A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Bring your own controller: Enabling tenant-defined SDN apps in IaaS clouds
2017
IEEE INFOCOM 2017 - IEEE Conference on Computer Communications
To allow enterprise tenants to develop and deploy their own SDN apps in the cloud, in this paper, we introduce a new cloud usage paradigm: Bring Your Own Controller (BYOC). ...
However, existing network functions in IaaS clouds are very limited, inflexible, and hard to control by the tenants. ...
In this paper, we make the following contributions: • We highlight the problem of migrating SDN apps to clouds, and introduce a new cloud use paradigm, Bring Your Own Controller, which provides an individual ...
doi:10.1109/infocom.2017.8057137
dblp:conf/infocom/WangSXHG17
fatcat:dg5h3twzvbherktrxlv27unwy4
Software-Defined Networking in Cloud Computing
2021
International Journal of Computer and Information Technology(2279-0764)
One of the most prominent cloud models for minimizing maintenance obligations and simplifying network infrastructure administration is the SDN (Software Defined Network) architecture. ...
Through network programmability, we may simplify network management and bring innovation, cloud computing introduced some of its network concepts. ...
INTRODUCTION SDN (Software Defined Network) is the latest trend in network architecture that brings a monumental revolution in the network paradigm. ...
doi:10.24203/ijcit.v10i6.172
fatcat:hpbu5xah4fgtjcntkblm4kfmia
ARtwin preliminary platform specifications
2020
Zenodo
ARtwin project: A report defining the architecture of the ARtwin platform and its supoorted components. ...
Provider Tenant: -Is any party not owning the business platform itself, even if they are in the same company. ...
Then, you can add machines to this IaaS and choose the flavor for your machines. Because we must pay for the running machine in AWS EC2, at beginning we will not run any machine in this IaaS. ...
doi:10.5281/zenodo.4381371
fatcat:knb6wimkq5eknnzraxr6od33vy
Cloud computing survey on services, enhancements and challenges in the era of machine learning and data science
2020
International Journal of Informatics and Communication Technology (IJ-ICT)
Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level ...
Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed ...
OpenFlow (switching/routing protocol) enabling SDN Controllers An OpenFlow Controller utilizes the OpenFlow Protocol. An SDN Controller would be the tactical stage in software-defined system (SDN). ...
doi:10.11591/ijict.v9i2.pp117-139
fatcat:lomksiacnnbodfmxkkdwucmjbq
Cloud Computing Environment and Security Challenges: A Review
2017
International Journal of Advanced Computer Science and Applications
In this paper, we examine the detailed design of cloud computing architecture in which deployment models, service models, cloud components, and cloud security are explored. ...
Furthermore, this study identifies the security challenges in cloud computing during the transfer of data into the cloud and provides a viable solution to address the potential threats. ...
The security concerns about storage are data leakage, BYOD (Bring Your Own Data), snooping, cloud credentials and key management. 2) Cloud Infrastructure Security: Cloud computing enabling the distributed ...
doi:10.14569/ijacsa.2017.081025
fatcat:6lup4o3zgrb6zesokksadljr74
Case Study of Cloud Computing Security Issues and confidentiality Challenges
2022
International Journal of Emerging Trends in Engineering Research
In this paper, we try to find out what countermeasures best strengthen the confidentiality, integrity and availability (CIA) of the implementation of cloud computing within the DOD This will be done by ...
The ten domains include access control; telecommunications and network security; information security governance and risk management; application security; cryptography; security architecture and design ...
Big data's growing ease of deployment and management enables IT to actually mine and analyze the data to make real time apps and business decisions. ...
doi:10.30534/ijeter/2022/051042022
fatcat:esbrznjmlvdfhbfup6l56b43vi
5GCity Edge Virtualization Infrastructure Design (D3.1)
2019
Zenodo
respectively in Sections 3.2 and 4.2. ...
Both Sections start with a description of what is the state of the art of each technology today, in order to introduce and clarify the advancements that will be developed in 5GCity, which are detailed ...
Furthermore, the agent acts as a local controller on behalf of RAN or SDN-enabled switches. ...
doi:10.5281/zenodo.2558249
fatcat:b2m62quq3vbpzl5x7ngtchrkuu
D3.1 SDN/NFV environment in the home network Definition, description and preliminary implementation of the IoRL home network
2018
Zenodo
The internet of radio light (IoRL) home network is described together with its architectural design using software defined network (SDN), network function virtualisation (NFV) and virtual network function ...
In the case of SDN-enabled VTNs, one or more SDN controllers create a VTN (called an Infrastructure SDN controller), while a new SDN controller is instantiated to manage this VTN (called a tenant SDN controller ...
In particular, a tenant can be either a customer requiring his own isolated network slice; a sub-organisation that needs its own slice; or an experimenter who wants to control and manage some specific ...
doi:10.5281/zenodo.2579869
fatcat:6loefhzs4be3zkhxcmjsz6ib5y
5GCity Architecture & Interfaces Definition (D2.2)
2019
Zenodo
Orchestration & Control Layer functional description. Infrastructure Layer functional description. ...
Interface and workflows specification This deliverable provides the basis for the design and implementation work that will be performed in the work packages 3, 4 and 5. ...
enable the SDN-based slicing for the neutral hosting in 5GCity. ...
doi:10.5281/zenodo.2558242
fatcat:c4o2h4an45hbxl42tklowzem3a
Mobile Cloud Computing Research – Issues, Challenges and Needs
2020
International Journal of Scientific Research in Computer Science Engineering and Information Technology
This drives a strong demand for mobile cloud applications and services for mobile device users. This brings out a great business and research opportunity in mobile cloud computing (MCC). ...
Then it presents an overview of MCC in terms of its concepts, distinct features, research scope and motivations, as well as advantages and benefits. ...
"Bring your own device" concepts lead to many securities and privacy issues, mobile device or even mobile application management results in new monitoring requirements unknown in traditional platforms. ...
doi:10.32628/cseit206644
fatcat:zazvac6minacfgf5byrf73ghpq
A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade
[article]
2018
arXiv
pre-print
The Cloud computing paradigm has revolutionised the computer science horizon during the past decade and has enabled the emergence of computing as the fifth utility. ...
It then offers research directions for the next decade, thus helping in the realisation of Future Generation Cloud Computing. ...
Acknowledgement We thank anonymous reviewers, Sartaj Sahni (Editor-in-Chief) and Antonio Corradi (Associate Editor) for their constructive suggestions and guidance on improving the content and quality ...
arXiv:1711.09123v2
fatcat:xu3u75e6ind23ite3l6zfqi6hq
5GCity Final Architecture and Interfaces (D2.4)
2019
Zenodo
SDN control is implemented using the NETCONF protocol via a data-model which is formally defined in YANG. ...
The 5G Service & App Catalogue allows: service customers to bring their own VNFs or vApps into the Service Provider's MANO composing services from multiple service providers, each with its own specialized ...
The internals of the REST resources are documented in all detail using the SWAGGER 10 technology. ...
doi:10.5281/zenodo.3751591
fatcat:yntf4ihie5b7rh6mbxui5l7sba
Azure Accelerated Networking: SmartNICs in the Public Cloud
2018
Symposium on Networked Systems Design and Implementation
This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). ...
Finally, in addition to our leaders in the author list, we thank Yousef Khalidi, Mark Russinovich, and Jason Zander for their support. ...
We thank the entire Azure Networking, Server Infrastructure, and Compute teams for their support in developing, iterating on, and deploying SmartNICs and the Accelerated Networking service. ...
dblp:conf/nsdi/FirestonePMCDAA18
fatcat:gx7eaiwfvzhnxjfbyap3p5bcue
A Manifesto for Future Generation Cloud Computing
2018
ACM Computing Surveys
ACKNOWLEDGMENTS We thank anonymous reviewers, Sartaj Sahni (Editor-in-Chief) and Antonio Corradi (Associate Editor) for their constructive suggestions and guidance on improving the content and quality ...
[235] investigated how SDN-enabled Cloud brings us new opportunities for tackling distributed denial-of-service (DDoS) attacks in Cloud computing environments. ...
Independent Software Vendors (ISVs) such as ANSYS, Dassault, Siemens, and COMSOL are currently investigating or already have more suitable licensing models for the Cloud, such as BYOL (bring your own license ...
doi:10.1145/3241737
fatcat:bgb4qjtm5zgcbbtyy6x6anfeju
A Comprehensive Overview of Privacy and Data Security for Cloud Storage
2021
International Journal of Scientific Research in Science Engineering and Technology
It becomes more severe in the cloud computing environment because data is stored in multiple locations, often across the globe. ...
We conduct a thorough assessment of the literature on data security and privacy issues, data encryption technologies, and related countermeasures in cloud storage systems in this study. ...
A Blockchain [37] controller, cloud server, and authentication server (AS) are used to establish a cloud-based software defined network (SDN). ...
doi:10.32628/ijsrset21852
fatcat:mi2jqmcttbbczb3433b6zhizii
« Previous
Showing results 1 — 15 out of 57 results