Search results for: CLOUD COMPUTING, FAKE VIP ATTACK, REPUTATION, TRUST, STACKELBERG GAME - Bridge of Knowledge

Search

Search results for: CLOUD COMPUTING, FAKE VIP ATTACK, REPUTATION, TRUST, STACKELBERG GAME

Search results for: CLOUD COMPUTING, FAKE VIP ATTACK, REPUTATION, TRUST, STACKELBERG GAME

  • Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions

    Publication

    - Year 2018

    We consider a generic model of Client-Server interactions in the presence of Sender and Relay, conceptual agents acting on behalf of Client and Server, respectively, and modeling cloud service providers in the envisaged "QoS as a Service paradigm". Client generates objects which Sender tags with demanded QoS level, whereas Relay assigns the QoS level to be provided at Server. To verify an object's right to a QoS level, Relay detects...

    Full text available to download

  • Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

    Publication

    - Year 2017

    In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...

    Full text available to download

  • Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation

    Publication

    In client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...

    Full text available to download

  • Jerzy Konorski dr hab. inż.

    Jerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...

  • Game theory-based virtual machine migration for energy sustainability in cloud data centers

    Publication
    • F. J. Maldonado-Carrascosa
    • S. García-Galán
    • M. Valverde-Ibáñez
    • T. Marciniak
    • M. Szczerska
    • N. Ruiz-Reyes

    - APPLIED ENERGY - Year 2024

    As the demand for cloud computing services increases, optimizing resource allocation and energy consumption has become a key factor in achieving sustainability in cloud environments. This paper presents a novel approach to address these challenges through an optimized virtual machine (VM) migration strategy that employs a game-theoretic approach based on particle swarm optimization (PSO) (PSO-GTA). The proposed approach leverages...

    Full text available to download

  • Complementary oriented allocation algorithm for cloud computing

    Publication

    Nowadays cloud computing is one of the most popular processing models. More and more different kinds of workloads have been migrated to clouds. This trend obliges the community to design algorithms which could optimize the usage of cloud resources and be more effiient and effective. The paper proposes a new model of workload allocation which bases on the complementarity relation and analyzes it. An example of a case of use is shown...

    Full text available to download

  • Mobile Cloud computing architecture for massively parallelizablegeometric computation

    Publication
    • V. Sánchez Ribes
    • H. Mora-Mora
    • A. Sobecki
    • F. José Mora Gimeno

    - COMPUTERS IN INDUSTRY - Year 2020

    Cloud Computing is one of the most disruptive technologies of this century. This technology has been widely adopted in many areas of the society. In the field of manufacturing industry, it can be used to provide advantages in the execution of the complex geometric computation algorithms involved on CAD/CAM processes. The idea proposed in this research consists in outsourcing part of the load to be com- puted in the client machines...

    Full text available to download

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publication

    - Year 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Full text available to download

  • Performance of Noise Map Service Working in Cloud Computing Environment

    In the paper a noise map service designated for the user interested in environmental noise subject is presented. It is based on cloud computing. Noise prediction algorithm and source model, developed for creating acoustic maps, are working in cloud computing environment. In the study issues related to noise modeling of sound propagation in urban spaces are discussed with a special focus on road noise. Examples of results obtained...

    Full text available to download

  • Mobile devices and computing cloud resources allocation for interactive applications

    Using mobile devices such as smartphones or iPads for various interactive applications is currently very common. In the case of complex applications, e.g. chess games, the capabilities of these devices are insufficient to run the application in real time. One of the solutions is to use cloud computing. However, there is an optimization problem of mobile device and cloud resources allocation. An iterative heuristic algorithm for...

    Full text available to download

  • Mobile Offloading Framework: Solution for Optimizing Mobile Applications Using Cloud Computing

    Publication

    Number of mobile devices and applications is growing rapidly in recent years. Capabilities and performance of these devices can be tremendously extended with the integration of cloud computing. However, multiple challenges regarding implementation of these type of mobile applications are known, like differences in architecture, optimization and operating system support. This paper summarizes issues with mobile cloud computing and...

