699 results on '"Cloud management"'
Search Results
2. A User-Priorities-Based Strategy for Three-Phase Intelligent Recommendation and Negotiating Agents for Cloud Services
- Author
-
Rishi Kumar, Mohd Fadzil Hassan, Muhamad Hariz Muhamad Adnan, Saurabh Shukla, Sohail Safdar, Muhammad Aasim Qureshi, and Abdel-Haleem Abdel-Aty
- Subjects
Agent ,cloud management ,cloud services ,cloud computing ,intelligent system ,negotiation ,recommender system ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
As the field of information technology expands, there is a huge need for cloud service providers (CSP). CSP’s vast solutions and services support Cloud, IoT, Fog, and Edge computing. In today’s competitive cloud market, customer satisfaction is critical more than ever. CSP and consumer satisfaction with service level agreement (SLA) fulfillment have always been given more attention. As a result of signing SLA and CSP agreements to supply resources in high demand, customers are now experiencing issues with resource delivery. Cloud and heterogeneous environments necessitate an intelligent recommender and negotiation agent model (IRNAM) to handle responsibilities in the current system. The Recommender system recommends CSP as per users’ priorities, which eases the filtration process. The negotiation process provided by IRNAM ensures that users’ choices are prioritized with maximum jobs to CSP. IRNAM keeps track of the most critical metrics and can reach decisions quickly and for the best possible deal. It uses an analytical concession algorithm that analyzes consumer and CSP choices to find a reliable, secure server with the simplest solution. The negotiation process uses user’s and CSP choice metrics, performance factors, evaluation measures, and success factors in the best execution time to decide. IRNAM provides a flexible and valuable way for selecting CSP and negotiating for services on the user’s terms while considering CSP satisfaction.
- Published
- 2023
- Full Text
- View/download PDF
3. IT Service Management aus der Cloud – ein Technologievergleich
- Author
-
Landis, Martin, D’Onofrio, Sara, Series Editor, Fröschle, Hans-Peter, Series Editor, Hofmann, Josephine, Series Editor, Knoll, Matthias, Series Editor, Oestereich, Ralf, editor, and Schmidt, Nikolaus, editor
- Published
- 2022
- Full Text
- View/download PDF
4. Cloud Management: An Autoencoder-Based Clustering of Virtual Machines for Data Centre Workload
- Author
-
Sathiya, R. R., Prakash, P., Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Komanapalli, Venkata Lakshmi Narayana, editor, Sivakumaran, N., editor, and Hampannavar, Santoshkumar, editor
- Published
- 2021
- Full Text
- View/download PDF
5. Emerging Paradigms and Practices in Cloud Resource Management
- Author
-
Sharma, Durga Prasad, Singh, Bhupesh Kumar, Gure, Amin Tuni, Choudhury, Tanupriya, Chlamtac, Imrich, Series Editor, Choudhury, Tanupriya, editor, Dewangan, Bhupesh Kumar, editor, Tomar, Ravi, editor, Singh, Bhupesh Kumar, editor, Toe, Teoh Teik, editor, and Nhu, Nguyen Gia, editor
- Published
- 2021
- Full Text
- View/download PDF
6. Parking Management System Using Internet of Things
- Author
-
Sarin, Aditya, Thanawala, Deveshi, Xhafa, Fatos, Series Editor, Suma, V., editor, Bouhmala, Noureddine, editor, and Wang, Haoxiang, editor
- Published
- 2021
- Full Text
- View/download PDF
7. An Optimization Algorithm for IoT Enabling Technology
- Author
-
Chakraborty, Ishita, Das, Prodipto, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Hassanien, Aboul Ella, editor, Bhattacharyya, Siddhartha, editor, Chakrabati, Satyajit, editor, Bhattacharya, Abhishek, editor, and Dutta, Soumi, editor
- Published
- 2021
- Full Text
- View/download PDF
8. Applying an Integrated System of Cloud Management and Wireless Sensing Network to Green Smart Environments—Green Energy Monitoring on Campus.
- Author
-
Tseng, Kuo-Hsiung, Chung, Meng-Yun, Chen, Li-Hsien, and Wei, Ming-Yi
- Subjects
- *
CLEAN energy , *GREEN roofs , *MANAGEMENT information systems , *EARTH temperature , *CIVIL engineering , *SUSTAINABLE construction - Abstract
With increasing urbanization, the application of Internet of things (IoT) technology to city governance has become a trend in architecture, transportation, and healthcare management, making IoT applicable in various domains. This study used IoT to inspect green construction and adopted a front-end sensing system, middle-end wireless transmission, and a back-end multifunctional system structure with cloud management. It integrated civil and electrical engineering to develop environmental monitoring technology and proposed a management information system for the implementation of green engineering. This study collected physical "measurements" of the greening environment on a campus. Ambient temperature and humidity were analyzed to explore the greening and energy-saving benefits of a green roof, a pervious road, and a photovoltaic roof. When the ambient temperature was below 25 °C, the solar panels had an insulation effect on the roof of the building during both 4:00–5:00 and 12:00–13:00, with an optimal insulation effect of 2.45 °C. When the ambient temperature was above 25 °C, the panels had a cooling effect on the roof of the building, whether during 4:00–5:00 or 12:00–13:00, with an optimal cooling effect of 5.77 °C. During the lower temperature period (4:00–5:00), the ecological terrace had an insulation effect on the space beneath, with an effect of approximately 1–3 °C and a mean insulation of 1.95 °C. During the higher temperature period (12:00–13:00), it presented a cooling effect on the space beneath, with an effect of approximately 0.5–9 °C and a mean cooling temperature of 5.16 °C. The cooling effect of the three greening areas on air and ground temperature decreased in the following order: pervious road > photovoltaic roof > ecological terrace. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. Video Surveillance Architecture from the Cloud to the Edge.
