Search For:

Displaying 1-49 out of 49 total
TSHC: Trusted Scheme for Hadoop Cluster
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Zhou Quan,Deqin Xiao,Daixian Wu,Chunming Tang,Chunming Rong
Issue Date:September 2013
pp. 344-349
Hadoop is a Apache project, which has be used at many fields, such online media companies including Facebook, Yahoo, educational service, government. However, there are some security risks or untrust risks in the Hadoop cluster. In the paper, a Trusted Sch...
 
TSHC: Trusted Scheme for Hadoop Cluster
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Zhou Quan,Deqin Xiao,Daixian Wu,Chunming Tang,Chunming Rong
Issue Date:September 2013
pp. 344-349
Hadoop is a Apache project, which has be used at many fields, such online media companies including Facebook, Yahoo, educational service, government. However, there are some security risks or untrust risks in the Hadoop cluster. In the paper, a Trusted Sch...
 
A Survey on Cloud Accountability
Found in: 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia)
By Xianghan Zheng,Hui Ye,Chunming Tang,Chunming Rong,Guolong Chen
Issue Date:December 2013
pp. 627-632
Recent advances in cloud computing technology now allow users to access data wherever they are. However, with these advances come some costs: cloud data is often stored and manipulated by remote machines that users have no access to. Moreover, cloud servic...
 
A System Prototype with Multiple Robots for Finding u-Objects in a Smart Space
Found in: Embedded Software and Systems, Second International Conference on
By Tomomi Kawashima, Jianhua Ma, Bernady O. Apduhan, Runhe Huang, Chunming Rong
Issue Date:July 2008
pp. 229-236
A smart space that can offer automatic services mainly relies on sensing devices to acquire contextual information, and on actuation devices to take responsive actions. Because such devices are usually fixed in some locations in the physical environment an...
 
Safer@Home Analytics: A Big Data Analytical Solution for Smart Homes
Found in: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom)
By Antorweep Chakravorty,Tomasz Wlodarczyk,Chunming Rong
Issue Date:December 2013
pp. 705-710
The vast amounts of data generated from sensors in smart homes, can give valuable insights about social and behavioral patters on households and their residents. The goal of the project is investigation & implementation of mechanisms to capture/sto...
 
Competitive K-Means, a New Accurate and Distributed K-Means Algorithm for Large Datasets
Found in: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom)
By Rui Maximo Esteves,Thomas Hacker,Chunming Rong
Issue Date:December 2013
pp. 17-24
The tremendous growth in data volumes has created a need for new tools and algorithms to quickly analyze large datasets. Cluster analysis techniques, such as K-means can be used for large datasets distributed across several machines. The accuracy of K-mean...
 
Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
Found in: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom)
By Aryan Taherimonfared,Tomasz Wiktor Wlodarczyk,Chunming Rong
Issue Date:December 2013
pp. 258-265
The proper operation and maintenance of a network requires a reliable and efficient monitoring mechanism. The mechanism should handle large amount of monitoring data which are generated by different protocols. In addition, the requirements (e.g. response t...
 
Resource Pool Oriented Trust Management for Cloud Infrastructure
Found in: 2013 Eighth International Conference on Availability, Reliability and Security (ARES)
By Gansen Zhao,Haiyu Wang,Chunming Rong,Yong Tang
Issue Date:September 2013
pp. 268-273
IaaS encourages pooled resource management model, which provides transparency on the management and provision of IT resources. The transparency, hiding physical details of the underlying resources, makes it difficult for cloud users/services to identify tr...
 
Performance Analysis and Optimization of Map Only Left Outer Join
Found in: 2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
By Ming Hao,Tomasz Wiktor Wlodarczyk,Chunming Rong
Issue Date:March 2013
pp. 625-631
We studied the characteristics of HDFS, Distributed Cache and how algorithms of left outer join on map side had been implemented on the Hadoop platform. For the purpose of performance optimization we inspected several methods to control amount of map task....
 
