The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Effective management of resources on a cloud or cluster is crucial for achieving the quality of service requirements of users, which are typically captured in service level agreements (SLAs). This paper focuses on improving the robustness of resource allocation and scheduling techniques that process an open stream of MapReduce jobs with SLAs, by introducing techniques to handle errors/inaccuracies...
In the highly competitive business environment of Software as a Service (SaaS) clouds, Quality of Service (QoS) and fair pricing are of paramount importance for differentiating between similar cloud providers. In such platforms, the workload computational demand variability may have a significant impact on the system performance and thus on the provider's Service Level Agreement (SLA) commitments...
In the near future, it is expected that a large number of machine-to-machine (M2M) communication devices will provide with ubiquitous information and services. Random access protocols like ALOHA ans CSMA have been considered for M2M networks for their simplicity of operation. This paper evaluates the performance of a Frame Slotted-ALOHA protocol that deploys reservation and data packets (FSA-RDP),...
Vehicular Ad-Hoc NETworks (VANETs) have received considerable attention in recent years, due to its unique characteristics, which are different from Mobile Ad-Hoc NETworks (MANETs), such as rapid topology change, frequent link failure, and high vehicle mobility. The main drawback of VANETs network is the network instability, which yields to reduce the network efficiency. This paper proposes a novel...
Host load detection algorithm determines if a given host is overload or underloaded then the decision can be made to migrate VMs to achieve host/server consolidation and load balancing in cloud data centers while satisfying the QoS constraints. Presently, host load detection is a challenging problem in the cloud data center management specially with high dynamic environment for the host load. In this...
Cloud federation allows interconnected Cloud Computing environments of different Cloud Service Providers (CSPs) to share their resources and deliver more efficient service performance. However, each CSP provides a different level of security in terms of cost and performance. Instead of consuming the whole set of Cloud services that are required to deploy an application through a single CSP, consumers...
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its...
Migration of existing enterprise applications to the Cloud requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating the application with functional and non-functional aspects. However, none of them has focused so far on the adaptation of security and privacy. In our previous work, Identity-as-a-service (IDaaS) decouples Authentication and...
The survey of related work in the very specialized field of information security (IS) ensurance for the Internet of Things (IoT) allowed us to work out a taxonomy of typical attacks against the IoT elements (with special attention to the IoT device protection). The key directions of countering these attacks were defined on this basis. According to the modern demand for the IoT big IS-related data...
The purpose of the present study is to empirically investigate whether national culture has an impact on cybersecurity development. We used methods of correlation and hierarchical regression to analyse two sets of indices; the global cybersecurity index of 2015 and Hofstede cultural dimension index. The research discovered that there exist a significant correlation between cybersecurity development...
The Internet of Things (IoT) offers challenges that are being met by the convergence of multiple technologies, which have matured rapidly over the past decade. Broadband communication and mobile platforms enable raw data collection and its transmission to the cloud. Data science, e.g., deep learning, transforms large amounts of data from the Internet-connected sensors and personal devices in meaningful...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.