The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtualization supplies a straightforward approach to high availability through iterative replications of virtual machine (VM) checkpoints that encapsulate the protected services. Unfortunately, traditional VM replication solutions suffer from deficiencies in either response latency or state recovery consistency, which constrains the adoption of VM replication in production. In this paper, we extend...
In order to provide the cloud computing research community with a full-system level datacenter server emulator with programmable hardware and software, and stimulate more innovative research work, this poster and demo shows a scientific research platform, Titian2, designed and implemented at ICT of CAS. Titian2 has the ability of on-line profiling and measuring, and the scalability of connecting with...
Cloud datacenters are compute facilities formed by hundreds and thousands of heterogeneous servers requiring significant power requirements to operate effectively. Servers are composed by multiple interacting sub-systems including applications, microelectronic processors, and cooling which reflect their respective power profiles via different parameters. What is presently unknown is how to accurately...
Based on the new application demands of distributed monitoring system, the hardware and software equipment of one or more monitoring position was abstracted as a distributed agent; central server was canceled, the system level management functions were shared by one or more agent flexibly. Agents used point-to-point communication; the interaction driver which was based on the state of agent was realized...
The advent of Voice over IP (VoIP) telephony has revolutionized the world of telecommunication. It has opened several possibilities of extending the traditional telephony concepts. Advancement in software has made it possible to implement various telephony hardware functions in software. Asterisk, a Linux based implementation of PBX is considered as a key addition to the revolution in the modern telephony...
Microgrids are a collections of loads, small sources and storage systems which are present as single, flexible and independently controllable entities [1]. The inclusion of Distributed Generation (DGs) systems into a microgrid makes the current flow in a microgid bidirectional. The detection of faults and the connection and disconnection of the DGs to and from the microgrid is carried out by the Central...
We propose an implementation of a secured content addressable memory (SCAM) based on homomorphic encryption (HE), where HE is used to compute the word matching function without the processor knowing what is being searched and the result of matching. By exploiting the shallow logic structure (XNOR followed by AND) of content addressable memory (CAM), we show that SCAM can be implemented with only additive...
Network Functions Virtualization (NFV) stands for a major paradigm shift in computer networks. Despite the flexibility improvements which NFV offers, the commonly used COTS processors show performance limitations compared to specialized circuits. A trade-off can be achieved by reconfigurable hardware like FPGAs, which provide high, guaranteed performance and flexibility. However, FPGAs are costly,...
An individual who re-registers an expired domain implicitly inherits the residual trust associated with the domain's prior use. Adversaries can, and increasingly do, exploit these ownership changes to undermine the security of both users and systems. In fact, many seemingly disparate security problems share a root cause in residual trust abuse. As we enter the dawn of the dead domain, new techniques...
This article presents a detailed description of fog computing (also known as edge computing) and explores its research challenges and problems. Based on the authors' understanding of these challenges and problems, they propose a flexible software architecture, which can incorporate different design choices and user-specified polices. They present their design of WM-FOG, a computing framework for fog...
We propose to demonstrate and obtain community feedback on the RadioHound system, a custom spectrum sensing network capable of tuning from 25 MHz to 6 GHz, which covers nearly all widely-deployed wireless activity. We describe the system hardware and network infrastructure in detail with a view towards driving the cost, size, and power usage of the sensors as low as possible.
With the rapid development of web, mobile apps and IoT devices, a huge volume of data are created every day. In fact, these data are not only large, but also generated quickly and with a variety of different formats. Many companies are forced to face the problem of processing these large data in near real-time. Within different application domains, some data are required to be processed in real-time,...
Cloud computing is an on-demand access model for computing resources most notably embodied by the OpenStack project. As of release Liberty, OpenStack supports provisioning Bare-metal, Virtual machine (VM) and container based hosts. These different hosts incur different overheads. Consequently, the main goal of this paper is to empirically quantify that overhead through a series of experiments. The...
Programmable Virtual Networks (PVNs) make the network more flexible and allow the fast introduction of new services. However, several shortcomings hamper their wider adoption, including: (i) the extensive knowledge required to configure and manage the NetApps, (ii) the lack of descriptors to detail all nuances of the NetApps, and (iii) there is no solution that enables to distribute and configure...
Network Functions Virtualization (NFV) helps in reducing the dependency on hardware equipments by virtualizing the telecommunication network functions. While the current works have considered different frameworks for NFV and various challenges associated with it, only a few have considered trust as an aspect of NFV. In this paper, we discuss the challenges of incorporating trust in NFV. We discuss...
The growing importance of huge amount of data and the data analysis for business agility has prophesied managerial decisions to ensure data security and disaster recovery options. This growing dependency has triggered extensive storage of data and development of ‘high availability’ databases. One of the prevalent practices in the industry is to provide for a data center (DC) where the on-going service...
This paper presents an energy management policy for reconfigurable clusters running a multi-tier application, exploiting DVS together with multiple sleep states. We develop a theoretical analysis of the corresponding power optimization problem and design an algorithm around the solution. Moreover, we rigorously investigate selection of the optimal number of spare servers for each power state, a problem...
This paper presents the design and implementation of an incrementally scalable architecture for middleboxes based on commodity servers and operating systems. xOMB, the eXtensible Open MiddleBox, employs general programmable network processing pipelines, with user-defined C++ modules responsible for parsing, transforming, and forwarding network flows. We implement three processing pipelines in xOMB,...
A fundamental vision driving USB mass storage is commonly used in our day to day computing other storage applications and carry personal data anywhere at any time. Portable storage, such as flash memory and USB disc, allow users transport several gigabytes to terabyte data in their pockets. For these applications, mass storage is secure and similar to a hard disk, and so the same file management system...
The huge amount of sensitive data store in centralize storage space in cloud server, which is most important for providing the result based on the user's provided keywords. These service providing high efficiency with keeping user privacy. Without any configure the existing system learn plain text information. CSP (Cloud Service Provider) have outsourced data control in this condition because of some...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.