- Author
-
McCann, Jeff, Quinn, Liam, McGrath, Sean, and Flanagan, Colin
- Subjects
VIDEO surveillance ,CLOUD computing ,COMPUTER vision - Abstract
This paper examines the use of digital video in public safety and surveillance systems. Traditionally video recordings are used by law enforcement to review events retrospectively and for evidential purposes in the pursuance of criminal prosecution. We also examine how, due to the proliferation of cameras around cities, human operators are challenged to monitor these data feeds in real-time and how the emergence of AI and computer vision solutions can process this data. Computer vision can enable the move from a purely reactive to a predictive, real-time analysis platform. As camera numbers and the resolution and framerate of cameras grow, existing network infrastructure frequently causes challenges provisioning low latency, high bandwidth networking to private or public cloud infrastructure for evidential storage. These technical challenges can provide issues for law enforcement providing a data chain of custody to ensure its admissibility during court proceedings. Emerging technologies offer solutions to overcome these challenges: the use of emerging edge compute capabilities, including the use of on-camera and mobile edge compute nodes providing compute capabilities closer to the data source and new software paradigms, including CI/CD methodologies, and the use of micro-services and containerization to manage and deliver applications across the portfolio of devices, at the edge of the network. Using Amazon Web Services as an example, we review how cloud providers are now overcoming challenges in delivering real time video analytics solutions in the classical cloud model, and how they are enabling services and platforms closer to the edge, while delivering the cloud computing experience of scalability and manageability across different edges of the network. [ABSTRACT FROM AUTHOR]
- Published
- 2022
10. Distributed Logging Service with Distributed Hash Table for Cloud
- Author
-
Kushida, Takayuki, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Hsu, Ching-Hsien, editor, Kallel, Sondès, editor, Lan, Kun-Chan, editor, and Zheng, Zibin, editor
- Published
- 2020
- Full Text
- View/download PDF
11. AI-based acoustic leak detection in water distribution systems
- Author
-
Rangsarit Vanijjirattikhan, Sunisa Khomsay, Nathavuth Kitbutrawat, Kittipong Khomsay, Unpong Supakchukul, Sasiya Udomsuk, Jittiwut Suwatthikul, Nutthaphan Oumtrakul, and Kanchanapun Anusart
- Subjects
Leak detection system ,Cloud management ,Deep neural network ,Machine learning ,Technology - Abstract
Water loss in distribution networks known as Non-Revenue Water (NRW) is one of the major challenges facing water utilities. In a densely populated city, the acoustic listening method manually conducted by waterworks operators during routine leak pinpointing tasks is vital for NRW reduction. However, this method is considered to be typically labor-intensive, skill-dependent, non-systematic, and sometimes imprecise due to fatigue and inexperience of newly trained staff. This paper presents the development of an AI-based water leak detection system with cloud information management. The system can systematically collect and manage leakage sounds and generate a model used by a mobile application to provide operators with guidance for pinpointing leaking pipes. A leakage sound collection and management system was designed and implemented. Leakage sound datasets were collected from some multiple areas of the Metropolitan Waterworks Authority. Machine learning algorithms including Deep Neural Network (DNN), Convolutional Neural Network (CNN), and Support Vector Machine (SVM), were developed and compared. The results show that the DNN performed better than SVM and as well as CNN, but with less complex structure. DNN was then selected to generate a model used in field trials for pinpointing leakage by novice operators. The field trial results show that the accuracy of the system is above 90% and the results were similar to those conducted by experts.
- Published
- 2022
- Full Text
- View/download PDF
12. Application Optimization of Cloud Management Mode in Information Technology in Sudden Social Security Incidents.
- Author
-
Huang, Haining, Xu, Lihua, Lu, Haomin, Lin, Zhencheng, and Yan, Wei
- Subjects
- *
INFORMATION technology management , *INDUSTRIAL efficiency , *CLOUD computing , *RSA algorithm , *SOCIAL change - Abstract
With the change of social structure and management mode, emergency social security incidents have become the focus of social security management. In order to solve the problems of insufficient overall performance and low security in the practical application of cloud management mode in traditional social security emergencies. With the use of improved pick-KX load balancing algorithm and RSA encryption algorithm, this paper optimizes the cloud computing model and applies it to the cloud management mode of emergent social security events. Then the optimized cloud management model is simulated and evaluated by the multi-level fuzzy comprehensive evaluation model. The simulation results reflect that the proposed cloud management model in this paper is able to effectively improve the management effect of social security events. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. Design and Evaluation of Schemes for Replacing Multiple Member Vehicles in Vehicular Clouds.
- Author
-
Choi, Hyunseok, Nam, Youngju, Shin, Yongje, Jung, Kwansoo, and Lee, Euisin
- Subjects
VEHICULAR ad hoc networks ,VEHICLES - Abstract
Vehicular clouds are considered an attractive approach to provide various services such as safety and entertainment applications by sharing resources between vehicles. Due to the free mobility of vehicles, vehicular clouds need to reconstruct by replacing leaving member vehicles with new member vehicles. When multiple member vehicles leave a vehicular cloud at different times, the design of an efficient member vehicle replacement scheme is a very challenging issue on determining the replacement timing. However, the research on the replacement of multiple member vehicles has little interest and is still in its infancy. Therefore, we propose three schemes to replace multiple member vehicles in vehicular clouds at three different replacement timings: MIN, MAX, and AVG. The MIN scheme replaces all of leaving member vehicles at the leaving time of the first leaving member vehicle, while the MAX scheme replaces all of leaving member vehicles at the leaving time of the last leaving member. The AVG scheme replaces all leaving member vehicles at the average time of their leaving times as a compromise between the Min and Max schemes. First, we determine the first leaving time, the last leaving time, and the average leaving time for each scheme by calculating the distance between a cloud requester vehicle and its member vehicles. Next, we choose replacement member vehicles to minimize the wasted resource at the replacement timing in each scheme. Last, we provide the process for releasing the resource of the leaving member vehicles and allocating the resource of the replacement member vehicles in each scheme. Through simulation results conducted in various environments, we compare and evaluate the performance of our three schemes in terms of the success ratio of the cloud maintenance and the amount of the wasted resources. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. A New Multi-Target Compiler Architecture for Edge-Devices and Cloud Management.
