50,913 research outputs found
Optimal Control of Applications for Hybrid Cloud Services
Development of cloud computing enables to move Big Data in the hybrid cloud
services. This requires research of all processing systems and data structures
for provide QoS. Due to the fact that there are many bottlenecks requires
monitoring and control system when performing a query. The models and
optimization criteria for the design of systems in a hybrid cloud
infrastructures are created. In this article suggested approaches and the
results of this build.Comment: 4 pages, Proc. conf. (not published). arXiv admin note: text overlap
with arXiv:1402.146
Experimental Study of the Cloud Architecture Selection for Effective Big Data Processing
Big data dictate their requirements to the hardware and software. Simple
migration to the cloud data processing, while solving the problem of increasing
computational capabilities, however creates some issues: the need to ensure the
safety, the need to control the quality during data transmission, the need to
optimize requests. Computational cloud does not simply provide scalable
resources but also requires network infrastructure, unknown routes and the
number of user requests. In addition, during functioning situation can occur,
in which you need to change the architecture of the application - part of the
data needs to be placed in a private cloud, part in a public cloud, part stays
on the client
Security and Privacy Issues in Cloud Computing
Cloud computing transforming the way of information technology (IT) for consuming and managing, promising improving cost efficiencies, accelerate innovations, faster time-to-market and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew ex-ponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this chapter, we describe various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: regulatory, security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment
Towards a Swiss National Research Infrastructure
In this position paper we describe the current status and plans for a Swiss
National Research Infrastructure. Swiss academic and research institutions are
very autonomous. While being loosely coupled, they do not rely on any
centralized management entities. Therefore, a coordinated national research
infrastructure can only be established by federating the various resources
available locally at the individual institutions. The Swiss Multi-Science
Computing Grid and the Swiss Academic Compute Cloud projects serve already a
large number of diverse user communities. These projects also allow us to test
the operational setup of such a heterogeneous federated infrastructure
Business Integration as a Service
This paper presents Business Integration as a Service (BIaS) which enables connections between services operating in the Cloud. BIaS integrates different services and business activities to achieve a streamline process. We illustrate this integration using two services; Return on Investment (ROI) Measurement as a Service (RMaaS) and Risk Analysis as a Service (RAaaS) in two case studies at the University of Southampton and Vodafone/Apple. The University of Southampton case study demonstrates the cost-savings and the risk analysis achieved, so two services can work as a single service. The Vodafone/Apple case study illustrates statistical analysis and 3D Visualisation of expected revenue and associated risk. These two cases confirm the benefits of BIaS adoption, including cost reduction and improvements in efficiency and risk analysis. Implementation of BIaS in other organisations is also discussed. Important data arising from the integration of RMaaS and RAaaS are useful for management of University of Southampton and potential and current investors for Vodafone/Apple
Game Theory Meets Network Security: A Tutorial at ACM CCS
The increasingly pervasive connectivity of today's information systems brings
up new challenges to security. Traditional security has accomplished a long way
toward protecting well-defined goals such as confidentiality, integrity,
availability, and authenticity. However, with the growing sophistication of the
attacks and the complexity of the system, the protection using traditional
methods could be cost-prohibitive. A new perspective and a new theoretical
foundation are needed to understand security from a strategic and
decision-making perspective. Game theory provides a natural framework to
capture the adversarial and defensive interactions between an attacker and a
defender. It provides a quantitative assessment of security, prediction of
security outcomes, and a mechanism design tool that can enable
security-by-design and reverse the attacker's advantage. This tutorial provides
an overview of diverse methodologies from game theory that includes games of
incomplete information, dynamic games, mechanism design theory to offer a
modern theoretic underpinning of a science of cybersecurity. The tutorial will
also discuss open problems and research challenges that the CCS community can
address and contribute with an objective to build a multidisciplinary bridge
between cybersecurity, economics, game and decision theory
- âŠ