Cluster analysis for the cloud: Parallel competitive fitness and parallel K-means++ for large dataset analysis
Found in: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
By R. M. Esteves,T. Hacker, Chunming Rong
Issue Date:December 2012
pp. 177-184
The amount of resources needed to provision Virtual Machines (VM) in a cloud computing systems to support virtual HPC clusters can be predicted from the analysis of historic use data. In previous work, Hacker et al. found that cluster analysis is a useful ...
 
Accountability for cloud and other future Internet services
Found in: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
By Siani Pearson,Vasilis Tountopoulos,Daniele Catteddu,Mario Sudholt,Refik Molva,Christoph Reich,Simone Fischer-Hubner,Christopher Millard,Volkmar Lotz,Martin Gilje Jaatun,Ronald Leenes,Chunming Rong,Javier Lopez
Issue Date:December 2012
pp. 629-632
Cloud and IT service providers should act as responsible stewards for the data of their customers and users. However, the current absence of accountability frameworks for distributed IT services makes it difficult for users to understand, influence and det...
 
A multi-criteria design scheme for service federating inter-cloud applications
Found in: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
By Erdal Cayirci,Chunming Rong,Maciej Koczur,Kai Hwang
Issue Date:December 2012
pp. 129-134
A new scheme of service oriented architecture for federating services provided by multiple clouds as one application is introduced. Service federating inter-cloud application configuration requires selecting a set of services from various clouds such that ...
 
A fast estimation of shortest path distance for power-law network predominant cloud service
Found in: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
By Jin Liu,Chunming Rong,Ganseng Zhao
Issue Date:December 2012
pp. 480-487
The estimation of the shortest path between two vertices in a network graphs is an important issue for many applications in the real world, which may be road networks, social collaboration networks, biological networks and so forth. The short response time...
 
Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Byambajargal Byambajav,Tomasz Wiktor Wlodarczyk,Chunming Rong,Paea LePendu,Nigam Shah
Issue Date:March 2012
pp. 1075-1080
In this paper we compare performance results of different implementations of join operation in Hadoop in a scenario where right side (of the join) is within single node memory size. We present results for several implementations both in pure Map Reduce and...
 
An Initial Survey on Integration and Application of Cloud Computing to High Performance Computing
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Tomasz Wiktor Wlodarczyk,Chunming Rong
Issue Date:December 2011
pp. 612-617
In this paper we survey state-of-the-art of integration and application of Cloud Computing (CC) to High Performance Computing (HPC). Motivation and general application areas are presented demonstrating particular focus on commoditization of HPC resources. ...
 
Integer Factorization Using Hadoop
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Son T. Nguyen,Semere Tsehaye Ghebregiorgish,Nour Alabbasi,Chunming Rong
Issue Date:December 2011
pp. 628-633
Integer factorization is an interesting but a hard problem and stays at the core of many security mechanisms. Conventional approaches to factor big integer numbers often require powerful computers and a great effort in software development. In this paper, ...
 
Energy-Aware Task Consolidation Technique for Cloud Computing
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Ching-Hsien Hsu,Shih-Chang Chen,Chih-Chun Lee,Hsi-Ya Chang,Kuan-Chou Lai,Kuan-Ching Li,Chunming Rong
Issue Date:December 2011
pp. 115-121
Task consolidation is a way of maximizing cloud computing resource, which brings many benefits such as better use of resources, rationalization of maintenance, IT service customization, QoS and reliable services, etc. However, maximizing resource utilizati...
 
Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Yuri Demchenko,Canh Ngo,Cees de Laat,Tomasz Wiktor Wlodarczyk,Chunming Rong,Wolfgang Ziegler
Issue Date:December 2011
pp. 255-263
Providing consistent security services in on-demand provisioned Cloud infrastructure services is of primary importance due to multi-tenant and potentially multi-provider nature of Clouds Infrastructure as a Service (IaaS) environment. Cloud security infras...
 
