Дисертації з теми "Clod computing"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Clod computing.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 дисертацій для дослідження на тему "Clod computing".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Lebedeva, A. O. "Cloud computing." Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/33692.

Повний текст джерела
Анотація:
Cloud Computing is a revolution that will define IT in the second decade of the 21st Century. It have become the basis for radical business innovation and new business models, and for significant improvements in the effectiveness of anyone using information technology. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/33692
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Begic, Dina. "Cloud Computing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/5697/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Matteazzi, Piergiorgio <1969&gt. "Cloud computing." Master's Degree Thesis, Università Ca' Foscari Venezia, 2015. http://hdl.handle.net/10579/6952.

Повний текст джерела
Анотація:
L’obiettivo della tesi è valutare il Cloud Computing dal punto di vista dei vantaggi/svantaggi che le aziende possono trarne, e quali motivi rallentano la diffusione di tale tecnologia. Il cloud computing è da anni un argomento di discussione e analisi nel mondo accademico e dell’Information Technology. Sono state date definizioni che con l’evoluzione tecnologica degli strumenti a disposizione dei Provider si sono ampliate e consolidate. La sua natura di servizio non chiaramente localizzato ha generato diverse problematiche, non solo a livello tecnologico ma anche a livello legale (dei problemi legali non ci siamo occupati specificamente, ma li citiamo in quanto causa di frizioni nell’adozione di tale tecnologia). Per esempio all’interno della comunità economica, al fine di stimolare l’adozione del cloud computing, si sta promuovendo un processo per uniformare la normativa sulla proprietà dei dati. Alcune grosse aziende come CISCO, per ovviare alla inadeguatezza della normativa, inseriscono nel contratto di cloud clausule dove si assumono i rischi derivanti dalle diverse normative presenti ove i dati vengono collocati. Partendo dalla definizione, analizzando l’implementazione nonchè l’evoluzione degli strumenti a disposizione di chi programma in questo ambito, ci si rende conto quanto questo paradigma sia in evoluzione, e quanto ancora possa crescere. Si sta facendo un grande lavoro sia sulla virtualizzazione delle reti, sia sulle tecnologie di storage, che in futuro permetteranno con la diffusione della banda larga, di superare determinati limiti ad oggi presenti in determinati ambiti del Cloud, favorendone la diffusione e l’utilizzo. Dallo sviluppo e analisi svolta, si evidenzia come il paradigma cloud sia altamente modulabile rispetto alle esigenze aziendali proprio per le numerose opzioni e soluzioni tecnologiche, software e gestionali. Di seguito si riassumono gli elementi di vantaggio/svantaggio rilevabili nel paradigma cloud.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gorelik, Eugene. "Cloud computing models." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/79811.

Повний текст джерела
Анотація:
Thesis (S.M. in Engineering and Management)--Massachusetts Institute of Technology, Engineering Systems Division, 2013.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 79-80).
Information Technology has always been considered a major pain point of enterprise organizations, from the perspectives of both cost and management. However, the information technology industry has experienced a dramatic shift in the past decade - factors such as hardware commoditization, open-source software, virtualization, workforce globalization, and agile IT processes have supported the development of new technology and business models. Cloud computing now offers organizations more choices regarding how to run infrastructures, save costs, and delegate liabilities to third-party providers. It has become an integral part of technology and business models, and has forced businesses to adapt to new technology strategies. Accordingly, the demand for cloud computing has forced the development of new market offerings, representing various cloud service and delivery models. These models significantly expand the range of available options, and task organizations with dilemmas over which cloud computing model to employ. This thesis poses analysis of available cloud computing models and potential future cloud computing trends. Comparative analysis includes cloud services delivery (SaaS, PaaS, IaaS) and deployment models (private, public, and hybrid). Cloud computing paradigms are discussed in the context of technical, business, and human factors, analyzing how business and technology strategy could be impacted by the following aspects of cloud computing: --Architecture --Security --Costs --Hardware/software trends (commodity vs. brands, open vs. closed-source) --Organizational/human Factors To provide a systematic approach to the research presented in this paper, cloud taxonomy is introduced to classify and compare the available cloud service offerings. In particular, this thesis focuses on the services of a few major cloud providers. Amazon Web Services (AWS) will be used as a base in many examples because this cloud provider represents approximately 70% of the current public cloud services market. Amazon's AWS has become a cloud services trend-setter, and a reference point for other cloud service providers. The analysis of cloud computing models has shown that public cloud deployment model is likely to stay dominant and keep expanding further. Private and Hybrid deployment models are going to stay for years ahead but their market share is going to continuously drop. In the long-term private and Hybrid cloud models most probably will be used only for specific business cases. IaaS service delivery model is likely to keep losing market share to PaaS and SaaS models because companies realize more value and resource-savings from software and platform services rather than infrastructure. In the near future we can expect significant number of market consolidations with few large players retaining market control at the end.
by Eugene Gorelik.
S.M.in Engineering and Management
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sousa, Francisco Cordeiro de. "Mainroad: cloud computing." Master's thesis, NSBE - UNL, 2010. http://hdl.handle.net/10362/10316.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Imine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.

Повний текст джерела
Анотація:
Ces dernières années, nous assistons à une immense révolution numérique de l’internet où de nombreuses applications, innovantes telles que l’internet des objets, les voitures autonomes, etc., ont émergé. Par conséquent, l’adoption des technologies d’externalisations des données, telles que le cloud ou le fog computing, afin de gérer cette expansion technologique semble inévitable. Cependant, l’utilisation du cloud ou du fog computing en tant que plateforme d’externalisation pour le stockage ou le partage des données crée plusieurs défis scientifiques. En effet, externaliser ses données signifie que l’utilisateur perd le contrôle sur ces derniers. D’où la sécurité des données devienne une préoccupation majeure qui doit être proprement traitée. C’est dans ce contexte que s’inscrivent les travaux de cette thèse dans laquelle nous avons déterminé dans un premier temps les principaux problèmes de sécurité liés à l’adoption du cloud et du fog computing. Puis, nous avons adressé trois problématiques de sécurité majeure, qui sont : 1 - Le contrôle d’accès aux données dans une architecture de type Cloud storage, où nous avons proposé une nouvelle solution de contrôle d’accès basée sur le chiffrement à base d’attributs. Notre solution assure un contrôle d’accès souple et à grains fins. De plus, elle permet d’effectuer une révocation immédiate des utilisateurs et des attributs sans aucune mise à jour des clés de chiffrement fournies aux utilisateurs. 2 - Le problème de l’authentification mutuelle entre les utilisateurs et les serveurs Fog dans une architecture Fog computing, où nous avons proposé un nouveau schéma d’authentification efficace, qui assure l’authentification mutuelle et qui est robuste contre les comportements malicieux des serveurs Fog. 3 - Le problème de traçabilité et de la protection de la vie privée dans le cadre des applications de partage d’informations publiques, où nous avons proposé une nouvelle solution pour le partage d’informations publiques assurant le service de traçabilité tout en préservant les informations privées des utilisateurs. Avec notre solution, les serveurs d’externalisations authentifient les utilisateurs sans pouvoir obtenir des informations sur leur vie privée. En cas de comportements malicieux, notre solution permet de tracer les utilisateurs malveillants grâce à une autorité
These last years, we are witnessing a real digital revolution of Internet where many innovative applications such as Internet of Things, autonomous cars, etc., have emerged. Consequently, adopting externalization technologies such as cloud and fog computing to handle this technological expansion seems to be an inevitable outcome. However, using the cloud or fog computing as a data repository opens many challenges in prospect. This thesis addresses security issues in cloud and fog computing which is a major challenge that need to be appropriately overcomed. Indeed, adopting these technologies means that the users lose control over their own data, which exposes it to several security threats. Therefore, we first investigated the main security issues facing the adoption of cloud and fog computing technologies. As one of the main challenges pointed in our investigation, access control is indeed a cornerstone of data security. An efficient access control mechanism must provide enforced and flexible access policies that ensure data protection, even from the service provider. Hence, we proposed a novel secure and efficient attribute based access control scheme for cloud data-storage applications. Our solution ensures flexible and fine-grained access control and prevents security degradations. Moreover, it performs immediate users and attributes revocation without any key regeneration. Authentication service in fog computing architecture is another issue that we have addressed in this thesis. Some traditional authentication schemes endure latency issues while others do not satisfy fog computing requirements such as mutual authentication between end-devices and fog servers. Thus, we have proposed a new, secure and efficient authentication scheme that ensures mutual authentication at the edge of the network and remedies to fog servers' misbehaviors.Finally, we tackled accountability and privacy-preserving challenges in information-sharing applications for which several proposals in the literature have treated privacy issues, but few of them have considered accountability service. Therefore, we have proposed a novel accountable privacy preserving solution for public information sharing in data externalization platforms. Externalization servers in our scheme authenticate any user in the system without violating its privacy. In case of misbehavior, our solution allows to trace malicious users thanks to an authority
Стилі APA, Harvard, Vancouver, ISO та ін.
7

TAPANELLI, Pietro. "Cloud computing contracts." Doctoral thesis, Università degli Studi di Camerino, 2014. http://hdl.handle.net/11581/401831.

Повний текст джерела
Анотація:
Cloud computing services are ubiquitous: for small and large companies the phenomenon of cloud computing is nowadays a standard business practice. This work would compile an analysis about the contractual issues related to the different services provided by all IT services provider. There are faced not only legal topics strictly connected to the personal data protection because, as the thesis will show, there are several legal acts provided by European Union, Italy (and from all EU's member states) and data protection authorities (both nation and international) that discipline the entire data protection topic in the cloud computing era. The legislation over cloud computing contracts, on the contrary, is totally absent and only the contractual instrument can be used to point out and specify duties and obligations between the contractual cloud parties, but the problem to find the proper legal discipline is not easy to solve. This work analyze the state of the art and provide a possible solution in order to find the legal discipline of cloud computing contracts, especially using the theory of ''connected contracts''.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Aliperti, Francesco. "Il Cloud Computing." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2595.

