Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

PDF

Cloud Computing

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 49

Full-Text Articles in Entire DC Network

Infrastructure-As-Code: Automating The Deployment On Aws Using Terraform, Srikar Pratap Apr 2023

Infrastructure-As-Code: Automating The Deployment On Aws Using Terraform, Srikar Pratap

Culminating Experience Projects

In my master’s project, I used Terraform to create a scalable infrastructure on Amazon Web Services (AWS) for my personal website. Terraform is an open-source infrastructure-as-code (IAC) tool that allows you to create, manage and provision infrastructure resources, such as virtual machines, storage accounts, networks, and more, across multiple cloud providers and on-premises data centers using a declarative configuration language. A scalable infrastructure is important because it enables a system or application to handle increasing amounts of traffic or workload without experiencing performance issues or downtime. It ensures that the system remains responsive, available, and reliable as an organization grows …


Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban Jan 2023

Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban

Future Computing and Informatics Journal

Cloud computing is rapidly expanding because it allows users to save the development and implementation time on their work. It also reduces the maintenance and operational costs of the used systems. Furthermore, it enables the elastic use of any resource rather than estimating workload, which may be inaccurate, as database systems can benefit from such a trend. In this paper, we propose an algorithm that allocates the materialized view over cloud-based replica sets to enhance the database system's performance in stock market using a Peer-to-Peer architecture. The results show that the proposed model improves the query processing time and network …


Cost-Efficient Resource Provisioning For Cloud-Enabled Schedulers, Lurdh Pradeep Reddy Ambati Oct 2021

Cost-Efficient Resource Provisioning For Cloud-Enabled Schedulers, Lurdh Pradeep Reddy Ambati

Doctoral Dissertations

Since the last decade, public cloud platforms are rapidly becoming de-facto computing platform for our society. To support the wide range of users and their diverse applications, public cloud platforms started to offer the same VMs under many purchasing options that differ across their cost, performance, availability, and time commitments. Popular purchasing options include on-demand, reserved, and transient VM types. Reserved VMs require long time commitments, whereas users can acquire and release the on-demand (and transient) VMs at any time. While transient VMs cost significantly less than on-demand VMs, platforms may revoke them at any time. In general, the stronger …


The Impact Of Cloud Computing On Academic Libraries, Sivankalai S Sep 2021

The Impact Of Cloud Computing On Academic Libraries, Sivankalai S

Library Philosophy and Practice (e-journal)

With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …


Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni Apr 2021

Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni

Library Philosophy and Practice (e-journal)

Background: This study aims to analyze the work done in domain of cloud computing and edge computing using artificial intelligence from 2015 to 2021. Recent research shows the bibliometric methods are useful for such kind of analysis. Thus in this paper analysis is carried out using the bibliometric methods.

Methods: different articles on edge computing and edge intelligence were retrieved using one of the most popular database- Scopus. The research articles are considered between 2015 to 2021. Scopus analyzer is used for getting some analysis results such as documents by year, source, country and so on. VOSviewer Version 1.6.16 is …


Digital Twin-Based Cooperative Control Techniques For Secure And Intelligent Operation Of Distributed Microgrids, Ahmed Aly Saad Ahmed Mar 2021

Digital Twin-Based Cooperative Control Techniques For Secure And Intelligent Operation Of Distributed Microgrids, Ahmed Aly Saad Ahmed

FIU Electronic Theses and Dissertations

Networked microgrids play a key role in constructing future active distribution networks for providing the power system with resiliency and reliability against catastrophic physical and cyber incidents. Motivated by the increasing penetration of renewable resources and energy storage systems in the distribution grids, utility companies are encouraged to unleash the capabilities of the distributed microgrid to work as virtual power plants that can support the power systems. The microgrids nature is transforming the grid and their control systems from centralized architecture into distributed architectures. The distributed networked microgrids introduced many benefits to the future smart grids, it created many challenges …


Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes Mar 2020

Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes

FIU Electronic Theses and Dissertations

Metagenomics is the study of the combined genetic material found in microbiome samples, and it serves as an instrument for studying microbial communities, their biodiversities, and the relationships to their host environments. Creating, interpreting, and understanding microbial community profiles produced from microbiome samples is a challenging task as it requires large computational resources along with innovative techniques to process and analyze datasets that can contain terabytes of information.

