To see the other types of publications on this topic, follow the link: Client virtualization.

Journal articles on the topic 'Client virtualization'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Client virtualization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Darabont, Örs, Konrád József Kiss, and József Domokos. "Evaluation of Different Thin-Client Based Virtual Classroom Architectures." Acta Universitatis Sapientiae Electrical and Mechanical Engineering 8, no. 1 (2016): 42–61. http://dx.doi.org/10.1515/auseme-2017-0004.

Full text
Abstract:
AbstractThis paper presents an evaluation of different methods used to deliver virtual machines capable of being accessed remotely by thin-clients. The objective of the research was to provide a recommendation for building a cost-effective computer infrastructure for use in two scenarios: as a programming lab, and as an office infrastructure.We have found that different thin-client solutions based on single board computers are reliable solutions for commercially available thin client replacement, because they can run free Linux-based operating systems, can handle Remote Desktop Protocol, have lower acquisition costs, lower power consumption and offer almost the same computing performance.For providing remote desktops, there are several methods and virtualization platforms available. We benchmarked some of these platforms in order to choose the one best-suited for implementation. Our conclusion is that Microsoft Remote Desktop Services outperforms the virtualization based solutions, but it entails high license fees. Of the virtualization solutions tested, the VMW are ESXi based one is the most reliable choice.
APA, Harvard, Vancouver, ISO, and other styles
2

Jang, Su Min, Won Hyuk Choi, and Won Young Kim. "Client Rendering Method for Desktop Virtualization Services." ETRI Journal 35, no. 2 (2013): 348–51. http://dx.doi.org/10.4218/etrij.13.0212.0213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haque, Syed Arefinul, Salekul Islam, Md Jahidul Islam, and Jean-Charles Grégoire. "An architecture for client virtualization: A case study." Computer Networks 100 (May 2016): 75–89. http://dx.doi.org/10.1016/j.comnet.2016.02.020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Yu, Aiwu Shi, Kai He, Zhiqiang Hu, and Nan Su. "DCVS A Dynamic Control for Video Traffic in SPICE." Journal of Information Technology Research 11, no. 3 (2018): 15–28. http://dx.doi.org/10.4018/jitr.2018070102.

Full text
Abstract:
This article describes how with the development of cloud computing and virtualization technology, the desktop virtualization solution is becoming more and more mature. As a virtual desktop transport protocol, SPICE is used for deploying virtual desktops on servers and remote clients with high performance. However, it will take up a lot of network bandwidth and cause network congestion in a relatively poor network environment on video transmission. To solve this problem, a dynamic adjustment for video traffic (DCVS) in SPICE is proposed. It can dynamically adjust the bit rate of the video encoding according to the state of the virtual buffer and the feedback from client. The experiment results prove that DCVS can effectively reduce the video traffic and the probability of congestion.
APA, Harvard, Vancouver, ISO, and other styles
5

Popkov, S. I. "Organization of Client-Server Interaction on a Single Computer." Моделирование и анализ данных 10, no. 4 (2020): 60–78. http://dx.doi.org/10.17759/mda.2020100406.

Full text
Abstract:
A research of existing approaches to the organization of client-server interaction is conducted. Special attention is paid to the practical application of client-server interaction on a single computer. An experiment was conducted with the implementation of minimal server code and the application of virtualization. The result of the experiment is presented, the technical features and the results obtained are described.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhou, Yuezhi, Yaoxue Zhang, Hao Liu, Naixue Xiong, and Athanasios V. Vasilakos. "A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization." IEEE Transactions on Services Computing 7, no. 1 (2014): 40–53. http://dx.doi.org/10.1109/tsc.2012.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Shreyansh, and Parvathi R. "Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization." International Journal of Computer Applications 95, no. 18 (2014): 38–44. http://dx.doi.org/10.5120/16698-6829.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chandana Kumari, P. ILA, S. Swarajya Laxmi, B. Rekha, et al. "VMM based Secured Virtualization in Cloud-Computing." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 3 (2016): 643. http://dx.doi.org/10.11591/ijeecs.v4.i3.pp643-648.

Full text
Abstract:
Cloud computing, utility computing, the future will be the main IT field. The government and companies are realizing that foreigners can clearly increase the cloud with minimal costs and maximum flexibility in the plant or existing equipment. But the clouds to ensure user privacy and digital asset management challenge in cloud client. Protection must always contain a performance. The complex is a sure way to end the occupation of the problem, the study suggests two Ebionitism security architecture. The movement and different approaches to health and safety and the level of the best things for their security costs hyper-visor layer to a reduction in order to avoid false alarms
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Hong, and Ming Yan Wang. "Discussion on the Construction of the Campus Desktop Virtualization." Applied Mechanics and Materials 610 (August 2014): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.610.699.

Full text
Abstract:
In this paper, the current problems and demands of campus information system was analyzed and the desktop virtualization solutions were probed. Thus, under the cloud system structure, the user can simply login by the client in desktop systems of data center, as well as traditional computer operating. As a result, the flexibility and security in application of resources are enhanced. More over, schools can avoid the repeated investment and reduce the pressure on hardware and software maintenance, and improve the working efficiency.
APA, Harvard, Vancouver, ISO, and other styles
10

Chang, Xiao Lin, Ji Qiang Liu, Bin Xing, and Zhong Lan Yuan. "Lightweight, Scalable and OS-Transparent Remote Attestation of Runtime Program." Applied Mechanics and Materials 198-199 (September 2012): 506–11. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.506.

Full text
Abstract:
Secure channel technologies alone can not provide the sufficient protection to the server data as long as the server can not guarantee the trustworthiness of the client program which accesses the server. The current Trusted Computing solution offers the guarantee on the trustworthiness of the client program by evaluating the integrity of all executable elements on the client platform. However, this solution may not work effectively in the monolithic legacy and commodity operating system. This paper considers the remote attestation of program execution on the untrusted legacy platform. We propose an architecture, which (1) collects the run-time information of the client program in a secure, scalable and OS-transparent way, and (2) reports to the remote server the collected run-time information of the client program in a lightweight and secure way. The architecture achieves these features by exploiting the system virtualization technology, the existing VMI tools, and the time stamping functionality in TCG TPM. We give the detailed description of the architecture.
APA, Harvard, Vancouver, ISO, and other styles
11

Jan, Saeed Ullah, and Fawad Qayum. "A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis." Network and Communication Technologies 3, no. 1 (2018): 6. http://dx.doi.org/10.5539/nct.v3n1p6.

Full text
Abstract:
Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts ("modules"), which can create the chance for extra enhancement, inconsiderable improvement, and prominent maintainability. In client-server computing, total extensive modules don't need to be accomplished within the similar memory space totally but can execute independently on a suitable hardware and software platform according to their behavior. The user authentication is the dominant constraint for client-server computing that limits the illegitimate right of entry into the main workstation. This research is mainly focused on the design of a robust authentication scheme for client-server architecture computing. It carries some additional features like security, virtualization, user's programs security, individuality supervision, integrity, control access to server and authentication. The proposed background also delivers the characteristic supervision, mutual authentication, and establishment of secure session key among users and the remote server.
APA, Harvard, Vancouver, ISO, and other styles
12

Afriansyah, Muhammad Faizal, Adian Fatchur Rochim, and Eko Didik Widianto. "Rancang Bangun Layanan Cloud Computing Berbasis IaaS Menggunakan Virtualbox." Jurnal Teknologi dan Sistem Komputer 3, no. 1 (2015): 87–94. http://dx.doi.org/10.14710/jtsiskom.3.1.2015.87-94.

Full text
Abstract:
Today, the growth of technology is very fast and a lot of technology that can facilitate users in helping their activity is made. A technology need a server to store both systems and users data. More users needed more servers to store user data. The server room became full and needed the extra space so that it required high cost to build the server and the server space itself. The purpose of this research is to create an IaaS based server virtualization that is connected to a router, switch, virtual client and administrator with VirtualBox application. The purpose of this research can be achieved by designing an appropriate research’s methodology. There are 5 stages of implementation/methodology in building virtualization server at this research which are the system definition, requirements specification, system configuration, system testing, and system analysis. First, phase of the definition system is by describing a system of early identification, system requirements and network topology on the implemented system. The second phase is the specification requirements to determine specifications hardware and software. The hardware consists of a computer with resources 8GB RAM and AMD Phenom II X6 as a processor. The software consists of VirtualBox and operating systems. The third stage is the system configuration to declare the source code in application on each server, routers and switches to perform the function of each device. The final stage is system testing and system analysis by checking the system is ready to use and works the best. Results in this research show IaaS-based server virtualization can be connected to display a web page on all clients through virtual switches and routers on a computer.
APA, Harvard, Vancouver, ISO, and other styles
13

Kim, Kwang-Yong, Il-Gu Jung, and Won Ryu. "A Development of Thin Client based Video Guide Service Using Video Virtualization and WebRTC." Journal of Korean Institute of Intelligent Systems 23, no. 6 (2013): 500–504. http://dx.doi.org/10.5391/jkiis.2013.23.6.500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

DAN, ASIT, KAVITHA RANGANATHAN, CATALIN L. DUMITRESCU, and MATEI RIPEANU. "A LAYERED FRAMEWORK FOR CONNECTING CLIENT OBJECTIVES AND RESOURCE CAPABILITIES." International Journal of Cooperative Information Systems 15, no. 03 (2006): 391–413. http://dx.doi.org/10.1142/s0218843006001402.

Full text
Abstract:
In large-scale, distributed systems such as Grids, an agreement between a client and a service provider specifies service level objectives both as expressions of client requirements and as provider assurances. From an application perspective, these objectives should be expressed in a high-level, service or application-specific manner rather than requiring clients to detail the necessary resources. Resource providers on the other hand, expect low-level, resource-specific performance criteria that are uniform across applications and can be easily interpreted and provisioned. This paper presents a framework for service management that addresses this gap between high-level specification of client performance objectives and existing resource management infrastructures. The paper identifies three levels of abstraction for resource requirements a service provider needs to manage, namely: detailed specification of raw resources, virtualization of heterogeneous resources as abstract resources, and performance objectives at an application level. The paper also identifies three key functions for managing service-level agreements, namely: translation of resource requirements across abstraction layers, arbitration in allocating resources to client requests, and aggregation and allocation of resources from multiple lower-level resource managers. One or more of these key functions may be present at each abstraction layer of a service-level manager. Thus, layering and the composition of these functions across abstraction layers enables modeling of a wide array of management scenarios. The framework we present uses service metadata and/or service performance models to map client requirements to resource capabilities, uses business value associated with objectives to arbitrate between competing requests, and allocates resources based on previously negotiated agreements. We instantiate this framework for three different scenarios and explain how the architectural principles we introduce are used in the real-word.
APA, Harvard, Vancouver, ISO, and other styles
15

MM, Tutang. "STUDI KASUS PEMANFAATAN HYPER-V SEBAGAI ADITIONAL DOMAIN MENGGUNAKAN SISTEM OPERASI WINDOWS SERVER 2008R2 DAN WINDOWS SERVER 2012 PADA PUSAT PENELITIAN BIOTEKNOLOGI-LIPI." Dinamik 24, no. 2 (2019): 92–101. http://dx.doi.org/10.35315/dinamik.v24i2.2885.

Full text
Abstract:
Hyper-V atau Virtualization merupakan solusi tepat untuk menambah server biaya murah dengan kemampuan yang tetap sebagaimana layaknya sebuah server. Pemanfaatan Hyper-V atau Virtualization merupakan salah satu Roles dari Windows Server 2008R2, sangat memungkinkan untuk digunakan sebagai mesin utama dan diatasnya bisa dipasang beberapa mesin virtual dengan kemampuan sama seperti mesin utamanya. Pusat Penelitian Bioteknologi LIPI saat ini memiliki mesin dengan sistem operasi Microsoft Windows Server 2008R2 dan diberi nama CURCUMA-CBN, kemudian ditambah Roles Hyper-V dan dibuat beberapa mesin virtual, yaitu mesin pertama bernama BACKUP-DC yang diinstal Windows Server 2008R2 dan digunakan sebagai Additional Domain, kemudian mesin virtual berikutnya adalah BLLYNCFE01 dan diinstal Windows Server 2012 yang akan digunakan sebagai Lync Server 2013. Ketiga server tersebut saling berkomunikasi sehingga terjadi sinkronisasi diantara ketiganya, di sini peran Domain Controler (ADDS) sangat penting dan semua client saling berhubungan dan berkomunikasi antara satu dengan lainnya, karena semua user harus JOIN ke domain bioteknologi.net untuk mengakses data dan aplikasi yang diperlukan user tersebut.
APA, Harvard, Vancouver, ISO, and other styles
16

Chen, Shang Liang, Ying Han Hsiao, Yun Yao Chen, and You Chen Lin. "A Cloud Multi-Tenant Architecture for Developing Machine Remote Monitoring Systems." Applied Mechanics and Materials 764-765 (May 2015): 775–78. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.775.

Full text
Abstract:
This study proposes innovative multi-tenant remote monitoring platform architecture based on cloud with an injection machine manufacturer as cloud data center. This study was designed to develop machine connection mechanism and monitoring module, etc. with machine manufacturers. Under the architecture of this study, machine manufacturers can provide virtualization technology based remote monitoring systems for manufacturing buyers to rapidly develop custom monitoring software. All data storage devices such as servers are provided by the machine manufacturer, and the client side can effectively manage injection machine data by simply renting virtual machine space.
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Fa Gui, Wen Yang Wang, Zhi Xiong, and Jun Lin. "Research and Realization of I/O Monitoring Based on Xen Cloud Platform." Advanced Materials Research 791-793 (September 2013): 931–35. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.931.

Full text
Abstract:
With the wide application of cloud platform, how to better utilize virtualization technology has become a great challenge for many IT enterprises. This paper proposed an I/O monitoring framework for XCP-based platform. Combining mobile technology, monitoring tools on both server and client side are developed respectively. Functional testing is carried out on the I/O monitoring tools, whose effectiveness and reliability are verified. The XCP-based I/O monitor platform is able to supervise the I/O of virtual machines, which provides a great way for cloud platform operation management.
APA, Harvard, Vancouver, ISO, and other styles
18

Nomnga, Nomnga, P. P., Scott Scott, M. S., Nyambi Nyambi, and B. P. "A Technical Cost Effective Network-Domain Hosting through Virtualization: a VMware ESXi and vSphere Client Approach." International Journal of Computer Applications 91, no. 10 (2014): 39–47. http://dx.doi.org/10.5120/15920-5177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Toka, Laszlo, Akos Recse, Mate Cserep, and Robert Szabo. "On the Mediation Price War of 5G Providers." Electronics 9, no. 11 (2020): 1901. http://dx.doi.org/10.3390/electronics9111901.

Full text
Abstract:
Virtualization guarantees that, moving toward 5G, online services will be versatile and the creation of those will be quick, satisfying the interest of end-clients to a higher degree than what is plausible today. Telcos, cloud administrators, and online application suppliers will unite for conveying those services to clients around the world. Thus, in order to help their portability, or the simple geographic range of the offered application, the business arrangements among the actors must scale over numerous domains and a guaranteed nature of joint effort among different stakeholders is important. Therefore, the vision of the 5G environment is majorly established on the federation of these partners in which they can consistently strive towards the objective of making reliable resource slices and deploying applications within for a maximal geographic reach of clients. In this environment, business perspectives will significantly impact the technical capacity of the system: the business arrangements of the providers will innately decide the accessibility and the end-client costs of certain services. In this work, we model the business relations of infrastructure providers as a variation of network formation games. We infer conditions under which the current transit-peering structure of network providers stays unblemished, and we also draw the specifics of an envisioned setup in which providers create business links among each other starting with a clean slate.
APA, Harvard, Vancouver, ISO, and other styles
20

Ali, Syed Mubashir. "Challenges and Security Issues in Future IT Infrastructure Components." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 8, no. 2 (2013): 845–47. http://dx.doi.org/10.24297/ijct.v8i2.3396.