Повний текст джерела
Анотація:
2015 - 2016
According to the definition of National Institute of Standards and Technology (NIST) dell’U.S. Departement of Commerce, cloud computing consists of a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and service) that can be rapidely provisioned and released with minimal management effort or service provider interaction; a new form of storage and data processing on a virtual platform. The first chapter define the phenomenon, describing the models and typologies, highlighting the benefits and the risks, as well as the legal problems associated with it. In particular, as the data and their processing are the object of the services offered by the cloud system, it is of particular importance that those aspects of the protection of the personal data of cloud service users are clarified as necessary, preliminary, a policy of prevention, aimed at informing about the risks. These issues are highlighted by the Guarantor for the Protection of Personal Data, which, more than once, has intervened in order to encourage a conscious and correct use of the cloud system. In the second chapter, the right to privacy is investigated in the current context of technological evolution. Some fundamental judgments of European jurisprudence are reviewed (judgments: Lindqvist, Costeja, Scherms) on the protection of privacy in the internet, highlighting the points of contact and distance to the Italian one, with reference also to a recent judgment of the Spanish High Tribunal. It is noted, however, that in the diversity of solutions offered, conflict between the various interests at stake can only be solved by reason of their careful balancing. Looking back on its evolution, it is clear that the right in question (which has expanded its content by including the right to the protection of personal data), in the light of what the European Court of Justice has stated, is not absolute prerogative, but must be considered in the light of its social function. The following is a review of European Regulation 2016/679 (which will be directly applicable in all EU countries from 25 May 2018), as it represents the instrument for formalizing the new digital course for the protection of Personal data, at Community and non-EU level. In particular, they analyze the novelties it introduces and the archives on which it relies on the entire privacy system. It is also intended to specify the spatial scope of application, in the light of the criteria set out in Article 3 thereof. In the third chapter, focusing on the most significant aspect of the technology under discussion (the clear separation between data ownership and processing and possession and control of data), the research analyzes the topic of ‘processing’ personal data the light of the opinions of the Italian and European Regulatory Authority (Art. 29 Group) and, in particular, of the recent European Regulation 2016/679 and of the Code of Conduct, 26 September 2016 of the CISPE. The topic that inevitably interfere with cloud technology, especially today, in a context where the scope for sharing and personal data collection has increased significantly, allowing both private companies and public authorities to use personal data, such as in the pursuit of their activities. This also in view of the fact that cloud services allow to ‘process’ and ‘store’ data on server systems deployed in different parts of the planet, where it is necessary to verify the existence of an ‘adequate level of protection’ in order to ensure to the party concerned a ‘substantially equivalent’ protection to that guaranteed within the Union. To this end, the essential premise for which it is necessary to inform about the risks is to clarify, in the light of the provisions of the Privacy Policy 2016 and of the Code of Conduct, 26 September 2016 of CISPE, issues such as: roles and obligations between controller and processor; the informational omissions of the service provider and the user’s unknowingness; keeping data in cloud computing and transferring them to a ‘third country’ after the judgments of the Court of Justice; the question of the portability of their data on other Csp (problem of the c.d. ‘vendor lock-in’); the data breach notification and the data protection in the relationship between constumer and provider. [edited by Author]
XXIX n.s.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cordone, Luigi. "L’evoluzione del Cloud Computing: Il Serverless Computing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Знайти повний текст джерела
Анотація:
Il Serverless computing è l’evoluzione delle piattaforme cloud nella direzione di un codice puramente cloud-native. Esso ha l’obiettivo di facilitare il più possibile il lavoro degli sviluppatori evitando loro il compito di gestione e manutenzione delle infrastrutture, fornendo architetture auto-funzionanti che svolgano parte del lavoro per loro e riducendo così i tempi e costi. L’uso di questa tecnologia ha avuto un rapido e deciso aumento negli ultimi due anni, con un tasso di crescita del 700%, e ha le carte in regola per essere uno dei principali approcci di sviluppo in ambito IT del futuro. Il Serverless è un modello di servizio emergente che punta a semplificare l’approccio alla programmazione liberando il programmatore da tutti quegli aspetti che esulano dalla scrittura del codice. In questa tesi si fornisce una panoramica sul Serverless computing e si approfondirà l’ambito di utilizzo di serverless, il suo funzionamento, le tecnologie di cui si serve, come può imporsi nel mercato e per quale motivo dovrebbe poter soppiantare le soluzioni già presenti e già stabilmente radicate in ambito aziendale.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Datla, Dinesh. "Wireless Distributed Computing in Cloud Computing Networks." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/51729.

Повний текст джерела
Анотація:
The explosion in growth of smart wireless devices has increased the ubiquitous presence of computational resources and location-based data. This new reality of numerous wireless devices capable of collecting, sharing, and processing information, makes possible an avenue for new enhanced applications. Multiple radio nodes with diverse functionalities can form a wireless cloud computing network (WCCN) and collaborate on executing complex applications using wireless distributed computing (WDC). Such a dynamically composed virtual cloud environment can offer services and resources hosted by individual nodes for consumption by user applications. This dissertation proposes an architectural framework for WCCNs and presents the different phases of its development, namely, development of a mathematical system model of WCCNs, simulation analysis of the performance benefits offered by WCCNs, design of decision-making mechanisms in the architecture, and development of a prototype to validate the proposed architecture. The dissertation presents a system model that captures power consumption, energy consumption, and latency experienced by computational and communication activities in a typical WCCN. In addition, it derives a stochastic model of the response time experienced by a user application when executed in a WCCN. Decision-making and resource allocation play a critical role in the proposed architecture. Two adaptive algorithms are presented, namely, a workload allocation algorithm and a task allocation - scheduling algorithm. The proposed algorithms are analyzed for power efficiency, energy efficiency, and improvement in the execution time of user applications that are achieved by workload distribution. Experimental results gathered from a software-defined radio network prototype of the proposed architecture validate the theoretical analysis and show that it is possible to achieve 80 % improvement in execution time with the help of just three nodes in the network.
Ph. D.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Grahn, Cecilia, and Martin Sund. "Cloud computing - Moving to the cloud." Thesis, Högskolan Dalarna, Informatik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:du-12916.

Повний текст джерела
Анотація:
Cloud computing innebär användning av datorresurser som är tillgängliga via ett nätverk, oftast Internet och är ett område som har vuxit fram i snabb takt under de senaste åren. Allt fler företag migrerar hela eller delar av sin verksamhet till molnet. Sogeti i Borlänge har behov av att migrera sina utvecklingsmiljöer till en molntjänst då drift och underhåll av dessa är kostsamma och tidsödande. Som Microsoftpartners vill Sogeti använda Microsoft tjänst för cloud computing, Windows Azure, för detta syfte. Migration till molnet är ett nytt område för Sogeti och de har inga beskrivningar för hur en sådan process går till. Vårt uppdrag var att utveckla ett tillvägagångssätt för migration av en IT-lösning till molnet. En del av uppdraget blev då att kartlägga cloud computing, dess beståndsdelar samt vilka för- och nackdelar som finns, vilket har gjort att vi har fått grundläggande kunskap i ämnet. För att utveckla ett tillvägagångssätt för migration har vi utfört flera migrationer av virtuella maskiner till Windows Azure och utifrån dessa migrationer, litteraturstudier och intervjuer dragit slutsatser som mynnat ut i ett generellt tillvägagångssätt för migration till molnet. Resultatet har visat att det är svårt att göra en generell men samtidigt detaljerad beskrivning över ett tillvägagångssätt för migration, då scenariot ser olika ut beroende på vad som ska migreras och vilken typ av molntjänst som används. Vi har dock utifrån våra erfarenheter från våra migrationer, tillsammans med litteraturstudier, dokumentstudier och intervjuer lyft vår kunskap till en generell nivå. Från denna kunskap har vi sammanställt ett generellt tillvägagångssätt med större fokus på de förberedande aktiviteter som en organisation bör genomföra innan migration. Våra studier har även resulterat i en fördjupad beskrivning av cloud computing. I vår studie har vi inte sett att någon tidigare har beskrivit kritiska framgångsfaktorer i samband med cloud computing. I vårt empiriska arbete har vi dock identifierat tre kritiska framgångsfaktorer för cloud computing och i och med detta täckt upp en del av kunskapsgapet där emellan.
Cloud computing involves the use of computer resources that are available through a network, usually the Internet and it is an area that has grown rapidly in recent years. More and more companies move entire or part of their operations to the cloud.Sogeti in Borlänge needs to move their development environments to a cloud service as operating and maintaining of these are costly and time-consuming. As a Microsoft Partner, Sogeti wants to use Microsoft´s services for cloud computing, Windows Azure, for this purpose. Migration to the cloud is a new area for Sogeti and they do not have any descriptions of how this process works.Our mission was to develop an approach for the migration of an IT-solution to the cloud. Part of the mission included the identifying of cloud computing, its components, benefits and drawbacks, which lead to us acquiring basic knowledge of the subject.To develop an approach to migration, we performed several migrations of virtual machines to Windows Azure, and based on these migrations, literature studies and interviews we drew conclusions that resulted in an overall approach for migration to the cloud.The results have shown that it is difficult to make a general but detailed description of an approach to migration, as the scenario looks different depending on what to migrate and what type of cloud service is used. However, based on our experiences from our migrations, along with literature, documents and interviews we have lifted our knowledge to a general level. From this knowledge, we have compiled a general approach with greater focus on the preparatory activities that an organization should implement before migration.Our studies also resulted in an in-depth description of cloud computing. In our studies we did not find previous works in which the critical success factors have been described in the context of cloud computing. In our empirical work, we identified three critical success factors for cloud computing and in doing so covered up some of the knowledge gap in between.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Gustafsson, Bennet, and Alexander Orrgren. "Cloud Computing : The Adoption of Cloud Computing for Small and Medium Enterprises." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18505.

