Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Existence of several application specific network technologies like Sensor Networks, Cloud, Personal Area Networks (WPANs), Vehicular Networks (VANETs), Content Delivery Networks and Wifi operating oblivious to each other in the same ISM band creates numerous problems like contention for the same bandwidth leading to excessive collisions and hence lower throughput. This calls for a hybrid mesh framework...
In this paper, we propose an SLA-based approach to private cloud reliability. We examine how to formulate reliability SLAs, identify key customer scenarios and use accelerated testing to validate them. We propose the creation of a public cloud SaaS to enable the above reliability validation via a distributed, scalable model. We then illustrate an application of the above approach during the development...
In cloud environments, trust is necessary because services have the characteristics of uncertainty, dynamic, false or fraudulent which usually make users difficult to obtain desired services. In this paper, we consider trust-oriented workflow scheduling with temporal constraints including service setup times and workflow deadlines. The considered problem is mathematically modeled. A behavior-based...
Despite the considerable benefits of cloud computing as an emerging technology, there are some reliability and privacy concerns such as generating and managing access policies according to sensitivity of stored data in cloud storages. The most challenging issue in current information policy models is managing security levels, mapping between access requests and defined policies and considering the...
Traditional cloud stacks are designed to tolerate server or rack-level failures, that are unpredictable and uncorrelated. � Such stacks successfully deliver highly-available cloud services at global scale. The increasing criticality of cloud services to the overall world economy is causing concern about the impact of power outages, cyber-attacks, configuration errors, or other causes of datacenter...
Recently, mobile cloud computing (MCC) is drawing substantial attention due to potential reduction on local energy consumption and local execution time. To further satisfy the requirement of latency-intensive applications in the future, fog computing is proposed to take full advantages of close-by nodes with available resources, thus decreasing the transmission time during computation offloading....
Security challenges in cloud environments remain largely catastrophic due to the nature of the cloud; complex, heterogeneous, widely accessible over the internet, and virtualised resource sharing. Static and boundary-based conventional security approaches are clearly not effective as the sole countermeasures. Instead, countermeasures need to be intelligent with a high degree of autonomous, self-managing...
Public cloud providers, such as Amazon EC2, offer idle computing resources known as spot instances at a much cheaper rate compared to On-Demand instances. Spot instance prices are set dynamically according to market demand. Cloud users request spot instances by submitting their bid, and if user's bid price exceeds current spot price then a spot instance is assigned to that user. The problem however...
Social media networks as well as online graph analytics operate on large-scale graphs with millions of vertices, even billions in some cases. Low-latency access is essential, but caching suffers from the mostly irregular access patterns of the aforementioned application domains. Hence, distributed in-memory systems are proposed keeping all data always in memory. But, the sheer amount of small data...
The design of cloud computing technologies need to guarantee high levels of availability and for this reason there is a large interest in new fault tolerant techniques that are able to keep the resilience of the systems at the desired level. The modeling of these techniques require input information about the operational state of the systems that have a stochastic nature. The aim of this paper is...
The Wireless Sensor Networks (WSNs) are widely being used for monitoring different environments and are very effective for monitoring those areas where human presence can be critical. Meanwhile, Cloud Computing (CC) has emerged as a very large scale computational and storage service with pay-as-you-go usage model which has taken the WSN to entirely a new paradigm. This integration of WSN with CC provides...
A number of benefits originate from the implementation of cloud computing. Cloud computing has been extensively implemented in organizations like companies and universities. However, in Indonesia cloud computing is not widely approved by universities yet. This condition can be caused by lack of trust of the universities in the risk of cloud computing implementation. This paper is intended to analyze...
Network-based deployments within the Internet of Things increasingly rely on the cloud-controlled federation of individual networks to configure, authorize, and manage devices across network borders. While this approach allows the convenient and reliable interconnection of networks, it raises severe security and safety concerns. These concerns range from a curious cloud provider accessing confidential...
With the growing popularity of cloud computing, the reliability of cloud services has become a key concern of cloud service providers and users. Several researchers have studied the problem of cloud service reliability assurance. However, the complexity of the cloud service provisioning system and the deep dependency stack of its layered architecture make it challenging to evaluate the reliability...
The integration of Internet of Things (IoT) and Cloud computing has brought the rising of IoT Clouds able to provide different kinds of IoT as a Service solutions consisting of various micro-services deployed in IoT devices (including sensors and actuators) interacting with different Infrastructure, Platform, and Software as Service (i.e., IaaS, PaaS, SaaS) running in the Clouds' data centres. On...
With the development of cloud computing, disk arrays tolerating triple disk failures (3DFTs) are receiving more attention nowadays because they can provide high data reliability with low monetary cost. However, a challenging issue in these arrays is how to efficiently reconstruct the lost data, especially for partial stripe errors (e.g., sector and chunk errors). It is one of the most significant...
An effective storage and management of file systems is very much essential now a days to avoid the wastage of storage space provided by the cloud providers. Data de-duplication technique has been used widely which allows only to store a single copy of a file and thus avoids duplication of file in the cloud storage servers. It helps to reduce the amount of storage space and save bandwidth of cloud...
Today's integration of mobile technologies and traditional cloud computing exploits the abundant computation and storage resources in the cloud, to enhance the capabilities of end-user mobile devices. The designs that rely on remote cloud services, however, sometimes overlook the abundant resources (e.g., storage, communication, and computation) on mobile devices. In particular, when the remote cloud...
In this paper, we elaborate an SDN orchestration solution aiming at the dynamic adaptation of service chain paths thereby addressing high-availability requirements of 5G applications. We present an SDN orchestrator that periodically monitors the availability of the network and, if necessary, promptly adapts service chain paths to recover from congestion events and to preserve network QoS performance...
The technology uses TCP / IP as the basic means of communication, adding a custom data communication protocol, through the integration of distributed storage scheduling ideas, multiple FPGA development board simulation into a large number of storage devices, through the unified mapping of the target data protocol Processing, to achieve data security, stable and reliable cloud storage, and because...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.