scholarly journals Structure of CloudSim Toolkit with Cloud

Cloud computing is a worldview and works on huge scale with circulated registering, that is a repackage of currently using different ideas/advances, for example, utility processing, Grid figuring, Autonomic figuring, IoT innovations, etc. Cloud computing works on the IoT innovations for conveyance the assets to clients on the basis of their interests. As, it creates innovation, different type of issues, for example, encryption, vitality the executives, asset provisioning, dependability should be tended. The goal of said work is to think about the reenactment toolbox is known as CloudSim and a portion of exploration which already addressed the previous issues and utilizing its toolbox. Main portion of the examinations after analysis depend on reproduction in Cloud and utilizing genuine frameworks on the cloud, for example, Amazon EC2, Google, which cost with tedious assignments and furthermore enormous of cloud assets. That requires for accomplish practical outcomes and unreasonable for further analysts. This paper surveys some reenactment apparatuses and thinks about them as far as their hidden structure, programming language, GUI, accessibility, cost demonstrating, vitality displaying, reproduction time, league strategy and its respective communication model

2014 ◽  
Author(s):  
Maicon Alves ◽  
Lúcia Maria Drummond

A computação em nuvem (cloud computing) é considerada como um novo paradigma de computação distribuída em que os clientes podem acessar recursos diretamente da Internet. Estudos recentes avaliam o uso dos recursos providos pela nuvem para executar aplicações científicas que demandam alto poder computacional. Neste sentido, este trabalho apresenta uma análise de desempenho de um simulador de reservatórios de petróleo a fim de avaliar o comportamento de tal aplicação científica em um ambiente de computação em nuvem provido pelas plataformas Amazon EC2 e Microsoft Azure. Essa análise leva em conta a observação de métricas do sistema operacional e a execução de benchmarks específicos. Os resultados mostram que o overhead de virtualização e o compartilhamento de recursos causam um descréscimo significativo de desempenho em tais aplicações.


2013 ◽  
Vol 5 (5) ◽  
pp. 35-44 ◽  
Author(s):  
Azzam Sleit ◽  
Nada Misk ◽  
Fatima Badwan ◽  
Tawfiq Khalil
Keyword(s):  

The consequent deployment of vital infrastructure to provide the secure communication and virtualization not only rectifies the challenges and difficulties but also benefits with saving the process of digitization. With a bang in evolution of cloud computing the uniqueness of every organization affects the virtualization of its information communication technology and applications. The answer for such organizations is to stipulate the precise cloud computing model equivalent to the deliberated and operational goals. This research article emphasized at budding and optimizing a framework for virtual infrastructure and cloud computing model to support the organization stakeholders. Moreover it also improves the cloud security with a protected virtual infrastructure and communication model with better performance. On account of data storage security necessities and distinctiveness of cloud computing environment, a method for secured data & storage based on dynamic allocation and access control mechanism is presented. Dynamic resource allocation is applied for resource utilization that focused on data virtualization and memory virtualization, for protection and access control a modified KPABE algorithm is integrated. The combination of these methods resulting on the optimize resource use, centralizing of storage. The implementation and comparison of results revealed that the proposed modified KP-ABE has performed effectively than the other security standards and especially for resource utilization. The proposed method serves for efficient data storage, access control solutions and computation in cloud environment


2021 ◽  
Author(s):  
Fengyin Li ◽  
Yanli Wang ◽  
Hongwei Ju ◽  
Xinying Yu ◽  
Zhaojie Wang ◽  
...  

Abstract With increasing application of cloud computing and big data technologies, a large amount of personal information is stored on the Internet, which raises the issue of privacy leakage.To protect people's data privacy, this paper firstly presents a new anonymous Identify-Based Encryption (IBE) scheme and gives the proof of its security under the Bilinear Diffie-Hellman Security Assumption. Then, by introducing the anonymous IBE scheme into anonymous communication fields, this paper introduces a new lightweight anonymous communication model for cloud computing, which guarantees the anonymity of system users and the security of messages in small groups. Our analysis shows that, the proposed communication model cannot only reduce memory consumption and improve message transmission efficiency, but also effectively resist traffic-analysis attacks, node eavesdropping, and finally achieve secure anonymous communication in cloud computing.


2017 ◽  
Vol 13 (08) ◽  
pp. 121 ◽  
Author(s):  
Jie Xiong ◽  
Shen-Han Shi ◽  
Song Zhang

Scientific computing requires a huge amount of computing resources, but not all the scientific researchers have an access to sufficient high-end computing systems. Currently, Amazon provides a free tier account for cloud computing which could be used to build a virtual cluster. In order to investigate whether it is suitable for scientific computing, we first describe how to build a free virtual cluster using StarCluster on Amazon Elastic Compute Cloud (EC2). Then, we perform a comprehensive performance evaluation of the virtual cluster built before. The results show that a free virtual cluster is easily built on Amazon EC2 and it is suitable for the basic scientific computing. It is especially valuable for scientific researchers, who do not have any HPC or cluster, to develop and test their prototype system of scientific computing without paying anything, and move it to a higher performance virtual cluster when necessary by choosing more powerful instance on Amazon EC2.


