摘要 :
Cloud computing is getting increasingly popular because of its various benefits. Although many free cloud storage services (such as Google Drive, Dropbox, etc.) are available on the internet, there exist some problems in using suc...
展开
Cloud computing is getting increasingly popular because of its various benefits. Although many free cloud storage services (such as Google Drive, Dropbox, etc.) are available on the internet, there exist some problems in using such services. Those public cloud storage services can be more convenient and more valuable if those problems are resolved. The first problem is the limitation of the service, such as space limit, file size limit and file type limit. Secondly, different cloud storage services provide different functions so that users may have to use multiple services simultaneously in order to fulfil their needs. The process of logging in and using multiple services might be very complicated. Thirdly, users may not be able to access or even lose their data owing to incidents such as server down, network failure, and availability problems. The goal of this research is to compose a service (named Cocktail) by using the service-oriented computing (SOC) as the fundamental design approach to solve these three problems and enhance the service quality (in terms of the reliability, availability and scalability) of free cloud services.
收起
摘要 :
The increasing pace of evolution in business computing services leads enterprises to outsource secondary operations that are not part of their core business. The cloud computing market has been growing over the past few years and,...
展开
The increasing pace of evolution in business computing services leads enterprises to outsource secondary operations that are not part of their core business. The cloud computing market has been growing over the past few years and, consequently, many cloud companies are now offering a rich set of features to their consumers. Unfortunately, those cloud players have created new services with different APIs, which imply that cloud-oriented applications might be instantiated in one single cloud provider. This scenario is not desirable to the IT industry because their applications will become provider-dependent. In this paper we present a platform that allows applications to interoperate with distinct cloud providers' services using a normalized interface. The proposed approach provides a common API that minimizes the present deficit of cloud API standardization and provides secure and redundant services allocation. Moreover, services from different cloud providers can be combined and decorated with additional functionalities like, for instance, redundancy and ciphering on-the-fly.
收起
摘要 :
With the rapid increase in the volume of media data generated by content providers and users in the recent past, there is a growing need for storage space in addition to that provided by physical terminals. Consequently, cloud sto...
展开
With the rapid increase in the volume of media data generated by content providers and users in the recent past, there is a growing need for storage space in addition to that provided by physical terminals. Consequently, cloud storage services have become popular as an additional storageor backup option. As the demand for cloud services increases, so does the associated security threat. Thus, service providers are applying various security technologies to protect cloud systems. This study proposes a method of encrypting and decrypting files before uploading and after downloading,respectively, to ensure that they remain secure in the cloud storage environment. Moreover, a program is designed to provide users visibility of their stored data via monitoring by interlinking multiple cloud storages.
收起
摘要 :
Security is the main concern in Big Data analysis. In the security analysis, most of the approaches that provide an effective security yet uses high amount of resources like memory or storage and time delay in order to increase th...
展开
Security is the main concern in Big Data analysis. In the security analysis, most of the approaches that provide an effective security yet uses high amount of resources like memory or storage and time delay in order to increase the cost of processing. This paper emphasis on improvement based on utilization of resources by means of optimization of encryption approach. The optimisation approach uses a convex optimization with minimum amount of time or storage and such factors effects the total cost of processing. The proposed approach uses GWO optimization of Blow fish slices. The experiment involves the use of two types of dataset such as tweet and scientific workflow. The experimental analysis shows how effectively blow fish improves Grey wolf optimization (GWO). In addition, the other experiment uses particle swarm optimization (PSO) and flower pollination approach (FPA). Although the analysis represents that these approaches are not very much effective as compared to GWO.
收起
摘要 :
Existing cloud computing platforms leave it up to applications to deal with the complexities associated with data replication and propagation across data centers. In our work, we propose the CSPAN key-value store to instead export...
展开
Existing cloud computing platforms leave it up to applications to deal with the complexities associated with data replication and propagation across data centers. In our work, we propose the CSPAN key-value store to instead export a unified view of storage services in several geographically distributed data centers. To minimize the cost incurred by application providers, we combine two principles. First, CSPAN spans the data centers of multiple cloud providers. Second, CSPAN judiciously trades off the lower latencies and the higher storage and data propagation costs based on an application's anticipated workload, latency goals, and consistency requirements.
收起
摘要 :
Providing an adequate security level in Cloud Environments is currently an extremely active research area. More specifically, malicious behaviors targeting large-scale Cloud data repositories (e.g., Denial of Service attacks) may ...
展开
Providing an adequate security level in Cloud Environments is currently an extremely active research area. More specifically, malicious behaviors targeting large-scale Cloud data repositories (e.g., Denial of Service attacks) may drastically degrade the overall performance of such systems and cannot be detected by typical authentication mechanisms. This article proposes a generic security management framework allowingproviders of Cloud data management systems to define and enforce complex security policies. This security framework is designed to detect and stop a large array of attacks defined through an expressive policy description language and to be easily interfaced with various data management systems. The authors show that they can efficiently protect a data storage system by evaluating the security framework on top of the BlobSeer data management platform. The authors evaluate the benefits of preventing a DoS attack targeted towards BlobSeer through experiments performed on the Grid '5000 testbed.
收起
摘要 :
Cloud storage services are top-rated, but there are often concerns about the security of the files there stored. Clouds-of-clouds or multi-clouds are being explored in order to improve that security. The idea is to store the files...
