Mechanism design for robust resource management to false report in cloud computing systems

Author(s):  
Yusuke Aoki ◽  
Takafumi Kanazawa ◽  
Toshimitsu Ushio
Author(s):  
Kapil Tarey

Abstract: Cloud computing refers to a computer environment in which traditional software systems, installations, and licensing concerns are replaced with comprehensive on demand," pay as you need" internet based services. In this scenario, many cloud customers can request multiple cloud resources at the same time. As a result, there should be a plan in place to ensure that resources must be prepared for the needy customer in proficient way in order complete their needs. In cloud computing systems, resource management is a critical and difficult issue. It must meet numerous service quality requirements and, as a result, reduce SLA violations. This paper survey different resource management technique for cloud infrastructures. Keywords: Cloud, Resource management and techniques


2018 ◽  
Vol 10 (9) ◽  
pp. 90 ◽  
Author(s):  
Aaqif Abbasi ◽  
Hai Jin

Cloud computing systems are popular in computing industry for their ease of use and wide range of applications. These systems offer services that can be used over the Internet. Due to their wide popularity and usage, cloud computing systems and their services often face issues resource management related challenges. In this paper, we present v-Mapper, a resource consolidation scheme which implements network resource management concepts through software-defined networking (SDN) control features. The paper makes three major contributions: (1) We propose a virtual machine (VM) placement scheme that can effectively mitigate the VM placement issues for data-intensive applications; (2) We propose a validation scheme that will ensure that a cloud service is entertained only if there are sufficient resources available for its execution and (3) We present a scheduling policy that aims to eliminate network load constraints. We tested our scheme with other techniques in terms of average task processing time, service delay and bandwidth usage. Our results demonstrate that v-Mapper outperforms other techniques and delivers significant improvement in system’s performance.


Open Physics ◽  
2019 ◽  
Vol 17 (1) ◽  
pp. 128-134 ◽  
Author(s):  
Wei Ma ◽  
Huanqin Li ◽  
Deden Witarsyah

Abstract Separation is the primary consideration in cloud computing security. A series of security and safety problems would arise if a separation mechanism is not deployed appropriately, thus affecting the confidence of cloud end-users. In this paper, together with characteristics of cloud computing, the separation issue in cloud computing has been analyzed from the perspective of information flow. The process of information flow in cloud computing systems is formalized to propose corresponding separation rules. These rules have been verified in this paper and it is shown that the rules conform to non-interference security, thus ensuring the security and practicability of the proposed rules.


2021 ◽  
Vol 39 ◽  
pp. 100366
Author(s):  
Leila Helali ◽  
Mohamed Nazih Omri

Sign in / Sign up

Export Citation Format

Share Document