'Big data' analytics can be defined by the requirement for flexible, high throughput computational analysis methods applied to large, heterogeneous datasets. We propose an architectural approach to 'big da...
详细信息
ISBN:
(纸本)9781479978816
'Big data' analytics can be defined by the requirement for flexible, high throughput computational analysis methods applied to large, heterogeneous datasets. We propose an architectural approach to 'big data' challenges in which the movement of data is minimized, and analysis methods are implemented on the data as portable services. We term this approach 'data interlocking'. We demonstrate the feasibility of this approach through a domain specific implementation of a data interlocking architecture, in which an on-demand computational workbench provides portable high-throughput analysis methods to large genomic datasets on cloud infrastructure.
Cloud Adoption Risk Assessment Model is designed for cloud customers to assess the risks that they face by selecting a specific cloud service provider. It is an expert system to evaluate various background information...
详细信息
ISBN:
(纸本)9781479978816
Cloud Adoption Risk Assessment Model is designed for cloud customers to assess the risks that they face by selecting a specific cloud service provider. It is an expert system to evaluate various background information obtained from cloud customers, cloud service providers and other public external sources, and to analyze various risk scenarios. this would facilitate cloud customers in making informed decision to select the cloud service provider withthe most preferable risk profile.
we propose a CloudAdvisor framework that couples two salient features: trustworthiness and transparency measurement. It provides a mechanism to measure trustworthiness based on the history of the cloud provider taking...
详细信息
ISBN:
(纸本)9781479978816
we propose a CloudAdvisor framework that couples two salient features: trustworthiness and transparency measurement. It provides a mechanism to measure trustworthiness based on the history of the cloud provider taking into account evidence support and to measure transparency based on the Cloud Controls Matrix (CCM) framework. the selection process is based on a set of assurance requirements that if are met by the cloud provider or if it has been considered in a tool it could bring assurance and confidence to cloud customers.
Volunteer cloud computing is a paradigm where idle computing resources owned by a certain user are offered in the cloud to be utilised by others in order to reduce operational costs. Engaging people in volunteer cloud...
详细信息
ISBN:
(纸本)9781479978816
Volunteer cloud computing is a paradigm where idle computing resources owned by a certain user are offered in the cloud to be utilised by others in order to reduce operational costs. Engaging people in volunteer cloud computing is an obstacle which requires novel motivational methods, ideally online. Gamification is a method for increasing people motivation and changing their behaviour towards certain tasks in a non-game context. this position paper advocates that gamification is potentially a means to increase people engagement and retention in volunteer cloud computing projects. As an initial step to reach a systematic application of gamification in such projects, we study the relationship between game mechanics and different categories of volunteers and propose a preliminary mapping that relates these two aspects.
Virtual Organizations are dynamic entities that consist of individuals and/or institutions established around a set of resource-sharing rules and conditions. the VO may require the use of on-site (local) and off-site ...
详细信息
We present the IKAROS Metadata service (iMDS) as a utility. the iMDS permit us to form virtual scalable storage formations in order to create user-driven computing facilities with application users and owners playing ...
详细信息
ISBN:
(纸本)9781479978816
We present the IKAROS Metadata service (iMDS) as a utility. the iMDS permit us to form virtual scalable storage formations in order to create user-driven computing facilities with application users and owners playing a decisive role in governance and focusing on placing computer science and the harvesting of 'big data' at the center of scientific discovery. this approach enable users to virtually connect the several different computing facilities (grids, Clouds, HPCs, Data Centers, Local computing Clusters and personal storage devices), being utilized by an international collaborative experiment, on-demand based on their needs.
Security management is a major issue in gridcomputing systems. One approach to provide security is to implement techniques such as encryption and access control on all grid elements. the overhead generated by such an...
详细信息
ISBN:
(纸本)9728865627
Security management is a major issue in gridcomputing systems. One approach to provide security is to implement techniques such as encryption and access control on all grid elements. the overhead generated by such an approach may however limit the advantages of gridcomputing systems;particularly, when the network experiences different types of variations. this paper examines the integration of the notion of adaptive grid service along with security management and accounting. It also provides a fault tolerance technique to build grid systems that are intrusion tolerant.
In recent years energy consumption from ICT has increased due to the popularity of cloud computing. this consumption is also estimated to double every five years. A key topic of recent research is the focus on increas...
详细信息
ISBN:
(纸本)9781479978816
In recent years energy consumption from ICT has increased due to the popularity of cloud computing. this consumption is also estimated to double every five years. A key topic of recent research is the focus on increasing the energy efficiency of ICT, in particular the area of cloud computing. In our research we aim to improve the energy efficiency of cloud computing data centres while maintaining the Quality-of-Service (QoS) expected. A literature review has been conducted into various methods of increasing energy efficiency and the beginnings of experimentation into our own research and theories have been documented in this paper.
In this paper, we investigate how MapReduce and Cloud computing can accelerate performance of applications and scale up the computing resources through a real data mining use case in the Biomedical Sciences. We have p...
详细信息
ISBN:
(纸本)9780769548159
In this paper, we investigate how MapReduce and Cloud computing can accelerate performance of applications and scale up the computing resources through a real data mining use case in the Biomedical Sciences. We have prototyped the data mining task using the MapReduce model and evaluated it in the Cloud. A performance evaluation model has been built for assessing the eff ciency of the prototype. the results, from both experiments and the evaluation model, show the performance and scalability can be enhanced through these advanced technologies.
By GMount, non privilege users can easily and quickly build ad-hoc distributed file systems on any machines reachable via SSH. In the wide-area grid environments, it can scale to hundreds of nodes and works with NAT o...
详细信息
ISBN:
(纸本)9781424425785
By GMount, non privilege users can easily and quickly build ad-hoc distributed file systems on any machines reachable via SSH. In the wide-area grid environments, it can scale to hundreds of nodes and works with NAT or firewall. Given the network topology, the metadata operations of file system are locality-aware. GMount can be effortlessly deployed in multiple clusters without superuser privilege. In this paper, we present the design and implementation of GMount, and shows its viability in a large scale grid platform with over 300 nodes spread across 11 clusters.
暂无评论