23 Neha Garg, Damanpreet Singh, Major Singh Goraya
High energy consumption (EC) is one of the leading and interesting issue in the cloud environment. The optimization of EC is generally related to scheduling problem. Optimum scheduling strategy is used to select the resources or tasks in such a way that system performance is not violated while minimizing EC and maximizing resource utilization (RU). This paper presents a task scheduling model for scheduling
-
CryptoGA: a cryptosystem based on genetic algorithm for cloud data security Cluster Comput. (IF 3.458) Pub Date : 2020-07-22 Muhammad Tahir, Muhammad Sardaraz, Zahid Mehmood, Shakoor Muhammad
Cloud Computing is referred to as a set of hardware and software that are being combined to deliver various services of computing. The cloud keeps the services for delivery of software, infrastructure, and platform over the Internet based on the user’s demand. In the IT industry, cloud computing plays an important role to access services anywhere in the world. With increasing demand and popularity
-
Two new collaborative filtering approaches to solve the sparsity problem Cluster Comput. (IF 3.458) Pub Date : 2020-07-22 Hamidreza Koohi, Kourosh Kiani
Collaborative filtering which is the most successful technique of the Recommender System, has recently attracted great attention, especially in the field of e-commerce. CF is used to help users find their preferred items by assessing the preferences of other users to find most similar to the active one. Sparse datasets defend the efficiency of CF. Therefore this paper proposes two new methods that
-
RHAS: robust hybrid auto-scaling for web applications in cloud computing Cluster Comput. (IF 3.458) Pub Date : 2020-07-20 Parminder Singh, Avinash Kaur, Pooja Gupta, Sukhpal Singh Gill, Kiran Jyoti
The elasticity characteristic of cloud services attracts application providers to deploy applications in a cloud environment. The scalability feature of cloud computing gives the facility to application providers to dynamically provision the computing power and storage capacity from cloud data centers. The consolidation of services to few active servers can enhance the service sustainability and reduce
-
Execution cost minimization scheduling algorithms for deadline-constrained parallel applications on heterogeneous clouds Cluster Comput. (IF 3.458) Pub Date : 2020-07-15 Weihong Chen, Guoqi Xie, Renfa Li, Keqin Li
The problem of minimizing the execution monetary cost of applications on cloud computing platforms has been studied recently, and satisfying the deadline constraint of an application is one of the most important quality of service requirements. Previous method of minimizing the execution monetary cost of deadline-constrained applications was the “upward” approach (i.e., from exit to entry tasks) rather
Contents have been reproduced by permission of the publishers.