104,025 research outputs found

    Analysis and Strategy for the Performance Testing in Cloud Computing

    Get PDF
    The aim of this study is the analysis and presentation of some ideas on performance testing in Cloud Computing. Performance is an important factor in testing a web application. Performance testing in cloud computing is different from that of traditional applications. Our research methodology in this article includes an overview of existing works on testing performance in Cloud Computing, focusing on discussion that the traditional benchmarks are not sufficient to analyze performance testing in Cloud Computing. In this study we are focused mainly on analysis performance metrics in Cloud Computing, based on their characteristics such as elasticity, scalability, pay-per-use and fault tolerance, and then we discuss why needed new strategies for performance testing in Cloud Computing and creation of new benchmarks. From this study we conclude that the performance testing and evaluation should be performed using new models testing, which are created according to Cloud Computing characteristics and metrics

    A Systematic Mapping Study of Empirical Studies on Software Cloud Testing Methods

    Get PDF
    Context: Software has become more complicated, dynamic, and asynchronous than ever, making testing more challenging. With the increasing interest in the development of cloud computing, and increasing demand for cloud-based services, it has become essential to systematically review the research in the area of software testing in the context of cloud environments. Objective: The purpose of this systematic mapping study is to provide an overview of the empirical research in the area of software cloud-based testing, in order to build a classification scheme. We investigate functional and non-functional testing methods, the application of these methods, and the purpose of testing using these methods. Method: We searched for electronically available papers in order to find relevant literature and to extract and analyze data about the methods used. Result: We identified 69 primary studies reported in 75 research papers published in academic journals, conferences, and edited books. Conclusion: We found that only a minority of the studies combine rigorous statistical analysis with quantitative results. The majority of the considered studies present early results, using a single experiment to evaluate their proposed solution

    Optimizing IT Modernization through Cloud Migration: Strategies for a Secure, Efficient and Cost-Effective Transition

    Get PDF
    Application migration to the cloud has become increasingly popular due to the numerous opportunities offered by cloud computing. It is a complex process that requires careful planning and execution to ensure a successful outcome. This research aims to provide an overview of the challenges and strategies involved in application migration to the cloud. The findings suggest that main challenges include compatibility, data migration, security and compliance, cost management, performance, and staffing and skills. To mitigate these challenges and ensure a smooth migration process, organizations must implement effective strategies. This research also discussed the effective strategies for cloud migration. These strategies include planning and preparation, assessment and prioritization, testing and validation, data management, security and compliance, cost management, and staffing and skills. The results of the research indicate that a well-defined migration plan, thorough testing, proper data management, strong security controls, cost optimization, and a skilled team are essential for a successful migration process. Organizations must carefully consider these challenges and strategies to ensure that their migration to the cloud is smooth, secure, and cost-effective. By addressing these challenges and implementing effective strategies, organizations can take advantage of the many benefits offered by cloud computing and modernize their IT infrastructure for the future

    DESIGN AND IMPLEMENTATION OF A COMMUNITY PLATFORM FOR THE EVALUATION AND SELECTION OF CLOUD COMPUTING SERVICES: A MARKET ANALYSIS

    Get PDF
    The large number of available Cloud Computing Services makes it hard for companies to keep an overview of the market and to identify the services that best fit their needs. Also, the search for the most suitable Cloud Computing Services often takes too much time and money. The community platform presented in this article was designed to assist companies and users in solving this problem by enabling them to identify relevant Cloud Computing Services. Furthermore, users have the option of evaluating individual services and get access to the evaluations submitted to the community platform by other users. The paper describes the design and the prototypical implementation of the platform and introduces a maturity model for the quality assessment of Cloud Computing Services listed in the platform’s underlying database. The authors also provide recommendations for further action based on a first analysis of the market situation. Our research can be characterized as a design-oriented research approach that focuses on the design of IT artifacts (i.e. community platform and underlying maturity model). Both IT artifacts are evaluated by means of expert interviews and by users giving us feedback when testing our community platform

    Automated analysis of feature models: Quo vadis?

    Get PDF
    Feature models have been used since the 90's to describe software product lines as a way of reusing common parts in a family of software systems. In 2010, a systematic literature review was published summarizing the advances and settling the basis of the area of Automated Analysis of Feature Models (AAFM). From then on, different studies have applied the AAFM in different domains. In this paper, we provide an overview of the evolution of this field since 2010 by performing a systematic mapping study considering 423 primary sources. We found six different variability facets where the AAFM is being applied that define the tendencies: product configuration and derivation; testing and evolution; reverse engineering; multi-model variability-analysis; variability modelling and variability-intensive systems. We also confirmed that there is a lack of industrial evidence in most of the cases. Finally, we present where and when the papers have been published and who are the authors and institutions that are contributing to the field. We observed that the maturity is proven by the increment in the number of journals published along the years as well as the diversity of conferences and workshops where papers are published. We also suggest some synergies with other areas such as cloud or mobile computing among others that can motivate further research in the future.Ministerio de Economía y Competitividad TIN2015-70560-RJunta de Andalucía TIC-186

    Technical Report on Deploying a highly secured OpenStack Cloud Infrastructure using BradStack as a Case Study

    Full text link
    Cloud computing has emerged as a popular paradigm and an attractive model for providing a reliable distributed computing model.it is increasing attracting huge attention both in academic research and industrial initiatives. Cloud deployments are paramount for institution and organizations of all scales. The availability of a flexible, free open source cloud platform designed with no propriety software and the ability of its integration with legacy systems and third-party applications are fundamental. Open stack is a free and opensource software released under the terms of Apache license with a fragmented and distributed architecture making it highly flexible. This project was initiated and aimed at designing a secured cloud infrastructure called BradStack, which is built on OpenStack in the Computing Laboratory at the University of Bradford. In this report, we present and discuss the steps required in deploying a secured BradStack Multi-node cloud infrastructure and conducting Penetration testing on OpenStack Services to validate the effectiveness of the security controls on the BradStack platform. This report serves as a practical guideline, focusing on security and practical infrastructure related issues. It also serves as a reference for institutions looking at the possibilities of implementing a secured cloud solution.Comment: 38 pages, 19 figures
    corecore