- Author
-
GOKCAY, Erhan
- Abstract
Edge computing is the concept where the computation is handled at edge-devices. The transfer of the computation from servers to edge-devices will decrease the massive amount of data transfer generated by edge-devices. There are several efficient management tools for setup and connection purposes, but these management tools cannot provide a unified programming system from a single source code/project. Even though it is possible to control each device efficiently, a global view of the computation is missing in a programming project that includes several edge-devices for computation and data analysis purposes, and the devices need to be programmed individually. A generic workflow engine might automate part of the problem using standard interfaces and predefined objects running on edge-devices. Nevertheless, the approach fails in fine-tuning each edge-device since the computation cannot be moved easily among devices. This paper introduces a new compiler architecture to control and program edge-devices from a single source code. The source code can be distributed to multiple edge-devices using simple compiler directives, and the transfer and communication of the source code with multiple devices are handled transparently. Fine-tuning the source code and code movement between devices becomes very efficient in editing and time. The proposed architecture is a lightweight system with fine-tuned computation and distribution among devices. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
15. Applying an Integrated System of Cloud Management and Wireless Sensing Network to Green Smart Environments—Green Energy Monitoring on Campus
- Author
-
Kuo-Hsiung Tseng, Meng-Yun Chung, Li-Hsien Chen, and Ming-Yi Wei
- Subjects
cloud management ,composite green roof ,green information system ,environmental greening benefits ,Chemical technology ,TP1-1185 - Abstract
With increasing urbanization, the application of Internet of things (IoT) technology to city governance has become a trend in architecture, transportation, and healthcare management, making IoT applicable in various domains. This study used IoT to inspect green construction and adopted a front-end sensing system, middle-end wireless transmission, and a back-end multifunctional system structure with cloud management. It integrated civil and electrical engineering to develop environmental monitoring technology and proposed a management information system for the implementation of green engineering. This study collected physical “measurements” of the greening environment on a campus. Ambient temperature and humidity were analyzed to explore the greening and energy-saving benefits of a green roof, a pervious road, and a photovoltaic roof. When the ambient temperature was below 25 °C, the solar panels had an insulation effect on the roof of the building during both 4:00–5:00 and 12:00–13:00, with an optimal insulation effect of 2.45 °C. When the ambient temperature was above 25 °C, the panels had a cooling effect on the roof of the building, whether during 4:00–5:00 or 12:00–13:00, with an optimal cooling effect of 5.77 °C. During the lower temperature period (4:00–5:00), the ecological terrace had an insulation effect on the space beneath, with an effect of approximately 1–3 °C and a mean insulation of 1.95 °C. During the higher temperature period (12:00–13:00), it presented a cooling effect on the space beneath, with an effect of approximately 0.5–9 °C and a mean cooling temperature of 5.16 °C. The cooling effect of the three greening areas on air and ground temperature decreased in the following order: pervious road > photovoltaic roof > ecological terrace.
- Published
- 2022
- Full Text
- View/download PDF
16. Decomposition-Compensation Method for IT Service Management
- Author
-
Rolik, Oleksandr, Kolesnik, Valerii, Halushko, Dmytro, Kacprzyk, Janusz, Series editor, Pal, Nikhil R., Advisory editor, Bello Perez, Rafael, Advisory editor, Corchado, Emilio S., Advisory editor, Hagras, Hani, Advisory editor, Kóczy, László T., Advisory editor, Kreinovich, Vladik, Advisory editor, Lin, Chin-Teng, Advisory editor, Lu, Jie, Advisory editor, Melin, Patricia, Advisory editor, Nedjah, Nadia, Advisory editor, Nguyen, Ngoc Thanh, Advisory editor, Wang, Jun, Advisory editor, Kulczycki, Piotr, editor, and Mesiar, Radko, editor
- Published
- 2017
- Full Text
- View/download PDF
17. أثر الإدارة السحابية في تطوير المنظمة الذكية دراسة حالة: وزارة الصحة الكويتية
- Author
-
هاجر عبدالحميد الوادي and حنين احمد فريد الصبح
- Subjects
ORGANIZATIONAL change ,ADULT education workshops ,KNOWLEDGE transfer ,INFORMATION technology security ,STATISTICAL sampling - Abstract
Copyright of Global Journal of Economics & Business is the property of Refaad for Studies, Research & Development and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
18. Scalability and Information Exchange Among Autonomous Resource Management Agents
- Author
-
Fagernes, Siri, Couch, Alva L., Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Badonnel, Rémi, editor, Koch, Robert, editor, Pras, Aiko, editor, Drašar, Martin, editor, and Stiller, Burkhard, editor
- Published
- 2016
- Full Text
- View/download PDF
19. Towards Architecture-Based Management of Platforms in Cloud
- Author
-
Mei, Hong, Lü, Jian, Mei, Hong, and Lü, Jian
- Published
- 2016
- Full Text
- View/download PDF
20. Burstiness-aware service level planning for enterprise application clouds
- Author
-
Anas A. Youssef and Diwakar Krishnamurthy
- Subjects
Cloud management ,Service level planning ,Workload burstiness ,Computer engineering. Computer hardware ,TK7885-7895 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract Enterprise applications are being increasingly deployed on cloud infrastructures. Often, a cloud service provider (SP) enters into a Service Level Agreement (SLA) with a cloud subscriber, which specifies performance requirements for the subscriber’s applications. An SP needs systematic Service Level Planning (SLP) tools that can help estimate the resources needed and hence the cost incurred to satisfy their customers’ SLAs. Enterprise applications typically experience bursty workloads and the impact of such bursts needs to be considered during SLP exercises. Unfortunately, most existing approaches do not consider workload burstiness. We propose a Resource Allocation Planning (RAP) technique, which allows an SP to identify a time varying allocation plan of resources to applications that satisfies bursts. Extensive simulation results show that the proposed RAP variants can identify resource allocation plans that satisfy SLAs without exhaustively generating all possible plans. Furthermore, the results show that RAP can permit SPs to more accurately determine the capacity required for meeting specified SLAs compared to other competing techniques especially for bursty workloads.
