Cloud Computing: 11th EAI International Conference, CloudComp 2021, Virtual Event, December 9–10, 2021, Proceedings (Lecture Notes of the Institute ... and Telecommunications Engineering)

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 11th International Conference on Cloud Computing, CloudComp 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually.
The 17 full papers were carefully reviewed and selected from 40 submissions and detail cloud computing technologies for efficient and intelligent computing in secure and smart environments with distributed devices. The theme of CloudComp 2021 was “Cloud Computing for Secure and Smart Applications”.
The book is organized in three general areas of data analytics for cloud systems with distributed applications, cloud architecture and challenges in real-world use, and security in cloud/edge platforms.

Author(s): Mohammad R. Khosravi (editor), Qiang He (editor), Haipeng Dai (editor)
Publisher: Springer
Year: 2022

Language: English
Pages: 248

Preface
Organization
Contents
Data Analytics for Cloud Systems with Distributed Applications
Load Quality Analysis and Forecasting for Power Data Set on Cloud Platform
1 Introduction
2 Analysis and Improvement of Power Data
2.1 Classification and Comparison of Common Power Data Sets
2.2 The Function of Electric Power Data Set
2.3 Methods of Improving Data Quality
3 Data Prediction
3.1 ARIMA Model
3.2 LSTM Model
3.3 Experimental Results and Evaluation
4 Conclusion
References
A Survey of Traffic Prediction Based on Deep Neural Network: Data, Methods and Challenges
1 Introduction
2 Classification of Traffic Data
2.1 Spatial Static Time Dynamic Data
2.2 Spatio-Temporal Dynamic Data
3 Deep Neural Networks for Traffic Prediction
3.1 A Traffic Forecasting Method Based on CNN
3.2 A Traffic Forecasting Method Based on RNN
3.3 A Traffic Forecasting Method Based on the Hybrid Model
4 Challenges
5 Conclusions
References
A Dynamic Gesture Recognition Control File Method Based on Deep Learning
1 Introduction
2 Construction of PyTorch Model, YOLOv4 and Realization of Control Algorithm
2.1 PyTorch Model
2.2 Introduction to YOLO
2.3 Control Algorithm
3 Experiment and Result Analysis
3.1 Experimental Platform and Data Set
3.2 Network Training
3.3 Result Analysis
4 Conclusion
References
A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a Distributed Environment
1 Introduction
2 Methods
2.1 Three Layer Model-L2R (= 0.001) Overall Network Architecture
2.2 Back Propagation (BP) Algorithm
2.3 Baseline Model
3 Deep Learning Distributed System
4 Experiment and Analysis
4.1 Datasets
4.2 Evaluation Metrics
4.3 Model Performance
5 Conclusion
References
Triangle Coordinate Diagram Localization for Academic Literature Based on Line Segment Detection in Cloud Computing
1 Introduction
2 Related Work
3 Triangle Coordinate Diagram Localization
3.1 Gaussian Filter and Sobel Operator
3.2 Line Segment Detector
3.3 Line Segment Merging
3.4 Diagram Localization
4 Experiment
4.1 Dataset
4.2 Experimental Method
4.3 Experimental Results and Numerical Analysis
5 Conclusion
References
Optimizing Fund Allocation for Game-Based Verifiable Computation Outsourcing
1 Introduction
2 System Architecture
3 Optimization Problem
4 Setting I: Server S vs Single Client Ci
4.1 Client's Optimization Problem
4.2 Server's Optimization Problem
4.3 Proposed Algorithm
4.4 Analysis
5 Setting II: Server S vs Clients C1,@汥瑀瑯步渠,Cm
5.1 Algorithm
5.2 Analysis
6 Conclusions and Future Works
References
A Survey of Face Image Inpainting Based on Deep Learning
1 Introduction
2 Face Inpainting Method Based on Deep Learning
2.1 Attention-Based Image Inpainting
2.2 Semantic-Based Image Inpainting
2.3 Progressive-Based Image Inpainting
3 Datasets and Evaluation Indicators
3.1 Dataset
3.2 Evaluating Indicator
4 Conclusion
References
Cloud Architecture and Challenges in Real-World Use
Layered Service Model Architecture for Cloud Computing
1 Introduction
2 Important Terms and Definitions
2.1 Cloud Computing
2.2 Cloud Service Provider or CSP
2.3 Infrastructure as a Service or IaaS
2.4 Platform as a Service or PaaS
2.5 Software as a Service or SaaS
2.6 Serverless Computing
2.7 Containers and Containers as a Service (CaaS)
3 Need to Think Beyond IaaS, PaaS, and SaaS
3.1 Serverless vs IaaS, PaaS, and SaaS
3.2 CaaS vs IaaS, PaaS, and SaaS
4 Existing Approaches and the Need for New Approach
4.1 XaaS (Anything as a Service)
4.2 Johan Den Haan Framework for Categorizing Cloud Services