Повний текст джерела
Анотація:
The objective with this research was to investigate and understand the adoption of cloud computing and to find the process of adopting cloud services. The method used to collect data was interviews. To find both the users and the providers perspective two cases were investigated, one user case and one provider case. The results were divided into two parts, the first a number of categories that were found when comparing the user case to the provider case, the second a process that describes the adoption of cloud computing. The categories in the first part of the results are; decision process, definition of cloud computing, integration and security, adoption and future development. When analyzing the results we came to the conclusion that both users and providers are striving for simplicity, security and to move the responsibility away from the user. The adoption of cloud computing is not as complex as many organizations have thought and by moving the applications and hardware out of the organization the user can focus on its core strategies.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Rylander, Andrea. "Cloud computing: Knowledge expectation and reality : Cloud computing: Knowledge expectation and reality." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-328483.

Повний текст джерела
Анотація:
As today’s digitalized society constantly evolves, more and more companies andorganizations are transitioning over to using cloud computing solutions. Althoughcloud computing is not a new technology, the field has rapidly grown in the last fewyears alone. The Information Technology department at Uppsala University is one ofthe many institutions that has taken the step forward and has developed a privatecloud system in cooperation with Hewlett-Packard to extend the already extensiveresources the department has to offer their employees. The purpose of this thesiswas to investigate how familiar the employees at the Information Technologydepartment are with the concept of cloud computing and what expectations theymight have on the system. This was done by conducting semi-structured interviews,which were then transcribed and analysed carefully.The results were promising, showing that the respondents knew quite a lot about theconcept of cloud computing and that their expectations of the system are not too farfrom the reality of the system.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

McGilvary, Gary Andrew. "Ad hoc cloud computing." Thesis, University of Edinburgh, 2014. http://hdl.handle.net/1842/9652.

Повний текст джерела
Анотація:
Commercial and private cloud providers offer virtualized resources via a set of co-located and dedicated hosts that are exclusively reserved for the purpose of offering a cloud service. While both cloud models appeal to the mass market, there are many cases where outsourcing to a remote platform or procuring an in-house infrastructure may not be ideal or even possible. To offer an attractive alternative, we introduce and develop an ad hoc cloud computing platform to transform spare resource capacity from an infrastructure owner’s locally available, but non-exclusive and unreliable infrastructure, into an overlay cloud platform. The foundation of the ad hoc cloud relies on transferring and instantiating lightweight virtual machines on-demand upon near-optimal hosts while virtual machine checkpoints are distributed in a P2P fashion to other members of the ad hoc cloud. Virtual machines found to be non-operational are restored elsewhere ensuring the continuity of cloud jobs. In this thesis we investigate the feasibility, reliability and performance of ad hoc cloud computing infrastructures. We firstly show that the combination of both volunteer computing and virtualization is the backbone of the ad hoc cloud. We outline the process of virtualizing the volunteer system BOINC to create V-BOINC. V-BOINC distributes virtual machines to volunteer hosts allowing volunteer applications to be executed in the sandbox environment to solve many of the downfalls of BOINC; this however also provides the basis for an ad hoc cloud computing platform to be developed. We detail the challenges of transforming V-BOINC into an ad hoc cloud and outline the transformational process and integrated extensions. These include a BOINC job submission system, cloud job and virtual machine restoration schedulers and a periodic P2P checkpoint distribution component. Furthermore, as current monitoring tools are unable to cope with the dynamic nature of ad hoc clouds, a dynamic infrastructure monitoring and management tool called the Cloudlet Control Monitoring System is developed and presented. We evaluate each of our individual contributions as well as the reliability, performance and overheads associated with an ad hoc cloud deployed on a realistically simulated unreliable infrastructure. We conclude that the ad hoc cloud is not only a feasible concept but also a viable computational alternative that offers high levels of reliability and can at least offer reasonable performance, which at times may exceed the performance of a commercial cloud infrastructure.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Malik, Sheheryar. "Resource aware Cloud Computing." Nice, 2012. http://www.theses.fr/2012NICE4067.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Panteliuk, D., and V. Romaka. "Cloud Computing Security Issues." Thesis, Sumy State University, 2016. http://essuir.sumdu.edu.ua/handle/123456789/47275.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Gera, Amit. "Provisioning for Cloud Computing." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1293740673.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Lounis, Ahmed. "Security in cloud computing." Thesis, Compiègne, 2014. http://www.theses.fr/2014COMP1945/document.

Повний текст джерела
Анотація:
Le Cloud Computing, ou informatique en nuages, est un environnement de stockage et d’exécution flexible et dynamique qui offre à ses utilisateurs des ressources informatiques à la demande via internet. Le Cloud Computing se développe de manière exponentielle car il offre de nombreux avantages rendus possibles grâce aux évolutions majeures des Data Centers et de la virtualisation. Cependant, la sécurité est un frein majeur à l’adoption du Cloud car les données et les traitements seront externalisés hors de site de confiance de client. Cette thèse contribue à résoudre les défis et les issues de la sécurité des données dans le Cloud pour les applications critiques. En particulier, nous nous intéressons à l’utilisation de stockage pour les applications médicales telles que les dossiers de santé électroniques et les réseaux de capteurs pour la santé. D’abord, nous étudions les avantages et les défis de l’utilisation du Cloud pour les applications médicales. Ensuite, nous présentons l’état de l’art sur la sécurité dans le Cloud et les travaux existants dans ce domaine. Puis nous proposons une architecture sécurisée basée sur le Cloud pour la supervision des patients. Dans cette solution, nous avons développé un contrôle d’accès à granularité fine pour résoudre les défis de la sécurité des données dans le Cloud. Enfin, nous proposons une solution de gestion des accès en urgence
Cloud computing has recently emerged as a new paradigm where resources of the computing infrastructures are provided as services over the Internet. However, this paradigm also brings many new challenges for data security and access control when business or organizations data is outsourced in the cloud, they are not within the same trusted domain as their traditional infrastructures. This thesis contributes to overcome the data security challenges and issues due to using the cloud for critical applications. Specially, we consider using cloud storage services for medical applications such as Electronic Health Record (EHR) systems and medical Wireless Sensor Networks. First, we discuss the benefits and challenges of using cloud services for healthcare applications. Then, we study security risks of the cloud, and give an overview on existing works. After that, we propose a secure and scalable cloud-based architecture for medical applications. In our solution, we develop a fine-grained access control in order to tackle the challenge of sensitive data security, complex and dynamic access policies. Finally, we propose a secure architecture for emergency management to meet the challenge of emergency access
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Pistininzi, Alessio. "Cloud computing e affidabilità." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/4962/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

SANTANGELO, LUIGI. "HPC and Cloud Computing." Doctoral thesis, Università degli studi di Pavia, 2020. http://hdl.handle.net/11571/1326029.

Повний текст джерела
Анотація:
L'utilizzo di infrastrutture cloud, quale alternativa ai tradizionali sistemi on-premise, è diventato nel corso degli anni, una interessante opportunità per eseguire applicazioni commerciali. Le organizzazioni aziendali infatti possono beneficiare dei numerosi vantaggi offerti dalle piattaforme cloud, e questo si traduce in una significativa riduzione dei costi e una maggiore efficienza nella gestione dei sistemi informativi. Tuttavia, tale affermazione potrebbe non essere vera per le applicazioni scientifiche, storicamente progettate per essere eseguite su sistemi HPC ad altissime prestazioni. Un confronto tra sistemi cloud e infrastrutture ad alte prestazioni non sempre vede le prime vincenti su queste ultime, soprattutto quando solo le prestazioni e laspetto economico vengono presi in considerazione. Questa affermazione è confermata dai risultati dei test sperimentali, descritti in questa tesi, ottenuti dopo aver migrato sul cloud due applicazioni scientifiche (chiamate rispettivamente Cross Motif Search e BloodFlow), basate su due differenti modelli di comunicazione. Test di prestazioni e scalabilità ottenuti eseguendo le due applicazioni su due infrastrutture simili (cloud e HPC) hanno mostrato che le due applicazioni si comportano meglio quando sono eseguite sul sistema HPC, soprattutto per BloodFlow, la cui esecuzione è fortemente condizionata dallinfrastruttura di rete, essendo basata su un modello di comunicazione molto intensivo. Anche sotto laspetto economico, il cloud risulta essere non conveniente se confrontato con il costo di un sistema HPC. Questo risultato è stato ottenuto confrontando il costo per eseguire una applicazione generica per unora su tre differenti architetture cloud (Google, Amazon, Microsoft) con il costo necessario per eseguire la medesima applicazione per il medesimo tempo su un sistema HPC (nello specifico su Marconi). Sebbene la piattaforma cloud di Google risulta essere più economica, il costo rimane diverse volte più alto del costo di Marconi, anche se si utilizza un cluster cloud con prerilasciabilità, ovvero un cluster di istanze la cui esecuzione può essere interrotta automaticamente dallinfrastruttura cloud, senza alcun preavviso, quando altri task richiedono laccesso a tali risorse. Anche sotto laspetto economico, il cloud computing sembra non essere conveniente per lesecuzione di applicazioni scientifiche. Tuttavia un confronto tra sistemi cloud e HPC che prenda in esame solo laspetto economico e di performance è iniquo, perché ci sono moltissimi altri fattori che rendono il cloud vincente sui sistemi HPC. Infatti, quando ad esempio viene preso in esame il tempo di consegna e la preferenza dellutente, il panorama sulla convenienza cambia. Un equo confronto tra sistemi cloud e HPC dovrebbe quindi prendere in esame non solo le prestazioni e il costo, ma anche il tempo di attesa dei job, il numero dei job interrotti dal sistema, il tempo di setup, il tempo di disponibilità del sistema e la preferenza dellutente. Ad esempio, i job eseguiti su un sistema HPC non vengono eseguiti immediatamente ma vengono inseriti in una coda in attesa che le risorse richieste dal job siano disponibili. Il tempo di attesa di un job nella coda varia in base a diversi fattori, quali il numero delle risorse fisiche disponibili, il numero di job già sottomessi ma in attesa di essere eseguiti, e, qualche volta, anche dal numero di job già eseguiti dallutente nellultimo mese o da fattori simili.
Up to a few years ago, scientific applications were designed, developed and built to be executed just on high performance infrastructures or on-premise systems, which were, and are, able to guarantee high performance, reducing execution time and increasing application scalability. Since 2006, however, the traditional IT landscape has started to change. The birth of Cloud Computing brought along several opportunities for business users who started replacing their own on premise systems with the emerging cloud services. As time goes by, cloud infrastructures became soon more powerful, reliable, affordable and secure, conquering the interest of the scientific community. Despite the considerable amount of advantages which can be met relying on cloud computing, there are a lot of barriers which slow down the transition towards the emerging environment. One of the most relevant factors limiting the transition is the complexity of moving applications. Indeed, moving an application into the cloud is not effortless and might take a huge amount of time. Therefore, before starting to move an application into the cloud, it might be worth having in advance an idea about how the application will behave when run in a different infrastructure. It is then crucial, for researchers, to understand trade-offs, costs and benefits related to moving an application into the cloud. Indeed, applications which are able to run quickly on HPC systems, might perform worse when run on a different infrastructure, such as in the cloud. There are several factors limiting the performance of an application running in the cloud, such as the virtualized environment, the architecture of the physical CPU, the amount of RAM, and so on, but, as highlighted in many works, perhaps the most important factor limiting the performance of a large amount of scientific applications is the interconnection network. For communication-intensive applications, the network infrastructure may soon become a bottleneck, reducing performance and scalability. A rich set of different interconnection technologies (such as Infiniband, Intel Omni Path or Ethernet) have been developed to reduce the overhead introduced by the network layer and increase application scalability and performance. All these technologies are currently used in HPC systems. Indeed, according to the Top500 list (Top500 Release June 2018), 49.4% of the HPC systems use Gigabit Ethernet technology to interconnect nodes, 27.8% uses Infiniband, 7.8% uses Omni Path and the remaining 15% makes use of proprietary or custom interconnection networks. Cloud service providers try to keep in step with the HPC systems by studying and introducing new components in their interconnection model, making the cloud environment more attractive and promising even for running scientific applications, traditionally executed on HPC systems [A64A69]. This is also the case for many bioinformatics applications, and bio-scientists are thinking to move their parallel code to the cloud infrastructures. As this activity is not effortless and can take a huge amount of time, before moving an application to the new infrastructure, a deep analysis of the application and the new infrastructure layer should be done, in order to get insights about how the application will behave being run in the cloud and how it might be adapted in order to reduce the impact of the communication. It might be useful to know in advance the impact of the communication on the application, because this might help researchers to get hints and insights about how the application will perform on a different architecture and the economical cost for running such application on that architecture.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Jhawar, R. "DEPENDABILITY IN CLOUD COMPUTING." Doctoral thesis, Università degli Studi di Milano, 2014. http://hdl.handle.net/2434/233330.

