Although the Total Cost of Ownership of the cloud deployment is cheaper than on-premises or colocation, the accumulated costs of usage on the cloud is not an overlooked spending for small and middle-sized business and...
详细信息
ISBN:
(纸本)9781467381048
Although the Total Cost of Ownership of the cloud deployment is cheaper than on-premises or colocation, the accumulated costs of usage on the cloud is not an overlooked spending for small and middle-sized business and is particularly vulnerable to spend overhead due to the unmanaged and insouciant increased nodes. Shortly, renting more nodes to improve the performance of cloud computing is not cost-efficient in a pay-as-you-go environment. In this research, we propose the concept of "Cost-Efficient Awareness" to emphasize the importance of cost-efficiencies on the development of cloud economy. To realize this concept, we have derived a cost improvement process within the MapReduce programming model to cooperate with cloud instance provision. We view this cost improvement process as a discrete optimization problem for cloud instance provision under the premise of economic constraint. When we scale up the service, it is critical to keep the costs down. The concept of "Cost-efficient Awareness" just reflects such a consideration. Based on the result of experiment, we can firmly assure the usability of research direction. We hope the future work can make the cloud service more affordable and approachable.
Cloud computing is increasingly attracting large attention both in academic research and in industrial initiatives. However, despite the popularity, there is a lack of research on the suitability of software tools and...
详细信息
Cloud computing is increasingly attracting large attention both in academic research and in industrial initiatives. However, despite the popularity, there is a lack of research on the suitability of software tools and parameters for creating and deploying Cloud test beds. Virtualization and how to set up virtual environments can be done through software tools, which are available as open source, but there still needs to be work in terms of which tools to use and how to monitor parameters with the suitability of hardware resources available. This paper discusses the concepts of virtualization, as a practical view point, presenting an in-depth critical analysis of open source cloud implementation tools such as CloudStack, Eucalyptus, Nimbus, OpenStack, OpenNebula, OpenIoT, to name a few. This paper analyzes the various toolkits, parameters of these tools, and their usability for researchers looking to deploy their own Cloud test beds. The paper also extends further in developing an experimental case study of using OpenStack to construct and deploy a test bed using current resources available in the labs at the University of Bradford. This paper contributes to the theme of software setups and open source issues for developing Cloud test bed for deploying and constructing private Cloud test bed.
internet of Things (IoT) is a common thing (object) in today39;s world, which serves as part of our routine life activities. Although it benefits the residential district in several ways, various challenges such as ...
internet of Things (IoT) is a common thing (object) in today's world, which serves as part of our routine life activities. Although it benefits the residential district in several ways, various challenges such as data confidentiality and privacy are created. As a matter of fact, the community is concerned what information may leak out via IoT. Therefore, the needs of a secure environment is vital in order to secure the transmitting data from it devices over the network. As a result, in this paper, a secure scheme is suggested on using image steganography as an alternative security mechanism in conjunction with a home server to secure the transmitted data from IP camera as the IoT device to the other devices, either in LAN or WAN networks.
The European Commission and the Japanese National Institute of Information and Communication Technologies (NICT) have made a big effort to promote collaboration between the IoT and Cloud communities and define a commo...
详细信息
The European Commission and the Japanese National Institute of Information and Communication Technologies (NICT) have made a big effort to promote collaboration between the IoT and Cloud communities and define a common baseline for future research. ClouT (Cloud+IoT) project is co-funded as part of the first FP7 EU-Japan cooperation call and gives life to a fruitful collaboration between six European and seven Japanese organizations. The overarching objective is to provide enhanced solutions for smarter cities by using cloud computing to overcome some of the current challenges and limitations in the IoT domain. Through the combination of IoT and cloud computing, smart cities will be able to build new and enhanced services by using the large amounts of data stored in the cloud and by processing it in quasi-real time. This paper describes ClouT Reference Architecture which was outlined by leveraging on existing works performed by established IoT and cloud Research Communities both in Europe and Japan. ClouT Reference Architecture establishes a common ground of objects, definitions and rules mapping the IoT and cloud advantages into a unique context.
It is a key issue that identification and addressing the entity which access the internet through the wireless network with various short distance transmission protocols. To solve the problem, combining with the exist...
详细信息
ISBN:
(纸本)9781467394741
It is a key issue that identification and addressing the entity which access the internet through the wireless network with various short distance transmission protocols. To solve the problem, combining with the existing identification and addressing technology of the internet and the IOT, this paper proposes a method based on distributed ID. This method can be divided into two stages. It first designs the structure of distributed ID. Using the distributed address allocation algorithm, it implements the automatic allocation of the distributed ID as well as the distributed ID resolution among the global IOT. After that, an addressing scheme is designed to meet demands of the IOT addressing. It first defines the structure of addressing and then implements the routing addressing algorithm which combines Cluster-Tree with Ad-hoc On-demand Distance Vector Routing. This scheme could improve the routing efficiency as well as achieve lower cost, lower energy consumption and higher reliability of the addressing. By the simulation on NS-2 platform, the experimental results highlight the feasibility and effectiveness of the proposed method from three aspects: the correctness of identification allocation, the effectiveness of addressing scheme, and the stability of data transmission.
With the rapid development of internet, the computer network is gradually becoming a country39;s economic development foundation and lifeblood of the world dependent on the network is also growing, network security ...
详细信息
With the rapid development of internet, the computer network is gradually becoming a country's economic development foundation and lifeblood of the world dependent on the network is also growing, network security issues attendant becomes increasingly prominent. Network security infrastructure Laboratory, University of Electronic Science and technology is in this context, to begin related research network security. In this paper, the network information system to conduct a comprehensive monitoring and tracking of online behavior of security auditing technology, developed in line with the audit information security management tools needed to provide technical support for the construction of network security information systems, and on the basis of technical studies on research to develop technical standards and can have independent intellectual property rights and international standards to improve the domestic information network defense capabilities to protect the security of computer information systems.
Mobile devices have limited resources in terms of power and bandwidth. Cloud computing offers a way to reduce the power consumption of mobile devices by offloading computation to the cloud. However, offloading computa...
详细信息
Mobile devices have limited resources in terms of power and bandwidth. Cloud computing offers a way to reduce the power consumption of mobile devices by offloading computation to the cloud. However, offloading computation means an increase in communication energy consumption. The trade-off between energy and network characteristics (bandwidth/latency) in a mobile device is very important. Therefore computation offloading must be done strategically. The optimum utilization of the available mobile device resources needs to be assured. In this paper, we propose an intelligent and dynamic algorithm to offload computation to the cloud. We focus on offloading computation based upon the communication topology, device energy and user inputs. We analyze the cost of offloading computation for different user inputs. Based on the inputs, we decide whether to offload the application to the cloud or not. We have simulated our algorithm in MATLAB®, and compared our result to previous approaches. We have found out that our algorithm saves more time, compared to a previous approach, and also reduces device energy usage by moving energy hungry processes to the cloud.
Mastering the characteristics of the server workload is a key prerequisite in planning and good management of resources within a datacenter. However, for the purpose of research, it is very difficult to find reliable ...
详细信息
Mastering the characteristics of the server workload is a key prerequisite in planning and good management of resources within a datacenter. However, for the purpose of research, it is very difficult to find reliable data that can be used to define models adapted to operations in data centers and tests. Google unwounded a portion of this problem by recently publishing a collection of traces from one of its biggest data centers. We conducted a series of analyzes on those data and it basically shows that a large part of the server load relates to non-priority applications and the amount of resources (mainly processors) consumed by servers is much higher than those required for the processing of the received requests. It also highlights the huge amount of wasted energy during processing in those types of data centers.
Measuring the attack damage cost and monitoring the sequence of privilege escalations play a critical role in choosing the right countermeasure by Intrusion Response System (IRS). The existing attack damage cost evalu...
详细信息
Measuring the attack damage cost and monitoring the sequence of privilege escalations play a critical role in choosing the right countermeasure by Intrusion Response System (IRS). The existing attack damage cost evaluation approaches inherit some limitations, such as neglecting the dependencies between system assets, ignoring the backward damage of exploited non-goal services, or omitting the potential damage toward the goal service. In this paper, we propose a defense-centric model to calculate the damage cost of a multi-step attack. The main advantage of this model is providing an accurate damage cost by considering not only the damaged services (non-goal services) but also the potential damage toward the attacker target (goal service). To track the attacker's progress and find the attack path, an Attack-Defense Tree (ADT) is used. The model has been implemented in, but is not limited to, the cloud environment and tested with a multi-step attack scenario.
Modern digital technologies are paving the path to a revolutionary new concept of health and wellness care. Nowadays, many new solutions are being released and put at the reach of most consumers for promoting their he...
详细信息
暂无评论