Дисертації з теми "Cloud compute services"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Cloud compute services.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 дисертацій для дослідження на тему "Cloud compute services".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Menzel, Michael [Verfasser]. "Comparative Assessment of Cloud Compute Services using Run-Time Meta-Data : A Framework for Performance Measurements and Virtual Machine Image Introspections / Michael Menzel." Berlin : epubli GmbH, 2015. http://d-nb.info/1072336030/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Величко, Георгій Вячеславович. "Методи та засоби прогнозування індексу акцій у реальному часі на базі хмарних обчислювальних сервісів". Master's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/46687.

Повний текст джерела
Анотація:
Магістерська дисертація: 92 с., 28 рис., 21 табл., 1 дод., 30 джерел. Тема роботи — Методи та засоби прогнозування індексу акцій у реальному часі на базі хмарних обчислювальних сервісів. Об’єкт дослідження — методи прогнозування акцій на базі хмарних обчислювальних сервісів. Предмет досліджень — багатошарова нейронна мережа, згорткова нейронна мережа та мережа довгої короткочасної пам’яті, хмарні обчислювальні сервіси, Amazon Web Services. Мета роботи — підвищити ефективність прогнозування індексу акцій на базі хмарних обчислювальних сервісів та розробити модель реалізації системи на базі хмарних сервісів. Актуальність — використання апарату штучних нейронних мереж дає змогу робити більш точні передбачення ціни акцій порівнюючи з іншими технічними методами. Хмарні сервіси забезпечують швидке та гнучке розгортання інфраструктури, забезпечує їх повсякчасну доступність. В ході виконання роботи було реалізовано декілька ахітектур нейронних мереж та проведено аналіз результатів їх роботи. Також було cпроектовано систему прогнозування індексу акцій в реальному часі на базі хмарних сервісів. Для покращення результатів у майбутньому можна застосувати Keras Tuner, який автоматично підбирає гіперпараметри нейронної мережі. Також можна використовувати додаткову інформацію про компанію і додавати ці дані до моделей.
Master`s thesis contains: 92 p., 21 tables, 28 fig., 1 add. and 30 references. The theme: The mechanisms tools for real-time stock market index prediction based on Cloud Compute Services. The objects of this research are mechanisms for stock market index prediction based on Cloud Compute Services. The subjects of this research are neural network architectures: multilayer neural network, convolutional neural network, long short-term memory, cloud compute services, Amazon Web Services. The purpose of this work is to improve efficiency of stock market index prediction based on Cloud Compute Services and design model of system for stock market index forecasting based on Cloud Compute Services. The relevance of this topic is that using neural networks could drastically improve stock market values forecasting comparing to other technical methods. Cloud compute services provides fast and flexible deployment of infrastructure as well as constant availability. Also designed a model of system for real-time stock index forecasting based on cloud compute services. During research I built three architectures of neural networks and analyzed which of them work better with the given case. For further research, it is possible to use Keras Tuner which allows to automatically tune hyperparameters on our neural network and improve output result. Also, additional data about companies provided real-time can improve models.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Menzel, Michael [Verfasser], Stefan [Akademischer Betreuer] Tai, Odej [Akademischer Betreuer] Kao, and Alexander [Akademischer Betreuer] Mädche. "Comparative assessment of cloud compute services using run-time meta-data : a framework for performance measurements and virtual machine image introspections / Michael Menzel. Gutachter: Stefan Tai ; Odej Kao ; Alexander Mädche. Betreuer: Stefan Tai." Berlin : Technische Universität Berlin, 2015. http://d-nb.info/1075807352/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Menzel, Michael Verfasser], Stefan [Akademischer Betreuer] Tai, Odej [Akademischer Betreuer] Kao, and Alexander [Akademischer Betreuer] [Mädche. "Comparative assessment of cloud compute services using run-time meta-data : a framework for performance measurements and virtual machine image introspections / Michael Menzel. Gutachter: Stefan Tai ; Odej Kao ; Alexander Mädche. Betreuer: Stefan Tai." Berlin : Technische Universität Berlin, 2015. http://nbn-resolving.de/urn:nbn:de:kobv:83-opus4-65637.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Pawar, Pramod S. "Cloud broker based trust assessment of cloud service providers." Thesis, City University London, 2015. http://openaccess.city.ac.uk/13687/.

Повний текст джерела
Анотація:
Cloud computing is emerging as the future Internet technology due to its advantages such as sharing of IT resources, unlimited scalability and flexibility and high level of automation. Along the lines of rapid growth, the cloud computing technology also brings in concerns of security, trust and privacy of the applications and data that is hosted in the cloud environment. With large number of cloud service providers available, determining the providers that can be trusted for efficient operation of the service deployed in the provider’s environment is a key requirement for service consumers. In this thesis, we provide an approach to assess the trustworthiness of the cloud service providers. We propose a trust model that considers real-time cloud transactions to model the trustworthiness of the cloud service providers. The trust model uses the unique uncertainty model used in the representation of opinion. The Trustworthiness of a cloud service provider is modelled using opinion obtained from three different computations, namely (i) compliance of SLA (Service Level Agreement) parameters (ii) service provider satisfaction ratings and (iii) service provider behaviour. In addition to this the trust model is extended to encompass the essential Cloud characteristics, credibility for weighing the feedbacks and filtering mechanisms to filter the dubious feedback providers. The credibility function and the early filtering mechanisms in the extended trust model are shown to assist in the reduction of impact of malicious feedback providers.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Aldawsari, B. M. A. "An energy-efficient multi-cloud service broker for green cloud computing environment." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/7954/.

Повний текст джерела
Анотація:
The heavy demands on cloud computing resources have led to a substantial growth in energy consumption of the data transferred between cloud computing parties (i.e., providers, datacentres, users, and services) and in datacentre’s services due to the increasing loads on these services. From one hand, routing and transferring large amounts of data into a datacentre located far from the user’s geographical location consume more energy than just processing and storing the same data on the cloud datacentre. On the other hand, when a cloud user submits a job (in the form of a set of functional and non-functional requirements) to a cloud service provider (aka, datacentre) via a cloud services broker; the broker becomes responsible to find the best-fit service to the user request based mainly on the user’s requirements and Quality of Service (QoS) (i.e., response time, latency). Hence, it becomes a high necessity to locate the lowest energy consumption route between the user and the designated datacentre; and the minimum possible number of most energy efficient services that satisfy the user request. In fact, finding the most energy-efficient route to the datacentre, and most energy efficient service(s) to the user are the biggest challenges of multi-cloud broker’s environment. This thesis presents and evaluates a novel multi-cloud broker solution that contains three innovative models and their associated algorithms. The first one is aimed at finding the most energy efficient route, among multiple possible routes, between the user and cloud datacentre. The second model is to find and provide the lowest possible number of most energy efficient services in order to minimise data exchange based on a bin-packing approach. The third model creates an energy-aware composition plan by integrating the most energy efficient services, in order to fulfil user requirements. The results demonstrated a favourable performance of these models in terms of selecting the most energy efficient route and reaching the least possible number of services for an optimum and energy efficient composition.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Winberg, André, and Ramin Alberto Golrang. "Analytics as a Service : Analysis of services in Microsoft Azure." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-47655.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Sääf, Alexander. "Cloud Services for Building the Modern Internet of Things : An Examination of IoT Cloud Service Providers." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-162090.

Повний текст джерела
Анотація:
As the IoT has grown in popularity, modern Cloud Providers have begun offering IoT-specific features. These features could provide IoT developers with a lot of aid, but they are new and relatively unexplored. This study aims to explore these IoT-specific features in order to build a better foundation for developers looking to leverage them to improve their IoT systems or development process. To do this, a literature study combined with a case study was carried out. The literature study gives insight into the current research around IoT and IoT cloud providers, for example with common issues and possible applications. The case study provides a reference of how a simple proof-of-concept system can be developed using two of the available providers: AWS IoT and Azure IoT.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mu, Kehan. "Fault-Tolerant Cloud Services." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264216.

Повний текст джерела
Анотація:
Nowadays, due to the convenience of deployment, ease to scale up and cost savings, the application of cloud computing systems has spread throughout the factory, commercial and individual users. However, fault tolerance in cloud computing systems has always been an important topic due to the high failure rate caused by the sheer size of cloud computing systems. This thesis presents an implementation of a fault-tolerant system called "supervision system" as a fault-tolerant mechanism for cloud computing systems. We first proposed a supervisor-worker relation: a supervisor node is responsible for monitoring its child (worker or another supervisor), and the worker node which does the actual work periodically reset a timer in its supervisor. If the corresponding timer overflows, the supervisor marks it as a failure, and try to restore or restart a new instance of it. The system also supports a multi-watchdog mode, which uses more fine-grained watchdogs that group the threads in the worker and applies different strategies to the groups. Besides the local system, we also implemented a remote supervision system to ensure the safety of local root supervisors, by periodically saving its running state and uploading the image files to its remote supervisor. If an overflow occurs, the remote supervisor remotely calls the restore function on the local machine. Then the restore function gets the most recent image files from the remote supervisor and restores itself. In addition to the implementation details of the system, we designed several test cases and tested the speed of each system part. According to the results, we can conclude that the system works as we expected.
Idag används molnberäkningssystem över hela fabriken, kommersiella och enskilda användare på grund av enkel installation, enkel expansion och kostnadsbesparingar. Feltolerans i molnberäkningssystem har dock alltid varit ett viktigt ämne, eftersom den stora storleken på molnberäkningssystem har lett till höga felfrekvenser. Detta dokument introducerar implementeringen av ett feltolerant system som kallas ett "övervakat systemsom en feltolerant mekanism för molnberäkningssystem. Vi föreslår först ett förhållande mellan arbetsledare och arbetare: en handledare nod ansvarar för att övervaka sina barn (personal eller annan handledare), och arbetsnoden som utför det verkliga arbetet återställer periodvis timern i sin handledare. Om motsvarande timer går över, markerar handledaren den som misslyckad och försöker återuppta eller starta om sin nya instans. Systemet stöder också ett flermonitorläge som använder finare skärmar som grupperar trådar i arbetaren och tillämpar olika policyer för gruppen. Förutom det lokala systemet har vi implementerat ett fjärrövervakningssystem för att säkerställa den lokala rotadministratörens säkerhet genom att regelbundet spara körstatus och ladda upp bildfiler till fjärrmonitorn. Om ett överflöd inträffar kommer den fjärrhypervisaren att ringa fjärr återställningsfunktionen på den lokala maskinen. Återställningsfunktionen tar sedan den senaste bildfilen från fjärrkontrollen och återställer sig själv. Förutom systemets implementeringsdetaljer, designade vi också flera testfall och testade hastigheten för varje del av systemet. Baserat på resultaten kan vi dra slutsatsen att systemet fungerar som förväntat.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Sajjad, Ali. "A secure and scalable communication framework for inter-cloud services." Thesis, City University London, 2015. http://openaccess.city.ac.uk/14415/.

