storage virtualization
Recently Published Documents


TOTAL DOCUMENTS

83
(FIVE YEARS 7)

H-INDEX

6
(FIVE YEARS 0)

Author(s):  
O.T Jinadu ◽  
O.V. Johnson ◽  
M. Ganiyu

Many issues associated with managing centralized database include data isolation, redundancy, inconsistency, and atomicity of updates, among others; however, distributed database implementation over high-performance compute nodes maximizes information value across the networks. Also, analysis of bigdata generated/consumed over the mobile Internet, Internet of Things (IoT) and cloud computations necessitates low-latency reads and updates over cloud clusters. Conventionally, services in distributed systems demand optimized transactions. This paper examines transaction generation over distributed storage pool using suggested reference architectures of fragmentation using hybrid semi-join operations to offer mobility transparency as an additional ingredient of integrity transparency offer of DDBMS. Distributed storage pool is simulated using configured WLAN to activate multiple file transfers concurrently, engaging mobile nodes and large file sizes. Major functionality desired in the storage pool is improvised by storage virtualization whereby a global schema query optimizer effects transaction management to characterized latency-driven throughputs achieved by joint optimization of network and storage virtualization. Measurements and evaluations gave the best overall performance of low-latency reads and updates using the provisioned mobile-transmission control protocol (M-TCP). Appreciable improvement in service delivery is offered using distributed storage pool (DSP) facilitated with hybridized RAID construction and copy mechanisms. Improved response-time and speed-up transmissions evidently showed low-latency read and update transactions, depicting improved service delivery. Evaluating the DDBMS model simulated in the DSP architecture, all complexity (overheads) associated with conventional shared systems were minimized.


2020 ◽  
Author(s):  
Irin Anna Solomon ◽  
Praveen Mor ◽  
Tanupriya Choudhury ◽  
Sonia Chhabra

2020 ◽  
pp. 1-1
Author(s):  
Ming Yang ◽  
Bo Peng ◽  
Jianguo Yao ◽  
Haibing Guan

Data centers are progressively being re-intended for workload combination with a specific end goal to receive the rewards of better resource usage, control cost, and physical space investment cost. Among the strengths driving costs are server and storage virtualization innovations. A key understanding is that there is a more noteworthy cooperative energy between the two layers of storage and server virtualization to be application piece sharing data than was beforehand thought conceivable. In this segment, we display ERMF, a platform that is intended to have MapReduce applications in virtualized cost. ERMF gives a bunch file framework that backings a uniform record framework namespace over the group by coordinating the discrete nearby storage of the individual hubs. Our paper proposes ERMF accommodates the two data and VM resource assignment with contending requirements, for example, storage usage, changing CPU load and system connect limits. ERMF utilizes a stream arrange based calculation that can improve MapReduce performance under the predetermined limitations by starting situation, as well as by straightening out through VM and data relocation also. Moreover, ERMF uncovered, generally shrouded, bring down level topology data to the MapReduce work scheduler with the goal that it makes close ideal task scheduling.


Cloud computing is the theoretical basis for future computing. All the global frameworks are now looking up to architecture which is purely based on cloud. Being the core of such a large web of network, it is important to consider the security aspects in a cloud based computing environment. This has resulted in a new research trend on the security issues of cloud. Cloud is a popular paradigm with extreme abilities and benefits for trending ICT environment. On the other end the major concern came in terms of security and privacy while adopting the cloud technology. This article is an effort to cover the challenges in fields like storage, virtualization and communication in cloud .Also it is a try to elaborate relevance of current cryptographic approach in order to increase security of cloud in ICT.


SinkrOn ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 67-72
Author(s):  
Didik Sudyana ◽  
Reza Tanujiwa Putra ◽  
Soni Soni

Server virtualization technology has experienced significant development so that more and more industries are adopting this technology. By using server virtualization, the industry can make savings in purchasing new servers and maintenance because virtualization allows one server to run with multiple operating systems at once. The high level of use of virtualization raises a gap for the occurrence of computer crimes involving virtualization. When computer crimes occur on virtualization, it is necessary to conduct digital forensic investigations to find useful clues in solving crime cases. Therefore, in this study a digital forensic investigation was conducted on Proxmox server virtualization by acquiring the entire storage virtualization media and carrying out checks on the results of the acquisition. Based on the investigation carried out, the acquisition technique by acquiring the entire storage media on Proxmox cannot be used because the structure of the evidence files and folders cannot be read perfectly


2018 ◽  
Vol 7 (2.21) ◽  
pp. 345
Author(s):  
U V. Anbazhagu ◽  
P Maheshwaran ◽  
K S. Archana ◽  
Sheela Gowr

The aim of this research is to study and enhance the applications of most profitable technology in cloud computing ever "Virtualization". Back then, a 15 years before, nobody knows about the technology named cloud computing exists. But now, every technology such as personal computer, mobile phone, tablet PC, even televisions rely on cloud computing. Cloud computing helps greatly in reducing costs, scalability and flexibility in computer services. Virtualization is the technology that helps cloud computing to emerge in a large profitable level. Using virtualization (such as server, network and storage virtualization technologies), the resource cost is reduced in great level. 


2018 ◽  
pp. 1251-1271
Author(s):  
Eric Kuada

The discussion of security and trust issues in this book chapter will follow from the discussions on the role of virtualization in cloud computing and hence the impact that the various categories of virtualization such as server virtualization, network virtualization, storage virtualization, and application virtualization have on the security and trust issues in cloud computing. It will be evident from these discussions that virtualization introduces a number of security and risk related challenges in cloud computing based on the three security objectives of confidentiality, integrity, and availability; and the two main other related security objectives of authenticity and accountability of information systems that were adopted for this discussion. It was however also noted that if the necessary recommended best practices of virtualizations are faithfully adhered to, then virtualization can actually lead to improvement or enhancement in the security posture of cloud environments.


Sign in / Sign up

Export Citation Format

Share Document