Advances in big data and cloud computing : proceedings of ICBDCC18 /: proceedings of ICBDCC18. ([2019])
- Record Type:
- Book
- Title:
- Advances in big data and cloud computing : proceedings of ICBDCC18 /: proceedings of ICBDCC18. ([2019])
- Main Title:
- Advances in big data and cloud computing : proceedings of ICBDCC18
- Other Titles:
- ICBDCC18
- Further Information:
- Note: J. Dinesh Peter, Amir H. Alavi, Bahman Javadi, editors.
- Editors:
- Peter, J. Dinesh
Alavi, Amir H
Javadi, Bahman - Other Names:
- International Conference on Big Data and Cloud Computing
- Contents:
- Intro; Preface; Contents; About the Editors; Fault-Tolerant Cloud System Based on Fault Tree Analysis; 1 Introduction; 2 Related Works; 3 Fault Tree Analysis; 3.1 Structure of Fault Tree; 3.2 Failure Rate Estimation Using Probability; 4 Fault-Tolerant VM Migration Algorithm; 5 Performance Analysis; 6 Conclusion; References; Major Vulnerabilities and Their Prevention Methods in Cloud Computing; 1 Introduction; 2 Attacks in Cloud; 2.1 Insider Attack; 2.2 Worm Attacks; 2.3 DDoS Attacks; 3 DDOS Attack Simulation in Cloud; 4 Discussion and Open Problems; 5 Conclusion; References Assessment of Solar Energy Potential of Smart Cities of Tamil Nadu Using Machine Learning with Big Data1 Introduction; 2 Data Set; 3 Empirical Model; 4 Machine Learning Models; 4.1 Evaluation of Model Accuracy; 5 Results and Discussion; 6 Conclusion; References; Taxonomy of Security Attacks and Risk Assessment of Cloud Computing; 1 Introduction; 2 Attack Taxonomies; 2.1 Attack Levels in CC; 2.2 Surface Attacks in CC; 2.3 Security Attacks on CC; 2.4 Cloud System Attacks; 2.5 Architecture of CC Attacks; 3 Threats and Vulnerability of CC; 3.1 Attack Consequences 3.2 Taxonomy of Security Threats and Attacks4 Most Vulnerable Attacks of CC; 4.1 APT Attacks; 4.2 Intrusion Detection Attacks; 4.3 Ontology Modeling and Inference Detection for APT Attack; 5 Risk assessmentss; 5.1 Flow of Cloud Attacks; 6 Conclusion and Future Scope; References; Execution Time Based Sufferage Algorithm for Static Task Scheduling inIntro; Preface; Contents; About the Editors; Fault-Tolerant Cloud System Based on Fault Tree Analysis; 1 Introduction; 2 Related Works; 3 Fault Tree Analysis; 3.1 Structure of Fault Tree; 3.2 Failure Rate Estimation Using Probability; 4 Fault-Tolerant VM Migration Algorithm; 5 Performance Analysis; 6 Conclusion; References; Major Vulnerabilities and Their Prevention Methods in Cloud Computing; 1 Introduction; 2 Attacks in Cloud; 2.1 Insider Attack; 2.2 Worm Attacks; 2.3 DDoS Attacks; 3 DDOS Attack Simulation in Cloud; 4 Discussion and Open Problems; 5 Conclusion; References Assessment of Solar Energy Potential of Smart Cities of Tamil Nadu Using Machine Learning with Big Data1 Introduction; 2 Data Set; 3 Empirical Model; 4 Machine Learning Models; 4.1 Evaluation of Model Accuracy; 5 Results and Discussion; 6 Conclusion; References; Taxonomy of Security Attacks and Risk Assessment of Cloud Computing; 1 Introduction; 2 Attack Taxonomies; 2.1 Attack Levels in CC; 2.2 Surface Attacks in CC; 2.3 Security Attacks on CC; 2.4 Cloud System Attacks; 2.5 Architecture of CC Attacks; 3 Threats and Vulnerability of CC; 3.1 Attack Consequences 3.2 Taxonomy of Security Threats and Attacks4 Most Vulnerable Attacks of CC; 4.1 APT Attacks; 4.2 Intrusion Detection Attacks; 4.3 Ontology Modeling and Inference Detection for APT Attack; 5 Risk assessmentss; 5.1 Flow of Cloud Attacks; 6 Conclusion and Future Scope; References; Execution Time Based Sufferage Algorithm for Static Task Scheduling in Cloud; 1 Introduction; 2 Related Works; 3 Proposed Methodology; 3.1 Execution Time Based Sufferage Algorithm (ETSA); 4 Experimental Results; 4.1 Resource Utilization Rate; 5 Conclusion; References QoS-Aware Live Multimedia Streaming Using Dynamic P2P Overlay for Cloud-Based Virtual Telemedicine System (CVTS)1 Introduction; 1.1 Issues in Telemedicine Streaming Related to Quality of Service; 2 Related Works; 2.1 Cloud-Based Live Streaming; 3 System Overview; 4 Proposed Work; 4.1 Proposed Dynamic Procurement of Virtual Machine (DPVm) Algorithm; 5 Experimental Setup; 6 Performance Evaluation; 7 Conclusion; References; Multi-level Iterative Interdependency Clustering of Diabetic Data Set for Efficient Disease Prediction; 1 Introduction; 2 Related Works; 3 Preliminaries 3.1 Multi-level Iterative Interdependency Clustering-Based Disease Prediction4 Results and Discussion; 5 Conclusion; References; Computational Offloading Paradigms in Mobile Cloud Computing Issues and Challenges; 1 Introduction; 1.1 Overview of Computation Offloading; 2 Structural Analysis of the Offloading Schemes; 3 Related Work; 4 Offloading Mechanism; 5 Future Work; References; Cost Evaluation of Virtual Machine Live Migration Through Bandwidth Analysis; 1 Introduction; 2 Related Work; 3 Cost System Model; 3.1 Bandwidth Allocation Strategy for Migration 3.2 Optimized Bandwidth Allocation Strategy Based on Queuing Theory … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2019
- Extent:
- 1 online resource (575 pages)
- Subjects:
- 004.6782
Cloud computing -- Congresses
Big data -- Congresses
Big data
Cloud computing
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9789811318825
9811318824 - Related ISBNs:
- 9811318816
9789811318818 - Notes:
- Note: Description based on online resource; title from digital title page (viewed on February 14, 2019).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.407569
- Ingest File:
- 02_480.xml