Applied Mechanics and Materials Vols. 556-562

Paper Title Page

Abstract: Combing through the concept of cloud computing and e-services, analyzes the relationship between e-services, e-government and e-commerce of the three concepts. The current model of development of electronic services, mainly in the following categories: process integration model, information sharing patterns, front and back of a mixed mode operation. The development trend of the cloud computing model of electronic services is bound to relying on the cloud platform to build electronic services.
6211
Abstract: Nowadays, cloud computing is the innovative product of the upgraded of information science technology. It is another great change following the transition from large scale computer to client-server in the last century. The concepts, such as cloud security, cloud storage, secure cloud, cloud hosting and cloud input, appeared after cloud computing. E-Government Information Security plays an important role in the development and establishment of E-Government. It is an important component part to use cloud security technology to establish our country’s E-Government secure cloud in current E-Government construction.
6215
Abstract: An ontology enhances interoperability among applications via the Web. However, heterogeneity between ontologies blocks interoperability across ontologies via the Web. This paper introduces the classification of information used to matching ontologies, presents matching technologies in some aspects, and gives a brief outlook of these technologies, such as similarity flooding, coefficient computation, graph matching, machine learning, Bayesian decision theory, background knowledge discovering and exploiting. We believe this paper provides readers with a comprehensive understanding of ontology matching and points to various research topics about the specific roles of ontology matching.
6219
Abstract: To deduplicate the sensitive data in a cloud storage center, a scheme called as MHT-Dedup that is based on MHT (Merkle Hash Tree) is proposed. It achieves the cross-user file-level client-side deduplication and local block-level client-side deduplication concurrently. It firstly encrypts the file on block granularity, and then authenticates the file ciphertext to find duplicated files (Proofs of oWnership, PoW) and check the hash of block plaintext to find duplicated blocks. In the PoW protocol of MHT-Dedup, an authenticating binary tree is generated from the tags of encrypted blocks to assuredly find the duplicated files. MHT-Dedup gets rid of the conflict between data deduplication and encryption, achieves the file-level and block-level deduplication concurrently, avoids the misuse of storage system by users, resists to the inside and outside attacks to data confidentiality, and prevents the target collision attack to files and brute force attack to blocks.
6223
Abstract: This paper shows the energy consumption distribution of current data center, presents some effective energy-saving measures to reduce the energy consumption of a cloud computing data center. Raise an effective way to optimize the air distribution of the data center such as sealing the cold passageway. Through the use of ADU can solve the local overheating inside the equipment cabinet. The use of the modularization UPS, the high-voltage direct current technology and harmonic suppression can improve the efficiency of the power supply system.
6228
Abstract: Case study of 300 typical coal mine accident indicates that coal miners’ unsafe behavior is the major internal reason causing coal mine accidents. Factors affecting coal miners’ unsafe behavior were identified because of human’s complexity. We built the relatively entire system of coal miners’ safety behavior and quantitatively analyzed Coal miners’ unsafe behavior system, then explained the path and divergence of impact factors within the system in detail. Management decision can be formulated to advance management level in coal mine industry accordingly.
6232
Abstract: To solve the confliction of data encryption and deduplication, a hMAC-Dedup scheme based on homomorphic MAC is proposed. In the scheme, every file is encrypted by the block level encryption and a tag is generated from each encrypted block. In the PoW (Proofs of oWnership) protocol, homomorphic MAC is used to check whether the file to store is real, by operating on the file’s encrypted blocks and pre-computed tags. The hMAC-Dedup can avoid the security shortcomings brought by hash-as-a-proof and provide encryption protection. It is also extended to support data dynamics, which includes block modification, insertion and deletion.
6236
Abstract: In this paper, we present UBackup, which describes an easy way to build a private cloud storage system with high-efficient and high-disaster-tolerance. UBackup client enables file-level de-duplication by using a file fingerprint check. The utilization of compressed erasure code algorithm ensures data security and cuts down the cost. A space utilization rate variance minimizing algorithm is used on index server to balance system load. We present the system architecture of UBackup and its components, and we have implemented a proof-of-concept prototype of UBackup. By conducting performance evaluation in a public Internet, experimental results demonstrate the efficiency of the system.
6241
Abstract: Multi-tenant software scheduling strategy based on hybrid genetic algorithm and ant colony algorithm was proposed, scheduling resource and scheduling tasks were dispersed into multiple resource nodes and task nodes, encoded on the chromosome through natural number, the fitness function was utilized to assess the quality of chromosomes, according to fitness value to the individual offspring obtained by genetic algorithms, in order to get the best individual as initial value. Experimental results show that the proposed method using multi-tenant software scheduling are better than traditional methods on run-time, the performance of resource utilization, with a stronger multi-tenant software scheduling capability.
6246
Abstract: . In recent years, the cloud computing has been a focus of research. With the development of the cloud computing, the mobile cloud computing is emerging. There are many issues for the mobile cloud computing (MCC) applications, and still face some challenges. In order to promote this domain, we first in brief review the research progress of MCC, and introduce the characteristic and concept model of MCC. Then we deeply analyze the issues of MCC including limited bandwidth and high latency, stability and availability of the network, cloud platform reliability, security and privacy. On the basis of these, we discuss the current solutions to solve these issues.
6251

Showing 1391 to 1400 of 1532 Paper Titles