    Full text available to download

  • General Provisioning Strategy for Local Specialized Cloud Computing Environments

    Publication

    The well-known management strategies in cloud computing based on SLA requirements are considered. A deterministic parallel provisioning algorithm has been prepared and used to show its behavior for three different requirements: load balancing, consolidation, and fault tolerance. The impact of these strategies on the total execution time of different sets of services is analyzed for randomly chosen sets of data. This makes it possible...

    Full text available to download

  • Application of Web-GIS and Cloud Computing to Automatic Satellite Image Correction

    Publication

    - Year 2016

    Radiometric calibration of satellite imagery requires coupling of atmospheric and topographic parameters, which constitutes serious computational problems in particular in complex geographical terrain. Successful application of topographic normalization algorithms for calibration purposes requires integration of several types of high-resolution geographic datasets and their processing in a common context. This paper presents the...

    Full text to download in external service

  • Towards Healthcare Cloud Computing

    In this paper we present construction of a software platform for supporting medical research teams, in the area of impedance cardiography, called IPMed. Using the platform, research tasks will be performed by the teams through computer-supported cooperative work. The platform enables secure medical data storing, access to the data for research group members, cooperative analysis of medical data and provide analysis supporting tools...

    Full text to download in external service

  • On the impact of Big Data and Cloud Computing on a scalable multimedia archiving system

    Multimedia Archiver (MA) is a system build upon the promise and fascination of the possibilities emerging from cloud computing and big data. We aim to present and describe how the Multimedia Archiving system works for us to record, put in context and allow a swift access to large amounts of data. We introduce the architecture, identified goals and needs taken into account while designing a system processing data with Big Data...

    Full text to download in external service

  • A game-theoretic study of CSMA/CA under a backoff attack

    Analizowany jest rozdział pasma realizowany przez protokół CSMA/CA w obecności anonimowych stacji egoistycznych, atakujących wykładniczy mechanizm odczekania. Przy założeniu ruchu nasycającego sieć pokazuje się, że powstaje w ten sposób niekooperacyjna gra o strukturze wypłat wieloosobowego dylematu więźnia. Wykorzystując własności macierzy wypłat zaproponowano strategię dla odpowiedniej gry wieloetapowej, zapewniającą asymptotyczne...

  • A random access protocol under backoff attack: performance and game-theoretic deterrent

    Publication

    - Year 2005

    Przedstawiono metodę obrony przed atakiem na protokół CSMA/CA, opartą na generacji sekwencji zagłuszających z wykorzystaniem wzajemnej słyszalności stacji. Na podstawie analizy wypłat odpowiedniej gry w formie rozwiniętej pokazano możliwość osiągania punktu równowagi odpowiadającego standardowym ustawieniom protokołu.

  • IEEE Cloud Computing

    Journals

    ISSN: 2325-6095

  • Multi-level Virtualization and Its Impact on System Performance in Cloud Computing

    The results of benchmarking tests of multi-level virtualized environments are presented. There is analysed the performance impact of hardware virtualization, container-type isolation and programming level abstraction. The comparison is made on the basis of a proposed score metric that allows you to compare different aspects of performance. There is general performance (CPU and memory), networking, disk operations and application-like...

    Full text available to download

  • IEEE Transactions on Cloud Computing

    Journals

    ISSN: 2168-7161

  • International Journal of Cloud Computing

    Journals

    ISSN: 2043-9989

  • International Journal of Cloud Applications and Computing

    Journals

    ISSN: 2156-1834 , eISSN: 2156-1826

  • Journal of Cloud Computing-Advances Systems and Applications

    Journals

    ISSN: 2192-113X

  • Individual corporate reputation, perception of collective corporate reputation, stock market investments

    Open Research Data

    There are two ways of conceiving of corporate reputation: individual and collective. Although related, they are not driven by the same factors. Thus, each of them may have a distinct impact on investment decisions.  The following dataset includes the data obtained in an incentivized economic experiment based on vignette studies. We induced the perception...

  • Theory and implementation of a virtualisation level Future Internet defence in depth architecture

    Publication
    • J. Konorski
    • P. Pacyna
    • G. Kolaczek
    • Z. Kotulski
    • K. Cabaj
    • P. Szalachowski

    - International Journal of Trust Management in Computing and Communications - Year 2013

    An EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...

    Full text to download in external service

  • Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS

    W wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...

    Full text available to download

  • Krzysztof Gierłowski dr inż.

    Krzysztof Gierłowski received his Ph.D. degree in telecommunications from the Faculty of Electronics, Gdańsk University of Technology (GUT), Poland, in 2018. He is author or co-author of more than 80 scientific papers and reviewer for a number of conferences and journals. Krzysztof Gierłowski took part in major IT-oriented projects, including: EU-funded Polish Future Internet Engineering initiative, PL-LAB2020 Infrastructural...

  • International Journal of Trust Management in Computing and Communications

    Journals

    ISSN: 2048-8378

  • Waldemar Korłub dr inż.

    People

    Waldemar Korłub obtained an Eng. degree in 2011, MSc.Eng. degree in 2012 and PhD in Computer Science in 2017 granted by the Faculty of Electronics, Telecommunications and Informatics at Gdansk University of Technology. His research interests include: distributed systems mainly grid and cloud computing platforms, autonomous systems capable of self-optimization, self-management, self-healing and self-protection, artificial intelligence...

  • Tomasz Gierszewski dr inż.

    People

  • Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network

    The capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...

    Full text available to download

  • Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection

    Publication

    - Year 2016

    We propose a framework to study Markovian trust value dynamics in a centralized Computational Trust and Reputation (CTR) scheme under trust-unaware partner selection using a mean-value approximation. Analytically founded answers are sought to questions like: Can dishonest agents subvert the CTR scheme (i.e., acquire higher trust values than honest agents)? Is indirect reciprocity incentivized? Is there a qualitative impact of a...

    Full text to download in external service

  • Under the Fire of Disinformation. Attitudes Towards Fake News in the Ukrainian Frozen War

    Publication
    • J. Kreft
    • M. Boguszewicz-kreft
    • D. Hliebova

    - Journalism Practice - Year 2023

    In this article, we examine individual attitudes towards fake news in the extreme conditions of a propaganda war, taking into account the complex regional social and historical conditions. For this purpose, within the mobile boundary zone during frozen war in Ukraine, we conducted qualitative research among representatives of generations X and Z (high school teachers and students). Being accustomed to fake news turned out to be...

    Full text to download in external service

  • Utility and Cloud Computing

    Conferences

  • A Centralized Reputation System for MANETs Based on Observed Path Performance

    Publication

    A reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...

  • Paweł Lubomski dr inż.

    People

    Paweł Lubomski is the director of the IT Services Centre at the Gdańsk University of Technology. He is responsible for developing and maintaining the central information systems of the university. He is also in charge of the R&D team and works on new approaches to IT systems’ protection. He also acts as the project manager of two big innovative IT projects co-financed by the European Funds. He received a PhD degree in computer...

  • Fake News: Possibility of Identification in Post-Truth Media Ecology System

    Publication

    - Year 2019

    Information comes as basic good which affects social well-being. A modern society and a modern state – its administration, education, culture, national economy and armed forces – cannot function efficiently without a rationally developed field of information. The quality of the functioning of that system depends on a specific feature of information, that is namely: its reliability which makes it possible for us to evaluate accuracy,...

    Full text available to download

  • Some Artificial Intelligence Driven Algorithms For Mobile Edge Computing in Smart City

    Publication

    - Year 2019

    Smart mobile devices can share computing workload with the computer cloud that is important when artificial intelligence tools support computer systems in a smart city. This concept brings computing on the edge of the cloud, closer to citizens and it can shorten latency. Edge computing removes a crucial drawback of the smart city computing because city services are usually far away from citizens, physically. Besides, we introduced...

