Int. J. Grid Util. Comput.最新文献

筛选
英文 中文
A study on fog computing architectures and energy consumption approaches regarding QoS requirements 基于QoS要求的雾计算体系结构和能耗方法研究
Int. J. Grid Util. Comput. Pub Date : 2020-04-24 DOI: 10.1504/ijguc.2020.10028886
A. Ksentini, Maha Jebalia, S. Tabbane
{"title":"A study on fog computing architectures and energy consumption approaches regarding QoS requirements","authors":"A. Ksentini, Maha Jebalia, S. Tabbane","doi":"10.1504/ijguc.2020.10028886","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10028886","url":null,"abstract":"In the Internet of Things (IoT) paradigm, data is gathered for treatment from locals, machines, vehicles, etc. Cloud computing is providing suitable hardware and software for data processing. Thus, the integration of IoT with cloud capabilities offers several benefits for many applications. However, challenges persist for some use-cases like delay-sensitive services due to the huge amount of information collected by IoT devices and to be processed by cloud servers. Fog computing is expected to overcome several limits and challenges in cloud computing concerning the Quality of Service (QoS) requirements like latency, bandwidth and location awareness. Nevertheless, researchers still have to deal with several issues namely the architectural level and the energetic aspect. In this paper, we investigate fog system architectures and energy consumption in literature, while considering QoS requirements in the synthesis. A system model is then introduced with a potential solution for QoS management for fog computing environment.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125753659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementing the software defined management framework 实现软件定义的管理框架
Int. J. Grid Util. Comput. Pub Date : 2020-04-24 DOI: 10.1504/ijguc.2020.10028895
M. Monteiro, R. Villaça, K. Simonassi, R. Tavares, C. Reginato
{"title":"Implementing the software defined management framework","authors":"M. Monteiro, R. Villaça, K. Simonassi, R. Tavares, C. Reginato","doi":"10.1504/ijguc.2020.10028895","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10028895","url":null,"abstract":"Software Defined Infrastructure (SDI) has become a relevant topic for computing and communication industry. Despite this huge technological movement, Network and Systems Management has been disregarded as one of the main themes in this ecosystem, and Software Defined Infrastructure has been managed by semi-software-defined management solutions. In order to reduce this gap, this paper presents SDMan, a Software Defined Management framework. The SDMan's proof of concept uses the OpenStack cloud platform and aims to demonstrate the feasibility of the proposed solution.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126775219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Success factor analysis for cloud services: a comparative study on software as a service 云服务的成功因素分析:软件即服务的比较研究
Int. J. Grid Util. Comput. Pub Date : 2020-04-24 DOI: 10.1504/ijguc.2020.10028887
D. Nedbal, Mark Stieninger
{"title":"Success factor analysis for cloud services: a comparative study on software as a service","authors":"D. Nedbal, Mark Stieninger","doi":"10.1504/ijguc.2020.10028887","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10028887","url":null,"abstract":"The emergence of cloud computing has been triggering fundamental changes in the information technology landscape for years. The proliferation of cloud services gave rise to novel types of business models, the complexity of which results from numerous different factors critical to a successful adoption. However, when it comes to improvement activities by cloud service providers, due to their multifacetedness, the challenge lies in figuring out where to start. Furthermore, the acuteness of actions to be taken varies among different settings. Thus, we propose the success factor analysis as an approach to prioritise improvement activities according to their acuteness, which is thereby indicated by the gap between the priority and the actual performance of a particular factor. Results show that the factors with the overall highest gap are security & safety, trust, and costs. Overall, the strengths of cloud services are seen in technical features leading to a good ease of use, a positively perceived usefulness, and a broad availability.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124521193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architecture for diversity in the implementation of dependable and secure services using the state machine replication approach 使用状态机复制方法实现可靠和安全服务的多样性的体系结构
Int. J. Grid Util. Comput. Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026551
Caio Yuri da Silva Costa, E. Alchieri
{"title":"Architecture for diversity in the implementation of dependable and secure services using the state machine replication approach","authors":"Caio Yuri da Silva Costa, E. Alchieri","doi":"10.1504/ijguc.2020.10026551","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026551","url":null,"abstract":"The dependability and security properties of a system could be impaired by a failure or by an opponent that exploits its vulnerabilities. State Machine Replication (SMR) is a technique widely used to implement fault-tolerant systems, mitigating these risks. Unfortunately, the proposed SMR solutions do not implement diversity and all replicas execute the same software. Consequently, the same attack or software bug could compromise the whole system. This work proposes an architecture to allow diversity in the implementation of dependable and secure services using the SMR approach. The goal is not to implement different versions of a SMR library, but to use an underlying SMR library and provide means to implement and execute service replicas (the application code) in different programming languages. The main problems addressed are twofold: communication among different languages; and data representation. The proposed architecture was integrated in BFT-SMaRt and a set of experiments showed its practical feasibility.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121356594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the design and development of emulation platforms for NFV-based infrastructures nfv基础设施仿真平台的设计与开发
Int. J. Grid Util. Comput. Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026553
Vinicius Fulber Garcia, G. Souza, E. P. Duarte, Thales Nicolai Tavares, L. D. C. Marcuzzo, C. R. P. D. Santos, M. Franco, Lucas Bondan, L. Granville, A. E. S. Filho, F. Turck
{"title":"On the design and development of emulation platforms for NFV-based infrastructures","authors":"Vinicius Fulber Garcia, G. Souza, E. P. Duarte, Thales Nicolai Tavares, L. D. C. Marcuzzo, C. R. P. D. Santos, M. Franco, Lucas Bondan, L. Granville, A. E. S. Filho, F. Turck","doi":"10.1504/ijguc.2020.10026553","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026553","url":null,"abstract":"Network Functions Virtualisation (NFV) presents several advantages over traditional network architectures, such as flexibility, security, and reduced CAPEX/OPEX. In traditional middleboxes, network functions are usually executed on specialised hardware (e.g., firewall, DPI). Virtual Network Functions (VNFs) on the other hand, are executed on commodity hardware, employing Software Defined Networking (SDN) technologies (e.g., OpenFlow, P4). Although platforms for prototyping NFV environments have emerged in recent years, they still present limitations that hinder the evaluation of NFV scenarios such as fog computing and heterogeneous networks. In this work, we present NIEP: a platform for designing and testing NFV-based infrastructures and VNFs. NIEP consists of a network emulator and a platform for Click-based VNFs development. NIEP provides a complete NFV emulation environment, allowing network operators to test their solutions in a controlled scenario prior to deployment in production networks.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116243679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithmic node classification in AND/OR mobile workflow graph 与/或移动工作流图节点分类算法
Int. J. Grid Util. Comput. Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10024769
Ihtisham Ali, S. Bagchi
{"title":"Algorithmic node classification in AND/OR mobile workflow graph","authors":"Ihtisham Ali, S. Bagchi","doi":"10.1504/ijguc.2020.10024769","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10024769","url":null,"abstract":"The data-intensive applications employ complex workflow graph models in dynamic networks having heterogeneity and mobility of nodes, which result in enhanced end-to-end delay in executions. The current workflow models lack structural stability for visualising a complex workflow graph. This paper proposes a hybrid AND/OR mobile workflow graph (MWG) model to visualise a fully conditioned complex workflow graph containing mobile nodes. This paper proposes nodes validity detection (NVD) algorithm for classifying the total number of nodes in the AND/OR MWG. Furthermore, nodes criticality detection (NCD) algorithm is also proposed to identify the set of critical nodes in the AND/OR MWG aiming to enable efficient analysing, mapping and scheduling of complex workflow graphs in a dynamic network environment. The algorithms are implemented and evaluated on Java platform and, the regression analysis is performed to project the algorithmic performances. A detailed comparative analysis with other works is presented in this paper.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126205430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A methodology for automated penetration testing of cloud applications 一种用于云应用程序自动渗透测试的方法
Int. J. Grid Util. Comput. Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026556
V. Casola, Alessandra De Benedictis, M. Rak, Umberto Villano
