|
[1]Apache Ranger https://Ranger.apache.org/ [2]Apache Sentry https://sentry.apache.org/ [3]Apache Spark https://www.tutorialspoint.com/apache_spark/apache_spark_introduction.htm [4]LDAP https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol [5]OpenLDAP https://www.openldap.org/ [6]Docker https://www.docker.com/ [7]Kubernetes https://Kubernetes.io/docs/concepts/overview/components/ [8]Kubernetes https://www.digitalocean.com/community/tutorials/an-introduction-to-Kubernetes [9]Apache YARN https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YARN.html [10]Apache Submarine https://medium.com/analytics-vidhya/implementing-apache-Submarine-a-unified-ai-platform-459c9edd541e [11]K. K. Butt, G. H. Li and M. Obaid Ur Rehman, "Comparative Analysis of Hadoop Security Ad-Ons," 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), New York, NY, USA, 2019, pp. 289-293, doi: 10.1109/CSE/EUC.2019.00062. [12]A. Sun, G. Gao, T. Ji and X. Tu, "One Quantifiable Security Evaluation Model for Cloud Computing Platform," 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD), Lanzhou, 2018, pp. 197-201, doi: 10.1109/CBD.2018.00043. [13]M. Ryden, K. Oh, A. Chandra and J. Weissman, "Nebula: Distributed edge cloud for data-intensive computing," 2014 International Conference on Collaboration Technologies and Systems (CTS), Minneapolis, MN, 2014, pp. 491-492, doi: 10.1109/CTS.2014.6867613. [14]Y. Zhang et al., "A Communication-Aware Container Re-Distribution Approach for High Performance VNFs," 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, 2017, pp. 1555-1564, doi: 10.1109/ICDCS.2017.10. [15]K. Ye and Y. Ji, "Performance Tuning and Modeling for Big Data Applications in Docker Containers," 2017 International Conference on Networking, Architecture, and Storage (NAS), Shenzhen, 2017, pp. 1-6, doi: 10.1109/NAS.2017.8026871. [16]P. Xu, S. Shi and X. Chu, "Performance Evaluation of Deep Learning Tools in Docker Containers," 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM), Chengdu, 2017, pp. 395-403, doi: 10.1109/BIGCOM.2017.32. [17]S. Nadgowda, S. Suneja, N. Bila and C. Isci, "Voyager: Complete Container State Migration," 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, 2017, pp. 2137-2142, doi: 10.1109/ICDCS.2017.91. [18]C. Cérin, T. Menouer, W. Saad and W. B. Abdallah, "A New Docker Swarm Scheduling Strategy," 2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2), Kanazawa, 2017, pp. 112-117, doi: 10.1109/SC2.2017.24. [19]C. Chang, S. Yang, E. Yeh, P. Lin and J. Jeng, "A Kubernetes-Based Monitoring Platform for Dynamic Cloud Resource Provisioning," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, 2017, pp. 1-6, doi: 10.1109/GLOCOM.2017.8254046. [20]N. M. Faseeh Qureshi et al., "Dynamic Container-based Resource Management Framework of Spark Ecosystem," 2019 21st International Conference on Advanced Communication Technology (ICACT), PyeongChang Kwangwoon_Do, Korea (South), 2019, pp. 522-526, doi: 10.23919/ICACT.2019.8701970. [21]Y. Tao, X. Wang, X. Xu and Y. Chen, "Dynamic Resource Allocation Algorithm for Container-Based Service Computing," 2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS), Bangkok, 2017, pp. 61-67, doi: 10.1109/ISADS.2017.20. [22]J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun and Y. Xiang, "Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing," in IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 6, pp. 996-1010, 1 Nov.-Dec. 2019, doi: 10.1109/TDSC.2017.2725953.
[23]M. Bousselham, N. Benamar and A. Addaim, "A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System," 2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), Fez, Morocco, 2019, pp. 1-4, doi: 10.1109/WITS.2019.8723723.
[24]D. Zhao, M. Mohamed and H. Ludwig, "Locality-Aware Scheduling for Containers in Cloud Computing," in IEEE Transactions on Cloud Computing, vol. 8, no. 2, pp. 635-646, 1 April-June 2020, doi: 10.1109/TCC.2018.2794344. [25]E. H. Bourhim, H. Elbiaze and M. Dieye, "Inter-container Communication Aware Container Placement in Fog Computing," 2019 15th International Conference on Network and Service Management (CNSM), Halifax, NS, Canada, 2019, pp. 1-6, doi: 10.23919/CNSM46954.2019.9012671. [26]P. Shantharama et al., "Hardware Acceleration for Container Migration on Resource-Constrained Platforms," in IEEE Access, vol. 8, pp. 175070-175085, 2020, doi: 10.1109/ACCESS.2020.3024675. [27]X. Li, Q. Wang, X. Lan, X. Chen, N. Zhang and D. Chen, "Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach," in IEEE Access, vol. 7, pp. 9368-9383, 2019, doi: 10.1109/ACCESS.2018.2890432. [28]T. Halabi and M. Bellaiche, "Towards Security-Based Formation of Cloud Federations: A Game Theoretical Approach," in IEEE Transactions on Cloud Computing, vol. 8, no. 3, pp. 928-942, 1 July-Sept. 2020, doi: 10.1109/TCC.2018.2820715. [29]Y. Wu, Y. Lyu and Y. Shi, "Cloud storage security assessment through equilibrium analysis," in Tsinghua Science and Technology, vol. 24, no. 6, pp. 738-749, Dec. 2019, doi: 10.26599/TST.2018.9010127. [30]T. Dbouk, A. Mourad, H. Otrok, H. Tout and C. Talhi, "A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading," in IEEE Transactions on Network and Service Management, vol. 16, no. 4, pp. 1665-1680, Dec. 2019, doi: 10.1109/TNSM.2019.2939221. [31]J. Chase, D. Niyato, P. Wang, S. Chaisiri and R. K. L. Ko, "A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing," in IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 4, pp. 565-579, 1 July-Aug. 2019, doi: 10.1109/TDSC.2017.2703626.
|