Filters








14,214 Hits in 3.7 sec

Intrusion Detection Techniques in Cloud Computing: A Review

Nurudeen Mahmud, Anazida Zainal
2018 International Journal of Computer Applications  
In this paper a review of cloud-based intrusion detection system was provided.  ...  Based on the review open problems and research direction in cloud intrusion detection was provided. General Terms Review  ...  Research work in cloud-based IDS has employed both static and dynamic approach for normal profile creation.  ... 
doi:10.5120/ijca2018916139 fatcat:afazs54iknd2veot4r5w7tsuzq

Software development environments on the web

Lennart C.L. Kats, Richard G. Vogelij, Karl Trygve Kalleberg, Eelco Visser
2012 Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software - Onward! '12  
For software development, the Web presents a shift away from developer workstations as a silo, and has the promise of closer collaboration and improved feedback through innovations in Web-based interactive  ...  development environments (IDEs).  ...  We would like to thank Molham Aref, Martin Bravenboer, Shan Shan Huang (LogicBlox), and Rik Arends (Cloud9) for our discussions about software development on the web.  ... 
doi:10.1145/2384592.2384603 dblp:conf/oopsla/KatsVKV12 fatcat:otaopqstuvd2jchq3nmhbvpbyu

Modelling and managing deployment costs of microservice-based cloud applications

Philipp Leitner, Jürgen Cito, Emanuel Stöckli
2016 Proceedings of the 9th International Conference on Utility and Cloud Computing - UCC '16  
CostHat is based on a network model, and allows for what-if and cost sensitivity analysis.  ...  Our model, which we dubbed CostHat, supports both, Microservices deployed on traditional IaaS or PaaS clouds, and services that make use of novel cloud programming paradigms, such as AWS Lambda.  ...  executions of the application; while technically not trivial, tools that support this kind of service dependency mining exist (e.g., Dynatrace); (2) prior to deployment, by statically analysing the source  ... 
doi:10.1145/2996890.2996901 dblp:conf/ucc/LeitnerCS16 fatcat:z3kzeupq5vaolefotfjv6hs7cy

A Proactive Cloud Management Architecture for Private Clouds

Dapeng Dong, John Herbert
2013 2013 IEEE Sixth International Conference on Cloud Computing  
the current status of the cloud, supporting optimal decision making; and a Calendar-based Data Storage Model to reduce the storage required for cloud metric data and increase analysis performance.  ...  A proactive response to cloud events is generated based on statistical analysis of historical metrics and predicted usage.  ...  Its Virtual Placement and Balancing solution automatically optimises cloud resource usage based on both statical and optimisation techniques. Beside industrial solutions, Sotomayor et al.  ... 
doi:10.1109/cloud.2013.19 dblp:conf/IEEEcloud/DongH13 fatcat:ngpxw53ug5bghjemeeyk4pqb4u

A Novel Framework for Video Delivery to Handheld Devices using Cloud Environment

2019 International Journal of Engineering and Advanced Technology  
The novel framework was tested with the cloud environment, within our parametric boundary it provide smooth streaming services to the handheld devices.  ...  Handheld devices are responsible for most of the internet traffic nowadays. Video streaming services plays a vital role in internet traffic because of its increasing size and high definition.  ...  The static Id was permanently stored in a server Data Base (DB) with the unique username as a key.  ... 
doi:10.35940/ijeat.b4042.129219 fatcat:ubwbnamq7bbmdji3p6g2cupbke

Utilising stream reasoning techniques to underpin an autonomous framework for cloud application platforms

Rustem Dautov, Iraklis Paraskakis, Mike Stannett
2014 Journal of Cloud Computing: Advances, Systems and Applications  
with static ontological knowledge and apply intelligent reasoning.  ...  cloud providers is to develop appropriate mechanisms for run-time monitoring and adaptation, to prevent cloud application platforms from quickly dissolving into a non-reliable environment.  ...  This separation of concerns allows for seamless and transparent modification of the analysis rules constituting the static knowledge base. • Support for expressive queries and complex schemas: Figure  ... 
doi:10.1186/s13677-014-0013-5 fatcat:77lksagfjba6bibgfpw3gbwsru

REAL WORKLOAD CHARACTERIZATION AND SYNTHETIC WORKLOAD GENERATION

Keerthi Bangari .
2016 International Journal of Research in Engineering and Technology  
Synthetic workloads are generated based on our experiments. The real trace is downloaded from Google cluster data which consists of two workloads.  ...  paper we are analyzing the Google cluster data version 2 trace in IBM SPSS statistics and generating another workload called synthetic workload with the same characteristics and behavior of real workload based  ...  Some of research based cloud simulator are Cloud Sim, Green Cloud, and GroudSim [1] .  ... 
doi:10.15623/ijret.2016.0505080 fatcat:ntjlbkcma5cutkaxjczz42754m

Intrusion Detection and Marking Transactions in a Cloud of Databases Environment

Syrine Chatti, Habib Ounelli
2016 International Journal on Cloud Computing Services and Architecture  
The cloud computing is a paradigm for large scale distributed computing that includes several existing technologies.  ...  In this context, we propose an intrusion detection and marking transactions for a cloud of database environment.  ...  The unification of transaction based application in these environments present a set of threats that can target a cloud of database environment.  ... 
doi:10.5121/ijccsa.2016.6502 fatcat:omwrqhe6ojdpjpfwckzghhlfve

