92,471 research outputs found

    A Study on Resource Allocation Schemes in Edge Cloud Computing

    Get PDF
    北九州市立大学博士(工学)Edge and cloud computing is expected as a novel network architecture for supporting people’s daily lives and work. In edge and cloud computing, users expect to receive a wide variety of services with different requirements in terms of transmission rates on various locations, so there are some important issues regarding efficient service provision to meet user requirements independently of their locations: (1) fair service provision in cloud computing, (2) service provision according to user requirements in edge computing, and (3) efficient transmission in edge and cloud computing. In this study, I propose efficient schemes to allocate and use network resources among flows to solve these issues in edge and cloud computing and show the effectiveness of the proposed schemes through simulation evaluations.doctoral thesi

    Multi Round Selective Encryption using AES over Storage Cloud

    Get PDF
    Cloud computing is the re-incarnation of the client-server architecture. It is highly promising technology because of its unlimited resource provisioning and data storage services which help us in managing the data as per requirements. Due to the use of internet and vital remote servers to maintain the data and applications, the cloud computing environment becomes open for the attackers to attack on the user data and communication services. This paper mainly focuses on the user authentication and data security over the Broker Cloud Computing Paradigm by purposing new cryptographic technique named as Multi Round Selective Encryption using AES. Along with this, we compared our approach with existing cryptographic techniques as AES, Blowfish and Selective encryption to find out its pros and cons. The Multi Round Selective Encryption with AES is the best suitable technique where the file size is large because it gives fast execution by maintaining the encryption complexity as compared to selective encryption technique in public and hybrid cloud

    Development Of A Cloud Computing Application For Water Resources Modelling And Optimization Based On Open Source Software

    Full text link
    Cloud computing is the latest advancement in Information and Communication Technology (ICT) that provides computing as a service or delivers computation, software, data access, storage service without end-user knowledge of the physical location and system configuration. Cloud computing, service oriented architecture and web geographic information systems are new technologies for development of the cloud computing application for water resources modelling and optimization. The cloud application is deployed and tested in a distributed computer environment running on three virtual machines (VMs). The cloud application has five web services for: (1) spatial data infrastructure – 1 (SDI), (2) SDI – 2, (3) support for water resources modelling (4) water resources optimization and 5) user authentication. The cloud application is developed using several programming languages (PHP, Ajax, Java, and JavaScript), libraries (OpenLayers and JQuery) and open-source software components (GeoServer, PostgreSQL and PostGIS) and OGC standards (WMS, WFS and WFT-T). The web services for support of water resources modelling and user authentication are deployed on Amazon Web Services and are communicating using WFS with the two SDI web services. The two SDI web services are working on the two separate VMs providing geospatial data and services. The fourth web service is deployed on a separate VM because of the expected large computational requirements. The cloud application is scalable, interoperable, creates a real time multi-user collaboration platform. All code and components used are open source. The cloud application was tested with concurrent multiple users. The performance, security and utilization of the distributed computer environment are monitored and analysed together with the users’ experience and satisfaction. The applicability of the presented solution and its future are elaborated

    Service Orchestration on a Heterogeneous Cloud Federation

    Get PDF
    During the last years, the cloud computing technology has emerged as a new way to obtain computing resources on demand in a very dynamic fashion and only paying for what you consume. Nowadays, there are several hosting providers which follow this approach, offering resources with different capabilities, prices and SLAs. Therefore, depending on the users' preferences and the application requirements, a resource provider can fit better with them than another one. In this paper, we present an architecture for federating clouds, aggregating resources from different providers, deciding which resources and providers are the best for the users' interests, and coordinating the application deployment in the selected resources giving to the user the impression that a single cloud is used

    Proactive and Dynamic Task Scheduling in Fog-cloud Environment

    Get PDF
    Fog computing was introduced for the first time by Cisco in 2012. Since then, there has been a great number of studies on fog computing, in which vacant and free-of-charge computing resources in local networks provide low-latency services to end devices. Even though traditional architecture with scalable and powerful central servers in cloud can accommodate those tasks, it is costly to allocate resources in cloud to execute all those tasks. In addition, it falls short of satisfying Quality of Service (QoS) requirements in terms of waiting time because of long distance communication between servers and user end devices. In this thesis, we discuss dynamic scheduling problem in fog-cloud collaboration environment for real-time applications when QoS is strict and when an answer is useless if the corresponding application finishes its execution after a pre-defined deadline. By taking into account an admission control procedure to grant only requests whose deadline requirements are feasible with respect to the available resources in the network, we study a proactive scenario using different strategies to calculate schedules and to assign resources, within the admission control procedure to accommodate an incoming request. Then, we propose our heuristic with four variants corresponding to four different strategies, with the adjustment of a trade-off cost-makespan factor in an utility function. When evaluating performance with some baseline methods in such proactive scenario, the numerical results show that our variants can meet deadline requirements for more applications while exploiting more efficiently the resources in the fog layer and being charged less for using cloud. Keywords: fog computing, cloud computing, dynamic scheduling, real-time scheduling, task scheduling, workflow applications, DAG, QoS requirements, heterogeneous systems

    Toward Customizable Multi-tenant SaaS Applications

    Get PDF
    abstract: Nowadays, Computing is so pervasive that it has become indeed the 5th utility (after water, electricity, gas, telephony) as Leonard Kleinrock once envisioned. Evolved from utility computing, cloud computing has emerged as a computing infrastructure that enables rapid delivery of computing resources as a utility in a dynamically scalable, virtualized manner. However, the current industrial cloud computing implementations promote segregation among different cloud providers, which leads to user lockdown because of prohibitive migration cost. On the other hand, Service-Orented Computing (SOC) including service-oriented architecture (SOA) and Web Services (WS) promote standardization and openness with its enabling standards and communication protocols. This thesis proposes a Service-Oriented Cloud Computing Architecture by combining the best attributes of the two paradigms to promote an open, interoperable environment for cloud computing development. Mutil-tenancy SaaS applicantions built on top of SOCCA have more flexibility and are not locked down by a certain platform. Tenants residing on a multi-tenant application appear to be the sole owner of the application and not aware of the existence of others. A multi-tenant SaaS application accommodates each tenant’s unique requirements by allowing tenant-level customization. A complex SaaS application that supports hundreds, even thousands of tenants could have hundreds of customization points with each of them providing multiple options, and this could result in a huge number of ways to customize the application. This dissertation also proposes innovative customization approaches, which studies similar tenants’ customization choices and each individual users behaviors, then provides guided semi-automated customization process for the future tenants. A semi-automated customization process could enable tenants to quickly implement the customization that best suits their business needs.Dissertation/ThesisDoctoral Dissertation Computer Science 201

    Using Design Science to Build a Watermark System for Cloud Rightful Ownership Protection

    Get PDF
    Cloud computing opportunities have presented service options for users that are both economical and flexible to use requirements. However, the risk analysis for the user identifies vulnerabilities for intellectual property ownership and vulnerabilities for the identification of rightful property owners when cloud services are used. It is common for image owners to embed watermarks and other security mechanisms into their property so that the rightful ownership may be identified. In this paper we present a design that overcomes many of the current limitations in cloud watermarking uses; and propose a schema that places responsibility on the cloud provider to have a robust information protection program. Such a design solution lays out an information security architecture that enhances utility for cloud services and gives better options for users to securely place properties in the cloud. The Design Science methodology is used to build the artefact and answer the research question: How can rightful ownership be protected in the Cloud

    A Comprehensive Survey on Data Integrity Proving Schemes in Cloud Storage

    Get PDF
    Cloud computing requires broad security solutions based upon many aspects of a large and lightly integrated system. The cloud data storage service releases the users from the burden of huge local data storage and their preservation by out- sourcing mass data to the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. One of the significant concerns that need to be spoken is to assure the customer of the integrity i.e. rightness of his data in the cloud. The data integrity verification is done by introducing third party auditor (TPA) who has privileges to check the integrity of dynamic data in cloud on behalf of cloud client. Cloud client can get notification from TPA when the data integrity is lost. These systems have sustenance data dynamics via the data operation such as data modification, insertion, deletion. Many work has been done but it lacks the support of either public auditability or active data processes To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: (i) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; (ii) The third party auditing process should bring in no new vulnerabilities towards user data privacy. Here, a proposed scheme is discussed in which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA). This scheme ensures that the storage at the client side is minimal which will be beneficial for the organization. In this paper, we define a survey on Cloud computing and provide the architecture for creating C
    corecore