187,130 research outputs found

    A Survey on Live Virtual Machine Migrations and its Techniques

    Get PDF
    Today’s world is internet world. Almost all the people uses internet for accessing different services. In Cloud Computing various cloud consumers demand variety of services as per their dynamically changing needs over the internet. So it is the job of cloud computing to avail all the demanded services to the cloud consumers. But due to the availability of finite resources it is very difficult for cloud providers to provide all the demanded services in time. From the cloud providers’ perspective cloud resources must be allocated in a fair manner. So, it’s a vital issue to meet cloud consumers’ QoS requirements and satisfaction. Virtualization mainly abstracts the resources like CPU and Memory through Virtual Machine for efficient resource utilization. Virtual Machine Migration is one of the key technique for dynamic resource management in cloud computing. This paper mainly addresses key performance issues, challenges and techniques for live virtual machine migration in cloud computing. It also focuses on the key issues related to these existing live virtual machine migration techniques and summarizes them. Keywords: Cloud Computing, Migration, Virtualization, Virtual Machine, Physical Machine, Resource Management, Live Virtual Machine Migration

    Survey on Various Trust Management Issues in Cloud Environments

    Get PDF
    Over the past few years, trust management has been one of the hot topics especially in the area of cloud computing. Well-known benefits resulting from cloud computing adoption, several issues have emerged during its evolution: most of them relate to security, privacy and trust management. In particular, its proliferation has placed even more attention to trust management, representing one of the key challenges in the adoption of cloud computing technologies. This paper proposes a survey of existing trust management models addressing collaboration agreements in cloud computing scenarios. Main limitations of current approaches are outlined and possible improvements are traced, as well as a future research path

    Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management

    Get PDF
                The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here in this research article, we present a comprehensive review of fog computing, differentiating it from cloud computing, also present various use-cases of fog computing in different domains, we came to conclude that Fog computing leads in an efficient energy resource management, leveraging the energy both in terms of consumption and cost scenarios. Further, we highlighted its key features, challenges and issues, resource optimization methods

    Middleware Technologies for Cloud of Things - a survey

    Get PDF
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    Middleware Technologies for Cloud of Things - a survey

    Full text link
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    Dynamic Mobile Cloud Eco System Security - A Review

    Get PDF
    Mobile cloud computing is the technique of using cloud technology and various rich mobile applications are intended to be able to run on a variety of mobile devices using the technique called mobile cloud computing. In recent years, huge amounts of data are stored by the clients which are much more easily to the integration of cloud platforms into mobile systems. The ways of security used in portable device settings are one of the key challenges in this respect as the number of people using smartphones continues to rise. None of the models that have been developed with confidence and privacy for precaution of data in mobile cloud systems are impervious to destructive attacks, despite countless attempts. While mobile cloud computing has great potential, security, privacy, viability, and accessibility concerns must still be considered by both consumers and businesses. Additionally, it emphasizes the use of Canny Card Web Services (CCWS) competition to enhance mobile cloud computing security with IOT. This paper has been presented with more than one user application: a smart house and a smart parking in an educational institution, in the inclusion of IOT with cloud computing for demonstrating various admittance control and endorsement requirement. A review regarding this paper concentrated on a little model that is intended the security and privacy ensureability of data in mobile clouds. Additionally, to manage mobile cloud security difficulties and challenges, it is important to look at the current situation with regard to cloud security breaches, the weaknesses of mobile cloud devices, and the best ways to address these issues in the near future with regard to mobile device management and mobile data protection

    When ERM Met Alma: The Intricacies of Content Management in a Shared Consortia Landscape

    Get PDF
    In 2013, after nearly two decades of operating in a distributed legacy Integrated Library System (ILS) environment on local servers, the Orbis Cascade Alliance, a consortium of public and private academic libraries in Washington, Oregon, and Idaho, began a two-year-long process to migrate its 37 members to a shared implementation of Ex Libris\u27s cloud-based Alma library management system (LMS) and Primo discovery interface. Although much has been written on electronic resource management (ERM) functionality at an institution level, little has been written on serials and ERM functionality and workflows within a shared consortial environment. This article discusses the challenges and opportunities of implementing a consortial-based LMS, with particular emphasis on serials and ERM functionality. Key migration issues related to serials control, acquisitions, licensing, administration, cataloging, statistics, and interoperability are examined at the institutional and large-scale networked levels. Benefits and limitations of using a shared consortial cloud-based LMS are explored, and the overall capabilities of the Alma LMS for electronic resource management are reviewed
    corecore