Повний текст джерела
Анотація:
The technological advances and success of Service-Oriented Architectures and the Cloud computing paradigm have produced a revolution in the Information and Communications Technology (ICT). Today, a wide range of services are provisioned to the users in a flexible and cost-effective manner, thanks to the encapsulation of several technologies with modern business models. These services not only offer high-level software functionalities such as social networks or e-commerce but also middleware tools that simplify application development and low-level data storage, processing, and networking resources. Hence, with the advent of the Cloud computing paradigm, today's ICT allows users to completely outsource their IT infrastructure and benefit significantly from the economies of scale. At the same time, with the widespread use of ICT, the amount of data being generated, stored and processed by private companies, public organizations and individuals is rapidly increasing. The in-house management of data and applications is proving to be highly cost intensive and Cloud computing is becoming the destination of choice for increasing number of users. As a consequence, Cloud computing services are being used to realize a wide range of applications, each having unique dependability and Quality-of-Service (Qos) requirements. For example, a small enterprise may use a Cloud storage service as a simple backup solution, requiring high data availability, while a large government organization may execute a real-time mission-critical application using the Cloud compute service, requiring high levels of dependability (e.g., reliability, availability, security) and performance. Service providers are presently able to offer sufficient resource heterogeneity, but are failing to satisfy users' dependability requirements mainly because the failures and vulnerabilities in Cloud infrastructures are a norm rather than an exception. This thesis provides a comprehensive solution for improving the dependability of Cloud computing -- so that -- users can justifiably trust Cloud computing services for building, deploying and executing their applications. A number of approaches ranging from the use of trustworthy hardware to secure application design has been proposed in the literature. The proposed solution consists of three inter-operable yet independent modules, each designed to improve dependability under different system context and/or use-case. A user can selectively apply either a single module or combine them suitably to improve the dependability of her applications both during design time and runtime. Based on the modules applied, the overall proposed solution can increase dependability at three distinct levels. In the following, we provide a brief description of each module. The first module comprises a set of assurance techniques that validates whether a given service supports a specified dependability property with a given level of assurance, and accordingly, awards it a machine-readable certificate. To achieve this, we define a hierarchy of dependability properties where a property represents the dependability characteristics of the service and its specific configuration. A model of the service is also used to verify the validity of the certificate using runtime monitoring, thus complementing the dynamic nature of the Cloud computing infrastructure and making the certificate usable both at discovery and runtime. This module also extends the service registry to allow users to select services with a set of certified dependability properties, hence offering the basic support required to implement dependable applications. We note that this module directly considers services implemented by service providers and provides awareness tools that allow users to be aware of the QoS offered by potential partner services. We denote this passive technique as the solution that offers first level of dependability in this thesis. Service providers typically implement a standard set of dependability mechanisms that satisfy the basic needs of most users. Since each application has unique dependability requirements, assurance techniques are not always effective, and a pro-active approach to dependability management is also required. The second module of our solution advocates the innovative approach of offering dependability as a service to users' applications and realizes a framework containing all the mechanisms required to achieve this. We note that this approach relieves users from implementing low-level dependability mechanisms and system management procedures during application development and satisfies specific dependability goals of each application. We denote the module offering dependability as a service as the solution that offers second level of dependability in this thesis. The third, and the last, module of our solution concerns secure application execution. This module considers complex applications and presents advanced resource management schemes that deploy applications with improved optimality when compared to the algorithms of the second module. This module improves dependability of a given application by minimizing its exposure to existing vulnerabilities, while being subject to the same dependability policies and resource allocation conditions as in the second module. Our approach to secure application deployment and execution denotes the third level of dependability offered in this thesis. The contributions of this thesis can be summarized as follows.The contributions of this thesis can be summarized as follows. • With respect to assurance techniques our contributions are: i) de finition of a hierarchy of dependability properties, an approach to service modeling, and a model transformation scheme; ii) de finition of a dependability certifi cation scheme for services; iii) an approach to service selection that considers users' dependability requirements; iv) de finition of a solution to dependability certifi cation of composite services, where the dependability properties of a composite service are calculated on the basis of the dependability certi ficates of component services. • With respect to off ering dependability as a service our contributions are: i) de finition of a delivery scheme that transparently functions on users' applications and satisfi es their dependability requirements; ii) design of a framework that encapsulates all the components necessary to o er dependability as a service to the users; iii) an approach to translate high level users' requirements to low level dependability mechanisms; iv) formulation of constraints that allow enforcement of deployment conditions inherent to dependability mechanisms and an approach to satisfy such constraints during resource allocation; v) a resource management scheme that masks the a ffect of system changes by adapting the current allocation of the application. • With respect to security management our contributions are: i) an approach that deploys users' applications in the Cloud infrastructure such that their exposure to vulnerabilities is minimized; ii) an approach to build interruptible elastic algorithms whose optimality improves as the processing time increases, eventually converging to an optimal solution.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Limone, Marilena. "Cloud computing; Risvolti normativi." Doctoral thesis, Universita degli studi di Salerno, 2015. http://hdl.handle.net/10556/1958.

Повний текст джерела
Анотація:
2013 - 2014
The expression "cloud computing", in Italian “nuvola informatica”, indicates a complex range of technologies that allow, typically in the form service offered by a provider to the customer, to store, archive and / or process data, in most cases of a personal nature, thanks to the use of hardware and software resources distributed and virtualized on line. Cloud computing services are used in different ways and by different users: consumers, in general, use them for e-mail, for storing and sharing content and information of various kinds, for payment services but also for access to music and video streaming. Companies, however, employ cloud especially for office basic tools, collaboration and project management, especially romote, but also for the creation of custom applications. If we take account of the breadth of data that are placed on the network so we can understand how important the issue of their security and privacy protection for the users of these services is. First af all, fundamental appears ensure to the consumers a constant right to the active monitoring of the information entered in the network as well as a right to their subsequent modification or cancellation, if deemed appropriate. These rights are not always guaranteed, or, at least, not always meet, in the EU and extra EU laws, the same level of protection. [edited by Author]
XIII n.s.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Karkošková, Soňa. "Governance a management služeb cloud computingu z pohledu spotřebitele." Doctoral thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-360364.

Повний текст джерела
Анотація:
Cloud computing brings widely recognized benefits as well as new challenges and risks resulting mainly from the fact that cloud service provider is an external third party that provides public cloud services in multi-tenancy model. At present, widely accepted IT governance frameworks lack focus on cloud computing governance and do not fully address the requirements of cloud computing from cloud consumer viewpoint. Given the absence of any comprehensive cloud computing governance and management framework, this doctoral dissertation thesis focuses on specific aspects of cloud service governance and management from consumer perspective. The main aim of doctoral dissertation thesis is the design of methodological framework for cloud service governance and management (Cloud computing governance and management) from consumer point of view. Cloud consumer is considered as a medium or large-sized enterprise that uses services in public cloud computing model, which are offered and delivered by cloud service provider. Theoretical part of this doctoral dissertation thesis identifies the main theoretical concepts of IT governance, IT management and cloud computing (chapter 2). Analytical part of this doctoral dissertation thesis reviews the literature dealing with specifics of cloud services utilization and their impact on IT governance and IT management, cloud computing governance and cloud computing management (chapter 3). Further, existing IT governance and IT management frameworks (SOA Governance, COBIT, ITIL and MBI) were analysed and evaluated in terms of the use of cloud services from cloud consumer perspective (chapter 4). Scientific research was based on Design Science Research Methodology with intention to design and evaluate artifact methodological framework. The main part of this doctoral dissertation thesis proposes methodical framework Cloud computing governance and management based on SOA Governance, COBIT 5 and ITIL 2011 (chapter 5, 6 and 7). Verification of proposed methodical framework Cloud computing governance and management from cloud consumer perspective was based on scientific method of case study (chapter 8). The main objective of the case study was to evaluate and verify proposed methodical framework Cloud computing governance and management in a real business environment. The main contribution of this doctoral dissertation thesis is both the use of existing knowledge, approaches and methodologies in area of IT governance and IT management to design methodical framework Cloud computing governance and management and the extension of Management of Business Informatics (MBI) framework by a set of new tasks containing procedures and recommendations relating to adoption and utilization of cloud computing services.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Paladi, Nicolae. "Trusted Computing and Secure Virtualization in Cloud Computing." Thesis, Security Lab, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035.

