Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Engineering

Infrastructure-As-Code: Automating The Deployment On Aws Using Terraform, Srikar Pratap Apr 2023

Infrastructure-As-Code: Automating The Deployment On Aws Using Terraform, Srikar Pratap

Culminating Experience Projects

In my master’s project, I used Terraform to create a scalable infrastructure on Amazon Web Services (AWS) for my personal website. Terraform is an open-source infrastructure-as-code (IAC) tool that allows you to create, manage and provision infrastructure resources, such as virtual machines, storage accounts, networks, and more, across multiple cloud providers and on-premises data centers using a declarative configuration language. A scalable infrastructure is important because it enables a system or application to handle increasing amounts of traffic or workload without experiencing performance issues or downtime. It ensures that the system remains responsive, available, and reliable as an organization grows …


Cost-Efficient Resource Provisioning For Cloud-Enabled Schedulers, Lurdh Pradeep Reddy Ambati Oct 2021

Cost-Efficient Resource Provisioning For Cloud-Enabled Schedulers, Lurdh Pradeep Reddy Ambati

Doctoral Dissertations

Since the last decade, public cloud platforms are rapidly becoming de-facto computing platform for our society. To support the wide range of users and their diverse applications, public cloud platforms started to offer the same VMs under many purchasing options that differ across their cost, performance, availability, and time commitments. Popular purchasing options include on-demand, reserved, and transient VM types. Reserved VMs require long time commitments, whereas users can acquire and release the on-demand (and transient) VMs at any time. While transient VMs cost significantly less than on-demand VMs, platforms may revoke them at any time. In general, the stronger …


Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam Jan 2020

Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam

Theses and Dissertations--Computer Science

Security and fault tolerance are the two major areas in cloud computing systems that need careful attention for its widespread deployment. Unlike supercomputers, cloud clusters are mostly built on low cost, unreliable, commodity hardware. Therefore, large-scale cloud systems often suffer from performance degradation, service outages, and sometimes node and application failures. On the other hand, the multi-tenant shared architecture, dynamism, heterogeneity, and openness of cloud computing make it susceptible to various security threats and vulnerabilities. In this dissertation, we analyze these problems and propose algorithms for achieving fault tolerance and ensuring security in cloud computing systems.

First, we perform a …


Applications Of Fog Computing In Video Streaming, Kyle Smith May 2019

Applications Of Fog Computing In Video Streaming, Kyle Smith

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster …


Automatic Resource Management And Performance Optimization In Clusters, Yudi Wei Jan 2019

Automatic Resource Management And Performance Optimization In Clusters, Yudi Wei

Wayne State University Dissertations

Virtual machine is a primary way to increase resource utilizations in data centers by encapsulating multi-resource demands for applications and providing performance isolation. Moreover, the resource configuration can change on the fly to satisfy performance target. Container is another popular way for fine-grained multi-resource allocation. In this disser- tation work, we aim to design and implement an automatic resource management system to improve application performance, optimize system efficiency and job completion times in virtual and physical clusters respectively.

For large-scale applications hosted in data center, automatic resource configuration is crucial to service availability and quality. The workload dynamics, cloud dynamics …


Data-Driven Intelligent Scheduling For Long Running Workloads In Large-Scale Datacenters, Guoyao Xu Jan 2019

Data-Driven Intelligent Scheduling For Long Running Workloads In Large-Scale Datacenters, Guoyao Xu

Wayne State University Dissertations

Cloud computing is becoming a fundamental facility of society today. Large-scale public or private cloud datacenters spreading millions of servers, as a warehouse-scale computer, are supporting most business of Fortune-500 companies and serving billions of users around the world. Unfortunately, modern industry-wide average datacenter utilization is as low as 6% to 12%. Low utilization not only negatively impacts operational and capital components of cost efficiency, but also becomes the scaling bottleneck due to the limits of electricity delivered by nearby utility. It is critical and challenge to improve multi-resource efficiency for global datacenters.

Additionally, with the great commercial success of …


Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma Oct 2018

Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma

Doctoral Dissertations

Modern distributed server applications are hosted on enterprise or cloud data centers that provide computing, storage, and networking capabilities to these applications. These applications are built using the implicit assumption that the underlying servers will be stable and normally available, barring for occasional faults. In many emerging scenarios, however, data centers and clouds only provide transient, rather than continuous, availability of their servers. Transiency in modern distributed systems arises in many contexts, such as green data centers powered using renewable intermittent sources, and cloud platforms that provide lower-cost transient servers which can be unilaterally revoked by the cloud operator. Transient …


Optimization And Management Techniques For Geo-Distributed Sdn-Enabled Cloud Datacenters' Provisioning, Khaled M. Alhazmi Aug 2018

Optimization And Management Techniques For Geo-Distributed Sdn-Enabled Cloud Datacenters' Provisioning, Khaled M. Alhazmi

Electronic Thesis and Dissertation Repository

Cloud computing has become a business reality that impacts technology users around the world. It has become a cornerstone for emerging technologies and an enabler of future Internet services as it provides on-demand IT services delivery via geographically distributed data centers. At the core of cloud computing, virtualization technology has played a crucial role by allowing resource sharing, which in turn allows cloud service providers to offer computing services without discrepancies in platform compatibility.

At the same time, a trend has emerged in which enterprises are adopting a software-based network infrastructure with paradigms, such as software-defined networking, gaining further attention …


The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz Jan 2018

The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz

Open Access Theses & Dissertations

Computation offloading consists in allowing resource constrained computers, such as smartphones and other mobile devices, to use the network for the remote execution of resource intensive computing tasks in powerful computers. However, deciding whether to offload or not is not a trivial problem, and it depends in several variables related to the environment conditions, the computing devices involved in the process, and the nature of the task to be remotely executed. Furthermore, it comprises the optimal solution to some questions, like how to partition the application and where to execute the tasks.

The computation offloading decision problem has been widely …


Mpart: Miss Ratio Curve Guided Partitioning In Key-Value Stores, Daniel Byrne Jan 2018

Mpart: Miss Ratio Curve Guided Partitioning In Key-Value Stores, Daniel Byrne

Dissertations, Master's Theses and Master's Reports

Web applications employ key-value stores to cache the data that is most commonly accessed. The cache improves an web application’s performance by serving its requests from memory, avoiding fetching them from the backend database. Since the memory space is limited, maximizing the memory utilization is a key to delivering the best performance possible. This has lead to the use of multi-tenant systems, allowing applications to share cache space. In addition, application data access patterns change over time, so the system should be adaptive in its memory allocation. In this thesis, we address both multi-tenancy (where a single cache is used …


Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto Jan 2018

Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto

Electronic Theses and Dissertations

The Internet of Things (IoT) refers to the field of connecting devices consumers use every day to the internet. As the world relies on more and more internet-driven technological devices to control functions within the home, issues with compatibility of those devices are surfacing. This research was created to establish the need for standardization of IoT devices within the home.


Analysis Of Outsourcing Data To The Cloud Using Autonomous Key Generation, Mortada Abdulwahed Aman Jan 2017

Analysis Of Outsourcing Data To The Cloud Using Autonomous Key Generation, Mortada Abdulwahed Aman

Masters Theses

"Cloud computing, a technology that enables users to store and manage their data at a low cost and high availability, has been emerging for the past few decades because of the many services it provides. One of the many services cloud computing provides to its users is data storage. The majority of the users of this service are still concerned to outsource their data due to the integrity and confidentiality issues, as well as performance and cost issues, that come along with it. These issues make it necessary to encrypt data prior to outsourcing it to the cloud. However, encrypting …


Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh Jul 2016

Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh

Electronic Thesis and Dissertation Repository

With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on …


Optimizing Virtual Machine I/O Performance In Cloud Environments, Tao Lu Jan 2016

Optimizing Virtual Machine I/O Performance In Cloud Environments, Tao Lu

Theses and Dissertations

Maintaining closeness between data sources and data consumers is crucial for workload I/O performance. In cloud environments, this kind of closeness can be violated by system administrative events and storage architecture barriers. VM migration events are frequent in cloud environments. VM migration changes VM runtime inter-connection or cache contexts, significantly degrading VM I/O performance. Virtualization is the backbone of cloud platforms. I/O virtualization adds additional hops to workload data access path, prolonging I/O latencies. I/O virtualization overheads cap the throughput of high-speed storage devices and imposes high CPU utilizations and energy consumptions to cloud infrastructures. To maintain the closeness between …


An Analysis Of The Technological, Organizational, And Environmental Factors Influencing Cloud Adoption, Joe Malak Jan 2016

An Analysis Of The Technological, Organizational, And Environmental Factors Influencing Cloud Adoption, Joe Malak

Walden Dissertations and Doctoral Studies

Cloud computing provides an answer to the increasing costs of managing information technology (IT), and has become a model that aligns IT services with an organization's business strategies. However, concerns and uncertainties associated with cloud computing are deterring IT decision makers from making sound decisions regarding the adoption of the technology. The purpose of this online survey study was to examine the relationship between relative advantage, compatibility, organizational size, top management support, organizational readiness, mimetic pressure, normative pressures, coercive pressure, and the IT decision makers' intent to adopt cloud computing. The theoretical framework incorporated the diffusion of innovations theory, a …


Security Protocol Suite For Preventing Cloud-Based Denial-Of-Service Attacks, Marwan M. Darwish Dec 2015

Security Protocol Suite For Preventing Cloud-Based Denial-Of-Service Attacks, Marwan M. Darwish

Electronic Thesis and Dissertation Repository

Cloud systems, also known as cloud services, are among the primary solutions of the information technology domain. Cloud services are accessed through an identity authentication process. These authentication processes have become increasingly vulnerable to adversaries who may perform denial-of-service (DoS) attacks to make cloud services inaccessible. Several strong authentication protocols have been employed to protect conventional network systems. Nevertheless, they can cause a DoS threat when implemented in the cloud-computing system. This is because the comprehensive verification process may exhaust the cloud resources and shut down cloud’s services. This thesis proposes a novel cloud-based secure authentication (CSA) protocol suite that …


Computation Offloading Decisions For Reducing Completion Time, Salvador Melendez Jan 2015

Computation Offloading Decisions For Reducing Completion Time, Salvador Melendez

Open Access Theses & Dissertations

Mobile devices are being widely used in many applications such as image processing, computer vision (e.g. face detection and recognition), wearable computing, language translation, and battlefield operations. However, mobile devices are constrained in terms of their battery life, processor performance, storage capacity, and network bandwidth. To overcome these issues, there is an approach called Computation Offloading, also known as cyber-foraging and surrogate computing. Computation offloading consists of migrating computational jobs from a mobile device to more powerful remote computing resources. Upon completion of the job, the results are sent back to the mobile device. However, a decision must be made; …


A Process Framework For Managing Quality Of Service In Private Cloud, Arvind Maskara Aug 2014

A Process Framework For Managing Quality Of Service In Private Cloud, Arvind Maskara

Walden Dissertations and Doctoral Studies

As information systems leaders tap into the global market of cloud computing-based services, they struggle to maintain consistent application performance due to lack of a process framework for managing quality of service (QoS) in the cloud. Guided by the disruptive innovation theory, the purpose of this case study was to identify a process framework for meeting the QoS requirements of private cloud service users. Private cloud implementation was explored by selecting an organization in California through purposeful sampling. Information was gathered by interviewing 23 information technology (IT) professionals, a mix of frontline engineers, managers, and leaders involved in the implementation …


Disaster Data Management In Cloud Environments, Katarina Grolinger Dec 2013

Disaster Data Management In Cloud Environments, Katarina Grolinger

Electronic Thesis and Dissertation Repository

Facilitating decision-making in a vital discipline such as disaster management requires information gathering, sharing, and integration on a global scale and across governments, industries, communities, and academia. A large quantity of immensely heterogeneous disaster-related data is available; however, current data management solutions offer few or no integration capabilities and limited potential for collaboration. Moreover, recent advances in cloud computing, Big Data, and NoSQL have opened the door for new solutions in disaster data management.

In this thesis, a Knowledge as a Service (KaaS) framework is proposed for disaster cloud data management (Disaster-CDM) with the objectives of 1) facilitating information gathering …


Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola Sep 2013

Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola

Electronic Thesis and Dissertation Repository

With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …


Abstraction Driven Application And Data Portability In Cloud Computing, Ajith Harshana Ranabahu Jan 2012

Abstraction Driven Application And Data Portability In Cloud Computing, Ajith Harshana Ranabahu

Browse all Theses and Dissertations

Cloud computing has changed the way organizations create, manage, and evolve their applications. While many organizations are eager to use the cloud, tempted by substantial cost savings and convenience, the implications of using clouds are still not well understood. One of the major concerns in cloud adoption is the vendor lock-in of applications, caused by the heterogeneity of the numerous cloud service offerings. Vendor locked applications are difficult, if not impossible to port from one cloud system to another, forcing cloud service consumers to use undesired or suboptimal solutions. This dissertation investigates a complete and comprehensive solution to address the …


A Domain Specific Language Based Approach For Developing Complex Cloud Computing Applications, Ashwin Kumar Manjunatha Jan 2011

A Domain Specific Language Based Approach For Developing Complex Cloud Computing Applications, Ashwin Kumar Manjunatha

Browse all Theses and Dissertations

Computing has changed. Lately, a slew of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as you go computing resources has become available at the disposal of the common man. The latter commonly called Cloud Computing (or just Cloud) is democratizing computing by making large computing power accessible to people and corporations around the world easily and economically.

However, taking full advantage of this computing landscape, especially for the data intensive domains, has been hampered by many factors, the primary one being the complexity in developing applications for the variety of available platforms.

This thesis …