The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today's Cloud based render farm usually requires end users to transfer modeling data into the Cloud for rendering and makes the end users to trust the providers of the cloud infrastructure with many security policies. However, the end users have no basis to determine if these Cloud services are trustworthy, except the assurances of the service provider. This brings up a serious security concern on...
For lower storage costs, storage systems are increasingly transitioning to the use of erasure codes instead of replication. However, the increase in the amount of data to be read and transferred during recovery for an erasure-coded system results in the problem of high degraded read latency. We design a new parallel degraded read method, Collective Reconstruction Read, which aims to overcome the problem...
This paper presents a concept for an e-Science oriented opportunistic cloud computing service with QoS assurances, as an infrastructure to offer to researchers computing resources with the flexibility and ease of use of a cloud computing service, supported through the opportunistic use of the idle computing resources available in academic institutions, with mechanisms in place to address the low reliability...
Datacenter-based Cloud Computing services provide a flexible, scalable and yet economical infrastructure to host online services such as multimedia streaming, email and bulk storage. Many such services perform geo-replication to provide necessary quality of service and reliability to users resulting in frequent large inter-datacenter transfers. In order to meet tenant service level agreements (SLAs),...
In order to improve hardware utilization, a novel Protection & Control Architecture based on virtual devices in digital substation is proposed in this paper. An “all-in-one” monitoring and control device is developed to support new architecture. Based on a Cloud Computing platform, the protection and control functions are built as virtual devices. Based on virtual protection & control, the...
A cloud business environment comprises service providers and service consumers. Services are supplied through a Service Level Agreement (SLA) which defines all deliverables, commitments, obligations, QoS, violation penalties etc. that help a service provider and a service consumer to execute their business transactions. The primary aim of a service provider is to fulfill its commitment to a consumer...
Cloud computing as a new and popular IT-based technology is a large-scale distributed computing paradigm. Cloud computing is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the internet. Replica selection requires information about the capabilities...
Mobile cloud computing has dual benefits that includes cloud computing and mobile computing. In mobile cloud computing data storage and data processing take place outside the mobile device. As a result, there is a high chance of security attack. The security even becomes more critical when mobile phone is initiating the handoff during handover management process. Thus, the attacker may easily get...
Cloud disaster tolerance has been widely used as a data security mechanism in which multiple replicas of disaster tolerance data are stored in different backup nodes for reliability. In this paper, we deeply study the optimal data backup strategy that backup nodes set the resources prices and source nodes determine the resources quantities that they want to rent. Firstly, we apply a Stackelberg game...
Virtualization has been used in cloud computing to build multiple Virtual Machines (VMs) on a single physical machine, which enables computing resources partition and improving the physical resources utilization efficiency. However, the use of virtualization brings new challenge in reliability modeling for cloud computing. For example, when server failure occurs, all VMs co-located on the server cannot...
In this paper, we take a close look to understand the cloud-based file synchronization and collaboration systems. Using the popular Dropbox as a case study, our measurement reveals its cascaded computation and communication operations that are far more complicated than those in conventional file hosting. We show that this serial design is necessary for the cloud deployment, which effectively avoids...
Cloud computing provides everything like a service, with the aim of offering an infrastructure and an active application platform, which is scalable and efficient in terms of cost for customers. Cloud services are quite abstract without a set of well-defined characteristics and according to user requirements, there are several solutions available on the market of Cloud computing.
Multi-cloud storage is an emerging technique using a set of clouds to provide data storage service for clients cooperatively. Reliability reflects the risk of data on clouds to be damaged or tampered and is a basic consideration when choosing multi-cloud. However, there exists no work to help clients evaluate the reliability of cloud storage, which is an important consideration of choosing clouds...
With the proliferation of mobile devices and the improvement of wireless communication technology, an increasing number of mobile devices are utilized for emergency management and healthcare monitoring. Redundant data upload to the cloud datacenters is gaining growing interest and attraction. One of the main challenges for redundant data upload in the cooperative mobile cloud is the optimization problem...
Big data processing applications have been migrated into cloud gradually, due to the advantages of cloud computing. Hadoop Distributed File System (HDFS), is one of the fundamental support systems for big data processing on MapReduce-like frameworks, such as Hadoop and Spark. However, the default block allocation scheme of HDFS doesn't fit well in the cloud environments behaving in two aspects: data...
Cloud service providers (CSPs) offer different Service Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances...
An increasing number of (AaaS) solutions has recently seen the light, in the landscape of cloud-based services. These services allow flexible composition of compute and storage components, that create powerful data ingestion and processing pipelines. This work is a first attempt at an experimental evaluation of analytic application performance executed using a wide range of storage service configurations...
Traditional infrastructure models are being replaced by Cloud-enabled models with support for several different applications/services. One of these services is professional real-time Audio/Video collaboration. Although high-end business collaboration solutions are nowadays offered with high reliability, they rely on dedicated specialized (and costly) hardware and network infrastructure setups, and...
The increasing popularity of cloud services is leading people to store their data to the Internet. Cloud storage services, by promising the access of your data anywhere at any time, do not provide users with sufficient transparency to allow them to know exactly how their data is stored and who can access and control it. The proposed cloud storage service offers users the possibility to control their...
There are a variety of ways to ensure the security of data in the cloud depending on the set of anticipated concerns. Many cloud storage secure data either by encrypting data on transfer, or by encrypting data at rest. These security protections seem very different, and currently there are no common goalbased security components for comparing them. In this paper we investigate the security components...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.