5 Proposed Architecture
5.1 Preview
5.2 Design Methodology and Trends
5.3 Architecture Explanation
5.4 Layers Explanation and Criteria
6 Plotting Cloud Products in the Proposed Architecture
7 Future Research Directions
8 Conclusion
References
KPG4Rec: Knowledge Property-Aware Graph for Recommender Systems
1 Introduction
2 Preliminary and Overview
2.1 Knowledge Graph (KG)
2.2 Node2vec Mechanism
2.3 Locality Sensitive Hashing (LSH)
2.4 Problem Formulation
3 Methodology
3.1 Construction of Property-Aware Graphs
3.2 Generation of Property-Aware Vectors
3.3 Regeneration of User Preference Sequence with LSH
3.4 Prediction Module
4 Experiments
4.1 Datasets
4.2 Evaluation Metrics
4.3 Impact of Parameters
4.4 Performance Evaluation
4.5 Evaluation of Different Properties
5 Related Work
5.1 Random Walk Algorithm
5.2 Recommendations Using Knowledge Graph
6 Conclusion
References
ERP as Software-as-a-Service: Factors Depicting Large Enterprises Cloud Adoption
1 Introduction
2 Literature Review
3 Research Method
4 Results
4.1 Service Quality
4.2 Costs
4.3 Technical Limitations
4.4 Cloud Characteristics
5 Discussion and Conclusions
References
Design of an Evaluation System of Limb Motor Function Using Inertial Sensor
1 Introduction
2 Design of the Rehabilitation Assessment Module
2.1 General Structure Design
2.2 Realization of Upper Limb Real Time Motion Simulation
3 Discussion
4 Conclusion
References
Towards a GPU-Accelerated Open Source VDI for OpenStack
1 Motivation
2 Related Work
2.1 GPU Virtualization
2.2 Video Encoding and Decoding
2.3 Remote Desktop Transport
2.4 Preliminary Work in bwLehrpool
2.5 OpenStack – Basis and Missing Pieces
3 Proposed System Architecture
4 Work Program and Planned Efforts
5 Conclusion and Outlook
References
Security in Cloud/Edge Platforms
Trustworthy IoT Computing Environment Based on Layered Blockchain Consensus Framework
1 Introduction
2 Related Works
3 Trustworthy IoT Model with Integrated Blockchain
3.1 System Model Overview
3.2 Build a Two-Layer Blockchain for the IoT
4 Layered Chained BFT (LCBFT) Consensus Mechanism
4.1 Overview of the HotStuff
4.2 Consensus and Block Generation in Energy-Constrained Part
4.3 Global Blockchain Consensus and Joining Blocks onto the Chain
4.4 Liveness Mechanism of Consensus Process
5 Microservice-Based Consensus Protocol Deployment Plan
6 Evaluation
6.1 Computational Structure of the Two Consensus Mechanisms
6.2 Energy Consumption Analysis of Two Consensus Mechanism
7 Conclusion
References
Heuristic Network Security Risk Assessment Based on Attack Graph
1 Introduction
2 Related Work
3 Heuristic Network Security Risk Assessment Based on Attack Graph
3.1 Attack Graph
3.2 Heuristic Graph Arborescences of Maximum Weight Generation Algorithm
3.3 Heuristic Attack Path Finding Algorithm for Maximum Risk
3.4 Node Importance Evaluation Based on ISM
4 Experimental Settings and Results
4.1 Experimental Environment
4.2 Experimental Results
5 Conclusion
References
Research on Network Security Automation and Orchestration Oriented to Electric Power Monitoring System
1 Introduction
2 Related Work
2.1 Anomaly Detection
2.2 Active Defense
3 Research Motivation
4 An Active Defense System Framework Design
4.1 The Behavioral Feature Extraction of Typical Network Security Events
4.2 The Security Disposal Strategy Generation of Typical Network Security Events
4.3 The Automation Orchestration of Security Disposal Strategies
5 A Case Study
6 Conclusion and Future Work
References
Energy- and Reliability-Aware Computation Offloading with Security Constraints in MEC-Enabled Smart Cities
1 Introduction
2 Related Work
3 System Model
3.1 Network System Model
3.2 Workflow Applications Model
3.3 Energy Consumption Model
3.4 Resource Utilization Model
3.5 Reliability Model
3.6 Privacy Preservation Model
3.7 Problem Formulation
4 Energy- and Reliability-Aware Multi-objective Optimization Method with Security Constraint (ERMOS)
5 Experimental Evaluation
5.1 Experimental Setting
5.2 Experimental Result and Discussion
6 Conclusion
References
A Review of Cross-Blockchain Solutions
1 Introduction
2 Mature Cross-Blockchain Solutions
2.1 Notary Schemes
2.2 Sidechain/Relay
2.3 Hash-Locking
3 Innovative Cross-Blockchain Solutions
3.1 DexTT
3.2 Blockchain Router
3.3 Satellite Chain
3.4 HyperService
4 Industrial Solutions
4.1 Cosmos
4.2 Polkadot
4.3 Aion
4.4 Wanchain
4.5 Lisk
4.6 Ark
4.7 Metronome
5 Conclusion
References
Author Index