The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses the users' need to trust the commercial cloud providers and the security issues related to data storage in a cloud storage service. The cloud storage is one of the prominent services offered in cloud computing. Data stored over cloud in the plain text format represents a security threat. Thus, in this paper, we propose a method relying on the Identity Based Cryptography (IBE)...
Economic denial of sustainability (EDoS) appeared to be a new menace of cloud computing. This pristine attack is a breed of DoS or DDoS attack that targets the vulnerabilities of cloud consumers utility pricing model. EDoS attackers steadily send illegitimate traffic to gradually consume cloud resources such as virtual machines, virtual network devices, virtual security devices and databases so that...
Nowadays, the availability of Internet services is very important. One of these internet services is information system service. When the information system can not be accessed, the user cannot access the information. Therefore, the server used for that application should remain online nonstop. However, in reality the services failure often happens due to server error or repairing process. One of...
Distributed Denial of Service (DDoS) attacks represent major risks for the current cloud computing architecture. The rate of DDoS attacks in cloud is growing because of the essential characteristics of cloud computing. In this paper, we propose to use Software Defined Network (SDN) architecture and Fast Entropy approach in order to secure cloud computing environment from DDoS attacks in real time...
Fog computing preserves benefits of cloud computing and is strategically positioned to address effectively many local and performance issues because its resources and specific services are virtualized and located at the edge of the customer premises. Resource management is a critical issue affecting system performance significantly. Due to the complex distribution and high mobility of fog devices,...
Finding an appropriate resource to host the next application to be deployed in a Cloud environment can be a non-trivial task. To deliver the appropriate level of service, the functional requirements of the application must be met. Ideally, this process involves filtering the best resource from a number of possible candidates, whilst simultaneously satisfying multiple objectives. If timely responses...
We propose a novel dispersal storage scheme based on the ring learning with errors (Ring-LWE) problem. Our main technical contribution is a new systematic erasure code, called SNTT, to solve the problem of applying Ring-LWE in dispersal storage. SNTT is based on the number theoretic transform (NTT). To the best of our knowledge, SNTT is the first work that applies NTT to guarantee data availability...
In this paper we consider the data caching problem in next generation data services in the cloud, which is characterized by using monetary cost and access trajectory information to control cache replacements, instead of exploiting capacityoriented strategies as in traditional research. In particular, given a stream of requests to a shared data item with respect to a homogeneous cost model, we first...
As a fundamental cloud service for modern Web applications, the cloud object storage system stores and retrieves millions or even billions of read-heavy data objects. Serving for a massive amount of requests each day makes the response latency be a vital component of user experiences. Due to the lack of suitable understanding on the response latency distribution, current practice is to use overprovision...
Clouds offer great flexibility for scaling applications due to the wide spectrum of resources with different cost-performance, inherent resource elasticity and pay-peruse charging. However, determining cost-time-efficient cloud configurations to execute a given application in the large resource configuration space remains a key challenge. The growing importance of elastic applications for which the...
Under competitive pressure to maximize their infrastructure's utilization and revenue, modern cloud platforms are quickly evolving into server markets that offer increasingly sophisticated contracts beyond simple on-demand servers, such as spot, preemptible, burstable, and reserved servers. In parallel, continuing advances in system and network virtualization are making server-time a more fungible...
Edge computing enables application services to leverage low-latency responses, e.g., for augmented reality. Infrastructure-as-a-service for edge computing (EC-IaaS) allows multiple application service providers (ASPs) to use a virtualized resource (i.e., virtual machines (VMs) and virtual networks) for various applications services on the common edge computing infrastructure. For ASPs, the proximity...
An effective storage and management of file systems is very much essential now a days to avoid the wastage of storage space provided by the cloud providers. Data de-duplication technique has been used widely which allows only to store a single copy of a file and thus avoids duplication of file in the cloud storage servers. It helps to reduce the amount of storage space and save bandwidth of cloud...
Wireless video applications for Industrial Internet Of Things (IoT) are expanding into a multitude of new services. In the example of cloud processing for visual object detection, a camera is connected to the cloud via a local server and a data network, allowing the processing load to be handled in a distributed manner. This service model heavy taxes the data network with potentially unneeded traffic,...
It is crucial to ensure reliability, security and stability of cloud services without sacrificing too much resources in the area of workload management in clouds. The paper evaluates and compares lightweight decentralized algorithms for scheduling a workload part of which could be unreliable, in the context of {\em heterogeneous} cloud data centers. This unreliability could be caused by various types...
In the current trend of moving everything into the cloud, cloud-based remote desktops are not an exception. Benchmarking virtual remote desktops for performance optimization is an important task for the successful development and deployment planning of virtual desktop infrastructure (VDI) used to deliver remote desktops. This task is very challenging at cloud scale because of rapid evolution of VDI...
In this paper, we propose a mechanism for autoconfiguration of name-bound virtual networks (NBVNs) for Internet of Things (IoT). Some IoT standardization groups have defined APIs for IoT device communications, in which they indicate the correspondent nodes and resources by names. However, current technologies for the construction of Virtual Networks (VNs) rely on VLANs, IP routing, and OpenFlow control,...
Mobile Cloud Computing (MCC) leverages resourceful data centers that are distant (aka the cloud) or closely located (aka edge servers) for computational offloading to overcome resource limitations of modern mobile systems like smartphones or IoT devices. Many research works investigate context-aware offloading decision algorithms aiming to find the best offloading system at runtime. However, all approaches...
Hybrid Clouds couple the scalability of public Clouds with the greater control supplied by private ones. Hybrid Cloud Brokers support customers in selecting the most suitable providers' offers, optionally adding the provisioning of dedicated services with higher Quality of Service (QoS) levels. A clear evaluation of the benefits on performance and energy savings brought about by any allocation strategy...
Most of latency-sensitive mobile applications require computational resources provided through a cloud computing service. The problem of relying on cloud computing is that, sometimes, the physical locations of cloud servers are distant from mobile users and the communication latency is long. As a result, the concept of distributed cloud service, called mobile edge computing (MEC), is being introduced...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.