Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing

Size: px
Start display at page:

Download "Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing"

Transcription

1 Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing Jaiganesh M. 1,, Vincent Antony Kumar A. 1 and Ramadoss B. 2 1 Department of Information Technology, PSNA College of Engineering and Technology, Dindigul , Tamilnadu, India. 2 Department of Computer Applications, National Institute of Technology, Tiruchirrapalli, Tamilnadu, India. 1 [email protected] Abstract. Cloud computing is opening a new age in receiving information pools by getting connected to internet through any connected device. It provides pay per use method. The services are asked for by the users through on demand. Cloud service providers consider the cloud user as a virtual client to establish a virtual environment of cloud computing. The major concern in cloud computing is assuring security against the unauthenticated accessibility of the cloud services. Massive amount of cloud services results in a growing insist for skilled resource organization and Trust management. We propose a trust model called Hypervisor Hardware Fuzzy Trust Monitor to determine the illegal behavior in virtual environment. We include a fuzzy based controller in hypervisor; monitor the hardware and resource based attackers. We present a major three factors such that Network Traffic, Disk space, GFLOPS to assure trust to the user. We perform simulations to find the trust less users accessing resources in cloud computing. Keywords: cloud computing, security, trust analysis, trust worthiness, virtualization. 1. Introduction Cloud computing is an evolving paradigm to access assortment of data pool via internet by using connective devices such as Personal Digital Assistant (PDA), Work station and Mobile [4,6]. It is ability based computing and which has the capability to deliver services over the internet. It provides on demand access without the need of any human intervention. The standard deployment object that is used in cloud computing is Virtual Machines (VM). It enhances flexibility and enables data center as dynamic in nature. The technique of dividing a physical computer into several partly or completely isolated machines is known as virtualization. Virtualization is the buzz of the enterprisers IT market, and the upcoming IPO of VMware, the industry s most successful virtualization solution Corresponding author K. R. Venugopal and L. M. Patnaik (Eds.) ICCN 2013, pp Elsevier Publications 2013.

2 Jaiganesh M., et al. vendor, is of great interest. Virtualization has the ability to hire a server or thousand servers that can be run in a geophysical modelling application in anywhere. Here the isolated machines are known as either the virtual client or the guest machines. The guest machine is having an individual virtual client which runs each instance of the operating system and its tasks separately. These guest operating systems are monitored, managed and controlled by a Virtual Machine Monitor (VMM) named hypervisor. It supervises the task, threads flow between the guest operating system and the virtual physical hardware like Disk usage, CPU utilization and Memory. Security issues concerned are broadly classified into two classes such as service provider s side and customer side [5]. It is the responsibility of the data center to provide necessary security measures needed for both the data center and clients. The clients must ensure that the data, applications they receive and services are secure [1]. One of the biggest concerns with cloud computing is the un trusted usage of cloud computing resources without the knowledge of cloud service provider. The data from various users must not be interlinked with others and storage of data is another important factor. Availability of data is another work of the server. It should ensure that the data and services in the server are available to users round the clock. As the amount of web based disseminated system rises, the occurrence of malware behavior also increased [3]. Here, finding trust is an uncertainty in nature, so, we are including a stochastic uncertainty for reasoning using fuzzy expert system. The informal fuzziness has been used to identify the trust of clients in cloud computing [2]. Fuzzy Logic was introduced by Zadah [14,15]. It is a problem solving system methodology that lends itself to survive systems ranging from simple to sophisticated to survive. It is used in embedded, networked, distributed systems. Fuzzy set is a common set that has collection of elements measuring improbability in the set. It has varying degrees of membership in the set. A typical function of a crisp set allocates a value of either 1 or 0 to each individual in the universal set. The function can be comprehensive in such a manner that the values are assigned to the elements of the universal set. Huge values represent upper degrees of set membership and it is called membership function and the set is identified as fuzzy set. This paper is organized as follows. Section 2, gives the problem identification. Section 3, the deals with problem formulation, preliminaries and definitions. Section 4, presents finding of Hypervisor Hardware Trust Monitor using fuzzy modelling and Section 5, Performance analyzes and experiment results shows the realistic of proposed model and Section 6 gives conclusion of the paper. 2. Problem statement Virtual isolation is a problem in which the virtual clients are attacked by malware by injecting codes into other virtual clients. Hypervisor also is vulnerable to these attacks. The virtual isolation problem is revealed in Figure 1. The three different essentials can be showed as follows 1. Data center (Hardware units, Storages and resources) 2. Hypervisor 3. Virtual Client (VC) Data center: Datacenter is considered being a sophisticated server having high volume of disk capacity, hardware units and resource. Virtual clients include simulations of hardware especially storage and networking done in data center itself [9]. Data center is able to control the resources of virtual clients. All virtual clients share the data center hardware and memory. A data center is restricted to access area containing automated systems that constantly monitor processor availability, Web traffic and Network performance. 2