- Published
- 2017
- Full Text
- View/download PDF
21. CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection
- Author
-
Weizhong Qiang, Gongping Xu, Weiqi Dai, Deqing Zou, and Hai Jin
- Subjects
Virtual machine introspection ,cloud management ,security monitoring ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
IoT generates considerable amounts of data, which often requires leveraging cloud computing to effectively scale the costs of transferring and computing these data. The concern regarding cloud security is more severe because many devices are connected to the cloud. It is important to automatically monitor and control these resources and services to efficiently and securely deliver cloud computing. The writable virtual machine introspection (VMI) technique can not only detect the runtime state of a guest VM from the outside but also update the state from the outside without any need for administrator efforts. Thus, the writable VMI technique can provide the benefit of high automation, which is helpful for automated cloud management. However, the existing writable VMI technique produces high overhead, fails to monitor the VMs distributed on different host nodes, and fails to monitor multiple VMs with heterogeneous guest OSes within a cloud; therefore, it cannot be applied for automated and centralized cloud management. In this paper, we present CloudVMI, which is a writable and crossnode monitoring VMI framework that can overcome the aforementioned issues. CloudVMI solves the semantic gap problem by redirecting the critical execution of system calls issued by the VMI program into the monitored VM. It has strong practicability by allowing one introspection program to inspect heterogeneous guest OSes and to monitor VMs distributed on remote host nodes. Thus, CloudVMI can be directly applied for automated and centralized cloud management. Moreover, we implement some defensive measures to secure CloudVMI itself. To highlight the writable capability and practical usefulness of CloudVMI, we implement four applications based on CloudVMI. CloudVMI is designed, implemented, and systematically evaluated. The experimental results demonstrate that CloudVMI is effective and practical for cloud management and that its performance overhead is acceptable compared with existing VMI systems.
- Published
- 2017
- Full Text
- View/download PDF
22. A New Multi-Target Compiler Architecture for Edge-Devices and Cloud Management
- Author
-
Erhan Gökçay
- Subjects
Multidisciplinary ,Cloud management ,Edge device ,Edge-device programming,Internet of things,Multi-target compiler,Cloud management ,Computer science ,Mühendislik ,General Engineering ,computer.software_genre ,Engineering ,Multi target ,Computer architecture ,Compiler ,Architecture ,computer - Abstract
Edge computing is the concept where the computation is handled at edge-devices. The transfer of the computation from servers to edge-devices will decrease the massive amount of data transfer generated by edge-devices. There are several efficient management tools for setup and connection purposes, but these management tools cannot provide a unified programming system from a single source code/project. Even though it is possible to control each device efficiently, a global view of the computation is missing in a programming project that includes several edge-devices for computation and data analysis purposes, and the devices need to be programmed individually. A generic workflow engine might automate part of the problem using standard interfaces and predefined objects running on edge-devices. Nevertheless, the approach fails in fine-tuning each edge-device since the computation cannot be moved easily among devices. This paper introduces a new compiler architecture to control and program edge-devices from a single source code. The source code can be distributed to multiple edge-devices using simple compiler directives, and the transfer and communication of the source code with multiple devices are handled transparently. Fine-tuning the source code and code movement between devices becomes very efficient in editing and time. The proposed architecture is a lightweight system with fine-tuned computation and distribution among devices.
- Published
- 2022
23. A Cloud Management Case-Based Teaching System for Radiology.
- Author
-
Demigha, Souâd
- Subjects
CASE-based reasoning ,RADIOLOGY ,INTERNET in education ,CLOUD computing ,BIG data ,DISTANCE education ,EDUCATION - Abstract
The paper deals with the design and development of a Cloud Management Case-Based Teaching System with Case-Based-Reasoning (CBR) and Big Data Technologies. "Cloud management" is the management of cloud computing products and services. "Cloud Computing" or "Cloud Learning" is an "Online Learning", or "eLearning", that is available in the Cloud; this means that resources are stored in a virtual environment, accessed from various forms of web-enabled devices. In radiology, "Cloud Computing" is a web-based image sharing platform. It centralizes the radiology infrastructure, imaging software, data storage, and the network configuration delivered to any internet-based computer as a service based on user demand. It will allow a fast deployment of radiology imaging solutions to any user and flexibility in imaging. The flexibility of anywhere, anytime access to medical data allows radiologists to report remotely from outside the hospital. Case-Based Reasoning (CBR) is the process of solving new problems based on the solutions of similar past problems and structured as cases. The medical diagnosis is based on the experts' expertise (past experience). This experience is under form clinical cases. These cases are examples resulting from real situations. This process is similar to the daily practice of experts. Case-based Reasoning is appropriate to medical field. A cloud management system combines software and technologies in a design for managing cloud environments. The paper proposes a case representation model for cloud management grouping clinical and radiological cases and define similarity functions according to the CBR approach. We will illustrate the case representation model by an example on medical field (breast cancer). [ABSTRACT FROM AUTHOR]
- Published
- 2018
24. From Cloud Management to Cloud Governance
- Author
-
Fortis, Teodor-Florin, Munteanu, Victor Ion, Sammes, A.J., Series editor, and Mahmood, Zaigham, editor
- Published
- 2014
- Full Text
- View/download PDF
25. SLAOCMS: A Layered Architecture of SLA Oriented Cloud Management System for Achieving Agreement During Resource Failure
- Author
-
Rajavel, Rajkumar, T, Mala, Kacprzyk, Janusz, Series editor, Babu, B. V., editor, Nagar, Atulya, editor, Deep, Kusum, editor, Pant, Millie, editor, Bansal, Jagdish Chand, editor, Ray, Kanad, editor, and Gupta, Umesh, editor
- Published
- 2014
- Full Text
- View/download PDF
26. Adaptive Heuristic-Based P2P Network Connectivity and Configuration for Resource Availability
- Author
-
Andreou, Andreas, Mavromoustakis, Constandinos X., Mastorakis, George, Bourdena, Athina, Pallis, Evangelos, Patnaik, Srikanta, Series editor, Sethi, Ishwar K., Series editor, Li, Xiaolong, Series editor, Mavromoustakis, Constandinos X., Pallis, Evangelos, and Mastorakis, George
- Published
- 2014
- Full Text
- View/download PDF
27. Towards Process-Oriented Cloud Management with Case-Based Reasoning
- Author
-
Minor, Mirjam, Schulte-Zurhausen, Eric, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Kobsa, Alfred, Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Goebel, Randy, Series editor, Tanaka, Yuzuru, Series editor, Wahlster, Wolfgang, Series editor, Siekmann, Jörg, Series editor, Lamontagne, Luc, editor, and Plaza, Enric, editor
