The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this epoch of growing technology the data collected by organizations has the requirement to preserve the privacy of the individuals. The techniques like anonymization, randomization are used to achieve the goal. But unfortunately anonymization leads to certain level of information loss while preserving privacy. Due to drift of data over the centralized server has added to the more demand of preserving...
Secure sharing of patient health records in Jelastic cloud provides the more benefits to the data owners and end users. We know that building a specialized data center's is very difficult task and maintenance cost also very high. Sharing the PHR Application in the third party server raises the security and privacy risks. In this paper we introduce ABE highly secure encryption algorithm for providing...
Motivated by the increasing trend of storing data for web applications in fast NoSQL systems, in this paper, we experiment with the leading NoSQL datastore — Cassandra — and a latest generation re-design of Cassandra — ScyllaDB — meant to deliver bleeding-edge performance on modern multicore machines. We evaluate the scalability claim of ScyllaDB, in terms of the number of clients, and provide diagnostic...
The overview of network load distribution between of computation nodes inside of data center is given in the paper. The data center model in term of Infrastructure-as-a-Service is proposed. The processor performance utilization and amount of incoming intensity computation of computing nodes are proposed to use as a main performance criteria of service provision to the customers. The evaluation model...
It's Big Data era. In this epoch, the terabytes of data are a dime a dozen as well as large metadata size. The large scale metadata size becomes a barrier in the era of exascale computation. However, a fine-tuning, and a well designing of metadata can enhance the performance of a file system. Therefore, the large scale metadata server (MDS) design becomes key research point now-a-days. The designing...
In modern world, due to enormous demand for the cloud storage there are high chances of data duplication. Hence, redundancy create problem by increasing storage space and so storage cost. Inline Deduplication used to check duplicity before uploading data. Sometimes while restoring data failures or corrupting data can heavily create problem for users. Erasure coding can be used to encoding and storing...
FPGAs (Field Programmable Gate Arrays) are making their way into data centers (DC). They are used as accelerators to boost the compute power of individual server nodes and to improve the overall power efficiency. However, this approach limits the number of FPGAs per node and hinders the acceleration of large-scale distributed applications.
In today's open market, e-commerce has developed its strategy to process various business applications. There applications are developed with the platforms like Magento, Zen Cart, Prestashop, Spree etc., to run a successful online store. These are also used for customer e-commerce apps and require a scalable database for storing the data. The NoSQL database provides an efficient storage access and...
Supercomputing has been widely implemented in theoretical physics, theoretical chemistry, climate modeling, biology simulation and medicine research for high-performance and energy-efficient computing. Many of scientific applications are I/O sensitive and users have to tolerate high latency when supercomputing center storage processes thousands of I/O requests. In this paper, IMFSSC, an in-memory...
The significance of anomaly detection is increasing as a result of the rapid increase in unknown attacks. With the increase in deployment of scalable web services, there is a need for developing a scalable anomaly detection mechanisms. In this paper, we propose a scalable anomaly-based Bot Detection Architecture (BotD) in which different anomaly-based bot detection algorithms can be implemented. Our...
As the importance of network connectivity for organizations’ operations in connecting their services and business units’ increases, the need for backup sites with robust network infrastructure is crucial to achieve their business goals. To reduce cost and ease manageability and control, most organizations build one backup site. However, some organizations tend to establish multiple backup sites that...
As data volumes to be processed in all domains; scientific, professional, social…etc., are increasing at a high speed, their management and storage raises more and more challenges. The emergence of highly scalable infrastructures has contributed to the evolution of storage management technologies. However, numerous problems have emerged such as consistency and availability of data, scalability of...
Ultra-wideband (UWB) is an emerging technology that is well known for its capability to provide centimeter positioning precision which is essential for applications that require very high accuracy. However, although several accuracy improving algorithms have been proposed in scientific literature, solutions to improve the scalability (in terms of coverage and dense user deployments) have not been...
As the amount of mobile traffic carried over IP keeps increasing, the military networks face the scalability challenges of VoIP protocols. When the message arrival rate including retransmissions exceeds the message serving capacity of a Session Initiation Protocol (SIP) server, the queue size increases and eventually the SIP server can be crashed. In our previous studies, we proposed a priority based...
This paper is focused on performance optimization of applications based on non-relational databases. Firstly there will be explained differences between relational and non-relational databases and also compared the types of non-relational databases. Then the advantages and disadvantages between MongoDB and ElasticSearch (SQL) database systems will be described and compared. After both database systems...
Experiments have been at the heart of scientific development and education for centuries. From the outburst of Information and Communication Technologies, virtual and remote labs have added to hands-on labs a new conception of practical experience, especially in Science, Technology, Engineering and Mathematics education. This paper aims at describing the features of a remote lab named Virtual Instruments...
Key-value stores such as Memcached have become widely used by cloud and web-service providers. While there has been a significant amount of research done on improving the absolute performance of key-value stores, this work proposes an adaptive and a flexible approach to key-value stores. We first propose soft data partitioning that divides memory into multiple groups within a single node, or a single...
NoSQL databases offer high throughput, support for huge data structures, and capacity to scale horizontally at the expense of not supporting relational data, ACID consistency and a standard SQL syntax. Due to their simplicity and flexibility, NoSQL databases are becoming very popular among web application developers. However, most NoSQL databases only provide basic backup and restore mechanisms, which...
Information Centric Networking (ICN) is envisioned to be the future Internet architecture and mobile access network e.g., Long Term Evolution (LTE), and 5G will be the major access networks. In this paper, we present a cache management and cooperative request forwarding schemes for Scalable Video Streaming (SVS) in Information Centric Networking (ICN) enabled mobile access networks. H.264/SVC encoded...
Data Analytics has become very popular on large datasets in different organizations. It is inevitable to use distributed resources such as Clouds for Data Analytics and other types of data processing at larger scales. To effectively utilize all system resources, an efficient scheduler is needed, but the traditional resource managers and job schedulers are centralized and designed for larger batch...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.