Accesso libero

An ANN-based scalable hashing algorithm for computational clouds with schedulers

International Journal of Applied Mathematics and Computer Science's Cover Image
International Journal of Applied Mathematics and Computer Science
Advanced Machine Learning Techniques in Data Analysis (special section, pp. 549-611), Maciej Kusy, Rafał Scherer, and Adam Krzyżak (Eds.)
INFORMAZIONI SU QUESTO ARTICOLO

Cita

Abdoun, N., El Assad, S., Taha, M.A., Assaf, R., Deforges, O. and Khalil, M. (2016). Secure hash algorithm based on efficient chaotic neural network, 2016 International Conference on Communications (COMM), Bucharest, Romania, pp. 405–410. Search in Google Scholar

Aggarwal, K. and Verma, H.K. (2015). Hash RC6—variable length hash algorithm using RC6, 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, India, pp. 450–456. Search in Google Scholar

Al-Hamdani, W.A. (2011). Elliptic curve for data protection, Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD’11, New York, USA, pp. 1–14. Search in Google Scholar

Amazon (2019). Amazon EC2 instance types, Amazon Web Services, https://aws.amazon.com/ec2/instance-types/. Search in Google Scholar

Atkinson, K.E. (1978). An Introduction to Numerical Analysis, 2nd Edn, Wiley, Hoboken. Search in Google Scholar

Barbierato, E., Gribaudo, M., Iacono, M. and Jakóbik, A. (2019). Exploiting CloudSim in a multiformalism modeling approach for cloud based systems, Simulation Modelling Practice and Theory 93: 133–147.10.1016/j.simpat.2018.09.018 Search in Google Scholar

Bellare, M. and Kohno, T. (2004). Hash function balance and its impact on birthday attacks, in C. Cachin and J.L. Camenisch (Eds), Advances in Cryptology, EUROCRYPT 2004, Springer, Berlin, pp. 401–418.10.1007/978-3-540-24676-3_24 Search in Google Scholar

Bowen, P., Hash, J. and Wilson, M. (2006). Information Security Handbook: A Guide for Managers, NIST Special Publication 800-100, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf. Search in Google Scholar

Butcher, J.C. (2008). Numerical Methods for Ordinary Differential Equations, 2nd Edn, Wiley, Hoboken10.1002/9780470753767 Search in Google Scholar

Chugunkov, I.V., Ivanov, M.A. and Kliuchnikova, B.V. (2019). Hash functions are based on three-dimensional stochastic transformations, 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Saint Petersburg/Moscow, Russia, pp. 202–205. Search in Google Scholar

Cococcioni, M. (2021). Mackey–Glass time series generator, MathWorks, https://www.mathworks.com/matlabcentral/fileexchange/24390-mackey-glass-time-series-generator. Search in Google Scholar

CSA (2011). Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Cloud Security Alliance, Bellingham, https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/csaguide.v3.0.pdf. Search in Google Scholar

Du, Y., He, G. and Yu, D. (2016). Efficient hashing technique based on bloom filter for high-speed network, 8th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Hangzhou, China, Vol. 01, pp. 58–63. Search in Google Scholar

Dworkin, M.J. (2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf. Search in Google Scholar

ENISA (2009). Cloud Computing: Benefits, Risks and Recommendations for Information Security, European Network and Information Security Agency, Athens, https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security. Search in Google Scholar

Fernandez-Cerero, D., Jakóbik, A., Grzonka, D., Kołodziej, J. and Fernandez-Montes, A. (2018). Security supportive energy-aware scheduling and energy policies for cloud environments, Journal of Parallel and Distributed Computing 119: 191–202.10.1016/j.jpdc.2018.04.015 Search in Google Scholar

Fernandez-Cerero, D., Fernandez-Montes, A., Jakóbik, A., Kołodziej, J. and Toro, M. (2018). SCORE: Simulator for cloud optimization of resources and energy consumption, Simulation Modelling Practice and Theory 82: 160–173.10.1016/j.simpat.2018.01.004 Search in Google Scholar

Gholipour, A., Araabi, B.N. and Lucas, C. (2006). Predicting chaotic time series using neural and neurofuzzy models: A comparative study, Neural Processing Letters 24(3): 217–239.10.1007/s11063-006-9021-x Search in Google Scholar

Gong, Z. (2016). Survey on lightweight hash functions, Journal of Cryptologic Research 3(1): 1–11. Search in Google Scholar

Google (2016). Encryption at rest in Google Cloud, Google Cloud Documentation, https://cloud.google.com/security/encryption/default-encryption. Search in Google Scholar

Grzonka, D. (2018). Intelligent Agent-based Monitoring Systems of Task Scheduling for Distributed High-Performance Environments, PhD thesis, Polish Academy of Sciences, Warsaw. Search in Google Scholar

Grzonka, D., Jakóbik, A., Kołodziej, J. and Pllana, S. (2018). Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security, Future Generation Computer Systems 86: 1106–1117.10.1016/j.future.2017.05.046 Search in Google Scholar

Haykin, S. (1998). Neural Networks: A Comprehensive Foundation, 2nd Edn, Prentice Hall, Upper Saddle River. Search in Google Scholar

Huang, W. and Wang, L. (2019). A hash function based on sponge structure with chaotic map for spinal codes, 2019 International Conference on Computer, Information and Telecommunication Systems (CITS), Beijing, China, pp. 1–5. Search in Google Scholar

ISO/IEC (2005). Information Technology—Security Techniques—Code of Practice for Information Security Management, ISO/IEC 27002:2005, International Organization for Standardization/International Electrotechnical Commission, Geneva, https://www.iso.org/standard/50297.html. Search in Google Scholar

ISO/IEC (2015). Information Technology—Security Techniques—Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services, ISO/IEC 27017:2015, International Organization for Standardization/International Electrotechnical Commission, Geneva, https://www.iso.org/standard/43757.html. Search in Google Scholar

Jakóbik, A. (2016). Big data security, in F. Pop et al. (Eds), Resource Management for Big Data Platforms: Algorithms, Modelling, and High-Performance Computing Techniques, Springer, Cham, pp. 241–261, DOI: 10.1007/978-3-319-44881-7_12.10.1007/978-3-319-44881-7_12 Search in Google Scholar

Jakóbik, A., Grzonka, D. and Kołodziej, J. (2017a). Security supportive energy aware scheduling and scaling for cloud environments, European Conference on Modelling and Simulation, ECMS 2017, Budapest, Hungary, pp. 583–590. Search in Google Scholar

Jakóbik, A., Grzonka, D. and Palmieri, F. (2017b). Non-deterministic security driven meta scheduler for distributed cloud organizations, Simulation Modelling Practice and Theory 76: 67–81.10.1016/j.simpat.2016.10.011 Search in Google Scholar

Jakóbik, A., Grzonka, D., Kołodziej, J. and González-Vélez, H. (2016). Towards secure non-deterministic meta-scheduling for clouds, 30th European Conference on Modelling and Simulation, ECMS 2016, Regensburg, Germany, pp. 596–602, DOI: 10.7148/2016-0596.10.7148/2016-0596 Search in Google Scholar

Jakóbik, A. and Wilczynski, A. (2017). Using polymatrix extensive Stackelberg games in security-aware resource allocation and task scheduling in computational clouds, Journal of Telecommunications and Information Technology 1: 71–80. Search in Google Scholar

Jankowski, N. and Linowiecki, R. (2019). A fast neural network learning algorithm with approximate singular value decomposition, International Journal of Applied Mathematics and Computer Science 29(3): 581–594, DOI: 10.2478/amcs-2019-0043.10.2478/amcs-2019-0043 Search in Google Scholar

Kaur, N., Saini, H.S. and Singh, R. (2009). Design and analysis of secure scheduler for MLS distributed database systems, 2009 IEEE International Advance Computing Conference, Patiala, India, pp. 1400–1404. Search in Google Scholar

Kidon, M. and Dobai, R. (2017). Evolutionary design of hash functions for IP address hashing using genetic programming, IEEE Congress on Evolutionary Computation (CEC), Donostia, Spain, pp. 1720–1727. Search in Google Scholar

Kołodziej, J. (2012). Evolutionary Hierarchical Multi-Criteria Metaheuristics for Scheduling in Large-Scale Grid Systems, Springer, Berlin.10.1007/978-3-642-28971-2 Search in Google Scholar

