scholarly journals Blockchain-Based Resource Allocation Model in Fog Computing

2019 ◽  
Vol 9 (24) ◽  
pp. 5538 ◽  
Author(s):  
Haoyu Wang ◽  
Lina Wang ◽  
Zhichao Zhou ◽  
Xueqiang Tao ◽  
Giovanni Pau ◽  
...  

Fog computing makes up for the shortcomings of cloud computing. It brings many advantages, but various peculiarities must be perceived, such as security, resource management, storage, and other features at the same time. This paper investigates the resource contribution model between the fog node and cloud or users when fog computing introduces blockchain. The proposed model practices the reward and punishment mechanism of the blockchain to boost the fog nodes to contribute resources actively. The behavior of the fog node in contributing resources and the completion degree of the task also for contributing resources are packaged into blocks and stored in the blockchain system to form a transparent, open, and tamper-free service evaluation index. The differential game method is employed to model and solve the above process and address the interaction between the optimal resource contribution strategy of the fog node and the optimal benefit under the optimal resource contribution strategy. Indirectly, this service evaluation index also brings long-term economic benefits to fog service providers. Besides, taking advantage of the performance characteristics of the collective maintenance of blockchain and the ability to establish a credible consensus mechanism in an untrusted environment, fog computing nodes, under the proposed architecture, can have specific security protection capabilities.

Author(s):  
Li Pan ◽  
Xudong Chen ◽  
Lu Zhao ◽  
Anran Xiao

Water resources allocation is an urgent problem for basin authorities. In order to obtain greater economic benefits from limited water supplies, sub-regions must cooperate with each other. To study the influence of cooperation among sub-regions and the symmetry of cooperation information on the interests of the basin authority and each sub-region, this study proposes a regional water allocation model in three different situations: (1) non-cooperation; (2) cooperation and information symmetry; (3) cooperation and information asymmetry. The proposed model clearly reflects the Stackelberg game relationship between the basin authority and sub-regions. Finally, the model is applied to the Qujiang River Basin in China, and the decisions of the basin authority and sub-regional managers of the Qujiang River Basin under three different situations are discussed. The results show that regional cooperation benefits both the cooperative regions and the social welfare value of the entire river basin, when compared with non-cooperation.


10.31355/33 ◽  
2018 ◽  
Vol 2 ◽  
pp. 105-120
Author(s):  
Hamed Motaghi ◽  
Saeed Nosratabadi ◽  
Thabit Qasem Atobishi

NOTE: THIS ARTICLE WAS PUBLISHED WITH THE INFORMING SCIENCE INSTITUTE. Aim/Purpose................................................................................................................................................................................................. The main objective of the current study is to develop a business model for service providers of cloud computing which is designed based on circular economy principles and can ensure the sustainable consumption. Background Even though the demand for cloud computing technology is increasing day by day in all over the world, the current the linear economy principles are incapable to ensure society development needs. To consider the benefit of the society and the vendors at the same time, the principles of circular economy can address this issue. Methodology................................................................................................................................................................................................. An extensive literature review on consumption, sustainable consumption, circular economic, business model, and cloud computing were conducted. the proposed model of Osterwalder, Pigneur and Tucci (2005) is admitted designing the circular business model. Contribution................................................................................................................................................................................................. The proposed model of the study is the contribution of this study where provides the guidelines for the cloud computing service providers to achieve both their economic profits and the society’ needs. Findings Finding reveals that if the cloud computing service providers design their business model based on the “access” principle of circular economy, they can meet their economic profits and the society’ needs at a same time. Recommendations for Practitioners.............................................................................................................................................................. It is recommended to the startup and the existing businesses to utilize the proposed model of this study to reach a sustainable development. Recommendation for Researchers................................................................................................................................................................ It proposes a new circular business model and its linkages with community building. Impact on Society............................................................................................................................................................................................ The proposed model of the study provides guidelines to the cloud computing service providers to design a business model which is able not only to meet their economic profit, but also to meet the society’s and customers’ benefits. Future Research............................................................................................................................................................................................... Future researches can build on this research model which proposed in this study to examine the limitations of this model by using empirical researches.


Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 1949
Author(s):  
Lukas Sevcik ◽  
Miroslav Voznak