    Full text to download in external service

  • Multi-criteria Differential Evolution for Optimization of Virtual Machine Resources in Smart City Cloud

    Publication

    - Year 2020

    In a smart city, artificial intelligence tools support citizens and urban services. From the user point of view, smart applications should bring computing to the edge of the cloud, closer to citizens with short latency. However, from the cloud designer point of view, the trade-off between cost, energy and time criteria requires the Pareto solutions. Therefore, the proposed multi-criteria differential evolution can optimize virtual...

    Full text to download in external service

  • Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks

    Publication

    - SENSORS - Year 2020

    The aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...

    Full text available to download

  • Some Optimization Methods for Simulations in Volunteer and Grid Systems

    Publication

    In this chapter, some optimization methods have been presented for improving performance of simulations in the volunteer and grid computing system called Comcute. Some issues related to the cloud computing can be solved by presented approaches as well as the Comcute platform can be used to simulate execution of expensive and energy consuming long-term tasks in the cloud environment. In particular, evolutionary algorithms as well...

  • IEEE International Conference on Cloud Computing

    Conferences

  • Optymalizacja zasobów chmury obliczeniowej z wykorzystaniem inteligentnych agentów w zdalnym nauczaniu

    Publication

    - Year 2023

    Rozprawa dotyczy optymalizacji zasobów chmury obliczeniowej, w której zastosowano inteligentne agenty w zdalnym nauczaniu. Zagadnienie jest istotne w edukacji, gdzie wykorzystuje się nowoczesne technologie, takie jak Internet Rzeczy, rozszerzoną i wirtualną rzeczywistość oraz deep learning w środowisku chmury obliczeniowej. Zagadnienie jest istotne również w sytuacji, gdy pandemia wymusza stosowanie zdalnego nauczania na dużą skalę...

    Full text available to download

  • Big Data from Sensor Network via Internet of Things to Edge Deep Learning for Smart City

    Publication

    - Year 2021

    Data from a physical world is sampled by sensor networks, and then streams of Big Data are sent to cloud hosts to support decision making by deep learning software. In a smart city, some tasks may be assigned to smart devices of the Internet of Things for performing edge computing. Besides, a part of workload of calculations can be transferred to the cloud hosts. This paper proposes benchmarks for division tasks between an edge...

    Full text to download in external service

  • Kosmiczne zastosowania zaawansowanych technologii informatycznych

    e-Learning Courses
    • J. Proficz
    • A. Królicka-Gałązka

    Nowoczesne technologie wykorzystania systemów dużej mocy obliczeniowej: superkomputerów o architekturze klastrowej na przykładzie środowisk związanych z masowym przetwarzaniem danych (Big Data), obliczeniami w chmurze (Cloud Computing) oraz klasycznym podejściem wymiany wiadomości (MPI: Message Passing Interface) dla przetwarzania wsadowego.

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Full text to download in external service

  • Distributed Architectures for Intensive Urban Computing: A Case Study on Smart Lighting for Sustainable Cities

    Publication

    - IEEE Access - Year 2019

    New information and communication technologies have contributed to the development of the smart city concept. On a physical level, this paradigm is characterised by deploying a substantial number of different devices that can sense their surroundings and generate a large amount of data. The most typical case is image and video acquisition sensors. Recently, these types of sensors are found in abundance in urban spaces and are responsible...

    Full text available to download

  • IEEE International Conference on Cloud Computing Technology and Science (International Conference on Cloud Computing pre 2010)

    Conferences

  • Big Data and the Internet of Things in Edge Computing for Smart City

    Publication

    - Year 2019

    Requests expressing collective human expectations and outcomes from city service tasks can be partially satisfied by processing Big Data provided to a city cloud via the Internet of Things. To improve the efficiency of the city clouds an edge computing has been introduced regarding Big Data mining. This intelligent and efficient distributed system can be developed for citizens that are supposed to be informed and educated by the...

    Full text to download in external service

  • A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks

    Publication

    - Year 2018

    In wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme...

    Full text available to download