10 research outputs found

    The Need of an Optimal QoS Repository and Assessment Framework in Forming a Trusted Relationship in Cloud: A Systematic Review

    Full text link
    © 2017 IEEE. Due to the cost-effectiveness and scalable features of the cloud the demand of its services is increasing every next day. Quality of Service (QOS) is one of the crucial factor in forming a viable Service Level Agreement (SLA) between a consumer and the provider that enable them to establish and maintain a trusted relationship with each other. SLA identifies and depicts the service requirements of the user and the level of service promised by provider. Availability of enormous service solutions is troublesome for cloud users in selecting the right service provider both in terms of price and the degree of promised services. On the other end a service provider need a centralized and reliable QoS repository and assessment framework that help them in offering an optimal amount of marginal resources to requested consumer. Although there are number of existing literatures that assist the interaction parties to achieve their desired goal in some way, however, there are still many gaps that need to be filled for establishing and maintaining a trusted relationship between them. In this paper we tried to identify all those gaps that is necessary for a trusted relationship between a service provider and service consumer. The aim of this research is to present an overview of the existing literature and compare them based on different criteria such as QoS integration, QoS repository, QoS filtering, trusted relationship and an SLA

    FASTCloud: A framework of assessment and selection for trustworthy cloud service based on QoS

    Full text link
    By virtue of technology and benefit advantages, cloud computing has increasingly attracted a large number of potential cloud consumers (PCC) plan to migrate the traditional business to the cloud service. However, trust has become one of the most challenging issues that prevent the PCC from adopting cloud services, especially in trustworthy cloud service selection. Besides, due to the diversity and dynamic of quality of service (QoS) in the cloud environment, the existing trust assessment methods based on the single constant value of QoS attribute and the subjective weight assignment are not good enough to provide an effective solution for PCCs to identify and select a trustworthy cloud service among a wide range of functionally-equivalent cloud service providers (CSPs). To address the challenge, a novel assessment and selection framework for trustworthy cloud service, FASTCloud, is proposed in this study. This framework facilitates PCCs to select a trustworthy cloud service based on their actual QoS requirements. In order to accurately and efficiently assess the trust level of cloud services, a QoS-based trust assessment model is proposed. This model represents a trust level assessment method based on the interval multiple attributes with an objective weight assignment method based on the deviation maximization to adaptively determine the trust level of different cloud services provisioned by candidate CSPs. The advantage of the proposed trust level assessment method in time complexity is demonstrated by the performance analysis and comparison. The experimental result of a case study with an open-source dataset shows that the trust model is efficient in cloud service trust assessment and the FASTCloud can effectively help PCCs select a trustworthy cloud service

    Uma Revisão Sistemática sobre Abordagens em Organizações Virtuais no Contexto de Confiança, Reputação e Computação em Nuvem

    Get PDF
    AsOrganizaçõesVirtuaisrepresentamumaproeminenteformadecola- boração na qual um conjunto de empresas compartilham habilidades, competências e riscos para atender um objetivo em comum. Algumas preocupações surgem durante a colaboração, como, por exemplo, questões relativas a confiança, reputação e o uso de recursos tecnológicos. A confiança e a reputação nas OVs visam minimizar o risco ao lidar com entidades desconhecidas. Já o uso de recursos tecnológicos, como por exemplo computação em nuvem, fornece suporte a oportunidade de colaboração po- rém apresenta alguns problemas relacionados a autenticação, segurança, privacidade e confiança. Portanto, este artigo apresenta uma revisão sistemática cujo objetivo é veri- ficar as abordagens que estão sendo realizadas no contexto das Organizações Virtuais e que estejam relacionadas com pelo menos um dos conceitos de confiança, reputação ou computação em nuvem. Para tal, a busca junto a literatura especializada resultou em 75 artigos, sendo selecionadas 24 deles para análise. Os critérios utilizados para a seleção foram os artigos relevantes nos últimos 5 anos, completos, no idioma inglês e que relacionassem Organização Virtual com pelo menos um dos conceitos de confi- ança, reputação e computação em nuvem. Por conseguinte, identificou-se como cada conceito é abordado e verificou-se que um mesmo conceito apresenta-se de diferentes formas e nenhum dos trabalhos buscou apresentar a integração desses conceitos.

    Network bandwidth aware dynamic automated framework for Virtual Machine Live Migration in cloud environments

    Get PDF
    Live migration is a very important feature of virtualisation, a running VM can be seamlessly moved between different physical hosts. The source VM’s CPU state, storage, memory and network resources can be completely moved to a target host without disrupting the users or running applications. Live VM migration is an extremely powerful tool in many key scenarios such as load balancing, online maintenance, proactive fault tolerance and power management. There are four steps involved in the live VM migration, the setup stage, memory transfer stage, VM storage transfer stage and the network clean up stage. The most important part of live VM migration is transferring the main memory state of the VM from the source to the destination host which can consume a significant amount of network bandwidth in a short period of time. Modern cloud based data centres generate a significant amount of network traffic apart from VM live migration traffic. If VM migration occurs during a peak time, VM migration and user traffic will compete for network bandwidth, then the data centre’s network may not have enough resources to support both VM migration and demands of application users, which would create a bottleneck in the network. Therefore, this research presents a centralised, bandwidth aware, dynamic, and automated framework for live VM migration in Cloud environments. The proposed framework adopted a heuristic approach, and it provides guaranteed bandwidth for VM live migration by controlling user traffic on the network while scheduling live VM migration in an efficient manner. The framework consists with two main components, The Central Controller and the Local Controller. The Local Controller is responsible for collecting resources usage data from VMs and PMs however the Central Controller makes global management decisions. The Central Controller is based on four algorithms which are called a migration policy. The migration policy contains the following algorithms: the host overloaded detection, host underloaded detection, VM selection and VM placement algorithms which are proposed in this research. The proposed migration policy has been implemented in CloudSim and evaluated against two benchmark migration policies in CloudSim. Five evaluation metrics have been used in the simulation to evaluate the performance of the proposed migration policy. The results reveal that the proposed migration policy outperformed the two benchmark policies

