The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public cloud...
Network Function Virtualization is an emerging paradigm to allow the creation, at software level, of complex network services by composing simpler ones. However, this paradigm shift exposes network services to faults and bottlenecks in the complex software virtualization infrastructure they rely on. Thus, NFV services require effective anomaly detection systems to detect the occurrence of network...
Some companies are willing to execute their business processes (BP) in the cloud for enjoying its benefits. However, they are also reluctant because of the new security risks that using cloud resources introduces. Security risk includes many dimensions, but this work focus on preserving the privacy of the logic of a BP deployed in a multi-cloud context by preventing a coalition of malicious clouds...
With the upsurge in the volume of data and profuse cloud applications, big data analytics becomes very popular in the research communities in industry as well as in academia. This led to the emergence of real-time distributed stream processing systems such as Flink, Storm, Spark, and Samza. These systems sanction complex queries on streaming data to be distributed across multiple worker nodes in a...
The key to maintaining high standards of quality and power conservation of physical machines in data centers lies in efficient consolidation of virtual machines (VMs). Several schemes have been proposed for this purpose; and these include online migration and VM placement — which can offer the best in terms of resource utilization. The consolidation process can be made effective by finding “opportunities”...
The increase in the use of mobile devices from the first decade of this century has enabled users to perform several activities previously only possible through personal computers. However, the use of these devices is impacted by their known computational limitations, such as data processing, RAM memory, storage, and energy autonomy limitations. Considering this context, to measure the impact of the...
As enterprises continue to move their workloads from traditional server-room environments to private cloud-based systems, there is an increasing desire and ability for companies like IBM to centrally monitor the systems on behalf of their customers to proactively help to mitigate any potential failure scenarios. In this paper, we investigate failures caused by software aging affecting an enterprise-class...
With the growing adoption of cloud computing for business systems, the efforts to keep those environments secure are also increasing. Virtualization infrastructures are key to support such systems, but engineers lack means to help them in selecting the best solutions according to their security requirements. The goal of this work is to define and develop a benchmarking approach to assess and compare...
The evolution towards virtualized network functions (VNFs) is expected to enable service agility within the telecommunications industry. To this end, the software (or VNFs) from which such services are composed must be developed and delivered over very short time scales. In order to guarantee the required levels of software quality within such tight schedules, software reliability tools must evolve...
The cloud computing ecosystem comprises hundreds of providers, offering diverse computing services, incompatible APIs, and significantly different pricing models. Cloud application management platforms hide the heterogeneity of the services and APIs, allowing, to varying degrees, portability between providers. These tools remove technical barriers to switching providers, but they do not provide a...
As demands on new software increase, new approaches are needed to help developers ensure Quality of Service (QoS) for their offered service. In this paper we present a QoS modeling approach that complements and extends the standard microservice and component-based software engineering tools by giving the software engineer information on what Non-Functional Requirements (NFRs) and quality constraints...
Virtualization technologies allow cloud providers to optimize server utilization and cost by co-locating services in as few servers as possible. Studies have shown how applications in multi-tenant environments are susceptible to systems anomalies such as abnormal resource usage due to performance interference. Effective detection of such anomalies requires techniques that can adapt autonomously with...
The usage of the service selection approaches across different dynamic service provisioning environments has increased the challenges associated with an effective method that can be used to select a relevant service. The use of service selection approach should depend on certain factors. In order to address this challenge, the literature analysis is conducted on various service selection approaches...
Cloud service providers must ensure effective planning and providing Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) service models based on the data center IT infrastructure. The quality of decision making in the cloud service management depends on the completeness and reliability of the monitoring data and the evaluation of the service level by...
The extreme growth in deployment of cloud based services along with applications requiring high computational complexity has had an adverse effect on energy consumption in data centers. When cloud data centers add more computing capacity and increase in size, they generate more heat, require extra cooling. To counter this effect, energy dissipation must be reduced. Servers consume power even when...
An innovative cyber culture and computing of social governance of citizens is proposed, aimed at the moral metric cloud service of social groups through the leverage of digital monitoring and expert evaluation of social processes and phenomena. Cyber culture is defined as the development level of social, technological, moral and material relations between society, the physical world and cyberspace...
The energy consumption of data centers has been increasing continuously during the last years due to the rising demands of computational power especially in current Grid- and Cloud Computing systems, which directly influence the increment in operational costs as well as carbon dioxide (CO2) emission. To reduce energy consumption within the cloud data center, it required energy-aware virtual machines...
Cloud federation allows interconnected Cloud Computing environments of different Cloud Service Providers (CSPs) to share their resources and deliver more efficient service performance. However, each CSP provides a different level of security in terms of cost and performance. Instead of consuming the whole set of Cloud services that are required to deploy an application through a single CSP, consumers...
Performance is one of the main aspects that should be taken into consideration during the design, development, tuning and optimisation of computer networks supported by cloud computing platforms (CCPs). Queueing network models (QNMs) of CCPs constitute essential quantitative tools of investigation towards identifying acceptable levels of quality-of-service (QoS), whether for upgrading an existing...
Trust management systems provide a means for trustworthy interactions in cloud environments. However, trust establishment could be compromised when malicious cloud users intentionally provide unfair feedbacks to decrease the reputation of some cloud providers or to benefit others. In this paper, we define "Feedback Entropy" as a newmetric to detect unfair rating attacks. As such, we propose...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.