1,170 research outputs found

    Cloud Storage and Bioinformatics in a private cloud deployment: Lessons for Data Intensive research

    No full text
    This paper describes service portability for a private cloud deployment, including a detailed case study about Cloud Storage and bioinformatics services developed as part of the Cloud Computing Adoption Framework (CCAF). Our Cloud Storage design and deployment is based on Storage Area Network (SAN) technologies, details of which include functionalities, technical implementation, architecture and user support. Experiments for data services (backup automation, data recovery and data migration) are performed and results confirm backup automation is completed swiftly and is reliable for data-intensive research. The data recovery result confirms that execution time is in proportion to quantity of recovered data, but the failure rate increases in an exponential manner. The data migration result confirms execution time is in proportion to disk volume of migrated data, but again the failure rate increases in an exponential manner. In addition, benefits of CCAF are illustrated using several bioinformatics examples such as tumour modelling, brain imaging, insulin molecules and simulations for medical training. Our Cloud Storage solution described here offers cost reduction, time-saving and user friendliness

    Success Factors in Secure Software Development of Cloud Applications in Germany: A Qualitative-explorative Expert Study

    Get PDF
    The use of cloud computing continues to increase in Germany, according to Germany’s digital association. However, threats to information security stand in the way of a comprehensive acceptance and penetration of cloud computing. Secure software development is described in the standard ISO/IEC 27001, security control A.14.2 “Security in development and support processes” and in the cloud related code of practice standard ISO/IEC 27017 in chapter 14.2 “Security in development and support processes”. Secure software development has the potential to reduce vulnerabilities and thus increase the security level of applications. When implementing a secure software development process of cloud applications, the question for organizations is which factors have a positive influence on success, where success is defined as an increased security level of cloud applications. This paper contributes to answering the questions of (RQ1) what potential success factors exist in secure software development of cloud applications in Germany and (RQ2) what role does strategic and operational aspects play

    Perspectives on resilience in cloud computing: Review and trends

    Get PDF
    The development of resilient distributed systems is seen as essential to maintaining stable business and state-run processes due to information systems now underpinning most aspects of society. Cloud computing is now one of the most pervasive usage paradigms and due its novelty, research surrounding its resilience is largely lacking and often varied in terms of developed solutions. Therefore this paper provides an up-to-date review of resilience work in cloud computing. This includes methods of measuring and evaluating resilience, solutions for enabling resilience and alternative architectures developed with a focus upon ensuring resilience from the ground up. Firstly, resilience is defined within the context of cloud computing in order to categorise the work appropriately. © 2017 IEEE

    Software architecture for the cloud - a roadmap towards control-theoretic, model-based cloud architecture

    Get PDF
    The cloud is a distributed architecture providing resources as tiered services. Through the principles of service-orientation and generally provided using virtualisation, the deployment and provisioning of applications can be managed dynamically, resulting in cloud platforms and applications as interdependent adaptive systems. Dynamically adaptive systems require a representation of requirements as dynamically manageable models, enacted through a controller implementing a feedback look based on a control-theoretic framework. We argue that a control-theoretic, model-based architectural framework for the cloud is needed. While some critical aspects such as uncertainty have already been taken into account, what has not been accounted for are challenges resulting from the cloud architecture as a multi-tiered, distributed environment. We identify challenges and define a framework that aims at a better understanding and a roadmap towards control-theoretic, model-based cloud architecture - driven by software architecture concerns

    Design, Implementation and Experiments for Moving Target Defense Framework

    Get PDF
    The traditional defensive security strategy for distributed systems employs well-established defensive techniques such as; redundancy/replications, firewalls, and encryption to prevent attackers from taking control of the system. However, given sufficient time and resources, all these methods can be defeated, especially when dealing with sophisticated attacks from advanced adversaries that leverage zero-day exploits
    • …
    corecore