50,046 research outputs found

    An Approach to Ad hoc Cloud Computing

    Get PDF
    We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provision involves a data center model, in which clusters of machines are dedicated to running cloud infrastructure software. We propose an additional model, the ad hoc cloud, in which infrastructure software is distributed over resources harvested from machines already in existence within an enterprise. In contrast to the data center cloud model, resource levels are not established a priori, nor are resources dedicated exclusively to the cloud while in use. A participating machine is not dedicated to the cloud, but has some other primary purpose such as running interactive processes for a particular user. We outline the major implementation challenges and one approach to tackling them

    Directory-based incentive management services for ad-hoc mobile clouds

    No full text
    Mobile cloud computing is envisioned as a promising approach to augment the computational capabilities of mobile devices for emerging resource-intensive mobile applications. This augmentation is generally achieved through the capabilities of stationary resources in cloud data centers. However, these resources are mostly not free and sometimes not available. Mobile devices are becoming powerful day by day and can form a self-organizing mobile ad-hoc network of nearby devices and offer their resources as on-demand services to available nodes in the network. In the ad-hoc mobile cloud, devices can move after consuming or providing services to one another. During this process, the problem of incentives arises for a node to provide service to another device (or other devices) in the network, which ultimately decreases the motivation of the mobile device to form an ad-hoc mobile cloud. To solve this problem, we propose a directory-based architecture that keeps track of the retribution and reward valuations (in terms of energy saved and consumed) for devices even after they move from one ad-hoc environment to another. From simulation results, we infer that this framework increases the motivation for mobile devices to form a self-organizing proximate mobile cloud network and to share their resources in the network

    A Redundancy-based Security Model for Smart Home

    Get PDF
    Recent developments in smart devices, Cloud Computing and Internet of Things (IoT) are introducing network of intelligent devices. These intelligent devices can be used to develop smart home network. The home appliance in a smart home forms an ad-hoc network. A smart home network architecture can be exploited by compromising the devices it is made up of. Various malicious activities can be performed through such exploitation. This paper presents a security approach to combat this. By using a collaborative and redundant security approach, the ad-hoc network of a smart home would be able to prevent malicious exploitation. The security approach discussed in this paper is a conceptual representation on the proposed security model for smart home networks

    Spontaneous ad hoc mobile cloud computing network

    Full text link
    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.Lacuesta, R.; Lloret, J.; Sendra, S.; Peñalver Herrero, ML. (2014). Spontaneous ad hoc mobile cloud computing network. Scientific World Journal. 2014:1-19. doi:10.1155/2014/232419S1192014Rodrigues, J. J. P. C., Zhou, L., Mendes, L. D. P., Lin, K., & Lloret, J. (2012). Distributed media-aware flow scheduling in cloud computing environment. Computer Communications, 35(15), 1819-1827. doi:10.1016/j.comcom.2012.03.004Feeney, L. M., Ahlgren, B., & Westerlund, A. (2001). Spontaneous networking: an application oriented approach to ad hoc networking. IEEE Communications Magazine, 39(6), 176-181. doi:10.1109/35.925687Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future Generation Computer Systems, 29(1), 84-106. doi:10.1016/j.future.2012.05.023Lacuesta, R., Lloret, J., Garcia, M., & Peñalver, L. (2013). A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation. IEEE Transactions on Parallel and Distributed Systems, 24(4), 629-641. doi:10.1109/tpds.2012.168Lacuesta, R., Lloret, J., Garcia, M., & Peñalver, L. (2011). Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks. Journal of Network and Computer Applications, 34(2), 492-505. doi:10.1016/j.jnca.2010.03.024Lacuesta, R., Lloret, J., Garcia, M., & Peñalver, L. (2010). A Spontaneous Ad Hoc Network to Share WWW Access. EURASIP Journal on Wireless Communications and Networking, 2010(1). doi:10.1155/2010/232083Lacuesta, R., Palacios-Navarro, G., Cetina, C., Peñalver, L., & Lloret, J. (2012). Internet of things: where to be is to trust. EURASIP Journal on Wireless Communications and Networking, 2012(1). doi:10.1186/1687-1499-2012-203Capkun, S., Buttyan, L., & Hubaux, J. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1), 52-64. doi:10.1109/tmc.2003.1195151Goodman, J., & Chandrakasan, A. (2000). An Energy Efficient Reconfigurable Public-Key Cryptography Processor Architecture. Lecture Notes in Computer Science, 175-190. doi:10.1007/3-540-44499-8_13Mayrhofer, R., Ortner, F., Ferscha, A., & Hechinger, M. (2003). Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks. Electronic Notes in Theoretical Computer Science, 85(3), 105-121. doi:10.1016/s1571-0661(04)80687-xMendes, L. D. P., Rodrigues, J. J. P. C., Lloret, J., & Sendra, S. (2014). Cross-Layer Dynamic Admission Control for Cloud-Based Multimedia Sensor Networks. IEEE Systems Journal, 8(1), 235-246. doi:10.1109/jsyst.2013.2260653Dutta, R., & B, A. (2014). Protection of data in unsecured public cloud environment with open, vulnerable networks using threshold-based secret sharing. Network Protocols and Algorithms, 6(1), 58. doi:10.5296/npa.v6i1.486

    Service composition for end-users

    Get PDF
    RESTful services are becoming a popular technology for providing and consuming cloud services. The idea of cloud computing is based on on-demand services and their agile usage. This implies that also personal service compositions and workflows should be supported. Some approaches for RESTful service compositions have been proposed. In practice, such compositions typically present mashup applications, which are composed in an ad-hoc manner. In addition, such approaches and tools are mainly targeted for programmers rather than end-users. In this paper, a user-driven approach for reusable RESTful service compositions is presented. Such compositions can be executed once or they can be configured to be executed repeatedly, for example, to get newest updates from a service once a week

    Cloud Instance Selection Using Parallel K-Means and AHP

    Get PDF
    Managing cloud spend and qualities when selecting cloud instances is cited as one of the timely research challenges in cloud computing. Cloud service consumers are often confronted by too many options and selection is challenging. This is because instance provision can be difficult to comprehend for an average technical user and tactics of cloud provider are far from being transparent biasing the selection. This paper proposes a novel cloud instance selection framework for finding the optimal IaaS purchase strategy for a VARD application in Amazon EC2. Analytical Hierarchy Process (AHP) and parallel K-Means Clustering algorithm are used and combined in Cloud Instance Selection environments. It allows cloud users to get the recommendation about cloud instance types and job submission periods based on requirements such as CPU, RAM, and resource utilisation. The system leverages AHP to select cloud instance type. Besides, AHP results are used by the parallel K-Means clustering model to find the best execution time for a given day according to the user's requirements. Finally, we provide an example to demonstrate the applicability of the approach. Experiments indicate that our approach achieves better results than ad-hoc and cost-driven approaches
    corecore