scholarly journals PB: A Product-Bitmatrix Construction to Reduce the Complexity of XOR Operations of PM-MSR and PM-MBR Codes over GF 2 w

2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Chuqiao Xiao ◽  
Xueqing Gong ◽  
Yefeng Xia ◽  
Qian Zhang

Edge computing, as an emerging computing paradigm, aims to reduce network bandwidth transmission overhead while storing and processing data on edge nodes. However, the storage strategies required for edge nodes are different from those for existing data centers. Erasure code (EC) strategies have been applied in some decentralized storage systems to ensure the privacy and security of data storage. Product-matrix (PM) regenerating codes (RGCs) as a state-of-the-art EC family are designed to minimize the repair bandwidth overhead or minimize the storage overhead. Nevertheless, the high complexity of the PM framework contains more finite-domain multiplication operations than classical ECs, which heavily consumes computational resources at the edge nodes. In this paper, a theoretical derivation of each step of the PM minimum storage regeneration (PM-MSR) and PM minimum bandwidth regeneration (PM-MBR) codes is performed and the XOR complexity over finite fields is analyzed. On this basis, a new construct called product bitmatrix (PB) is designed to reduce the complexity of XOR operations in the PM framework, and two heuristics are used to further reduce the XOR numbers of the PB-MSR and PB-MBR codes, respectively. The evaluation results show that the PB construction significantly reduces the XOR number compared to the PM-MSR, PM-MBR, Reed–Solomon (RS), and Cauchy RS codes while retaining optimal performance and reliability.

Author(s):  
E. Panidi

Cloud Computing technologies and cloud-based Geographic Information Systems have became widely used in recent decades. However, the complexity and size of geospatial datasets remains growing and sometimes become going out of the cloud infrastructure paradigm. Additionally, many of currently used client devices have sufficient computational resources to store and process some amounts of data directly. Consequently, multilevel management techniques are demanded that support capabilities of horizontal (client-to-client) data flows in addition to vertical (cloud-to-client) data flows. These tendencies in information technologies (in general) have led to the appearance of Fog Computing paradigm that extends a cloud infrastructure with the computational resources of client devices and implements client-side data storage, management and interchange. <br><br> This position paper summarizes and discusses mentioned tendencies in connection with a number of available Open Geospatial Consortium standards. The paper highlights the standards, which can be recognized as the platform for the Fog Computing implementation into geospatial domain, and analyzing their strong and weak features from the Fog Computing point of view. The analysis is built upon author’s experience in implementation of the client-side geospatial Web services.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


2012 ◽  
pp. 881-898
Author(s):  
J.R. Bilbao-Castro ◽  
I. García ◽  
J.J. Fernández

Three-dimensional electron microscopy allows scientists to study biological specimens and to understand how they behave and interact with each other depending on their structural conformation. Electron microscopy projections of the specimens are taken from different angles and are processed to obtain a virtual three-dimensional reconstruction for further studies. Nevertheless, the whole reconstruction process, which is composed of many different subtasks from the microscope to the reconstructed volume, is not straightforward nor cheap in terms of computational costs. Different computing paradigms have been applied in order to overcome such high costs. While classic parallel computing using mainframes and clusters of workstations is usually enough for average requirements, there are some tasks which would fit better into a different computing paradigm – such as grid computing. Such tasks can be split up into a myriad of subtasks, which can then be run independently using as many computational resources as are available. This chapter explores two of these tasks present in a typical three-dimensional electron microscopy reconstruction process. In addition, important aspects like fault-tolerance are widely covered; given that the distributed nature of a grid infrastructure makes it inherently unstable and difficult to predict.


2012 ◽  
pp. 862-880
Author(s):  
Russ Miller ◽  
Charles Weeks

Grids represent an emerging technology that allows geographically- and organizationally-distributed resources (e.g., computer systems, data repositories, sensors, imaging systems, and so forth) to be linked in a fashion that is transparent to the user. The New York State Grid (NYS Grid) is an integrated computational and data grid that provides access to a wide variety of resources to users from around the world. NYS Grid can be accessed via a Web portal, where the users have access to their data sets and applications, but do not need to be made aware of the details of the data storage or computational devices that are specifically employed in solving their problems. Grid-enabled versions of the SnB and BnP programs, which implement the Shake-and-Bake method of molecular structure (SnB) and substructure (BnP) determination, respectively, have been deployed on NYS Grid. Further, through the Grid Portal, SnB has been run simultaneously on all computational resources on NYS Grid as well as on more than 1100 of the over 3000 processors available through the Open Science Grid.


