The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Cyber-Physical Manufacturing Cloud (CPMC) is an Internet-of-Things (IoT) enabled manufacturing framework that facilitates monitoring and operation of manufacturing machine tools remotely through the integration of IoT, cyber-physical systems, cloud computing, and advanced manufacturing technologies. To achieve this, it is necessary to develop a communication method of manufacturing services over...
Service systems in upcoming application domains like the Internet of Things (IoT) have a high demand for dynamic changes of provided service quality and related pricing. Changes can be requested by service consumers to address adjusted requirements at application level or by service providers to accommodate resource constraints. Anyway, traditional approaches to handle Service Level Agreements (SLA)...
Cloud Computing, as a distributed computingparadigm, consists in provisioning infrastructure, software, andplatform resources as services. This paradigm is being increasinglyused for the deployment and execution of servicebasedapplications. To efficiently manage them according to theautonomic computing paradigm, service-based applications canbe associated with autonomic manager (AM) components thatmonitor,...
Cloud federation is a novel concept that has been drawing attention from research and industry. However, there is a lack of solid proposal that can be widely adopted in practice to guarantee adequate governance of federations, especially in the Public Sector contexts due to legal requirements. In this paper, we propose an innovative governance approach that ensures distributed and democratic control...
We describe a multi-layer security system called "Application Protected Execution" (APEx) that has an "In-VM monitoring" functionality protected by out-of-band memory created within a Virtual Machine (VM) on cloud-based nodes. The In-VM monitor functionality protects execution of security related software and is triggered by hooked system events to avoid context switched overhead...
Nowadays, Cloud providers revise the terms of their Service Level Agreements (SLAs) to include security provisions due to their criticality for their customers. In order to speed up their adoption by service providers and consumers and to make them more actionable, security SLAs monitoring should be described in a machine-processable, agile and extensible way. Several tools for SLA management are...
Massive parallel business workflows running in the cloud are prone to temporal violations (namely intermediate runtime delays) due to various reasons such as service performance fluctuation and resource conflicts. To deliver satisfactory on-time completion, cloud workflow temporal verification is employed to accurately detect time delays of workflow activities and timely handle temporal violations...
Traditional Cloud model is not designed to handle latency-sensitive Internet of Things applications. The new trend consists on moving data to be processed close to where it was generated. To this end, Fog Computing paradigm suggests using the compute and storage power of network elements. In such environments, intelligent and scalable orchestration of thousands of heterogeneous devices in complex...
The Internet of Things (IoT) changes many sectors of our lives. In the healthcare domain, IoT presents as mobile medical applications over various sensors that update healthcare professionals on patients' health information. However, IoT-based healthcare systems also face major challenges in protecting patients' privacy via an effective access control system. This paper presents an ambient home solution...
Detecting runtime anomalies is very important to monitoring and maintenance of distributed services. People often use execution logs for troubleshooting and problem diagnosis manually, which is time consuming and error-prone. In this paper, we propose an approach for automatic anomaly detection based on logs. We first mine a hybrid graph model that captures normal execution flows inter and intra services,...
As Cloud-deployed applications became more and more mainstream, continuously more complex services started to be deployed. The deployment involves multiple-layered systems and application itself. Where, failure of any point will disrupt the whole availability and auto-healing is one of the most indispensable features of the Cloud management. The micro-service model and Cloud management platform decouples...
Industrie 4.0 introduces a concept of digitalized production by allowing agile and flexible integration of new business models while maintaining manufacturing costs and efficiency at the reasonable level. In addition, cloud computing is one of the IT trends that is used nowadays to offer services on demand from a virtual environment in enterprise and office areas. The use of cloud computing in an...
This paper describes the extension of the work started in the first Cloud Computing session in WETICE 2009. A new computing paradigm using distributed intelligent managed elements (DIME) and DIME network architecture introduced in WETICE2010 is used to demonstrate globally interoperable public and private cloud network deploying cloud agnostic workloads. The workloads are cognitive and capable of...
Advances in cloud computing have made it a feasible and cost-effective solution to improve the resiliency of enterprise systems. However, the replication approach taken by cloud computing to provide resiliency leads to an increase in the number of ways an attacker can exploit or penetrate the systems. This calls for designing cloud systems that can accurately detect anomalies and dynamically adapt...
Organizations increasingly utilize cloud services such as Infrastructure as a Service (IaaS) where virtualized IT infrastructure are offered on demand by cloud providers. A major challenge for cloud providers is the security of virtual resources provided to its customers. In particular, a key concern is whether, for example, virtual machines (VMs) in the datacenter are performing tasks that are not...
When clients interact with a cloud-based service, they expect certain levels of quality of service guarantees. These are expressed as security and privacy policies, interaction authorization policies, and service performance policies among others. The main security challenge in a cloud-based service environment, typically modeled using service-oriented architecture (SOA), is that it is difficult to...
Elasticity is the key feature of cloud computing to scale computing resources according to application workloads timely. In the literature as well as in industrial products, much attention was given to the elasticity of virtual machines, but much less to the elasticity of containers. However, containers are the new trend for packaging and deploying microservices-based applications. Moreover, most...
Detecting execution anomalies is very important to monitoring and maintenance of cloud systems. People often use execution logs for troubleshooting and problem diagnosis, which is time consuming and error-prone. There is great demand for automatic anomaly detection based on logs. In this paper, we mine a time-weighted control flow graph (TCFG) that captures healthy execution flows of each component...
Detecting anomalous behaviors of cloud platforms is one of critical tasks for cloud providers. Every anomalous behavior potentially causes incidents, especially some unaware and/or unknown issues, which severely harm their SLA (Service Level Agreement). Existing solutions generally monitor cloud platform at different layers and then detect anomalies based on rules or learning algorithms on monitoring...
Insider attacks in which misbehaving Virtual Machines (VMs) take part of the cloud system and learn about its internal vulnerabilities constitute a major threat against cloud resources and infrastructure. This demands setting up continuous and comprehensive security arrangements to restrict the effects of such attacks. However, limited security resources prohibit full detection coverage on all VMs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.