    La sécurité des futures architectures convergentes pour des services personnalisés : aspect architectural et protocolaire

    Get PDF
    The emergence and evolution of Next Generation Networks (NGN) have raised several challenges mainly in terms of heterogeneity, mobility and security. In fact, the user is able, in such environment, to have access to many networks, via multiple devices, with a vast choice of services offered by different providers. Furthermore, end-users claim to be constantly connected anywhere, anytime and anyhow. Besides, they want to have a secure access to their services through a dynamic, seamless and continuous session according to their preferences and the desired QoS. In this context, security represents an important concern. In fact, this user-centric session should obviously be secured. However, many challenges arise. In such environment, system boundaries, which were well delimited, become increasingly open. Indeed, there are multiple services which are unknown in advance and multiple communications between services and with users. Besides, heterogeneity of involved resources (terminals, networks and services) in the user session increases the complexity of security tasks. In addition, the different types of mobility (user, terminal, network and service mobility) affect the user-centric session that should be unique, secure and seamless and ensure continuity of services.L’émergence et l’évolution des réseaux de nouvelles génération (NGN) a soulevé plusieurs défis surtout en termes d’hétérogénéité, de mobilité et de sécurité. En effet, l’utilisateur est capable, dans un tel environnement, d’avoir accès à plusieurs réseaux, à travers différents terminaux, avec un choix vaste de services fournis par différents fournisseurs. De plus, les utilisateurs finaux demandent à être constamment connectés n’importe où, n’importe quand et n’importe comment. Ils désirent également avoir un accès sécurisé à leurs services à travers une session dynamique, seamless et continue selon leurs préférences et la QoS demandée. Dans ce contexte, la sécurité représente une composante majeure. Face à cette session user-centric sécurisée, plusieurs défis se posent. L’environnement est de plus en plus ouvert, de multiples services ne sont pas connus d’avance et nous avons une diversité de communications entre les services et les utilisateurs. L’hétérogénéité des ressources (terminaux, réseaux et services) impliquées dans la session de l’utilisateur accentue la complexité des tâches de sécurité. Les différentes déclinaisons de mobilité (mobilité de l’utilisateur, mobilité du terminal, mobilité du réseau et mobilité du service) modifient la session user-centric que l’on veut unique, sécurisée et seamless avec la délivrance d’un service continu

    Energy Efficiency

    Get PDF
    Energy efficiency is finally a common sense term. Nowadays almost everyone knows that using energy more efficiently saves money, reduces the emissions of greenhouse gasses and lowers dependence on imported fossil fuels. We are living in a fossil age at the peak of its strength. Competition for securing resources for fuelling economic development is increasing, price of fuels will increase while availability of would gradually decline. Small nations will be first to suffer if caught unprepared in the midst of the struggle for resources among the large players. Here it is where energy efficiency has a potential to lead toward the natural next step - transition away from imported fossil fuels! Someone said that the only thing more harmful then fossil fuel is fossilized thinking. It is our sincere hope that some of chapters in this book will influence you to take a fresh look at the transition to low carbon economy and the role that energy efficiency can play in that process

    Network traffic management for the next generation Internet

    Get PDF
    Measurement-based performance evaluation of network traffic is a fundamental prerequisite for the provisioning of managed and controlled services in short timescales, as well as for enabling the accountability of network resources. The steady introduction and deployment of the Internet Protocol Next Generation (IPNG-IPv6) promises a network address space that can accommodate any device capable of generating a digital heart-beat. Under such a ubiquitous communication environment, Internet traffic measurement becomes of particular importance, especially for the assured provisioning of differentiated levels of service quality to the different application flows. The non-identical response of flows to the different types of network-imposed performance degradation and the foreseeable expansion of networked devices raise the need for ubiquitous measurement mechanisms that can be equally applicable to different applications and transports. This thesis introduces a new measurement technique that exploits native features of IPv6 to become an integral part of the Internet's operation, and to provide intrinsic support for performance measurements at the universally-present network layer. IPv6 Extension Headers have been used to carry both the triggers that invoke the measurement activity and the instantaneous measurement indicators in-line with the payload data itself, providing a high level of confidence that the behaviour of the real user traffic flows is observed. The in-line measurements mechanism has been critically compared and contrasted to existing measurement techniques, and its design and a software-based prototype implementation have been documented. The developed system has been used to provisionally evaluate numerous performance properties of a diverse set of application flows, over different-capacity IPv6 experimental configurations. Through experimentation and theoretical argumentation, it has been shown that IPv6-based, in-line measurements can form the basis for accurate and low-overhead performance assessment of network traffic flows in short time-scales, by being dynamically deployed where and when required in a multi-service Internet environment.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Applications and Experiences of Quality Control

    Get PDF
    The rich palette of topics set out in this book provides a sufficiently broad overview of the developments in the field of quality control. By providing detailed information on various aspects of quality control, this book can serve as a basis for starting interdisciplinary cooperation, which has increasingly become an integral part of scientific and applied research
    corecore