Повний текст джерела
Анотація:
A lot of contemporary cloud computing platforms offer Infrastructure-as-a-Service provisioning model, which offers to deliver basic virtualized computing resources like storage, hardware, and networking as on-demand and dynamic services. However, a single cloud service provider does not have limitless resources to offer to its users, and increasingly users are demanding the features of extensibility and inter-operability with other cloud service providers. This has increased the complexity of the cloud ecosystem and resulted in the emergence of the concept of an Inter-Cloud environment where a cloud computing platform can use the infrastructure resources of other cloud computing platforms to offer a greater value and flexibility to its users. However, there are no common models or standards in existence that allows the users of the cloud service providers to provision even some basic services across multiple cloud service providers seamlessly, although admittedly it is not due to any inherent incompatibility or proprietary nature of the foundation technologies on which these cloud computing platforms are built. Therefore, there is a justified need of investigating models and frameworks which allow the users of the cloud computing technologies to benefit from the added values of the emerging Inter-Cloud environment. In this dissertation, we present a novel security model and protocols that aims to cover one of the most important gaps in a subsection of this field, that is, the problem domain of provisioning secure communication within the context of a multi-provider Inter-Cloud environment. Our model offers a secure communication framework that enables a user of multiple cloud service providers to provision a dynamic application-level secure virtual private network on top of the participating cloud service providers. We accomplish this by taking leverage of the scalability, robustness, and flexibility of peer-to-peer overlays and distributed hash tables, in addition to novel usage of applied cryptography techniques to design secure and efficient admission control and resource discovery protocols. The peer-to-peer approach helps us in eliminating the problems of manual configurations, key management, and peer churn that are encountered when setting up the secure communication channels dynamically, whereas the secure admission control and secure resource discovery protocols plug the security gaps that are commonly found in the peer-to-peer overlays. In addition to the design and architecture of our research contributions, we also present the details of a prototype implementation containing all of the elements of our research, as well as showcase our experimental results detailing the performance, scalability, and overheads of our approach, that have been carried out on actual (as opposed to simulated) multiple commercial and non-commercial cloud computing platforms. These results demonstrate that our architecture incurs minimal latency and throughput overheads for the Inter-Cloud VPN connections among the virtual machines of a service deployed on multiple cloud platforms, which are 5% and 10% respectively. Our results also show that our admission control scheme is approximately 82% more efficient and our secure resource discovery scheme is about 72% more efficient than a standard PKI-based (Public Key Infrastructure) scheme.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Chen, Tao. "Self-aware and self-adaptive autoscaling for cloud based services." Thesis, University of Birmingham, 2016. http://etheses.bham.ac.uk//id/eprint/6713/.

Повний текст джерела
Анотація:
Modern Internet services are increasingly leveraging on cloud computing for flexible, elastic and on-demand provision. Typically, Quality of Service (QoS) of cloud-based services can be tuned using different underlying cloud configurations and resources, e.g., number of threads, CPU and memory etc., which are shared, leased and priced as utilities. This benefit is fundamentally grounded by autoscaling: an automatic and elastic process that adapts cloud configurations on-demand according to time-varying workloads. This thesis proposes a holistic cloud autoscaling framework to effectively and seamlessly address existing challenges related to different logical aspects of autoscaling, including architecting autoscaling system, modelling the QoS of cloudbased service, determining the granularity of control and deciding trade-off autoscaling decisions. The framework takes advantages of the principles of self-awareness and the related algorithms to adaptively handle the dynamics, uncertainties, QoS interference and trade-offs on objectives that are exhibited in the cloud. The major benefit is that, by leveraging the framework, cloud autoscaling can be effectively achieved without heavy human analysis and design time knowledge. Through conducting various experiments using RUBiS benchmark and realistic workload on real cloud setting, this thesis evaluates the effectiveness of the framework based on various quality indicators and compared with other state-of-the-art approaches.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Wang, Tony. "A Service for Provisioning Compute Infrastructure in the Cloud." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-393349.

Повний текст джерела
Анотація:
The amount of data has grown tremendously over the last decade. Cloud computing is a solution to handle large-scale computations and immense data sets. However, cloud computing comes with a multitude of challenges that scientist who are using the data have to tackle. Provisioning and orchestration cloud infrastructure is a challenge in itself with a wide variety of applications and cloud providers that are available. This thesis explores the idea of simplifying the provisioning of computing cloud applications in the cloud. The result of this work is a service which can seamlessly provision and execute cloud computations using different applications and cloud providers.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Chen, Chao. "Performance-oriented service management in clouds." Thesis, University of Warwick, 2016. http://wrap.warwick.ac.uk/81885/.

Повний текст джерела
Анотація:
Cloud computing has provided the convenience for many IT-related and traditional industries to use feature-rich services to process complex requests. Various services are deployed in the cloud and they interact with each other to deliver the required results. How to effectively manage these services, the number of which is ever increasing, within the cloud has unavoidably become a critical issue for both tenants and service providers of the cloud. In this thesis, we develop the novel resource provision frameworks to determine resources provision for interactive services. Next, we propose the algorithms for mapping Virtual Machines (VMs) to Physical Machines (PMs) under different constraints, aiming to achieve the desired Quality-of-Services (QoS) while optimizing the provisions in both computing resources and communication bandwidth. Finally, job scheduling may become a performance bottleneck itself in such a large scale cloud. In order to address this issue, the distributed job scheduling framework has been proposed in the literature. However, such distributed job scheduling may cause resource conflict among distributed job schedulers due to the fact that individual job schedulers make their job scheduling decisions independently. In this thesis, we investigate the methods for reducing resource conflict. We apply the game theoretical methodology to capture the behaviour of the distributed schedulers in the cloud. The frameworks and methods developed in this thesis have been evaluated with a simulated workload, a large-scale workload trace and a real cloud testbed.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Großkopf, Heiko. "Challenges of Service Interchange in a cross cloud SOA Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-42979.

Повний текст джерела
Анотація:
This Master’s Thesis examines and documents challenges related to the flexible interchange of web services within a cross-cloud Service Oriented Computing scenario (SOC).Starting with a theoretical approach, hypotheses are defined and processed to create testing scenarios for a practical examination. Both examinations are used to identify possible challenges. Next, encountered challenges are described, discussed and classified. Lastly, solution approaches to identified challenges are presented. The solution approaches concern related topics, such as service standardization, semantic methods, heuristics, and security/trust mechanisms. Several approaches to different challenges are reviewed in this particular context, to present an overview for future research on the subject.It is remarkable that there will be more service standardization in the future, but to achieve full automation it will be, on the long run, necessary to evolve and adopt more sophisticated solution approaches such as semantic methods or heuristics.This work is embedded into the framework of a research co-operation between the Linnaeus University Växjö and the University of Applied Sciences Karlsruhe. Results however are also applicable to other research scenarios.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Krotsiani, M. "Model driven certification of Cloud service security based on continuous monitoring." Thesis, City University London, 2016. http://openaccess.city.ac.uk/15044/.

Повний текст джерела
Анотація:
Cloud Computing technology offers an advanced approach for the provision of infrastructure, platform and software services without the need of extensive cost of owning, operating or maintaining the computational infrastructures required. However, despite being cost effective, this technology has raised concerns regarding the security, privacy and compliance of data or services offered through cloud systems. This is mainly due to the lack of transparency of services to the consumers, or due to the fact that service providers are unwilling to take full responsibility for the security of services that they offer through cloud systems, and accept liability for security breaches [18]. In such circumstances, there is a trust deficiency that needs to be addressed. The potential of certification as a means of addressing the lack of trust regarding the security of different types of services, including the cloud, has been widely recognised [149]. However, the recognition of this potential has not led to a wide adoption, as it was expected. The reason could be that certification has traditionally been carried out through standards and certification schemes (e.g., ISO27001 [149], ISO27002 [149] and Common Criteria [65]), which involve predominantly manual systems for security auditing, testing and inspection processes. Such processes tend to be lengthy and have a significant financial cost, which often prevents small technology vendors from adopting it [87]. In this thesis, we present an automated approach for cloud service certification, where the evidence is gathered through continuous monitoring. This approach can be used to: (a) define and execute automatically certification models, to continuously acquire and analyse evidence regarding the provision of services on cloud infrastructures through continuous monitoring; (b) use this evidence to assess whether the provision is compliant with required security properties; and (c) generate and manage digital certificates to confirm the compliance of services with specific security properties.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Larsson, Lars. "Placement and Monitoring of Orchestrated Cloud Services." Licentiate thesis, Umeå universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-98030.

Повний текст джерела
Анотація:
Cloud computing offers pay-per-use on-demand access to computer resources for hosting program execution environments for software service deployment. Management of cloud resources includes determining, based on current monitored resource availability, which part(s) of a computational infrastructure should host such program execution environments in a process called placement. Our work defines directives that lets consumers of cloud resources influence placement to express relationships between cloud services (orchestration) and deployment constraints to uphold for related service components, without surrendering the ultimate control over placement from the infrastructure owner. The infrastructure owner remains free to define their policies and placement optimization criteria, e.g., to consolidate work that needs to be done to as few physical host machines as possible for power savings reasons. We show how the placement process can be adjusted to take such influence into account and validate through simulations that the adjustments produce the correct result without too large computational impact on the placement process itself. Further, we present a technique for transferring large data files between cloud data centers that operate in (separate) cloud federations that avoids repeated transfers in a delegation chain between members of (different) cloud federations. Finally, we present a non-invasive method of extracting monitoring data from a service deployed in a cloud federation, and a framework for making monitoring information available and understandable in spite of technical differences between monitoring systems used in cloud federations.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Fargo, Farah Emad. "Resilient Cloud Computing and Services." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/347137.

