期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Green Software Engineering:A Study on Energy-Efficient Design and Deployment in Cloud Infrastructure
1
作者 Jianian Jin Enkai Ji Qun Zhang 《Journal of Data Analysis and Information Processing》 2025年第3期241-254,共14页
In the face of growing concerns over environmental sustainability,green software engineering has emerged as a crucial discipline within cloud computing to reduce energy consumption and minimize environmental impact.Cl... In the face of growing concerns over environmental sustainability,green software engineering has emerged as a crucial discipline within cloud computing to reduce energy consumption and minimize environmental impact.Cloud data centers,which host a large portion of modern computing infrastructure,are significant contributors to global energy consumption.As cloud adoption increases,so does the need for energy-efficient systems.This paper reviews energy-efficient design and deployment strategies within cloud infrastructure,focusing on how green software engineering practices can optimize resource usage and reduce carbon footprints.The paper explores various energy-saving technologies,including virtualization,dynamic resource allocation,and energy-aware scheduling,and evaluates their effectiveness in reducing cloud infrastructure energy demands.The challenges and limitations of implementing green software engineering practices in cloud systems are also discussed,with insights into future research directions for more sustainable cloud computing. 展开更多
关键词 Green Software Engineering Energy-Efficient Design cloud infrastructure Sustainability Resource Management cloud Computing Energy Consumption Eco-Friendly Software Green IT
在线阅读 下载PDF
Efficient Resource Allocation in Cloud IaaS: A Multi-Objective Strategy for Minimizing Workflow Makespan and Cloud Resource Costs
2
作者 Jean Edgard Gnimassoun Dagou Dangui Augustin Sylvain Legrand Koffi Akanza Konan Ricky N’dri 《Open Journal of Applied Sciences》 2025年第1期147-167,共21页
The ease of accessing a virtually unlimited pool of resources makes Infrastructure as a Service (IaaS) clouds an ideal platform for running data-intensive workflow applications comprising hundreds of computational tas... The ease of accessing a virtually unlimited pool of resources makes Infrastructure as a Service (IaaS) clouds an ideal platform for running data-intensive workflow applications comprising hundreds of computational tasks. However, executing scientific workflows in IaaS cloud environments poses significant challenges due to conflicting objectives, such as minimizing execution time (makespan) and reducing resource utilization costs. This study responds to the increasing need for efficient and adaptable optimization solutions in dynamic and complex environments, which are critical for meeting the evolving demands of modern users and applications. This study presents an innovative multi-objective approach for scheduling scientific workflows in IaaS cloud environments. The proposed algorithm, MOS-MWMC, aims to minimize total execution time (makespan) and resource utilization costs by leveraging key features of virtual machine instances, such as a high number of cores and fast local SSD storage. By integrating realistic simulations based on the WRENCH framework, the method effectively dimensions the cloud infrastructure and optimizes resource usage. Experimental results highlight the superiority of MOS-MWMC compared to benchmark algorithms HEFT and Max-Min. The Pareto fronts obtained for the CyberShake, Epigenomics, and Montage workflows demonstrate closer proximity to the optimal front, confirming the algorithm’s ability to balance conflicting objectives. This study contributes to optimizing scientific workflows in complex environments by providing solutions tailored to specific user needs while minimizing costs and execution times. 展开更多
关键词 cloud infrastructure Multi-Objective Scheduling Resource Cost Optimization Resource Utilization Scientific Workflows
在线阅读 下载PDF
Model of Security Evaluation of Infrastructure as a Service Layer of Cloud Computing System 被引量:1
3
作者 李传龙 高静 《Journal of Donghua University(English Edition)》 EI CAS 2015年第2期323-327,共5页
At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model ... At present,most providers of cloud computing mainly provide infrastructures and services of infrastructure as a service(IaaS).But there is a serious problem that is the lack of security standards and evaluation model of IaaS.After analyzing the vulnerabilities performance of IaaS cloud computing system,the mapping relationship was established between the vulnerabilities of IaaS and the nine threats of cloud computing which was released by cloud security alliance(CSA).According to the mapping relationship,a model for evaluating security of IaaS was proposed which verified the effectiveness of the model on OpenStack by the analytic hierarchy process(AHP) and the fuzzy evaluation method. 展开更多
关键词 cloud verified judgment segmentation hierarchical evaluating partition infrastructure Encryption authentication
在线阅读 下载PDF
Tricube Weighted Linear Regression and Interquartile for Cloud Infrastructural Resource Optimization
4
作者 Neema George B.K.Anoop Vinodh P.Vijayan 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2281-2297,共17页
Cloud infrastructural resource optimization is the process of precisely selecting the allocating the correct resources either to a workload or application.When workload execution,accuracy,and cost are accurately stabi... Cloud infrastructural resource optimization is the process of precisely selecting the allocating the correct resources either to a workload or application.When workload execution,accuracy,and cost are accurately stabilized in opposition to the best possible framework in real-time,efficiency is attained.In addition,every workload or application required for the framework is characteristic and these essentials change over time.But,the existing method was failed to ensure the high Quality of Service(QoS).In order to address this issue,a Tricube Weighted Linear Regression-based Inter Quartile(TWLR-IQ)for Cloud Infrastructural Resource Optimization is introduced.A Tricube Weighted Linear Regression is presented in the proposed method to estimate the resources(i.e.,CPU,RAM,and network bandwidth utilization)based on the usage history in each cloud server.Then,Inter Quartile Range is applied to efficiently predict the overload hosts for ensuring a smooth migration.Experimental results show that our proposed method is better than the approach in Cloudsim under various performance metrics.The results clearly showed that the proposed method can reduce the energy consumption and provide a high level of commitment with ensuring the minimum number of Virtual Machine(VM)Migrations as compared to the state-of-the-art methods. 展开更多
关键词 cloud infrastructure tricube weighted linear regression inter quartile CPU RAM network bandwidth utilization
在线阅读 下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
5
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 cloud Computing Information Security cloud infrastructure Offerings cloud Migration Security Measures Data Breaches cloud Service Providers CYBERSECURITY cloud Security Case Studies cloud Threat Landscape Data Encryption COMPLIANCE cloud Security Tools
在线阅读 下载PDF
MediGuard:A Survey on Security Attacks in Blockchain-IoT Ecosystems for e-Healthcare Applications
6
作者 Shrabani Sutradhar Rajesh Bose +4 位作者 Sudipta Majumder Arfat Ahmad Khan Sandip Roy Fasee Ullah Deepak Prashar 《Computers, Materials & Continua》 2025年第6期3975-4029,共55页
Cloud-based setups are intertwined with the Internet of Things and advanced,and technologies such as blockchain revolutionize conventional healthcare infrastructure.This digitization has major advantages,mainly enhanc... Cloud-based setups are intertwined with the Internet of Things and advanced,and technologies such as blockchain revolutionize conventional healthcare infrastructure.This digitization has major advantages,mainly enhancing the security barriers of the green tree infrastructure.In this study,we conducted a systematic review of over 150 articles that focused exclusively on blockchain-based healthcare systems,security vulnerabilities,cyberattacks,and system limitations.In addition,we considered several solutions proposed by thousands of researchers worldwide.Our results mostly delineate sustained threats and security concerns in blockchain-based medical health infrastructures for data management,transmission,and processing.Here,we describe 17 security threats that violate the privacy and data integrity of a system,over 21 cyber-attacks on security and QoS,and some system implementation problems such as node compromise,scalability,efficiency,regulatory issues,computation speed,and power consumption.We propose a multi-layered architecture for the future healthcare infrastructure.Second,we classify all threats and security concerns based on these layers and assess suggested solutions in terms of these contingencies.Our thorough theoretical examination of several performance criteria—including confidentiality,access control,interoperability problems,and energy efficiency—as well as mathematical verifications establishes the superiority of security,privacy maintenance,reliability,and efficiency over conventional systems.We conducted in-depth comparative studies on different interoperability parameters in the blockchain models.Our research justifies the use of various positive protocols and optimization methods to improve the quality of services in e-healthcare and overcome problems arising fromlaws and ethics.Determining the theoretical aspects,their scope,and future expectations encourages us to design reliable,secure,and privacy-preserving systems. 展开更多
关键词 Blockchain internet of medical things cloud infrastructure cyber-attacks privacy issues
在线阅读 下载PDF
Enhancing Telco Service Quality with Big Data Enabled Churn Analysis: Infrastructure, Model, and Deployment 被引量:1
7
作者 李慧 吴迪 +4 位作者 李高翔 柯毅豪 刘文杰 郑元欢 林小拉 《Journal of Computer Science & Technology》 SCIE EI CSCD 2015年第6期1201-1214,共14页
The penetration of mobile phones is nearly saturated in both developing and developed regions. In such a circumstance, how to prevent subscriber churn has become an important issue for today's telecom operators, as t... The penetration of mobile phones is nearly saturated in both developing and developed regions. In such a circumstance, how to prevent subscriber churn has become an important issue for today's telecom operators, as the cost to acquire a new subscriber is much higher than that to retain an existing subscriber. In this paper, we propose to leverage the power of big data to mitigate the problem of subscriber churn and enhance the service quality of telecom operators. As the information hub, telecom operators have accumulated a huge volume of valuable data on subscriber behaviors, service usage, and network operations. To enable efficient big data processing, we first build a dedicated distributed cloud infrastructure that integrates both online and offline processing capabilities. Second, we develop a complete churn analysis model based on deep data mining techniques, and utilize inter-subscriber influence to improve prediction accuracy. Finally, we use real datasets obtained from a large telecom operator in China to verify the accuracy of our churn analysis models. The dataset contains the information of over 3.5 million subscribers, which generate over 600 million call detail records (CDRs) per month. The empirical results demonstrate that our proposed method can achieve around 90% accuracy for T + 1 testing periods and identify subscribers with high negative influence successfully. 展开更多
关键词 subscriber churn big data cloud infrastructure telco service quality
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部