- Published
- 2014
- Full Text
- View/download PDF
28. Generic input template for cloud simulators: A case study of CloudSim.
- Author
-
Jammal, Manar, Hawilo, Hassan, Kanso, Ali, and Shami, Abdallah
- Subjects
CLOUD computing ,INFORMATION & communication technologies ,COMPUTER software ,MUSIC orchestration ,INFORMATION theory - Abstract
Summary: Cloud computing and its service models, such as Platform as a Service (PaaS), have changed the way that computing resources are allocated to Information and Communications Technology enterprises and users. Although multiple cloud providers support dynamic service provisioning, it is necessary to facilitate the management of the cloud infrastructure and applications in order to allow the continuous refinement of cloud models. Therefore, issues are raised regarding the cloud orchestration, including the flexible portability and interoperability of cloud applications among multiple cloud providers. Having said that, there is a need for a standardized design and management of the cloud use cases (during the creation of scenarios, application's deployment, and patching) to ensure efficient applications' migration between different providers. This paper proposes an artifact, GITS, a generic input template for CloudSim and other cloud simulators. GITS can be provided by PaaS offering to manage the creation, monitoring, administration, and patching of infrastructure and applications in the cloud. GITS defines the cloud schema that can be used with conforming cloud models and independent cloud providers; thus, portability and interoperability can be enabled in PaaS cloud models. GITS focuses on the architecture‐based modeling for cloud infrastructure and application not only in terms of computational resources but also in terms of high availability properties associated with infrastructure and applications. The main objective of the GITS template is to provide the cloud user with a modular, simple, readable, and reusable model that still supports the essential components and provide them with the ability to control the applications' execution, deployment, and other management needs in addition to the allocation environment. This paper describes GITS usage, specifically as an input template for CloudSim. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
29. IT Service Management aus der Cloud - ein Technologievergleich.
- Author
-
Landis, Martin
- Abstract
Copyright of HMD: Praxis der Wirtschaftsinformatik is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
30. Verifiable Cloud Data Access: Design, Analysis, and Implementation
- Author
-
Fei Chen, Changkun Jiang, Zhipeng Li, and Jianqiang Li
- Subjects
Cloud computing security ,Cloud management ,Database ,Computer Networks and Communications ,Computer science ,business.industry ,Hash function ,Cloud computing ,computer.software_genre ,Hash table ,Computer Science Applications ,Data access ,Control and Systems Engineering ,Verifiable secret sharing ,Electrical and Electronic Engineering ,business ,computer ,Cloud storage ,Information Systems - Abstract
In this article, we consider the following cloud storage security problem: A user outsources his/her data to a cloud and later frequently updates the data by adding new data items and deleting existing ones. When the user requests an existing data item from the cloud, the cloud may claim that there is no such data item. This could happen due to cloud management issues, hardware/software failures, hackers, or economic incentives, such as saving cloud’s operation costs. The ability to confirm the data existence/nonexistence when accessing a data item on the dynamic outsourced cloud storage is referred to as dynamic verifiable data access (DVDA). Existing cloud security research works, including encrypted search and proof of storage (i.e., proof of retrievability and proof of data possession), are not sufficient for addressing dynamic verifiable data access. In this article, we present a solution for the dynamic verifiable data access problem. In order to support data dynamics and verifiability, we enhance a hash authentication tree that is build on top of a hash table with a new semantics. With the enhanced hash authentication tree, the proposed protocol supports adding/deleting data in the outsourced storage while satisfying data access verifiability requirement simultaneously. Our open-source experimental evaluation shows that it only takes less than 0.1 ms to verify a data access on a dataset with 400 items using communication cost around 1.7 KB.
- Published
- 2022
31. A Framework of Service Selection and Composition for Flexible Network Architecture
- Author
-
Singh, Akhilendra Pratap, Vyas, O. P., Varma, Shirshu, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Singh, Karan, editor, and Awasthi, Amit K., editor
- Published
- 2013
- Full Text
- View/download PDF
32. Resource and Scheduling Management in Cloud Computing Application Paradigm
- Author
-
Papanikolaou, Katerina, Mavromoustakis, Constandinos, and Mahmood, Zaigham, editor
- Published
- 2013
- Full Text
- View/download PDF
33. Runtime Model Based Management of Diverse Cloud Resources
- Author
-
Zhang, Xiaodong, Chen, Xing, Zhang, Ying, Wu, Yihan, Yao, Wei, Huang, Gang, Lin, Qiang, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Moreira, Ana, editor, Schätz, Bernhard, editor, Gray, Jeff, editor, Vallecillo, Antonio, editor, and Clarke, Peter, editor
- Published
- 2013
- Full Text
- View/download PDF
34. Policy4TOSCA: A Policy-Aware Cloud Service Provisioning Approach to Enable Secure Cloud Computing
- Author
-
Waizenegger, Tim, Wieland, Matthias, Binz, Tobias, Breitenbücher, Uwe, Haupt, Florian, Kopp, Oliver, Leymann, Frank, Mitschang, Bernhard, Nowak, Alexander, Wagner, Sebastian, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Meersman, Robert, editor, Panetto, Hervé, editor, Dillon, Tharam, editor, Eder, Johann, editor, Bellahsene, Zohra, editor, Ritter, Norbert, editor, De Leenheer, Pieter, editor, and Dou, Deijing, editor
- Published
- 2013
- Full Text