Повний текст джерела
Анотація:
Cloud Computing is emerging as a new paradigm that aims at delivering computing as a utility. For the cloud computing paradigm to be fully adopted and effectively used it is critical that the security mechanisms are robust and resilient to malicious faults and attacks. Securing cloud is a challenging research problem because it suffers from current cybersecurity problems in computer networks and data centers and additional complexity introduced by virtualizations, multi-tenant occupancy, remote storage, and cloud management. It is widely accepted that we cannot build software and computing systems that are free from vulnerabilities and that cannot be penetrated or attacked. Furthermore, it is widely accepted that cyber resilient techniques are the most promising solutions to mitigate cyberattacks and change the game to advantage defender over attacker. Moving Target Defense (MTD) has been proposed as a mechanism to make it extremely challenging for an attacker to exploit existing vulnerabilities by varying different aspects of the execution environment. By continuously changing the environment (e.g. Programming language, Operating System, etc.) we can reduce the attack surface and consequently, the attackers will have very limited time to figure out current execution environment and vulnerabilities to be exploited. In this dissertation, we present a methodology to develop an Autonomic Resilient Cloud Management (ARCM) based on MTD and autonomic computing. The proposed research will utilize the following capabilities: Software Behavior Obfuscation (SBO), replication, diversity, and Autonomic Management (AM). SBO employs spatiotemporal behavior hiding or encryption and MTD to make software components change their implementation versions and resources randomly to avoid exploitations and penetrations. Diversity and random execution is achieved by using AM that will randomly "hot" shuffling multiple functionally-equivalent, behaviorally-different software versions at runtime (e.g., the software task can have multiple versions implemented in a different language and/or run on a different platform). The execution environment encryption will make it extremely difficult for an attack to disrupt normal operations of cloud. In this work, we evaluated the performance overhead and effectiveness of the proposed ARCM approach to secure and protect a wide range of cloud applications such as MapReduce and scientific and engineering applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Fang, Daren. "A semantic framework for unified cloud service search, recommendation, retrieval and management." Thesis, Edinburgh Napier University, 2015. http://researchrepository.napier.ac.uk/Output/9836.

Повний текст джерела
Анотація:
Cloud computing (CC) is a revolutionary paradigm of consuming Information and Communication Technology (ICT) services. However, while trying to find the optimal services, many users often feel confused due to the inadequacy of service information description. Although some efforts are made in the semantic modelling, retrieval and recommendation of cloud services, existing practices would only work effectively for certain restricted scenarios to deal for example with basic and non-interactive service specifications. In the meantime, various service management tasks are usually performed individually for diverse cloud resources for distinct service providers. This results into significant decreased effectiveness and efficiency for task implementation. Fundamentally, it is due to the lack of a generic service management interface which enables a unified service access and manipulation regardless of the providers or resource types. To address the above issues, the thesis proposes a semantic-driven framework, which integrates two main novel specification approaches, known as agility-oriented and fuzziness-embedded cloud service semantic specifications, and cloud service access and manipulation request operation specifications. These consequently enable comprehensive service specification by capturing the in-depth cloud concept details and their interactions, even across multiple service categories and abstraction levels. Utilising the specifications as CC knowledge foundation, a unified service recommendation and management platform is implemented. Based on considerable experiment data collected on real-world cloud services, the approaches demonstrate distinguished effectiveness in service search, retrieval and recommendation tasks whilst the platform shows outstanding performance for a wide range of service access, management and interaction tasks. Furthermore, the framework includes two sets of innovative specification processing algorithms specifically designed to serve advanced CC tasks: while the fuzzy rating and ontology evolution algorithms establish a manner of collaborative cloud service specification, the service orchestration reasoning algorithms reveal a promising means of dynamic service compositions.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Maeser, Robert K. III. "A Model-Based Framework for Analyzing Cloud Service Provider Trustworthiness and Predicting Cloud Service Level Agreement Performance." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10785821.

Повний текст джерела
Анотація:

Analytics firm Cyence estimated Amazon’s four-hour cloud computing outage on February 28, 2017 “cost S&P 500 companies at least $150 million” (Condliffe 2017) and traffic monitoring firm Apica claimed “54 of the top 100 online retailers saw site performance slump by at least 20 percent” (Condliffe 2017). 2015 data center outages cost Fortune 1000 companies between $1.25 and $2.5 billion (Ponemon 2017). Despite potential risks, the cloud computing industry continues to grow. For example, Internet of Things, which is projected to grow 266% between 2013 and 2020 (MacGillivray et al. 2017), will drive increased demand and dependency on cloud computing as data across multiple industries is collected and sent back to cloud data centers for processing. Enterprises continue to increase demand and dependency with 85% having multi-cloud strategies, up from 2016 (RightScale 2017a). This growth and dependency will influence risk exposure and potential for impact (e.g. availability, reliability, performance, security, financial). The research in this Praxis and proposed solution focuses on calculating cloud service provider (CSP) trustworthiness based on cloud service level agreement (SLA) criteria and predicting cloud SLA availability performance for cloud computing services. Evolving industry standards for cloud SLAs (EC 2014, Hunnebeck et al. 2011, ISO/IEC 2016, NIST 2015, Hogben, Giles and Dekker 2012) and existing work regarding CSP trustworthiness (Ghosh, Ghosh and Das 2015, Taha et al. 2014) will be leveraged as the predictive model (using Linear Regression Analysis) is constructed to analyze CSP cloud computing service, SLA performance and CSP trustworthiness.

Стилі APA, Harvard, Vancouver, ISO та ін.
20

Nallur, Vivek. "A decentralized self-adaptation mechanism for service-based applications in the cloud." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3383/.

Повний текст джерела
Анотація:
This thesis presents a Cloud-based-Multi-Agent System (Clobmas) that uses multiple double auctions, to enable applications to self-adapt, based on their QoS requirements and budgetary constraints. We design a marketplace that allows applications to select services, in a decentralized manner. We marry the marketplace with a decentralized service evaluation and- selection mechanism, and a price adjustment technique to allow for QoS constraint satisfaction. Applications in the cloud using the Software-As-A-Service paradigm will soon be commonplace. In this context, long-lived applications will need to adapt their QoS, based on various parameters. Current service-selection mechanisms fall short on the dimensions that service based applications vary on. Clobmas is shown to be an effective mechanism, to allow both applications (service consumers) and clouds (service providers) to self-adapt to dynamically changing QoS requirements. Furthermore, we identify the various axes on which service applications vary, and the median values on those axes. We measure Clobmas on all of these axes, and then stress-test it to show that it meets all of our goals for scalability.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Alsrheed, F. "Contribution to agents-based negotiation and monitoring of cloud computing service level agreement." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4339/.

Повний текст джерела
Анотація:
Cloud Computing environments are dynamic and open systems, where cloud providers and consumers frequently join and leave the cloud marketplaces. Due to the increasing number of cloud consumers and providers, it is becoming almost impossible to facilitate face to face meetings to negotiate and establish a Service Level Agreement (SLA); thus automated negotiation is needed to establish SLAs between service providers and consumers with no previous knowledge of each other. In this thesis, I propose, an Automated Cloud Service Level Agreement framework (ACSLA). ACSLA is made up of five stages, and the corresponding software agent components: Gathering, Filtering, Negotiation, SLA Agreement and Monitoring. In the Gathering stage all the information about the providers and what they can offer is gathered. In the Filtering stage the customer’s agent will send the request to ACSLA, which will filter all the providers in order to recommend the best matched candidates. In Negotiation stage the customer’s agent will negotiate separately with each candidate provider using different negotiation algorithms, which will be evaluated and for which recommendations and guidelines will be provided. The output of this stage is that the best outcome from the customer’s perspective will be picked up, which will be the agreed value for each parameter in the SLA. In SLA Agreement stage the provider’s agent and the customer‘s agent will be informed about the Agreement, which will be specified in measurable terms. The output of the SLA Agreement stage will be a list of metrics that can be monitored in the Monitoring stage. Customer’s agent and provider’s agent will also negotiate and agree about the penalties and actions will be taken in case the SLA has been violated and unfulfilled. There is a variety of actions that can be taken, like informing both sides, recommending solutions, self-healing and hot-swapping. ACSLA is evaluated using case studies which show its flexibility and effectiveness. ACSAL offers a novel approach to tackle many challenging issues in the current and likely future, cloud computing market. It is the first complete automated framework for cloud SLA. There are many automated negotiation algorithms and protocols, which have been developed over the years in other research areas; establishing functional solutions applicable to the cloud-computing environment is not an easy task. Rubinstein’s Alternating Offers Protocol, also known as the Rubinstein bargaining model, has been investigated for application in automated cloud SLA, and it offers a satisfactory technical solution for this challenging problem. The purpose of this research was also to apply the state of the art in negotiation automated algorithms/agents within a described Cloud Computing SLA framework, to develop new algorithms, and to evaluate and recommend the most appropriate negotiation approach based on many criteria.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Tataru, Augustin. "Metrics for Evaluating Machine Learning Cloud Services." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-37882.

Повний текст джерела
Анотація:
Machine Learning (ML) is nowadays being offered as a service by several cloud providers. Consumers require metrics to be able to evaluate and compare between multiple ML cloud services. There aren’t many established metrics that can be used specifically for these types of services. In this paper, the Goal-QuestionMetric paradigm is used to define a set of metrics applicable for ML cloud services. The metrics are created based on goals expressed by professionals who use or are interested in using these services. At the end, a questionnaire is used to evaluate the metrics based on two criteria: relevance and ease of use.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Darwich, Mahmoud K. "Cost-Efficient Video On Demand (VOD) Streaming Using Cloud Services." Thesis, University of Louisiana at Lafayette, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10682876.

