The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A major challenge of running applications in clouds is to determine the right number of resources (virtual machines or VMs) to rent in terms of both performance and cost. Such a challenge becomes greater if the application requires to run across multiple resources. In this paper, we address the problem of scheduling scientific workflow applications. The structure of workflows, dictated by precedence/data...
This work proposes an auto scaling method for high demanding web applications in a cloud computing system. The proposal has the goal to increase efficiency in containers allocation for processing web requests considering a threshold for applications response time. The method was developed using a control algorithm that applies adjustments based on the properties extracted from workload characterization...
As cloud computing continues to gain momentum, big data analytics are now offered as Software as a Service (SaaS). Besides the heterogeneity and multi-tenancy of the underlying virtualized environment, scheduling such real-time, data-intensive, embarrassingly parallel applications in a SaaS cloud involves another serious challenge: data locality. Consequently, data-aware scheduling policies should...
There is an increase in the number of elderly people living alone, whose children make living in other cities or even other countries. Once they are ill or in an accident, they can only depend on staff of nursing care centers, instead of their children. Therefore, a system which help the elderly to live in their apartment alone is needed. Through the investigation of the elderly living in the community,...
The blockchain technology is gaining momentum because of its possible application to other systems than the cryptocurrency one. Indeed, blockchain, as a de-centralized system based on a distributed digital ledger, can be utilized to securely manage any kind of assets, constructing a system that is independent of any authorization entity. In this paper, we briefly present blockchain and our work in...
Intelligent Manufacturing has new features in organizational structure, management, security and technology. There are new requirements for equipment management, including standards such as personnel quality, accident handling, factory safety and Intelligent Manufacturing. This paper puts forward the preliminary solution of equipment management, designs the cloud-based platform architecture for the...
The technology of the IoT system components belong to the science and engineering category. However, if composition elements of the IoT system can be configured easily and used for education, students of the liberal arts might construct IoT prototype systems. Students are then expected to create ideas related to specialized fields of the liberal arts using experience obtained the construction. Creation...
Development and operation of multi-cloud applications, i.e. applications which consume and orchestrate services from multiple independent Cloud Service Providers, are challenging topics nowadays. Systematically addressing security assurance in such applications is an additional issue, unsolved at state of art. This paper introduces the MUSA DevOps approach to holistic security assurance in multi-cloud...
In this work, we examine an access scope, a concept in authorization management broadly applied for the specification of access constraints in web service integrations. By analyzing a typical use-case of cross-organizational cloud service automation, we show the suboptimal capabilities of static, coarse-grained and inflexible scopes that negatively impact security and management of service integrations...
Today geolocation data is used extensively in multiple applications and devices. GPS trajectory data can reveal political, religious affiliations, personal habits, shopping preferences etc. It threatens large number of users who use location-based services on their devices, because they are afraid of revealing their locations and concerned about being tracked. Multiple approaches have been proposed...
In sensor clouds environments, the provisioning process is a crucial task since it is responsible for selecting physical sensors nodes that will be allocated to compose virtual sensors. In literature, most works consider the allocation of all sensors within the region of interest. However, this approach causes serious problems such as wasted energy consumption. Therefore, the objective of this paper...
The increase in the use of mobile devices from the first decade of this century has enabled users to perform several activities previously only possible through personal computers. However, the use of these devices is impacted by their known computational limitations, such as data processing, RAM memory, storage, and energy autonomy limitations. Considering this context, to measure the impact of the...
In cloud computing environment various forms of services allows users to store the information at remote location. But, there are many drawbacks as well because of the remote storage. However, it is plagued by security issues despite its numerous advantages. The paper presents a review of the current security issues in cloud computing environment like lack of control of data, lack of trust and multi-tenancy...
We propose a framework to create Learning Object based on the knowledge management model known as Community of Practice CoP, the framework's elements are: technology, people and process, the technology is a Cloud Computing, people are the user or learning object creators, and the process is a knowledge management model that makes a better interaction between those elements. The principle of the framework...
With the fast development of cloud computing and online business of Internet, the importance of data center is gradually increasing. Conventional Ethernet protocols can hardly meet the scalability and performance requirements of data centers (DCs). The traditional method solves the congestion problem by reducing the network throughput. In this paper, based on software-defined networks (SDNs) technology,...
Edge computing, which is a fundamental component of emerging 5G architectures, involves onloading or offloading multiple virtual network functions from mobile devices to an edge network substrate. In this paper, we present a model for the complete edge function onloading problem, which consists of three main phases: (1) Cyber foraging, which involves discovery of resources monitoring the state of...
During recent years, we have witnessed an explosion in the Internet of Thing (IoT) in terms of the number and types of physical devices. However, there are many limitations of these devices regarding their computing power, storage, and connection capabilities. They affect on-device processing of sensed data significantly. Centralized treatment of IoT data has proven challenging for many use cases...
The panic among medical control, information, and device administrators is due to surmounting number of high-profile attacks on healthcare facilities. This hostile situation is going to lead the health informatics industry to cloud-hoarding of medical data, control flows, and site governance. While different healthcare enterprises opt for cloud-based solutions, it is a matter of time when fog computing...
Multi-cloud promises to substantially improve faulttolerance, by tolerating disasters affecting a subset of providers. Unfortunately, multi-cloud solutions are premature and none of them are fully fledged. Their main impediment is the lack of network services: to date, it remains impossible for a customer to setup and control a multi-cloud network. Moreover, manually inter-connecting multiple clouds...
To meet the deadlines of interactive applications, congestion-agnostic transport protocols like UDP are increasingly used side-by-side with congestion-responsive TCP. As bandwidth is not totally virtualized in data centers, service outage may occur (for some applications) when such diverse traffics contend for the small buffers in the switches. In this paper we present SDN-GCC, a simple and practical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.