Повний текст джерела
Анотація:
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers. One of the consequences of moving data processing and storage off company premises is that organizations have less control over their infrastructure. As a result, cloud service (CS) clients must trust that the CS provider is able to protect their data and infrastructure from both external and internal attacks. Currently however, such trust can only rely on organizational processes declared by the CS provider and can not be remotely verified and validated by an external party. Enabling the CS client to verify the integrity of the host where the virtual machine instance will run, as well as to ensure that the virtual machine image has not been tampered with, are some steps towards building trust in the CS provider. Having the tools to perform such verifications prior to the launch of the VM instance allows the CS clients to decide in runtime whether certain data should be stored- or calculations should be made on the VM instance offered by the CS provider. This thesis combines three components -- trusted computing, virtualization technology and cloud computing platforms -- to address issues of trust and security in public cloud computing environments. Of the three components, virtualization technology has had the longest evolution and is a cornerstone for the realization of cloud computing. Trusted computing is a recent industry initiative that aims to implement the root of trust in a hardware component, the trusted platform module. The initiative has been formalized in a set of specifications and is currently at version 1.2. Cloud computing platforms pool virtualized computing, storage and network resources in order to serve a large number of customers customers that use a multi-tenant multiplexing model to offer on-demand self-service over broad network. Open source cloud computing platforms are, similar to trusted computing, a fairly recent technology in active development. The issue of trust in public cloud environments is addressed by examining the state of the art within cloud computing security and subsequently addressing the issues of establishing trust in the launch of a generic virtual machine in a public cloud environment. As a result, the thesis proposes a trusted launch protocol that allows CS clients to verify and ensure the integrity of the VM instance at launch time, as well as the integrity of the host where the VM instance is launched. The protocol relies on the use of Trusted Platform Module (TPM) for key generation and data protection. The TPM also plays an essential part in the integrity attestation of the VM instance host. Along with a theoretical, platform-agnostic protocol, the thesis also describes a detailed implementation design of the protocol using the OpenStack cloud computing platform. In order the verify the implementability of the proposed protocol, a prototype implementation has built using a distributed deployment of OpenStack. While the protocol covers only the trusted launch procedure using generic virtual machine images, it presents a step aimed to contribute towards the creation of a secure and trusted public cloud computing environment.
TESPEV
CNS
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Doelitzscher, Frank. "Security audit compliance for cloud computing." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3005.

Повний текст джерела
Анотація:
Cloud computing has grown largely over the past three years and is widely popular amongst today's IT landscape. In a comparative study between 250 IT decision makers of UK companies they said, that they already use cloud services for 61% of their systems. Cloud vendors promise "infinite scalability and resources" combined with on-demand access from everywhere. This lets cloud users quickly forget, that there is still a real IT infrastructure behind a cloud. Due to virtualization and multi-tenancy the complexity of these infrastructures is even increased compared to traditional data centers, while it is hidden from the user and outside of his control. This makes management of service provisioning, monitoring, backup, disaster recovery and especially security more complicated. Due to this, and a number of severe security incidents at commercial providers in recent years there is a growing lack of trust in cloud infrastructures. This thesis presents research on cloud security challenges and how they can be addressed by cloud security audits. Security requirements of an Infrastructure as a Service (IaaS) cloud are identified and it is shown how they differ from traditional data centres. To address cloud specific security challenges, a new cloud audit criteria catalogue is developed. Subsequently, a novel cloud security audit system gets developed, which provides a flexible audit architecture for frequently changing cloud infrastructures. It is based on lightweight software agents, which monitor key events in a cloud and trigger specific targeted security audits on demand - on a customer and a cloud provider perspective. To enable these concurrent cloud audits, a Cloud Audit Policy Language is developed and integrated into the audit architecture. Furthermore, to address advanced cloud specific security challenges, an anomaly detection system based on machine learning technology is developed. By creating cloud usage profiles, a continuous evaluation of events - customer specific as well as customer overspanning - helps to detect anomalies within an IaaS cloud. The feasibility of the research is presented as a prototype and its functionality is presented in three demonstrations. Results prove, that the developed cloud audit architecture is able to mitigate cloud specific security challenges.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Balakrishnan, Suresh Reuben A/L. "Hybrid High Performance Computing (HPC) + Cloud for Scientific Computing." Thesis, Curtin University, 2022. http://hdl.handle.net/20.500.11937/89123.

Повний текст джерела
Анотація:
The HPC+Cloud framework has been built to enable on-premise HPC jobs to use resources from cloud computing nodes. As part of designing the software framework, public cloud providers, namely Amazon AWS, Microsoft Azure and NeCTAR were benchmarked against one another, and Microsoft Azure was determined to be the most suitable cloud component in the proposed HPC+Cloud software framework. Finally, an HPC+Cloud cluster was built using the HPC+Cloud software framework and then was validated by conducting HPC processing benchmarks.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Lundberg, Emma, and Caroline Åkesson. "Cloud Computing - Factors that affect an adoption of cloud computing in traditional Swedish banks." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-255828.

Повний текст джерела
Анотація:
Cloud computing, a current IT trend, is becoming more integrated in companies’ strategies and also increasingly important for firms. Thus, many organizations have or are considering implementing cloud services. Banks, however, tend to not adopt cloud computing at the same pace as other industries. Therefore, it is of interest to increase the understanding of which factors that obstruct or foster an adoption of cloud computing in the banking industry in Sweden. These factors have been examined from a bank and external perspective, through interviews with IT personnel from the four big banks in Sweden, external IT consultants, authorities (Finansinspektionen and Datainspektionen) and Svenska Bankföreningen. The empirical findings have been analyzed in accordance with Tornatzky and Fleischer’s (1990) TOE framework - technology, organization and external task environment. There were eleven key factors found in this study, which are the following: 1) Integration, Lack of competence, Sensitive information, Heritage, Employee resistance, Miscommunication, Size and structure, Common heritage, Standard agreements, New actors and Regulations. 2) All the factors, except New actors, were shown to obstruct and delay an adoption of cloud computing for traditional banks in Sweden. 3) It was found that all these key factors interlink with each other in some sense.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Mullins, Taariq. "Participatory Cloud Computing: The Community Cloud Management Protocol." Thesis, University of Cape Town, 2014. http://pubs.cs.uct.ac.za/archive/00000999/.

Повний текст джерела
Анотація:
This thesis work takes an investigative approach into developing a middleware solution for managing services in a community cloud computing infrastructure predominantly made of interconnected low power wireless devices. The thesis extends itself slightly outside of this acute framing to ensure heterogeneity is accounted for. The developed framework, in its draft implementation, provides networks with value added functionality in a way which minimally impacts nodes on the network. Two sub-protocols are developed and successfully implemented in order to achieve efficient discovery and allocation of the community cloud resources. First results are promising as the systems developed show both low resource consumption in its application, but also the ability to effectively transfer services through the network while evenly distributing load amongst computing resources on the network.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Sapkota, Sagar, and Khawar Shehzad. "Cloud Computing for Telecom Systems." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3068.

Повний текст джерела
Анотація:
Context: Cloud computing is reshaping the service-delivery and business-models in Information and Communications Technology (ICT). The Information Technology (IT) sector has benefited from it in the previous 3-5 years. Despite the attraction of cloud computing, it is required to have an effective application migration strategy. Cloud computing with its diverse provisioning models makes it possible for telecom vendors and service providers to decide effective service and business models. Currently, cloud computing contains security, performance and dimensioning considerations for telecom companies. Objectives: This thesis assesses the trends and issues associated with the cloud, with telecommunications perspective, while leveraging the cloud to come to a decision on a suitable cloud environment for telecom grade applications. Analysis of maturity of public cloud (in terms of compatibility, consolidation, compliance and standardization) in general and Amazon cloud in particular, is part of the thesis objective. While doing so, deployment of a telecom-grade product in the Amazon cloud will be evaluated against the current on-premise deployment. We want to identify architectural difference between the two domains, and what issues are faced when a migration is planned. This evaluation between two systems, i.e. on-premise and the cloud will significantly contribute to the research and can be used when making business decisions. Methods: We conducted literature review, survey, and a case study, assessing the above mentioned objectives. Research papers from academia and industry were chosen for literature review; personnel, with experience in cloud computing, were chosen for the survey; and a telecom-grade platform was used to assess the migration issues on Amazon cloud in the case study. The Ericsson Composition Engine (ECE) was used to check what deployment issues it can have on Amazon cloud. Its on-premise Reference Deployment Architecture was compared with the cloud-based Reference Deployment Architecture. This case study served as a confirmation to results obtained in the literature review and survey. Results: In the literature review and survey, we found motivations, trends, current applications, and challenges of cloud computing for telecom. It was found from the case study that Amazon Web Services (AWS) lacks application and network centric attributes that are required in ECE deployment. We propose recommendations that can be integrated with ECE while deploying it in a public cloud. Conclusions: Companies are choosing cloud vendors that uniquely give ease of migration and control, based on application needs and compatibility. ECE cannot be directly migrated to AWS, unless we provide Amazon specific modifications in the architecture. The survey and literature review support a private and/or hybrid strategy for ECE, along with the inclusion of cloud networking into the ECE package.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Andersson, Mattias, and Christopher Ludvigsson. "Cloud Computing : Lärplattform i molnet." Thesis, Uppsala universitet, Institutionen för informatik och media, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-155080.

