Dissertations / Theses on the topic 'Cloud computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cloud computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Lebedeva, A. O. "Cloud computing." Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/33692.
Full textBegic, Dina. "Cloud Computing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/5697/.
Full textMatteazzi, Piergiorgio <1969>. "Cloud computing." Master's Degree Thesis, Università Ca' Foscari Venezia, 2015. http://hdl.handle.net/10579/6952.
Full textGorelik, Eugene. "Cloud computing models." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/79811.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 79-80).
Information Technology has always been considered a major pain point of enterprise organizations, from the perspectives of both cost and management. However, the information technology industry has experienced a dramatic shift in the past decade - factors such as hardware commoditization, open-source software, virtualization, workforce globalization, and agile IT processes have supported the development of new technology and business models. Cloud computing now offers organizations more choices regarding how to run infrastructures, save costs, and delegate liabilities to third-party providers. It has become an integral part of technology and business models, and has forced businesses to adapt to new technology strategies. Accordingly, the demand for cloud computing has forced the development of new market offerings, representing various cloud service and delivery models. These models significantly expand the range of available options, and task organizations with dilemmas over which cloud computing model to employ. This thesis poses analysis of available cloud computing models and potential future cloud computing trends. Comparative analysis includes cloud services delivery (SaaS, PaaS, IaaS) and deployment models (private, public, and hybrid). Cloud computing paradigms are discussed in the context of technical, business, and human factors, analyzing how business and technology strategy could be impacted by the following aspects of cloud computing: --Architecture --Security --Costs --Hardware/software trends (commodity vs. brands, open vs. closed-source) --Organizational/human Factors To provide a systematic approach to the research presented in this paper, cloud taxonomy is introduced to classify and compare the available cloud service offerings. In particular, this thesis focuses on the services of a few major cloud providers. Amazon Web Services (AWS) will be used as a base in many examples because this cloud provider represents approximately 70% of the current public cloud services market. Amazon's AWS has become a cloud services trend-setter, and a reference point for other cloud service providers. The analysis of cloud computing models has shown that public cloud deployment model is likely to stay dominant and keep expanding further. Private and Hybrid deployment models are going to stay for years ahead but their market share is going to continuously drop. In the long-term private and Hybrid cloud models most probably will be used only for specific business cases. IaaS service delivery model is likely to keep losing market share to PaaS and SaaS models because companies realize more value and resource-savings from software and platform services rather than infrastructure. In the near future we can expect significant number of market consolidations with few large players retaining market control at the end.
by Eugene Gorelik.
S.M.in Engineering and Management
Sousa, Francisco Cordeiro de. "Mainroad: cloud computing." Master's thesis, NSBE - UNL, 2010. http://hdl.handle.net/10362/10316.
Full textImine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Full textThese last years, we are witnessing a real digital revolution of Internet where many innovative applications such as Internet of Things, autonomous cars, etc., have emerged. Consequently, adopting externalization technologies such as cloud and fog computing to handle this technological expansion seems to be an inevitable outcome. However, using the cloud or fog computing as a data repository opens many challenges in prospect. This thesis addresses security issues in cloud and fog computing which is a major challenge that need to be appropriately overcomed. Indeed, adopting these technologies means that the users lose control over their own data, which exposes it to several security threats. Therefore, we first investigated the main security issues facing the adoption of cloud and fog computing technologies. As one of the main challenges pointed in our investigation, access control is indeed a cornerstone of data security. An efficient access control mechanism must provide enforced and flexible access policies that ensure data protection, even from the service provider. Hence, we proposed a novel secure and efficient attribute based access control scheme for cloud data-storage applications. Our solution ensures flexible and fine-grained access control and prevents security degradations. Moreover, it performs immediate users and attributes revocation without any key regeneration. Authentication service in fog computing architecture is another issue that we have addressed in this thesis. Some traditional authentication schemes endure latency issues while others do not satisfy fog computing requirements such as mutual authentication between end-devices and fog servers. Thus, we have proposed a new, secure and efficient authentication scheme that ensures mutual authentication at the edge of the network and remedies to fog servers' misbehaviors.Finally, we tackled accountability and privacy-preserving challenges in information-sharing applications for which several proposals in the literature have treated privacy issues, but few of them have considered accountability service. Therefore, we have proposed a novel accountable privacy preserving solution for public information sharing in data externalization platforms. Externalization servers in our scheme authenticate any user in the system without violating its privacy. In case of misbehavior, our solution allows to trace malicious users thanks to an authority
Aliperti, Francesco. "Il Cloud Computing." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2595.