Using Mahout for Clustering Wikipedia's Latest Articles: A Comparison between K-means and Fuzzy C-means in the Cloud
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Rui M´ximo Esteves,Chunming Rong
Issue Date:December 2011
pp. 565-569
This paper compares k-means and fuzzy c-means for clustering a noisy realistic and big dataset. We made the comparison using a free cloud computing solution Apache Mahout/ Hadoop and Wikipedia's latest articles. In the past the usage of these two algorithm...
 
K-means Clustering in the Cloud -- A Mahout Test
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Rui Máximo Esteves, Rui Pais, Chunming Rong
Issue Date:March 2011
pp. 514-519
The K-Means is a well known clustering algorithm that has been successfully applied to a wide variety of problems. However, its application has usually been restricted to small datasets. Mahout is a cloud computing approach to K-Means that runs on a Hadoop...
 
Performance Analysis of Hadoop for Query Processing
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Tomasz Wiktor Wlodarczyk, Yi Han, Chunming Rong
Issue Date:March 2011
pp. 507-513
Query processing using mostly various NoSQL languages becomes a significant application area for Hadoop. Despite significant work on performance improvement of these languages the performance dependence on basic configuration parameters seems not to be ful...
 
Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Hongbing Cheng, Chunming Rong, Geng Yang
Issue Date:March 2011
pp. 475-480
Due to limitations of power, computation capability and storage resources' wireless sensor networks are vulnerable to many attacks. The paper proposed a novel routing protocol algorithm for Wireless sensor network. The proposed routing protocol algorithm c...
 
Social Impact of Privacy in Cloud Computing
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Rui Máximo Esteves, Chunming Rong
Issue Date:December 2010
pp. 593-596
Cloud computing is emerging as a serious paradigm shift in the way we use computers. It relies on several technologies that are not new. However, the increasing availability of bandwidth allows new combinations and opens new IT perspectives. The data stora...
 
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong, Wenjun Li, Lianzhang Tang, Yong Tang
Issue Date:December 2010
pp. 89-96
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. Promising as it is, this paradigm also brings forth new challenges for data security and access control when users outsource ...
 
On the Sustainability Impacts of Cloud-Enabled Cyber Physical Space
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Tomasz Wiktor Wlodarczyk, Chunming Rong
Issue Date:December 2010
pp. 597-602
This paper establishes a relation between Cloud Computing and Cyber Physical Space. It demonstrates how Cloud Computing technologies provide necessary technical means to create Cyber Physical Space. At the same time it describes examples of cloud services ...
 
Performance Considerations of Data Acquisition in Hadoop System
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Baodong Jia, Tomasz Wiktor Wlodarczyk, Chunming Rong
Issue Date:December 2010
pp. 545-549
Data have become more and more important these years, especially for big companies, and it is of great benefit to mine useful information in these data. Oil & Gas industry has to deal with vast amounts of data, both in real-time and historical context....
 
Trusted Data Sharing over Untrusted Cloud Storage Providers
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, Yong Tang
Issue Date:December 2010
pp. 97-103
Cloud computing has been acknowledged as one of the prevaling models for providing IT capacities. The off-premises computing paradigm that comes with cloud computing has incurred great concerns on the security of data, especially the integrity and confiden...
 
DataStorm
Found in: Services, IEEE Congress on
By Tomasz Wiktor Wlodarczyk, Chunming Rong, Baodong Jia, Laurentiu Cocanu, Csongor I. Nyulas, Mark A. Musen
Issue Date:July 2010
pp. 123-127
Cloud-based systems have proven to be a powerful technology for building data-intensive applications. However, the process of designing and deploying such applications is still primarily a manual one. There is a need for mechanisms and tools to help automa...
 
Towards Free Task Overloading in Passive Replication Based Real-time Multiprocessors
Found in: Computer and Information Technology, International Conference on
By Wei Sun, Naixue Xiong, Laurence T. Yang, Chunming Rong
Issue Date:July 2010
pp. 1735-1742
In multiprocessor systems, passive replication is a technique that trades processing power for increased reliability. One approach of passive replication, called primary-backup task scheduling, is often used in real-time multiprocessor systems to ensure th...
 
