Performance Evaluation and Cost Optimal Service Quality Prediction of Cloud Computing Systems in Unreliable Environments

Author(s):  
Xijia Wang ◽  
Yunni Xia
2016 ◽  
Vol 4 (1) ◽  
pp. 73-76 ◽  
Author(s):  
Hamed Rezaei ◽  
◽  
Behdad Karimi ◽  
Seyed Jamalodin Hosseini ◽  
◽  
...  

2017 ◽  
Vol 13 (08) ◽  
pp. 121 ◽  
Author(s):  
Jie Xiong ◽  
Shen-Han Shi ◽  
Song Zhang

Scientific computing requires a huge amount of computing resources, but not all the scientific researchers have an access to sufficient high-end computing systems. Currently, Amazon provides a free tier account for cloud computing which could be used to build a virtual cluster. In order to investigate whether it is suitable for scientific computing, we first describe how to build a free virtual cluster using StarCluster on Amazon Elastic Compute Cloud (EC2). Then, we perform a comprehensive performance evaluation of the virtual cluster built before. The results show that a free virtual cluster is easily built on Amazon EC2 and it is suitable for the basic scientific computing. It is especially valuable for scientific researchers, who do not have any HPC or cluster, to develop and test their prototype system of scientific computing without paying anything, and move it to a higher performance virtual cluster when necessary by choosing more powerful instance on Amazon EC2.


Open Physics ◽  
2019 ◽  
Vol 17 (1) ◽  
pp. 128-134 ◽  
Author(s):  
Wei Ma ◽  
Huanqin Li ◽  
Deden Witarsyah

Abstract Separation is the primary consideration in cloud computing security. A series of security and safety problems would arise if a separation mechanism is not deployed appropriately, thus affecting the confidence of cloud end-users. In this paper, together with characteristics of cloud computing, the separation issue in cloud computing has been analyzed from the perspective of information flow. The process of information flow in cloud computing systems is formalized to propose corresponding separation rules. These rules have been verified in this paper and it is shown that the rules conform to non-interference security, thus ensuring the security and practicability of the proposed rules.


2021 ◽  
Vol 39 ◽  
pp. 100366
Author(s):  
Leila Helali ◽  
Mohamed Nazih Omri

Sign in / Sign up

Export Citation Format

Share Document