3 Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing Figure 1. Virtual isolation problem. Hypervisor: The hyper visor is the virtual machine monitor that is responsible for virtual client to access hard ware and allocate physical properties and resources to each client like disk separation, utilization of network cards. It is also possible for application level partition. (E.g. many applications share a single OS). Virtual Client: A client requesting service is called virtual client. More number of clients request for service and are provided virtually. Virtual clients are utilized to provide highly secure access to remote and desktop virtually from any client at any time. It simplifies system management and application deployment [11]. It helps in lower cost and maintenance. Client services is classified into three major categories and they are software as a service, platform as a service, Infrastructure as a service. These services enable highly available, reliable in its desktop users. In figure 1 depicts, the virtual clients request for own resources and they run in their own application domain. Each Virtual Client (VC) is isolated to run in an individual domain. The domain 1 is coupled by including VC1 and VC2, domain 2 is coupled by including VC3 and VC4, domain 3 is coupled by including VC5 and VC6. In this scenario VC3 is a malware which is able to attack VC1 and VC6 and exploit the properties of hardware, CPU utilization, Disk access and eavesdrop their resources. It is a most imperative circumstance to be noted down in our virtual hypervisor security. If a virtual client is attacked by a malware, cause nearby virtual client is also affected and may get the complete control. The crashing out of virtual client is called as virtual client escape or VM escape. Thus it is essential to note down an individual attacker or a group of attackers that cause a high risk. The hypervisor is able to monitor and manage the virtual clients and perform their tasks called introspection [12]. The hypervisor is responsible for monitoring the following resource introspection capabilities of various clients and any illegitimate activities by the clients. 1) High Network Traffic. 2) Giga Floating-point Operations per Second (GLOPS) 3) Disk space. High Network Traffic: It is not giving operational transaction and bandwidth assurance. Segmentation of bandwidth is important. In cloud computing, cloud service provider might provide committed information rate. It includes the guaranteed amount of bandwidth that the every client should get. The number of service tends to grow and cloud service provider increases the cloud information 3

4 Jaiganesh M., et al. rate which brings increase in their bandwidth. The volume of services on the cloud computing keeps growing and tends to ever more bandwidth hungry. Giga Floating-point Operations Per Second (GFLOPS): GFLOPS, or GigaFLOPS, measures a quantity in billions of floating-point operations per second (FLOPS) that a computer s microprocessor can handle. Frequently, the word Giga FLOPS is perplexed with frequency. The difference is that frequency measures the number of cycles the CPU runs at, and the GFLOPS calculates the number of floating point operations it can handle. Thus FLOPS is a standard that shows how the system executes while computing very difficult mathematical estimations. Disk space: Disk space is the storage capacity available for a particular virtual client. It purely depends on the application or task used by the client [13]. In cloud computing, the applications are permanently stored in the data center for the access of the users whenever they need. Thus the memory should be elastic in nature to support the changing applications of all the users. 3. Hypervisor Hardware Fuzzy Trust Monitor The proposed Hypervisor Hardware Fuzzy Trust Monitor (H2FTM) is aimed to actively measure the network based misuse behavior of the guest Virtual Machines (VMs) by permitting the Hypervisor intrinsic of fuzzy controller to observe guest virtual machines and infrastructure components. We propose a novel approach which tightens hypervisor to measure trust in network utilization environment called Hypervisor Hardware Fuzzy Trust Monitor (H2FTM). This knowledge of finding trust worthiness is measured in terms of fuzzy inference rules which connect antecedents with consequences. The method is called If A, thenb (A, B-Fuzzy sets) [7]. Fuzzy controller is working as a feedback system by repeating the cycles to all and attained a desired output. To establish the steps involved in fuzzy controller modelling, to define the input variables and output variables. Hypervisor trust measurement is progressed and the H2FT (τ) is measured among three major network resources to be factors called Network Traffic (NT), Disk Space (DS) and CPU Utilization (CPU). In our assumption these factors are considered as input variables and Hypervisor hardware Trust Monitor as output variable. Hypervisor Hardware trust (τ) is finding as a single variable in spite of Network Traffic, Disk space and CPU cycles. We consider the combinations of any two input variables d, d are considered as Network traffic, CPU cycle and Disk space by utilizing these values, the fuzzy controller produces a controlling variable τ that is (H2FT). 3.1 Step 1 In step one, it is a process of identifying input/output variables and to assign a meaningful linguistic states and their ranges. To prefer exact linguistic states for each variable and pose them by corresponding fuzzy sets. These linguistic states are proposed as fuzzy sets (or) fuzzy numbers. Which consider that the ranges of input variables d, d are [ a, a] and[ b, b] respectively and the range of output variable are τ is [ c, c]. Each input and output variables has three linguistic states. 3.2 Step 2 In this step, we introduce a fuzzification function for each input variable to propose the associate observation uncertainness. To find grades of membership of linguistic values of linear variable 4