Повний текст джерела
Анотація:
Cloud computings framväxt har möjliggjort tillhandhållande av datorresurser online och erbjuder två väsentliga egenskaper, dels upplevda oändliga resurser och dels betalning per resursförbrukning. Lärplattformar används idag i stor utsträckning av de svenska universiteten och högskolorna som studieverktyg. Detta medför bättre möjligheter för distanskurser och e-inlärning. Att kombinera cloud computing med en lärplattform är idag möjligt och bör därför ge skolorna fördelar. Om lärplattformen driftas som molntjänst av extern leverantör bör också kraven se annorlunda ut. Syftet med uppsatsen är att utreda om det finns några incitament för att hyra en lärplattform som molntjänst och även att utreda om kraven ser annorlunda ut på en hyrd molntjänst. En fallstudie genomfördes på Uppsala universitet och Högskolan Dalarna, detta för att jämföra en lärplattform installerad på egen server med en lärplattform som hyrd molntjänst. Resultatet av studien bevisar att det finns fördelar med att hyra en lärplattform som molntjänst. Vad gäller kraven är det inte mycket som skiljer, ett viktigt krav när driften ligger hos en leverantör är att det finns en bra dialog och att organisationen litar på leverantören.
The growth of cloud computing has enabled the provision of computer resources online and offers two essential characteristics, illusion of infinite supply and pay-per-use. Learning management systems are currently used extensively by the Swedish universities as learning tools. This brings better opportunities for distance courses and e-learning. To combine cloud computing with a learning management system is now possible and should therefore give the schools benefits. If the Learning management system is hosted as a cloud service by an external provider, so should the requirements be different. The purpose of this paper is to investigate whether there are any incentives for rent a learning management system as a cloud service and also investigate if the requirements are different in a rented cloud service. A case study was conducted at Uppsala University and Dalarnas University, in order to compare a learning management system installed on their own server with a learning management system rented as a cloud service.  The result of the study proves that there are advantages to rent a learning management system as a cloud services. In terms to the requirements, there are no great differences. An important requirement when the learning management system is hosted by a supplier is that there is a good dialogue and that the organization relies on the supplier.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Win, Thu Yein. "Virtualisation security in cloud computing." Thesis, Glasgow Caledonian University, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.726791.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Yang, Yichao. "Resource management for cloud computing." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.580579.

Повний текст джерела
Анотація:
Cloud Computing will surpass the Internet in importance; it is a relatively new technology model of Internet-based computing, whereby information, software, storage, servers and networking are provided on demand. According to different end user requirements, such as data or computing intensive applications are applied in cloud environment. Cloud computing makes computing as a utility and has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way in which hardware is designed and purchased. We review this cloud computing technologies, and indicate the main challenges for their development in future, among which resource management problem is pointed out and attracts our attention. Combing the current resource management and broker theories, we present new strategy of how to manage resources to deal with different user requirements of cloud services. We described the related work of resource management and broker architecture in this thesis, accomplishing four major research issues. Firstly, we present cloud resource management framework and service-oriented broker to efficiently utilize potential physical resource such as network, storage and computing resources. This framework provides on-demand service to users and optimizes resource utilization by employing virtualization technology. It has the ability to enhance the system performance and satisfy the many of user request. The service-oriented broker is presented in this framework. It is aim to discover, select and reserve the network and end-system resources. It is able to provide guaranteed service by reservation mechanism to meet user's demand. The several scheduling algorithms are employed for finding best match of combined resources. Secondly, we address the problem caused by failure of job submission in cloud environment. We present dynamic resource selection algorithm under user's QoS requirement which would benefit for selecting the best combined resource for real-time multimedia applications. This algorithm is aim to reduce the job fail rate and efficiently utilize network resource to enhance system performance. Thirdly, we solve the virtual network resource allocation problem in cloud computing. We present virtual network- aware resource scheduling algorithm for real-time multimedia applications that is in order to efficiently utilize physical network resources. This algorithm will reduce the physical network traffic and guarantee the service request of the users. Furthermore, the streaming data will be transmitted from selected data source, and then application performance will be maintained. Fourth, we address meta-job scheduling problem for computation application in cloud environment. We present V -heuristic scheduling algorithms for allocation of virtualized network and computing resource. The objective of these scheduling algorithms is aim to achieve high system throughput, improve load balance and minimize meta-job processing time. From the practical aspect, we develop a simulator which is extended from CloudSim simulator. This simulator offers a simulated environment to model this resource management framework. The CloudSim only concentrate on end-system resource without getting concerned about virtualization, technology and network resource, so that they can accelerate study progress of new cloud technologies.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

El, Rheddane Ahmed. "Elasticité dans le cloud computing." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GRENM003/document.

Повний текст джерела
Анотація:
Les charges réelles d'applications sont souvent dynamiques. Ainsi, le dimensionnement statique de ressources est voué soit au gaspillage, s'il est basé sur une estimation du pire scénario, soit à la dégradation de performance, s'il est basé sur la charge moyenne. Grâce au modèle du cloud computing, les ressources peuvent être allouées à la demande et le dimensionnement adapté à la variation de la charge. Cependant, après avoir exploré les travaux existants, nous avons trouvé que la plupart des outils d'élasticité sont trop génériques et ne parviennent pas à répondre aux besoins spécifiques d'applications particulières. Dans le cadre de ce travail, nous utilisons des boucles autonomiques et diverses techniques d'élasticité afin de rendre élastiques différents types d'applications, à savoir un service de consolidation, un intergiciel de messagerie et une plateforme de traitement de données en temps-réel. Ces solutions élastiques ont été réalisées à partir d'applications libres et leur évaluation montre qu'ils permettent d'économiser les ressources utilisées avec un surcoût minimal
Real world workloads are often dynamic. This makes the static scaling of resourcesfatally result in either the waste of resources, if it is based on the estimatedworst case scenario, or the degradation of performance if it is based on the averageworkload. Thanks to the cloud computing model, resources can be provisioned ondemand and scaling can be adapted to the variations of the workload thus achievingelasticity. However, after exploring the existing works, we find that most elasticityframeworks are too generic and fail to meet the specific needs of particularapplications. In this work, we use autonomic loops along with various elasticitytechniques in order to render different types of applications elastic, namelya consolidation service, message-oriented middleware and a stream processingplatform. These elastic solutions have been implemented based on open-sourceapplications and their evaluation shows that they enable resources’ economy withminimal overhead
Стилі APA, Harvard, Vancouver, ISO та ін.
34

VAZ, Rodrigo da Silva. "Simulação Distribuída em Cloud Computing." reponame:Repositório Institucional da UNIFEI, 2015. http://repositorio.unifei.edu.br:8080/xmlui/handle/123456789/238.

Повний текст джерела
Анотація:
Submitted by repositorio repositorio (repositorio@unifei.edu.br) on 2015-12-09T17:51:54Z No. of bitstreams: 1 dissertacao_vaz_2015.pdf: 1026296 bytes, checksum: 8735ac7dda7e17d7362fa57ee18252ce (MD5)
Made available in DSpace on 2015-12-09T17:51:54Z (GMT). No. of bitstreams: 1 dissertacao_vaz_2015.pdf: 1026296 bytes, checksum: 8735ac7dda7e17d7362fa57ee18252ce (MD5) Previous issue date: 2015-11
A computaçãoo em nuvem é um recurso que está sendo cada vez mais utilizado, seja por programadores ou clientes de um software. Além dos serviços de software que estão migrando para essa plataforma, um programador também pode aproveitar os recursos de um provedor utilizando máquinas virtuais remotas, que podem ser alugadas e depois utilizadas por uma interface de navegador ou linha de comando. Como a simulação é utilizada em muitas áreas científicas, é importante adaptá-la à nuvem. Em simulações mais demoradas, é costume separar partes das simulações em processos independentes utilizando programação paralela, finalidade para qual protocolos como o Time Warp e o Rollback Solidário foram desenvolvidos. Infelizmente, a computação em nuvem tem a desvantagem de possuir diversas máquinas físicas e estrutura de rede sendo utilizados por diversos clientes diferentes com requerimentos diferentes, gerando uma grande instabilidade na rede, processamento e memória das máquinas virtuais. Além disso, com a adaptação de protocolos otimistas aos ambientes de nuvem pública, surge o problema do aumento da quantidade de rollbacks, que faz com que as simulações levem mais tempo para serem executadas. Como é demonstrado, já existem trabalhos que propuseram otimizações para o protocolo Time Warp, além de alguns tratando sobre o preço e a vantagem do ganho de desempenho e economia, quando se utiliza um ambiente de nuvem para aplicações científicas. Neste contexto, este trabalho apresenta uma solução, que possibilita que um programador consiga analisar, através de um simulador de computação em nuvem, todo o histórico de envio e recebimento de mensagens, assim como os atrasos envolvidos em relação à rede. Com esta solução, é possível propor otimizações nos protocolos de simulação, melhorando o seu desempenho e confiabilidade durante a execução neste tipo de arquitetura computacional. O simulador escolhido foi o NetworkCloudSim, onde foram feitas alterações para adaptá-lo a executar threads e para que o desempenho de rede fosse mais instável, se aproximando do caso real de serviços públicos de nuvem.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Крикавський, Є. В., І. В. Бойчук та Н. Ю. Глинський. "Маркетинговий потенціал технології cloud computing". Thesis, ТОВ «ДД «Папірус», 2013. http://essuir.sumdu.edu.ua/handle/123456789/37388.