Author(s):  
Fengyin Li ◽  
Yanli Wang ◽  
Hongwei Ju ◽  
Xinying Yu ◽  
Zhaojie Wang ◽  
...  

AbstractWith increasing application of cloud computing and big data technologies, a large amount of personal information is stored on the Internet, which raises the issue of privacy leakage. To protect people’s data privacy, this paper firstly presents a new anonymous Identify-Based Encryption (IBE) scheme and gives the proof of its security under the Bilinear Diffie–Hellman Security Assumption. Then, by introducing the anonymous IBE scheme into anonymous communication fields, this paper introduces a new lightweight anonymous communication model for cloud computing, which guarantees the anonymity of system users and the security of messages in small groups. Our analysis shows that, the proposed communication model cannot only reduce memory consumption and improve message transmission efficiency, but also effectively resist traffic-analysis attacks, node eavesdropping, and finally achieve secure anonymous communication in cloud computing.


2013 ◽  
Vol 717 ◽  
pp. 688-695
Author(s):  
Sultan Ullah ◽  
Xue Feng Zheng ◽  
Feng Zhou

Cloud computing is presently being paid much attention as a way of distribution and sharing out of information. Similarly, as latest experience illustrates, the unspecified, open environment of this technology presents more or less an idealistic environment for the augmented unauthentic communication. The issue of having trust in cloud computing is a main apprehension for the majority of computing industry. Presently, the important contents for research in cloud computing is to evaluate the trust and behavior based computing. The uncertainty of cloud nodes, the services and resources cloud provide may have a negative effect on the execution of cloud tasks. This makes it very difficult for the cloud node to interact effectively and increase the chances of transaction failures. The authors proposed a model, and design an algorithm of trust which is based on the social model of reputation and trust. The algorithm calculates the trust degree of a node before any communication take place between the nodes. This reduces the chances of failure and increase communication efficiency.


2019 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Jauharul Mafakhiri

Intisari— Permasalahan pada penelitian ini adalah mengenai pengujian virtual machine di tingkat fungsionalitas aplikasi pada lingkungan komputasi awan di antara dua cloud provider IaaS (Infrastructure as a Service). Tujuan dari pengujian fungsionalitas ini adalah untuk mengetahui tingkat interoperabilitas aplikasi dalam sistem virtual machine yang berpindah dari sebuah cloud provider ke cloud provider lain, yaitu migrasi dari Amazon EC2 ke VMWARE. Peneliti memiliki ketertarikan mengenai pengujian migrasi ini sebab perkembangan Internet menjadi semakin pesat, dan diiringi dengan meningkatnya jumlah aplikasi yang memanfaatkan teknologi komputasi awan itu, sementara kemampuan proses bisnis suatu aplikasi semakin bertambah, fitur layanan yang ditawarkan para pihak cloud provider menjadi semakin baik (dari sisi harga menjadi lebih murah, performansi sistem menjadi lebih tinggi, sistem menjadi lebih handal, pemanfaatan kecanggihan teknologi security terbaru, maupun Service Level Agreement (SLA) menjadi lebih baik), maka memungkinkan untuk berpindah layanan ke cloud provider lain, namun di sisi praktik sering terjadi kegagalan fungsionalitas aplikasi dalam proses migrasi ke sistem cloud yang lain, yang antara lain disebabkan oleh masalah ketergantungan terhadap penyedia layanan komputasi awan (vendor lock-in). Masalah ketergantungan ini muncul disebabkan oleh jumlah cloud provider semakin bertanbah banyak dan mempunyai standar tersendiri dalam pembangunan sistemnya, sehingga dapat mengakibatkan kemampuan migrasi antar cloud itu dapat memiliki keterbatasan untuk hal-hal tertentu. Dengan 28 test case pengujian atas fitur-fitur pada aplikasi website ujian online yang diuji pada penelitian ini, diperoleh hasil tingkat interoperabilitas migrasi dari Amazon EC2 ke VMWARE memiliki nilai sebesar 46.43%. Kata kunci— pengujian, fungsionalitas, komputasi, awan, migrasi, interoperabilitas.


2017 ◽  
Vol 29 (3) ◽  
Author(s):  
Dylan Gregory Smith ◽  
George Wells

The Java programming language provides a comprehensive set of multithreading programming techniques but currently lacks interprocess communication (IPC) facilities, other than slow socket-based communication mechanisms (which are intended primarily for distributed systems, not interprocess communication on a multicore or multiprocessor system). This is problematic due to the ubiquity of modern multicore processors, and the widespread use of Java as a programming language throughout the software development industry. This work aimed to address this problem by utilising Microsoft Windows’ native IPC mechanisms through a framework known as the Java Native Interface. This enabled the use of native C code that invoked the IPC mechanisms provided by Windows, which allowed successful synchronous communication between separate Java processes. The results obtained illustrate the performance dichotomy between socket-based communication and native IPC facilities, with Windows’ facilities providing significantly faster communication. Ultimately, these results show that there are far more effective communication structures available. In addition, this work presents generic considerations that may aid in the eventual design of a generic, platform-independent IPC system for the Java programming language. The fundamental considerations include shared memory with semaphore synchronisation, named pipes and a socket communication model.


Sign in / Sign up

Export Citation Format

Share Document