Full text
Abstract:
Over the past 2 decades, the information technology infrastructure has gone through an exponential change with the introduction and evolution of new technologies and trends. Organizations previously having their data on-premise and their infrastructure comprising of multiple server machines on multiple server racks and dedicated client personal computers (PCs) are moving towards cloud computing & virtualization to Smartphone and tablets. This rapid advancement and constant change, although increasing productivity for the organizations is resulting in a rising number of challenges and security issues for the organizations, their managers, IT administrators and technology architects. This paper discusses the future IT infrastructure components and the challenges & security issues that arise after their implementation that needs to be taken care of in order to get the full advantage of IT.
APA, Harvard, Vancouver, ISO, and other styles
21

Chahal, Amanbir kaur, and Gurpreet Singh. "Advanced IT Outsourcing By Using Cloud Computing Model." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 2 (2012): 6–17. http://dx.doi.org/10.24297/ijct.v2i2a.6738.

Full text
Abstract:
In this paper we will discuss Outsourcing is the commissioning of a third party (or a number of third parties) to manage a client organization.s IT assets, people and/ or activities to required results. Business process outsourcing (BPO) is a more comprehensive definition of the current situation within the outsourcing domain. BPO has become increasingly interesting as more and more business processes are commoditized and thus easier to be hosted by an external party. Cloud Computing has all the attributes and potential to support a global BPO environment. These attribute are: virtualization, service oriented architecture (SOA), utility based pricing and grid computing. Cloud Computing involves the movement of IT services . application, infrastructure and platform . onto the Internet and deployment models. Because of the high availability, high bandwidth and the increased use of the Internet it has become easier to access a variety of services, traditionally originating from within a company.s data center.
APA, Harvard, Vancouver, ISO, and other styles
22

Joni, Joni, and Setiawan Assegaf. "ANALISIS DAN PERANCANGAN JARINGAN VIRTUAL PADA SMK NEGERI 2 KOTA JAMBI." Jurnal Manajemen Sistem Informasi 4, no. 2 (2019): 137. http://dx.doi.org/10.33998/jurnalmanajemensisteminformasi.2019.4.2.618.

Full text
Abstract:
Computer networks today become the need to build a very wide communication because it can reachseveral areas with different geographical location. Institution engaged in education makes computernetwork as a subject on IT department. The computer network is the set of interconnections between twoor more autonomous computers connected to the cable or wireless transmission medium.The applicationof computer network needs many equipments and materials. To be more efficient in its use it can be builtvirtual network using full virtualization technique, and in making virtual machine used VirtualBox astool. This research makes five virtual machines in one host computer called host, where linux debian asserver, mikrotik OS as router and windows xp, windows 7 and windows 10 as client called guest. Fifthvirtual machine uses a different IP address but still connected to each other on a local network or internet.This virtual network can be used as a solution to the problem of the lack of hardware availability (PC),facilitate teachers and learners in understanding the process of network communication (ping process andaccess) and can support the implementation of computer network learning process, especially in SMKNegeri 2 Kota Jambi.
APA, Harvard, Vancouver, ISO, and other styles
23

Ilyasova, Katherine. "PHYSICALITY AS A PSYCHOLOGICAL PHENOMENON." Bulletin of Taras Shevchenko National University of Kyiv. Series “Psychology”, no. 1 (10) (2019): 40–44. http://dx.doi.org/10.17721/bsp.2019.1(10).10.

Full text
Abstract:
The article is devoted to the problem of corporeality as a psychological phenomenon. The problem of the human body and physicality is affected in many areas of psychology. The psychology of corporeality is not a scientific research. We study the genesis of the concept of "body" in works of domestic and foreign researchers. Particular attention needs to be paid to the analysis of factors influencing the perception of one's own physicality. Corporeality is understood as a sociocultural phenomenon — the body of a person, having social and cultural features, is transformed under the influence of social and cultural factors. The connection between corporeality and human self-evaluation is proved. The article analyzes the psychology of corporeality in the historical aspect and from the standpoint of various scientific approaches. It is noted that in modern psychological studies there is a tendency to differentiate the consideration of various aspects of physicality. A theoretical analysis of modern psychological researches in the field of physicality is conducted. In the age of globalization without borders, and under the conditions of socio- cultural space virtualization, body becomes an apotheosis of eclecticism, merging together all that had seemed incompatible. On the basis of empirical research, the level of satisfaction with the own body of clients of cosmetologists and medical institutions is investigated. Article presents the results of methodological and empirical analysis of the satisfaction with body. Results show that body image is a category engendered and determined mostly by psychological factors. Body image may have a significant influence on the human well-being. Article describes the results of the study of the cosmetology institutions client satisfaction of their own body. Prospects for further research are identified.
APA, Harvard, Vancouver, ISO, and other styles
24

Rolinskyi, O. V., B. S. Huzar, Y. V. Ulianych, and O. V. Ponomarenko. "Information technology development on the Ukrainian insurance market." Collected Works of Uman National University of Horticulture 2, no. 98 (2021): 186–94. http://dx.doi.org/10.31395/2415-8240-2021-98-2-186-194.

Full text
Abstract:
In the context of virtualization of economic relations, the entities of the insurance market cannot avoid these processes, so in order to improve the quality and availability of insurance services it is necessary to extend information technology in insurance business. The main motivation for the introduction of information technology by insurance companies is the need to reduce costs, expand the area of activities, ensure the diversification of risks. It is equally important the simplicity and comfort of buying an insurance product online. The insurance market of Ukraine is at the phase of development and formation, having a number of challenges and uncertainties. Therefore, its further information and technological development must obtain priority in the economic and social aspects of state policy, taking into account its European integration guidelines. The article considers the importance of modern information technologies in the operation of insurance companies in Ukraine. The range of modern software products and information technologies, which are widespread in use in the insurance market of Ukraine, is studied. The key components of information technologies of insurance companies are considered. The concept of Insuretech funding is substantiated and researched. The problems of information technology development on the Ukrainian insurance market are analyzed and the ways of its improvement are offered. For the further development of Internet insurance the improving of legislative framework on this point is essential; it is necessary that the websites of insurance companies contain sufficient amount of information content and a number of opportunities are provided for clients: obtaining truthful information about the activities of the insurance company and its services; calculation of the cost of the insurance policy using an online calculator; filling out an application for insurance; in the case of the event covered by the insurance, remote payment of the insurance policy and insurance payments; delivering to the policyholder of the insurance policy, which would be confirmed by an digital signature; online communication with the client at all stages of sales and administration of insurance policies.
APA, Harvard, Vancouver, ISO, and other styles
25

Paul, P. K., R. R. Sinha, P. S. Aithal, Ricardo Saavedra, Bashiru Aremu, and S. Mewada. "Cloud Computing Vis-à-Vis Agricultural Development towards Digital and Smarter Agricultural Informatics Practice." Asian Journal of Engineering and Applied Technology 9, no. 1 (2020): 18–24. http://dx.doi.org/10.51983/ajeat-2020.9.1.1083.

Full text
Abstract:
Cloud computing is an emerging and technologies within the Information Technology field and also technological era. Cloud Computing is used in almost all sectors, fields, organizations and institutions; where Information Technology is used. Cloud computing deals with the delivery of computing infrastructure, application and many need based collaboration viz. hardware, software, networks, storage, interfaces as a service by the internet and similar systems. Cloud Computing is also known as virtualization technology as it supports from the remote places depending upon the needs of the users and from the centralized unit and systems. It also allows healthy computing services including storage, memory, processing with many advantages and facilities with several platforms; hence it is become widely recognized around the world. Most importantly also offers many add on facilities with low cost implementation for the infrastructure. Cloud Computing enables payment depending upon the need of the organization, client and institutions, and facilities offered. It also acts as virtual hardware and also provides elasticity, network based services. Among the stakeholders of Cloud Computing; the most important are growing is Agriculture Sectors. It is useful in pre production and post production of the agricultural systems. This paper talks about the basics of Cloud computing including current and future applications in agriculture and allied domains. Paper also deals with the issues, challenges of Cloud computing in agro and allied domain in brief. Paper also suggested few concerns on Cloud Computing application in smarter agriculture dealing and Agriculture Informatics is also been provided, herewith.
APA, Harvard, Vancouver, ISO, and other styles
26

Prydatko, O. V., N. Ye Burak, V. Ye Dzen, and M. S. Kunynets. "INTRODUCTION OF THE INFORMATION AND REFERENCE SYSTEM "UNIBELL" IN THE EDUCATIONAL ENVIRONMENT INSTITUTION OF HIGHER EDUCATION." Ukrainian Journal of Information Technology 2, no. 1 (2020): 57–65. http://dx.doi.org/10.23939/ujit2020.02.057.

Full text
Abstract:
Scientific work is aimed to identifying problem areas during distance educational process and to development of services that could help of solving them. Empirical methods and methods of real-life observation were used to collect the initial data for study. Processing of the obtained data is performed on the basis of using analytical methods and methods of expert evaluations. This allowed to identify weaknesses at distance education organization and to form a list of necessary services, which development and implementation will improve the quality of distance and inpatient educational process and education situation generally. The study identified and characterized the range of internal stakeholders of the educational environment, to meet the needs of which the development of these services is aimed. The results of empirical observations are presented using of set theory. To identify priority of declared services on the range for immediate implementation were provided their detailed analysis that showed high needs of an informational reference system development for remote access to the schedule with its further integration into educational environment. The proposed system is called "UniBell". This system is the part of education project "Smart-University", the main purpose of which is to integrate Universities into modern digital environment. Also, study defined the term "Smart University" or "Smart Educational Environment" and described main functionalities, general architecture and features of separate client as well as server parts of the "UniBell" service. Furthermore, features of additional subsystems of server part management, implemented with the use of software technologies.Net, Java and the language of structured queries SQL were highlighted. The model of client-server architecture, as well as algorithms for accounting and control of the training schedule have formed the basis for the development of an existing application for the Android operating system with the ability to download it via Google Play. The analysis of educational process virtualization has identified the main factors that may affect the educational process quality in the format of distance learning. The results of the analysis have become the basis for developing the architecture and algorithm of information system "UniBell" tasked to organize remote access to the training schedule using mobile technology. Using the conceptual apparatus of set theory, the volumes of internal stakeholders are investigated have been characterized, which provides a solid basis and target audience for further research on the effectiveness of the developed system in the Lviv State University of Life Safety educational environment.
APA, Harvard, Vancouver, ISO, and other styles
27

Semenog, A. Y. "Fintech Development: The Trends and Consequences for the Financial Services Market." Business Inform 8, no. 523 (2021): 173–83. http://dx.doi.org/10.32983/2222-4459-2021-8-173-183.

Full text
Abstract:
The article is aimed at determining the consequences of digitalization and development of the fintech sector for the financial services market. According to the results of the analysis, a number of transformational trends for the financial services market are identified and characterized, among which the major ones: disintermediation in the financial services market – as a process of «cutting out» the classical financial institutions from the direct process of financial asset exchange; democratization of financial services processes – as a process of expanding the range of financial products; disaggregation of financial services – as a process of splitting financial services into separate financial products; increasing the inclusiveness of financial services, which provides better availability for different categories of customers; emergence of decentralized finances – as a concept and ecosystem of financial services, in which the provision of financial services and products is carried out directly without traditional financial intermediaries within the public open and decentralized blockchain network; development of automation and virtualization of financial services, which involves the widespread use of artificial intelligence technologies, algorithmic assessment of customer creditworthiness, autonomous risk management, automated trading on the exchange, the work of virtual assistants, robo-advisers and security systems against fraud; appearance of built-in financial products as part of services outside of the applications of financial institutions. The consequence of these trends is a reduction in the demand for financial services as a separate product of classical financial institutions; reducing the profits of traditional financial service providers; expansion of new business models of financial services provision in cooperation with technology companies; increasing the need to update the regulatory support of financial services processes, as well as the integration of mass financial products into the client offers of non-financial companies within a single ecosystem of products and services of a digital company.
APA, Harvard, Vancouver, ISO, and other styles
28

Shukur, Hanan, Subhi Zeebaree, Rizgar Zebari, Diyar Zeebaree, Omar Ahmed, and Azar Salih. "Cloud Computing Virtualization of Resources Allocation for Distributed Systems." Journal of Applied Science and Technology Trends 1, no. 3 (2020): 98–105. http://dx.doi.org/10.38094/jastt1331.

Full text
Abstract:
Cloud computing is a new technology which managed by a third party “cloud provider” to provide the clients with services anywhere, at any time, and under various circumstances. In order to provide clients with cloud resources and satisfy their needs, cloud computing employs virtualization and resource provisioning techniques. The process of providing clients with shared virtualized resources (hardware, software, and platform) is a big challenge for the cloud provider because of over-provision and under-provision problems. Therefore, this paper highlighted some proposed approaches and scheduling algorithms applied for resource allocation within cloud computing through virtualization in the datacenter. The paper also aims to explore the role of virtualization in providing resources effectively based on clients’ requirements. The results of these approaches showed that each proposed approach and scheduling algorithm has an obvious role in utilizing the shared resources of the cloud data center. The paper also explored that virtualization technique has a significant impact on enhancing the network performance, save the cost by reducing the number of Physical Machines (PM) in the datacenter, balance the load, conserve the server’s energy, and allocate resources actively thus satisfying the clients’ requirements. Based on our review, the availability of Virtual Machine (VM) resource and execution time of requests are the key factors to be considered in any optimal resource allocation algorithm. As a results of our analyzing for the proposed approaches is that the requests execution time and VM availability are main issues and should in consideration in any allocating resource approach.
APA, Harvard, Vancouver, ISO, and other styles
29

Sujarwo, Ari, and Jefferson Tan. "Enterprise firewall virtualization design." MATEC Web of Conferences 154 (2018): 03004. http://dx.doi.org/10.1051/matecconf/201815403004.

Full text
Abstract:
Grid computing could consists of thousand of computers across the world with the role as the resource provider or Grid users. This conditions make a challenge for engineer to keep the Grid secure but at the same the Grid must be easily joined by clients and providers. This paper aims to propose a method to control enterprise firewall which is basically a static engine to be a dynamic engine to cope with the Grid needs. At the end of the paper, the results shows that this method is works and was tested using a real enterprise firewall.
APA, Harvard, Vancouver, ISO, and other styles
30

Prokopchuk, E. T., Y. V. Ulianych, S. A. Ptashnyk, and N. V. Butko. "Key Aspects of Online Insurance." Collected Works of Uman National University of Horticulture 2, no. 97 (2020): 64–74. http://dx.doi.org/10.31395/2415-8240-2020-97-2-64-74.

Full text
Abstract:
In the conditions of virtualization of economic relations, the subjects of the insurance market can not stay away from these processes, so in order to improve the quality and level of availability of insurance services it is necessary to spread internet technologies in insurance. The main incentive for the introduction of Internet services by insurance companies is the need to reduce costs, expanding the geography of activities, ensuring diversification of risks. No less important factors are simplicity and comfort of on-line purchase of insurance product. The Ukrainian insurance market is at the stage of development and formation, having a number of problems and uncertainties. Therefore, its further information and technological development should receive priority in the economic and social aspects of government policy, taking into account its European integration guidelines. The article deals with the concept of Internet insurance. It is established that the approaches of scientists to the disclosure of the content of the concept of "Internet insurance" have differences. However, they converge on the definition of the Internet insurance as a process of interaction between the insurance representative and the insurer, connected with the provision of insurance services by the insurer, their service, performance of insurance payments in case of occurrence of an insured event due to the use of Internet technologies. The main advantages and disadvantages of online insurance are presented. The list of main advantages includes: simplification of the insurance process, efficiency of registration, simplicity and universality of payment methods, minimization of "human" factor, automation of calculation of the sum insured and tariffs with the help of insurance multicalculator. The list of main drawbacks includes: a much smaller number of insurance products are placed on the Internet sites of insurance companies for sale, the need for the client to understand the nuances and subtleties of working with the site of the insurer, set certain options for insurance amounts, which the client can not change. The stages of obtaining the insurance service through the Internet system have been considered, the offer of services by insurance companies of Ukraine "in live" and "on-line" and innovations on the Internet insurance market of Ukraine have been analyzed, the main spectrum of Internet services providing insurance companies in the Internet has been investigated, the number of insurance companies for the last years has been considered in dynamics. For the further development of Internet insurance it is necessary to improve the legal framework on this issue; it is necessary that the sites of insurance companies contain sufficient information content and for the customers a number of opportunities: obtaining true information about the activities of the insurance company and its services; calculation of the cost of the insurance policy with the help of online calculator; filling in an application for insurance; in case of an insured event, the implementation of remote payment of the insurance policy and insurance payments; delivery of the insurance policy to the customers; and delivery of the insurance policy to the customers.
APA, Harvard, Vancouver, ISO, and other styles
31

Проскурин, Д. К., and К. А. Маковий. "MODIFIED GENETIC ALGORITHM FOR SOLVING THE PROBLEM OF SELECTING SERVER RESOURCES IN BUILDING THE INFRASTRUCTURE OF VIRTUAL DESKTOPS." ВЕСТНИК ВОРОНЕЖСКОГО ГОСУДАРСТВЕННОГО ТЕХНИЧЕСКОГО УНИВЕРСИТЕТА, no. 3 (July 2, 2021): 46–51. http://dx.doi.org/10.36622/vstu.2021.17.3.006.

Full text
Abstract:
Переход к облачным технологиям сопровождается значительными материальными затратами на формирование ИТ-инфраструктуры. Использование моделей, позволяющих оптимизировать аппаратные ресурсы, приводит к сокращению стоимости оборудования и повышает успешность инфраструктурных ИТ-проектов. Виртуализация клиентских рабочих мест значительно меняет способы взаимодействия с конечными пользователями и расширяет возможности для цифровой трансформации деятельности организации. Представлен генетический алгоритм для решения задачи выбора аппаратного обеспечения для формирования клиентских рабочих мест. Математическая модель выбора серверных платформ и объема памяти для размещения заданного количества виртуальных машин с заданными требованиями к оперативной памяти представляет собой задачу нелинейного целочисленного программирования, которая не имеет способов точного решения, поэтому для каждой такой задачи подбираются различные эвристические методы, позволяющие получить не точное, но достаточно хорошее решение за приемлемое время. Предложенный генетический алгоритм использует отличный от классического способ кодирования решения и разработанный оператор направленной мутации. Использование элитарной стратегии совместно с ранговой селекцией, помещение «лучшего» решения в генетический банк позволяют решить проблему попадания в локальные оптимумы и повышают сходимость генетического алгоритма The transition to cloud technologies is accompanied by significant material costs for the formation of IT infrastructure. Using models that optimize hardware resources reduces hardware costs and increases the success of IT-infrastructure projects. Client workspace virtualization is dramatically changing the way of interaction with end users and expanding the opportunities for digital transformation of the organization. The article presents a genetic algorithm for solving the problem of choosing hardware for the formation of virtualized desktops infrastructure. The mathematical model for the selection of server platforms and the amount of memory to place a given number of virtual machines with given requirements for RAM is a nonlinear integer programming problem that has no exact solution, therefore, for each such problem, various heuristic methods are selected that allow obtaining not exact, but a good enough solution in a reasonable amount of time. The proposed genetic algorithm uses a solution coding method that differs from the classical method and a directed mutation operator being developed. The use of an elitist strategy in conjunction with ranking selection, placing the "best" solution in the genetic bank allows one to solve the problem of getting into local optima and increases the convergence of the genetic algorithm
APA, Harvard, Vancouver, ISO, and other styles
32

Singh, Er Gursimran, and Dr Gurjit Singh Bhathal. "Virutalized Cloud Environment : A Survey." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 8, no. 1 (2013): 730–33. http://dx.doi.org/10.24297/ijct.v8i1.3433.

Full text
Abstract:
Cloud computing is one of today's most exciting technology because of its cost-reducing, flexibility, and scalability. With the fast growing of cloud computing technology, Data security becomes more and more important in it. In evaluating whether to move to cloud computing, it is important to compare benefits and also risks of it. Thus, security and other existed issues in the cloud cause cloud clients need more time to think about moving to cloud environments. But Security-related topics is one of the most arguable issues in the cloud computing which caused several enterprises looks to this technology uncertainly and move toward it warily[2]. A Virtualization Security framework is presented which contains two parts: virtual system security and virtualization security management.[1] The paper is devoted to the mechanism of monitoring of virtual machines aimed at guaranteeing increased security to cloud resources. Furthermore, the requirements for this mechanism are enumerated.[3]
APA, Harvard, Vancouver, ISO, and other styles
33

Nath Mishra, Kamta. "A Proficient Mechanism for Cloud Security Supervision in Distributive Computing Environment." International Journal of Computer Network and Information Security 12, no. 6 (2020): 57–77. http://dx.doi.org/10.5815/ijcnis.2020.06.05.

Full text
Abstract:
In the existing epoch, the cloud-IoT integrated distributive computing is earning very high attractiveness because of its immense characteristics which can be divided into two categories namely essential and common characteristics. The essential characteristics of cloud-IoT computing are demand dependent like broad network access, self-service, resource pooling, and speedy elastic nature. The common characteristics of cloud-IoT computing are homogeneity, massive scale, virtualization, resilient computing, low cost software availability, service orientation, geographic independent computation, and advanced safety availability. The cloud-IoT dependent internetworked distributive computation is internet based computation environment in which infrastructure, application software, and various similar / dissimilar platforms are accessible in the cloud and the end users (businessman, developers) have the right to use it as the client. Cloud is a step from Utility Computing and several industries / companies are frequently using cloud based systems in their day-to-day work. Therefore, safety issues and challenges of cloud computing cannot be avoided in the current era. Hence, the researchers must develop high order authentication protocols for preventing the safety threats of cloud based data communication systems.. The proposed CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) based management of cloud-IoT integrated information is a two phase authenticated encoding (AE) mechanism. The first phase is worn for executing privacy computations, and the second phase is used for computing validation and truthfulness. Here, both the cycles use same encoding technique. It is well known to us that the CCM/CCMP is an amalgamation of two forms namely AES counter form and CBC- MAC (cipher-block-chain message authentication code) protocol form. The counter form is worn to carry out encoding which guarantees data privacy whereas CBCMAC is worn to attain data legitimacy and reliability. In this investigation work the author has investigated and critically analyzed the CCMP dependent safe Cloud-IoT integrated distributive mechanism for data / information management. The proposed approach further improves the overall security and performance of cloud-IoT integrated computing networks. Further, the author has solved the challenges of cloud-IoT computing by studying and analyzing major cloud-IoT computing safety concerns, and safety threats which are expected in future generation cloud computing systems. In this paper, the author has proposed CCMP & CBC-HMAC (Cipher-Block-Chain key Hash-MessageAuthentication-Code) encoding protocol can be efficiently used for providing information safety and preventing various attacks when the data is being transferred between the Cloud and a local network. The prevention mechanism for unauthorized access of data within the cloud is also presented whose performance is highly satisfactory. A secure and flexible framework to support self-organize and self register of consumer’s information in to the cloud network is designed and tested. The testing results of proposed analysis provides us very clear evidences that the PRF of CCMP is a superior and secure in contrast to that of CBC-HMAC.
APA, Harvard, Vancouver, ISO, and other styles
34

Antonenko, Vitaly A., Ruslan L. Smeliansky, Artem V. Plakunov, and Pavel A. Mikheev. "Shared Virtual Function Orchestration Technique." Modeling and Analysis of Information Systems 26, no. 1 (2019): 7–22. http://dx.doi.org/10.18255/1818-1015-2019-1-7-22.

Full text
Abstract:
Network function virtualization (NFV) is a promising technique of high quality, flexible and scalable service for telecommunication companies clients and for enterprise data center clients. One of the important capabilities of this technique is providing a virtual service as a combination of multiple virtual functions. There are two types of virtual functions: those intended for a single customer (su-VF) and those that can serve multiple users (mu-VF). In case when output of mu-VF is chained with inputs of several different su-VFs, there is a need for a mechanism of identification and separation of users network flows passing through mu-VF to allocate them correctly between inputs of su-VFs in the NFV infrastructure. In the cloud environment, it is not always possible to use VLAN tags, IP and MAC addresses for that. In this paper, we consider the problem of identification of network traffic coming from a certain user inside an NFV platform and present a solution implemented in C2 MANO-platform.
APA, Harvard, Vancouver, ISO, and other styles
35

M. Mousa, Hamdy, and Gamal F. Elhady. "Trust Model Development for Cloud Environment using Fuzzy Mamdani and Simulators." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 11 (2014): 5142–54. http://dx.doi.org/10.24297/ijct.v13i11.2784.

Full text
Abstract:
Nowadays, Cloud computing is an expanding area in research and industry, which involves virtualization, distributed computing, internet, software, security, web services and etc. A cloud consists of several elements such as clients, data centers and distributed servers, internet and it includes fault tolerance, high availability, effectiveness, scalability, flexibility, reduced overhead for users, reduced cost of ownership, on demand services and etc. Now the next factor is coming, cost of Virtual machines on Data centers and response time. So this paper develop trust model in cloud computing based on fuzzy logic, to explores the coordination between Data Centers and user bound to optimize the application performance, cost of Virtual machines on Data centers and response time using Cloud Computing Analyst.
APA, Harvard, Vancouver, ISO, and other styles
36

Kumar M, Sudhir, P. Chakravarthi, B. Jagadeesh, and M. Sai Prakash. "Load balancing in cloud computing." International Journal of Engineering & Technology 7, no. 1.1 (2017): 306. http://dx.doi.org/10.14419/ijet.v7i1.1.9709.

Full text
Abstract:
The expected take-up of Cloud, based on settled research in Web administrations, systems, utility figuring, disseminated processing and virtualization, will get many favorable circumstances cost, changeability and approachability for benefit clients. These advantages are foreseen to propel drive the requirements for Cloud organizations, growing both the Cloud's customer base and the extent of Cloud foundations. This has implications for many technical issues in Service Oriented Architectures and Internet of Services (IoS)-type applications; including fault tolerance, large accessibility and adaptability. Focal to these issues will be the stronghold for successful balancing load techniques. Balancing load includes allocating assignments to every processor and limiting the time for the execution program. Practically speaking, it will be conceivable even to execute the applications on any machine of overall distributed frameworks. We are going to talk the possible distributed solutions proposed for balancing load and pros and cons of load balancing.
APA, Harvard, Vancouver, ISO, and other styles
37

Ravalia, Varun, and Neha Sehrawat. "Vivid analysis of Cloud Computing along with its security issues and challenges." Journal of University of Shanghai for Science and Technology 23, no. 07 (2021): 458–63. http://dx.doi.org/10.51201/jusst/21/07113.

Full text
Abstract:
In the modern era, technologies are being used by everyone.” Cloud” refers to a collaborative expression for boundless advancements and progression. Cloud computing is a disruptive technology for providing on-demand access to data and applications from anywhere at any time in the world. Cloud computing incorporates various available innovations and technologies like virtualization, bandwidth networks, Web 2.0, browser interfaces, and time-sharing. Cloud computing enables us to share the resources like storage, applications, services, and networks without physically obtaining them. The data is stored in the databases on the servers and users/clients need to request access by sending the request to these servers. This paper includes the various details of cloud technology, its characteristics, its models alongside the challenges and problems faced in cloud computing. Here the focus is on the theoretical explanation of the cloud, models of the cloud, and the problems in the security and confrontation faced during the exertion of the cloud technology.
APA, Harvard, Vancouver, ISO, and other styles
38

Vivek, V., R. Srinivasan, and R. Elijah Blessing. "Resource provisioning methodology for cloud environment with producer and consumer favorable: an approach of virtual cloud compiler." International Journal of Engineering & Technology 7, no. 2.4 (2018): 123. http://dx.doi.org/10.14419/ijet.v7i2.4.13022.

Full text
Abstract:
Cloud computing is a model where traditional resources such as CPU cycles, storage, security etc. are delivered through web based. It is a technology which has ability to change large part of software development cycle, 3D rendering or any other computationally expensive tasks execution. Much amount of time is wasted on compiling and rendering such computationally expensive tasks due to low power machines, which directly proportional to efficiency of user who is working on that project. Extreme computational tasks such as weather forecast, DNA analyses, encryption breaking takes so much time in consumer grade computing devices that they are realistically not possible to perform. We have proposed a novel approach to perform payload distribution, for the users who wanted to run their computationally expensive tasks efficiently. We have used virtualization technique on data center resources to perform scheduling. Up to 32% cost has been reduced in an environment of 30 users when our technology used instead of traditional standalone desktop environment. This is achieved by replacing 30 standalone computers with a powerful server and thin clients like Raspberry pi as clients. Time wasted in computational task such as rendering and compiling is greatly reduced. We have not only improved the efficiency, but also make sure both cloud producer and consumer are favorable. With simulations and outcomes, we validate that our methodology for payload distribution performs well.
APA, Harvard, Vancouver, ISO, and other styles
39

Yadav, Rajeev Ranjan, Gleidson A. S. Campos, Erica Teixeira Gomes Sousa, and Fernando Aires Lins. "A Strategy for Performance Evaluation and Modeling of Cloud Computing Services." Revista de Informática Teórica e Aplicada 26, no. 1 (2019): 78. http://dx.doi.org/10.22456/2175-2745.87511.

Full text
Abstract:
On-demand services and reduced costs made cloud computing a popular mechanism to provide scalable resources according to the user’s expectations. This paradigm is an important role in business and academic organizations, supporting applications and services deployed based on virtual machines and containers, two different technologies for virtualization. Cloud environments can support workloads generated by several numbers of users, that request the cloud environment to execute transactions and its performance should be evaluated and estimated in order to achieve clients satisfactions when cloud services are offered. This work proposes a performance evaluation strategy composed of a performance model and a methodology for evaluating the performance of services configured in virtual machines and containers in cloud infrastructures. The performance model for the evaluation of virtual machines and containers in cloud infrastructures is based on stochastic Petri nets. A case study in a real public cloud is presented to illustrate the feasibility of the performance evaluation strategy. The case study experiments were performed with virtual machines and containers supporting workloads related to social networks transactions.
APA, Harvard, Vancouver, ISO, and other styles
40

Reddy, K. Shirisha, M. Balaraju, and Ramananaik . "Development of new optimal cloud computing mechanism for data exchange based on link selectivity, link reliability and data exchange efficiency." International Journal of Engineering & Technology 7, no. 1.2 (2017): 199. http://dx.doi.org/10.14419/ijet.v7i1.2.9066.

Full text
Abstract:
Reorganization of virtual machines (VM) presents an extraordinary opportunity for parallel, cluster, grid, cloud and distributed computing. Virtualization technology benefits the computing and IT ventures by enabling clients to share expensive by multiplexing virtual machines on a similar arrangement of hardware hosts. With the advantage of higher data-accessing feature, this data sharing approach provides challenges in perceptive to data security and data integrity issues. In this paper, to the selected network, a service level agreement approach for data access resource management is developed. During the exchange of packets over the selected link, it is required that data are to be accessed at a faster rate. The overhead may have serious negative effects on cluster utilization, throughput, and Quality of Service issues. Therefore, the challenge is to develop VMs a control approach, which governs the rate allocation in terms of data access and bandwidth to speed the data exchange performance. The throughput of the network is monitored by the traffic link rate, wherein the processing overhead is observed at the process of quality.
APA, Harvard, Vancouver, ISO, and other styles
41

Srinivasu, N., O. Sree Priyanka, M. Prudhvi, and G. Meghana. "Multilevel classification of security threats in cloud computing." International Journal of Engineering & Technology 7, no. 1.5 (2017): 253. http://dx.doi.org/10.14419/ijet.v7i1.5.9157.

Full text
Abstract:
Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.
APA, Harvard, Vancouver, ISO, and other styles
42

V. Samuel Blessed Nayagam, P., and A. Shajin Nargunam. "Secure Data Verification and Virtual Machine Monitoring." International Journal of Engineering & Technology 7, no. 4.36 (2018): 574. http://dx.doi.org/10.14419/ijet.v7i4.36.24140.

Full text
Abstract:
Powerfully configurable virtualized assets make the physical area of the information and process autonomous of its portrayal and the clients have no influence over the physical arrangement of information and running procedure. In a multi-cloud condition the layer of deliberation between the physical equipment and virtualized frameworks gives a great way to convey cost reserve funds through server union and also expanded operational productivity and adaptability. This additional usefulness presents a virtualization layer that it turns into a chance of assault for the facilitated virtual administrations. The proposed access control show ensures virtual machines by receiving access control at various layers. The information shading plan help to secure the virtualized information utilized in the virtual machines. The information confirmation structure, which gives a grouping of trust wipes out the untrusted special virtual machines, and additionally utilize the confided in processing standards to guarantee the respectability of the checking condition. Safeguarding security plot ceaselessly screens the working and trade of information between the virtual machine. The test results demonstrate that this plan can viably counteract virtual machine escape without influencing the general productivity of the framework.
APA, Harvard, Vancouver, ISO, and other styles
43

Strumberger, Ivana, Nebojsa Bacanin , Milan Tuba, and Eva Tuba. "Resource Scheduling in Cloud Computing Based on a Hybridized Whale Optimization Algorithm." Applied Sciences 9, no. 22 (2019): 4893. http://dx.doi.org/10.3390/app9224893.

Full text
Abstract:
The cloud computing paradigm, as a novel computing resources delivery platform, has significantly impacted society with the concept of on-demand resource utilization through virtualization technology. Virtualization enables the usage of available physical resources in a way that multiple end-users can share the same underlying hardware infrastructure. In cloud computing, due to the expectations of clients, as well as on the providers side, many challenges exist. One of the most important nondeterministic polynomial time (NP) hard challenges in cloud computing is resource scheduling, due to its critical impact on the cloud system performance. Previously conducted research from this domain has shown that metaheuristics can substantially improve cloud system performance if they are used as scheduling algorithms. This paper introduces a hybridized whale optimization algorithm, that falls into the category of swarm intelligence metaheuristics, adapted for tackling the resource scheduling problem in cloud environments. To more precisely evaluate performance of the proposed approach, original whale optimization was also adapted for resource scheduling. Considering the two most important mechanisms of any swarm intelligence algorithm (exploitation and exploration), where the efficiency of a swarm algorithm depends heavily on their adjusted balance, the original whale optimization algorithm was enhanced by addressing its weaknesses of inappropriate exploitation–exploration trade-off adjustments and the premature convergence. The proposed hybrid algorithm was first tested on a standard set of bound-constrained benchmarks with the goal to more accurately evaluate its performance. After, simulations were performed using two different resource scheduling models in cloud computing with real, as well as with artificial data sets. Simulations were performed on the robust CloudSim platform. A hybrid whale optimization algorithm was compared with other state-of-the-art metaheurisitcs and heuristics, as well as with the original whale optimization for all conducted experiments. Achieved results in all simulations indicate that the proposed hybrid whale optimization algorithm, on average, outperforms the original version, as well as other heuristics and metaheuristics. By using the proposed algorithm, improvements in tackling the resource scheduling issue in cloud computing have been established, as well enhancements to the original whale optimization implementation.
APA, Harvard, Vancouver, ISO, and other styles
44

Joy, Jibin, and Dr S. Devaraju. "Secure Deduplication For Cloud Storage Using Memory Mapping Technique For Improving Performance And Security." Journal of University of Shanghai for Science and Technology 23, no. 09 (2021): 1–13. http://dx.doi.org/10.51201/jusst/21/08498.

Full text
Abstract:
Data deduplication is a crucial technique for packing data and reducing duplication when transferring data. It is widely used in the cloud to restrict the usage of capacity memory and aids in transmission capacity sparing. Before redistributing data, an encryption mechanism is used to ensure the integrity of sensitive data during the deduplication process. The SHA algorithm is being used to save data in text format. To generate the security bits, padding is appended to the text. In de-duplication, it calculates the hash, i.e. hexadecimal number, string, and integer data. Hash-based de-duplication is the implementation of whole file hashing to the entire file. Text data’s hash values are considered to as feature properties. In contrast to traditional deduplication solutions, clients that transfer data to the cloud certify duplication inside the cloud data. In virtualization, both limiting primary memory size and memory blockage are considered important bottlenecks. Memory deduplication identifies pages with the same content and merges them into a single data file, reducing memory usage, memory parceling, and improving execution. In cloud storage, the MPT is used to deduplication so that it is used in single copies of the same data for different data owners. If any data users try to replicate the same data, it will be mapped and related to the archive data, implying that the data can’t be stored away. To ensure cloud data security, encryption techniques are used to encrypt data throughout deduplication procedures and prior to outsourcing cloud data.
APA, Harvard, Vancouver, ISO, and other styles
45

Chhabra, Sakshi, and Ashutosh Kumar Singh. "Security Enhancement in Cloud Environment using Secure Secret Key Sharing." Journal of communications software and systems 16, no. 4 (2020): 296–307. http://dx.doi.org/10.24138/jcomss.v16i3.964.

Full text
Abstract:
Securing the data in distributed cloud system is considered one of the major concern for the cloud customers who faces security risks. The data leakage or data tampering are widely used by attackers to extract the private information of other users who shares the confidential data through virtualization. This paper presents Secure Secret Sharing (SSS) technique which is being recognized as one of the leading method to secure the sensitive data. It shares encrypted data over cloud and generated secret key is split into different parts distributed to qualified participants (Qn) only which is analyzed by malicious checkers. It verifies the clients based on their previous performances, whether these users proved to be authorized participant or not. The key computation is evaluated by the Key handler (KH) called trusted party which manages authorized control list, encryption/decryption and reconstruction of key shares. The Lagrange’s interpolation method is used to reconstruct the secret from shares. The experimental results shows that the proposed secure data sharing algorithm not only provides excellent security and performance, but also achieves better key management and data confidentiality than previous countermeasures. It improves the security by using secure VM placement and evaluated based on time consumption and probability computation to prove the efficacy of our algorithm. Experiments are performed on cloudsim based on following parameters i.e. time computation of key generation; response time and encryption/decryption. The experimental results demonstrate that this method can effectively reduce the risks and improves the security and time consumption upto 27.81% and 43.61% over existing algorithms.
APA, Harvard, Vancouver, ISO, and other styles
46

Folinas, Sotiris, Marie-Noëlle Duquenne, and Theodore Metaxas. "Problems and Opportunities in the Hospitality Industry in a Masked and Rubber-Gloved World." Virtual Economics 3, no. 3 (2020): 7–24. http://dx.doi.org/10.34021/ve.2020.03.03(1).

Full text
Abstract:
As the global tourism industry is under sway of the novel Coronavirus, and the world still remains with a limited medical capacity to threat the pandemic, with no vaccine and with its only weapon of precautionary measures, masks, gloves and lockdown, a part of hospitality industry develops new stratagems and applies new tactics to survive the upcoming financial debacle. The almost worldwide lockdown, the brutal impact of mass cancellations caused by the virus spread, and the people's significantly reduced willingness to travel produce major upheavals in the tourism economy. The purpose of this study is to systematize the problems and opportunities in the hospitality industry in a pandemic. For this study there has been applied the secondary research methodology with several pieces of literature such as scientific journal articles, preprint papers, government documents, data from global organizations and mass media data etc., but no primary research was conducted. As the phenomenon is still ongoing, there is not yet the significant number of published papers about the opportunities in the hospitality sector. The main findings of the present study are demonstrating that, although this situation makes tourism highly vulnerable, the sector is also in a unique position to contribute to broader and just recovery plans and actions. Significant conclusions are the vulnerability of the travel sector and travel restrictions’ effects on hospitality industry, the appearance of a new form of hotel clients - ‘quarantine guests’, and the need of new survival strategies on hotel industry based on virtualization and domestication.
APA, Harvard, Vancouver, ISO, and other styles
47

Murugesan, M. "Virtual Machine Consolidation for Stochastic Load Balancing in Cloud Data Center Management." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2593–602. http://dx.doi.org/10.17762/turcomat.v12i2.2227.

Full text
Abstract:
Cloud computing is able to managing a massive quantity of growing work for the use of enterprise clients in a specified way Virtualization, which makes assumptions the network resources and makes it simple to control, is an important enabling technology for cloud computing. Computing is being used in the proposed work to distribute cloud services tailored to the needs and to promote the smart grid principle. “Skewness” concept was delivered here wherein equal was reducing to combine workloads to enhance the usage of the server. The complexities of on-demand allocation of resources arise from managing customer demands. As a result, the use of vms technologies has proved to be helpful in terms of resource provisioning. The use of virtualized environments is expected to reduce primarily consist connection speed while also executing tasks in accordance with cloud resource availability. This implementation can be use local negotiation based VM consolidation mechanism to predict each job request and reduce overloads to create virtual space at the time of multiple requests. The proposed system implement co-location approach to combine unused small spaces to create new virtual space for improves the performance of server. Also implement self-destruction approach to eliminate the invalid data based on time to live property. The proposed framework is executed in genuine time with effective asset allotment. In this system to begin with broaden a forecast show which will gauge the parcel sizes of decrease commitments at runtime. And it can detect information skewness in real time and allocate extra asses for mordant of large walls that help us complete faster.
APA, Harvard, Vancouver, ISO, and other styles
48

Krishna, M. Bala. "A Robust Strategic Theory based Load Balancing and Resource Allocation in Cloud Environment." International Academic Journal of Science and Engineering 8, no. 1 (2021): 19–30. http://dx.doi.org/10.9756/iajse/v8i1/iajse0803.

Full text
Abstract:
An on demand elastic service is cloud computing. At particular time, based on clients requirements, software, information, shared resources and other devices are provided in this. For supporting cost effective usage of computing resources, it is designed using distributed computing and virtualization advances and it enhances resource scalability. Based on requirement, business outcomes can scale up or down its resources. On-demand resource allocation challenges are created by customer demand management. To minimize energy, Dynamic Particle Swarm Optimization (DPSO) model is developed in available research works, where CPU utilization are regulated while operating at maximum frequency. Geographically distributed resources like computers, storage etc. are owned by self interested organizations or agents are available in large-scale computing systems of cloud computing. In their own benefit, this resource allocation algorithm can be manipulated by these agents and severe degradation in performance are produced due to its selfish behaviour and its efficiency is also very poor. To solve this kind of problem, a strategy is designed for developing a resource allocation protocols with load balancer in first phase of this research work. In this agents are forced to follow the rules and tell truth. In heterogeneous distributed systems, to solve load balancing problem, a truthful strategy is designed using this strategic theory. Optimal allocation algorithm based on Improved Elephant Herd Optimization (IEHO) is proposed where a truthful payment scheme is admitted by output function which satisfies voluntary participation. Good performance is exhibited by proposed approach as indicated in experimentation results.
APA, Harvard, Vancouver, ISO, and other styles
49

Strumberger, Ivana, Milan Tuba, Nebojsa Bacanin, and Eva Tuba. "Cloudlet Scheduling by Hybridized Monarch Butterfly Optimization Algorithm." Journal of Sensor and Actuator Networks 8, no. 3 (2019): 44. http://dx.doi.org/10.3390/jsan8030044.

Full text
Abstract:
Cloud computing technology enables efficient utilization of available physical resources through the virtualization where different clients share the same underlying physical hardware infrastructure. By utilizing the cloud computing concept, distributed, scalable and elastic computing resources are provided to the end-users over high speed computer networks (the Internet). Cloudlet scheduling that has a significant impact on the overall cloud system performance represents one of the most important challenges in this domain. In this paper, we introduce implementations of the original and hybridized monarch butterfly optimization algorithm that belongs to the category of swarm intelligence metaheuristics, adapted for tackling the cloudlet scheduling problem. The hybridized monarch butterfly optimization approach, as well as adaptations of any monarch butterfly optimization version for the cloudlet scheduling problem, could not be found in the literature survey. Both algorithms were implemented within the environment of the CloudSim platform. The proposed hybridized version of the monarch butterfly optimization algorithm was first tested on standard benchmark functions and, after that, the simulations for the cloudlet scheduling problem were performed using artificial and real data sets. Based on the obtained simulation results and the comparative analysis with six other state-of-the-art metaheuristics and heuristics, under the same experimental conditions and tested on the same problem instances, a hybridized version of the monarch butterfly optimization algorithm proved its potential for tackling the cloudlet scheduling problem. It has been established that the proposed hybridized implementation is superior to the original one, and also that the task scheduling problem in cloud environments can be more efficiently solved by using such an algorithm with positive implications to the cloud management.
APA, Harvard, Vancouver, ISO, and other styles
50

Sood, Sandeep K. "A Value Based Dynamic Resource Provisioning Model in Cloud." International Journal of Cloud Applications and Computing 3, no. 1 (2013): 1–12. http://dx.doi.org/10.4018/ijcac.2013010101.

Full text
Abstract:
Cloud computing has become an innovative computing paradigm, which aims at providing reliable, customized, Quality of Service (QoS) and guaranteed computing infrastructures for users. Efficient resource provisioning is required in cloud for effective resource utilization. For resource provisioning, cloud provides virtualized computing resources that are dynamically scalable. This property of cloud differentiates it from the traditional computing paradigm. But the initialization of a new virtual instance causes a several minutes delay in the hardware resource allocation. Furthermore, cloud provides a fault tolerant service to its clients using the virtualization. But, in order to attain higher resource utilization over this technology, a technique or a strategy is needed using which virtual machines can be deployed over physical machines by predicting its need in advance so that the delay can be avoided. To address these issues, a value based prediction model in this paper is proposed for resource provisioning in which a resource manager is used for dynamically allocating or releasing a virtual machine depending upon the resource usage rate. In order to know the recent resource usage rate, the resource manager uses sliding window to analyze the resource usage rate and to predict the system behavior in advance. By predicting the resource requirements in advance, a lot of processing time can be saved. Earlier, a server has to perform all the calculations regarding the resource usage that in turn wastes a lot of processing power thus decreasing its overall capacity to handle the incoming request. The main feature of the proposed model is that a lot of load is being shifted from the individual server to the resource manager as it performs all the calculations and therefore the server is free to handle the incoming requests to its full capacity.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!