Академический Документы
Профессиональный Документы
Культура Документы
---------------------------------------------------------------------***---------------------------------------------------------------------
ABSTRACT-
Keywords:
On the other hand, weak security and privacy methods HBase is a software module that runs as non-
can hinder the adoption of big data in the Network care. relational database on top of HDFS. HBase is
There can be public resistance from individuals or NoSQL database that stores data according a key-
government against the use of big data in Network care, value model. As it is a NoSQL type of database it
when there is no trust in the protection of their personal requires low level programming to query. Like other
information. Hindering in the adoption of big data in the software modules of Hadoop, HBase is open-source
Network care could also hinder potential benefits big and is modeled after Google’s Big Table database.
data could bring to the Network care, which are for
example improved quality of Network. Therefore, the Hive is essentially a data warehouse that runs on top
owners of the problem are the hospitals and other of HDFS. Hive structures data into concepts like
organizations in the Network that potentially can benefit tables, columns, rows and partitions, similar to a
from an adoption of big data in Network care. These relational database. Data in a Hive database can be
organizations have to deal with hurdles such as privacy queried using (limited) SQL like language, named
legalization and the public perception of privacy before HiveQL.
they can successfully adopt big data.
Mobile Healthcare
The objective is to select the optimal cloud server for a
mobile VM in addition to minimizing the total number Medical applications in the mobile environment
of VM migrations, reducing task-execution time. Honey called as mobile healthcare applications and used for
Bean Optimization algorithm (HBO) to identify the medical treatment, patient tracking, etc. The purpose of
optimal target cloudlet. applying MCC in medical applications is to decrease
disadvantages of traditional medical applications like
small physical storage, security and privacy, and medical
Hadoop Framework errors.
Facilities of Mobile Healthcare and gives a response to the user’s local client. That is,
the application continuously uploads some data and the
Health monitoring services for patients to be cloud server processes this data to provide responses
monitored at anytime and anywhere through internet or back to the user.
by network provider. Emergency management system
for emergency vehicles to reach or manage vehicles Honey Bee Optimization Algorithm
effectively and in time, in case of receiving calls from Algorithm Honey bee Based VM Migration, at Cloudlet
incidents and accidents. Healthcare mobile devices for i
detecting pulse-rate, blood pressure, and level of alcohol INPUT: VM set V and accessible cloudlet set Cu for
integrated with a system to alert in case of emergency. each VM u. System Parameters
Store healthcare information of patients to use in
medical experiments or researches. Mobile healthcare OUTPUT: VM-cloudlet pair.
applications provide users easiness and quickness by 1: Initialize system tunning parameter α
accessing resources at any time, from anywhere. By the
help of cloud, mobile healthcare applications offer a 2: Initialize system migration parameters γl , γg
variety of on-demand services on clouds rather than
standalone applications on local computers and servers. 3: Determine Candidate VM set Vs using Algorithm 1
However, there have to be proposed solutions to protect
4: Initialize ants set A
participant’s health information to increase the privacy
of the users, as have to be done in the traditional 5: Generate initial solution using HBO Algorithm 3
applications.
6: Calculate initial pheromone γ0
Virtualization Resource Access
7: Set maximum iteration MAX_IT
Virtualization technology introduces a middle
8: while ( do iteration≤MAX_IT)
layer between the hardware and software layers in a
cloudlet, allowing the hardware resources to be shared 9: for (Ant a∈A) do
by means of VM. Resources (e.g., CPU, memory,
network bandwidth, etc.) in a cloudlet are provisioned to 10: k=0 11: repeat
these VMs. Resource provisioning in cloud computing is
12: Select a VM v in cloudlet j for VM uk ∈ Vs
a well-studied area. However, the mobility in MCC
introduces several challenges to maintain an acceptable 13: k=k+1
Quality of Service(QoS) when provisioning cloud
resources. Mobile users may move from one Access 14: until every VM is provisioned to a cloudlet 15: for
Point (AP) to another, increasing their distances between (VM k∈Vs) do
current locations and the cloudlet, where the tasks are
provisioned. This increases the task-execution time. To 16: Update the local pheromone
address this issue, we propose a VM migration 17: end for 18: end for 19: Update the global pheromone
technique for a heterogeneous MCC system following
the user’s mobility pattern. 20: iteration=iteration+1
That is, when a user moves from one cloudlet to 21: end while
another cloudlet, the resource or VM must be migrated
22: Return VM-cloudlet pairs
to the cloudlet that is nearest to the user. Consider the
following scenario: a blind user is executing an
application that takes an image from his surroundings.
Then, the application processes the image in the cloudlet
Detection
Security Categories
Prevention
Fig. 4.7 Intrusion Detection based on Web server
Prevention means keeping the bad guys out.
Normally this is accomplished by firewalls and well The problems with these systems are false
patched systems. The value Honeypots can add to this alarms and non-detected alarms. A system might alert on
category is small. If a random attack is performed, suspicious or malicious activity, even if the data was
Honeypots can detect that attack, but not prevent it as valid production traffic. Due to the high network traffic
the targets are not predictable on most networks it is extremely difficult to process
. every data, so the chances for false alarms increase with
the amount of data processed. High traffic also leads to
One case where Honeypots help with prevention non-Detected attacks. When the system is not able to
is when an attacker is directly hacking into a server. In process all data, it has to drop certain packets, which
this case a Honeypot would cause the hacker to waste leaves those un scanned. An attacker could benefit of
time on a non-sufficient target and help preventing an such high loads on network traffic.
attack on a production system. But this means that the
attacker has attacked the Honeypot before attacking a
real server and not otherwise.
Response
CONCLUSION
fails to effectively utilize cloudlet resources. Finally, [7] R. Cimler, J. Matyska, and V. Sobeslav, ‘‘Cloud
there is no VM migration approach, even though it does based solution for mobile healthcare application,’’ in
not increase the over-provisioned resources, but it Proc. 18th Int. Database Eng. Appl. Symp., 2014, pp.
negatively impacts on other aspects. 298–301.
[8] E. Cuervo et al., ‘‘Maui: Making smartphones last
FUTURE WORK: longer with code offload,’’ in Proc. 8th Int. Conf. Mobile
Syst., Appl., Services, 2010, pp. 49–62.
The considered rates of resource over- [9] A. V. Dastjerdi and R. Buyya, ‘‘Fog computing:
provisioning are during VM migration, allowing the Helping the Internet of Things realize its potential,’’
overall system to utilize computing resources optimally. Computer, vol. 49, no. 8, pp. 112–116, Aug. 2016.
The future work concentrates on how to further optimize [10] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, ‘‘A
the task-computation time and data-access latency survey of mobile cloud computing: Architecture,
through considering the presence of fog clouds and applications, and approaches,’’ Wireless Commun.
crowd sourcing. In this aspect, exploring edge Mobile Comput., vol. 13, no. 18, pp. 1587–1611, Dec.
computing technology to further optimize the task 2013.
execution time while considering mobility and context- [11] C. Doukas, T. Pliakas, and I. Maglogiannis,
awareness. ‘‘Mobile healthcare information management utilizing
cloud computing and Android OS,’’ in Proc. Annu. Int.
Conf. IEEE Eng. Med. Biol., Aug. 2010, pp. 1037–1040.
REFERENCES: [12] E.-M. Fong and W.-Y. Chung, ‘‘Mobile cloud-
computing-based healthcare service by noncontact ecg
[1] J.H.Abawajyand M.M.Hassan,‘‘Federated Internet of monitoring,’’ Sensors, vol. 13, no. 12, pp. 16451–16473,
Things and cloud computing pervasive patient health 2013.
monitoring system,’’ IEEE Commun. Mag., vol. 55, no. [13] L. Gkatzikis and I. Koutsopoulos, ‘‘Migrate or not?
1, pp. 48–53, Jan. 2017. Exploiting dynamic task migration in mobile cloud
[2] E. Ahmed et al., ‘‘Enabling mobile and wireless computing systems,’’ IEEE Wireless Commun., vol. 20,
technologies for smart cities,’’ IEEE Commun. Mag., no. 3, pp. 24–32, Jun. 2013.
vol. 55, no. 1, pp. 74–75, May 2017. [14] L. Gkatzikis and I. Koutsopoulos, ‘‘Mobiles on
[3] M. Basiri, A. Z. Azim, and M. Farrokhi, ‘‘Smart city cloud nine: Efficient task migration policies for cloud
solution for computing systems,’’ in Proc. IEEE 3rd Int. Conf. Cloud
sustainableurbandevelopment,’’Eur.J.Sustain.Develop.,v Netw. (CloudNet), Oct. 2014, pp. 204–210.
ol.6,no.1,pp.71–84, 2017. [15] M. Guntsch, M. Middendorf, and H. Schmeck, ‘‘An
[4] N. Bobroff, A. Kochut, and K. Beaty, ‘‘Dynamic ant colony optimization approach to dynamic TSP,’’ in
placement of virtual machines for managing SLA Proc. 3rd Annu. Conf. Genetic Evol. Comput., 2001, pp.
violations,’’ in Proc. 10th IFIP/IEEE Int. Symp. Integr. 860–867.
Netw. Manage. (IM), May 2007, pp. 119–128.
[5] R. Buyya, C. S. Yeo, and S. Venugopal, ‘‘Market-
oriented cloud computing: Vision, hype, and reality for
delivering it services as computing utilities,’’ in Proc.
10th IEEE Int. Conf. High Perform. Comput. Commun.
(HPCC), Sep. 2008, pp. 5–13.
[6] B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A.
Patti, ‘‘Clonecloud: Elastic execution between mobile
device and cloud,’’ in Proc. 6th Conf. Comput. Syst.,
2011, pp. 301–314.