Video quality evaluation needs a combined approach that includes subjective and objective metrics, testing, and monitoring of the network. This paper deals with the novel approach of mapping quality of service (QoS) to quality of experience (QoE) using QoE metrics to determine user satisfaction limits, and applying QoS tools to provide the minimum QoE expected by users. Our aim was to connect objective estimations of video quality with the subjective estimations. A comprehensive tool for the estimation of the subjective evaluation is proposed. This new idea is based on the evaluation and marking of video sequences using the sentinel flag derived from spatial information (SI) and temporal information (TI) in individual video frames. The authors of this paper created a video database for quality evaluation, and derived SI and TI from each video sequence for classifying the scenes. Video scenes from the database were evaluated by objective and subjective assessment. Based on the results, a new model for prediction of subjective quality is defined and presented in this paper. This quality is predicted using an artificial neural network based on the objective evaluation and the type of video sequences defined by qualitative parameters such as resolution, compression standard, and bitstream. Furthermore, the authors created an optimum mapping function to define the threshold for the variable bitrate setting based on the flag in the video, determining the type of scene in the proposed model. This function allows one to allocate a bitrate dynamically for a particular segment of the scene and maintains the desired quality. Our proposed model can help video service providers with the increasing the comfort of the end users. The variable bitstream ensures consistent video quality and customer satisfaction, while network resources are used effectively. The proposed model can also predict the appropriate bitrate based on the required quality of video sequences, defined using either objective or subjective assessment.


Internet of things (IoT) is an emerging concept which aims to connect billions of devices with each other anytime regardless of their location. Sadly, these IoT devices do not have enough computing resources to process huge amount of data. Therefore, Cloud computing is relied on to provide these resources. However, cloud computing based architecture fails in applications that demand very low and predictable latency, therefore the need for fog computing which is a new paradigm that is regarded as an extension of cloud computing to provide services between end users and the cloud user. Unfortunately, Fog-IoT is confronted with various security and privacy risks and prone to several cyberattacks which is a serious challenge. The purpose of this work is to present security and privacy threats towards Fog-IoT platform and discuss the security and privacy requirements in fog computing. We then proceed to propose an Intrusion Detection System (IDS) model using Standard Deep Neural Network's Back Propagation algorithm (BPDNN) to mitigate intrusions that attack Fog-IoT platform. The experimental Dataset for the proposed model is obtained from the Canadian Institute for Cybersecurity 2017 Dataset. Each instance of the attack in the dataset is separated into separate files, which are DoS (Denial of Service), DDoS (Distributed Denial of Service), Web Attack, Brute Force FTP, Brute Force SSH, Heartbleed, Infiltration and Botnet (Bot Network) Attack. The proposed model is trained using a 3-layer BP-DNN


2018 ◽  
Vol 20 (1) ◽  
pp. 42-61 ◽  
Author(s):  
Muhammad Shehzad Hanif ◽  
Shao Yunfei ◽  
Muhammad Imran Hanif

Purpose The paper aims to explore the long-term prospects of mobile broadband adoption in a developing country. The supply-side and demand-side policy measures are recommended to counter the challenges to broadband adoption. Design/methodology/approach Methodologically, this study uses document analysis to explain secondary data including growth statistics, trade literature and previous scholarly research. Based on the growth statistics of broadband and the informed market insights, the research discusses the prevailing market threats and recommends counter measures to improve the long-term prospects of broadband propagation. Findings The growth of mobile broadband is settling down in Pakistan due to various barriers like cost, literacy, security and unavailability of local content. Collaborative efforts are required by the government, the service providers and the people to enhance the adoption of broadband service and secure economic benefits of the broadband. Practical implications The research offers useful implications for managers and policymakers in Asian and African developing countries; the policy measures discussed here may serve as guidelines for them in the design of their own policies regarding broadband supply and demand. Originality/value The study makes an effort to examine the broadband growth in a developing country on the basis of both quantitative and qualitative aspects. The research endeavors to fill the gap on the particular scholarship of research covering potential uptake of broadband services and the effects of constraining elements to broadband adoption in a developing country.


Author(s):  
Amira F. A. Mahran ◽  
Hala M. Labib Enaba

Mobile services are becoming increasingly commonplace in everyday life; however, Mobile payment (M-payment) is not among frequently used mobile services. The slowness of the diffusion of this service is the point of departure of the current research. The authors discuss why consumers are slow in adopting M-payment service and develop a proposed model that measures the customer’s attitude and intention to use this technology in Egypt. Different theories from diverse fields are reviewed to formulate the study’s conceptual framework. Empirical data were collected via an online survey for a sample of 490 students in “open education”, a type of e-distance learning. The results suggest that although the most important determinants influencing the customer’s attitude toward the service are perceived behavioral control and perceived usefulness, those influencing the intention to use it are perceived innovativeness, perceived expressiveness, facilitating condition, perceived usefulness, and social pressure. The results of the research differ from those of previous studies because of the effect of the Egyptian culture. Service providers can benefit from the results when formulating the marketing strategies to increase the usage of this service, improving mobile commerce.


