Current Issue : April - June Volume : 2021 Issue Number : 2 Articles : 5 Articles
Aiming at problems such as slow training speed, poor prediction effect, and unstable detection results of traditional anomaly detection algorithms, a data mining method for anomaly detection based on the deep variational dimensionality reduction model and MapReduce (DMAD-DVDMR) in cloud computing environment is proposed. First of all, the data are preprocessed by a dimensionality reduction model based on deep variational learning and based on ensuring complete data information as much as possible, the dimensionality of the data is reduced, and the computational pressure is reduced. Secondly, the data set stored on the Hadoop Distributed File System (HDFS) is logically divided into several data blocks, and the data blocks are processed in parallel through the principle of MapReduce, so the k-distance and LOF value of each data point can only be calculated in each block. Thirdly, based on stochastic gradient descent, the concept of k-neighboring distance is redefined, thus avoiding the situation where there are greater than or equal to k-repeated points and infinite local density in the data set. Finally, compared with CNN, DeepAnt, and SVM-IDS algorithms, the accuracy of the scheme is increased by 10.3%, 18.0%, and 17.2%, respectively. The experimental data set verifies the effectiveness and scalability of the proposed DMAD-DVDMR algorithm....
As the volume of remotely sensed data grows significantly, content-based image retrieval (CBIR) becomes increasingly important, especially for cloud computing platforms that facilitate processing and storing big data in a parallel and distributed way. This paper proposes a novel parallel CBIR system for hyperspectral image (HSI) repository on cloud computing platforms under the guide of unmixed spectral information, i.e., endmembers and their associated fractional abundances, to retrieve hyperspectral scenes. However, existing unmixing methods would suffer extremely high computational burden when extracting meta-data from large-scale HSI data. To address this limitation, we implement a distributed and parallel unmixing method that operates on cloud computing platforms in parallel for accelerating the unmixing processing flow. In addition, we implement a global standard distributed HSI repository equipped with a large spectral library in a software-as-a-service mode, providing users with HSI storage, management, and retrieval services through web interfaces. Furthermore, the parallel implementation of unmixing processing is incorporated into the CBIR system to establish the parallel unmixing-based content retrieval system. The performance of our proposed parallel CBIR system was verified in terms of both unmixing efficiency and accuracy....
A cloud-fog computing-based event-triggered distributed energy optimization management method based on predictive attack compensation is proposed to address the problem of denial of service (DoS) attack, the complexity of computation, and the bandwidth constraint on the communication network in microgrids. Firstly, in order to optimize the energy supply of microgrid and maximize the profit, the minimum cost function of maintaining the balance of supply and demand is given considering the power loss of microgrid. Secondly, considering the problem of bandwidth-constrained communication, a distributed eventtriggered consensus algorithm is proposed based on fog computing. Thirdly, a model predictive compensation algorithm based on cloud computing is proposed, which uses the mismatched power between supply and demand at the historical time before the attack to predict and compensate the missing data of the agent power at the current time and many times after attack. Finally, the effectiveness of the proposed method is verified by simulation results....
To increase the protection level of copyright in cloud computing environment, aiming at the problems that the indicators in the copyright protection evaluation system are difficult to accurately define and cannot be quantified, a comprehensive evaluation model of copyright protection based on the combination of analytic hierarchy process and fuzzy comprehensive evaluation is proposed. First, using the analytic hierarchy process (AHP), the copyright protection evaluation system is constructed and the weight of each evaluation index is determined through the judgment matrix. Then the quantitative evaluation result is fuzzy operated through index weight and evaluated data. Finally, the simulation evaluation results on specific example show that this model is reasonable and effective, and it can provide the evaluation basis and practical reference for copyright protection evaluation in cloud computing environment....
Order-preserving encryption (OPE) is a basic paradigm for the outsourced database where the order of plaintexts is kept in ciphertexts. OPE enables efficient order comparison execution while providing privacy protection. Unfortunately, almost all the previous OPE schemes either require numerous rounds of interactions or reveal more information about the encrypted database (e.g., the most significant bit). Order-revealing encryption (ORE) as a generalization is an encryption scheme where the order of plaintexts can be evaluated by running a comparison algorithm. Therefore, it is desirable to design an efficient ORE scheme which addresses above efficiency and security issues. In this paper, we propose a noninteractive ORE scheme from prefix encoding and Bloom filter techniques.Theproposed scheme is an encryption scheme where a cloud service provider cannot evaluate the order of plaintexts until a comparison token is provided. The security analysis illustrates that our scheme achieves ideal security with frequency hiding. Furthermore, we illustrate a secure range query scheme through designing an encrypted tree structure named PORE tree from the above ORE scheme. The PORE tree reveals the order between different nodes and leaves encrypted data items in the same node incomparable even after query execution. Finally, the experimental evaluation shows the high efficiency of the proposed ORE scheme and range query scheme....
Loading....