The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Applications offered as Software-as-a-Service should pursue a multi-tenant architecture in order to be profitable. Multi-tenancy helps to reduce the number of application instances by sharing resources amongst several tenants, thus saving operational costs, particularly in public cloud environments. While research mostly discusses how to design green-field software in a multi-tenant manner, this paper...
Enterprises are moving into cloud, so deployment and configuration of virtual machines and application software are becoming highly complex. The solution to this problem is to automate the deployment and configuration using templates. These templates allow the users to specify the information about resource requirements of an application. In this paper, firstly, we present the methods for development...
Internet of things (IoT) has provided a technological platform for purposeful connectivity. IoT allows smart devices and sensors to sense, connect and control the devices even remotely. The development in the field of Internet of Things has been enormous and the application of these solutions is scalable to high limits. The quantum of Internet of Things (IoT) is developing fast and is predicted to...
Our Dynamic Encryption Key Security Scheme(DEKSS) is a novel security strategy that utilizes a secure architectureto dispatch and manage data through multiple Cloud ServiceProviders (CSP). This strategy can promise data security for bothclients and service providers without impacting the other party negatively.While there are limitations in being truly secure, such as thoserecognized by WhiteHat security...
In this paper, we describe a network defence strategy testbed, which could be utilized for testing the strategy decision logic against simulated attacks or real attackers. The testbed relies on a network of honeypots and the high level of logging and monitoring the honeypots provide. Its main advantage is that only the decision logic implementation is needed in order to test the strategy. The testbed...
The Domain Name Service (DNS) is a vital service in the Internet. Much more than a simple translation mechanism, it also allows higher profile functionalities such as load balancing and enhanced content distribution. In the scope of cloud computing, DNS is foreseen as an elastic and robust service, supporting failover mechanisms, decentralised configuration and multi-tenant isolation.
The development of optimization algorithms for combinatorial problems is a complicated process, both guided and validated by the computational experiments over the different scenarios. Since the number of experiments can be very large and each experiment can take substantial execution time, distributing the load over the cloud speeds up the whole process significantly. In this paper we present the...
Cloud applications are offered to users with high availability and minimal data loss. Any (hardware or software) failure must be detected and recovered quickly, in order to maintain customer trust and avoid financial losses. When we are dealing with multi-tier and stateful applications, the failure recovery process is a big challenge because the whole state of the failed application must be retrieved...
Hybrid Cloud is a composition of private and publicclouds, which can assist an application to utilize the advantages of distinct clouds and achieve high availability, scalability and robustness. Despite its benefits, hybrid cloud can present special challenges such as cloud heterogeneity, inconsistent interface, communication overhead between clouds and etc. In this paper, we propose a novel prediction...
In this paper, we present a data acquisition and analysis framework for materials-to-devices processes, named 4CeeD, that focuses on the immense potential of capturing, accurately curating, correlating, and coordinating materials-to-devices digital data in a real-time and trusted manner before fully archiving and publishing them for wide access and sharing. In particular, 4CeeD consists of novel services:...
The improvement of communication and the exchange of teaching resources between teachers and students has developed a model of web services based on cloud computing technology. Today's models and systems (in the application approach) are used according to the user's needs, while the rest of the time computing resources remain not used. Such services are characterized by extremely high level of security...
Cloud computing allows not only to obtain computing resources on-demand but also to store large amounts of data (big data) with a high level of fault tolerance. Nevertheless, data confidentiality for users of hybrid and public clouds is cannot guaranteed in full. Cloud providers have full access to user data, which threatens to compromise the integrity of data. Existing methods of providing security...
Solid State Drives (SSD) are integrated together with Hard Disk Drives (HDD) in Hybrid Storage Systems (HSS) for Cloud environment. When it comes to storing data, some placement strategies are used to find the best location (SSD or HDD). These strategies should minimize the cost of data placement while satisfying Service Level Objectives (SLO). This paper presents two Cost based Object Placement Strategies...
AMNESiA is an affinity measurement platform for NFV-enabled networks, designed to consolidate and interpret existing monitoring data into an affinity metric, aiding operators to identify affinity and anti-affinity relations in the network. AMNESiA uses the latest snapshot of usage data, collected through a generic monitoring solution, from the database to measure affinity between VNFs.
Troubleshooting in an infrastructure-as-a-Service (IaaS) cloud platform is an inherently difficult task because it is a multi-player as well as multi-layer environment where tenant and provider effectively share administrative duties. To address these concerns, we present our work on CloudSight in which cloud providers allow tenants greater system-wide visibility through a transparency-as-a-service...
The paper deals with the problem of designing and implementing an inexpensive wide area sensors network for environmental radiological monitoring. To this aim, the measurement node takes advantage from a low-cost, Linux based, development platform, and some new open-source software tool, which are pushed towards a network-oriented vision of Internet of Things (IoT).
Cloud computing is becoming a relatively mature paradigm in the ICT landscape. In light of the growing appetite for resources and service levels on par with user expectations, multi-cloud scenarios are becoming the next frontier in the usage of distributed datacenters for private and hybrid Cloud scenarios. Application deployment in particular is a noteworthy feature to be evaluated as microservices...
Due to the number of cloud providers, as well as the extensive collection of services, cloud computing provides very flexible environments, where resources and services can be provisioned and released on demand. However, reconfiguration and adaptation mechanisms in cloud environments are very heterogeneous and often exhibit complex constraints. For example, when reconfiguring a cloud system, a set...
Cloud Security is a major concern for storing and protecting of data, applications and services, accessed as per the user requirements [3]. There is a need to provide guaranteed access control mechanism, so that only approved and permitted users will be able to use the data as on demand basis in the cloud [1]. Provenance is a major entity in cloud security. It includes information that is used to...
Internet plays a significant role that it has helped the mankind to be advanced. One of the remarkable applications of Internet is the feature that enables to download any form of data. In order to accomplish it, devices are required that has specific functions. When a PC works for downloading purpose, it uses all its resources, though they are not wholly required and leads to large power consumption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.