Повний текст джерела
Анотація:

Video streaming has become ubiquitous and pervasive in usage of the electronic displaying devices. Streaming becomes more challenging when dealing with an enormous number of video streams. Particularly, the challenges lie in streaming types, video transcoding, video storing, and video delivering to users with high satisfaction and low cost for video streaming providers. In this dissertation, we address the challenges and issues encountered in video streaming and cloud-based video streaming. Specically, we study the impact factors on video transcoding in the cloud, and then we develop a model to trade-o between performance and cost of cloud. On the other hand, video streaming providers generally have to store several formats of the same video and stream the appropriate format based on the characteristics of the viewer's device. This approach, called pre-transcoding, incurs a signicant cost to the stream providers that rely on cloud services. Furthermore, pre-transcoding is proven to be inecient due to the long-tail access pattern to video streams. To reduce the incurred cost, we propose to pre-transcode only frequently-accessed videos (called hot videos) and partially pre-transcode others, depending on their hotness degree. Therefore, we need to measure video stream hotness. Accordingly, we first, provide a model to measure the hotness of video streams. Then, we develop methods that operate based on the hotness measure and determine how to pre-transcode videos to minimize the cost of stream providers. The partial pre-transcoding methods operate at dierent granularity levels to capture dierent patterns in accessing videos. Particularly, one of the methods operates faster but cannot partially pre-transcode videos with the non-long-tail access pattern. Experimental results show the ecacy of our proposed methods, specically, when a video stream repository includes a high percentage of Frequently Accessed Video Streams and a high percentage of videos with the non-long-tail accesses pattern.

Стилі APA, Harvard, Vancouver, ISO та ін.
24

Lundberg, Malin. "Evaluation of a backend for computer games using a cloud service." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-316614.

Повний текст джерела
Анотація:
Cloud services are popular for hosting applications because they offer simplicity and cost efficiency. There are a lot of different providers offering many different services, which can make it hard to find the one most suitable for you. To make informed decisions you need to evaluate different services. This project evaluates a cloud service, called Amazon Lambda, from one of the biggest cloud service providers. Amazon Lambda is a simple service which runs one function in response to an event. In this project it is evaluated on suitability, performance and cost. To evaluate suitability, a certain kind of applications, games, were selected. The game industry is innovative and put high requirements on performance. A few simple Lambda functions were implemented and integrated in a prototype game. Some calculations were made for determining the cost of hosting such a game on Amazon Lambda. A few tests were implemented and run in order to further evaluate the performance.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Fouodji, Tasse Ghislain. "μCloud : a P2P cloud platform for computing service provision". Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1006669.

Повний текст джерела
Анотація:
The advancements in virtualization technologies have provided a large spectrum of computational approaches. Dedicated computations can be run on private environments (virtual machines), created within the same computer. Through capable APIs, this functionality is leveraged for the service we wish to implement; a computer power service (CPS). We target peer-to-peer systems for this service, to exploit the potential of aggregating computing resources. The concept of a P2P network is mostly known for its expanded usage in distributed networks for sharing resources like content files or real-time data. This study adds computing power to the list of shared resources by describing a suitable service composition. Taking into account the dynamic nature of the platform, this CPS provision is achieved using a self stabilizing clustering algorithm. So, the resulting system of our research is based around a hierarchical P2P architecture and offers end-to-end consideration of resource provisioning and reliability. We named this system μCloud and characterizes it as a self-provisioning cloud service platform. It is designed, implemented and presented in this dissertation. Eventually, we assessed our work by showing that μCloud succeeds in providing user-centric services using a P2P computing unit. With this, we conclude that our system would be highly beneficial in both small and massively deployed environments.
KMBT_223
Adobe Acrobat 9.51 Paper Capture Plug-in
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Anestos, Nikolaos-Ektoras. "Cloud Service Orchestration Using Constraint Programming." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194507.

Повний текст джерела
Анотація:
Cloud applications and services are frequently built using multiple tiers and current trends such as micro-services further increase componentization, allowing us to place each component in a different physical machine in a distributed cloud. Ericsson owns and manages very large networks, which offer diverse infrastructure in terms of computational power, storage but most importantly position in the network. Typically, a machine which is closer to the edge of the network (closer to the end user) will have limited resources but it will offer less latency, for a higher price. At the same time, several enterprise/industrial areas expect to benefit from the cloud business model in a large-scale distributed environment. These types of applications have very diverse end-2-end Service-Level Agreements (SLA) to be fulfilled, while at the same time the cloud environment needs to optimize processing, storage, and networking costs. Moreover, customers might want to change and adjust SLAs/requirements themselves using selfmanagement portals. The objective of this project is to model the network and services offered by Ericsson. Then, given the SLA, finding a valid solution of the problem, using a constraint solver. A solution is a set of physical machines that host the components the required service is composed from. This approach has many challenges since the same service can be composed from different sets of components. The connected components form a connectivity graph, where nodes in the graph are connected by physical links. But, since the connection is described by higher level components (composed by simpler components), this graph can also be expressed as a tree. Leaves in the tree are the nodes that compose the higher-level services and the ones that must be hosted in the infrastructure. The characteristics of each leaf-node depend on its parent and/or siblings in the component tree. Finally, since the components are normally connected, the physical connection between nodes in the network must be taken into consideration. The proposed model is evaluated in several cases, in order to identify how the number of the software components and the infrastructure topology affect the solution finding. The results are promising, showing fast resolution of the problem instances, varying for each test case, from a few seconds to a couple of minutes.
Molnapplikationer och tjänster är ofta byggda med flera nivåer och nuvarande trender såsom mikro-tjänster ökar ytterligare komponentiseringen, vilket tillåter oss att placera varje komponent i en annan fysisk maskin på ett distribuerat moln. Ericsson äger och förvaltar väldigt stora nätverk som erbjuder varierande infrastruktur när det gäller beräkningskraft , lagring och framför allt position i nätverket. Typiskt kommer en maskin som är närmare kanten av nätet (närmare slutanvändaren) att ha begränsade resurser, men det kommer att erbjuda mindre latens till ett högre pris. Samtidigt räknar flera företag / industriområden med att dra nytta av moln affärsmodelltjänster i en storskalig och distribuerad miljö. Den här typen av applikationer har väldigt olika end-to-end varierande servicenivåavtal (SLA) som skall uppfyllas, medan moln miljön behöver optimera bearbetnings, lagrings och nätverks kostnader. Dessutom, kan kunden komma att vilja ändra och justera SLA / krav själva med hjälp av självhantering portaler. Målet för detta projekt är att modellera nät och tjänster som erbjuds av Ericsson. Sedan, givet ett SLA, att hitta en giltig lösning på problemet, med hjälp av en villkorslösare. En lösning är en uppsättning av fysiska maskiner som är värdar för komponenterna från vilka den efterfrågade tjänsten är sammansatt. Detta tillvägagångssätt är förenat med många utmaningar eftersom samma tjänst kan bestå av olika uppsättningar av komponenter. De anslutna komponenterna bildar ett förbindelseschema, där noder i grafen är anslutna med fysiska länkar. Men eftersom anslutningen beskrivs av komponenter högre nivå (bestående av enklare komponenter), denna graf kan också uttryckas som ett träd. Löv i trädet är noderna som utgör de högre nivå tjänster och de som måste finnas i infrastrukturen. Egenskaperna hos varje löv-nod att bero på dess förälder och / eller syskon i komponentträdet. Slutligen, eftersom komponenterna i normal fall är anslutna, måste den fysiska anslutningen mellan noder i nätet tas i beaktande. Den föreslagna modellen utvärderas i flera fall, för att identifiera hur antalet programvarukomponenter och infrastrukturens topologi påverkar resultatet av lösningen. Resultaten är lovande och visar snabb lösning av problemets instanser, varierande för varje testfall, från några sekunder till ett par minuter.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Pourvali, Mahsa. "Resilience of Cloud Networking Services for Large Scale Outages." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6664.

Повний текст джерела
Анотація:
Cloud infrastructure services are enabling organizations and enterprises to outsource a wide range of computing, storage, and networking needs to external service providers. These offerings make extensive use of underlying network virtualization, i.e., virtual network (VN) embedding, techniques to provision and interconnect customized storage/computing resource pools across large network substrates. However, as cloud-based services continue to gain traction, there is a growing need to address a range of resiliency concerns, particularly with regards to large-scale outages. These conditions can be triggered by events such as natural disasters, malicious man-made attacks, and even cascading power failures. Overall, a wide range of studies have looked at network virtualization survivability, with most efforts focusing on pre-fault protection strategies to set aside backup datacenter and network bandwidth resources. These contributions include single node/link failure schemes as well as recent studies on correlated multi-failure \disaster" recovery schemes. However, pre-fault provisioning is very resource-intensive and imposes high costs for clients. Moreover this approach cannot guarantee recovery under generalized multi-failure conditions. Although post-fault restoration (remapping) schemes have also been studied, the effectiveness of these methods is constrained by the scale of infrastructure damage. As a result there is a pressing need to investigate longer-term post-fault infrastructure repair strategies to minimize VN service disruption. However this is a largely unexplored area and requires specialized consideration as damaged infrastructures will likely be repaired in a time-staged, incremental manner, i.e., progressive recovery. Furthermore, more specialized multicast VN (MVN) services are also being used to support a range of content distribution and real-time streaming needs over cloud-based infrastructures. In general, these one-to-many services impose more challenging requirements in terms of geographic coverage, delay, delay variation, and reliability. Now some recent studies have looked at MVN embedding and survivability design. In particular, the latter contributions cover both pre-fault protection and post-fault restoration methods, and also include some multi-failure recovery techniques. Nevertheless, there are no known efforts that incorporate risk vulnerabilities into the MVN embedding process. Indeed, there is a strong need to develop such methods in order to reduce the impact of large-scale outages, and this remains an open topic area. In light of the above, this dissertation develops some novel solutions to further improve the resiliency of the network virtualization services in the presence of large outages. Foremost, new multi-stage (progressive) infrastructure repair strategies are proposed to improve the post-fault recovery of VN services. These contributions include advanced simulated annealing metaheuristics as well as more scalable polynomial-time heuristic algorithms. Furthermore, enhanced \risk-aware" mapping solutions are also developed to achieve more reliable multicast (MVN) embedding, providing a further basis to develop more specialized repair strategies in the future. The performance of these various solutions is also evaluated extensively using custom-developed simulation models.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Gureya, Daharewa David. "Self-trained Proactive Elasticity Manager for Cloud-based Storage Services." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187353.

Повний текст джерела
Анотація:
The pay-as-you-go pricing model and the illusion of unlimited resources makes cloud computing a conducive environment for provision of elastic services where different resources are dynamically requested and released in response to changes in their demand. The benefit of elastic resource allocation to cloud systems is to minimize resource provisioning costs while meeting service level objectives (SLOs). With the emergence of elastic services, and more particularly elastic key-value stores, that can scale horizontally by adding/removing servers, organizations perceive potential in being able to reduce cost and complexity of large scale Web 2.0 applications. A well-designed elasticity controller helps reducing the cost of hosting services using dynamic resource provisioning and, in the meantime, does not compromise service quality. An elasticity controller often needs to be trained either online or offline in order to make it intelligent enough to make decisions on spawning or removing extra instances when workload increase or decrease. However, there are two main issues on the process of control model training. A significant amount of recent works train the models offline and apply them to an online system. This approach may lead the elasticity controller to make inaccurate decisions since not all parameters can be considered when building the model offline. The complete training of the model consumes large efforts, including modifying system setups and changing system configurations. Worse, some models can even include several dimensions of system parameters. To overcome these limitations, we present the design and evaluation of a self-trained proactive elasticity manager for cloud-based elastic key-value stores. Our elasticity controller uses online profiling and support vector machines (SVM) to provide a black-box performance model of an application’s SLO violation for a given resource demand. The model is dynamically updated to adapt to operating environment changes such as workload pattern variations, data rebalance, changes in data size, etc. We have implemented and evaluated our controller using the Apache Cassandra key-value store in an OpenStack Cloud environment. Our experiments with artificial workload traces shows that our controller guarantees a high level of SLO commitments while keeping the overall resource utilization optimal.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Andersson, Elin, and Abdel Ahmid. "OpenStack Networking Scheduler : RESOURCE MANAGEMENT AND SCHEDULINGFOR CLOUD NETWORK SERVICES." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-154597.

Повний текст джерела
Анотація:
The opportunity of vitalizing recourses is becoming increasingly attractive, and traditional machine virtualization is no longer the only thing in mind. Today, virtualization also concerns resources such as firewalls, routers and switches. For this to be possible and successful, a flexible and evolutionary scheduler is necessary. The focus of this thesis project has been to explore and develop a generic cross-service scheduler between the computing service Nova and networking service Neutron. We have designed a generic foundation for a scheduler and the aim in the future is to use this solution for other services in OpenStack such as volume, storage and image. Our starting point was the filter scheduler in Nova, which originally is designed for scheduling virtual machines (VMs) rather than scheduling network resources. A unique cross-service scheduler between Nova and Neutron is implemented and discussed in this paper. This thesis presents the design, implementation and functional verification of the Neutron scheduler and cross-service communication. The cross-service scheduling is designed so that Nova and Neutron are loosely coupled. By loosely coupled we mean that Nova and Neutron are as independent of each other as possible. The report concludes with a discussion about the project process and implementation process, and the how the solution can be developed further e.g. by implementing CLI commands for increasing the functionality of filter chains.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Chiu, David T. "Auspice: Automatic Service Planning in Cloud/Grid Environments." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1275012033.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Laukka, Lucas, and Carl Fransson. "Cloud risk analysis using OCTAVE Allegro : Identifying and analysing risks of a cloud service." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176731.

Повний текст джерела
Анотація:
Cybersecurity is currently an important and relevant issue, as more and more industries are taking advantage of the accessibility of storing information online. To create a secure system one must know the potential risks and attacks on that system, making risk analysis a very potent tool. In this study, we performed such an analysis using the risk analysis method OCTAVE Allegro on a company providing a cloud-based service to find out what risks a cloud service provider might be exposed to, and the usefulness of said risk analysis method in this circumstance. We found that OCTAVE Allegro is suitable to use on smaller companies and applicable to cloud services, and the most severe risks identified were connected to leakage of client data with a consequence of damaging the company's reputation. Common areas of concern for these risks were third parties hacking the cloud server or other company systems to gain access to sensitive information. Such risks will likely be found at any company providing a cloud service that manages sensitive data, increasing the importance of risk analysis at these companies.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Meng, Shicong. "Monitoring-as-a-service in the cloud." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43634.

Повний текст джерела
Анотація:
State monitoring is a fundamental building block for Cloud services. The demand for providing state monitoring as services (MaaS) continues to grow and is evidenced by CloudWatch from Amazon EC2, which allows cloud consumers to pay for monitoring a selection of performance metrics with coarse-grained periodical sampling of runtime states. One of the key challenges for wide deployment of MaaS is to provide better balance among a set of critical quality and performance parameters, such as accuracy, cost, scalability and customizability. This dissertation research is dedicated to innovative research and development of an elastic framework for providing state monitoring as a service (MaaS). We analyze limitations of existing techniques, systematically identify the need and the challenges at different layers of a Cloud monitoring service platform, and develop a suite of distributed monitoring techniques to support for flexible monitoring infrastructure, cost-effective state monitoring and monitoring-enhanced Cloud management. At the monitoring infrastructure layer, we develop techniques to support multi-tenancy of monitoring services by exploring cost sharing between monitoring tasks and safeguarding monitoring resource usage. To provide elasticity in monitoring, we propose techniques to allow the monitoring infrastructure to self-scale with monitoring demand. At the cost-effective state monitoring layer, we devise several new state monitoring functionalities to meet unique functional requirements in Cloud monitoring. Violation likelihood state monitoring explores the benefits of consolidating monitoring workloads by allowing utility-driven monitoring intensity tuning on individual monitoring tasks and identifying correlations between monitoring tasks. Window based state monitoring leverages distributed windows for the best monitoring accuracy and communication efficiency. Reliable state monitoring is robust to both transient and long-lasting communication issues caused by component failures or cross-VM performance interferences. At the monitoring-enhanced Cloud management layer, we devise a novel technique to learn about the performance characteristics of both Cloud infrastructure and Cloud applications from cumulative performance monitoring data to increase the cloud deployment efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Farjami, Hannah, and Nilbrink Simon Agartz. "Teaching Cloud Deployment." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254573.

Повний текст джерела
Анотація:
In today’s IT-landscape cloud computing is one of the hottest topics. There are many emerging uses and technologies for the cloud. Deployment of applications is one of the main usages of the cloud today. This has led to companies giving developers more responsibilities with deployment. Therefore, there is a need to update educations in computer science by including cloud deployment. For these reasons, this thesis attempts to give a reasonable proposal for how cloud deployment could be taught in a university course.A literature study was conducted to gather information about topics surrounding cloud deployment. These were topics like cloud computing, service models, building techniques and cloud services. Then a case study was conducted on three different cloud services, OpenShift, Cloud Foundry, and Heroku. This was to learn how to deploy. Lastly, two interviews and a survey were conducted with people that have an insight into the subject and could provide reasonable information.Based on our case study, interviews and survey we concluded a reasonable approach to how deployment with cloud services could be taught. It can be taught with a theoretical and practical part. The theoretical part could be a lecture introducing Heroku and OpenShift, followed by an assignment where students deploy an application to them. The reasons we recommend Heroku and OpenShift is for Heroku’s simple and fast deployment and OpenShift for being more educative.We also realized that cloud deployment would work best as a stand-alone course. Because during the degree project it became clear how broad cloud deployment is.
I dagens IT-miljö är molnet ett av de hetaste ämnena. Det finns många nya användningsområden och teknologier för molnet. Driftsättning av applikationer är ett av de viktigaste användningsområdena av molnet idag. Detta har lett till att företag ger utvecklare mer ansvar vid driftsättning. Därför är det nödvändigt att förändra utbildningar i datorvetenskap genom att inkludera driftsättning i molnmiljö. Av dessa skäl försöker denna avhandling ge ett rimligt förslag på hur driftsättning i molnmiljö kan läras ut på ett universitet.En litteraturstudie genomfördes för att samla information om ämnen som berör driftsättning i molnmiljö. Dessa var ämnen som molnet, servicemodeller, byggtekniker och molntjänster. Sedan genomfördes en fallstudie på tre olika molntjänster, OpenShift, Cloud Foundry och Heroku. Detta var för att lära sig hur man driftsätter. Slutligen genomfördes två intervjuer och en undersökning med personer som har insikt i ämnet och som kan ge rimlig information.Baserat på vår fallstudie, intervjuer och undersökning drog vi en slutsats för ett rimligt tillvägagångssätt för hur driftsättning i molnmiljö kunde läras ut. Det kan undervisas med en teoretisk och praktisk del. Den teoretiska delen kan vara en föreläsning som introducerar Heroku och OpenShift, följt av en uppgift där studenter driftsätter en applikation till dem. Anledningarna till att vi rekommenderar Heroku och OpenShift är för Heroku’s enkla och snabba driftsättning och OpenShift för att den är mycket mer lärorik.Vi insåg också att driftsättning i molnmiljö skulle fungera bäst som en fristående kurs. Eftersom det under examensprojektet blev klart hur brett driftsättning i molnmiljö är.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Alzaghoul, Esra Fawaz Ahmad. "Value- and debt-aware selection and composition in cloud-based service-oriented architectures using real options." Thesis, University of Birmingham, 2015. http://etheses.bham.ac.uk//id/eprint/6350/.

Повний текст джерела
Анотація:
This thesis presents a novel model for service selection and composition in Cloud-based Service-Oriented Architectures (CB-SOA), which is called CloudMTD, using real options, Dependency Structure Matrix (DSM) and propagation-cost metrics. CB-SOA architectures are composed of web services, which are leased or bought off the cloud marketplace. CB-SOA can improve its utility and add value to its composition by substituting its constituent services. The substitution decisions may introduce technical debt, which needs to be managed. The thesis defines the concept of technical debt for CB-SOA and reports on the available technical debt definitions and approaches in the literature. The formulation of service substitution problem and its technical debt valuation is based on options, which exploits Binomial Options Analysis. This thesis looks at different option types under uncertainty. This thesis is concerned with some scenarios that may lead to technical debt, which are related to web service selection and composition that has been driven by either a technical or a business objective. In each scenario, we are interested in three decisions (1) keep, (2) substitute or (3) abandon the current service. Each scenario takes into consideration either one or more QoS attribute dimension (e.g. Availability). We address these scenarios from an option-based perspective. Each scenario is linked to a suitable option type. A specific option type depends on the nature of the application, problem to be investigated, and the decision to be taken. In addition, we use Dependency Structure Matrix (DSM) in order to represent dependencies among web services in CB-SOA. We introduce time and complexity sensitive propagation-cost metrics to DSM to solve the problem. In addition, CloudMTD model informs the time-value of the decisions under uncertainty based on behavioral and structural aspects of CB-SOA.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Jääskeläinen, Perttu. "Comparing Cloud Architectures in terms of Performance and Scalability." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254615.

Повний текст джерела
Анотація:
Cloud Computing is becoming increasingly popular, with large amounts of corporations revenue coming in from various cloud solutions offered to customers. When it comes to choosing a solution, multiple options exist for the same problem from many competitors. This report focuses on the ones offered by Microsoft in their Azure platform, and compares the architectures in terms of performance and scalability.In order to determine the most suitable architecture, three offered by Azure are considered: Cloud Services (CS), Service Fabric Mesh (SFM) and Virtual Machines (VM). By developing and deploying a REST Web API to each service and performing a load test, average response times in milliseconds are measured and compared. To determine scalability, the point at which each service starts timing out requests is identified. The services are tested both by scaling up, by increasing the power of a single instance of a machine, and by scaling out, if possible, by duplicating instances of machines running in parallel.The results show that VMs fall considerably behind both CS and SFM in both performance and scalability, for a regular use case. For low amounts of requests, all services perform about the same, but as soon as the requests increase, it is clear that both SFM and CS outperform VMs. In the end, CS comes ahead both in terms of scalability and performance.Further research may be done into other platforms which offer the same service solutions, such as Amazon Web Services (AWS) and Google Cloud, or other architectures within Azure.
Molntjänster blir alltmer populära i dagens industri, där stora mängder av företagens omsättning består av tjänster erbjudna i form av molnlösningar. När det kommer till att välja en lösning finns många för samma problem, där det är upp till kunden att välja vilken som passar bäst. Denna rapport fokuserar på tjänster erbjudna av Microsofts Azure plattform, i en jämförelse av arkitekturer som belastningstestas för att mäta prestanda och skalbarhet.För att avgöra vilken arkitektur som är optimalast mäts tre olika tjänster erbjudna i Azure: Cloud Services (CS), Service Fabric Mesh (SFM) och Virtual Machines (VM). Detta görs genom att utveckla och deploya ett REST Web API som är simulerat med användare, där prestanda mäts genom att ta medelresponstiden i millisekunder per anrop. För att avgöra skalbarhet identifieras en punkt där tjänsten inte längre klarar av antalet inkommande anrop och börjar returnera felkoder. Maskinerna för varje tjänst testas både genom att skala upp, genom att förstärka en maskin, men även genom att skala ut, där det skapas flera instanser av samma maskin.Resultatet visar att Virtual Machines hamnar betydligt efter både CS och SFM i både prestanda och skalbarhet för ett vanligt användarfall. För låga mängder anrop ligger samtliga tjänster väldigt lika, men så fort anropen börjar öka så märks det tydligt att SFM och CS presterar bättre än Virtual Machines. I slutändan ligger CS i framkant, både i form av prestanda och skalbarhet.Vidare undersökning kan göras för de olika plattformarna erbjudna av konkurrenter, så som Amazon Web Services (AWS) och Google Cloud, samt andra arkitekturer från Azure.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Ambrose, William, Samuel Athley, and Niclas Dagland. "Cloud Computing : Security Risks, SLA, and Trust." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12484.

Повний текст джерела
Анотація:

With Cloud Computing becoming a popular term on the Information Technology (IT) market, security and accountability has become important issues to highlight. In our research we review these concepts by focusing on security risks with Cloud Computing and the associated services; Software, Platform and Infrastructure (SPI) and connecting them with a social study of trust.

The method that was conducted during our research was reviewing secondary literature, interviewing different experts regarding Cloud Computing and relating standards already established by ENISA, NIST, and CSA to the interviews.

The result of this study shows connections between the specific SPIs, both how they compare, but also how they differ. In the end we were also able to rank the top security risks from interviews with experts and see which SPI could be the most insecure one and  what countermeasures could be applied.

This was further related to trust and Service Level Agreement (SLA) in Cloud Computing to show how the security risks we discuss are related to these two specific areas. By highlighting this we wanted to present useable information for both clients and providers in how to create a better Cloud Computing environment.

Стилі APA, Harvard, Vancouver, ISO та ін.
37

Meinel, Christoph, Maxim Schnjakin, Tobias Metzke, and Markus Freitag. "Anbieter von Cloud Speicherdiensten im Überblick." Universität Potsdam, 2014. http://opus.kobv.de/ubp/volltexte/2014/6878/.

Повний текст джерела
Анотація:
Durch die immer stärker werdende Flut an digitalen Informationen basieren immer mehr Anwendungen auf der Nutzung von kostengünstigen Cloud Storage Diensten. Die Anzahl der Anbieter, die diese Dienste zur Verfügung stellen, hat sich in den letzten Jahren deutlich erhöht. Um den passenden Anbieter für eine Anwendung zu finden, müssen verschiedene Kriterien individuell berücksichtigt werden. In der vorliegenden Studie wird eine Auswahl an Anbietern etablierter Basic Storage Diensten vorgestellt und miteinander verglichen. Für die Gegenüberstellung werden Kriterien extrahiert, welche bei jedem der untersuchten Anbieter anwendbar sind und somit eine möglichst objektive Beurteilung erlauben. Hierzu gehören unter anderem Kosten, Recht, Sicherheit, Leistungsfähigkeit sowie bereitgestellte Schnittstellen. Die vorgestellten Kriterien können genutzt werden, um Cloud Storage Anbieter bezüglich eines konkreten Anwendungsfalles zu bewerten.
Due to the ever-increasing flood of digital information, more and more applications make use of cost-effective cloud storage services. The number of vendors that provide these services has increased significantly in recent years. The identification of an appropriate service provider requires an individual consideration of several criteria. This survey presents a comparison of some established basic storage providers. For this comparison, several criteria are extracted that are applicable to any of the selected providers and thus allow for an assessment that is as objective as possible. The criteria include factors like costs, legal information, security, performance, and supported interfaces. The presented criteria can be used to evaluate cloud storage providers in a specific use case in order to identify the most suitable service based on individual requirements.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Khan, Zeeshan H. "Exploring Strategies that IT Leaders Use to Adopt Cloud Computing." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3040.

Повний текст джерела
Анотація:
Information Technology (IT) leaders must leverage cloud computing to maintain competitive advantage. Evidence suggests that IT leaders who have leveraged cloud computing in small and medium sized organizations have saved an average of $1 million in IT services for their organizations. The purpose of this qualitative single case study was to explore strategies that IT leaders use to adopt cloud computing for their organizations. The target population consisted of 15 IT leaders who had experience with designing and deploying cloud computing solutions at their organization in Long Island, New York within the past 2 years. The conceptual framework of this research project was the disruptive innovation theory. Semistructured interviews were conducted and company documents were gathered. Data were inductively analyzed for emergent themes, then subjected to member checking to ensure the trustworthiness of findings. Four main themes emerged from the data: the essential elements for strategies to adopt cloud computing; most effective strategies; leadership essentials; and barriers, critical factors, and ineffective strategies affecting adoption of cloud computing. These findings may contribute to social change by providing insights to IT leaders in small and medium sized organizations to save money while gaining competitive advantage and ensure sustainable business growth that could enhance community standards of living.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Liu, Shuo. "Delay-Sensitive Service Request Scheduling for Cloud Computing." FIU Digital Commons, 2014. http://digitalcommons.fiu.edu/etd/1619.

Повний текст джерела
Анотація:
Cloud computing realizes the long-held dream of converting computing capability into a type of utility. It has the potential to fundamentally change the landscape of the IT industry and our way of life. However, as cloud computing expanding substantially in both scale and scope, ensuring its sustainable growth is a critical problem. Service providers have long been suffering from high operational costs. Especially the costs associated with the skyrocketing power consumption of large data centers. In the meantime, while efficient power/energy utilization is indispensable for the sustainable growth of cloud computing, service providers must also satisfy a user's quality of service (QoS) requirements. This problem becomes even more challenging considering the increasingly stringent power/energy and QoS constraints, as well as other factors such as the highly dynamic, heterogeneous, and distributed nature of the computing infrastructures, etc. In this dissertation, we study the problem of delay-sensitive cloud service scheduling for the sustainable development of cloud computing. We first focus our research on the development of scheduling methods for delay-sensitive cloud services on a single server with the goal of maximizing a service provider's profit. We then extend our study to scheduling cloud services in distributed environments. In particular, we develop a queue-based model and derive efficient request dispatching and processing decisions in a multi-electricity-market environment to improve the profits for service providers. We next study a problem of multi-tier service scheduling. By carefully assigning sub deadlines to the service tiers, our approach can significantly improve resource usage efficiencies with statistically guaranteed QoS. Finally, we study the power conscious resource provision problem for service requests with different QoS requirements. By properly sharing computing resources among different requests, our method statistically guarantees all QoS requirements with a minimized number of powered-on servers and thus the power consumptions. The significance of our research is that it is one part of the integrated effort from both industry and academia to ensure the sustainable growth of cloud computing as it continues to evolve and change our society profoundly.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Maskara, Arvind. "A Process Framework for Managing Quality of Service in Private Cloud." ScholarWorks, 2014. https://scholarworks.waldenu.edu/dissertations/3220.

