The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud Data Center (DC) service orchestration and resource management are important applications of the Software Defined Networking (SDN) paradigm. In this paper, we introduce a novel dynamic allocation strategy for Virtual Machine (VM) allocation called Enhanced multi-objective Worst Fit (E-WF). E-WF combines the multi-objective Best Fit and Worst Fit allocation strategies, and it exploits the history...
Software Defined Networking (SDN) presents a unique opportunity to manage and orchestrate cloud networks. The educational institutions, like many other industries face a lot of security threats. We have established an SDN enabled Demilitarized Zone (DMZ) — Science DMZ to serve as testbed for securing ASU Internet2 environment. Science DMZ allows researchers to conduct in-depth analysis of security...
Due to the abstraction of physical resources and heavy use of virtualization in the context of Service Function Chaining (SFC), verification of the processing and that forwarding of traffic is handled correctly is very challenging. Such verification requires explicit support from the physical cloud infrastructure and — more important — relies on correct configuration and operation of the Cloud Management...
Cloud computing and big data are the two important technology innovations which have the potential to restructure the value chain of telecom service providers. Apart from total cost saving, there are many operational and business objectives while adopting cloud computing technology into the telecom domain. Telecom service providers typically have terabytes of operational data available. When effectively...
Graph data management and mining in HPC environments has been a widely discussed issue in recent times. In this talk I will describe the use of Partitioned Global Address Space languages for graph data mining and management. I will first discuss the rationale behind X10 based graph libraries and graph database benchmarks using ScaleGraph and XGDBench as examples. Next, I will take Acacia which is...
The majority of business activity of our integrated and connected world takes place in networks based on cloud computing infrastructure that cross national, geographic and jurisdictional boundaries. Such an efficient entity interconnection is made possible through an emerging networking paradigm, Software Defined Networking (SDN) that intends to vastly simplify policy enforcement and network reconfiguration...
With the evolution towards the Fifth Generation of Mobile Communications (5G), Software-based Networks are paving the way to a radical transformation of Network Operators infrastructures. Novel technologies like Network Function Virtualisation (NFV) and Software Defined Network (SDN) are enabling new way of managing on-demand network resources. Focusing on the Mobile Core Network architecture, Service...
We present a testbed implementation for the development, evaluation and demonstration of security orchestration in a network function virtualization environment. As a specific scenario, we demonstrate how an intelligent response to DDoS and various other kinds of targeted attacks can be formulated such that these attacks and future variations can be mitigated. We utilise machine learning to characterise...
In the context of the Open Network Automation Platform (ONAP), we develop in this paper a resource allocation strategy for deploying Virtualized Network Functions (VNFs) on distributed data centers. For this purpose, we rely on a three-level data center hierarchy exploiting co-location facilities available within Main and Core Central Offices. We precisely propose an active VNFs' placement strategy,...
Telehealth relies on the ability of Information and Communication Technology (ICT) to maximize the quality of care provided remotely. Remote Patient Monitoring (RPM) is a key part within telehealth that enables patient to use devices to measure vital signs and sends it to a healthcare professional. Patients usually have multiple devices to measure vital signs. Those devices might be manufactured by...
Since its foundation in 2009, the SoEA4EE workshop complements well-established topics of the EDOC conferences such as service-oriented architectures and enterprise service architectures by addressing the coupling of business processes and services and the alignment of business and it. The SoEA4EE workshop also shows relationships to topics of the EDOC such as Business Process Management, Enterprise...
The integration of multiple Unmanned Aerial Vehicles (UAVs) in civil applications have been attracted a lot of attentions in many scientific and engineering fields. Most of Multi-UAV systems have been characterized to be controlled by one Ground Control Station (GCS). However, in a case of an enormous number of UAVs with different assignments to each one or each group, one GCS cannot handle such a...
iSkin Specialist is an attempt to combine the power of smartphones (which is becoming common globally) with specialist doctors (which is very limited) or to an expert system — to provide quick diagnosis for skin conditions like rash, bug bite, etc. The diagnosis in many cases are simple but without proper diagnosis and treatment, some of these skin conditions can have serious health impact and can...
Development and operation of multi-cloud applications, i.e. applications which consume and orchestrate services from multiple independent Cloud Service Providers, are challenging topics nowadays. Systematically addressing security assurance in such applications is an additional issue, unsolved at state of art. This paper introduces the MUSA DevOps approach to holistic security assurance in multi-cloud...
In this work, we examine an access scope, a concept in authorization management broadly applied for the specification of access constraints in web service integrations. By analyzing a typical use-case of cross-organizational cloud service automation, we show the suboptimal capabilities of static, coarse-grained and inflexible scopes that negatively impact security and management of service integrations...
The aggregation of multiple carriers and even heterogeneous links is a well established method to boost data rates in wireless networks. At the same time, Network Coding has been proven as an efficient and robust mechanism to distribute content in mesh networks or cloud storages. In this paper, we introduce with ScalaNC a new method of heterogeneous link aggregation, which requires no changes in the...
Due to the fundamental trade-off between quality and timeliness of planning, designers of self-adaptive systems often have to compromise between an approach that is quick to find an adaptation plan and an approach that is slow but finds a quality adaptation plan. To deal with this trade-off, in our previous work, we proposed a hybrid planning approach that combines a deliberative and a reactive planning...
This paper evaluates a mechanism for applying machine learning (ML) to identify over-constrained IaaS virtual machines (VMs). Herein, over-constrained VMs are defined as those who are not given sufficient system resources to meet their workload specific objective functions. To validate our approach, a variety of workload-specific benchmarks inspired by common Infrastructure-as-a-Service (IaaS) cloud...
Nowadays, people rely heavily on local or cloud storage to store their data digitally. To ensure data safety, various data fault tolerance mechanisms have been widely studied and deployed to provide reliability. Data fault tolerance mechanisms incur additional cost to the storage system. Therefore, data of different importance should be stored on storage that provides different levels of fault tolerance...
Federation is generally used to denote collaboration between IT systems in different administrative domains to achieve common goals. Different administrative domains are typically distinct and loosely coupled by definition. While domains may have some degree of self-awareness, their awareness of other domains may be weak or non-existent. Hence, there is a fundamental challenge concerning how to build...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.