展开
Cloud storage services are top-rated, but there are often concerns about the security of the files there stored. Clouds-of-clouds or multi-clouds are being explored in order to improve that security. The idea is to store the files in several clouds, ensuring integrity and availability. Confidentiality, however, is obtained by encrypting the files with block ciphers that do not provide provable security. Secret sharing allows distributing files among the clouds providing information-theoretic security/secrecy. However, existing secret sharing schemes are space-inefficient (the size of the shares is much larger than the size of the secret) or purely theoretical. In this paper, we propose the first practical space-efficient secret sharing scheme that provides information theoretic security, which we denominate PRactical Efficient Secret Sharing (PRESS). Moreover, we present the Secure CloUD storage (SCUD) service, a new cloud-of-clouds storage service that leverages PRESS to provide file confidentiality. Additionally, SCUD provides data integrity and availability, leveraging replication.
收起
摘要 :
From last decade, there is a rapid expanded upon in the data in cyberspace. In order to manage them efficiently, distributed storage came into the world. Cloud storage is a type of distributed storage based on cloud computing tech...
展开
From last decade, there is a rapid expanded upon in the data in cyberspace. In order to manage them efficiently, distributed storage came into the world. Cloud storage is a type of distributed storage based on cloud computing technology. Cloud storage acts as a repository in which data stored, managed and made accessible to users. Largest generated application datasets can flexibly be stored or deleted in the cloud and from here end users access this data by using cloud storage services interface, without accessing any storage server in real. Cloud storage system is considered of hundreds of independent storage servers which are distributed geographically, and handle millions client requests concurrently. Some of the storage servers get huge clients requests and some servers remain under loaded. Due to this unequal distribution of load on storage servers degrades the performance of overall system and increases the response time. This work addresses issues regarding to efficient utilization of storage servers in cloud storage. Handling various challenges regarding to the load balancing in the cloud storage is the one of the main objectives of this research. Though analyzing the contribution of other authors in this area, in this work two distributed load balancing algorithm CDLB and DDLB are proposed by exploiting the different parameter of storage server. The first proposed algorithm considers the service rate and queue length as a main parameter of the server. The second proposed algorithm considers extra server parameter such as service time and deadline time of the client request. This work monitors various aspects which leverage the overall performance of cloud storage. Both the algorithms try to balance the load of storage servers as well as effectively utilize the server capabilities. From the simulation results, it can be concluded that proposed algorithms balance the load, efficiently utilize the server capabilities, reduce the response time and leverage the overall system performance.
收起
摘要 :
Cloud computing has been increasingly adopted by users and providers to promote a flexible, scalable and tailored access to computing resources. Nonetheless, the consolidation of this paradigm has uncovered some of its limitations...
展开
Cloud computing has been increasingly adopted by users and providers to promote a flexible, scalable and tailored access to computing resources. Nonetheless, the consolidation of this paradigm has uncovered some of its limitations. Initially devised by corporations with direct control over large amounts of computational resources, cloud computing is now being endorsed by organizations with limited resources or with a more articulated, less direct control over these resources. The challenge for these organizations is to leverage the benefits of cloud computing while dealing with limited and often widely distributed computing resources. This study focuses on the adoption of cloud computing by higher education institutions and addresses two main issues: flexible and on-demand access to a large amount of storage resources, and scalability across a heterogeneous set of cloud infrastructures. The proposed solutions leverage a federated approach to cloud resources in which users access multiple and largely independent cloud infrastructures through a highly customizable broker layer. This approach allows for a uniform authentication and authorization infrastructure, a fine-grained policy specification and the aggregation of accounting and monitoring.Within a loosely coupled federation of cloud infrastructures, users can access vast amount of data without copying them across cloud infrastructures and can scale their resource provisions when the local cloud resources become insufficient.
收起
摘要 :
The data generation rate has grown explosively with the widespread use of mobile devices in several critical domains, including health care, education, and disaster recovery. This rapid increase in data volume is hindered by data ...
展开
The data generation rate has grown explosively with the widespread use of mobile devices in several critical domains, including health care, education, and disaster recovery. This rapid increase in data volume is hindered by data storage restrictions on mobile devices. State-of-the-art mobile computing platforms such as mobile cloud computing work towards providing indefinite storage space and augment mobile data storage by utilizing infinite cloud storage resources. Time Machine, iCloud, Dropbox, and other cloud-oriented services facilitate the offloading of content. These services require uninterrupted internet connectivity. Low connectivity may induce system failure. Furthermore, network connectivity cannot always be ensured in rural areas and natural disaster-prone areas. In such cases, it would be more efficient for the originator to store a backup of the data in nearby mobile devices. Hence, users look for a storage/backup system in the vicinity. In this paper, we propose an efficient technique to obtain a temporary storage/backup service in areas with low network connectivity by using an ad hoc storage-as-a-service method for mobile ad hoc networks (MANETs), with the help of nodes that provide temporary storage services to clients. Two types of nodes, namely, storage service providers (SSPs) and storage service requesters (SSRs), form the core of the proposed system. A set of SSRs accesses temporary storage from SSPs. Mobile clients can obtain a reliable storage service from this system. We use simulated experimental modules to analyze our model. We can also use this approach in a network-disconnected area to demonstrate the practicality of providing a temporary storage service.
收起