Yee, L.P. and De Silva, L.C. (2002). Application of multilayer perceptron network as a one-way hash function, International Joint Conference on Neural Networks. IJCNN’02, Honolulu, USA, Vol. 2, pp. 1459–1462. Search in Google Scholar

Mahjoob, M.J., Abdollahzade, M., Zarringhalam, R. and Kalhor, A. (2008). Chaotic time series forecasting using locally quadratic fuzzy neural models, 9th WSEAS International Conference on Fuzzy Systems, Sofia, Bulgaria, pp. 26–32. Search in Google Scholar

Menezes, A.J., Vanstone, S.A. and Oorschot, P.C.V. (1996). Handbook of Applied Cryptography, CRC Press, Boca Raton. Search in Google Scholar

Merkle, R.C. (1979). Secrecy, Authentication, and Public Key Systems, Stanford University, Stanford, pp. 11–16. Search in Google Scholar

Mohan, S., Yoon, M.K., Pellizzoni, R. and Bobba, R. (2014). Real-time systems security through scheduler constraints, 26th Euromicro Conference on Real-Time Systems, Madrid, Spain, pp. 129–140. Search in Google Scholar

NIST (2015). Secure Hash Standard (SHS), FIPS PUB 180-4, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf. Search in Google Scholar

NIST (2019). Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process, NISTIR 8268, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8268.pdf. Search in Google Scholar

Podolskiy, V., Jindal, A. and Gerndt, M. (2019). Multilayered autoscaling performance evaluation: Can virtual machines and containers co-scale?, International Journal of Applied Mathematics and Computer Science 29(2): 227–244, DOI: 10.2478/amcs-2019-0017.10.2478/amcs-2019-0017 Search in Google Scholar

Rajeshwaran, K. and Anil Kumar, K. (2019). Cellular automata based hashing algorithm (CABHA) for strong cryptographic hash function, 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, pp. 1–6. Search in Google Scholar

Saleh, M. and Dong, L. (2013). Real-time scheduling with security enhancement for packet switched networks, IEEE Transactions on Network and Service Management 10(3): 271–285.10.1109/TNSM.2013.071813.120299 Search in Google Scholar

Schneier, B. (1995). Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley, New York. Search in Google Scholar

Singh, M. and Garg, D. (2009). Choosing best hashing-strategies and hash functions, 2009 IEEE International Advance Computing Conference, Patiala, India, pp. 50–55. Search in Google Scholar

Tadokoro, H., Kourai, K. and Chiba, S. (2010). A secure system-wide process scheduler across virtual machines, 2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing, Tokyo, Japan, pp. 27–36. Search in Google Scholar

Tchórzewski, J. and Jakóbik, A. (2019). Theoretical and experimental analysis of cryptographic hash functions, Journal of Telecommunications and Information Technology 1: 125–133.10.26636/jtit.2019.128018 Search in Google Scholar

Tchórzewski, J., Jakóbik, A. and Grzonka, D. (2019). Towards ANN-based scalable hashing algorithm for secure task processing in computational clouds, 33rd International ECMS Conference on Modelling and Simulation, Caserta, Italy, pp. 421–427. Search in Google Scholar

Turcanik, M. (2017a). Hash function generation based on neural networks and chaotic maps, Communication and Information Technologies (KIT), Vysoke Tatry, Slovakia, pp. 1–5.10.23919/KIT.2017.8109467 Search in Google Scholar

Turcanik, M. (2017b). Using recurrent neural network for hash function generation, International Conference on Applied Electronics (AE), Pilsen, Chech Republic, pp. 1–4.10.23919/AE.2017.8053625 Search in Google Scholar

Wang, M. and Li, Y. (2015). Hash function with variable output length, International Conference on Network and Information Systems for Computers, Wuhan, China, pp. 190–193. Search in Google Scholar

Yang, Q., Gao, T., Fan, L. and Gu, Q. (2009). Analysis of one-way alterable length hash function based on cell neural network, 5th International Conference on Information Assurance and Security, Xi’an, China, Vol. 1, pp. 391–395. Search in Google Scholar

eISSN:
2083-8492
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Mathematics, Applied Mathematics