Author(s):  
Sourav Banerjee ◽  
Debashis Das ◽  
Manju Biswas ◽  
Utpal Biswas

Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Even though it's based on secure technology, a blockchain needs protection as well. The risks of exploits, targeted attacks, or unauthorized access can be mitigated by the instant incident response and system recovery. Blockchain technology relies on a ledger to keep track of all financial transactions. Ordinarily, this kind of master ledger would be a glaring point of vulnerability. Another tenet of security is the chain itself. Configuration flaws, as well as insecure data storage and transfers, may cause leaks of sensitive information. This is even more dangerous when there are centralized components within the platform. In this chapter, the authors will demonstrate where the disadvantages of security and privacy in blockchain are currently and discuss how blockchain technology can improve these disadvantages and outlines the requirements for future solution.


Author(s):  
J.R. Bilbao Castro ◽  
I. Garcia Fernandez ◽  
J. Fernandez

Three-dimensional electron microscopy allows scientists to study biological specimens and to understand how they behave and interact with each other depending on their structural conformation. Electron microscopy projections of the specimens are taken from different angles and are processed to obtain a virtual three-dimensional reconstruction for further studies. Nevertheless, the whole reconstruction process, which is composed of many different subtasks from the microscope to the reconstructed volume, is not straightforward nor cheap in terms of computational costs. Different computing paradigms have been applied in order to overcome such high costs. While classic parallel computing using mainframes and clusters of workstations is usually enough for average requirements, there are some tasks which would fit better into a different computing paradigm – such as grid computing. Such tasks can be split up into a myriad of subtasks, which can then be run independently using as many computational resources as are available. This chapter explores two of these tasks present in a typical three-dimensional electron microscopy reconstruction process. In addition, important aspects like fault-tolerance are widely covered; given that the distributed nature of a grid infrastructure makes it inherently unstable and difficult to predict.


Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4905 ◽  
Author(s):  
Rongxu Xu ◽  
Wenquan Jin ◽  
Dohyeun Kim

Internet of Things (IoT) devices are embedded with software, electronics, and sensors, and feature connectivity with constrained resources. They require the edge computing paradigm, with modular characteristics relying on microservices, to provide an extensible and lightweight computing framework at the edge of the network. Edge computing can relieve the burden of centralized cloud computing by performing certain operations, such as data storage and task computation, at the edge of the network. Despite the benefits of edge computing, it can lead to many challenges in terms of security and privacy issues. Thus, services that protect privacy and secure data are essential functions in edge computing. For example, the end user’s ownership and privacy information and control are separated, which can easily lead to data leakage, unauthorized data manipulation, and other data security concerns. Thus, the confidentiality and integrity of the data cannot be guaranteed and, so, more secure authentication and access mechanisms are required to ensure that the microservices are exposed only to authorized users. In this paper, we propose a microservice security agent to integrate the edge computing platform with the API gateway technology for presenting a secure authentication mechanism. The aim of this platform is to afford edge computing clients a practical application which provides user authentication and allows JSON Web Token (JWT)-based secure access to the services of edge computing. To integrate the edge computing platform with the API gateway, we implement a microservice security agent based on the open-source Kong in the EdgeX Foundry framework. Also to provide an easy-to-use approach with Kong, we implement REST APIs for generating new consumers, registering services, configuring access controls. Finally, the usability of the proposed approach is demonstrated by evaluating the round trip time (RTT). The results demonstrate the efficiency of the system and its suitability for real-world applications.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 335 ◽  
Author(s):  
T Veerraju ◽  
Dr K. Kiran Kumar

With the rapid advancement of Internet of Things has enabled to combine the intercommunication and interconnection between seamless networks. Cloud computing provides backend solutions and one among the most prominent technologies for the users, still cannot be solved all the problems such as latency of real time applications. However, a new computing paradigm comes in to the picture. Many of the researchers focused on this exemplar known as Fog/Edge computing, which has been planned to the extension of cloud services. Fog provides the services to the edge of the networks, which makes communication, computation and storage for end users through fog devices and for servers like controllers. We analyze the study, which aims to augment low bandwidth, latency along with the privacy and security.   The major problem in the Fog computing is security due to the limited resources. In this paper, we investigated the protection issues and confrontation of Fog and also provide countermeasures on security for different attacks. We focused the future security directions and challenges to address in fog networks.


2013 ◽  
Vol 50 (5) ◽  
pp. 20-28
Author(s):  
M. Kurmis ◽  
D. Dzemydiene ◽  
R. Didziokas ◽  
J. Trokss

Abstract Storage and retrieval of space signals require an advanced set of core technologies that can be implemented with a cloud computing paradigm. In this work we propose a cloud computing solution for the distributed space data storage and access in mobile communication networks. The modeling and simulation results show that the proposed solution performs satisfactorily in the space data processing. In the future, experimental verification of the cloud computing model and its implementation are envisaged.


Sign in / Sign up

Export Citation Format

Share Document