Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








57 Hits in 5.9 sec

Bring your own controller: Enabling tenant-defined SDN apps in IaaS clouds

Haopei Wang, Abhinav Srivastava, Lei Xu, Sungmin Hong, Guofei Gu
2017 IEEE INFOCOM 2017 - IEEE Conference on Computer Communications  
To allow enterprise tenants to develop and deploy their own SDN apps in the cloud, in this paper, we introduce a new cloud usage paradigm: Bring Your Own Controller (BYOC).  ...  However, existing network functions in IaaS clouds are very limited, inflexible, and hard to control by the tenants.  ...  In this paper, we make the following contributions: • We highlight the problem of migrating SDN apps to clouds, and introduce a new cloud use paradigm, Bring Your Own Controller, which provides an individual  ... 
doi:10.1109/infocom.2017.8057137 dblp:conf/infocom/WangSXHG17 fatcat:dg5h3twzvbherktrxlv27unwy4

Software-Defined Networking in Cloud Computing

Vusumuzi Malele, Mulumba Banza Gracia, Lebogang Maaka, Sphiwe Ndlovu
2021 International Journal of Computer and Information Technology(2279-0764)  
One of the most prominent cloud models for minimizing maintenance obligations and simplifying network infrastructure administration is the SDN (Software Defined Network) architecture.  ...  Through network programmability, we may simplify network management and bring innovation, cloud computing introduced some of its network concepts.  ...  INTRODUCTION SDN (Software Defined Network) is the latest trend in network architecture that brings a monumental revolution in the network paradigm.  ... 
doi:10.24203/ijcit.v10i6.172 fatcat:hpbu5xah4fgtjcntkblm4kfmia

ARtwin preliminary platform specifications

Bilal Al Jammal, Laurent Roullet, Lionel Natarianni, Sylvaine Kerboeuf, Jerôme Royan, Carole Bonan, David Tardivel, Loïc Touraine, Michal Polic, Alexander Werlberger, Nischita Sudharsan, Andreas Hutter
2020 Zenodo  
ARtwin project: A report defining the architecture of the ARtwin platform and its supoorted components.  ...  Provider Tenant: -Is any party not owning the business platform itself, even if they are in the same company.  ...  Then, you can add machines to this IaaS and choose the flavor for your machines. Because we must pay for the running machine in AWS EC2, at beginning we will not run any machine in this IaaS.  ... 
doi:10.5281/zenodo.4381371 fatcat:knb6wimkq5eknnzraxr6od33vy

Cloud computing survey on services, enhancements and challenges in the era of machine learning and data science

Wajid Hassan, Te-Shun Chou, Omar Tamer, John Pickard, Patrick Appiah-Kubi, Leslie Pagliari
2020 International Journal of Informatics and Communication Technology (IJ-ICT)  
Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level  ...  Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed  ...  OpenFlow (switching/routing protocol) enabling SDN Controllers An OpenFlow Controller utilizes the OpenFlow Protocol. An SDN Controller would be the tactical stage in software-defined system (SDN).  ... 
doi:10.11591/ijict.v9i2.pp117-139 fatcat:lomksiacnnbodfmxkkdwucmjbq

Cloud Computing Environment and Security Challenges: A Review

Muhammad Faheem, Urooj Akram, Irfan Khan, Sundas Naqeeb, Asim Shahzad, Arif Ullah
2017 International Journal of Advanced Computer Science and Applications  
In this paper, we examine the detailed design of cloud computing architecture in which deployment models, service models, cloud components, and cloud security are explored.  ...  Furthermore, this study identifies the security challenges in cloud computing during the transfer of data into the cloud and provides a viable solution to address the potential threats.  ...  The security concerns about storage are data leakage, BYOD (Bring Your Own Data), snooping, cloud credentials and key management. 2) Cloud Infrastructure Security: Cloud computing enabling the distributed  ... 
doi:10.14569/ijacsa.2017.081025 fatcat:6lup4o3zgrb6zesokksadljr74

Case Study of Cloud Computing Security Issues and confidentiality Challenges

2022 International Journal of Emerging Trends in Engineering Research  
In this paper, we try to find out what countermeasures best strengthen the confidentiality, integrity and availability (CIA) of the implementation of cloud computing within the DOD This will be done by  ...  The ten domains include access control; telecommunications and network security; information security governance and risk management; application security; cryptography; security architecture and design  ...  Big data's growing ease of deployment and management enables IT to actually mine and analyze the data to make real time apps and business decisions.  ... 
doi:10.30534/ijeter/2022/051042022 fatcat:esbrznjmlvdfhbfup6l56b43vi

5GCity Edge Virtualization Infrastructure Design (D3.1)

Michele Paolino, Teodora Sechkova, Daniel Raho, Nicola Ciulli, Paolo Cruschelli, Elian Kraja, Elio Francesconi, Felipe Huici, Santhanam, Nicolas Weber, August Betzler, Joan Josep Alexandri (+6 others)
2019 Zenodo  
respectively in Sections 3.2 and 4.2.  ...  Both Sections start with a description of what is the state of the art of each technology today, in order to introduce and clarify the advancements that will be developed in 5GCity, which are detailed  ...  Furthermore, the agent acts as a local controller on behalf of RAN or SDN-enabled switches.  ... 
doi:10.5281/zenodo.2558249 fatcat:b2m62quq3vbpzl5x7ngtchrkuu

D3.1 SDN/NFV environment in the home network Definition, description and preliminary implementation of the IoRL home network

Anastasios Kourtis, Andreas Foteas, Charilaos Koumaras, Charilaos Zarakovitis, Michail-Alexandros Kourtis, Themistocles Anagnostopoulos, Adam Kapovits, John Cosmas, Mukhald Salih, Nawar Jawad, Mathias Lacaud, Krzystof Cabaj (+4 others)
2018 Zenodo  
The internet of radio light (IoRL) home network is described together with its architectural design using software defined network (SDN), network function virtualisation (NFV) and virtual network function  ...  In the case of SDN-enabled VTNs, one or more SDN controllers create a VTN (called an Infrastructure SDN controller), while a new SDN controller is instantiated to manage this VTN (called a tenant SDN controller  ...  In particular, a tenant can be either a customer requiring his own isolated network slice; a sub-organisation that needs its own slice; or an experimenter who wants to control and manage some specific  ... 
doi:10.5281/zenodo.2579869 fatcat:6loefhzs4be3zkhxcmjsz6ib5y

5GCity Architecture & Interfaces Definition (D2.2)

Viscardo Costa, Antonino Albanese, Viscardo Costa, Shuaib Siddiqui, August Betzler, Hamzeh Khalili, Apostolos Papageorgiou, Sergi Figuerola, Theodoros Rokkas, Ioannis Neokosmidis, David Pujals, Luis Moreno (+18 others)
2019 Zenodo  
Orchestration & Control Layer functional description. Infrastructure Layer functional description.  ...  Interface and workflows specification This deliverable provides the basis for the design and implementation work that will be performed in the work packages 3, 4 and 5.  ...  enable the SDN-based slicing for the neutral hosting in 5GCity.  ... 
doi:10.5281/zenodo.2558242 fatcat:c4o2h4an45hbxl42tklowzem3a

Mobile Cloud Computing Research – Issues, Challenges and Needs

Setti Karthik, Advin Manhar
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
This drives a strong demand for mobile cloud applications and services for mobile device users. This brings out a great business and research opportunity in mobile cloud computing (MCC).  ...  Then it presents an overview of MCC in terms of its concepts, distinct features, research scope and motivations, as well as advantages and benefits.  ...  "Bring your own device" concepts lead to many securities and privacy issues, mobile device or even mobile application management results in new monitoring requirements unknown in traditional platforms.  ... 
doi:10.32628/cseit206644 fatcat:zazvac6minacfgf5byrf73ghpq

A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade [article]

Rajkumar Buyya, Satish Narayana Srirama, Giuliano Casale, Rodrigo Calheiros, Yogesh Simmhan, Blesson Varghese, Erol Gelenbe, Bahman Javadi, Luis Miguel Vaquero, Marco A. S. Netto, Adel Nadjaran Toosi, Maria Alejandra Rodriguez, Ignacio M. Llorente (+12 others)
2018 arXiv   pre-print
The Cloud computing paradigm has revolutionised the computer science horizon during the past decade and has enabled the emergence of computing as the fifth utility.  ...  It then offers research directions for the next decade, thus helping in the realisation of Future Generation Cloud Computing.  ...  Acknowledgement We thank anonymous reviewers, Sartaj Sahni (Editor-in-Chief) and Antonio Corradi (Associate Editor) for their constructive suggestions and guidance on improving the content and quality  ... 
arXiv:1711.09123v2 fatcat:xu3u75e6ind23ite3l6zfqi6hq

5GCity Final Architecture and Interfaces (D2.4)

Carlos Colman Meixner, Dimitra Simeonidou, Shuaib Siddiqui, August Betzler, Apostolos Papageorgiou, Sergi Figuerola, Antonino Albanese, Viscardo Costa, Valerio Vecchio Verderame, Ioannis Neokosmidis, Theodoros Rokkas, David Pujal (+9 others)
2019 Zenodo  
SDN control is implemented using the NETCONF protocol via a data-model which is formally defined in YANG.  ...  The 5G Service & App Catalogue allows:  service customers to bring their own VNFs or vApps into the Service Provider's MANO  composing services from multiple service providers, each with its own specialized  ...  The internals of the REST resources are documented in all detail using the SWAGGER 10 technology.  ... 
doi:10.5281/zenodo.3751591 fatcat:yntf4ihie5b7rh6mbxui5l7sba

Azure Accelerated Networking: SmartNICs in the Public Cloud

Daniel Firestone, Andrew Putnam, Sambrama Mundkur, Derek Chiou, Alireza Dabagh, Mike Andrewartha, Hari Angepat, Vivek Bhanu, Adrian M. Caulfield, Eric S. Chung, Harish Kumar Chandrappa, Somesh Chaturmohta (+20 others)
2018 Symposium on Networked Systems Design and Implementation  
This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18).  ...  Finally, in addition to our leaders in the author list, we thank Yousef Khalidi, Mark Russinovich, and Jason Zander for their support.  ...  We thank the entire Azure Networking, Server Infrastructure, and Compute teams for their support in developing, iterating on, and deploying SmartNICs and the Accelerated Networking service.  ... 
dblp:conf/nsdi/FirestonePMCDAA18 fatcat:gx7eaiwfvzhnxjfbyap3p5bcue

A Manifesto for Future Generation Cloud Computing

Rajkumar Buyya, Marco A. S. Netto, Adel Nadjaran Toosi, Maria Alejandra Rodriguez, Ignacio M. Llorente, Sabrina De Capitani Di Vimercati, Pierangela Samarati, Dejan Milojicic, Carlos Varela, Rami Bahsoon, Marcos Dias De Assuncao, Satish Narayana Srirama (+13 others)
2018 ACM Computing Surveys  
ACKNOWLEDGMENTS We thank anonymous reviewers, Sartaj Sahni (Editor-in-Chief) and Antonio Corradi (Associate Editor) for their constructive suggestions and guidance on improving the content and quality  ...  [235] investigated how SDN-enabled Cloud brings us new opportunities for tackling distributed denial-of-service (DDoS) attacks in Cloud computing environments.  ...  Independent Software Vendors (ISVs) such as ANSYS, Dassault, Siemens, and COMSOL are currently investigating or already have more suitable licensing models for the Cloud, such as BYOL (bring your own license  ... 
doi:10.1145/3241737 fatcat:bgb4qjtm5zgcbbtyy6x6anfeju

A Comprehensive Overview of Privacy and Data Security for Cloud Storage

Dr. Nikhat Akhtar, Dr. Bedine Kerim, Dr. Yusuf Perwej, Dr. Anurag Tiwari, Dr. Sheeba Praveen
2021 International Journal of Scientific Research in Science Engineering and Technology  
It becomes more severe in the cloud computing environment because data is stored in multiple locations, often across the globe.  ...  We conduct a thorough assessment of the literature on data security and privacy issues, data encryption technologies, and related countermeasures in cloud storage systems in this study.  ...  A Blockchain [37] controller, cloud server, and authentication server (AS) are used to establish a cloud-based software defined network (SDN).  ... 
doi:10.32628/ijsrset21852 fatcat:mi2jqmcttbbczb3433b6zhizii
« Previous Showing results 1 — 15 out of 57 results