Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "computing cloud" wg kryterium: Temat


Wyświetlanie 1-12 z 12
Tytuł:
A Cloud-aided Group RSA Scheme in Java 8 Environment and OpenStack Software
Autorzy:
Jakóbik, A.
Powiązania:
https://bibliotekanauki.pl/articles/308237.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
confidentiality
RSA cryptosystem
Opis:
In this paper a RSA based security system enabling the group of users to upload the single masked message to the cloud environment is proposed. Data stored are encrypted using RSA algorithm. The data receiver is able to encrypt the message retrieved from the cloud environment using private key. Two different separate RSA systems are used. The presented approach is divided into three parts. First, an RSA key is generated for each sender. Then masking the message by newly chosen mask proposed individually by every member, additionally encrypted by individual RSA private key of each member is proceed. Next, encrypting the gathered message inside the cloud environment, using the public key of the receiver is executed. In the third step, the message is decrypted by the receiver using his private RSA key. The scheme reduces the computational load on users side and transfers calculations and storage effort to the cloud environment. The proposed algorithm was developed for storing and sending the data that originally are produced by a group of users, but the receiver of the data is single. It was implemented using Java 8 and OpenStack software. Numerical test of different key length for RSA are presented.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 2; 53-59
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Recent developments in mobile cloud scheduling: state-of-the-art, challenges and perspectives
Autorzy:
Smelcerz, K.
Powiązania:
https://bibliotekanauki.pl/articles/307984.pdf
Data publikacji:
2013
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
energy awareness
mobile cloud computing
scheduling
Opis:
Cloud computing became recently one of the most popular multi-layer distributed computational and data processing environments with various types of services, distributed data storages and resources. With rapid development of mobile technologies, computational clouds have been transformed into the systems with dynamically changing topology and flexible infrastructure through integration with the mobile devices and mobile users as the whole system nodes and actors. The aim of this paper is to provide a comprehensive study and critical comparative analysis of the recent developments in the Mobile Clouds with a new energy optimization criterion scheduling.
Źródło:
Journal of Telecommunications and Information Technology; 2013, 4; 51-57
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure
Autorzy:
Mujawar, Tabassum N.
Bhajantri, Lokesh B.
Powiązania:
https://bibliotekanauki.pl/articles/2142312.pdf
Data publikacji:
2022
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
CPABE
hierarchical access structure
Opis:
Cloud computing is being rapidly adopted by many organizations from different domains and large amounts of data is stored in the cloud. In order to ensure data security, the attribute-based access control mechanism has been emerging recently as a fine-grained access control model that grants access based on the data user’s attributes. In this model, the data owner builds the access policy using the attributes of the data users and access to the data is granted only if the requirements of such an access policy are satisfied. Ciphertext policy-based attribute-based encryption (CPABE) is one of the most widely used methods for providing encrypted access control. Complex, time consuming and costly paring operations are the major issue with the CPABE method. Hence, another efficient method is needed to reduce the data user’s overhead while decrypting data. This paper presents an efficient method consisting in outsourcing decryption operations to a third-party server, so that complex operations may be performed by that machine with only some simple calculations left on the data user’s side. The concept of a hierarchical access structure is also integrated with the traditional CPABE technique. The hierarchical approach enables the data owner to encrypt multiple data using a single common hierarchical access structure. This allows the user to decrypt only the relevant part of ciphertext, depending on which fragment of the hierarchical access structure is satisfied. The paper evaluates also the performance of the proposed model in terms of time and storage cost.
Źródło:
Journal of Telecommunications and Information Technology; 2022, 2; 75--81
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Monitoring of a Cloud-Based Environment for Resilient Telecommunication Services
Autorzy:
Wilczewski, G.