{"title":"A methodology for automated penetration testing of cloud applications","authors":"V. Casola, Alessandra De Benedictis, M. Rak, Umberto Villano","doi":"10.1504/ijguc.2020.10026556","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026556","url":null,"abstract":"Security assessment is a very time- and money-consuming activity. It needs specialised security skills and, furthermore, it is not fully integrated into the software development life-cycle. One of the best solutions for the security testing of an application relies on the use of penetration testing techniques. Unfortunately, penetration testing is a typically human-driven procedure that requires a deep knowledge of the possible attacks to carry out and of the hacking tools that can be used to launch the tests. In this paper, we present a methodology that enables the automation of penetration testing techniques based on both application-level models, used to represent the application architecture and its security properties in terms of applicable threats, vulnerabilities and weaknesses, and on system-level models, adopted to automatically generate and execute the penetration testing activities. The proposed methodology can be easily integrated into a continuous integration development process and aid software developers in evaluating security.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124771905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET 基于激励和信任的自组织MANET多路径距离矢量路由最优路径识别
Int. J. Grid Util. Comput. Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026547
A. Alkhamisi, S. Buhari, Georgios Tsaramirsis, Mohammed Basheri
{"title":"An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET","authors":"A. Alkhamisi, S. Buhari, Georgios Tsaramirsis, Mohammed Basheri","doi":"10.1504/ijguc.2020.10026547","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026547","url":null,"abstract":"A Mobile Ad hoc Network (MANET) can work well only when the mobile nodes behave cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance the security of the network, this paper extends an Ad hoc On-Demand Multipath Distance Vector (AOMDV) routing protocol, named as an Integrated Incentive and Trust-based optimal path identification in AOMDV (IIT-AOMDV) for MANET. The proposed IIT-AOMDV routing protocol integrates an Intrusion Detection System (IDS) with the Bayesian Network (BN) based trust and payment model. The IDS utilises the empirical first-and second-hand trust information of BN, and it underpins the cuckoo search algorithm to map the QoS and trust value into a single fitness metric, tuned according to the presence of malicious nodes. The simulation results show that the IIT-AOMDV improves the detection accuracy and throughput by 20% and 16.6%, respectively, more than that of existing AOMDV integrated with the IDS (AID).","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133816276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Target exploration by Nomadic Lévy walk on unit disk graphs 在单位磁盘图上用Nomadic lsamvy walk进行目标探测
Int. J. Grid Util. Comput. Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026552
K. Sugihara, Naohiro Hayashibara
{"title":"Target exploration by Nomadic Lévy walk on unit disk graphs","authors":"K. Sugihara, Naohiro Hayashibara","doi":"10.1504/ijguc.2020.10026552","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026552","url":null,"abstract":"Levy walk has attracted attention for its search efficiency. Homesick Levy walk is a family of random walks whose encounter probability of one another is similar to the one of human behaviour. However, its homing behaviour limits the search area of each agent. In this paper, we propose a variant of Homesick Levy walk called Nomadic Levy walk and analyse the behaviour of the algorithm regarding the cover ratio on unit disk graphs. We also show the comparison of Nomadic Levy walk and Homesick Levy walk regarding the target search problem. Our simulation results indicate that the proposed algorithm is significantly efficient for sparse target detection on unit disk graphs compared to Homesick Levy walk, and it also improves the cover ratio. Moreover, we analyse the impact of the movement of the sink (home position) on the efficiency of the target exploration.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122159187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards a secure and lightweight network function virtualisation environment 迈向安全、轻量级的网络功能虚拟化环境
Int. J. Grid Util. Comput. Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026554
Marco de Benedictis, A. Lioy, Paolo Smiraglia
{"title":"Towards a secure and lightweight network function virtualisation environment","authors":"Marco de Benedictis, A. Lioy, Paolo Smiraglia","doi":"10.1504/ijguc.2020.10026554","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026554","url":null,"abstract":"Cloud computing has deeply affected the structure of modern ICT infrastructures. It represents an enabling technology for novel paradigms such as Network Function Virtualisation (NFV), which proposes the virtualisation of network functions to enhance the flexibility of networks and to reduce the costs of infrastructure management. Besides potential benefits, NFV inherits the limitations of traditional virtualisation where the isolation of resources comes at the cost of a performance overhead. Lightweight forms of virtualisation, like containers, aim to mitigate this limitation. Furthermore, they allow the agile composition of complex services. These characteristics make containers a suitable technology for NFV environment. A major concern towards the exploitation of containers is security. Since containers provide less isolation than virtual machines, they can expose the whole host to vulnerabilities. In this work, we investigate container-related threats and propose a secure design for a Virtual Network Function deployed in a lightweight NFV environment.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130755698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信