Повний текст джерела
Анотація:
As information systems leaders tap into the global market of cloud computing-based services, they struggle to maintain consistent application performance due to lack of a process framework for managing quality of service (QoS) in the cloud. Guided by the disruptive innovation theory, the purpose of this case study was to identify a process framework for meeting the QoS requirements of private cloud service users. Private cloud implementation was explored by selecting an organization in California through purposeful sampling. Information was gathered by interviewing 23 information technology (IT) professionals, a mix of frontline engineers, managers, and leaders involved in the implementation of private cloud. Another source of data was documents such as standard operating procedures, policies, and guidelines related to private cloud implementation. Interview transcripts and documents were coded and sequentially analyzed. Three prominent themes emerged from the analysis of data: (a) end user expectations, (b) application architecture, and (c) trending analysis. The findings of this study may help IT leaders in effectively managing QoS in cloud infrastructure and deliver reliable application performance that may help in increasing customer population and profitability of organizations. This study may contribute to positive social change as information systems managers and workers can learn and apply the process framework for delivering stable and reliable cloud-hosted computer applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Laprade, Craig. "Domain Name Service Trust Delegation in Cloud Computing: Exploitation, Risks, and Defense." Thesis, The George Washington University, 2021. http://pqdtopen.proquest.com/#viewpdf?dispub=28156620.

Повний текст джерела
Анотація:
The Domain Name Service (DNS) infrastructure is a global distributed database that links human readable domain names with the Internet Protocol (IP) addresses of the resources that power the internet. With the explosion of cloud computing over the past decade, increasing proportions of organizations' computing services have moved from on-premise solutions to cloud providers. These services range from complete DNS management to singular services such as E-mail or a payroll application. Each of these outsourced services requires a trust delegation, that is, the owning organization needs to advertise to the world, often by DNS records, that another organization can act authoritatively on its behalf. What occurs when these trust delegations are misused? In this work, I explore the methods that can be used to exploit DNS trust delegation and then examine the top 1% of the most popular domains in the world for the presence of these exploitable vulnerabilities. Finally, I conclude with methods of defense against such attacks and the publishing of a novel tool to detect these vulnerabilities.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Sapkota, Sagar, and Khawar Shehzad. "Cloud Computing for Telecom Systems." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3068.

Повний текст джерела
Анотація:
Context: Cloud computing is reshaping the service-delivery and business-models in Information and Communications Technology (ICT). The Information Technology (IT) sector has benefited from it in the previous 3-5 years. Despite the attraction of cloud computing, it is required to have an effective application migration strategy. Cloud computing with its diverse provisioning models makes it possible for telecom vendors and service providers to decide effective service and business models. Currently, cloud computing contains security, performance and dimensioning considerations for telecom companies. Objectives: This thesis assesses the trends and issues associated with the cloud, with telecommunications perspective, while leveraging the cloud to come to a decision on a suitable cloud environment for telecom grade applications. Analysis of maturity of public cloud (in terms of compatibility, consolidation, compliance and standardization) in general and Amazon cloud in particular, is part of the thesis objective. While doing so, deployment of a telecom-grade product in the Amazon cloud will be evaluated against the current on-premise deployment. We want to identify architectural difference between the two domains, and what issues are faced when a migration is planned. This evaluation between two systems, i.e. on-premise and the cloud will significantly contribute to the research and can be used when making business decisions. Methods: We conducted literature review, survey, and a case study, assessing the above mentioned objectives. Research papers from academia and industry were chosen for literature review; personnel, with experience in cloud computing, were chosen for the survey; and a telecom-grade platform was used to assess the migration issues on Amazon cloud in the case study. The Ericsson Composition Engine (ECE) was used to check what deployment issues it can have on Amazon cloud. Its on-premise Reference Deployment Architecture was compared with the cloud-based Reference Deployment Architecture. This case study served as a confirmation to results obtained in the literature review and survey. Results: In the literature review and survey, we found motivations, trends, current applications, and challenges of cloud computing for telecom. It was found from the case study that Amazon Web Services (AWS) lacks application and network centric attributes that are required in ECE deployment. We propose recommendations that can be integrated with ECE while deploying it in a public cloud. Conclusions: Companies are choosing cloud vendors that uniquely give ease of migration and control, based on application needs and compatibility. ECE cannot be directly migrated to AWS, unless we provide Amazon specific modifications in the architecture. The survey and literature review support a private and/or hybrid strategy for ECE, along with the inclusion of cloud networking into the ECE package.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Bai, Hao. "Scheduling Design for Advance Virtual Network Services." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6461.

Повний текст джерела
Анотація:
Network virtualization allows operators to host multiple client services over their base physical infrastructures. Today, this technique is being used to support a wide range of applications in cloud computing services, content distribution, large data backup, etc. Accordingly, many different algorithms have also been developed to achieve efficient mapping of client virtual network (VN) requests over physical topologies consisting of networking infrastructures and datacenter compute/storage resources. However as applications continue to expand, there is a growing need to implement scheduling capabilities for virtual network demands in order to improve network resource utilization and guarantee quality of service (QoS) support. Now the topic of advance reservation (AR) has been studied for the case of scheduling point-to-point connection demands. Namely, many different algorithms have been developed to support various reservation models and objectives. Nevertheless, few studies have looked at scheduling more complex "topology-level'' demands, including virtual network services. Moreover, as cloud servers expand, many providers want to ensure user quality support at future instants in time, e.g., for special events, sporting venues, conference meetings, etc. In the light of above, this dissertation presents one of the first studies on advance reservation of virtual network services. First, the fixed virtual overlay network scheduling problem is addressed as a special case of the more generalized virtual network scheduling problem and a related optimization presented. Next, the complete virtual network scheduling problem is studied and a range of heuristic and meta-heuristic solutions are proposed. Finally, some novel flexible advance reservation models are developed to improve service setup and network resource utilization. The performance of these various solutions is evaluated using various methodologies (discrete event simulation and optimization tools) and comparisons made with some existing strategies.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Nia, Ramadianti Putri Mganga, and Medard Charles. "Enhancing Information Security in Cloud Computing Services using SLA based metrics." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1999.

Повний текст джерела
Анотація:
Context: Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and regulatory risks. As an initiative to address such risks, organizations can develop and implement SLA to establish common expectations and goals between the cloud provider and customer. Organizations can base on the SLA to measure the achievement of the outsourced service. However, many SLAs tend to focus on cloud computing performance whilst neglecting information security issues. Objective: We identify threats and security attributes applicable in cloud computing. We also select a framework suitable for identifying information security metrics. Moreover, we identify SLA based information security metrics in the cloud in line with the COBIT framework. Methods: We conducted a systematic literature review (SLR) to identify studies focusing on information security threats in the cloud computing. We also used SLR to select frameworks available for identification of security metrics. We used Engineering Village and Scopus online citation databases as primary sources of data for SLR. Studies were selected based on the inclusion/exclusion criteria we defined. A suitable framework was selected based on defined framework selection criteria. Based on the selected framework and conceptual review of the COBIT framework we identified SLA based information security metrics in the cloud. Results: Based on the SLR we identified security threats and attributes in the cloud. The Goal Question Metric (GQM) framework was selected as a framework suitable for identification of security metrics. Following the GQM approach and the COBIT framework we identified ten areas that are essential and related with information security in the cloud computing. In addition, covering the ten essential areas we identified 41 SLA based information security metrics that are relevant for measuring and monitoring security performance of cloud computing services. Conclusions: Cloud computing faces similar threats as traditional computing. Depending on the service and deployment model adopted, addressing security risks in the cloud may become a more challenging and complex undertaking. This situation therefore appeals to the cloud providers the need to execute their key responsibilities of creating not only a cost effective but also a secure cloud computing service. In this study, we assist both cloud provider and customers on the security issues that are to be considered for inclusion in their SLA. We have identified 41 SLA based information security metrics to aid both cloud providers and customers obtain common security performance expectations and goals. We anticipate that adoption of these metrics can help cloud providers in enhancing security in the cloud environment. The metrics will also assist cloud customers in evaluating security performance of the cloud for improvements.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Bengtsson, Hampus, and Ludvig Knutsmark. "Lagring av sekretessreglerade uppgifter i molntjänster : En analys kring förutsättningar för användning av molnleverantörer bland myndigheter." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19723.

Повний текст джерела
Анотація:
Background: Swedish authorities' use of popular cloud providers is today the subject of an intense debate. Legislations, like the U.S. CLOUD Act, are applicable across borders, which makes data that is stored on servers located in Sweden affected by U.S. law. Several Swedish organizations mean that the usage of affected cloud providers for storage of sensitive records breaks the Swedish law - Offentlighets- och sekretesslagen. The program for collaboration between Swedish authorities, eSam, says that there is a possibility of withstanding the law, if suitable encryption is used, but states that more research is needed. Objectives: The main objective of this thesis is to research which requirements for encryption mechanisms are needed for Swedish authorities' use of cloud providers affected by legislations like CLOUD Act, without them breaking Swedish laws. The three most popular cloud providers, Amazon Web Services (AWS), Microsoft Azure, and Google Cloud will be compared and examined if requirements on encryption are met. Historically, providers' access to encryption keys is a major threat to data confidentiality. Therefore an alternative encryption method that withholds both encryption keys and clear text, but preserves functionality will be researched. Method: To create fair and good requirements on encryption mechanisms, several threat models are created from the perspective of today's- and future laws. A SWOT-analysis will be used to compare the cloud providers. To research the possibility and usability of alternative encryption in the cloud, a system that withholds both encryption keys and clear text data from the provider is proposed. Result: The result shows that the most popular services like Office 365 and G Suite are not suitable for use by Swedish authorities for the storage of sensitive records. Instead, Swedish authorities can use IaaS-services from both AWS and Microsoft Azure for storage of sensitive records - if the requirements for encryption mechanisms are met. The result also shows that alternative encryption methods can be used as part of a document management system. Conclusion: Swedish authorities should strive to expand their digitalization but should be careful about the usage of cloud providers. If laws change, or political tensions rise, the requirements for the encryption mechanisms proposed in this thesis would not be applicable. In a different situation, Swedish authorities should use alternative solutions which are not affected by an altered situation. One such alternative solution is the document management system proposed in this thesis.
Bakgrund: Idag pågår det en delad debatt gällande lämpligheten för svenska myndigheter att använda utländska molntjänster. Lagstiftningar som bland annat amerikanska CLOUD Act utgör ett hot för svensk suveränitet, eftersom data lagrad i svenska serverhallar kan komma att vara föremål i amerikanska domslut. Vissa organisationer menar då att uppgifter som omfattas av offentlighets- och sekretesslagen (OSL) kan sannolikt betraktas som röjda. Nyttan med att använda molntjänster är generellt sett stor - och bör därför strävas efter att användas. eSam, som är ett program för myndighetssamverkan, menar i ett uttalande att kryptering skulle kunna förhindra ett röjande och möjliggöra användande av dessa molntjänster, men ifrågasätter hur det bör gå till. Syfte: Syftet med detta arbete är att undersöka vilka krav på krypteringsmekanismer som krävs för att lagra sekretessreglerad information i molntjänster utan att bryta mot svensk lagstiftning. Molntjänstleverantörerna, Amazon Web Services (AWS), Microsoft Azure och Google Cloud, kommer att undersökas för att se om dessa lever upp till de identifierade kraven. Historiskt sett är tjänsteleverantörers tillgång till krypteringsnycklar ett stort hot. Därför ska en alternativ krypteringsmetod som bevarar krypteringsnyckel undangömd från tjänsteleverantören undersökas, men som samtidigt bevarar viss funktionalitet med molntjänsten. Metod: För att kunna skapa korrekta och rimliga krav på krypteringsmekanismer skapas hotmodeller som utgår från juridiken. En SWOT-analys kommer användas för att jämföra vilka molntjänstleverantörer som lever upp till kraven. För att undersöka möjligheten och nyttan med alternativa krypteringsmekanismer, implementeras ett förslag på system där varken krypteringsnyckel eller data i klartext tillgås molntjänstleverantören. Resultat: Resultatet visar att populära tjänster som exempelvis Office 365 och G Suite är direkt olämpliga för användning av svenska myndigheter. Det visar sig att IaaS-tjänster som tillhandahålls av AWS och Microsoft Azure i viss mån lämpar sig för användning - förutsatt att vissa krav uppfylls. Resultatet visar även att det är möjligt att använda alternativa krypteringsmetoder som en del i ett dokumenthanteringssystem. Slutsats: Svenska myndigheter bör sträva efter att öka sin digitalisering, men bör ta ordentliga försiktighetsåtgärder innan eventuella upphandlingar av molntjänster sker. Skulle det juridiska eller säkerhetspolitiska läget förändras kommer de krav på krypteringsmekanismer som presenteras i arbetet inte längre vara tillämpliga. I ett förändrat läge bör svenska myndigheter istället använda alternativa lösningar som inte påverkas, likt det dokumenthanteringssystem som arbetet presenterar.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Xu, Zichen. "Energy Modeling and Management for Data Services in Multi-Tier Mobile Cloud Architectures." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1468272637.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Latifaj, Malvina. "A systematic mapping study on Quality of Service in industrial cloud computing." Thesis, Mälardalens högskola, Inbyggda system, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48612.

Повний текст джерела
Анотація:
Context -- The rapid development of Industry 4.0 and Industrial Cyber-Physical Systems is leading to the exponential growth of unprocessed volumes of data. Industrial cloud computing has shown great potential as a solution that can provide the necessary resources for processing these data. However, in order to be widely adopted, it must provide satisfactory levels of QoS. The lack of a standardized model of quality attributes to be used for assessing QoS raises significant concerns. Objective -- This study aims to provide a map of current research on QoS in industrial cloud computing, focusing on identifying and classifying the quality attributes that are currently most commonly used to evaluate QoS. Method -- To achieve our objective, we conducted a systematic mapping study of the state-of-the-art of QoS in industrial cloud computing. Our search yielded 1063 potentially relevant studies that were subject to a rigorous selection process, resulting in a final set of 42 primary studies. Key information from the primary studies was extracted according to the categories of a well-defined classification framework. Results -- The analysis of the extracted data highlighted the following main findings: (i) research largely focuses on providing solution proposals that require a more solid validation, (ii) the adoption of cloud technologies is closely related to performance indicators, while research on other quality attributes is quite limited, (iii) there is a lack of research on security in industrial cloud computing, (iv) approaches are in most cases not targeting explicitly a specific industrial domain, (v) there is a strong focus on the impact of virtualization solutions on QoS, and (vi) research efforts are oriented towards the improvement of QoS through scheduling. Conclusion -- These results can help the research community identify trends, limitations, and research gaps on QoS in industrial cloud computing, and reveal possible directions for future research.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Adegoke, Adekunle, and Emmanuel Osimosu. "Service Availability in Cloud Computing : Threats and Best Practices." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-28760.

Повний текст джерела
Анотація:
Cloud computing provides access to on-demand computing resources and storage space, whereby applications and data are hosted with data centers managed by third parties, on a pay-per-use price model. This allows organizations to focus on core business goals instead of managing in-house IT infrastructure.                     However, as more business critical applications and data are moved to the cloud, service availability is becoming a growing concern. A number of recent cloud service disruptions have questioned the reliability of cloud environments to host business critical applications and data. The impact of these disruptions varies, but, in most cases, there are financial losses and damaged reputation among consumers.         This thesis aims to investigate the threats to service availability in cloud computing and to provide some best practices to mitigate some of these threats. As a result, we identified eight categories of threats. They include, in no particular order: power outage, hardware failure, cyber-attack, configuration error, software bug, human error, administrative or legal dispute and network dependency. A number of systematic mitigation techniques to ensure constant availability of service by cloud providers were identified. In addition, practices that can be applied by cloud customers and users of cloud services, to improve service availability were presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Tran, Khanh Toan. "Déploiement efficace de services complexes dans l'infrastructure de cloud." Phd thesis, Université d'Evry-Val d'Essonne, 2013. http://tel.archives-ouvertes.fr/tel-00875818.

Повний текст джерела
Анотація:
Le but du travail réalisé dans cette thèse est de fournir aux fournisseurs de services une solution qui est capable de non seulement déployer les services dans le cloud de façon économique, automatique, mais aussi à grande échelle. La première contribution traite le problème de la construction d'un nouveau service demandé par le client à partir de services disponibles dans le cloud de manière à satisfaire les exigences en termes de qualité de service ainsi qu'en termes de coût. Nous présentons ce problème par un modèle analytique et proposons un algorithme heuristique dont la performance est améliorée de 20-30% par rapport aux autres approches. La seconde contribution est une solution pour déployer les services dans le cloud en considérant les demandes des utilisateurs finaux. Pour assurer qualité de services dans une grande échelle, le service demandé est dupliqué et distribué dans le réseau; chacun de ses réplicas servira les utilisateurs à proximité. Le plan d'approvisionnement selon lequel le service est dupliqué dépend de sa demande, ce qui ne cesse pas de changer en quantité ainsi qu'en distribution, ce qui rend le problème plus compliqué. Nous proposons une solution qui est capable de s'adapter aux changements dans le réseau, y compris ceux des demandes de ses utilisateurs. Enfin, nous proposons un système basé sur OpenStack qui permet de déployer les services complexes dans un cloud qui couvre différente locations (cloud multi-site). A partir d'une demande du client, le système automatiquement calcule le plan d'approvisionnement optimal et le déploie en respectant les contraintes du client.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Valancius, Vytautas. "Wide-area route control for online services." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43623.

Повний текст джерела
Анотація:
Accelerated by on-demand computing, the number and diversity of the Internet services is increasing. Such online services often have unique requirements for the underlying wide-area network: For instance, online gaming service might benefit from low delay and jitter paths to client, while online data backup service might benefit from cheaper paths. Unfortunately, today's Internet does not accommodate fine-grained, service-specific wide-area route control. In this dissertation, I achieve the following goals: 1) improve the access to the routes, 2) quantify the benefits of fine-grained route control, and 3) evaluate the efficiency of current payment schemes for the wide-area routes. * Improving access to wide-area route control. Online services face significant technological and procedural hurdles in accessing the routes: Each service in need to control the Internet routes, has to obtain own equipment, Internet numbered resources, and establish contracts with upstream ISPs. In this dissertation, I propose and describe implementation and deployment of a secure and scalable system which provides on-demand access to the Internet routes. In setting such as cloud data center, the system can support multiple online services, providing each service with an illusion of direct connectivity to the neighboring Internet networks, which, for all practical purposes, allows services to participate fully in the Internet routing. * Quantifying the benefits of fine-grained route control. Even if online services are presented with wide-area route choice, it is not clear how much tangible benefit such choice provides. Most modern Online Service Providers (OSP) rely primarily on the content routing to improve network performance between the clients and the replicas. In this dissertation, I quantify the potential benefit the OSPs can gain if they perform a joint network and content routing. Among other findings, I find that by performing joint content and network routing, OSPs can achieve 22% larger latency reduction than can be obtained by content routing alone. * Modeling and evaluating the efficiency of the current payment schemes for wide-area routes. Finally, increasing diversity and sophistication of the online services participating in the Internet routing poses a challenge to payment models used in today's Internet. Service providers today charge business customers a blended rate: a single, "average" price for unit of bandwidth, without regard to cost or value of individual customer's flows. In my dissertation, I set to understand how efficient this payment model is and if more granular payment model, accounting for the cost and value of different flows could increase the ISP profit and the consumer surplus. I develop an econometric demand and cost model and map three real-world ISP data sets to it. I find that ISPs can indeed improve the economic efficiency with just a few pricing tiers.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії