Research and Analysis of Intrusion Prevention Based on Trusted in Cloud Environment

2014 ◽  
Vol 644-650 ◽  
pp. 1887-1890
Author(s):  
Shuang Tu Wang ◽  
Jun Luo

Cloud computing has a nature of dynamic, virtualization and opening since it made. All kinds of large-scale cloud security incidents makes frequent cloud environment safety has been questioned. In order to ensure the security of cloud environments, intrusion prevention technologies trusted computing ideas proposed by combining intrusion prevention framework model based on trusted computing environment under a cloud. The model departure from the principle of intrusion prevention, access to behavioral characteristics, and then gradually normalize these features determine the weight of each feature heavy user node's credibility after the draw. Then it use a variety of cloud cluster server engine to detect defense and integrated decision analysis and cluster analysis to make timely cloud fast, and change the traditional intrusion prevention for their own business, to detect the status of the defense lag for cloud users with the maximum safe limit intrusion prevention services, but also to ensure that the cloud can withstand attacks, so the cloud and cloud users bidirectional safety effects.

Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3807 ◽  
Author(s):  
Haonan Sun ◽  
Rongyu He ◽  
Yong Zhang ◽  
Ruiyun Wang ◽  
Wai Hung Ip ◽  
...  

Today cloud computing is widely used in various industries. While benefiting from the services provided by the cloud, users are also faced with some security issues, such as information leakage and data tampering. Utilizing trusted computing technology to enhance the security mechanism, defined as trusted cloud, has become a hot research topic in cloud security. Currently, virtual TPM (vTPM) is commonly used in a trusted cloud to protect the integrity of the cloud environment. However, the existing vTPM scheme lacks protections of vTPM itself at a runtime environment. This paper proposed a novel scheme, which designed a new trusted cloud platform security component, ‘enclave TPM (eTPM)’ to protect cloud and employed Intel SGX to enhance the security of eTPM. The eTPM is a software component that emulates TPM functions which build trust and security in cloud and runs in ‘enclave’, an isolation memory zone introduced by SGX. eTPM can ensure its security at runtime, and protect the integrity of Virtual Machines (VM) according to user-specific policies. Finally, a prototype for the eTPM scheme was implemented, and experiment manifested its effectiveness, security, and availability.


Author(s):  
Yuvaraj Natarajan ◽  
Srihari Kannan ◽  
Gaurav Dhiman

Background: Cloud computing is a multi-tenant model for computation that offers various features for computing and storage based on user demand. With increasing cloud users, the usage increases that highlights the problem of load balancing with limited resource availability based on dynamic cloud environment. In such cases, task scheduling creates fundamental issue in cloud environment. Introduction: Certain problems such as, inefficiencies in load balancing latency, throughput ratio, proper utilization of the cloud resources, better energy consumption and response time have been observed. These drawbacks can be efficiently resolved through the incorporation of efficient load balancing and task scheduling strategies. Method: In this paper, we develop an efficient co-operative method to solve the most recent approaches against load balancing and task scheduling have been proposed using Ant Colony Optimization (ACO). These approaches enables in the clear cut identification of the problems associated with the load balancing and task scheduling strategies in the cloud environment. Results: The simulation is conducted to find the efficacy of the improved ACO system for load balancing in cloud than the other methods. The result shows that the proposed method obtains reduced execution time, reduced cost and delay. Conclusion: A unique strategic approach is developed in this paper, Load Balancing, which works with the ACO in relation to the cloud workload balancing task through the incorporation of the ACO technique. The strategy for determining the applicant nodes is based on which the load balancing approach would essentially depend. By incorporating two different approaches: the maximum minute rules and the forward-backward ant, this reliability task can be established. This method is intended to articulate the initialization of the pheromone and thus upgrade the relevant cloud-based physical properties.


2021 ◽  
pp. 026666692110154
Author(s):  
Usman Ahmed Adam ◽  
Kiran Kaur

Institutional repositories are powerful tools to facilitate global access to intellectual output by members of the institution, particularly in assisting them to preserve and maximize access to their research output globally. This exploratory study of the status of institutional repositories implementation in African countries using the global Directory of Open Access Repositories (OpenDOAR) and Transparent Ranking: All Repositories by Google Scholar, reports on the operational status and the performance of repositories. Factor analysis and cluster analysis are used to analyze the operational level of institutional repositories in African countries. The analysis showed that the typical performance of institutional repositories remains below average. The possibility of global open access to research results through institutional repositories in South Africa, Kenya, Nigeria, Algeria, Sudan, and Egypt appeared to be relatively more feasible than other African countries. This study concludes that many organizations, institutions, and societies spend great efforts in support of open access implementation in Africa, however, the widespread implementation of institutional repositories is still very slow paced, and the performance of the implemented repositories was below expectation. Suggestions for regaining the intended direction of African institutional repositories are given based on the current status.


2007 ◽  
Vol 22 (04) ◽  
pp. 681-706 ◽  
Author(s):  
PASQUALE BLASI ◽  
STEFANO GABICI ◽  
GIANFRANCO BRUNETTI

Clusters of galaxies and the large scale filaments that connect neighboring clusters are expected to be sites of acceleration of charged particles and sources of non-thermal radiation from radio frequencies to gamma rays. Gamma rays are particularly interesting targets of investigation, since they may provide precious information on the nature and efficiency of the processes of acceleration and magnetic confinement of hadrons within clusters of galaxies. Here we review the status of viable scenarios that lead to the production of gamma rays from large scale structures and are compatible with the multifrequency observations that are already available. We also discuss the possibility of detection of gamma rays with space-borne telescopes such as GLAST and ground based Cherenkov telescopes, and the physical information that may be gathered from such observations.


2005 ◽  
Vol 70 (5) ◽  
pp. 823-842 ◽  
Author(s):  
Daniel Stewart

Despite a fair amount of conjecture regarding the circumstances that lead to the generation of status orders, most of the previous literature in this area typically has studied the effects of social cues within a laboratory setting. This article analyzes the evolution of the status hierarchy within a large-scale, natural setting. The results of empirical analyses assessing a large online community of software developers show that in the process of status attainment, community members tend to evaluate a focal actor's reputation according to publicly available social references. Ironically, these same social references also work to constrain an actor's status mobility.


2021 ◽  
Vol 6 ◽  
pp. 75-82
Author(s):  
P. V. Troshchinskiy ◽  

The article is devoted to the study of the process of introducing digital technologies into the work of the People’s Courts of China and the issues of its legal regulation. The judicial system of the modern Chinese state is based on courts of three levels and two courts. Judicial bodies include the Supreme People’s Court, local people's courts, military courts and other special courts. For several years, various digital technologies have been used in all Chinese courts. In addition, since August 2017, special Internet courts have appeared in the PRC (three such courts have now been created in Hangzhou, Beijing and Guangzhou), which consider civil, administrative and criminal cases online without the personal presence of participants. The use of digital technologies in the judicial system of the PRC contributes to its transparency, reducing corruption, combating the spread of coronavirus, increasing the general level of legal literacy of the people. So, the creation of a unified platform for online broadcasting of court hearings online, the public disclosure of court sentences (decisions, rulings) in various categories of cases allows society to control the activities of the people's courts of the country. Considering the case online during the confrontation of the coronavirus epidemic prevents the spread of infection among participants in the process. The experience of China in the large-scale implementation of digital technologies in judicial activity is not only of scientific interest, but also important from a practical point of view for the Russian expert community. The Russian Federation has also embarked on the path of using digital technologies in litigation, but China is following it ahead of the schedule, which is important in terms of studying the results it has achieved and the mistakes made so that the Russian legislator can take them into account in their law-making activities. It is also important that China, in the process of digitalizing its national system, uses exclusively national platforms and databases. Access to information by foreign intelligence services is not possible. The main providers of digital services for the judicial system are also national corporations, which legally have the status of private companies, but in fact they are completely controlled by the СРС.


2014 ◽  
Vol 986-987 ◽  
pp. 1383-1386
Author(s):  
Zhen Xing Yang ◽  
He Guo ◽  
Yu Long Yu ◽  
Yu Xin Wang

Cloud computing is a new emerging paradigm which delivers an infrastructure, platform and software as services in a pay-as-you-go model. However, with the development of cloud computing, the large-scale data centers consume huge amounts of electrical energy resulting in high operational costs and environment problem. Nevertheless, existing energy-saving algorithms based on live migration don’t consider the migration energy consumption, and most of which are designed for homogeneous cloud environment. In this paper, we take the first step to model energy consumption in heterogeneous cloud environment with migration energy consumption. Based on this energy model, we design energy-saving Best fit decreasing (ESBFD) algorithm and energy-saving first fit decreasing (ESFFD) algorithm. We further provide results of several experiments using traces from PlanetLab in CloudSim. The experiments show that the proposed algorithms can effectively reduce the energy consumption of data center in the heterogeneous cloud environment compared to existing algorithms like NEA, DVFS, ST (Single Threshold) and DT (Double Threshold).


2020 ◽  
Vol 20 (2) ◽  
pp. 133-145 ◽  
Author(s):  
Hyeongho Choi ◽  
Euipyeong Lee

32,000 fire fighters from 451 fire departments in 41 prefectures were mobilized to support and assist fire extinguishing and lifesaving in the Hyogo Prefecture Nanbu Earthquake that occurred on January 17, 1995. Based on this experience, the emergency fire response team for disaster response (EFRT) was established by the Fire and Disaster Management Agency (FDMA) on June 30, 1995. When large scale disasters occur over wide areas, EFRTs in Japan are dispatched to the disaster places to assist fire fighting on demand or by the order of the commissioner of the FDMA. This study analyzed the background required for establishing the EFRT; the process and details of the legislation; the establishment of basic plans, organizations, and operation plans; and assistance dispatch along with the plan for receiving outside support; registration and the plan for reinforcing equipment; the status of training for preparing assistance dispatch; and activity results in order to provide basic information to prepare large scale disasters and establish coping policies in Korea.


2021 ◽  
Author(s):  
◽  
Lili Song

<p>This thesis systematically considers the law and policy on refugee status in the People’s Republic of China. It considers relevant Chinese legal provisions, applicable bilateral and multinational treaties, as well as China’s refugee policy and practice. It also presents and analyses first-hand information collected through interviews with refugees and aid workers.  China is an emerging destination of refugees and other displaced foreigners. Although China is a party to the 1951 Convention relating to the Status of Refugees and its 1967 Protocol, Chinese law contains no provisions governing the definition of a refugee or the determination of refugee status. Further, there is a gap between the criteria for asylum in the 1982 Chinese Constitution and the criteria for refugee status in the 1951 Convention.  In practice, although the Chinese government has generally allowed the United Nations High Commissioner for Refugees to process individual applications for refugee status, the Chinese government has practically performed the function of refugee status determination in large-scale influx situations through policy decisions. In these situations, the security, political, and strategic interests of China have often overshadowed China’s commitment under the 1951 Convention.  China has been cautious about recognising refugees on its territory. However, the Chinese government has clearly demonstrated a growing interest in addressing the issue of refugee recognition within a more formalised framework.  In conclusion, this thesis recommends that China adopt a legal refugee definition in line with the 1951 Convention relating to the Status of Refugees and develop a predictable and fair national RSD mechanism.</p>


2021 ◽  
Author(s):  
◽  
Lili Song

<p>This thesis systematically considers the law and policy on refugee status in the People’s Republic of China. It considers relevant Chinese legal provisions, applicable bilateral and multinational treaties, as well as China’s refugee policy and practice. It also presents and analyses first-hand information collected through interviews with refugees and aid workers.  China is an emerging destination of refugees and other displaced foreigners. Although China is a party to the 1951 Convention relating to the Status of Refugees and its 1967 Protocol, Chinese law contains no provisions governing the definition of a refugee or the determination of refugee status. Further, there is a gap between the criteria for asylum in the 1982 Chinese Constitution and the criteria for refugee status in the 1951 Convention.  In practice, although the Chinese government has generally allowed the United Nations High Commissioner for Refugees to process individual applications for refugee status, the Chinese government has practically performed the function of refugee status determination in large-scale influx situations through policy decisions. In these situations, the security, political, and strategic interests of China have often overshadowed China’s commitment under the 1951 Convention.  China has been cautious about recognising refugees on its territory. However, the Chinese government has clearly demonstrated a growing interest in addressing the issue of refugee recognition within a more formalised framework.  In conclusion, this thesis recommends that China adopt a legal refugee definition in line with the 1951 Convention relating to the Status of Refugees and develop a predictable and fair national RSD mechanism.</p>


Sign in / Sign up

Export Citation Format

Share Document