16,476 research outputs found
Recommended from our members
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services. Nevertheless, a single cloud does not have limitless resources to offer to its users, hence the notion of an Inter-Cloud enviroment where a cloud can use the infrastructure resources of other clouds. However, there is no common framework in existence that allows the srevice owners to seamlessly provision even some basic services across multiple cloud service providers, albeit not due to any inherent incompatibility or proprietary nature of the foundation technologies on which these cloud platforms are built. In this paper we present a novel solution which aims to cover a gap in a subsection of this problem domain. Our solution offer a security architecture that enables service owners to provision a dynamic and service-oriented secure virtual private network on top of multiple cloud IaaS providers. It does this by leveraging the scalability, robustness and flexibility of peer- to-peer overlay techniques to eliminate the manual configuration, key management and peer churn problems encountered in setting up the secure communication channels dynamically, between different components of a typical service that is deployed on multiple clouds. We present the implementation details of our solution as well as experimental results carried out on two commercial clouds
Recommended from our members
Dynamic virtual private network provisioning from multiple cloud infrastructure service providers
The Cloud infrastructure service providers currently provision basic virtualized computing resources as on demand and dynamic services but there is no common framework in existence that allows the seamless provisioning of even these basic services across multiple cloud service providers, although this is not due to any inherent incompatibility or proprietary nature of the foundation technologies on which these cloud platforms are built. We present a solution idea which aims to provide a dynamic and service oriented provisioning of secure virtual private networks on top of multiple cloud infrastructure service providers. This solution leverages the benefits of peer to peer overlay networks, i.e., the flexibility and scalability to handle the churn of nodes joining and leaving the VPNs and can adapt the topology of the VPN as per the requirements of the applications utilizing its intercloud secure communication framework
Plasmon interactions in the quark-gluon plasma
Yang-Mills theory at finite temperature is rewritten as a theory of plasmons
which provides a Hamiltonian framework for perturbation theory with resummation
of hard thermal loops.Comment: 12 pages, LaTeX, minor typos corrected, discussion adde
Recommended from our members
Trust Model for Optimized Cloud Services
Cloud computing with its inherent advantages draws attention for business critical applications, but concurrently expects high level of trust in cloud service providers. Reputation-based trust is emerging as a good choice to model trust of cloud service providers based on available evidence. Many existing reputation based systems either ignore or give less importance to uncertainty linked with the evidence. In this paper, we propose an uncertainty model and define our approach to compute opinion for cloud service providers. Using subjective logic operators along with the computed opinion values, we propose mechanisms to calculate the reputation of cloud service providers. We evaluate and compare our proposed model with existing reputation models
Research support for seafood export production
Marine capture fisheries contributed nearly 60-65% of the total fish
production during the past decade. Out of the total marine landing of 1.4 million
metric tonnes comprising a variety of items, only a few selected species found
their way into the export market. During the 1981-85 period, the volume of
processed marine products exported from India was in the range of 70,000
to 92,000 tonnes per annum. Among the export items one single item, namely,
frozen shrimp constituted the bulk, amounting to more than 60% by volume
and 85% by value. The demand for different fishery items already in the export
markets and several new items for which India has potential for production is
on the increase in the international markets. Mainly on account of production
constraints we have however been unable to fully avail ourselves of the favourable
market opportunities
Estimation of accidental gaps in the data on Sample survey of marine fish landings
In sample surveys carried out to estimate the monthly marine fish landings,
instances often arise when the relevant data in parts are lacking. A statistical
method for the estimation of such gaps has been developed which seems to meet
the requirement within limits
Exploitation and utilization of Marine Fishery Resources
Our marine fish landings, which had been at 1.08 million tonnes in 1970, increased to about 1.24 million tonnes in 1980,
registering an increase of about 15% over a decade. The current level of production is estimated to be about 1.5 million tonnes.
Thus, we are exploiting only an insignificant part of our available resources in the sea
Studies on lantern fish (Benthosema pterotum) 1. Biochemical and microbiological investigation
Lantern-fish, an under-utilised fish is present in abundance, all the year round in tropical and sub-tropical waters. Biochemical and microbiological studies carried out on lantern fish, caught from the Gulfs of Oman and Aden are reported in this paper
Problem of nonadditivity in two-way analysis of variance of data for comparing the efficiency of fishing gears
To bring out the relative efficiency of various types of fishing gears, in the analysis
of catch data, a combination of Tukey's test, consequent transformation and graphical
analysis for outlier elimination has been introduced, which can be advantageously used
for applying ANOVA techniques, Application of these procedures to actual sets of data
showed that nonadditivity in the data was caused by either the presence of outliers, or
the absence of a suitable transformation or both
- тАж