The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The fourth industrial revolution is driven by the integration and analysis of a vast amount of diverse data. Thereby, data about production steps, overall manufacturing processes, and also supporting processes is gathered to enable holistic analysis approaches. These approaches promise to provide new insights and knowledge by revealing cost saving possibilities and also automated adjustments of production...
Network virtualization provides a flexible solution to reduce costs, share network resources and improve recovery time upon failure. An important part of virtual network management consists in migrating them in order to optimize resource allocation and react to link failures. However, the migration process might entail the loss of security properties in the virtual network, such as confidentiality...
Cloud providers have an incomplete view of their hosted virtual infrastructures managed by a Cloud Management System (CMS) and a Software Defined Network (SDN) controller. For various security reasons (e.g. isolation verification, modeling attack paths in the network), it is necessary to know which virtual machines can interact via network protocols. This requires building a connectivity graph between...
Recent advances in cloud systems, on-demand circuits and software-defined networking have created new opportunities to enable complex, data-intensive scientific applications to run on dynamic networked cloud infrastructures. In this work, we present an end-to-end framework for autonomic adaptation for scientific workflows on networked cloud systems, which leverages novel network provisioning technologies...
Nowadays cloud computing services are being extensively used for server hosting, data storage, processing, computing, and scientific and research purposes. So data centers are the substrate of any type of services in cloud computing infrastructure. Virtualization technology provides the infrastructure of various virtual elements on similar substrate/physical infrastructure. Network virtualization...
Full mesh is the most commonly used networking topology in Web Real-Time Communication (WebRTC) based videoconferencing (VC) applications, however, due to its inherently poor scaling capability it is not appropriate for multi-party VC with many participants. Solutions based on centralized media server infrastructures are used to leverage the scaling problem. Service providers adopting centralized...
Virtualization paradigms like cloud computing, software defined networking (SDN), and network functions virtualization (NFV) provide advantages with respect to aspects like flexibility, costs, and scalability. However, management and orchestration of the resulting networks also introduce new challenges. The placement of services, such as virtual machines (VMs), virtualized network functions (VNFs),...
Microservices have become a popular pattern for deploying scale-out application logic and are used at companies like Netflix, IBM, and Google. An advantage of using microservices is their loose coupling, which leads to agile and rapid evolution, and continuous re-deployment. However, developers are tasked with managing this evolution and largely do so manually by continuously collecting and evaluating...
The cloud-driven traffic control and road service metric for searching the optimal route on the road infrastructure between two coordinates, which are identified with the point of departure and arrival, is considered. Possible restrictions are related to road collisions, accidents and road repairs, which is taken into account when choosing the best route. The method is implemented in the online cloud...
Nowadays, more and more Cloud providers are appearing on the market. In this context, a typical issue is represented by the management of distributed services deployed on different federated Cloud providers. Assuming that a distributed service consists of several microservices, in this paper, we specifically focus on the setup of virtual environments and on deployment tasks required in each Federated...
Migration of existing enterprise applications to the Cloud requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating the application with functional and non-functional aspects. However, none of them has focused so far on the adaptation of security and privacy. In our previous work, Identity-as-a-service (IDaaS) decouples Authentication and...
Disasters, both natural and man-made, can occur at any time or place in the world; aid is then required to support the victims of the disaster and to provide humanitarian support within the disaster zone. The first 24-48 hours after a disaster are a critical time for first responders in administering aid to the victims. This is known as the golden 24 hours [1] where 85% to 95% of live rescues are...
Nowadays, Edge computing allows to push the application intelligence at the boundaries of a network in order to get high-performance processing closer to both data sources and end-users. In this scenario, the Horizon 2020 BEACON project - enabling federated Cloud-networking - can be used to setup Fog computing environments were applications can be deployed in order to instantiate Edge computing applications...
The core idea of metamodel-based model construction is well established. However, there are different metamodeling approaches relying on various modeling structures and instantiation procedures. Although, in general, these approaches offer similar features, they are sometimes incompatible with each other. Therefore, a precise abstract definition of instantiation is needed. The paper describes an abstract...
Web software systems generally reside in highly volatile environments, their incoming traffic may be subject to sharp fluctuations from reasons that cannot always be captured or predicted. Cloud computing provides a solution to this problem by offering flexible resources, like containers, which can be quickly and easily scaled according to the current workload needs. Automating this process is a key...
Software-defined networking (SDN) has separated control and forwarding planes, which is a powerful approach to enable network virtualization by SDN hypervisors to share physical SDN networks among multiple virtual SDN in cloud data center. However, the centralized control and virtual network shared physical network are delicately weak and easy to failure if virtual topology embedding is not properly...
Because of the popularity of cloud computing, Cloud Service Providers (CSPs) can rent virtual machines (VMs) from Cloud Providers (CPs) conveniently. In our previous work, we proposed an autonomic and elastic resource scheduling framework, named AERS, which made full use of both proactive and reactive controllers in the field of dynamic resource provision and was integrated with an availability-aware...
Detecting runtime anomalies is very important to monitoring and maintenance of distributed services. People often use execution logs for troubleshooting and problem diagnosis manually, which is time consuming and error-prone. In this paper, we propose an approach for automatic anomaly detection based on logs. We first mine a hybrid graph model that captures normal execution flows inter and intra services,...
The recent deployment of novel network concepts, such as M2M communication or IoT, has undoubtedly stimulated the placement of a new set of services, leveraging both centralized resources in Cloud Data Centers and distributed resources shared by devices at the edge of the network. Moreover, Fog Computing has been recently proposed having as one of its main assets the reduction of service response...
We propose an architecture that increases the resiliency against DDoS attacks by leveraging virtual network functions (VNF) and software defined networking (SDN). In the first step, the proposed architecture places the virtual network functions (VNF) optimally by solving a linear program. In the second step, in order to add preemptive protection against DDoS attacks, special filter VNFs and secondary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.