Bayesian Networks for Fault Detection under Lack of Historical Data
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Rui Máximo Esteves, Tomasz Wiktor Wlodarczyk, Chunming Rong, Einar Landre
Issue Date:December 2009
pp. 732-736
In this paper we propose a Bayesian Network approach as a promissory data fusion technique for surveillance of sensors accuracy. We prove the usefulness of this method even in case when there is not enough feasible data to construct the model in traditiona...
 
A Novel Relay Encryption Scheme for Mobile Ad hoc Networks
Found in: Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
By Duan Hu, Furong Wang, Chen Huang, Chunming Rong
Issue Date:July 2009
pp. 417-422
Security has become a primary concern for providing communication in mobile ad hoc networks(MANET). Compared with a fixed network, a MANET is more vulnerable to attacks such as passive eavesdropping, data tampering and so on, so it is necessary to encrypt ...
 
An Integrated Information Sharing Structure for Resuscitation Data
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Kari Anne Haaland Thorsen, Trygve Eftestøl, Chunming Rong, Petter Andreas Steen
Issue Date:May 2009
pp. 7-12
Every year more than 250000 people suffer from cardiac arrest in Europe. Survival rate to hospital discharge vary in the range 1,8-30,7%, indicating a potential for improvement by identifying explanatory factors. Ambulance charts documenting resuscitation ...
 
Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding
Found in: Future Generation Communication and Networking
By Kui Xu, Fan Zhang, Chunming Rong, Bin Dai, Benxiong Huang
Issue Date:December 2008
pp. 321-324
Network coding has been designed for wireless networks to improve the capabilities of throughput, reliability, and routing by mixing information from different flows and conveying more information in each transmission. If packets are coded by blocks with l...
 
IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Furong Wang, Chen Huang, Jing Zhao, Chunming Rong
Issue Date:March 2008
pp. 978-984
An Ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure, so they are vulnerable to many attacks and the security of the network can not be ...
 
Data Integration in Oil and Gas at Norwegian Continental Shelf
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Kari Anne Haaland Thorsen, Chunming Rong
Issue Date:March 2008
pp. 1597-1602
Modern oil and gas industry is to a large extent a knowledge- and information-industry, and techniques from computer science and informatics can make significant contributions to productivity and environment protection. As oil production from the Norwegian...
 
An Identity-Based Encryption Scheme for Broadcasting
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Geng Yang, Jiangtao Wang, Hongbing Cheng, Chunming Rong
Issue Date:September 2007
pp. 123-126
It is a challenge to find out suitable cryptography for wireless sensor networks (WSN) due to limitations of power, computation capability and storage resources. Many schemes based on public or symmetric key cryptography are investigated. We propose an ide...
 
Effective Storage Security in Incompletely Trusted Environment
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Chunming Rong, Won-Chol Kim
Issue Date:May 2007
pp. 432-437
This paper presents a design of effective cryptographic file system (ECFS) for storage services. ECFS can be used to provide the data security in existing network and p2p file system such as NFS, CIFS, OceanStore and Yahoo! Briefcase. <p>We assume th...
 
Towards Integrated Services for Health Monitoring
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Chunming Rong, Hein Meling, Dagfinn Waage
Issue Date:May 2007
pp. 776-781
The emergence of short-range wireless communications hold the promise of realizing the grand vision of the next generation communication networks in which devices follow a always best-connected pattern for anybody, to anything from anywhere at anytime. Sho...
 
Analysis of IBS for MANET Security in Emergency and Rescue Operations
Found in: Advanced Information Networking and Applications, International Conference on
By Anne Marie Hegland, Eli Winjum, Pal Spilling, Chunming Rong, Oivind Kure
Issue Date:April 2006
pp. 155-159
<p>Protection of the network layer in mobile ad hoc networks (MANETs) imply cryptographically signed routing messages. Identity-based signature (IBS) schemes make bandwidth consuming certificate exchanges obsolete. User identifiers serve as public ke...
 
A Scalable Security Architecture for Grid
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong
Issue Date:December 2005
pp. 89-93
Grid is a distributed computing and resource environment. Security is an important issue in the grid environment. In this paper, we present a prototype of the grid security architecture. It shows that the architecture is scalable, and meets the security re...
 
Localized Credentials for Server Assisted Mobile Wallet
Found in: Computer Networks and Mobile Computing, International Conference on
By Stig F. Mjølsnes, Chunming Rong
Issue Date:October 2001
pp. 203
We propose a fully distributed multiparty secure architecture so that you can leave most of the content of your electronic wallet in the security of your home while travelling with your mobile terminals. Emerging GSM and UMTS mobile terminals sporting both...
 
Multiple Data Integration Service
Found in: 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA)
By Xin Hong,ChunMing Rong
Issue Date:May 2014
pp. 860-865
Traditional database system can not handle data sharing in heterogeneous environment. With explosion of data flood, how to provide multiple data integration service is taken into account.This paper proposes a cloud data service architecture which provides ...
 
Trust Evaluation Based Content Filtering in Social Interactive Data
Found in: 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia)
By Lingshan Xu,Xianghan Zheng,Chunming Rong
Issue Date:December 2013
pp. 538-542
A new Cloud-based Trust Awareness and Interaction Model (CTAIM) is proposed for trust evaluation based content filtering in social interactive data. The research is based on diversified information from social interactive data to analyse people's intention...
 
Message from the General Chair and Cloud Computing Association - CloudCom.Org
Found in: 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia)
By Chunming Rong
Issue Date:December 2013
pp. xiii
The Cloud Computing Association (http://www.cloudcom.org) is a global, nonprofit member organization that shall promote the development of cloud computing technology and related matters. The Cloud Computing Association is registered in Norway, and was foun...
   
On Access Control Schemes for Hadoop Data Storage
Found in: 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia)
By Chunming Rong,Zhou Quan,Antorweep Chakravorty
Issue Date:December 2013
pp. 641-645
Hadoop is a distributed Big Data storage and processing framework hugely adopted in different sectors from online media, education, government and social media to handle the enormous growth of information in their respective domains. However, the core arch...
 
Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data
Found in: 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia)
By Feng Zhang,Chunming Rong,Gansen Zhao,Jinxia Wu,Xiangning Wu
Issue Date:December 2013
pp. 633-640
In many applications, data mining has to be done in distributed data scenarios. In such situations, data owners may be concerned with the misuse of data, hence, they do not want their data to be mined, especially when these contain sensitive information. P...
 
Privacy Preserving Data Analytics for Smart Homes
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Antorweep Chakravorty,Tomasz Wlodarczyk, Chunming Rong
Issue Date:May 2013
pp. 23-27
A framework for maintaining security & preserving privacy for analysis of sensor data from smart homes, without compromising on data utility is presented. Storing the personally identifiable data as hashed values withholds identifiable information from...
   
SWRL-F: a fuzzy logic extension of the semantic web rule language
Found in: Proceedings of the International Conference on Web Intelligence, Mining and Semantics (WIMS '11)
By Chunming Rong, Mark Musen, Marting O'Connor, Tomasz Wiktor Wlodarczyk
Issue Date:May 2011
pp. 1-9
Enhancing Semantic Web technologies with ability to express uncertainty and imprecision is widely discussed topic. While SWRL can provide additional expressivity to OWL-based ontologies, it does not provide any way to handle uncertainty or imprecision. The...
     
Secure many to many routing for wireless sensor and actuator networks
Found in: Proceedings of the 2nd international conference on Security of information and networks (SIN '09)
By Chunming Rong, Erdal Cayirci, Son T. Nguyen
Issue Date:October 2009
pp. 172-178
A new secure power aware many-to-many routing protocol for wireless sensor and actuator networks is introduced. The protocol has two versions. The first version is designed for networks where every node transmits at the same power level. The second version...
     
 1