5 Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing corresponding to an input number or Fuzzy number. It is used to calculate and interpret observations of input variable, each expressed as a real number. Consider a fuzzification function of the form f d :[ a, a] R (1) where R denotes the set of all fuzzy numbers and f d (x 0 ) is a fuzzy number chosen by f d as approximation of the measurement d = x 0. We introduced trapezoidal shape as membership function to define f d (x 0 ). It is showing the two control variables and their trapezoidal view to represent fuzzy numbers. 3.3 Step 3 Fuzzy inference system can be generated as relevant fuzzy inference rules by fuzzy associated memory called FAM square. They can be conveniently represented by FAM square rules. In our approach d, d are inputs, η is output variable then If d = A and d = B, then η = C. (2) where A, B, C are fuzzy numbers chosen from the set of numbers and their linguistic states. The possible rule generated for each input and output variable is 3, so 3 2 = 9 totally we have 36 rules. To find the fuzzy rules practically we need a set of input-output data of the following X{ x k, y k, z k k K } (3) where z k is a attained value of output variable η for given value x k and y k of the input variable d and d respectively, K is an appropriate index set. Let A(x k ), B(y k ), C(z k ) denote the largest membership grades. Then the degree of relevance can be expressed by i 1 [i 2 (A(x k ), B(y k ), C(z k )] (4) where i 1, i 2 are t-norms. Note: A function i : [0, 1] 2 [0, 1] such that for all a, b, d [0, 1]; i(a, 1) = a; b d implies i(a, b) (a, d); i(a, b) = i(b, a); i(a, i(b, d)) = i(i(a, b), d). The function is usually also continuous and such that i(a, a) a for all a [0, 1]. 3.4 Step 4 The observation of input variable must be periodically matched with Fuzzy inference rules to make inference in terms of output variables. 5

6 Jaiganesh M., et al. We choose composite inference logic to define our variables. We convert the given fuzzy inference rules represented in equation (17) which is equivalent to simple fuzzy conditional proposition of the form If d, d is A B, then η is C, (5) where [A B](x, y) = min[a(x), B(y)]. (6) for all x [ a, a]andy [ b, b]. The output variable H2FT τ becomes the problem of approximate reasoning with composite inference in fuzzy proposition. The fuzzy rule base consists of n fuzzy inference values, then, Rule 1 : IF (d, d) is A 1 B 1, then τ is C 1 Rule 2 : IF (d, d) is A 2 B 2, then τ is C 2... Rule n : IF (d, d) is A n B n, then τ is C n Fact: (d, d) is f d (x 0 ) f d (y 0)... Conclusion: τ is C. The symbols A j, B j, C j ( j = 1, 2,...n) denote fuzzy sets that represent the linguistic states of variables d, d, τ respectively. The rule is explained in terms of relation R j. The rules are considered as disjunctive in nature. We derive the equation (16) to conclude the output variable τ is defined by the fuzzy set as C = j [ f d (x 0 ) f d (y 0)], o i R j (7) where o i is the sup-i composition for a t-norm i. The choice of the t-norm is a matter similar to the choice of fuzzy sets for given linguistic labels. 3.5 Step 5 The process of computing single fuzzy number from C is called Defuzzification. The fuzzy output variable is also a linguistic variable, whose value have been assigning grades of membership. In the last step, we find a single number compatible with membership function in Hypervisor Hardware Fuzzy Trust (H2FT) called output membership function. We calculated the output variable with centroid method can be expressed as x = b a μ A(x)xdx b a μ A(x)dx (8) Let μ A (x) be the corresponding grade of membership in the aggregated membership function, let 6

7 Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing 1. X min be the minimum x value attain the minimum of Hypervisor Hardware Fuzzy Trust τ. 2. X mod be the moderate x value attain the moderate of Hypervisor Hardware Fuzzy Trust τ. 3. X max be the maximum x value attain the maximum of Hypervisor Hardware Fuzzy Trust τ. X is defuzzified output as a real number value. 4. Performance Analysis We discuss the trust output using the proposed model of fuzzy inference systems. We considered the factors like Network traffic, GFLOPS and Disk space to find out the trust factor for a particular user. The abnormal usage of the above resources by the virtual client indicates the possibility of hacking. The trust model results are retrieved using MATLAB 7.8 version with INTEL core2 processor running at 2 GHZ, 2048 MB of RAM with fuzzy inference system editor. The first step of simulation in trust model is the fuzzification process. Here the factors for trust are converted in to trapezoidal member functions using membership function editor. The factors are converted in a degree of membership between (0-1). The factors are enumerated into small, medium and large in case of memory and low, medium, high in case of Network traffic, GFLOPS and Disk space. The next step of trust model is constructing the fuzzy rule base. The trust output for different combinations of input variables and their values are documented as if-then rules. These are formulated by rule-editor. Mamdani method is used for accessing the rules. Finally, the last step of trust model is the defuzzification process to get crisp result. We can see the H2FT showing the client s behavior with respect to Network traffic due of bandwidth and GFLOPS in Figure 2. The region of increase and decrease in the usage of resources is clear from the figures. The combined view of the usage of Network traffic and Disk space by the client is shown using fuzzy 3D view in Figure 2. The view of the client behavior towards the Disc space and GFLOPS is shown in Figure 3. From the utilization of bandwidth more, the Network traffic is seen to be maximum. The figures depict that the resources are utilized at the maximum at some points indicating the chance of attack. The input for fuzzy inference engine is calculated by simple attribute function and output is found by using Mamdani method. We infer from the analysis that the hypervisor is able to detect the trust of the Figure 2. (a) Fuzzy view of network traffic vs H2FT; (b) Fuzzy view of disk space vs H2FT. 7

8 Jaiganesh M., et al. Figure 3. Fuzzy view of network traffic vs H2FT. virtual clients before allocating the resources. It also terminates the allocation of Network traffic, GFLOPS and Disk space to a virtual client, if he is not trust worthy. The Analysis shows that the trust system model suggested is more accurate in predicting the trust in virtual cloud environment than human supervising. Thus the above model holds good in its analytical results shown and helps the hypervisor in taking rapid decisions. 5. Conclusion As stated in the paper, though are several factors to have a assured trust in using the cloud environment. The virtual world has worn out the last decade staggering on protecting resources and networks from conventional security attacks. The problems are out sourcing the resources, maintaining the Network traffic and monitoring the disk space are the three important factors to be solved. The H2FTM idea is implemented in the above paper which calculates the trust worthiness of a user based on the above three factors. As illustrated in the paper, the drips in cloud results in illicit cloud service as well as the entire cloud hack. So the control of resources and their distribution to multiple hosts must be secured and optimized. Thus having a hypervisor based trust monitor provides its service in administering the resources of the cloud users. References [1] Vincent Antony Kumar, A. and Jaiganesh, M.: JNLP Based Secure Software as a Service in Cloud Computing. In Proceedings Communications in Computer and Information Science, Springer Verlag, 283, (2012). [2] Vincent Antony Kumar, A. and Jaiganesh, M.: ACDP: Prediction of Application Cloud Data Center Proficiency using Fuzzy Modeling. In International Conference on Modeling, Optimization and Computing, Procedia Engineering, Elsevier Publications, 38(3), (2012). [3] Wang, C., Ren, K. and Wang, J.: Secure and Practical Outsourcing of Linear Programming in Cloud Computing. In Proceedings of IEEE INFOCOM International Conference, (2011). [4] Francesco Maria, A., Gianni, F. and Simone, S.: An Approach to a Cloud Computing Network. In Proceedings International Conference on Applications of Digital Information and Web Technologies, (2008). 8

9 Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing [5] Hamlen, K., Kantarcioglu, M., Khan, L. and Bhavani, T.: Security Issues for Cloud Computing, International Journal of Information Security and Privacy, 4(2), (2010). [6] Foster, I., Zhao, Y., Raicu, I. and Shiyong, L.: Cloud Computing and Grid Computing 360-Degree Compared, Grid Computing Environments Workshop, 4 6 (2008). [7] Varia, J.: Cloud Architectures, White Paper by Amazon Web Services, Amazon Company, 1 14 (2008). [8] Mamdani, E. H. and Assilian: An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller, International Journal Man-Machine Studies, 1 13 (1975). [9] Armbrust, M., Armando, F. and Gri, R.: Above the Clouds: A Berkeley View of Cloud Computing, /Pubs/TechRpts/2009/EECS html, 4 6. [10] Nelson, M., Charles, C., Fernando, F., Marcos, A., Tereza, C. M. B., Naslund, M. and Pourzandi, M.: A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing, Journal of Cloud Computing: Advances, Systems and Applications, 1(11): 1 21 (2012). [11] Wang, Q., Wang, C., Ren, K., Lou, W. and Li, J.: Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on Parallel and Distributed System, 22(5): (2011). [12] Buyya, R.: Market-Oriented Cloud Computing: Vision, Hype and Reality of Delivering Computing as the 5th Utility. In Proceedings IEEE/ACM International Symposium on Cluster Computing and the Grid, 1 13 (2009). [13] Subhasini, S. and Kavitha, V.: A Survey on Security Issues in Service Delivery Models of Cloud Computing, Journal of Network and Computer Applications, 34(1), 1 11 (2011). [14] Zadeh, L. A.: Fuzzy Sets and Systems, International Journal of general systems, Taylor Francis, (1990). [15] Zadeh, L. A.: Outline of a New Approach to the Analysis of Complex Systems and Decision Processes, IEEE Transactions on Systems, Man and Cybernetics, 3, (1973). [16] Zeng, X. J. and Singh, M. G.: Approximation Theory of Fuzzy Systems: SISO case, IEEE Tranactions on Fuzzy Systems, 2(2), (1994). 9

Fuzzy Based Reactive Resource Pricing in Cloud Computing

Fuzzy Based Reactive Resource Pricing in Cloud Computing Fuzzy Based Reactive Resource Pricing in Cloud Computing 1P. Pradeepa, 2M. Jaiganesh, 3A. Vincent Antony Kumar, 4M. Karthiha Devi 1, 2, 3, 4 Department of Information Technology, PSNA College of Engineering

More information

Security Model for VM in Cloud

Security Model for VM in Cloud Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,

More information

AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD

AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD M. Lawanya Shri 1, Dr. S. Subha 2 1 Assistant Professor,School of Information Technology and Engineering, Vellore Institute of Technology, Vellore-632014

More information

Auto-Scaling Model for Cloud Computing System

Auto-Scaling Model for Cloud Computing System Auto-Scaling Model for Cloud Computing System Che-Lun Hung 1*, Yu-Chen Hu 2 and Kuan-Ching Li 3 1 Dept. of Computer Science & Communication Engineering, Providence University 2 Dept. of Computer Science

More information

A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS

A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS A.Vanitha Katherine (1) and K.Alagarsamy (2 ) 1 Department of Master of Computer Applications, PSNA College

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

Relational Databases in the Cloud

Relational Databases in the Cloud Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating

More information

A Survey on Cloud Computing

A Survey on Cloud Computing A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India [email protected] G. Sahoo Department of Information Technology Birla

More information

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers

More information

A Trust-Evaluation Metric for Cloud applications

A Trust-Evaluation Metric for Cloud applications A Trust-Evaluation Metric for Cloud applications Mohammed Alhamad, Tharam Dillon, and Elizabeth Chang Abstract Cloud services are becoming popular in terms of distributed technology because they allow

More information

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction Vol. 3 Issue 1, January-2014, pp: (1-5), Impact Factor: 1.252, Available online at: www.erpublications.com Performance evaluation of cloud application with constant data center configuration and variable

More information

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate

More information

FLBVFT: A Fuzzy Load Balancing Technique for Virtualization and Fault Tolerance in Cloud

FLBVFT: A Fuzzy Load Balancing Technique for Virtualization and Fault Tolerance in Cloud 2015 (8): 131-135 FLBVFT: A Fuzzy Load Balancing Technique for Virtualization and Fault Tolerance in Cloud Rogheyeh Salehi 1, Alireza Mahini 2 1. Sama technical and vocational training college, Islamic

More information

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India [email protected] 2 Department

More information

The Review of Virtualization in an Isolated Computer Environment

The Review of Virtualization in an Isolated Computer Environment The Review of Virtualization in an Isolated Computer Environment Sunanda Assistant professor, Department of Computer Science & Engineering, Ludhiana College of Engineering & Technology, Ludhiana, Punjab,

More information

Project Management Efficiency A Fuzzy Logic Approach

Project Management Efficiency A Fuzzy Logic Approach Project Management Efficiency A Fuzzy Logic Approach Vinay Kumar Nassa, Sri Krishan Yadav Abstract Fuzzy logic is a relatively new technique for solving engineering control problems. This technique can

More information

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure J Inf Process Syst, Vol.9, No.3, September 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.3.379 Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based

More information

Threat Modeling Using Fuzzy Logic Paradigm

Threat Modeling Using Fuzzy Logic Paradigm Issues in Informing Science and Information Technology Volume 4, 2007 Threat Modeling Using Fuzzy Logic Paradigm A. S. Sodiya, S. A. Onashoga, and B. A. Oladunjoye Department of Computer Science, University

More information

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed and Cloud Computing Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading

More information

Estimating Trust Value for Cloud Service Providers using Fuzzy Logic

Estimating Trust Value for Cloud Service Providers using Fuzzy Logic Estimating Trust Value for Cloud Service Providers using Fuzzy Logic Supriya M, Venkataramana L.J, K Sangeeta Department of Computer Science and Engineering, Amrita School of Engineering Kasavanahalli,

More information

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case) 10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information

More information

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,

More information

Efficient Cloud Management for Parallel Data Processing In Private Cloud

Efficient Cloud Management for Parallel Data Processing In Private Cloud 2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Efficient Cloud Management for Parallel Data Processing In Private

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

International Journal of Computer & Organization Trends Volume20 Number1 May 2015

International Journal of Computer & Organization Trends Volume20 Number1 May 2015 Performance Analysis of Various Guest Operating Systems on Ubuntu 14.04 Prof. (Dr.) Viabhakar Pathak 1, Pramod Kumar Ram 2 1 Computer Science and Engineering, Arya College of Engineering, Jaipur, India.

More information

Comparing Free Virtualization Products

Comparing Free Virtualization Products A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this

More information

Introduction to Fuzzy Control

Introduction to Fuzzy Control Introduction to Fuzzy Control Marcelo Godoy Simoes Colorado School of Mines Engineering Division 1610 Illinois Street Golden, Colorado 80401-1887 USA Abstract In the last few years the applications of

More information

Sistemi Operativi e Reti. Cloud Computing

Sistemi Operativi e Reti. Cloud Computing 1 Sistemi Operativi e Reti Cloud Computing Facoltà di Scienze Matematiche Fisiche e Naturali Corso di Laurea Magistrale in Informatica Osvaldo Gervasi [email protected] 2 Introduction Technologies

More information

EMPLOYEE PERFORMANCE APPRAISAL SYSTEM USING FUZZY LOGIC

EMPLOYEE PERFORMANCE APPRAISAL SYSTEM USING FUZZY LOGIC EMPLOYEE PERFORMANCE APPRAISAL SYSTEM USING FUZZY LOGIC ABSTRACT Adnan Shaout* and Mohamed Khalid Yousif** *The Department of Electrical and Computer Engineering The University of Michigan Dearborn, MI,

More information

Analysis on Virtualization Technologies in Cloud

Analysis on Virtualization Technologies in Cloud Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization

More information

Fuzzy Logic Based Revised Defect Rating for Software Lifecycle Performance. Prediction Using GMR

Fuzzy Logic Based Revised Defect Rating for Software Lifecycle Performance. Prediction Using GMR BIJIT - BVICAM s International Journal of Information Technology Bharati Vidyapeeth s Institute of Computer Applications and Management (BVICAM), New Delhi Fuzzy Logic Based Revised Defect Rating for Software

More information

Technical Enablers for Cloud Computing Successful Adoption

Technical Enablers for Cloud Computing Successful Adoption Technical Enablers for Cloud Computing Successful Adoption Torki Altameem Dept. of Computer Science, RCC, King Saud University, P.O. Box: 28095 11437 Riyadh-Saudi Arabia. [email protected] Abstract :

More information

CLOUD COMPUTING IN HIGHER EDUCATION

CLOUD COMPUTING IN HIGHER EDUCATION Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,

More information

INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS

INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS * C. Saravanakumar 1 and C. Arun 2 1 Department of Computer Science and Engineering, Sathyabama University,

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues

More information

CLOUD COMPUTING. Keywords: Cloud Computing, Data Centers, Utility Computing, Virtualization, IAAS, PAAS, SAAS.

CLOUD COMPUTING. Keywords: Cloud Computing, Data Centers, Utility Computing, Virtualization, IAAS, PAAS, SAAS. CLOUD COMPUTING Mr. Dhananjay Kakade CSIT, CHINCHWAD, Mr Giridhar Gundre CSIT College Chinchwad Abstract: Cloud computing is a technology that uses the internet and central remote servers to maintain data

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Virtualization Technologies (ENCS 691K Chapter 3)

Virtualization Technologies (ENCS 691K Chapter 3) Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

Intuitionistic fuzzy load balancing in cloud computing

Intuitionistic fuzzy load balancing in cloud computing 8 th Int. Workshop on IFSs, Banská Bystrica, 9 Oct. 2012 Notes on Intuitionistic Fuzzy Sets Vol. 18, 2012, No. 4, 19 25 Intuitionistic fuzzy load balancing in cloud computing Marin Marinov European Polytechnical

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

Parallels Server 4 Bare Metal

Parallels Server 4 Bare Metal Parallels Server 4 Bare Metal Product Summary 1/21/2010 Company Overview Parallels is a worldwide leader in virtualization and automation software that optimizes computing for services providers, businesses

More information

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center

Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises

More information

Cloud Computing - Architecture, Applications and Advantages

Cloud Computing - Architecture, Applications and Advantages Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral

More information

Understanding the Benefits of IBM SPSS Statistics Server

Understanding the Benefits of IBM SPSS Statistics Server IBM SPSS Statistics Server Understanding the Benefits of IBM SPSS Statistics Server Contents: 1 Introduction 2 Performance 101: Understanding the drivers of better performance 3 Why performance is faster

More information

Optimal Service Pricing for a Cloud Cache

Optimal Service Pricing for a Cloud Cache Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,

More information

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004

More information

Windows Server 2008 R2 Hyper V. Public FAQ

Windows Server 2008 R2 Hyper V. Public FAQ Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6

More information

Cloud Computing Simulation Using CloudSim

Cloud Computing Simulation Using CloudSim Cloud Computing Simulation Using CloudSim Ranjan Kumar #1, G.Sahoo *2 # Assistant Professor, Computer Science & Engineering, Ranchi University, India Professor & Head, Information Technology, Birla Institute

More information

Migration of Virtual Machines for Better Performance in Cloud Computing Environment

Migration of Virtual Machines for Better Performance in Cloud Computing Environment Migration of Virtual Machines for Better Performance in Cloud Computing Environment J.Sreekanth 1, B.Santhosh Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

Customer Security Issues in Cloud Computing

Customer Security Issues in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.

More information

Multilevel Communication Aware Approach for Load Balancing

Multilevel Communication Aware Approach for Load Balancing Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1

More information

Li Sheng. [email protected]. Nowadays, with the booming development of network-based computing, more and more

Li Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more 36326584 Li Sheng Virtual Machine Technology for Cloud Computing Li Sheng [email protected] Abstract: Nowadays, with the booming development of network-based computing, more and more Internet service vendors

More information

Cloud Computing. Alex Crawford Ben Johnstone

Cloud Computing. Alex Crawford Ben Johnstone Cloud Computing Alex Crawford Ben Johnstone Overview What is cloud computing? Amazon EC2 Performance Conclusions What is the Cloud? A large cluster of machines o Economies of scale [1] Customers use a

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:

More information

Dynamic Load Balancing of Virtual Machines using QEMU-KVM

Dynamic Load Balancing of Virtual Machines using QEMU-KVM Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College

More information

Group Based Load Balancing Algorithm in Cloud Computing Virtualization

Group Based Load Balancing Algorithm in Cloud Computing Virtualization Group Based Load Balancing Algorithm in Cloud Computing Virtualization Rishi Bhardwaj, 2 Sangeeta Mittal, Student, 2 Assistant Professor, Department of Computer Science, Jaypee Institute of Information

More information

Before we can talk about virtualization security, we need to delineate the differences between the

Before we can talk about virtualization security, we need to delineate the differences between the 1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via

More information

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Pluribus Netvisor Solution Brief

Pluribus Netvisor Solution Brief Pluribus Netvisor Solution Brief Freedom Architecture Overview The Pluribus Freedom architecture presents a unique combination of switch, compute, storage and bare- metal hypervisor OS technologies, and

More information

Procedia - Social and Behavioral Sciences 141 ( 2014 ) 10 14 WCLTA 2013. Applying Virtualization Technology in Security Education

Procedia - Social and Behavioral Sciences 141 ( 2014 ) 10 14 WCLTA 2013. Applying Virtualization Technology in Security Education Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Sciences 141 ( 2014 ) 10 14 WCLTA 2013 Applying Virtualization Technology in Security Education Wenjuan Xu a *,

More information

Elasticity in Multitenant Databases Through Virtual Tenants

Elasticity in Multitenant Databases Through Virtual Tenants Elasticity in Multitenant Databases Through Virtual Tenants 1 Monika Jain, 2 Iti Sharma Career Point University, Kota, Rajasthan, India 1 [email protected], 2 [email protected] Abstract -

More information

Automated deployment of virtualization-based research models of distributed computer systems

Automated deployment of virtualization-based research models of distributed computer systems Automated deployment of virtualization-based research models of distributed computer systems Andrey Zenzinov Mechanics and mathematics department, Moscow State University Institute of mechanics, Moscow

More information

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University

More information

Iaas for Private and Public Cloud using Openstack

Iaas for Private and Public Cloud using Openstack Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department

More information

SURVEY ON VIRTUALIZATION VULNERABILITIES

SURVEY ON VIRTUALIZATION VULNERABILITIES SURVEY ON VIRTUALIZATION VULNERABILITIES Indumathy M Department of MCA, Acharya Institute of Technology, Bangalore, (India) ABSTRACT Virtualization plays a major role in serving the organizations to reduce

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

Security Benefits of Cloud Computing

Security Benefits of Cloud Computing Security Benefits of Cloud Computing FELICIAN ALECU Economy Informatics Department Academy of Economic Studies Bucharest ROMANIA e-mail: [email protected] Abstract: The nature of the Internet is

More information

Performance Analysis of Resource Provisioning for Cloud Computing Frameworks

Performance Analysis of Resource Provisioning for Cloud Computing Frameworks Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC Performance Analysis of Resource Provisioning for Cloud Computing Frameworks Sanjeev Kumar Pippal 1, Rahul Kumar Dubey 2, Arjun

More information

SERVER 101 COMPUTE MEMORY DISK NETWORK

SERVER 101 COMPUTE MEMORY DISK NETWORK Cloud Computing ก ก ก SERVER 101 COMPUTE MEMORY DISK NETWORK SERVER 101 1 GHz = 1,000.000.000 Cycle/Second 1 CPU CYCLE VIRTUALIZATION 101 VIRTUALIZATION 101 VIRTUALIZATION 101 HISTORY YEAR 1800 YEARS LATER

More information

Environments, Services and Network Management for Green Clouds

Environments, Services and Network Management for Green Clouds Environments, Services and Network Management for Green Clouds Carlos Becker Westphall Networks and Management Laboratory Federal University of Santa Catarina MARCH 3RD, REUNION ISLAND IARIA GLOBENET 2012

More information

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with

More information

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected]

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected] At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud

More information

Chapter 2 Addendum (More on Virtualization)

Chapter 2 Addendum (More on Virtualization) Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)

More information

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,

More information

Optimization of Fuzzy Inventory Models under Fuzzy Demand and Fuzzy Lead Time

Optimization of Fuzzy Inventory Models under Fuzzy Demand and Fuzzy Lead Time Tamsui Oxford Journal of Management Sciences, Vol. 0, No. (-6) Optimization of Fuzzy Inventory Models under Fuzzy Demand and Fuzzy Lead Time Chih-Hsun Hsieh (Received September 9, 00; Revised October,

More information

CHAPTER 2 THEORETICAL FOUNDATION

CHAPTER 2 THEORETICAL FOUNDATION CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should

More information

Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database

Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database JIOS, VOL. 35, NO. 1 (2011) SUBMITTED 02/11; ACCEPTED 06/11 UDC 004.75 Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database University of Ljubljana Faculty of Computer and Information

More information

Compromise-as-a-Service

Compromise-as-a-Service ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda

More information

A FUZZY LOGIC APPROACH FOR SALES FORECASTING

A FUZZY LOGIC APPROACH FOR SALES FORECASTING A FUZZY LOGIC APPROACH FOR SALES FORECASTING ABSTRACT Sales forecasting proved to be very important in marketing where managers need to learn from historical data. Many methods have become available for

More information

CloudAnalyzer: A cloud based deployment framework for Service broker and VM load balancing policies

CloudAnalyzer: A cloud based deployment framework for Service broker and VM load balancing policies CloudAnalyzer: A cloud based deployment framework for Service broker and VM load balancing policies Komal Mahajan 1, Deepak Dahiya 1 1 Dept. of CSE & ICT, Jaypee University Of Information Technology, Waknaghat,

More information

GUIDELINE. on SERVER CONSOLIDATION and VIRTUALISATION. National Computer Board, 7th Floor Stratton Court, La Poudriere Street, Port Louis

GUIDELINE. on SERVER CONSOLIDATION and VIRTUALISATION. National Computer Board, 7th Floor Stratton Court, La Poudriere Street, Port Louis GUIDELINE on SERVER CONSOLIDATION and VIRTUALISATION National Computer Board, 7th Floor Stratton Court, La Poudriere Street, Port Louis Introduction There is an ever increasing need for both organisations

More information