Powiązania:
https://bibliotekanauki.pl/articles/309449.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
Data Center
resiliency
resource monitoring
Opis:
This article depicts insights and in-depth presentation of a new tool, specifically designed for Data Center resources monitoring purpose. It enables physical and virtual resources monitoring and is capable of performing advanced analysis on the resulting, measured data. Here in presented are exemplary scenarios conducted over the proprietary Data Center unit, delivering specific information on the behavior of the analyzed environment. Presented results create a base layer for a high level resiliency analysis of telecommunication services.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 1; 16-21
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Preserving Integrity of Evidence with Blockchain Technology in Cloud Forensics for Immigration Management
Autorzy:
Shinde, Sahadev Maruti
Gurrala, Venkateswara Rao
Powiązania:
https://bibliotekanauki.pl/articles/2200957.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
cloud forensics
FOI-SSA model
improved blowfish
Opis:
As the popularity of cloud computing increases, safety concerns are growing as well. Cloud forensics (CF) is a smart adaptation of the digital forensics model that is used for fighting the related offenses. This paper proposes a new forensic method relying on a blockchain network. Here, the log files are accumulated and preserved in the blockchain using different peers. In order to protect the system against illegitimate users, an improved blowfish method is applied. In this particular instance, the system is made up of five distinct components: hypervisor (VMM), IPFS file storage, log ledger, node controller, and smart contract. The suggested approach includes six phases: creation of the log file, key setup and exchange, evidence setup and control, integrity assurance, agreement validation and confidential file release, as well as blockchain-based communication. To ensure efficient exchange of data exchange between the cloud provider and the client, the methodology comprises IPFS. The SSA (FOI-SSA) model, integrated with forensic operations, is used to select the keys in the best possible way. Finally, an analysis is conducted to prove the effectiveness of the proposed FOI-SSA technique.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 1; 78--87
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Server Workload Model Identification: Monitoring and Control Tools for Linux
Autorzy:
Karpowicz, M.
Arabas, P.
Powiązania:
https://bibliotekanauki.pl/articles/307868.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
energy efficiency
Linux
server performance meterin
Opis:
Server power control in data centers is a coordinated process carefully designed to reach multiple data center management objectives. The main objectives include avoiding power capacity overloads and system overheating, as well as fulfilling service-level agreements (SLAs). In addition to the primary goals, server control process aims to maximize various energy efficiency metrics subject to reliability constraints. Monitoring of data center performance is fundamental for its efficient management. In order to keep track of how well the computing tasks are processed, cluster control systems need to collect accurate measurements of activities of cluster components. This paper presents a brief overview of performance and power consumption monitoring tools available in the Linux systems.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 2; 5-12
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Using Polymatrix Extensive Stackelberg Games in Security – Aware Resource Allocation and Task Scheduling in Computational Clouds
Autorzy:
Jakóbik, A.
Wilczyński, A.
Powiązania:
https://bibliotekanauki.pl/articles/309395.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
resource optimization
Stackelberg equilibrium
Stackelberg games
Opis:
In this paper, the Stackelberg game models are used for supporting the decisions on task scheduling and resource utilization in computational clouds. Stackelberg games are asymmetric games, where a specific group of players’ acts first as leaders, and the rest of the players follow the leaders’ decisions and make their decisions based on the leader’s actions. In the proposed model, the optimal schedules are generated under the security criteria along with the generation of the optimal virtual machines set for the scheduled batch of tasks. The security criteria are defined as security requirements for mapping tasks onto virtual machines with specified trust level. The effectiveness of the proposed method has been verified in the realistic use cases with in the cloud environment with OpenStack and Amazon Cloud standards.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 1; 71-80
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Towards an Agent-Based Augmented Cloud
Autorzy:
Dębski, R.
Byrski, A.
Kisiel-Dorohinicki, M.
Powiązania:
https://bibliotekanauki.pl/articles/308495.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
Agent Platform as a Service
Augmented Cloud
cloud computing
multi-agent systems
Opis:
In the paper an agent-based framework deployed in hybrid cluster and volunteer computing environment is presented. It utilizes two concepts proposed by the authors: Augmented Cloud and Agent Platform as a Service (AgPaaS). Both concepts are discussed in the context of Cloud Computing as defined by NIST. The key idea of the presented solution is to span the cloud (i.e., computing infrastructure) beyond the data center borders by utilizing web browsers as computational workers. The feasibility of the approach was demonstrated by two prototypes: the first one was based on Java Applets and Adobe Flash, whereas the second one on Microsoft Silverlight. The prototypes were next used to perform simple experiments, mainly related to scalability issues. Selected results from the experiments are discussed in the final part of the paper.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 1; 16-22
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Analysis of OpenStack Cloud Computing Platform: Features and Performance
Autorzy:
Grzonka, D.
Powiązania:
https://bibliotekanauki.pl/articles/307878.pdf
Data publikacji:
2015
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
high performance computing
OpenStack
parallel environments
resource utilization analysis
virtualization
Opis:
Over the decades the rapid development of broadly defined computer technologies, both software and hardware is observed. Unfortunately, software solutions are regularly behind in comparison to the hardware. On the other hand, the modern systems are characterized by a high demand for computing resources and the need for customization for the end users. As a result, the traditional way of system construction is too expensive, inflexible and it doesn’t have high resources utilization. Present article focuses on the problem of effective use of available physical and virtual resources based on the OpenStack cloud computing platform. A number of conducted experiments allowed to evaluate computing resources utility and to analyze performance depending on the allocated resources. Additionally, the paper includes structural and functional analysis of the OpenStack cloud platform.
Źródło:
Journal of Telecommunications and Information Technology; 2015, 3; 52-57
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hierarchical Access Structure-based Scheme with Outsourcing and Revocation Mechanism for Cloud Environment
Autorzy:
Mujawar, Tabassum N.
Adik, Ramrao
Bhajantri, Lokesh B.
Sutagundar, Ashok V.
Powiązania:
https://bibliotekanauki.pl/articles/27312940.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
attribute revocation
cloud computing
hierarchical access control
outsourced decryption
trust
Opis:
Ciphertext policy attribute-based encryption (CPABE) is one of the efficient implementations of encrypted access control scheme for cloud computing. Though multiple implementations of CPABE exist, there are some issues that need to be addressed, including efficient revocation approach, decryption time, storage cost etc. In this paper, an efficient scheme that incorporates a hierarchical access structure, outsourced decryption, as well as user and attribute revocation is presented. The hierarchical access structure is utilized to encrypt multiple data using one common access structure and makes the encryption process more efficient. The outsourcing server is used to perform partial decryption, so that all heavy computations are performed by this server and less overhead is incurred by the data user. The proposed framework also integrates the evaluation of trustworthiness of data users and service providers to ensure trusted and encrypted access control procedures. The paper also presents an analysis of the time required for performing different operations. Simulation results show that the proposed scheme outperforms the existing approaches.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 4; 83--92
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Energy Efficient Scheduling Methods for Computational Grids and Clouds
Autorzy:
Jakóbik, A.
Grzonka, D.
Kołodziej, J.
Chis, A. E.
González-Vélez, H.
Powiązania:
https://bibliotekanauki.pl/articles/309207.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
batch scheduling
cloud computing
energy efficient
grids
power consumption
resource allocation
Opis:
This paper presents an overview of techniques developed to improve energy efficiency of grid and cloud computing. Power consumption models and energy usage proles are presented together with energy efficiency measuring methods. Modeling of computing dynamics is discussed from the viewpoint of system identication theory, indicating basic experiment design problems and challenges. Novel approaches to cluster and network-wide energy usage optimization are surveyed, including multi-level power and software control systems, energy-aware task scheduling, resource allocation algorithms and frameworks for backbone networks management. Software-development techniques and tools are also presented as a new promising way to reduce power consumption at the computing node level. Finally, energy-aware control mechanisms are presented. In addition, this paper introduces the example of batch scheduler based on ETC matrix approach.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 1; 56-64
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mobile Cloud for Parallel and Distributed Green Computing
Autorzy:
Siwik, L.
Kala, D.
Godzik, M.
Turek, W.
Byrski, A.
Kisiel-Dorohinicki, M.
Powiązania:
https://bibliotekanauki.pl/articles/308894.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
distributed computing
green computing
mobile cloud
mobile computing
parallel computing
pervasive computing
Opis:
Mobile Computing and Mobile Cloud Computing are the areas where intensive research is observed. The “mobility” landscape (devices, technologies, apps, etc.) evolves so fast that definitions and taxonomies do not catch up with so dynamic changes and there is still an ambiguity in definitions and common understanding of basic ideas and models. This research focuses on Mobile Cloud understood as parallel and distributed system consisting of a collection of interconnected (and virtualized) mobile devices dynamically provisioned and presented as one unified computing resource. This paper focuses on the mobile green computing cloud applied for parallel and distributed computations and consisting of outdated, abandoned or no longer needed smartphones being able to set up a powerful computing cluster. Besides showing the general idea and background, an actual computing cluster is constructed and its scalability and efficiency is checked versus the results obtained from the virtualized set of smartphones. All the experiments are performed using a dedicated software framework constructed in order to leverage the nolonger-needed smartphones, creating a computing cloud.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 4; 60-70
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-12 z 12

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies