The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud data centers are critical infrastructures to deliver cloud services. Although security and performance of cloud data centers have been well studied in the past, their networking aspects are overlooked. Current network infrastructures in cloud data centers limit the ability of cloud provider to offer guaranteed cloud network resources to users. In order to ensure security and performance requirements...
Cloud computing is the hottest buzzword today having enormous benefits, but there remains a number of critical problems (Security, Privacy, Interoperability, Costing, etc.) preventing their wider adoption. For each job/application, Cloud resource provisioning is a cumbersome task as a number of objectives needs to be satisfied with certain constraints. This work proposes security prioritized resource...
Cloud computing is the use of computing assets or resources (hardware and software) that are consigned as a service over the internet. If cloud computing environment is deployed in a data centre than users can store their data in the cloud centers (i.e. Cloud storage) using storage as a service. When data centre provides storage as a service, the capacity of data centre is biggest challenge. The management...
As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing...
PaaS vendors face challenges in efficiently providing services with the growth of their offerings. In this paper, we explore how PaaS vendors are using containers as a means of hosting Apps. The paper starts with a discussion of PaaS Use case and the current adoption of Container based PaaS architectures with the existing vendors. We explore various container implementations - Linux Containers, Docker,...
Modern virtualization technologies provides an optimal use of underused hardware resources by sharing them among virtual machines hosted on the same physical machine. These technologies hence have been broadly adopted in many areas, such as server consolidation, virtualized network test beds, etc. A large-scale network test bed is considered one of the useful tools for evaluating or verifying advanced...
As Digital Campus applications gaining momentum, the complexity of IT infrastructure on campus network, resource utilization efficiency, security control and data backup impose increased difficulties. In this paper, an analysis is conducted on applications of virtualization technology including virtual server, virtual storage, and network virtualization technology for IT infrastructure to cast down...
Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data storage and maintenance, it also eliminates their physical control of storage dependability...
Server consolidation through virtualization is becoming an effective way to save power and space in enterprise data centers. However, it also brings additional operational risks for the consolidated system because the impacts of hardware failures, human errors, and security breaches can be vastly magnified in that densely packed environment. In order to mitigate the above issues, this paper proposes...
Problems of overall safety management, appropriate load balance, and the need for easy-to-use emerge in an environment containing multiple trusted virtualized platforms. We proposed the generalized trusted virtualized platform architecture, GTVP, which combines multiple physical platforms as a trusted union. GTVP first establishes trust relationship among all platforms, and then synchronizes their...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.