- View/download PDF
35. Trust and Security Issues in Cloud-Based Learning and Management
- Author
-
Lorenz, Birgy, Kalde, Kätlin, Kikkas, Kaido, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Popescu, Elvira, editor, Li, Qing, editor, Klamma, Ralf, editor, Leung, Howard, editor, and Specht, Marcus, editor
- Published
- 2012
- Full Text
- View/download PDF
36. Cloud Blueprints for Integrating and Managing Cloud Federations
- Author
-
Papazoglou, Michael P., Hutchison, David, Serieseditor, Kanade, Takeo, Serieseditor, Kittler, Josef, Serieseditor, Kleinberg, Jon M., Serieseditor, Mattern, Friedemann, Serieseditor, Mitchell, John C., Serieseditor, Naor, Moni, Serieseditor, Nierstrasz, Oscar, Serieseditor, Pandu Rangan, C., Serieseditor, Steffen, Bernhard, Serieseditor, Sudan, Madhu, Serieseditor, Terzopoulos, Demetri, Serieseditor, Tygar, Doug, Serieseditor, Vardi, Moshe Y., Serieseditor, Weikum, Gerhard, Serieseditor, and Heisel, Maritta, editor
- Published
- 2012
- Full Text
- View/download PDF
37. A Secure Access Control Framework for Cloud Management
- Author
-
Ning Lu, Jiawei Zhang, Wenbo Shi, Ruixiao Wang, and Jianfeng Ma
- Subjects
Cloud management ,Computer Networks and Communications ,business.industry ,Computer science ,Cloud computing ,Access control ,Privilege (computing) ,Permission ,Computer security ,computer.software_genre ,Encryption ,Security token ,Hardware and Architecture ,Role-based access control ,business ,computer ,Software ,Information Systems - Abstract
Cloud operating system (Cloud OS) is the heart of cloud management platform that takes control of various cloud resources. Therefore, it attracts numerous attacks, especially unauthorized access. Many existing works adopt role-based access control (RBAC) model for Cloud OS access control and token-based approaches as user credentials of sessions or transactions between users and cloud, but they fail to resist privilege abuse caused by RBAC policy rules tampering or token hijacking. To addresses this challenging problem, we propose a secure access control framework suitable for resource-centric Cloud OS. For one thing, we propose a new authorization model with cryptographically protected RBAC policy rules. To solve the policy decision problem caused by encrypted policy rules in this model, an approach is developed to transform it into permission searching problem and we further propose a policy decision scheme based on this. For another thing, we achieve user token unlinkability and token-replay-attack resistance by introducing randomization mechanism and leveraging one-show token technique. A proof of concept implementation has been developed and the proposed scheme is proven secure and efficient by security analysis and the performance evaluation.
- Published
- 2021
38. IoT System for Intelligent Firefighting in the Electric Power Industry
- Author
-
Wei He
- Subjects
Process management (computing) ,Multidisciplinary ,Cloud management ,Risk analysis (engineering) ,business.industry ,Computer science ,Control system ,Firefighting ,The Internet ,Train ,Electric power industry ,business ,Internet of Things - Abstract
Traditional fire safety management in the electric power industry has significant drawbacks, including a lack of data, difficulty of maintenance, lack of supervision, and lack of interaction. This type of management lags behind current advanced safety management concepts such as “gate advancement” and “full process management”, and it fails to meet the needs of future energy internet construction and development. In response to these problems, an internet of things system for smart firefighting in the electric power industry was constructed in this study. This system defines a centralized information window, trains a power intelligent firefighting brain, establishes a firefighting cloud management and control system, constructs a power firefighting interaction mechanism, and performs multi-party coordination of firefighting mechanisms to realize concept of “a whole network on one screen and everything in one network” for managing fires.
- Published
- 2021
39. Resource Pricing and Demand Allocation for Revenue Maximization in IaaS Clouds: A Market-Oriented Approach
- Author
-
Jiwei Huang, Bo Cheng, and Songyuan Li
- Subjects
TheoryofComputation_MISCELLANEOUS ,Cloud management ,Operations research ,Computer Networks and Communications ,business.industry ,Computer science ,Quality of service ,TheoryofComputation_GENERAL ,Cloud computing ,Bidding ,Outsourcing ,Resource (project management) ,Incentive compatibility ,Resource management ,Electrical and Electronic Engineering ,business - Abstract
With more users outsourcing their applications to the cloud, resource pricing becomes an important issue for IaaS cloud management. Jointly considering her own bidding budget and the price of cloud resources, each user is self-motivated to purchase cloud resources according to her resource demand which maximizes her own utility. Meanwhile, the cloud service provider (CSP) regulates the price of cloud resources with a certain profitability objective achieved. With an elaborate resource pricing strategy, the goals from users and the CSP are balanced and respectively satisfied to some extent. This article provides an insight into the market-oriented cloud pricing strategy. In specific, we propose an auction market in the IaaS cloud, where multiple users with heterogeneous bidding budgets and QoS requirements subscribe cloud resources according to their resource demands. The resource pricing and demand allocation scheme targeting revenue maximization also satisfies essential properties including budget feasibility, incentive compatibility and envy-freeness. To attack the NP-hardness and non-convexity of revenue maximization problem, we design a price-incentive resource auction mechanism namely RARM, which preserves an ( $1+\alpha $ ) approximation ratio on revenue maximization. Finally, we evaluate our RARM mechanism based on the real-world dataset to certify the efficacy of our proposed approach.
