Current Issue : April - June Volume : 2013 Issue Number : 2 Articles : 5 Articles
The development of cloud computing services is speeding up the rate in which the organizations outsource their\r\ncomputational services or sell their idle computational resources. Even though migrating to the cloud remains a\r\ntempting trend from a financial perspective, there are several other aspects that must be taken into account by\r\ncompanies before they decide to do so. One of the most important aspect refers to security: while some cloud\r\ncomputing security issues are inherited from the solutions adopted to create such services, many new security\r\nquestions that are particular to these solutions also arise, including those related to how the services are organized\r\nand which kind of service/data can be placed in the cloud. Aiming to give a better understanding of this complex\r\nscenario, in this article we identify and classify the main security concerns and solutions in cloud computing, and\r\npropose a taxonomy of security in cloud computing, giving an overview of the current status of security in this\r\nemerging technology....
Basically cloud service provider (CSP) give facility to access Software as a service (SaaS) applications hosted in public cloud to end users of particular organization, but to gain access to multiple application hosted in cloud environment will increase the risk of eavesdropping by entering sensitive data like username and password multiple times for each hosted application. Also cloud user need to remember the username and password. Now, somehow if we forget our credential, we have to remember specific details like security questions. This paper is describing how to insure against the risk of supporting a business model where there is a strong likelihood of a third party risk by proposing federation model with the use of claims based identity where we are providing one user credential, i.e., username and password and that will be sufficient to access all cloud oriented application....
In context-aware systems, the contextual information about human and computing situations has a strong temporal\r\naspect i.e. it remains valid for a period of time. This temporal property can be exploited in caching mechanisms that\r\naim to exploit such locality of reference. However, different types of contextual information have varying temporal\r\nvalidity durations and a varied spectrum of access frequencies as well. Such variation affects the suitability of a single\r\ncaching strategy and an ideal caching mechanism should utilize dynamic strategies based on the type of context\r\ndata, quality of service heuristics and access patterns and frequencies of context consuming applications. This paper\r\npresents an investigation into the utility of various context-caching strategies and proposes a novel bipartite caching\r\nmechanism in a Cloud-based context provisioning system. The results demonstrate the relative benefits of different\r\ncaching strategies under varying context usage scenarios. The utility of the bipartite context caching mechanism is\r\nestablished both through simulation and deployment in a Cloud platform...
A common approach in Infrastructure-as-a-Service Clouds or virtualized Grid computing is to provide virtual machines\r\nto customers to execute their software on remote resources. Giving full superuser permissions to customers eases the\r\ninstallation and use of user software, but it may lead to security issues. The providers usually delegate the task of\r\nkeeping virtual machines up to date to the customers, while the customers expect the providers to perform this task.\r\nConsequently, a large number of virtual machines (either running or dormant) are not patched against the latest\r\nsoftware vulnerabilities. The approach presented in this article deals with these problems by helping users as well as\r\nproviders to keep virtual machines up to date. Prior to the update step, it is crucial to know which software is actually\r\noutdated or affected by remote security vulnerabilities. While these tasks seem to be straightforward, developing a\r\nsolution that handles multiple software repositories from different vendors and identifies the correct packages is a\r\nchallenging task. The Update Checker presented in this article identifies outdated software packages in virtual\r\nmachines, regardless if the virtual machine is running or dormant on disk. The proposed Online Penetration Suite\r\nperforms pre-rollout scans of virtual machines for security vulnerabilities using established techniques and prevents\r\nexecution of flawed virtual machines. The article presents the design, the implementation and an experimental\r\nevaluation of the two components....
Energy conservation has become a critical issue in modern system electronic devices.\r\nEnergy wastage in electronic devices occurs in both hardware and software\r\ncomponents. Software drives the hardware thus decisions taken during software\r\ndesign and development have significant impact on energy consumption of a\r\ncomputing system. Green Computing addresses energy conservation by application\r\nof different techniques at software and hardware level. Energy efficient compiler is a\r\nsoftware level green computing technique. Besides compiler optimization, an\r\neffective scheduling approach makes efficient use of resources to directly impact the\r\ngreen aspect. Therefore, focus of this paper is identification of energy conservation\r\nmeasures for software level and there utilization at compiler and scheduler. A\r\nDistributed Green Compiler (DGC) is presented in this research that is hardware\r\nindependent and uses an existing distributed compiler. It distributes source code of\r\nsoftware over a network, reshapes binary code by applying green strategies during\r\ncode transformation at compile time and gives green suggestion to software\r\nprogrammer for energy conservation. For scheduling, Distributed Interactive\r\nEngineering Toolbox (DIET) scheduler is used and a new algorithm is proposed for\r\nthe DIET scheduler. The proposed algorithm introduces green aspect in scheduler to\r\neffectually make use of resources in such a way that consumption of power and\r\ncarbon dioxide emission is reduced. Performance analysis of proposed compiler\r\nshows that it conserves energy clock cycles up to 40% by applying few green\r\nstrategies....
Loading....