Cloud Computing Virtualization: A Comprehensive Survey

Author(s):  
Amarildo Rista ◽  
Jaumin Ajdari ◽  
Xhemal Zenuni
2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Kai Peng ◽  
Victor C. M. Leung ◽  
Xiaolong Xu ◽  
Lixin Zheng ◽  
Jiabin Wang ◽  
...  

Mobile cloud computing (MCC) integrates cloud computing (CC) into mobile networks, prolonging the battery life of the mobile users (MUs). However, this mode may cause significant execution delay. To address the delay issue, a new mode known as mobile edge computing (MEC) has been proposed. MEC provides computing and storage service for the edge of network, which enables MUs to execute applications efficiently and meet the delay requirements. In this paper, we present a comprehensive survey of the MEC research from the perspective of service adoption and provision. We first describe the overview of MEC, including the definition, architecture, and service of MEC. After that we review the existing MUs-oriented service adoption of MEC, i.e., offloading. More specifically, the study on offloading is divided into two key taxonomies: computation offloading and data offloading. In addition, each of them is further divided into single MU offloading scheme and multi-MU offloading scheme. Then we survey edge server- (ES-) oriented service provision, including technical indicators, ES placement, and resource allocation. In addition, other issues like applications on MEC and open issues are investigated. Finally, we conclude the paper.


2019 ◽  
pp. 446-458
Author(s):  
Arun Fera M. ◽  
M. Saravanapriya ◽  
J. John Shiny

Cloud computing is one of the most vital technology which becomes part and parcel of corporate life. It is considered to be one of the most emerging technology which serves for various applications. Generally these Cloud computing systems provide a various data storage services which highly reduces the complexity of users. we mainly focus on addressing in providing confidentiality to users' data. We are proposing one mechanism for addressing this issue. Since software level security has vulnerabilities in addressing the solution to our problem we are dealing with providing hardware level of security. We are focusing on Trusted Platform Module (TPM) which is a chip in computer that is used for secure storage that is mainly used to deal with authentication problem. TPM which when used provides a trustworthy environment to the users. A detailed survey on various existing TPM related security and its implementations is carried out in our research work.


Author(s):  
Syrine Sahmim Ep Guerbouj ◽  
Hamza Gharsellaoui ◽  
Sadok Bouamama

This journal article deals with the most important existing problems of security and privacy of the Cloud Computing (CC), Internet of Things (IoT) and Cloud of Things (CoT) concepts especially confidentiality issues. With the evolution of ubiquitous computing, everything is connected everywhere, therefore these concepts have been widely studied in the literature. However, due to the systems complexity and the difficulty to control each access attempt, intrusions and vulnerabilities will be more recurrent. To tackle this issue, researchers have been focused on various approaches enforcing security and privacy. In the present article, risk factors and solutions regarding these technologies are reviewed then current and future trends are discussed.


Author(s):  
Anitha R ◽  
C Vidya Raj

Cloud Computing has achieved immense popularity due to its unmatched benefits and characteristics. With its increasing popularity and round the clock demand, cloud based data centers often suffer with problems due to over-usage of resources or under-usage of capable servers that ultimately leads to wastage of energy and overall elevated cost of operation. Virtualization plays a key role in providing cost effective solution to service users. But on datacenters, load balancing and scheduling techniques remain inevitable to provide better Quality of Service to the service users and maintenance of energy efficient operations in datacenters. Energy-Aware resource allocation and job scheduling mechanisms in VMs has helped datacenter providers to reduce their cost incurrence through predictive job scheduling and load balancing. But it is quite difficult for any SLA oriented systems to maintain equilibrium between QoS and cost incurrence while considering their legal assurance of quality, as there should not be any violations in their service agreement. This paper presents some state-of-the-art works by various researchers and experts in the arena of cloud computing systems and particularly emphasizes on energy aware resource allocations, job scheduling techniques, load balancing and price prediction methods. Comparisons are made to demonstrate usefulness of the mechanisms in different scenarios.


Author(s):  
Sriperambuduri Vinay Kumar ◽  
◽  
M. Nagaratna ◽  

Cloud computing model has evolved to deliver resources on pay per use model to businesses, service providers and end-users. Workflow scheduling has become one of the research trends in cloud computing as many applications in scientific, business, and big data processing can be expressed in the form of a workflow. The scheduling aims to execute scientific or synthetic workloads on the cloud by utilizing the resources by meeting QoS requirements, makespan, energy and cost. There has been extensive research in this area to schedule workflow applications in a distributed environment, to execute background tasks in IoT applications, event-driven and web applications. This paper focuses on the comprehensive survey and classification of workflow scheduling algorithms designed for the cloud.


Sign in / Sign up

Export Citation Format

Share Document