The community profiles are critical because they provide information about what microorganisms are present in the sample, and in what proportions. This is particularly important as many human diseases and environmental disasters …


Does The Age Of An It Executive Impact Adoption Levels Of Cloud Computing Services?, Marcus L. Smith Mar 2020

Does The Age Of An It Executive Impact Adoption Levels Of Cloud Computing Services?, Marcus L. Smith

Faculty Publications

This author researched previously the personal decision factors considered by information technology (IT) executives when making the cloud computing services adoptionchoice. The conclusions in that work (Smith, Jr., 2016) supported four hypotheses, namely, (a) advancement, recognition and satisfaction from accomplishments, (b) top management support, (c) diminishment of personal image, and (d) a pattern of technology readiness have a positive influence on business intentions to adopt cloud computing services. Interestingly, a fifth hypothesis, diminishment of personal image, was found to have a negative influence on business intentions. The relationship between age of the survey respondents and adoption levels was highlighted in …


Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam Jan 2020

Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam

Theses and Dissertations--Computer Science

Security and fault tolerance are the two major areas in cloud computing systems that need careful attention for its widespread deployment. Unlike supercomputers, cloud clusters are mostly built on low cost, unreliable, commodity hardware. Therefore, large-scale cloud systems often suffer from performance degradation, service outages, and sometimes node and application failures. On the other hand, the multi-tenant shared architecture, dynamism, heterogeneity, and openness of cloud computing make it susceptible to various security threats and vulnerabilities. In this dissertation, we analyze these problems and propose algorithms for achieving fault tolerance and ensuring security in cloud computing systems.

First, we perform a …


Applications Of Fog Computing In Video Streaming, Kyle Smith May 2019

Applications Of Fog Computing In Video Streaming, Kyle Smith

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster …


Automatic Resource Management And Performance Optimization In Clusters, Yudi Wei Jan 2019

Automatic Resource Management And Performance Optimization In Clusters, Yudi Wei

Wayne State University Dissertations

Virtual machine is a primary way to increase resource utilizations in data centers by encapsulating multi-resource demands for applications and providing performance isolation. Moreover, the resource configuration can change on the fly to satisfy performance target. Container is another popular way for fine-grained multi-resource allocation. In this disser- tation work, we aim to design and implement an automatic resource management system to improve application performance, optimize system efficiency and job completion times in virtual and physical clusters respectively.

For large-scale applications hosted in data center, automatic resource configuration is crucial to service availability and quality. The workload dynamics, cloud dynamics …


Data-Driven Intelligent Scheduling For Long Running Workloads In Large-Scale Datacenters, Guoyao Xu Jan 2019

Data-Driven Intelligent Scheduling For Long Running Workloads In Large-Scale Datacenters, Guoyao Xu

Wayne State University Dissertations

Cloud computing is becoming a fundamental facility of society today. Large-scale public or private cloud datacenters spreading millions of servers, as a warehouse-scale computer, are supporting most business of Fortune-500 companies and serving billions of users around the world. Unfortunately, modern industry-wide average datacenter utilization is as low as 6% to 12%. Low utilization not only negatively impacts operational and capital components of cost efficiency, but also becomes the scaling bottleneck due to the limits of electricity delivered by nearby utility. It is critical and challenge to improve multi-resource efficiency for global datacenters.

Additionally, with the great commercial success of …


Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez Jan 2019

Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez

International Journal of Aviation, Aeronautics, and Aerospace

The constant demands that technology creates in aerospace engineering also influence education. The identification of the technologies with practical application in aerospace engineering is of current interest to decision makers in both universities and industry. A social network approach enhances this scoping review of the research literature to identify the main topics using the Big Five technologies in aerospace engineering education. The conceptual structure of the dataset (n=447) was analyzed from different approaches: at macro-level, a comparative of the digital technology identified by cluster analysis with the number of co-words established in 3 and 8 and, a keyword central structure …


Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell Dec 2018

Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell

Conference papers

Energy-efficient, fair, stochastic leader-selection algorithms are designed for mobile sensing scenarios which adapt the sensing strategy depending on the mobile sensing topology. Methods for electing a cluster head are crucially important when optimizing the trade-off between the number of peer-to- peer interactions between mobiles and client-server interactions with a cloud-hosted application server. The battery-life of mobile devices is a crucial constraint facing application developers who are looking to use the convergence of mobile computing and cloud computing to perform environmental sensing. We exploit the mobile network topology, specifically the location of mobiles with respect to the gateway device, to stochastically …


Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma Oct 2018

Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma

Doctoral Dissertations

Modern distributed server applications are hosted on enterprise or cloud data centers that provide computing, storage, and networking capabilities to these applications. These applications are built using the implicit assumption that the underlying servers will be stable and normally available, barring for occasional faults. In many emerging scenarios, however, data centers and clouds only provide transient, rather than continuous, availability of their servers. Transiency in modern distributed systems arises in many contexts, such as green data centers powered using renewable intermittent sources, and cloud platforms that provide lower-cost transient servers which can be unilaterally revoked by the cloud operator. Transient …


Optimization And Management Techniques For Geo-Distributed Sdn-Enabled Cloud Datacenters' Provisioning, Khaled M. Alhazmi Aug 2018

Optimization And Management Techniques For Geo-Distributed Sdn-Enabled Cloud Datacenters' Provisioning, Khaled M. Alhazmi

Electronic Thesis and Dissertation Repository

Cloud computing has become a business reality that impacts technology users around the world. It has become a cornerstone for emerging technologies and an enabler of future Internet services as it provides on-demand IT services delivery via geographically distributed data centers. At the core of cloud computing, virtualization technology has played a crucial role by allowing resource sharing, which in turn allows cloud service providers to offer computing services without discrepancies in platform compatibility.

At the same time, a trend has emerged in which enterprises are adopting a software-based network infrastructure with paradigms, such as software-defined networking, gaining further attention …


The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz Jan 2018

The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz

Open Access Theses & Dissertations

Computation offloading consists in allowing resource constrained computers, such as smartphones and other mobile devices, to use the network for the remote execution of resource intensive computing tasks in powerful computers. However, deciding whether to offload or not is not a trivial problem, and it depends in several variables related to the environment conditions, the computing devices involved in the process, and the nature of the task to be remotely executed. Furthermore, it comprises the optimal solution to some questions, like how to partition the application and where to execute the tasks.

The computation offloading decision problem has been widely …


Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto Jan 2018

Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto

Electronic Theses and Dissertations

The Internet of Things (IoT) refers to the field of connecting devices consumers use every day to the internet. As the world relies on more and more internet-driven technological devices to control functions within the home, issues with compatibility of those devices are surfacing. This research was created to establish the need for standardization of IoT devices within the home.


Mpart: Miss Ratio Curve Guided Partitioning In Key-Value Stores, Daniel Byrne Jan 2018

Mpart: Miss Ratio Curve Guided Partitioning In Key-Value Stores, Daniel Byrne

Dissertations, Master's Theses and Master's Reports

Web applications employ key-value stores to cache the data that is most commonly accessed. The cache improves an web application’s performance by serving its requests from memory, avoiding fetching them from the backend database. Since the memory space is limited, maximizing the memory utilization is a key to delivering the best performance possible. This has lead to the use of multi-tenant systems, allowing applications to share cache space. In addition, application data access patterns change over time, so the system should be adaptive in its memory allocation. In this thesis, we address both multi-tenancy (where a single cache is used …


Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi Oct 2017

Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi

UBT International Conference

Cloud Computing seems to be the most promising technology of the century we are living. It provides a new manner of sharing distributed resources and services that may be part of different organizations, geographically located in different places and different time zones. Mobile Cloud Computing offers partially the same functionality, with the only additional requirement that, at least, some of the devices are mobile. In this paper, we will try to provide a detailed explanation of Mobile Cloud Computing concept by providing different examples, figures and charts showing usage, accessibility, pros and cons and comparison of different cloud platforms.


Comparison Study Of The Most Common Virtual Machine Load Balancing Algorithms In Large-Scale Cloud Environment Using Cloud Simulator, Rowaa Filimban Jan 2017

Comparison Study Of The Most Common Virtual Machine Load Balancing Algorithms In Large-Scale Cloud Environment Using Cloud Simulator, Rowaa Filimban

Dissertations

This is era of internet. There is barely any field where internet do not play important role. Nowadays, CloudComputing links to the internet that has rebelled the whole universe. CloudComputing is a rapid enlarging domain in computing industry and research. Three main services offered by the cloud are SaaS, PaaS and IaaS. With the technology advancement of the CloudComputing, there are many new chances pioneer on how applications can be developed and how several services can be provided to the end user throughout Virtualization, on the internet. What's more, there are cloud service providers who offer and provide large-scaled computing …


Analysis Of Outsourcing Data To The Cloud Using Autonomous Key Generation, Mortada Abdulwahed Aman Jan 2017

Analysis Of Outsourcing Data To The Cloud Using Autonomous Key Generation, Mortada Abdulwahed Aman

Masters Theses

"Cloud computing, a technology that enables users to store and manage their data at a low cost and high availability, has been emerging for the past few decades because of the many services it provides. One of the many services cloud computing provides to its users is data storage. The majority of the users of this service are still concerned to outsource their data due to the integrity and confidentiality issues, as well as performance and cost issues, that come along with it. These issues make it necessary to encrypt data prior to outsourcing it to the cloud. However, encrypting …


Accelerating Big Data Applications Using Lightweight Virtualization Framework On Enterprise Cloud, Janki Bhimani, Zhengyu Yang, Miriam Leeser, Ningfang Mi Dec 2016

Accelerating Big Data Applications Using Lightweight Virtualization Framework On Enterprise Cloud, Janki Bhimani, Zhengyu Yang, Miriam Leeser, Ningfang Mi

Zhengyu Yang

Hypervisor-based virtualization technology has been successfully used to deploy high-performance and scalable infrastructure for Hadoop, and now Spark applications. Container-based virtualization techniques are becoming an important option, which is increasingly used due to their lightweight operation and better scaling when compared to Virtual Machines (VM). With containerization techniques such as Docker becoming mature and promising better performance, we can use Docker to speed-up big data applications. However, as applications have different behaviors and resource requirements, before replacing traditional hypervisor-based virtual machines with Docker, it is important to analyze and compare performance of applications running in the cloud with VMs and …


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


Enhancing Mobile Cloud Computing Security Using Steganography, Hassan Reza, Madhuri Sonawane Jul 2016

Enhancing Mobile Cloud Computing Security Using Steganography, Hassan Reza, Madhuri Sonawane

Computer Science Faculty Publications

Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the network to the cloud. There are some security and privacy concerns using both mobile devices to offload data to the facilities provided by the cloud providers. One of the critical threats facing cloud users is the unauthorized access by the insiders (cloud administrators) or the justification of location where the cloud providers operating. Although, there exist variety of security mechanisms to prevent unauthorized access by unauthorized …


Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh Jul 2016

Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh

Electronic Thesis and Dissertation Repository

With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on …


On Optimizations Of Virtual Machine Live Storage Migration For The Cloud, Yaodong Yang Jul 2016

On Optimizations Of Virtual Machine Live Storage Migration For The Cloud, Yaodong Yang

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Virtual Machine (VM) live storage migration is widely performed in the data cen- ters of the Cloud, for the purposes of load balance, reliability, availability, hardware maintenance and system upgrade. It entails moving all the state information of the VM being migrated, including memory state, network state and storage state, from one physical server to another within the same data center or across different data centers. To minimize its performance impact, this migration process is required to be transparent to applications running within the migrating VM, meaning that ap- plications will keep running inside the VM as if there were …


Source Separation Approach To Video Quality Prediction In Computer Networks, Ruairí De Fréin May 2016

Source Separation Approach To Video Quality Prediction In Computer Networks, Ruairí De Fréin

Articles

Time-varying loads introduce errors in the estimated model parameters of service-level predictors in Computer Networks. A load-adjusted modification of a traditional unadjusted service-level predictor is contributed, based on Source Separation (SS). It mitigates these errors and improves service-quality predictions for Video-on-Demand (VoD) by :6 to 2dB.


Flash Caching For Cloud Computing Systems, Dulcardo Ariel Arteaga Clavijo Mar 2016

Flash Caching For Cloud Computing Systems, Dulcardo Ariel Arteaga Clavijo

FIU Electronic Theses and Dissertations

As the size of cloud systems and the number of hosted virtual machines (VMs) rapidly grow, the scalability of shared VM storage systems becomes a serious issue. Client-side flash-based caching has the potential to improve the performance of cloud VM storage by employing flash storage available on the VM hosts to exploit the locality inherent in VM IOs. However, there are several challenges to the effective use of flash caching in cloud systems. First, cache configurations such as size, write policy, metadata persistency and RAID level have significant impacts on flash caching. Second, the typical capacity of flash devices is …


An Analysis Of The Technological, Organizational, And Environmental Factors Influencing Cloud Adoption, Joe Malak Jan 2016

An Analysis Of The Technological, Organizational, And Environmental Factors Influencing Cloud Adoption, Joe Malak

Walden Dissertations and Doctoral Studies

Cloud computing provides an answer to the increasing costs of managing information technology (IT), and has become a model that aligns IT services with an organization's business strategies. However, concerns and uncertainties associated with cloud computing are deterring IT decision makers from making sound decisions regarding the adoption of the technology. The purpose of this online survey study was to examine the relationship between relative advantage, compatibility, organizational size, top management support, organizational readiness, mimetic pressure, normative pressures, coercive pressure, and the IT decision makers' intent to adopt cloud computing. The theoretical framework incorporated the diffusion of innovations theory, a …