Full textAccording to the definition of National Institute of Standards and Technology (NIST) dell’U.S. Departement of Commerce, cloud computing consists of a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and service) that can be rapidely provisioned and released with minimal management effort or service provider interaction; a new form of storage and data processing on a virtual platform. The first chapter define the phenomenon, describing the models and typologies, highlighting the benefits and the risks, as well as the legal problems associated with it. In particular, as the data and their processing are the object of the services offered by the cloud system, it is of particular importance that those aspects of the protection of the personal data of cloud service users are clarified as necessary, preliminary, a policy of prevention, aimed at informing about the risks. These issues are highlighted by the Guarantor for the Protection of Personal Data, which, more than once, has intervened in order to encourage a conscious and correct use of the cloud system. In the second chapter, the right to privacy is investigated in the current context of technological evolution. Some fundamental judgments of European jurisprudence are reviewed (judgments: Lindqvist, Costeja, Scherms) on the protection of privacy in the internet, highlighting the points of contact and distance to the Italian one, with reference also to a recent judgment of the Spanish High Tribunal. It is noted, however, that in the diversity of solutions offered, conflict between the various interests at stake can only be solved by reason of their careful balancing. Looking back on its evolution, it is clear that the right in question (which has expanded its content by including the right to the protection of personal data), in the light of what the European Court of Justice has stated, is not absolute prerogative, but must be considered in the light of its social function. The following is a review of European Regulation 2016/679 (which will be directly applicable in all EU countries from 25 May 2018), as it represents the instrument for formalizing the new digital course for the protection of Personal data, at Community and non-EU level. In particular, they analyze the novelties it introduces and the archives on which it relies on the entire privacy system. It is also intended to specify the spatial scope of application, in the light of the criteria set out in Article 3 thereof. In the third chapter, focusing on the most significant aspect of the technology under discussion (the clear separation between data ownership and processing and possession and control of data), the research analyzes the topic of ‘processing’ personal data the light of the opinions of the Italian and European Regulatory Authority (Art. 29 Group) and, in particular, of the recent European Regulation 2016/679 and of the Code of Conduct, 26 September 2016 of the CISPE. The topic that inevitably interfere with cloud technology, especially today, in a context where the scope for sharing and personal data collection has increased significantly, allowing both private companies and public authorities to use personal data, such as in the pursuit of their activities. This also in view of the fact that cloud services allow to ‘process’ and ‘store’ data on server systems deployed in different parts of the planet, where it is necessary to verify the existence of an ‘adequate level of protection’ in order to ensure to the party concerned a ‘substantially equivalent’ protection to that guaranteed within the Union. To this end, the essential premise for which it is necessary to inform about the risks is to clarify, in the light of the provisions of the Privacy Policy 2016 and of the Code of Conduct, 26 September 2016 of CISPE, issues such as: roles and obligations between controller and processor; the informational omissions of the service provider and the user’s unknowingness; keeping data in cloud computing and transferring them to a ‘third country’ after the judgments of the Court of Justice; the question of the portability of their data on other Csp (problem of the c.d. ‘vendor lock-in’); the data breach notification and the data protection in the relationship between constumer and provider. [edited by Author]
XXIX n.s.
TAPANELLI, Pietro. "Cloud computing contracts." Doctoral thesis, Università degli Studi di Camerino, 2014. http://hdl.handle.net/11581/401831.
Full textGrahn, Cecilia, and Martin Sund. "Cloud computing - Moving to the cloud." Thesis, Högskolan Dalarna, Informatik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:du-12916.
Full textCloud computing involves the use of computer resources that are available through a network, usually the Internet and it is an area that has grown rapidly in recent years. More and more companies move entire or part of their operations to the cloud.Sogeti in Borlänge needs to move their development environments to a cloud service as operating and maintaining of these are costly and time-consuming. As a Microsoft Partner, Sogeti wants to use Microsoft´s services for cloud computing, Windows Azure, for this purpose. Migration to the cloud is a new area for Sogeti and they do not have any descriptions of how this process works.Our mission was to develop an approach for the migration of an IT-solution to the cloud. Part of the mission included the identifying of cloud computing, its components, benefits and drawbacks, which lead to us acquiring basic knowledge of the subject.To develop an approach to migration, we performed several migrations of virtual machines to Windows Azure, and based on these migrations, literature studies and interviews we drew conclusions that resulted in an overall approach for migration to the cloud.The results have shown that it is difficult to make a general but detailed description of an approach to migration, as the scenario looks different depending on what to migrate and what type of cloud service is used. However, based on our experiences from our migrations, along with literature, documents and interviews we have lifted our knowledge to a general level. From this knowledge, we have compiled a general approach with greater focus on the preparatory activities that an organization should implement before migration.Our studies also resulted in an in-depth description of cloud computing. In our studies we did not find previous works in which the critical success factors have been described in the context of cloud computing. In our empirical work, we identified three critical success factors for cloud computing and in doing so covered up some of the knowledge gap in between.
Gustafsson, Bennet, and Alexander Orrgren. "Cloud Computing : The Adoption of Cloud Computing for Small and Medium Enterprises." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18505.
Full textRylander, Andrea. "Cloud computing: Knowledge expectation and reality : Cloud computing: Knowledge expectation and reality." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-328483.
Full textCordone, Luigi. "L’evoluzione del Cloud Computing: Il Serverless Computing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textDatla, Dinesh. "Wireless Distributed Computing in Cloud Computing Networks." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/51729.
Full textPh. D.
McGilvary, Gary Andrew. "Ad hoc cloud computing." Thesis, University of Edinburgh, 2014. http://hdl.handle.net/1842/9652.
Full textPanteliuk, D., and V. Romaka. "Cloud Computing Security Issues." Thesis, Sumy State University, 2016. http://essuir.sumdu.edu.ua/handle/123456789/47275.
Full textGera, Amit. "Provisioning for Cloud Computing." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1293740673.
Full textLounis, Ahmed. "Security in cloud computing." Thesis, Compiègne, 2014. http://www.theses.fr/2014COMP1945/document.
Full textCloud computing has recently emerged as a new paradigm where resources of the computing infrastructures are provided as services over the Internet. However, this paradigm also brings many new challenges for data security and access control when business or organizations data is outsourced in the cloud, they are not within the same trusted domain as their traditional infrastructures. This thesis contributes to overcome the data security challenges and issues due to using the cloud for critical applications. Specially, we consider using cloud storage services for medical applications such as Electronic Health Record (EHR) systems and medical Wireless Sensor Networks. First, we discuss the benefits and challenges of using cloud services for healthcare applications. Then, we study security risks of the cloud, and give an overview on existing works. After that, we propose a secure and scalable cloud-based architecture for medical applications. In our solution, we develop a fine-grained access control in order to tackle the challenge of sensitive data security, complex and dynamic access policies. Finally, we propose a secure architecture for emergency management to meet the challenge of emergency access
Pistininzi, Alessio. "Cloud computing e affidabilità." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/4962/.
Full textLimone, Marilena. "Cloud computing; Risvolti normativi." Doctoral thesis, Universita degli studi di Salerno, 2015. http://hdl.handle.net/10556/1958.
Full textThe expression "cloud computing", in Italian “nuvola informatica”, indicates a complex range of technologies that allow, typically in the form service offered by a provider to the customer, to store, archive and / or process data, in most cases of a personal nature, thanks to the use of hardware and software resources distributed and virtualized on line. Cloud computing services are used in different ways and by different users: consumers, in general, use them for e-mail, for storing and sharing content and information of various kinds, for payment services but also for access to music and video streaming. Companies, however, employ cloud especially for office basic tools, collaboration and project management, especially romote, but also for the creation of custom applications. If we take account of the breadth of data that are placed on the network so we can understand how important the issue of their security and privacy protection for the users of these services is. First af all, fundamental appears ensure to the consumers a constant right to the active monitoring of the information entered in the network as well as a right to their subsequent modification or cancellation, if deemed appropriate. These rights are not always guaranteed, or, at least, not always meet, in the EU and extra EU laws, the same level of protection. [edited by Author]
XIII n.s.
SANTANGELO, LUIGI. "HPC and Cloud Computing." Doctoral thesis, Università degli studi di Pavia, 2020. http://hdl.handle.net/11571/1326029.
Full textUp to a few years ago, scientific applications were designed, developed and built to be executed just on high performance infrastructures or on-premise systems, which were, and are, able to guarantee high performance, reducing execution time and increasing application scalability. Since 2006, however, the traditional IT landscape has started to change. The birth of Cloud Computing brought along several opportunities for business users who started replacing their own on premise systems with the emerging cloud services. As time goes by, cloud infrastructures became soon more powerful, reliable, affordable and secure, conquering the interest of the scientific community. Despite the considerable amount of advantages which can be met relying on cloud computing, there are a lot of barriers which slow down the transition towards the emerging environment. One of the most relevant factors limiting the transition is the complexity of moving applications. Indeed, moving an application into the cloud is not effortless and might take a huge amount of time. Therefore, before starting to move an application into the cloud, it might be worth having in advance an idea about how the application will behave when run in a different infrastructure. It is then crucial, for researchers, to understand trade-offs, costs and benefits related to moving an application into the cloud. Indeed, applications which are able to run quickly on HPC systems, might perform worse when run on a different infrastructure, such as in the cloud. There are several factors limiting the performance of an application running in the cloud, such as the virtualized environment, the architecture of the physical CPU, the amount of RAM, and so on, but, as highlighted in many works, perhaps the most important factor limiting the performance of a large amount of scientific applications is the interconnection network. For communication-intensive applications, the network infrastructure may soon become a bottleneck, reducing performance and scalability. A rich set of different interconnection technologies (such as Infiniband, Intel Omni Path or Ethernet) have been developed to reduce the overhead introduced by the network layer and increase application scalability and performance. All these technologies are currently used in HPC systems. Indeed, according to the Top500 list (Top500 Release June 2018), 49.4% of the HPC systems use Gigabit Ethernet technology to interconnect nodes, 27.8% uses Infiniband, 7.8% uses Omni Path and the remaining 15% makes use of proprietary or custom interconnection networks. Cloud service providers try to keep in step with the HPC systems by studying and introducing new components in their interconnection model, making the cloud environment more attractive and promising even for running scientific applications, traditionally executed on HPC systems [A64A69]. This is also the case for many bioinformatics applications, and bio-scientists are thinking to move their parallel code to the cloud infrastructures. As this activity is not effortless and can take a huge amount of time, before moving an application to the new infrastructure, a deep analysis of the application and the new infrastructure layer should be done, in order to get insights about how the application will behave being run in the cloud and how it might be adapted in order to reduce the impact of the communication. It might be useful to know in advance the impact of the communication on the application, because this might help researchers to get hints and insights about how the application will perform on a different architecture and the economical cost for running such application on that architecture.
Jhawar, R. "DEPENDABILITY IN CLOUD COMPUTING." Doctoral thesis, Università degli Studi di Milano, 2014. http://hdl.handle.net/2434/233330.
Full textMalik, Sheheryar. "Resource aware Cloud Computing." Nice, 2012. http://www.theses.fr/2012NICE4067.
Full textMullins, Taariq. "Participatory Cloud Computing: The Community Cloud Management Protocol." Thesis, University of Cape Town, 2014. http://pubs.cs.uct.ac.za/archive/00000999/.
Full textPaladi, Nicolae. "Trusted Computing and Secure Virtualization in Cloud Computing." Thesis, Security Lab, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035.
Full textTESPEV
CNS
Lundberg, Emma, and Caroline Åkesson. "Cloud Computing - Factors that affect an adoption of cloud computing in traditional Swedish banks." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-255828.
Full textDoelitzscher, Frank. "Security audit compliance for cloud computing." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3005.
Full textSapkota, Sagar, and Khawar Shehzad. "Cloud Computing for Telecom Systems." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3068.
Full textAndersson, Mattias, and Christopher Ludvigsson. "Cloud Computing : Lärplattform i molnet." Thesis, Uppsala universitet, Institutionen för informatik och media, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-155080.
Full textThe growth of cloud computing has enabled the provision of computer resources online and offers two essential characteristics, illusion of infinite supply and pay-per-use. Learning management systems are currently used extensively by the Swedish universities as learning tools. This brings better opportunities for distance courses and e-learning. To combine cloud computing with a learning management system is now possible and should therefore give the schools benefits. If the Learning management system is hosted as a cloud service by an external provider, so should the requirements be different. The purpose of this paper is to investigate whether there are any incentives for rent a learning management system as a cloud service and also investigate if the requirements are different in a rented cloud service. A case study was conducted at Uppsala University and Dalarnas University, in order to compare a learning management system installed on their own server with a learning management system rented as a cloud service. The result of the study proves that there are advantages to rent a learning management system as a cloud services. In terms to the requirements, there are no great differences. An important requirement when the learning management system is hosted by a supplier is that there is a good dialogue and that the organization relies on the supplier.
Win, Thu Yein. "Virtualisation security in cloud computing." Thesis, Glasgow Caledonian University, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.726791.
Full textYang, Yichao. "Resource management for cloud computing." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.580579.
Full textEl, Rheddane Ahmed. "Elasticité dans le cloud computing." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GRENM003/document.
Full textReal world workloads are often dynamic. This makes the static scaling of resourcesfatally result in either the waste of resources, if it is based on the estimatedworst case scenario, or the degradation of performance if it is based on the averageworkload. Thanks to the cloud computing model, resources can be provisioned ondemand and scaling can be adapted to the variations of the workload thus achievingelasticity. However, after exploring the existing works, we find that most elasticityframeworks are too generic and fail to meet the specific needs of particularapplications. In this work, we use autonomic loops along with various elasticitytechniques in order to render different types of applications elastic, namelya consolidation service, message-oriented middleware and a stream processingplatform. These elastic solutions have been implemented based on open-sourceapplications and their evaluation shows that they enable resources’ economy withminimal overhead
VAZ, Rodrigo da Silva. "Simulação Distribuída em Cloud Computing." reponame:Repositório Institucional da UNIFEI, 2015. http://repositorio.unifei.edu.br:8080/xmlui/handle/123456789/238.
Full textMade available in DSpace on 2015-12-09T17:51:54Z (GMT). No. of bitstreams: 1 dissertacao_vaz_2015.pdf: 1026296 bytes, checksum: 8735ac7dda7e17d7362fa57ee18252ce (MD5) Previous issue date: 2015-11
A computaçãoo em nuvem é um recurso que está sendo cada vez mais utilizado, seja por programadores ou clientes de um software. Além dos serviços de software que estão migrando para essa plataforma, um programador também pode aproveitar os recursos de um provedor utilizando máquinas virtuais remotas, que podem ser alugadas e depois utilizadas por uma interface de navegador ou linha de comando. Como a simulação é utilizada em muitas áreas científicas, é importante adaptá-la à nuvem. Em simulações mais demoradas, é costume separar partes das simulações em processos independentes utilizando programação paralela, finalidade para qual protocolos como o Time Warp e o Rollback Solidário foram desenvolvidos. Infelizmente, a computação em nuvem tem a desvantagem de possuir diversas máquinas físicas e estrutura de rede sendo utilizados por diversos clientes diferentes com requerimentos diferentes, gerando uma grande instabilidade na rede, processamento e memória das máquinas virtuais. Além disso, com a adaptação de protocolos otimistas aos ambientes de nuvem pública, surge o problema do aumento da quantidade de rollbacks, que faz com que as simulações levem mais tempo para serem executadas. Como é demonstrado, já existem trabalhos que propuseram otimizações para o protocolo Time Warp, além de alguns tratando sobre o preço e a vantagem do ganho de desempenho e economia, quando se utiliza um ambiente de nuvem para aplicações científicas. Neste contexto, este trabalho apresenta uma solução, que possibilita que um programador consiga analisar, através de um simulador de computação em nuvem, todo o histórico de envio e recebimento de mensagens, assim como os atrasos envolvidos em relação à rede. Com esta solução, é possível propor otimizações nos protocolos de simulação, melhorando o seu desempenho e confiabilidade durante a execução neste tipo de arquitetura computacional. O simulador escolhido foi o NetworkCloudSim, onde foram feitas alterações para adaptá-lo a executar threads e para que o desempenho de rede fosse mais instável, se aproximando do caso real de serviços públicos de nuvem.
Крикавський, Є. В., І. В. Бойчук, and Н. Ю. Глинський. "Маркетинговий потенціал технології cloud computing." Thesis, ТОВ «ДД «Папірус», 2013. http://essuir.sumdu.edu.ua/handle/123456789/37388.
Full textPoulo, Lebeko Bernard Nkoebele. "Cloud computing for digital libraries." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/14036.
Full textLi, Min. "Privacy Protection on Cloud Computing." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3844.
Full textWan, Ziqi. "Scheduling Policies for Cloud Computing." Master's thesis, Temple University Libraries, 2015. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/328227.
Full textM.S.
Cloud computing focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users. This leads to task scheduling as a core and challenging issue in cloud computing. This thesis gives different scheduling strategies and algorithms in cloud computing. For a common cloud user, there is a great potential to boost the performance of mobile devices by offloading computation-intensive parts of mobile applications to the cloud. However, this potential is hindered by a gap between how individual mobile devices demand computational resources and how cloud providers offer them. In this thesis, we present the design of utility-based uploads sharing strategy in cloud scenarios, which bridges the above gap through providing computation offloading as a service to mobile devices. Our scheme efficiently manages cloud resources for offloading requests to improve offloading performances of mobile devices, as well as to reduce the monetary cost per request of the provider. However, from the viewpoint of data centers, resource limitations in both bandwidth and computing triggers a variety of resource management problems. In this thesis, we discuss the tradeoff between locality and load balancing, along with the multi-layer topology of data centers. After that, we investigate the interrelationship between the time cost and the virtual machine rent cost, and formalize it as the parallel speedup pattern. We then design several algorithms by adopting the idea of minimizing the utility cost. Furthermore, we focus on the detail of MapReduce framework in Cloud. For different MapReduce phases, there are different resource requirements. We propose a new scheduling algorithm based on the idea of combining map shuffle pairs, which has better performance than the popular min-max time first algorithm in minimizing the average makespan of tasks in the job matrix. Directions for future research mainly focus on the large scale implementation of our proposed solution. There are a wide variety of open questions remaining with respect to the design of algorithms to minimize response time. Further, it is interesting and important to understand how to schedule in order to minimize other performance metrics.
Temple University--Theses
Margaris, Nikos. "Cloud Computing v českém prostředí." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-72541.
Full textLukášová, Pavlína. "Cloud Computing jako nástroj BCM." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-75556.
Full textNěmec, Petr. "Cloud computing a jeho aplikace." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-112946.
Full textGleza, Jan. "Cloud computing v herním průmyslu." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-114054.
Full textŠíma, Josef. "Cloud computing ve firemním prostředí." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-264574.
Full textRasenti, Carla. "Cloud Computing su sistemi Linux." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3120/.
Full textFargo, Farah Emad. "Resilient Cloud Computing and Services." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/347137.
Full textTymeš, Radek. "Cloud computing - srovnání cloudových úložišť." Master's thesis, Česká zemědělská univerzita v Praze, 2017. http://www.nusl.cz/ntk/nusl-262809.
Full textSingh, Vivek Kumar. "Essays on Cloud Computing Analytics." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7943.
Full textBranderud, Anders. "Setting up of an OpenNebula-cloud for cloud computing." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-37242.
Full textZambrano, Jesus. "Mobile Cloud Computing: Offloading Mobile Processing to the Cloud." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/594.
Full textBalakrishnan, Suresh Reuben A/L. "Hybrid High Performance Computing (HPC) + Cloud for Scientific Computing." Thesis, Curtin University, 2022. http://hdl.handle.net/20.500.11937/89123.
Full textAldakheel, Eman A. "A Cloud Computing Framework for Computer Science Education." Bowling Green State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1322873621.
Full textBlakstad, Kåre Marius, and Mats Andreassen. "Security in Cloud Computing : A Security Assessment of Cloud Computing Providers for an Online Receipt Storage." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21041.
Full text