- Published
- 2021
40. Power-Aware Management in Cloud Data Centers
- Author
-
Milenkovic, Milan, Castro-Leon, Enrique, Blakley, James R., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Jaatun, Martin Gilje, editor, Zhao, Gansen, editor, and Rong, Chunming, editor
- Published
- 2009
- Full Text
- View/download PDF
41. A cloud load forecasting model with nonlinear changes using whale optimization algorithm hybrid strategy
- Author
-
Lingling Li, Hua Peng, Wushao Wen, and Ming-Lang Tseng
- Subjects
0209 industrial biotechnology ,Mathematical optimization ,Cloud management ,Computer science ,business.industry ,Computational intelligence ,Cloud computing ,02 engineering and technology ,Swarm intelligence ,Theoretical Computer Science ,020901 industrial engineering & automation ,Elasticity (cloud computing) ,Convergence (routing) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Resource management ,Geometry and Topology ,business ,Software ,Extreme learning machine - Abstract
Cloud services with the property of elasticity are always bearing different loads over time. The efficiency of cloud management can be improved through the accurate prediction for cloud loads, which can be served as the foundation and recommendation for the future developing of the network scheme. As the basis and premise for management and decision making, a good prediction depends on suitable models and research methods. However, the interaction of users and the cloud network is high variability in the time and spatial dimensions, so traditional linear forecasting models cannot always process cloud computing loads well because of nonlinear changes. In this paper, a novel cloud load prediction model is proposed by improving whale optimization algorithm based on the hybrid strategy (HWOA) and combined with extreme learning machine (ELM) for strong nonlinear mapping ability. The proposed cloud load forecasting model is to employ HWOA optimizer to optimize the ELM model random parameters. Main research work includes that (1) the HWOA optimizer is to solve the whale optimizer local extremum problem; (2) the proposed HWOA optimizer reduces the ELM random parameters on cloud load forecasting; (3) the convergence performance is verified by benchmark testing functions; and (4) three groups of simulation experiments are conducted to evaluate the cloud load forecasting results. The results prove that the HWOA optimizer has a good convergence and outperforms the several conventional popular swarm intelligence optimizers. Also, the prediction results verify that our proposed model is more competitive for providing a solid foundation for efficient resource management and maximized economic benefits in cloud environment. For cloud load research groups and practitioners, this paper provides a new idea of cloud load forecasting.
- Published
- 2021
42. An Intelligent Trust Cloud Management Method for Secure Clustering in 5G enabled Internet of Medical Things
- Author
-
Simon X. Yang, Keping Yu, Tan Guo, Chinmay Chakraborty, Liu Yang, and Yinzhi Lu
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Cloud management ,Computer science ,business.industry ,Computer Science - Artificial Intelligence ,Systems and Control (eess.SY) ,Electrical Engineering and Systems Science - Systems and Control ,Computer Science Applications ,World Wide Web ,Computer Science - Networking and Internet Architecture ,Artificial Intelligence (cs.AI) ,Control and Systems Engineering ,FOS: Electrical engineering, electronic engineering, information engineering ,The Internet ,Electrical and Electronic Engineering ,Cluster analysis ,business ,5G ,Information Systems - Abstract
5G edge computing enabled Internet of Medical Things (IoMT) is an efficient technology to provide decentralized medical services while Device-to-device (D2D) communication is a promising paradigm for future 5G networks. To assure secure and reliable communication in 5G edge computing and D2D enabled IoMT systems, this paper presents an intelligent trust cloud management method. Firstly, an active training mechanism is proposed to construct the standard trust clouds. Secondly, individual trust clouds of the IoMT devices can be established through fuzzy trust inferring and recommending. Thirdly, a trust classification scheme is proposed to determine whether an IoMT device is malicious. Finally, a trust cloud update mechanism is presented to make the proposed trust management method adaptive and intelligent under an open wireless medium. Simulation results demonstrate that the proposed method can effectively address the trust uncertainty issue and improve the detection accuracy of malicious devices.
- Published
- 2022
43. Uncertainty-aware Decisions in Cloud Computing
- Author
-
Abbas Khosravi, H M Dipu Kabir, Saeid Nahavandi, Rajkumar Buyya, Mustaneer Rahman, and Subrota K. Mondal
- Subjects
Service (systems architecture) ,General Computer Science ,Cloud management ,business.industry ,Computer science ,Quality of service ,Corporate governance ,Intelligent decision support system ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Data science ,Theoretical Computer Science ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,Profitability index ,business - Abstract
The rapid growth of the cloud industry has increased challenges in the proper governance of the cloud infrastructure. Many intelligent systems have been developing, considering uncertainties in the cloud. Intelligent approaches with the consideration of uncertainties bring optimal management with higher profitability. Uncertainties of different levels and different types exist in various domains of cloud computing. This survey aims to discuss all types of uncertainties and their effect on different components of cloud computing. The article first presents the concept of uncertainty and its quantification. A vast number of uncertain events influence the cloud, as it is connected with the entire world through the internet. Five major uncertain parameters are identified, which are directly affected by numerous uncertain events and affect the performance of the cloud. Notable events affecting major uncertain parameters are also described. Besides, we present notable uncertainty-aware research works in cloud computing. A hype curve on uncertainty-aware approaches in the cloud is also presented to visualize current conditions and future possibilities. We expect the inauguration of numerous uncertainty-aware intelligent systems in cloud management over time. This article may provide a deeper understanding of managing cloud resources with uncertainties efficiently to future cloud researchers.
- Published
- 2021
44. AN INTEGRATED FRAMEWORK FOR SLA-AWARE MULTI-OBJECTIVE TASK SCHEDULING IN CLOUD COMPUTING
- Author
-
Yadaiah Balagoni
- Subjects
Job scheduler ,Cloud management ,Computer science ,Cost effectiveness ,business.industry ,Distributed computing ,Cloud computing ,Provisioning ,computer.software_genre ,Scheduling (computing) ,Service level ,business ,computer ,Efficient energy use - Abstract
Cloud services are offered to consumers based on Service Level Agreements (SLAs) signed between Cloud Service Provider (CSP) and consumer. Due to on-demand provisioning of resources there is exponential growth of cloud consumers. Job scheduling is one of the areas that has attracted researchers to improve performance of cloud management system. Along with the on premise infrastructure, Small and Medium Enterprises (SMEs) also depend on public cloud infrastructure (leading to hybrid cloud) for seamless continuity of their businesses. In this context, ensuring SLAs and effective management of hybrid cloud resources are major challenging issues to be considered. Hence, there is a need for an effective scheduling algorithm which considers multiple objective functions like SLA (deadline), cost and energy while making scheduling decisions. Most of the state of the art schedulers in hybrid cloud environment considered single objective function. However, in real world, it is inadequate for scheduling effectiveness. To overcome this problem, we proposed an integrated framework which ensures SLAs (deadline), cost effectiveness and energy efficiency with an underlying scheduling algorithm known as SCE-TS. This algorithm is evaluated with different workloads and SLAs using a cloud platform. The empirical study revealed that the proposed framework improves scheduling efficiency in terms of meeting SLAs, cost and energy efficiency. It is evaluated and compared with the state of the art and found to be effective in making scheduling decisions in cloud environment.