Повний текст джерела
Анотація:
Концепція аутсорсингу у різних видах економічної діяльності суб’єктів господарювання продовжує свій прогресивний поступ. Передусім, доцільно виокремити сектор логістики, який революціонував завдяки цій концепції настільки інтенсивно, що це призвело до формування світового ринку логістичних послуг у надзвичайно короткі терміни, надаючи учасникам цього ринку значну користь (порушення монополізму, ефект масштабу, концентрація на ключових компетенціях, ефект відкритого простору, раціональна націоналізація та концепція тощо). Водночас, це генерувало потребу у формуванні відповідних аутсорсингових операторів (приклад зернової логістики). Очевидно, що таку тенденцію уможливили радикальні трансформації інформаційних технологій, позаяк завдяки їм просторові та часові межі перестали бути непереборними. Доказом того, що концепція аутсорсингу набула ознак мегатенденції, може служити і сфера ІТ-технологій, яка до цієї тенденції долучилась відносно недавно. Перспективним рішенням цього є технологія «cloud computing», скерована на подання аутсорсингових інформаційних послуг, використовуючи т.зв. «хмару». Передусім, мова в цьому випадку йде про зберігання та перетворення великих масивів інформації. А це може надати істотні користі для маркетингу як щодо аудиторії (глобальний клієнт), так і щодо власної діяльності.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Poulo, Lebeko Bernard Nkoebele. "Cloud computing for digital libraries." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/14036.

Повний текст джерела
Анотація:
Information management systems (digital libraries/repositories, learning management systems, content management systems) provide key technologies for the storage, preservation and dissemination of knowledge in its various forms, such as research documents, theses and dissertations, cultural heritage documents and audio files. These systems can make use of cloud computing to achieve high levels of scalability, while making services accessible to all at reasonable infrastructure costs and on-demand. This research aims to develop techniques for building scalable digital information management systems based on efficient and on-demand use of generic grid-based technologies such as cloud computing. In particular, this study explores the use of existing cloud computing resources offered by some popular cloud computing vendors such as Amazon Web Services. This involves making use of Amazon Simple Storage Service (Amazon S3) to store large and increasing volumes of data, Amazon Elastic Compute Cloud (Amazon EC2) to provide the required computational power and Amazon SimpleDB for querying and data indexing on Amazon S3. A proof-of-concept application comprising typical digital library services was developed and deployed in the cloud environment and evaluated for scalability when the demand for more data and services increases. The results from the evaluation show that it is possible to adopt cloud computing for digital libraries in addressing issues of massive data handling and dealing with large numbers of concurrent requests. Existing digital library systems could be migrated and deployed into the cloud.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Li, Min. "Privacy Protection on Cloud Computing." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3844.

Повний текст джерела
Анотація:
Cloud is becoming the most popular computing infrastructure because it can attract more and more traditional companies due to flexibility and cost-effectiveness. However, privacy concern is the major issue that prevents users from deploying on public clouds. My research focuses on protecting user's privacy in cloud computing. I will present a hardware-based and a migration-based approach to protect user's privacy. The root cause of the privacy problem is current cloud privilege design gives too much power to cloud providers. Once the control virtual machine (installed by cloud providers) is compromised, external adversaries will breach users’ privacy. Malicious cloud administrators are also possible to disclose user’s privacy by abusing the privilege of cloud providers. Thus, I develop two cloud architectures – MyCloud and MyCloud SEP to protect user’s privacy based on hardware virtualization technology. I eliminate the privilege of cloud providers by moving the control virtual machine (control VM) to the processor’s non-root mode and only keep the privacy protection and performance crucial components in the Trust Computing Base (TCB). In addition, the new cloud platform can provide rich functionalities on resource management and allocation without greatly increasing the TCB size. Besides the attacks to control VM, many external adversaries will compromise one guest VM or directly install a malicious guest VM, then target other legitimate guest VMs based on the connections. Thus, collocating with vulnerable virtual machines, or ”bad neighbors” on the same physical server introduces additional security risks. I develop a migration-based scenario that quantifies the security risk of each VM and generates virtual machine placement to minimize the security risks considering the connections among virtual machines. According to the experiment, our approach can improve the survivability of most VMs.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Wan, Ziqi. "Scheduling Policies for Cloud Computing." Master's thesis, Temple University Libraries, 2015. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/328227.

Повний текст джерела
Анотація:
Computer and Information Science
M.S.
Cloud computing focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users. This leads to task scheduling as a core and challenging issue in cloud computing. This thesis gives different scheduling strategies and algorithms in cloud computing. For a common cloud user, there is a great potential to boost the performance of mobile devices by offloading computation-intensive parts of mobile applications to the cloud. However, this potential is hindered by a gap between how individual mobile devices demand computational resources and how cloud providers offer them. In this thesis, we present the design of utility-based uploads sharing strategy in cloud scenarios, which bridges the above gap through providing computation offloading as a service to mobile devices. Our scheme efficiently manages cloud resources for offloading requests to improve offloading performances of mobile devices, as well as to reduce the monetary cost per request of the provider. However, from the viewpoint of data centers, resource limitations in both bandwidth and computing triggers a variety of resource management problems. In this thesis, we discuss the tradeoff between locality and load balancing, along with the multi-layer topology of data centers. After that, we investigate the interrelationship between the time cost and the virtual machine rent cost, and formalize it as the parallel speedup pattern. We then design several algorithms by adopting the idea of minimizing the utility cost. Furthermore, we focus on the detail of MapReduce framework in Cloud. For different MapReduce phases, there are different resource requirements. We propose a new scheduling algorithm based on the idea of combining map shuffle pairs, which has better performance than the popular min-max time first algorithm in minimizing the average makespan of tasks in the job matrix. Directions for future research mainly focus on the large scale implementation of our proposed solution. There are a wide variety of open questions remaining with respect to the design of algorithms to minimize response time. Further, it is interesting and important to understand how to schedule in order to minimize other performance metrics.
Temple University--Theses
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Margaris, Nikos. "Cloud Computing v českém prostředí." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-72541.

Повний текст джерела
Анотація:
Focus of this diploma thesis is on Cloud Computing -- a new delivery model of IS/ICT services for companies. Cloud Computing services are IT resources available to users via internet on pay-as-you-use basis. The aim of the thesis is define underlying Cloud Computing concepts and evaluate the current state of Cloud Computing adoption in the Czech Republic. We discuss the framework for definition of Cloud Computing concepts in the theoretical part of the thesis drawing on resources available in the literature. Cloud Computing survey is conducted using an online questionnaire and followsthe principles established in theoretical part. The main contribution of this thesis is creating working definition of Cloud Computing and identifying reasons that affect adoption rate in the Czech Republic.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Lukášová, Pavlína. "Cloud Computing jako nástroj BCM." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-75556.

Повний текст джерела
Анотація:
This thesis deals with possible interconnections between two concepts playing a big role in contemporary business and IT world. These concepts are Business Continuity Management and Cloud Computing. In the scope of this thesis there are certain areas identified where both concepts are complement, where Cloud Computing brings new opportunities for Business Continuity Management and where could possible problems arise during particular implementation. From the BCM perspective the impact lies on IT services, from the Cloud Computing perspective the thesis deals especially with security aspects. The thesis is also aimed at the characteristics of higher education and basic differences from commercial sphere. Based on defined differences and identified interconnections between BCM and Cloud Computing, the thesis argues for usage of suitable Cloud Computing solution for higher education regarding Business Continuity improvement. The multi-criterion comparison of several Infrastructure-as-a-Service solutions stems from this analysis focusing on technical, financial, and Business Continuity aspects. The result from this comparison together with conclusions from previous chapters serve as an input for subsequent practical proposal of Cloud Computing solution and its verification against Business Continuity improvement in specific conditions on University of Economics in Prague. The proposal is also represented by strategic map.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Němec, Petr. "Cloud computing a jeho aplikace." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-112946.

Повний текст джерела
Анотація:
This diploma work is focused on the Cloud Computing and its possible applications in the Czech Republic. The first part of the work is theoretical and describes accessible sources analysis related to its topic. Historical circumstances are given in the relation to the evolution of this technology. Also few definitions are quoted, followed by the Cloud Computing basic taxonomy and common models of use. The chapter named Cloud Computing Architecture covers the generally accepted model of this technology in details. In the part focused on theory are mentioned some of the services opearating on this technology. At the end the theoretical part brings possibility of the Cloud Computing usage from the customer's and supplier's perspective. The practical part of the diploma work is divided into sections. The first one brings results of the questionnare research, performed by the author in the Czech Republic, focused on the usage of the Cloud Computing and virtualization services. In the sekond section is pre-feasibility study. The study is focused on the providing SaaS Services in the area of long-term and safe digital data store. Lastly there is an author's view on the Cloud Computing technology future and possible evolution.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Gleza, Jan. "Cloud computing v herním průmyslu." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-114054.

Повний текст джерела
Анотація:
This thesis analyzes current status of software distribution in gaming industry and its biggest challenges. Thesis also includes insight in completely different approach to the software distribution -- Cloud Gaming. In practical part are thoroughly tested existing solutions and done functionality analysis. Practical part also includes experiment which regards to building own platform using currently existing tools and it is followed by discussion of results.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Šíma, Josef. "Cloud computing ve firemním prostředí." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-264574.

Повний текст джерела
Анотація:
The thesis deals with the means of using cloud computing in business. The aim is to present the selected cloud services currently available on the market and then compare and evaluate them according to certain criteria. After the characteristics of the technology have been listed, including its advantages and disadvantages, a detailed description of the chosen products follows. Specifically, these are Microsoft Office 365, G Suite (formerly also known as Google Apps) and Dropbox Business. In the next section of the thesis, the services are evaluated in each of the selected criteria using the Kepner-Tregoe decision analysis. The list of the criteria includes, among others, the usability of the user interface, security, or deployment in a company.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Rasenti, Carla. "Cloud Computing su sistemi Linux." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3120/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Fargo, Farah Emad. "Resilient Cloud Computing and Services." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/347137.