Using ATL Transformation Services in the MDEForge Collaborative Modeling Platform [chapter]

Juri Di Rocco, Davide Di Ruscio, Alfonso Pierantonio, Jesús Sánchez Cuadrado, Juan de Lara, Esther Guerra
2016 Lecture Notes in Computer Science  
This demo paper illustrates the extensibility of MDEForge by integrating ATL services for the remote execution, automated testing, and static analysis of ATL transformations.  ...  Harnessing the softwareas-a-service (SaaS) paradigm and shifting applications from local, mono-core implementations to cloud-based architectures is key to enhance scalability and flexibility.  ...  The analysis service uses anATLyzer [10] , a static analyser for ATL able to detect over 40 types of errors statically (e.g., rule conflicts, unresolved bindings, uninitialized features).  ... 
doi:10.1007/978-3-319-42064-6_5 fatcat:2ompuqrarjcn7mj5yqulsjxq44

Secure Improved Cloud-Based RFID Authentication Protocol [chapter]

Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes
2015 Lecture Notes in Computer Science  
Xie et al. proposed a new scheme called "cloud-based RFID authentication", which aimed to address the security and privacy concerns of RFID tag's data in the cloud.  ...  The results indicate that the proposed protocol achieves data secrecy and authentication for RFID tags.  ...  Sarah Abughazalah is supported by the Ministry of Higher Education and King Khaled University in Saudi Arabia.  ... 
doi:10.1007/978-3-319-17016-9_10 fatcat:crdv4sxkpzbijdactscjut35qu

Re-provisioning of Cloud-Based Execution Infrastructure Using the Cloud-Aware Provenance to Facilitate Scientific Workflow Execution Reproducibility [chapter]

Khawar Hasham, Kamran Munir, Richard McClatchey, Jetendr Shamdasani
2016 Communications in Computer and Information Science  
2016) Re-provisioning of cloud-based execution infrastructure using the cloudaware provenance to facilitate scientific workflow execution repro-  ...  Besides this, the support provided by OSDC by o↵ering a free Cloud infrastructure of 20 cores is highly appreciated.  ...  [15, 16] ) performed to capture provenance in the Cloud. However, they lack the support for workflow reproducibility.  ... 
doi:10.1007/978-3-319-29582-4_5 fatcat:j44fx7txsbea5atvv342x3b64a

A Provenance-Policy Based Access Control Model for Data Usage Validation in Cloud

Muralikrishnan Ramane, Balaji Vasudevan, Sathappan Allaphan
2014 International Journal of Security Privacy and Trust Management  
To control such data leaks and integrity, in past several security policies based on role, identity and user attributes were proposed and found ineffective since they depend on static policies which do  ...  In an organization specifically as virtual as cloud there is need for access control systems to constrain users direct or backhanded action that could lead to breach of security.  ...  The authors would like to thank all those who have shared their valuable inputs, insights, suggestions and for their time throughout the course of this work.  ... 
doi:10.5121/ijsptm.2014.3501 fatcat:a5twby22jfhdjehmmmptrax5zu

Static Analysis Using the Cloud

Rahul Kumar, Chetan Bansal, Jakob Lichtenberg
2016 Electronic Proceedings in Theoretical Computer Science  
Finally, we describe the Static Module Verifier platform, a highly extensible and configurable platform for static analysis of generic modules, where we have integrated support for verification using a  ...  In this paper we describe our experience of using Microsoft Azure cloud computing platform for static analysis.  ...  Ashok, Apoorv Upreti, Vlad Levin, and Thomas Ball for their valuable input and support of this work.  ... 
doi:10.4204/eptcs.228.2 fatcat:njd4mic3yvf7vk3fpmywgeaade

Improved Active Monitoring Load-Balancing Algorithm in Cloud Computing [chapter]

Pawan Kumar, Rakesh Kumar
2018 Lecture Notes in Networks and Systems  
In Cloud Computing (CC), load balancing is essential to distribute the local workload evenly across all the nodes either statically or dynamically.  ...  The algorithm proposed in this paper efficiently distributes the requests to all the VMs for their execution, considering the CPU utilization of all VMs.  ...  As a future scope the proposed algorithm needs to be implemented and verified in the simulator that supports the cloud computing environment.  ... 
doi:10.1007/978-981-13-1217-5_101 fatcat:5joegwog6ndcxklfe3ovt4kqiy

Cloud E-learning for Mechatronics: CLEM

Kuo-Ming Chao, Anne E. James, Antonios G. Nanos, Jen-Hsiang Chen, Sergiu-Dan Stan, Ionut Muntean, Giorgio Figliolini, Pierluigi Rea, Chedli B. Bouzgarrou, Pavel Vitliemov, Joshua Cooper, Jürgen van Capelle
2015 Future generations computer systems  
The objective of the EU Leonardo project in CLoud E-learning for Mechatronics (CLEM) is to develop an infrastructure for e-learning based on cloud services which will contribute to satisfying this need  ...  The paper provides an overview of this new cloud-based e-learning approach and presents the results.  ...  This supports our idea that new community and cloud based tools are needed for VET and will be appreciated.  ... 
doi:10.1016/j.future.2014.10.033 fatcat:t3pfugcijjh43aei6sczo22li4
« Previous Showing results 1 — 15 out of 14,214 results