The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, with the development of cloud computing technology, the size of a data center is expanding rapidly. To minimize the energy consumption of a data center, we propose an energy-efficient virtual resource dynamic integration (VRDI) method. In the proposed VRDI method, first, by monitoring the load patterns of the physical machines (PMs) and the corresponding thresholds of PMs calculated...
Transoceanic video telephony (TVT) over the Internet is challenging due to 1) longer round-trip delay, 2) larger number of relay hops, and 3) higher packet loss rate. Real-world measurements of Skype, Face time, and QQ confirm that their TVT service quality is mostly unsatisfactory. Recently, when using We Chat to make transoceanic video calls, we are fortunate to find that it achieves stably smooth...
Cloud storage is one of the most popular services in cloud computing environment. A crucial problem to be addressed in the cloud storage concerns the security mechanism of protecting the private data and sharing data with other users. In this paper, we present a hypergraphs key management scheme to protect the safety of owner's data and enforce the data access control. Our scheme is suitable for personal...
As a product of the development of the Internet, security issues of cloud computing has attracted much attention whether it is from the cloud providers' point of view or from the perspective of cloud users. From the view of information security, risk assessment model is established in this paper using game theory, which involves the damage and the restore of the cloud system. Using the framework,...
With the development of cloud computing, cloud security issues have become increasingly prominent. As an important part of cloud computing network security, intrusion detection system has attracted people's attention. How to make the system's response decision has become the focus of the research. For the characteristics of cloud computing attackdefence behaviour, a security intrusion detection of...
To ensure security, cloud service providers employ security groups as a key tool for cloud tenants to protect their virtual machines from unwanted traffic. However, security groups can be complex and often hard to configure, which may result in security vulnerabilities that impact the entire cloud platform. To assist tenants in designing better security groups, in this paper, we propose and develop...
If cloud computing (CC) is to achieve its potential, there needs to be a clear understanding of the various issues involved, both from the perspectives of the providers and the consumers of the technology. There is an equally urgent need for understanding the business-related issues surrounding CC. We interviewed several industry executives who are either involved as developers or are evaluating CC...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.