The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network virtualization provides a flexible solution to reduce costs, share network resources and improve recovery time upon failure. An important part of virtual network management consists in migrating them in order to optimize resource allocation and react to link failures. However, the migration process might entail the loss of security properties in the virtual network, such as confidentiality...
As cloud services become mature and provide capabilities for elastic computation and data management, hosting services become increasingly prevalent such as Amazon Web Services, Microsoft Azure, or RedHat OpenStack. Workloads are hosted in these platforms using hypervisors running on physical machines which host virtual machines (VMs) presented to the customer. Software-defined network (SDN) technologies...
Cloud Computing is the current trend and will be future era because of its advantages like pay per usage and on demand services. Load Balancing is a key aspect of Cloud Computing. It is the distribution of network or applications traffic across a number of servers. As the volume of data is increasing day by day the organizations will migrate from traditional computer system to the cloud based system...
Optimizing security dynamic scheduling method in cloud storage is significant for improving resource date throughput and storage space of a cloud storage system. The paper presents a self-adaptive layered sleep vision-based method for security dynamic scheduling in cloud storage. A decision-making tree model is used for feature classification of cloud storage resources scheduling, top-down analytical...
Cloud computing is an emerging technology in today's world. The services provided by the cloud is like freeware. Resources in cloud will be in shared pool. If any resources wanted in dynamic basis they are requested to shared pool and particular resources will be provided to users. Resources are will be in form of clusters. From these group cluster or master nodes are selected using Advanced Ant colony...
The increasing number of data centers is consuming significant power with an upward surge. Hence, to preserve such huge energy and operating cost of data centers, the cloud service providers consolidate Virtual Machines (VM) to minimize the number of active physical machines. However, lack of reliable security measurements and policy enforcement during the consolidation process, have increased the...
This work presents positive experiment results on the efficiency and security potential of an optimized and novel approach to an Autonomous Management Distributed System (AMDS) running in a Cloud Computing environment. The results validate the AMDS software design and demonstrate its potential as an industrial application to be used in modern datacenters. On one hand, from an operational performance...
Scientific workflows (SWFs) play significant roles in scientific researches and engineering simulations, which are often data intensive and of complex data independency. The storage of the intermediate datasets has important impacts on the performance of SWF systems and, is very difficult to be determined. This paper analyzes the CTT-SP algorithm Yuan2011 that proposed for such problems to provide...
The past decade has witnessed immense developments in the field of network computing thanks to the rise of the cloud computing paradigm, which enables shared access to a wealth of computing and storage resources without needing to own them. While cloud computing facilitates on-demand deployment, mobility and collaboration of services, mechanisms for enforcing security and performance constraints when...
Cloud computing is developing rapidly and the open environment in cloud computing is much more complex and unpredictable than other applications, so just providing the identity certification cannot ensure the security of cloud user and cloud service provider, in order to find a effective way to ensure cloud security, we have to solve the problem of trustiness of cloud user's behavior first, in this...
Today our world is ready to make the maximum use of cloud computing facility as like other daily most common utilities such as electricity, gas and water. However, currently the cloud is showing its limited effect in case of utility service system. The main lacking in cloud is the absence of unified architecture for deploying service and use of application in an optimum way to make the maximum availability...
Security of multi-tenancy in cloud platforms raises a growing interest since research has revealed that the sharing of resources constitutes a vector of vulnerability. In this paper, we examine how one can leverage the sharing of resources, through the manipulation of the amount of resources consumed by VMs, to abusively enforce the dynamic resource management system to trigger VM migrations. This...
Nowadays there is a high demand for security assurance within Cloud Computing world. To meet this demand, security practitioners attempt to assess security vulnerabilities that any given cloud system may have, however this task present some challenges when exposed to a complex cloud system. Different security tools have been developed to facilitate the vulnerabilities discovery process. In this paper...
Vulnerability exploits will result in security breaches or violations of the system's security policy causing information leakage or economic losses. Although many detection methods such as static analysis, dynamic analysis and fuzz testing have been presented, the vulnerabilities are still difficult to detect. In this paper, we propose a new detection cloud service Vulcloud, which is scalable and...
Security becomes a prominent issue for mobile cloud computing since valuable information moves to the cloud. An important security problem is how the users identify themselves to the cloud. If an attacker is capable of faking or stealing user credentials, such as passwords and digital certificates, current security measures are not sufficient to safe-guard user’s valuable information in the cloud...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.