The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Continuous evolution of virtualization-related technologies have benefit greatly flexibility and reliability of software system. However, although virtualization removes binding between application and server underneath, it complicates the regular runtime hierarchy into an intricate structure, where cross-layer monitoring and holistic evaluation becomes challenging. Currently lots of monitoring practices...
The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate...
To secure IaaS cloud environments, multiple layers of security mechanisms must be deployed and monitored. When a threat is detected, it must be appropriately acted upon. A common problem with monitoring such approaches is the sheer volume of alarms generated. Some alerts may be false positives, others are informational. It is challenging for cloud providers to quickly interpret which events to act...
Cloud computing has recently attracted a substantial amount of attention from both industry and academia. Its growing demand gives normal users an opportunity to sell their local resources to the cloud market, which introduces new challenges for the existing coarse-grained pricing models. In this paper, we examine the potential of applying continuous double auction framework to handle these heterogeneous...
we present FPT, a scheduling framework for periodic tasks that uses the temporal characteristic of periodic tasks to alleviate the overhead of geo-distributed data centers. In FPT, clients are able to express the periodicity about their tasks, and this characteristic is used to realize one-time scheduling for multiple executions. For a set of periodic tasks, aiming to find the minimum number of VMs...
The emergence of cloud computing as an efficient means of providing computing as a form of utility can already be felt with the burgeoning of cloud service companies. Notable examples including Amazon EC2, Rackspace, Google App and Microsoft Azure have already attracted an increasing number of users over the Internet. However, due to the dynamic behaviors of some users, the traditional cloud pricing...
This paper made a short review of Cloud Computing and Big Data, and discussed the portability of general data mining algorithms to Cloud Computing platform. It revealed the Cloud Computing platform based on Map-Reduce cannot solve all the Big Data and data mining problems. Transplanting the general data mining algorithms to the real-time Cloud Computing platform will be one of the research focuses...
Food recognition is not only a challenging task but also important for patients and travelers. In order to provide a good recognition capability, we propose a cloud based object recognition platform for IOS platform, in which an improved 2DPCA algorithm is used for object recognition. A Hadoop based cloud server is built for this platform. To show the effectiveness of this platform, a series of tests...
Shared resources are an essential part of cloud computing. Virtualization and multi-tenancy provide a number of advantages for increasing resource utilization and for providing on demand elasticity. However, these cloud features also raise many security concerns related to cloud computing resources. In this paper, we propose an architecture and approach for leveraging the virtualization technology...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.