scholarly journals An Elastic Scaling Method for Cloud Security

Author(s):  
Áine MacDermott ◽  
Qi Shi ◽  
Madjid Merabti ◽  
Kashif Kifayat
2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Chunmao Jiang ◽  
Peng Wu

The container scaling mechanism, or elastic scaling, means the cluster can be dynamically adjusted based on the workload. As a typical container orchestration tool in cloud computing, Horizontal Pod Autoscaler (HPA) automatically adjusts the number of pods in a replication controller, deployment, replication set, or stateful set based on observed CPU utilization. There are several concerns with the current HPA technology. The first concern is that it can easily lead to untimely scaling and insufficient scaling for burst traffic. The second is that the antijitter mechanism of HPA may cause an inadequate number of onetime scale-outs and, thus, the inability to satisfy subsequent service requests. The third concern is that the fixed data sampling time means that the time interval for data reporting is the same for average and high loads, leading to untimely and insufficient scaling at high load times. In this study, we propose a Double Threshold Horizontal Pod Autoscaler (DHPA) algorithm, which fine-grained divides the scale of events into three categories: scale-out, no scale, and scale-in. And then, on the scaling strength, we also employ two thresholds that are further subdivided into no scaling (antijitter), regular scaling, and fast scaling for each of the three cases. The DHPA algorithm determines the scaling strategy using the average of the growth rates of CPU utilization, and thus, different scheduling policies are adopted. We compare the DHPA with the HPA algorithm under different loads, including low, medium, and high. The experiments show that the DHPA algorithm has better antijitter and antiload characteristics in container increase and reduction while ensuring service and cluster security.


Author(s):  
Snehal S. Rajole ◽  
J. V. Shinde

In this paper we proposed unique technique which is adaptive to noisy images for eye gaze detection as processing noisy sclera images captured at-a-distance and on-the-move has not been extensively investigated. Sclera blood vessels have been investigated recently as an efficient biometric trait. Capturing part of the eye with a normal camera using visible-wavelength images rather than near infrared images has provoked research interest. This technique involves sclera template rotation alignment and a distance scaling method to minimize the error rates when noisy eye images are captured at-a-distance and on-the move. The proposed system is tested and results are generated by extensive simulation in java.


Author(s):  
Tiejun Jia ◽  
Ximing Xiao ◽  
Fujie Zhang ◽  
Zhaohong Feng

2019 ◽  
Vol 7 (2) ◽  
pp. 342-348
Author(s):  
Vaishali Singh ◽  
Kavita Bhatia ◽  
S. K. Pandey

2018 ◽  
Vol 6 (5) ◽  
pp. 473-478
Author(s):  
K. K. Chauhan ◽  
◽  
◽  
A. K. S. Sanger

2014 ◽  
Vol 1 (1) ◽  
pp. 1-5
Author(s):  
Poonam Rawat ◽  
◽  
Neha Rawat ◽  
Shikha Singh ◽  
Awantika . ◽  
...  

Author(s):  
Linda Mora Siregar

The purpose of this study is to design a performance appraisal model more effectively in accordance with the company's vision and mission, namely by combining management methods based on objectives (management by objective) and graph scaling methods. In the preparation of performance appraisal models with management methods based on objectives (management by objective) and graph scaling methods, carried out with several stages, namely the first stage is planning the making of performance appraisal models, the second is job analysis, third is the preparation of management methods based on objectives (management by objective), the fourth is the preparation of the scaling method and the fifth is the preparation of the performance appraisal form. The making of this performance appraisal design will use a questionnaire method, observation and also interviews to obtain and collect information and data.  Keywords: Performance Appraisal, Management Methods, Graph Scaling.   Tujuan penelitian ini adalah untuk merancang model penilaian kinerja secara lebih efektif sesuai dengan visi dan misi perusahaan, yaitu dengan menggabungkan metode manajemen berdasarkan sasaran (management by objective) dan metode penskalaan grafik. Dalam penyusunan model penilaian kinerja dengan metode manajemen berdasarkan sasaran (management by objective) dan metode penskalaan grafik, dilakukan dengan beberapa tahapan yaitu tahap pertama adalah perencanaan pembuatan model penilaian kinerja, kedua analisis jabatan, ketiga penyusunan metode manajemen berdasarkan sasaran (management by objective), keempat penyusunan metode penskalaan grafik dan kelima adalah penyusunan formulir penilaian kinerja. Pembuatan rancangan penilaian kinerja ini akan menggunakan metode kuesioner, observasi dan juga wawancara untuk mendapatkan dan mengumpulkan informasi dan data.   Kata Kunci: Penilaian kinerja, Metode Manajemen, Penskalaan Grafik.


Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


Sign in / Sign up

Export Citation Format

Share Document