- Published
- 2021
45. A novel cloud management framework for trust establishment and evaluation in a federated cloud environment
- Author
-
Syeda Hadia Afzaal, Seemab Latif, and Rabia Latif
- Subjects
Service (business) ,Cloud management ,business.industry ,Computer science ,Data_MISCELLANEOUS ,Privacy laws of the United States ,Information technology ,Cloud computing ,Space (commercial competition) ,Computer security ,computer.software_genre ,Theoretical Computer Science ,Service-level agreement ,Hardware and Architecture ,Trust management (information system) ,business ,computer ,Software ,Information Systems - Abstract
Cloud Computing is being utilized by large-scale organizations for data storage and management. It provides advantages like reducing the cost of information technology services by shared computing resources and more data storage space, in addition to on-demand and easy pay-per-use service mechanism. Different Cloud Service Providers (CSPs) form cloud federation to share their resources. In a cloud environment, it is essential to make sure that the customer’s data is fully secured, and standard privacy laws are applied to form a trusted relationship among CSPs and customers. Therefore, the focus of this research is to identify the issues for establishment of a trusted environment and evaluation of trusted levels between customers and their CSP. In this paper, a Federated Cloud Trust Management Framework (FCTMF) is proposed that resolves the trust issues and motivates the cloud providers to successfully participate in cloud federation. The proposed framework evaluates the level of trust based on Service Level Agreement (SLA) parameters, also considering customers and participating CSPs’ feedback. The results and comparison exhibit that the proposed framework is more accurate and feasible in terms of calculating level of trust.
- Published
- 2021
46. The Forefront of Office Environment by Cloud Management
- Author
-
Ryuki Higuchi, Yasuo Karasawa, Sakura Ami, and Shuichi Tatsumi
- Subjects
Engineering management ,Cloud management ,Business ,Electrical and Electronic Engineering - Published
- 2021
47. Proposal for a new layer for energy cloud management: The regulatory layer
- Author
-
Patrícia Stefan de Carvalho, Jones Luís Schaefer, Paulo Smith Schneider, Julio Cezar Mairesse Siluk, and Jose Renes Pinheiro
- Subjects
Fuel Technology ,Nuclear Energy and Engineering ,Cloud management ,Renewable Energy, Sustainability and the Environment ,Computer science ,business.industry ,Energy management ,Distributed computing ,Energy Engineering and Power Technology ,Cloud computing ,Layer (object-oriented design) ,business ,Energy (signal processing) - Published
- 2021
48. Development of unmanned aerial vehicle cloud management system with the application of geographic information technology
- Author
-
Regulation, Cas, Beijing , China, Xiaohan Liao, and Junming Tan
- Subjects
Ecology ,Cloud management ,business.industry ,Computer science ,Geography, Planning and Development ,Earth and Planetary Sciences (miscellaneous) ,Systems engineering ,Information technology ,business ,Nature and Landscape Conservation - Published
- 2021
49. Analysis of Host Resources Utilization by OpenStack in Ubuntu Environment
- Author
-
Pericherla S. Suryateja
- Subjects
devstack ,Multidisciplinary ,Cloud management ,business.industry ,Computer science ,cloud computing ,Cloud computing ,computer.software_genre ,Virtualization ,openstack ,resource utilization ,Resource (project management) ,Software ,Virtual machine ,lcsh:Technology (General) ,Operating system ,lcsh:T1-995 ,lcsh:H1-99 ,Central processing unit ,lcsh:Social sciences (General) ,business ,computer ,Host (network) - Abstract
Cloud computing is one of the frontier technologies, which over the last decade has gained a widespread commercial and educational user base. OpenStack is one of the popular open source cloud management platforms for establishing a private or public Infrastructure-as-a-Service (IAAS) cloud. Although OpenStack started with very few core modules, it now houses nearly 38 modules and is quite complex. Such a complex software bundle is bound to have an impact on the underlying hardware utilization of the host system. The objective is to monitor the usage of system resources by OpenStack on commodity hardware. This paper analyzes the effect of OpenStack on the host machine's hardware. An extensive empirical evaluation has been done on different types of hardware, at different virtualization levels and with different flavours of operating systems comparing the CPU utilization, memory consumption, disk I/O, network, and I/O requests. OpenStack was deployed using Devstack on a single node. The novel aspect of this work is monitoring the resource usage by OpenStack without creating virtual machines on commodity hardware. From the analysis of data, it is observed that standalone machine with Ubuntu server operating system is the least effected by OpenStack and thereby has more available resources for computation of user workloads. Doi: 10.28991/esj-2020-01246 Full Text: PDF
- Published
- 2020
50. Burstiness-aware service level planning for enterprise application clouds.
- Author
-
Youssef, Anas and Krishnamurthy, Diwakar
- Subjects
ENTERPRISE application integration (Computer systems) ,CLOUD computing ,INTERNET service providers ,COMPUTER simulation ,EMPLOYEES' workload - Abstract
Enterprise applications are being increasingly deployed on cloud infrastructures. Often, a cloud service provider (SP) enters into a Service Level Agreement (SLA) with a cloud subscriber, which specifies performance requirements for the subscriber's applications. An SP needs systematic Service Level Planning (SLP) tools that can help estimate the resources needed and hence the cost incurred to satisfy their customers' SLAs. Enterprise applications typically experience bursty workloads and the impact of such bursts needs to be considered during SLP exercises. Unfortunately, most existing approaches do not consider workload burstiness. We propose a Resource Allocation Planning (RAP) technique, which allows an SP to identify a time varying allocation plan of resources to applications that satisfies bursts. Extensive simulation results show that the proposed RAP variants can identify resource allocation plans that satisfy SLAs without exhaustively generating all possible plans. Furthermore, the results show that RAP can permit SPs to more accurately determine the capacity required for meeting specified SLAs compared to other competing techniques especially for bursty workloads. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.