The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud datacenters must ensure high availability for the hosted applications and failures can be the bane of datacenter operators. Understanding the what, when and why of failures can help tremendously to mitigate their occurrence and impact. Failures can, however, depend on numerous spatial and temporal factors spanning hardware, workloads, support facilities, and even the environment. One has to...
In this paper, the fundamental problem of distribution and proactive caching of computing tasks in fog networks is studied under latency and reliability constraints. In the proposed scenario, computing can be executed either locally at the user device or offloaded to an edge cloudlet. Moreover, cloudlets exploit both their computing and storage capabilities by proactively caching popular task computation...
Software aging is a cumulative process which can lead long-running systems to failures. Software rejuvenation is the countermeasure of software aging. Rejuvenation actions usually comprise system reboot or application restart. Software aging appears as a significant concern for the reliability of software systems. Therefore, techniques and methods to analyze software aging and rejuvenation are of...
A Virtual Data Center (VDC) is a set of virtual machines (VMs) connected by a Virtual Network (VN) topology. Today's cloud data centers support dynamic requests for VDCs, by using software defined embedding strategies thatallow them to mesh multiple VDCs onto their Physical Data Center(PDC) network and machines. In this paper, we present a solution to this VDC embedding problem that achieves a higher...
JointCloud provides a large-scale, flexible, and elastic computing resource platform. Big data systems such as MapReduce and Spark are widely deployed on this platform for big data processing. How to choose a cloud platform in accordance with the need of customers is a problem. Current performance benchmarking suites can choose suitable cloud platforms for customers. However, they do not consider...
Applications integrating software with a large number of physical objects and devices in a large-scale Internet of Things (IoT) networks are on the rise. Some examples of these applications are smart grids and water networks and intelligent transportation systems. As they operate in and control a large heterogeneous environment, these applications need real-time controls, powerful and scalable data...
We address the construction of a distributed cloud-based storage based on residual number system with modules of a special kind {2n − 3, 2n − 1, 2n + 1, 2n + 3} to provide reliability and safety of stored data. We show that the proposed scheme allows obtaining an improvement of the coding and decoding rates, and the speed of data loading and data access comparing with the fastest cloud service. The...
The integration of cloud computing and Internet of Things (loT) is quickly becoming the key enabler for the digital transformation of the healthcare industry by offering comprehensive improvements in patient engagements, productivity and risk mitigation. This paradigm shift, while bringing numerous benefits and new opportunities to healthcare organizations, has raised a lot of security and privacy...
Large cloud service providers often replicate data to multiple geographically distributed datacenters for availability and service quality purposes. The enormous amount of data needed to be shuffled among datacenters call for efficient schemes to maximally exploit the capacity of the inter-datacenter networks. In this paper, we propose Calantha, a new rate allocation scheme that improves the reliability...
Network virtualization allows the co-existing of logical networks (virtual networks) on physical network (substrate networks). Virtual Network (VN) reliability is a critical problem for end-users and service providers. It aims to ensure service continuity even upon failure. As more and more VNs are created over substrate networks (SN), the failure of a single SN component may lead to the failure of...
A new system model reflecting the clustered structure of distributed storage is suggested to investigate bandwidth requirements for repairing failed storage nodes. Large data centers with multiple racks/disks or local networks of storage devices (e.g. sensor network) are good applications of the suggested cluster-based model. In realistic scenarios involving clustered storage structures, repairing...
Data accountability can record and track data usage in cloud storage, in order to cope with users' fear of losing control of their own data or even data leakage. However, logs recording unauthorized data access could be omitted or falsified in untrusted cloud storage, which is the critical factor of unreliable data accountability. To address this problem, in this paper, we propose a novel Cloud Data...
Cloud computing has become an important scientific computing and commercial application paradigm. There are many computing resources and data in public clouds, but there exist some threats caused by unreliable services due to malicious providers or unacceptably poor service performance. Traditional trust computing requires a high overhead and thus decreases the performance of a cloud system. To address...
Continuous test-based cloud certification uses tests to automatically and repeatedly evaluate whether a cloud service satisfies customer requirements over time. However, inaccurate tests can decrease customers' trust in test results and can lead to providers disputing results of test-based certification techniques. In this paper, we propose an approach how to evaluate the performance of test-based...
Cloud data provenance is metadata that records the history of the creation and operations performed on a cloud data object. Secure data provenance is crucial for data accountability, forensics and privacy. In this paper, we propose a decentralized and trusted cloud data provenance architecture using blockchain technology. Blockchain-based data provenance can provide tamper-proof records, enable the...
Software Defined Networking (SDN) technologies provide applications opportunities to manipulate underlying network flows and topologies via network controllers during runtime. In cloud environments, networked virtual machines can be enhanced by SDN by providing applications with controllable infrastructures to meet system-level quality requirements; however, customizing a suitable network topology...
This demo presents a SFC orchestrator that provides intelligent, dynamic and automated VNFs and network deployment over heterogeneous NFV and SDN enabled Cloud environments. The proposed architecture is based on the ETSI NFV reference architecture and TOSCA standards. In this demo, reliable VNF placement and chaining is ensured using the algorithm proposed in [1] “A Link Failure Recovery Algorithm...
In this paper we propose a new infrastructure of storage overlay networks (SONs) that connect several distributed Internet nodes into an overlay network to provide in-network, aggregated storage. A SON node can encode, recode, and decode data on purpose. The SON improves information availability and security with erasure coding, and improves network efficiency by re-encoding received information....
Addresses the question of application of the concept of active security to a distributed system of data storage in multicloud environment. We show that secret sharing schemes, methods of periodical update of keys and authentication methods allow to minimize the risks of cloud conspiracy and provide secure and reliable data storage for a long time. We research the question of control of results of...
In the educational context, understanding the future is important for two reasons. First, we are educating people for future tasks, which need skills that are useful in the future. Secondly, educators have to be able to select the most promising tools and technologies to apply in their work. The problem is that there is no clear way to weigh the importance of the alternatives - what the real importance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.