Повний текст джерела
Анотація:
Cloud Computing is emerging as a new paradigm that aims at delivering computing as a utility. For the cloud computing paradigm to be fully adopted and effectively used it is critical that the security mechanisms are robust and resilient to malicious faults and attacks. Securing cloud is a challenging research problem because it suffers from current cybersecurity problems in computer networks and data centers and additional complexity introduced by virtualizations, multi-tenant occupancy, remote storage, and cloud management. It is widely accepted that we cannot build software and computing systems that are free from vulnerabilities and that cannot be penetrated or attacked. Furthermore, it is widely accepted that cyber resilient techniques are the most promising solutions to mitigate cyberattacks and change the game to advantage defender over attacker. Moving Target Defense (MTD) has been proposed as a mechanism to make it extremely challenging for an attacker to exploit existing vulnerabilities by varying different aspects of the execution environment. By continuously changing the environment (e.g. Programming language, Operating System, etc.) we can reduce the attack surface and consequently, the attackers will have very limited time to figure out current execution environment and vulnerabilities to be exploited. In this dissertation, we present a methodology to develop an Autonomic Resilient Cloud Management (ARCM) based on MTD and autonomic computing. The proposed research will utilize the following capabilities: Software Behavior Obfuscation (SBO), replication, diversity, and Autonomic Management (AM). SBO employs spatiotemporal behavior hiding or encryption and MTD to make software components change their implementation versions and resources randomly to avoid exploitations and penetrations. Diversity and random execution is achieved by using AM that will randomly "hot" shuffling multiple functionally-equivalent, behaviorally-different software versions at runtime (e.g., the software task can have multiple versions implemented in a different language and/or run on a different platform). The execution environment encryption will make it extremely difficult for an attack to disrupt normal operations of cloud. In this work, we evaluated the performance overhead and effectiveness of the proposed ARCM approach to secure and protect a wide range of cloud applications such as MapReduce and scientific and engineering applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Tymeš, Radek. "Cloud computing - srovnání cloudových úložišť." Master's thesis, Česká zemědělská univerzita v Praze, 2017. http://www.nusl.cz/ntk/nusl-262809.

Повний текст джерела
Анотація:
This thesis deals with the utilization of cloud computing in the field of online data storages for storing and backing up of user data. After defining the target group and its requirements for the service, ten most suitable options from the total set of cloud storages were selected. Selected storages were subsequently tested and analyzed in order to be used in the next stage of thesis. Materials for multicriterial analysis of options were created on the basis of set criteria and their given or measured values. The most appropriate options were calculated by application of the aforementioned mathematical method. These options were then evaluated and described from the viewpoint of commissioning.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Singh, Vivek Kumar. "Essays on Cloud Computing Analytics." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7943.

Повний текст джерела
Анотація:
This dissertation research focuses on two key aspects of cloud computing research – pricing and security using data-driven techniques such as deep learning and econometrics. The first dissertation essay (Chapter 1) examines the adoption of spot market in cloud computing and builds IT investment estimation models for organizations adopting cloud spot market. The second dissertation essay (Chapter 2 and 3) studies proactive threat detection and prediction in cloud computing. The final dissertation essay (Chapter 4) develops a secured cloud files system which protects organizations using cloud computing in accidental data leaks.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Branderud, Anders. "Setting up of an OpenNebula-cloud for cloud computing." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-37242.

Повний текст джерела
Анотація:
School of Information and Communication Technology (ICT) at Royal Institute of Technology (KTH) have 16 computers that they are not using, which they bought from PDC at KTH a couple of years ago. Teachers of KTH are interested in using these computers to let their students work on a cloud computer environment. There is an open source system called OpenNebula, which is used on many universities and by many other persons setting up a cloud computer environment. OpenNebula is an distributed virtual machine manager that allows virtualization of ITinfrastructure, provides good environment for user management and setting up storage sub systems and has other desirable characterics suitable for laborations in classes. One of the goals of this project was to install OpenNebula on 16 computers, with one of the computers being the front end. I call this cluster of nodes Cloudelia. These are the requirements of the system: In order for a user to use the system, authentication needs to be done to ensure that it has a KTHaccount. When an administrator sees a get permission-request from an user and is deciding on whether to approve the user or not, it must be able to rely on that an authentication-mechanism ensures that the user really is the user with the specific KTH-user name shown in the interface. This ensures that any user outside of KTH with an intent to use Cloudelia in a malicious way doesn’t get access to the system. The teachers should be provided an interface in which they can handle the granting/denying of permission of the users whom have requested permission to use Cloudelia. They should be able to do this for all of the users in an efficient way and upon granting access to the users, new user accounts should be created in OpenNebula. This reduces the work load for the teachers. There were certain design choices that were made, including the choice of whether to run OpenNebula with a shared or non-shared file system, whether to use Kerberos or Central Authentication Service (CAS) for authentication and the choice of which virtual machine to use. The web interfaces were implemented using PHP, AJAX and MySQL. The web interface for teachers used an AJAX-framework called DataTables [1], which facilitates and minimizes the code amount required for presenting data from e.g. MySQL in tables on a web page. It was chosen to be used for the presentation of the users of the system in the administration interface for this reason. AJAX was used because it provides good capabilities of creating a website with interaction with the user. The back end on the server side was implemeted in PHP. It receives arguments by POST and GET. There are different php-files receiving data from the web interfaces with different responsibilities.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Zambrano, Jesus. "Mobile Cloud Computing: Offloading Mobile Processing to the Cloud." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/594.

Повний текст джерела
Анотація:
The current proliferation of mobile systems, such as smart phones, PDA and tablets, has led to their adoption as the primary computing platforms for many users. This trend suggests that designers will continue to aim towards the convergence of functionality on a single mobile device. However, this convergence penalizes the mobile system in computational resources such as processor speed, memory consumption, disk capacity, as well as in weight, size, ergonomics and the user’s most important component, battery life. Therefore, this current trend aims towards the efficient and effective use of its hardware and software components. Hence, energy consumption and response time are major concerns when executing complex algorithms on mobile devices because they require significant resources to solve intricate problems. Current cloud computing environments for performing complex and data intensive computation remotely are likely to be an excellent solution for off-loading computation and data processing from mobile devices restricted by reduced resources. In cloud computing, virtualization enables a logical abstraction of physical components in a scalable manner that can overcome the physical constraint of resources. This optimizes IT infrastructure and makes cloud computing a worthy cost effective solution. The intent of this thesis is to determine the types of applications that are better suited to be off-loaded to the cloud from mobile devices. To this end, this thesis quantitatively and qualitatively compares the performance of executing two different kinds of workloads locally on two different mobile devices and remotely on two different cloud computing providers. The results of this thesis are expected to provide valuable insight to developers and architects of mobile applications by providing information on the applications that can be performed remotely in order to save energy and get better response times while remaining transparent to users.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Filho, Filomena de Jesus Francisco Correia. "Cloud Computing: um estudo de viabilidade." Master's thesis, Instituto Politécnico de Setúbal. Escola Superior de Ciências Empresariais, 2015. http://hdl.handle.net/10400.26/10451.

Повний текст джерела
Анотація:
Dissertação apresentada para cumprimento dos requisitos necessários à obtenção do grau de Mestre em Sistemas de Informação Organizacionais
O conceito de Cloud Computing tem evoluído constantemente, na vertente dos modelos de serviços, baseados em pool de recursos tecnológicos. Cada vez mais, tem-se utilizado a tecnologia de virtualização para a otimização dos recursos, os quais são partilhados por todos os clientes, num formato de self-service. Estas características resultam num comportamento flexível e escalável dos recursos. A gestão do serviço disponibilizado, efetua-se em função do acordo de níveis de serviço estabelecidos, entre cliente e o fornecedor da Cloud, e a constante evolução tecnológica proporciona rápidas mutações ao nível das Tecnologias de Informação e Comunicação (TIC). O estudo, de cariz qualitativo, é guiado por um Estudo de Caso, realizado na Província de Luanda, na empresa de telecomunicações FILHO, S.A., a fim de procurar novas soluções com o intuito de aumentar a produtividade da empresa, levando a que se ponderem soluções inovadoras, de rápida implementação e de baixo custo. O objetivo geral desta dissertação é analisar a viabilidade da adoção da Cloud Computing na FILHO, S.A. através de duas perspetivas: a virtualização de ambiente de trabalho desktop em servidores de Data center interno e a utilização de serviços de gestão arquivo do correio eletrónico em infraestrutura do fornecedor (Public Cloud) instigando as organizações angolanas a darem um passo – calculado e esclarecido - na adoção desta nova tecnologia, pois acreditamos ser significativo no sentido de incentivar maior produtividade. No que concerne ao estudo empírico, conclui-se que a problemática deverá ser devidamente pensada no aspeto contratual, a prudência vai para o cuidado na escolha do fornecedor e na contratualização de níveis de serviços adequados. Conclui-se que existe viabilidade da migração do e-mail para a cloud pública, ao invés das aplicações core, as quais pela sua avaliação, fator estratégico, segurança e ausência de leis especificas não se aconselha de imediato a sua migração, quanto à viabilidade da virtualização de desktop em servidores de Data center interno apontam para a realização de protótipos que avaliem no terreno a viabilidade das soluções propostas.
Abstract: The concept of Cloud Computing has evolved constantly, in strand of service models, based on pooling of technological resources. Increasingly, it has used virtualization technology to optimize resources, which are shared by all accounts, a self-service format. These features result in a flexible and progressive behavior of resources. The management of the service provided, makes up depending on the service level agreement established between the client and the cloud provider, and the constant Technological developments are rapidly changing in terms of Information and Communication Technologies (TIC). The study, of qualitative nature, is guided by a Case Study, held in Luanda Province, the telecommunications company Filho, S.A., in order to seek new solutions for the purpose of increase productivity of the company, leading to what is consider innovative solutions, rapid implementation and low cost. The overall objective of this dissertation is to examine the feasibility of the adoption of the Cloud Computing in Filho, S.A through two perspectives: the virtualization of desktop work environment internal datacenter servers and the use of the email file management services in infrastructure of the supplier (Public Cloud) instigating the Angolan organizations to take a step - calculated and informed - in the adoption of this new technology because we believe it is meaningful towards encouraging greater productivity. Concerning the empirical study, it is concluded that the issue should be appropriately thought out in the contractual aspect, prudence goes to careful in selecting the supplier and the contract awarding of adequate service levels. It is concluded that there is viability of e-mail migration to the public cloud, rather than of core applications, which for its evaluation, strategic factor, safety and absence of specific laws is not advised immediately to their migration, as to the feasibility desktop virtualization in data center internal servers point to the construction of prototypes which assess the field the feasibility of the solutions proposed.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії