57,135 research outputs found

    Evaluator services for optimised service placement in distributed heterogeneous cloud infrastructures

    Get PDF
    Optimal placement of demanding real-time interactive applications in a distributed heterogeneous cloud very quickly results in a complex tradeoff between the application constraints and resource capabilities. This requires very detailed information of the various requirements and capabilities of the applications and available resources. In this paper, we present a mathematical model for the service optimization problem and study the concept of evaluator services as a flexible and efficient solution for this complex problem. An evaluator service is a service probe that is deployed in particular runtime environments to assess the feasibility and cost-effectiveness of deploying a specific application in such environment. We discuss how this concept can be incorporated in a general framework such as the FUSION architecture and discuss the key benefits and tradeoffs for doing evaluator-based optimal service placement in widely distributed heterogeneous cloud environments

    Cloud Computing Security for Organizations using Live Signature – TPALM Printing Client Service

    Get PDF
    Cloud is taking over the computing environment in both public as well as private sector. This has increased the use of service-oriented architecture (SOA) for the development of services later deployed in the Cloud. This paper presents a Cloud Security algorithm using SOA 3.0 for secured transactions on the data, which usually governments of countries like USA International Traffic in Arms Regulations (ITAR) and Export Administration Regulations (EAR) requires to be utilized and distributed only within United States by security cleared personal only. In this paper, we describe a novel algorithm and corresponding cloud service as Cloud Monitoring Gateway (CMG). The current service prototype simulates the behavior of actual Cloud Security Gateway Application (CSGA) using the algorithm called as TPALM (The Privacy Authentication Latency Management). This simulation is coarse-grained, but is capable of measuring the privacy authentication on the given variables of a legit user. We also present an evaluation of this service utilization on actual data

    Building a Blockchain-based API Access Control System

    Get PDF
    API providers can expose their service and data via APIs. However, there must be an access control mechanism in place to control which client can access the APIs. Blockchain technology holds significant potential for this use case. While blockchain may introduce latency, it also offers inherent features including decentralization, data immutability, scalability, and traceability. This thesis explores implementing a blockchain-based access control system and conducts performance evaluations. The proposed comprehensive solution features a straightforward architecture and a user-friendly web interface. It has been deployed in a cloud environment for development, testing, and performance assessments. Extensive experiments have been conducted to analyze latency and determine the system's breaking point. It can withstand 14000 client apps loading it simultaneously within the cloud environment where it was deployed

    Software Product Lines for Multi-Cloud Microservices Configuration

    Get PDF
    National audienceMulti-cloud computing [2] and microservices architecture [1] are current trends in the development of cloud applications. Multiple clouds can be used to reduce provider dependence, comply with constraints and regulations, or optimize costs and quality of service. Microservices architecture improves resource usage and scalability by decomposing applications into small highly decoupled services that may be developed, deployed and scaled independently. However, setting up a multi-cloud environment to deploy and run these applications is very complex. Developers must consider the many different available cloud providers' offers to select a set of providers, and configure them accordingly to deploy each of the application services. Microservices may be developed by different teams, using different technologies, and therefore may require different features from cloud providers. Moreover, as the cloud market evolves, providers' features may be introduced or retired, requiring configuration changes. Taking all these factors into account to setup a multi-cloud environment to deploy and run a microservices application is an error-prone and time consuming task, which calls for supporting tools. In this workshop, we will present our approach to automate the setup of multi-cloud environments [4]. Our approach employs software product lines [3] principles and ontology reasoning to get from a high-level description of multi-cloud requirements to a selection of cloud providers and their configurations. In addition, we will highlight current challenges and ongoing work to build self-adaptive multi-cloud environments, capable of identifying optimization opportunities as application requirements and cloud market evolve

    Engineering Model-Based Adaptive Software Systems

    Get PDF
    Adaptive software systems are able to cope with changes in the environment by self-adjusting their structure and behavior. Robustness refers to the ability of the systems to deal with uncertainty, i.e. perturbations (e.g., Denial of Service attacks) or not-modeled system dynamics (e.g., independent cloud applications hosted on the same physical machine) that can affect the quality of the adaptation. To build robust adaptive systems we need models that accurately describe the managed system and methods for how to react to different types of change. In this thesis we introduce techniques that will help an engineer design adaptive systems for web applications. We describe methods to accurately model web applications deployed in cloud in such a way that it accounts for cloud variability and to keep the model synchronized with the actual system at runtime. Using the model, we present methods to optimize the deployed architecture at design- and run-time, uncover bottlenecks and the workloads that saturate them, maintain the service level objective by changing the quantity of available resources (for regular operating conditions or during a Denial of Service attack). We validate the proposed contributions on experiments performed on Amazon EC2 and simulators. The types of applications that benefit the most from our contributions are web-based information systems deployed in cloud

    An innovative IoT service for medical diagnosis

    Get PDF
    Due to the misdiagnose of diseases that increased recently in a scarily manner, many researchers devoted their efforts and deployed technologies to improve the medical diagnosis process and reducing the resulted risk. Accordingly, this paper proposed architecture of a cyber-medicine service for medical diagnosis, based internet of things (IoT) and cloud infrastructure (IaaS). This service offers a shared environment for medical data, and extracted knowledge and findings between patients and doctors in an interactive, secured, elastic and reliable way. It predicts the medical diagnosis and provides an appropriate treatment for the given symptoms and medical conditions based on multiple classifiers to assure high accuracy. Moreover, it entails different functionalities such as on-demand searching for scientific papers and diseases description for unrecognized combination of symptoms using web crawler to enrich the results. Where such searching results from crawler, are processed, analyzed and added to the resident knowledge base (KB) to achieve adaptability and subsidize the service predictive ability

    Energy-Efficient Service-Oriented Architecture for Mobile Cloud Handover

    Get PDF
    Mobile cloud computing uses features to deliver outsourcing data to remotely available mobile devices. However, the flexible nature of the mobile device is a critical challenge for the mobile cloud computing environment. The mobile phone significantly degrades the data transfer performance when initiating the handover process. Thus, an energy-efficient handover process could improve the quality of service (QoS). Here, we introduce a secure energy-efficient and quality-of-service architecture (EEQoSA) for the handover process in the mobile cloud computing environment. The proposed architecture involves four layers: application, the Internet protocol multimedia subsystem (IPMS), communication, and media with connectivity layers. These four layers collectively handle the energy-efficiency, security and QoS parameters. Existing service-oriented architectures designed for mobile cloud computing are based on the symmetric encryption cryptography to support different media services. However, this approach easily allows an adversary to expose the symmetric key and gain access to private data. Thus, our proposed architecture uses the secure and strong authentication (SSA) process at the IPMS layer by protecting the media services from unauthorized users, as the IPMS is the central layer that could be the entry point for an adversary. Furthermore, to extend the mobile lifetime during the handover process, an energy detection (ED) model is deployed at the communication layer to detect the energy level of the mobile device prior to the handover initialization process. The media with the connectivity layer supports the secure handover process using a priority enforcement module that allows only legitimate users to complete the re-registration process after initiating the handover. Finally, the architecture is tested using the CloudSim simulation environment and validated by a comparison with other known service-oriented architectures.https://doi.org/10.1186/s13677-017-0079-
    corecore