The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The need for performance has motivated the increasing adoption of solid-state drives (SSD) both in personal computers and data centers. However, the high cost per gigabyte and reduced lifetime hinder the thorough replacement of hard disk drives (HDD) with SSDs. To mitigate these issues, several architectures have been conceived based on hybrid storage systems, but performance and dependability models...
Traditional cloud stacks are designed to tolerate server or rack-level failures, that are unpredictable and uncorrelated. � Such stacks successfully deliver highly-available cloud services at global scale. The increasing criticality of cloud services to the overall world economy is causing concern about the impact of power outages, cyber-attacks, configuration errors, or other causes of datacenter...
This paper discusses the role of safety, availability, dependability of Internet of Things (IoT) data services dedicated to the monitoring and control of objects in the physical world. These services are designed to be available to devices and users on request at any time and at any location. The Internet of Things differs from today's global Internet in a number of ways. For instance, the networks...
Database is nowadays a crucial data storage for application needs. Currently, there are several existing popular databases such as relational database like SQL and non-relational database (i.e. NoSQL). However, both types have their own drawbacks which could not be utilized in both online and offline modes concurrently. Therefore, the authors develop a database that supports both modes especially...
Failure in cloud system is defined as an even that occurs when the delivered service deviates from the correct intended service. As the cloud computing systems continue to grow in scale and complexity, there is an urgent need for cloud service providers (CSP) to guarantee a reliable on-demand resource to their customers in the presence of faults thereby fulfilling their service level agreement (SLA)...
More and more software developers and information-technology professionals embrace the container technology, because it packs the required libraries and settings of software into a single image so that the deployment can be easily done anywhere without the issues of compatibility. On top of single containers, orchestration tools are essential to automate the deployment and operation of complex systems...
Large-scale virtualized datacenters require considerable automation in infrastructure management in order to operate efficiently. Automation is impaired, however, by the fact that deployments are prone to multiple types of subtle faults due to hardware failures, software bugs, misconfiguration, crashes, performance degraded hardware, etc. Existing Infrastructure-as-a-Service (IaaS) management stacks...
The Internet of Things (IoT) paradigm describes a vision where different heterogeneous physical objects like cell phones, computers, sensors, cars, refrigerators, kitchen appliances, TVs, smart homes are connected over the Internet in a global network. Such an immense network of interconnected objects will raise some new dependability and security challenges. In this paper, we propose a way to address...
Oracle's Real Application Cluster (RAC) allows multiple database instances to run on different server nodes in a cluster against a shared set of data files. A critical aspect of an Oracle RAC system is that of instance recovery. When a node suffers from a hardware failure, or a database instance suffers from a software failure, instance recovery is performed by a surviving instance to ensure that...
As the cloud storage is becoming center part for storing data remotely, user no longer store his data in local depository and user can access data from anywhere. Mostly the users store their data to public cloud, it reduces the storage management of data locally. But there are also security issues such as confidentiality, integrity and availability. Shen et al. [6] has proposed an effective integrity...
Availability is one of the key requirements for modern networked system. Availability of a virtualized system can be modelled and analyzed using stochastic models. In our previous work, availability of a virtualized system was modeled using a hierarchical model to incorporate the detailed behavior of virtual machines (VMs)' failure and recovery with respect to the system behavior. In particular, a...
The article is an extension of this paper1. It describes methods for dealing with reliability and fault tolerance issues in cloud-based datacenters. These methods mainly focus on the elimination of a single point of failure within any component of the cloud infrastructure, availability of infrastructure and accessibility of cloud services. Methods for providing the availability of hardware, software...
In nowadays cloud computing systems, leveraging the virtualization technology, the customer's requested data computing or storing service is accommodated by a set of mutual-communicated Virtual Machines (VM) in a scalable and elastic manner. These VMs are placed in one or more datacenter nodes according to nodes' capacities, failure probabilities, etc. The VM placement availability refers to the probability...
Third-party measurements of cloud availability are needed as a checkpoint of cloud providers' quality statements, and ICMP has been proposed to carry on such measurements. Simple ICMP-based measurement schemes, however, provide a poor discrimination between false outages and true cloud outages, unless the cloud outage probability is quite higher than the packet loss rate incurred by probing packets...
Cloud computing environments provide storage capacity, processing power, and other computational resources in a flexible way, enabling fast adaptation to highly dynamic workloads. Multimedia services, such as video streaming, are examples of applications that can use cloud computing to leverage their provisioning capacity. This way, it is possible to offer a large variety of multimedia content in...
Cloud computing has gained substantial research interest, owing to its vast range of services. The major issues in cloud computing are its security and privacy. The term security has multiple facets such as confidentiality, availability and integrity. A perfect security solution must ensure all the security parameters effectively. This paper focuses on the security of data alone. This paper intends...
In the age of internet, when data production has gone off-bounds, organizations are facing a tough challenge in terms of processing, analyzing and storing big data. The major drawback with this data is that it is not only being created at a lightning fast pace but it is also unstructured i.e. does not have a fixed schema. Moreover it is arising from disparate and discrete sources such as the social...
The Mobile-Edge Computing standard promises co-locating edge servers with mobile phone base stations. Web services running on this new ecosystem will have to address the challenges of this new model in order to see its benefits. In this work, we briefly discuss design guidelines for scaling strongly consistent geo-distributed databases to the MEC environment. Following these guidelines, we present...
In the current technological landscape, companies face problems associated with the development of mobile applications and rapid integration with their enterprise systems to ensure the availability of value-added services for its customers in pervasive environment. To fill this gap, a generic model for dynamic switching of communication channels to ensure the principles of transparency in distributed...
In the next years, IPv6 will inevitably replace the IPv4 protocol. Although, taking consciousness about technical details and aspects of security of this "new" protocol is still being poor in network administrators from different companies in the world. Many security attacks performed in IPv4, exploiting vulnerabilities in a certain network, are also feasible in IPv6. That is why we proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.