International Journal of Cloud Computing (12 papers in press)
Genetic and static algorithm for task scheduling in cloud computing
by Jocksam Gonçalves De Matos, Carlos Heitor Pereira Liberalino, Carla Katarina De Monteiro Marques
Abstract: Technological advancement has required ever more computing resources. In this context the cloud computing emerges as a newparadigm to meet this demand, though its resources are physically limited due to the growing data traffic that the system may be subject. The task scheduling aims to distribute tasks in order to make them more efficient in the use of computing resources. Thus, this paper aims to propose a solution to the task scheduling problem in cloud computing in order to reduce the processing time of the tasks and the number of virtual machines. This algorithm was designed from heuristic solution with the aid of a static algorithm. The proposed algorithm was mainly inspired by the set partitioning problem that aims to reduce the number of virtual machines. The metaheuristic genetic algorithm was used in the first stage of the algorithm, in order to reduce the processing time of the tasks. The static algorithm is designed to solve the set partitioning problem. Their performance was compared with two algorithms, classic and heuristic. The CloudSim, a computer simulator in the cloud that has characteristics and attributes of a real cloud was used as a way to evaluate the proposed algorithm, along with realistic workloads in experiments that showed the algorithms behavior under different conditions of use.
Keywords: distributed computing; cloud computing; scheduling; metaheuristic.
Review of Remote Data Integrity Auditing Schemes in Cloud Computing: Taxonomy, Analysis, and Open Issues
by JAYA R.A.O. GUDEME, Syam Kumar Pasupuleti, Ramesh Kandukuri
Abstract: Cloud storage provides reliable and resilient storage infrastructure for users to store data remotely based on pay-as-you-go pricing model. Presently, many data owners in academic and business environment are choosing cloud for storing their data in the cloud to save costs. Cloud storage provides many benefits to data owners such as low capital costs, scalability, and access of data from anywhere, anytime, irrespective of location and device. Despite these appealing benefits, storage service brings security challenges such as confidentiality, integrity and availability as outsourced data is not always trustworthy due to loss of physical control and possession over data. One of the primary concern is the integrity of data stored in the cloud. To address the remote data integrity, many researchers have focused on Remote Data Integrity Auditing (RDIA) techniques. In this paper, we give an extensive review of remote data integrity auditing techniques in the cloud computing. In our review, we present a thematic taxonomy of remote data integrity auditing techniques, investigate similarities and differences, and finally discuss critical issues to be addressed for efficient and secure designing of remote auditing protocols for cloud data storage in future research.
Keywords: Cloud computing; Cloud storage; Integrity; Remote data auditing; Provable Data Possession; PDP; Proof of Retrievability; PoR.
Adaptive and Intelligent framework of data protection techniques for cloud storage
by Kanimozhi Vedharajan
Abstract: Cloud Computing is the latest technology that revolutionize the mobile and Information Technology field. Mobile phone cloud application users are hesitating to move their information from their mobile to the cloud service supplier due to increasing information security and privacy concern. When People try to store a lot of files inside their storage, they need to check the storage limit. To reduce the storage size to minimum user need to use some compression technique. In the proposed technique the user original data is taken, in the original data watermarking technique is applied and then the data is compressed to reduce the storage size of the data. Then some secrete message is embedded with the image for the authentication of the data and these authenticated data is involved in security processes of Spector encryption. This encrypted data is divided into n pieces and each piece of data is going to be stored in a different storage location of the cloud. When any intruder wants to take the original data it is impossible because different location of the data pieces and encryption technology. When downloading the data from the cloud the data includes the reversed process of all and the original data is received. In the proposed technique, a mobile information security cryptography model and J-bit encoding (JBE) for data compression is planned to encounter this downside. The data compression algorithm will manipulates each bit of data inside file to minimize the size without losing any data after decoding which is classified to lossless compression. This basic algorithm is intended to be combining with other data compression algorithms to optimize the compression ratio. The performance of this algorithm is measured by comparing combination of different data compression algorithms. With the technical advancement in the mobile and cloud computing, an intelligent data protection technique using Spector encryption with J-bit compression technique is proposed for Mobile information Security.
Keywords: J-bit encoding; Spector Encryption; Mobile cloud computing; Watermarking; Data compression; Secret message embedding.
Special Issue on: ISCSA2017 Computer Sciences and Applications
A Hybrid Method for Improving Quality of Service (QoS) in Constraint-Based Availability in the Cloud for SMEs
by Alireza Nik Aein Koupaei
Abstract: Research in cloud computing has gone through rapid development duringrnthe last decade and has emerged as a key service of utility or on-demand computing. Small and medium-sized enterprises (SMEs) assure economic growth in the world. In the main, many SMEs are struggling to survive in an ongoing global recession and are often unwilling to use research results and new technologies for business and learning. Cloud computing provides many opportunities and could help companies expand and improve their business and use technology more resourcefully. The resource provision is an essentialrnperspective of cloud computing technology to provide the QoS (quality of service) in cloud computing. It is used as an alternative to SLA (Service Level Agreement). In this paper, we are going to present a new cloud hybrid method and architecture to improve, the QoS and Availability under the Cloud computing environment. Additionally, issues regarding the extent effect of cloud computing in SMEs have been highlighted. In conclusion, criticalrnfuture challenges in the area are addressed.
Keywords: Cloud Computing; SMEs; Availability; Service Level Agreement (SLA).
Special Issue on: ICA CON 2016 & 2017 A Collaborative Community of Leaders Cloud Computing in Education
Cloud-based Environment in Support of IoT Education
by Anand Singh, Yannis Viniotis
Abstract: Students taking an IoT curriculum need to acquire skills (among others) in areas as (a) developers of IoT applications, (b) architects of IoT systems, and, (c) administrators of such systems. At North Carolina State University, we have developed a cloud-based environment to support the development of such skills. The environment is based on IBMs Watson IoT Cloud Platform and uses components such as Intels Edison Boards, Raspberry Pis, Cisco IoT gateways, TI boards, sensors/actuators, and GitHub, to give students an end-to-end experience in all aspects of IoT solution and system development. In this paper, we discuss the challenges we faced, how we overcame them, feedback from students and plans for our next steps.
Keywords: IoT systems; Cloud platforms; Edge Computing; Curriculum development.
Extreme Value Analysis for Capacity Design
by Szilard Bozoki, Andras Pataricza
Abstract: Cloud computing has become the fundamental platform for service offerings. Such services frequently face peaks in their variable workload. Thus, the cloudification of critical applications with strict Service Level Agreements (e.g. performability) need a properly engineered capacity to withstand peak loads. A core problem is the prediction of the value of peaks, especially in bursty workloads. They originate in the cumulative effect of hard-to-predict rare and extreme events. Luckily, system monitoring collects enough vital information for a prediction by statistical methods. Extreme value analysis focuses on the prediction of future peaks.
This paper investigates the use of extreme value theory for capacity planning in cloud platforms and services and assesses the technical metrology aspects as well.
Keywords: cloud computing; performability engineering; capacity design; extreme value analysis; Facebook Prophet.
A Formal Model Toward ScientificWorkflow Security in the Cloud
by Donghoon Kim, Mladen Vouk
Abstract: Scientific workflow management systems (SWFMS) may be vulnerable in the Cloud since they may have not embraced practical security solutions yet. This paper presents an approach to formal modeling of scientific workflow security in the Cloud.We focus on the procedure to build secure data flows in a holistic way. This work suggests that a white-list approach to input validation can play a vital in protecting the flows from zero-day attacks.
Keywords: Formal method; security; workflow; security property; input validation; access control; cloud.
A tale of two cloud analytics platforms for education
by Gokul Bhandari
Abstract: In this paper, we compare, using the Gartners business analytics framework, the two most popular cloud analytics platforms currently being used in higher education: IBMs Watson Analytics (WA) and SAPs Lumira Cloud (LC). The Gartner framework enables one to examine an analytics platform from three broad perspectives: people, processes, and platform. Platform capabilities enable us to identify several functional modules which can be used to evaluate the tools perceived usefulness (PU) and perceived ease of use (PEU). Our empirical studies find that WA and LC are similar in terms of their PU and PEU.
Keywords: Cloud analytics; SAP Lumira Cloud; IBM Watson Analytics; Gartner analytics framework.
Why is Garbage Collection causing my Service Level Objectives to fail?
by Panagiotis Patros, Kenneth Kent, Michael Dawson
Abstract: Cloud computing abstracts resources and provides them as-a-Service
to its tenant clients. Platform as a service clouds, which are one of the main
types of cloud computing, provide large parts of the hardware/software stack
to their users. Cloud systems are expected to abide by certain Service Level
Objectives and maintain a certain Quality of Service, which can be impacted by
Garbage Collection (GC). However, cloud benchmarking is mostly focused in
the interconnectivity of cloud services and often neglects the inner workings of
language runtimes. In this paper, we present and evaluate CloudGC, a benchmark
aiming to stress the GC component of a runtime in various and controllable ways.
We then deploy our CloudGC on a cloud system to evaluate the SLO satisfaction
of the four GC policies of the IBM J9 Java runtime. Our findings indicate that the
default policy Gencon generally outperforms the other three policies, including
Balanced, the policy which aims in amortizing the costs.
Keywords: Cloud; Garbage Collection; Service Level Objectives; Benchmarking; Performance Interference; CloudGC.
A Framework for Achieving the Required Degree of Multitenancy Isolation for Deploying Components of a Cloud-hosted Service
by Laud Ochei, Andrei Petrovski, Julian Bass
Abstract: When a cloud offering is provided to multiple users/tenants, multitenancy isolation has to be implemented. While several approaches exist for implementing multitenancy, little attention has been paid to implementing the required degree of isolation since there are varying degrees of isolation that can be implemented for each tenant. This paper presents a framework for achieving the required degree of isolation between tenants accessing a cloud offering so that the required performance, resource utilization and access privilege of one tenant does not affect other tenants when there are workload changes. The framework is composed of two main constituents (i) Component-based approach to Multitenancy Isolation through Request Re-routing (COMITRE), (ii) an optimization model for providing optimal solutions for deploying components of a cloud-hosted service. We demonstrate using a case study of (i) a Cloud-hosted Bug Tracking System and (ii) a synthetic dataset, that the required degree of multitenancy isolation can be achieved, while at the same time providing optimal solutions for deploying components of a cloud-hosted service. We also provide challenges and recommendations for implementing the framework on different layers of the cloud stack.
Keywords: Multitenancy; Degree of Isolation; Cloud-hosted service; Bug Tracking System; Global Software Development tools; Components; Optimal solution; Optimization Model.
Systematic Performance Evaluation Using Component-in-the-Loop Approach
by Imre Kocsis, Attila Klenik, Andras Pataricza, Mikos Telek, Florian Dee, David Cseh
Abstract: Timeliness and throughput critical applications require a framework offering predictable temporal characteristics. The best practice for estimating a prediction of the system dynamics relies on benchmarking, i.e., measuring the reaction of the system under evaluation by applying a representative workload to it. Each novel middleware solution needs such an evaluation as part of the development process to assure an appropriate throughput in the future use.
General purpose Blockchain frameworks are viable replacements for many current systems in several sectors such as finance, healthcare, and IoT by providing a fully distributed, secure, and non-repudiable ledger as a service. Blockchain technologies target domains with a large number of interactions, thus demanding strict performance guarantees in the form of formal Service Level Agreements. Engineering for performance targets in a trustworthy manner requires performance models. However, performance characteristics of Blockchain systems are highly unexplored due to the novelty of the technology.
This paper proposes a general-purpose, systematic methodology for the performance analysis of complex systems, such as Blockchain frameworks. A component-in-the-loop approach aids the identification of throughput bottlenecks, sensitivity analysis, and configuration optimisation. The Linux Foundation-hosted Hyperledger Fabric a pilot reference implementation of a Blockchain framework serves as a case study for the presented methodology.
Keywords: performance evaluation; Blockchain; component-in-the-loop; exploratory data analysis; sensitivity analysis.
SECross: Securing Cross Cloud Boundary
by Xianqing Yu, Mladen Vouk, Young-Hyun Oh
Abstract: Multi-cloud system may be cost-efficient and practical to integrate resources of multiple clouds. However, different clouds are usually managed by different organizations with different security policies and management platforms. When some components of a multi-cloud system are compromised, attackers can potentially have a high privilege that impacts the rest of system.We analyzed the threats to overall system when some components of the multi-cloud system in a public cloud are compromised. We developed a model we call SECross for fine-grain database access policy for SECross components, and the method for users to access computing machines. We analyzed how SECross resists various potential attacks when any of SECross components are compromised.
Keywords: VCL; IaaS; Hybrid Cloud; Cloud Computing; Softlayer; Multi-cloud; Security; Public Cloud; Private Cloud; Security Policy;.