Author(s):  
Ta Duy Linh ◽  
Duong Duc Minh

Chau Doc is a city of An Giang province in Mekong delta of Vietnam. This city has Sam Mountain with cultural and spiritual values. One of the highlights of the local spiritual culture is Ba Chua Xu (Lady Territory) shrine. Every year, this spot attracts between 3 and 5 million visitors. With a great number of tourists, the practicing of spiritual tourism has had an impact on the natural and cultural-social environment. The influence of stakeholders on the environment (nature and humanity) through the enjoyment and provision of tourism services. Stakeholders have involved in tourism activities in Chau Doc include: local authorities, service providers (food and beverage, accommodation, transportation, ...) and tourists. The practice of spiritual tourism is different from other types of tourism. Spiritual need has overwhelmed need to enjoy tourist services. With the expectation of improving economic benefits for the locality, tourism services are increasingly invested and supplemented. When economic interests are concerned, the issues of preserving natural values and cultural-social are limited, creating threat that could hurt the environment in Chau Doc. Therefore, the exploitation and development of spiritual tourism creates certain influence on the local environment. The study of the effects of spiritual tourism practice is necessary in the present context. Through field surveys, in-depth interviews with stakeholders and observations in local spiritual culture festivals from September 2016 to June 2018, this article describes and analyzes characteristics of practicing spiritual tourism in Chau Doc. Since then, the authors find out the influence of practicing spiritual tourism on natural and cultural - social environment of locality. At the same time, the authors provide some suggestions for exploiting spiritual tourism in Chau Doc.


Author(s):  
Junxia Guo ◽  
Gang Lu ◽  
Zili Xie ◽  
Jiawei Wen ◽  
Nanshan Xu

Railway marshalling and transportation is an important component of the production supply chain for large and medium-sized enterprises in China. Traditional inefficient manual-made marshalling plans usually are not optimal in time or energy consuming. An efficient method needs to be developed to find the optimal marshalling plans automatically. This paper mainly studies the railway train automatic marshalling in large and medium-sized enterprises in China. Based on the investigation at the train station of a certain enterprise, according to the railway track information, carriage information, and production task information, this paper designs the abstracted railway state definitions of the station. Then based on the state definitions, the scheduling rules, and the objective function of time cost and economic cost, this paper converts abstract scheduling instructions into a general railway automatic marshalling model which can be executed by computers. By introducing the greedy strategies into different situations to optimize the algorithm of tracks occupation, carriages selection and train path selection in the model, the planning efficiency can be improved while ensuring the economic benefits of the enterprises and the quality of the formation plan. The experimental results show that the proposed model can generate fewer marshalling plans and find the optimal one faster in most cases, which proves the feasibility and availability of the model.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Joshua Schmidt ◽  
Alex Altshuler

Purpose This paper aims to discuss how the tourism industry is contending with the economic and interorganizational challenges wrought by the COVID-19 outbreak and heightened by a lack of communication between the government and local businesses in the state of Israel. The researchers examine the dependency of the tourism industry on the general preparation programs that were developed and are currently being deployed by the relevant national stakeholders and question whether instead, it should use the pandemic as a catalyst for formulating its own nuanced tourism-travel-and-hospitality-oriented strategies and procedures. Design/methodology/approach Applying an ethnographic-based mix-methods research approach, this paper draws on insights from data compiled by fusing existing theoretical and emerging practical knowledge with empirical research (qualitative and quantitative) conducted among numerous relevant macro (governmental/centralized industry) and micro (hotels, travel and tourism operators and service providers) stakeholders as well as potential consumers. Findings It is essential that national and local government bodies form collaborative interorganizational relationships with local stakeholders to jointly activate case-specific hospitality and travel-specific risk mitigation management strategies. Moreover, the pandemic laid bare the tentative and fragile nature of the globalized tourism industry supply and demand chains, a condition that may be remedied via a pivot toward using national or even regional supply chains and goods and service providers. Within Israel, such changes could lead to increased economic benefits that extend beyond the tourism industry to provide certain security-related benefits. Originality/value Relating to idiosyncratic factors relevant to an Israeli cultural context, this paper uses the ethnographic field-borne familiarity of the researchers with the tourism and travel industries in Eilat and the Dead Sea to offer applicable suggestions for leveraging certain industry resources to both meet the demands of the present-day circumstances and cultivate a multifaceted organizational web of macro and micro social, economic and environmental networks so as to foster a more diversified and therefore resilient local tourism and travel economy.


2021 ◽  
Vol 11 (3) ◽  
pp. 19-32
Author(s):  
Shahin Fatima ◽  
Shish Ahmad

Cloud computing has become a feasible solution for virtualization of cloud resources. Although it has many prospective to hold individuals by providing many benefits to organizations, still there are security loopholes to outsource data. To ensure the ‘security' of data in cloud computing, quantum key cryptography is introduced. Quantum cryptography makes use of quantum mechanics and qubits. The proposed method made use of quantum key distribution with Kerberos to secure the data on the cloud. The paper discussed the model for quantum key distribution which makes use of Kerberos ticket distribution center for authentication of cloud service providers. The proposed model is compared with quantum key distribution and provides faster computation by producing less error rate.


Sign in / Sign up

Export Citation Format

Share Document