首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 27 毫秒
1.
肖晴 《电信科学》2011,(Z1):80-85
基于云计算技术提供移动互联网业务,是电信运营商在移动互联网时代提高竞争力,避免沦为单纯"管道"的重要手段。"云+端"架构,是实现移动互联网与云计算结合的一种可行的解决方案。介绍了"云+端"架构中云端与终端的具体结构以及基于"云+端"架构开发的云宝盒产品和世博e云手机,并提出了"云+端"架构的后续发展建议。  相似文献   

2.
The recent development of Mobile Cloud Computing has helped in solving numerous real-life problems. The rate of growth of mobile devices has been increasing at a very high pace. Mobile devices have made substantial contributions in managing emergency situations. Owing to the mobility of mobile devices, cloudlets, and their intermittent connectivity, it may become very difficult to handle emergency situations. To address this problem, a transmission model is proposed for mobile cloudlet systems, where a mobile device is used to designate a cloudlet by using the Borda scores Method and the mobile device can offload a part of its application to this cloudlet. The simulation results demonstrated that the proposed work makes a significant comtribution toward alleviating the problems associated with emergency situations.  相似文献   

3.
Cloud computing is considered the latest emerging computing paradigm and has brought revolutionary changes in computing technology. With the advancement in this field, the number of cloud users and service providers is increasing continuously with more diversified services. Consequently, the selection of appropriate cloud service has become a difficult task for a new cloud customer. In case of inappropriate selection of a cloud services, a cloud customer may face the vendor locked‐in issue and data portability and interoperability problems. These are the major obstacles in the adoption of cloud services. To avoid these complexities, a cloud customer needs to select an appropriate cloud service at the initial stage of the migration to the cloud. Many researches have been proposed to overcome the issues, but problems still exist in intercommunication standards among clouds and vendor locked‐in issues. This research proposed an IEEE multiagent Foundation for Intelligent Physical Agent (FIPA) compliance multiagent reference architecture for cloud discovery and selection using cloud ontology. The proposed approach will mitigate the prevailing vendor locked‐in issue and also alleviate the portability and interoperability problems in cloud computing. To evaluate the proposed reference architecture and compare it with the state‐of‐the‐art approaches, several experiments have been performed by utilizing the commonly used performance measures. Analysis indicates that the proposed approach enables significant improvements in cloud service discovery and selection in terms of search efficiency, execution, and response time.  相似文献   

4.
Cloud storage employs software that interconnects and facilitates collaboration between different types of storage devices.Compared with traditional storage methods, cloud storage poses new challenges in data security, reliability, and management. This paper introduces four layers of cloud storage architecture: data storage layer (connecting multiple storage components), data management layer (providing common support technology for multiple services), data service layer (sustaining multiple storage applications), and user access layer. A typical cloud storage application-Backup Cloud (B-Cloud)-is examined and its software architecture, characteristics, and main research areas are discussed.  相似文献   

5.
The prime focus of the Cloud Service Providers is enhancing the service delivery performance of the distributed cloud data centers. The clustering and load balancing of distributed cloud data centers have significant impact on its service delivery performance. Hence, this paper models distributed cloud data center environment as a network graph and proposes a two‐phase cluster‐based load balancing (CLB) algorithm based on a graph model. The first phase proposes a Cloud Data Center Clustering algorithm to cluster the distributed cloud data centers based on their proximity. The second phase proposes a Client‐Cluster Assignment algorithm to perform uniform distribution of the client requests across the clusters to enable load balancing. To assess the performance, the proposed algorithms are compared with other K‐constrained graph‐based clustering algorithms namely, graph‐based K‐means and K‐spanning tree algorithms on a simulated distributed cloud data center environment. The experimental results reveal that the proposed CLB algorithm outperforms the compared algorithms in terms of the average clustering time, load distribution, and fairness index and hence improves the service delivery performance of the distributed cloud data centers.  相似文献   

6.
Existing context‐aware systems focus only on characterizing the situation of an entity to exhibit the advantage of contextual information association, but they have no mechanism to facilitate the interoperation and reuse of contextual information. Cloud computing offers an adaptable and flexible solution for existing context‐aware applications, integrating Mobile Web 2.0 technologies. This work presents a multilayer context cloud framework (MCCF) that integrates Web 2.0 technologies into a mobile context‐aware system for use in a cloud computing environment. The proposed MCCF includes a context sensor layer, a context information layer, a context service layer, a context representation layer, a cloud computing layer, and a mobile Web 2.0 context‐aware Software as a Service layer. To demonstrate the feasibility of this approach, a Mobile Web 2.0‐based context‐aware Software as a Service platform, which is a cloud computing application based on MCCF, is implemented to provide continuous and context‐aware monitoring of a specific application. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

7.
There is a good opportunity for enlightening the services of the mobile devices by introducing computational offloading using cloud technology. Offloading is a process for managing the complexity of the mobile environment by migrating computational load to the cloud. The mobile devices oblige the quick response for the offloading requests; it is dependent on network connectivity. The cloud services take long set‐up time irrespective of network connectivity. In this paper, new system architecture for the dynamic task offloading in the mobile cloud environment is proposed. The architecture includes the offloading algorithm that concentrates on energy consumption of the tasks both in the local and remote environment. The proposed algorithm formulates a collective task execution model for minimizing the energy consumption. The architecture concentrates on the network model by considering the task completion time in three different network scenarios. The experimental results show the efficiency of the suggested architecture in reducing the energy consumption and completion time of the tasks.  相似文献   

8.
This paper proposed an energy‐aware cross‐layer mobile cloud resource allocation approach. In this paper, a hybrid cloud architecture is adopted for provisioning mobile service to mobile device users, which include nearby local cloud and remote public cloud. The computation‐intensive tasks can be processed by the remote public cloud, while the delay‐sensitive computation can be processed by the nearby local cloud. On the basis of the system context and mobile user preferences, the energy‐aware cross‐layer mobile cloud resource allocation approach can optimize the consumption of cloud resource and system performance. The cooperation and collaboration among local cloud agent, public cloud supplier, and mobile cloud user are regulated through the economic approach. The energy‐aware cross‐layer mobile cloud resource allocation is performed on the local cloud level and the public cloud level, which comprehensively considers the benefits of all participants. The energy‐aware cross‐layer mobile cloud resource allocation algorithm is proposed, which is evaluated in the experiment environment, and comparison results and analysis are discussed.  相似文献   

9.
Resource virtualization has become one of the key super‐power mobile computing architecture technologies. As mobile devices and multimedia traffic have increased dramatically, the load on mobile cloud computing systems has become heavier. Under such conditions, mobile cloud system reliability becomes a challenging task. In this paper, we propose a new model using a naive Bayes classifier for hypervisor failure prediction and prevention in mobile cloud computing. We exploit real‐time monitoring data in combination with historical maintenance data, which achieves higher accuracy in failure prediction and early failure‐risk detection. After detecting hypervisors at risk, we perform live migration of virtual servers within a cluster, which decreases the load and prevents failures in the cloud. We performed a simulation for verification. According to the experimental results, our proposed model shows good accuracy in failure prediction and the possibility of decreasing downtime in a hypervisor service. Copyright © 2017 John Wiley & Sons, Ltd.  相似文献   

10.
The arrival of cloud computing technology promises innovative solutions to the problems inherent in existing vehicular ad hoc network (VANET) networks. Because of the highly dynamic nature of these networks in crowded conditions, some network performance improvements are needed to anticipate and disseminate reliable traffic information. Although several approaches have been proposed for the dissemination of data in the vehicular clouds, these approaches rely on the dissemination of data from conventional clouds to vehicles, or vice versa. However, anticipating and delivering data, in a proactive way, based on query message or an event driven has not been defined so far by these approaches. Therefore, in this paper, a VANET‐Cloud layer is proposed for traffic management and network performance improvements during congested conditions. For the traffic management, the proposed layer integrates the benefits of the connected sensor network (CSN) to collect traffic data and the cloud infrastructure to provide on‐demand and automatic cloud services. In this work, traffic services use a data exchange mechanism to propagate the predicted data using a fuzzy aggregation technique. In the evaluation phase, simulation results demonstrate the effectiveness of the proposed VANET‐Cloud layer to dramatically improve traffic safety and network performance as compared with recent works.  相似文献   

11.
A Survey of Mobile Cloud Computing   总被引:1,自引:0,他引:1  
Mobile Cloud Computing (MCC) is emerging as one of the most important branches of cloud computing. In this paper, MCC is defined as cloud computing extended by mobility, and a new ad-hoc infrastructure based on mobile devices. It provides mobile users with data storage and processing services on a cloud computing platform. Because mobile cloud computing is still in its infancy, we aim to clarify confusion that has arisen from different views. Existing works are reviewed, and an overview of recent advances in mobile cloud computing is provided. We investigate representative infrastructures of mobile cloud computing and analyze key components. Moreover, emerging MCC models and services are discussed, and challenging issues are identified that will need to be addressed in future work.  相似文献   

12.
云数据中心是新一代信息基础设施的代表,其安全问题也成为近年来备受关注的焦点,具有重要的意义。首先,在对现有云安全形势分析的基础上,通过新兴的内生安全概念探索云数据中心的安全架构、关键技术和实现方法,期望利用拟态构造设计解决现有防护手段难以处理的漏洞、后门等内生安全问题。其次,提出了一种云数据中心内生安全架构与相关关键技术实现构想,同时给出了现有云平台系统拟态化改造的模式与技术趋势。未来,基于拟态架构的内生安全云数据中心或将为新一代信息基础设施建设提供有效的安全解决方案,进而加速云化服务模式的应用与推广。  相似文献   

13.
Cloud service providers offer infrastructure, network services, and software applications in the cloud. The cloud services are hosted in a data center that can be used by users with the help of network connectivity. Hence, there is a need for providing security and integrity in cloud resources. Most security instruments have a finite rate of failure, and the intrusion comes with more complex and sophisticated techniques; the security failure rates are skyrocketing. In this paper, we have proposed a secure disintegration protocol (SDP) for the protection of privacy on-site and in the cloud. The architecture presented in this paper is used for cloud storage, and it is used in conjunction with our unique data compression and encoding technique. Probabilistic analysis is used for calculating the intrusion tolerance abilities for the SDP.  相似文献   

14.
云的垂直结构(CVS)是云的重要特征量,在大气模式的研究中有着有着十分重要的影响。利用CALIPSO(Cloud Aerosol Lidar and Infrared Pathfinder Satellite Observations)星载激光雷达2007年到2010年间的Level 2 Version 3的云数据对中国海及其周边海域的云的垂直结构及其分布随年度和区域的变化进行了统计分析。结果表明:层数不同的云在研究区域内发生的概率(COF)差别较大,云顶海拔高度(LTA)不同的云沿纬度方向的分布差异明显,LTA在10 km到20 km的云出现的概率较高而且大多出现于靠近赤道区域。由于有些云CALIPSO信号不能穿透,可能使云层数以及云顶高度的统计结果偏小。  相似文献   

15.
Cloud computing is a new network computing paradigm based on IP architecture, and its potential lies in new ICT business applications. For the majority of operators and enterprises, the main task associated with cloud computing is next generation data center transformation. This will ensure cloud computing becomes more widespread among enterprises, institutions, organizations, and operators. Cloud computing not only provides traditional IT resource usage and application services, but also supports full resource usage and application services such as IT, communications, video, mobile, and Internet of Things using a converged network infrastructure. Key cloud computing technologies include unified fabric, unified virtualization, and unified computing system. The formation of an open industry alliance and promotion of open technology standards will be critical for the future development of cloud computing.  相似文献   

16.
Cloud computing services delivery and consumption model is based on communication infrastructure (network). The network serves as a linkage between the end‐users consuming cloud services and the providers of data centers providing the cloud services. In addition, in large‐scale cloud data centers, tens of thousands of compute and storage nodes are connected by a data center network to deliver a single‐purpose cloud service. To this end, some questions could be raised, such as the following: How do network architectures affect cloud computing? How will network architecture evolve to support better cloud computing and cloud‐based service delivery? What is the network's role in reliability, performance, scalability, and security of cloud computing? Should the network be a dumb transport pipe or an intelligent stack that is cloud workload aware? This paper focuses on the networking aspect in cloud computing and shall provide insights to these questions. Researchers can use this paper to accelerate their research on devising mechanisms for the following: (i) provisioning cloud network as a service and (ii) engineering network of data centers. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

17.
With the rapid growth of the Security‐as‐a‐Service market, concerns about privacy in exposing customer security policies to Cloud Service Providers have become critical. To resolve these issues, several solutions have been proposed over the past few years, each for a different kind of security service. However, as the number of security services outsourced into a cloud continues to grow, the need for a unified solution has become significant. This article introduces and presents a universal privacy‐preserving platform for SecaaS services that is based on a hybrid cloud architecture for maintaining the confidentiality of the customer's security policy. It is shown that this platform can be applied to all security services whose security policies can be represented in the form of a decision tree. This includes the vast majority of existing cloud‐based security services. With the small number of computationally‐expensive operations performed in a private cloud, the solution also does not require the implementation of a performant security engine on the customer's premises, allowing full advantage to be taken of private cloud offloading. It is also shown that the platform achieves better performance results than other existing solutions of this type. These findings were confirmed by experimental results.  相似文献   

18.
卢宏 《移动信息》2023,45(10):141-143
移动互联网(Mobile Internet)是以移动设备为核心,融合了互联网和移动通信技术的一种计算机技术,是当今信息科技发展的热点之一。而云计算(Cloud Computing)作为一种高效、灵活、节能的计算模式,是当前信息化建设的重要技术手段之一。移动互联网与云计算的结合,可以为用户提供更多、更丰富的服务,提高信息处理的效率和质量。然而,移动互联网中的云计算也面临着安全问题,如何构建安全、可靠的云计算安全架构,成了一个亟待解决的问题。  相似文献   

19.
云计算概念、模型和关键技术   总被引:4,自引:0,他引:4  
云计算指IP技术架构下的网络计算,其本质是ICT业务的一种新的应用方式。绝大数企业和运营商的数据中心的改造将是云计算未来发展的主要任务:使云计算技术更为普遍和更为广泛地为绝大部分企业、机构、团体和运营商服务。云计算技术将不仅提供传统意义的IT资源和应用服务,而且将支持包括IT、通信、电视、移动和物联等一切互联网技术融合后的资源使用和业务应用。云计算发展的关键技术主要有统一交换构架、统一虚拟化和统一计算系统,云计算发展的战略推手将是组建开放产业联盟和推动开放技术标准。  相似文献   

20.
Cloud storage services require cost‐effective, scalable, and self‐managed secure data management functionality. Public cloud storage always enforces users to adopt the restricted generic security consideration provided by the cloud service provider. On the contrary, private cloud storage gives users the opportunity to configure a self‐managed and controlled authenticated data security model to control the accessing and sharing of data in a private cloud. However, this introduces several new challenges to data security. One critical issue is how to enable a secure, authenticated data storage model for data access with controlled data accessibility. In this paper, we propose an authenticated controlled data access and sharing scheme called ACDAS to address this issue. In our proposed scheme, we employ a biometric‐based authentication model for secure access to data storage and sharing. To provide flexible data sharing under the control of a data owner, we propose a variant of a proxy reencryption scheme where the cloud server uses a proxy reencryption key and the data owner generates a credential token during decryption to control the accessibility of the users. The security analysis shows that our proposed scheme is resistant to various attacks, including a stolen verifier attack, a replay attack, a password guessing attack, and a stolen mobile device attack. Further, our proposed scheme satisfies the considered security requirements of a data storage and sharing system. The experimental results demonstrate that ACDAS can achieve the security goals together with the practical efficiency of storage, computation, and communication compared with other related schemes.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号