The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The current CPE deployment model, which is based on deploying “intelligent” independent equipment in the customer premises, has important challenges that have been limiting the profitability of services for telecommunications service providers. Cloud CPE model provides a win for cost and service performance for the future, as it reduces onsite CPE complex requirements to a minimum and moves these...
A new era of automated services has permeated user's daily lives thanks to paradigms such as Smart City and the Internet of Things. This shift from traditional applications is possible due to the massive amount of heterogeneous devices that constitute the Internet of Things. To provide newly improved characteristics to these services, such as mobility support, high resilience, and low latency, an...
Hybrid Clouds couple the scalability of public Clouds with the greater control supplied by private ones. Hybrid Cloud Brokers support customers in selecting the most suitable providers' offers, optionally adding the provisioning of dedicated services with higher Quality of Service (QoS) levels. A clear evaluation of the benefits on performance and energy savings brought about by any allocation strategy...
In the process of big data analysis and processing, a key concern blocking users from storing and processing their data in the cloud is their misgivings about the security and performance of cloud services. There is an urgent need to develop an approach that can help each cloud service provider (CSP) to demonstrate that their infrastructure and service behavior can meet the users' expectations. However,...
Nowadays, Cloud providers revise the terms of their Service Level Agreements (SLAs) to include security provisions due to their criticality for their customers. In order to speed up their adoption by service providers and consumers and to make them more actionable, security SLAs monitoring should be described in a machine-processable, agile and extensible way. Several tools for SLA management are...
Abstract-Internet of Things (IoT) is emerging as part ofthe infrastructures for advancing a large variety of applicationsinvolving connection of many intelligent devices, leadingto smart communities. Due to the severe limitation on thecomputing resources of IoT devices, it is common to offloadtasks of various applications requiring substantial computingresources to computing systems with sufficient...
Industrie 4.0 introduces a concept of digitalized production by allowing agile and flexible integration of new business models while maintaining manufacturing costs and efficiency at the reasonable level. In addition, cloud computing is one of the IT trends that is used nowadays to offer services on demand from a virtual environment in enterprise and office areas. The use of cloud computing in an...
The efforts and findings of the last decades of research on the formalization and the verification of Web services have given a certain level of assurance on Web services. However new challenges such as high availability and security issues are not fully addressed. In fact, Web services are exposed to attacks that appear continuously. These issues have naturally paved the way to a new research topic...
As the multitude and complexity of the cloud market increases, the evaluation and selection of cloud services becomes a burdensome task for the users. With the extraordinary rise of available services from various Cloud Service Providers (CSPs), the role of cloud brokers has become more and more important. This paper proposes an optimal cloud broker model to address the challenge of optimally allocating...
Quality of Service (QoS) is an important enabler for communication in industrial environments. The Arrowhead Framework was created to support local cloud functionalities for automation applications by means of a Service Oriented Architecture. To this aim, the framework offers a number of services that ease application development, among them the QoSSetup and the Monitor services, the first used to...
The purpose of this research is to empirically examine the effect of third party auditor and quality service to cloud storage and user trust. This research is causal quantitative and use partial least square and path analysis. The research object is corporation users of cloud computing storage in listed corporation in Indonesia Stock Exchange. The sample size is 368 corporations and the results of...
The utilization of cloud computing resources contributes to a fast growth of e-business and e-government where businesses and government agencies often require processing a large volume of service requests in a constrained period of time. In order to achieve on-time completion of a large volume of time-constrained parallel processes, this paper proposes a novel dynamic checkpoint selection strategy...
‘Utility computing’ was the concept introduced by John McCarthy in 1961 in a speech given at MIT. He proposed that sharing the computing power on a time-sharing basis will help grow business of ‘providing computing power as an utility’ and this was the inception of the cloud computing. Cloud computing can deliver the best to the end users either through the private, public or hybrid cloud infrastructures...
Cloud computing enable users to avail the various services as per their wish. However, the quality about the service and its trust detail is not transparent to the user. In this paper, we propose a fuzzy logic based trust evaluation system that accepts the user's feedback in terms of fuzzy linguistic terms. The appropriate weight for the given feedback is calculated with the fuzzy inference system...
Although cloud storage service (CSS) is convenient to access data, the cost, security, and performance are the issues to users who consider to adopt CSS. For example, CSS could be unavailable due to technical issues or natural disaster. In order to avoid single point of failure, many users duplicate data into multiple CSS providers (CSPs). However, this will increase cost; decrease security; and is...
Cloud computing become a new technology in enterprises and markets. It allows us to access applications anywhere at any time. Companies rent the resources from cloud to reduce the cost. Further they can access the application based on pay as you go manner. The important issue in resource allocation is optimization of resources being allocated. The objective of resource allocation is to scale down...
This paper proposes a proactive optimal resource allocation scheme for elastic security Virtualized Network Functions (VNFs) in the Service Function Chaining on the Software Defined Network Function Virtualization (SDNFV-enabled) cloud environment. We firstly analyze our system model, and transform them into M/M/1/∞ and M/M/k queueing model. Then we define mathematical requirements by analyzing the...
Cloud environment consists of many components playing different roles which need to interact with each other. Based on the context the nature of interaction may vary. Trust is an essential facet for confidence-based interactions among the various entities in cloud environment. This paper presents the taxonomy of trust models and classification of information sources for trust assessment in cloud paradigm...
Current PaaS platforms enable single or hybrid cloud deployments. However, such deployment types cannot best cover the user application requirements as they do not consider the great variety of services offered by different cloud providers and the effects of vendor lock-in. On the other hand, multi-cloud deployment enables selecting the best possible service among equivalent ones providing the best...
This paper introduces a new trust management system (TMS) for the cloud computing domain. The wide majority of these systems do not fulfill the requirements of today's cloud environments which are characterized by heterogeneity in providers, capabilities and users. As such, they are limited to few aspects of trust. In fact, they are bound to a single function or a direct interaction with the cloud...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.