首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 89 毫秒
1.
2.
Editor's Desk: In the preceding two parts of this series, several aspects of cloud computing-including definition, classification, characteristics, typical applications, and service levels-were discussed. This part continues with a discussion of Cloud Computing Oopen Architecture and Market-Oriented Cloud. A comparison is made between cloud computing and other distributed computing technologies, and Google's cloud platform is analyzed to determine how distributed computing is implemented in its particular model.  相似文献   

3.
Internet of Vehicles(IoV)is a new style of vehicular ad hoc network that is used to connect the sensors of each vehicle with each other and with other vehicles’sensors through the internet.These sensors generate different tasks that should be analyzed and processed in some given period of time.They send the tasks to the cloud servers but these sending operations increase bandwidth consumption and latency.Fog computing is a simple cloud at the network edge that is used to process the jobs in a short period of time instead of sending them to cloud computing facilities.In some situations,fog computing cannot execute some tasks due to lack of resources.Thus,in these situations it transfers them to cloud computing that leads to an increase in latency and bandwidth occupation again.Moreover,several fog servers may be fuelled while other servers are empty.This implies an unfair distribution of jobs.In this research study,we shall merge the software defined network(SDN)with IoV and fog computing and use the parked vehicle as assistant fog computing node.This can improve the capabilities of the fog computing layer and help in decreasing the number of migrated tasks to the cloud servers.This increases the ratio of time sensitive tasks that meet the deadline.In addition,a new load balancing strategy is proposed.It works proactively to balance the load locally and globally by the local fog managers and SDN controller,respectively.The simulation experiments show that the proposed system is more efficient than VANET-Fog-Cloud and IoV-Fog-Cloud frameworks in terms of average response time and percentage of bandwidth consumption,meeting the deadline,and resource utilization.  相似文献   

4.
In 2010, cloud computing gained momentum.Cloud computing is a model for real-time, on-demand, pay-for-use network access to a shared pool of configurable computing and storage resources.It has matured from a promising business concept to a working reality in both the private and public IT sectors.The U.S.government, for example, has requested all its agencies to evaluate cloud computing alternatives as part of their budget submissions for new IT investment.  相似文献   

5.
MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing   总被引:1,自引:0,他引:1  
As a new computing mode, cloud computing can provide users with virtualized and scalable web services, which faced with serious security challenges, however. Access control is one of the most important measures to ensure the security of cloud computing. But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing. In cloud computing environment, only when the security and reliability of both interaction parties are ensured, data security can be effectively guaranteed during interactions between users and the Cloud. Therefore, building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment. Combining with Trust Management(TM), a mutual trust based access control (MTBAC) model is proposed in this paper. MTBAC model take both user's behavior trust and cloud services node's credibility into consideration. Trust relationships between users and cloud service nodes are established by mutual trust mechanism. Security problems of access control are solved by implementing MTBAC model into cloud computing environment. Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.  相似文献   

6.
Computation Partitioning in Mobile Cloud Computing: A Survey   总被引:1,自引:0,他引:1  
Mobile devices are increasingly interacting with clouds,and mobile cloud computing has emerged as a new paradigm.An central topic in mobile cloud computing is computation partitioning,which involves partitioning the execution of applications between the mobile side and cloud side so that execution cost is minimized.This paper discusses computation partitioning in mobile cloud computing.We first present the background and system models of mobile cloud computation partitioning systems.We then describe and compare state-of-the-art mobile computation partitioning in terms of application modeling,profiling,optimization,and implementation.We point out the main research issues and directions and summarize our own works.  相似文献   

7.
Since the raising of the cloud computing, the applications of web service have been extended rapidly. However, the data centers of cloud computing also cause the problem of power consumption and the resources usually have not been used effectively. Decreasing the power consumption and enhancing resource utilization become main issues in cloud computing environment. In this paper, we propose a method, called MBFDP (modified best fit decreasing packing), to decrease power consumption and enhance resource utilization of cloud computing servers. From the results of experiments, the proposed solution can reduce power consumption effectively and enhance the utilization of resources of servers. 1  相似文献   

8.
We have witnessed the fast-growing deployment of Hadoop,an open-source implementation of the MapReduce programming model,for purpose of data-intensive computing in the cloud.However,Hadoop was not originally designed to run transient jobs in which us ers need to move data back and forth between storage and computing facilities.As a result,Hadoop is inefficient and wastes resources when operating in the cloud.This paper discusses the inefficiency of MapReduce in the cloud.We study the causes of this inefficiency and propose a solution.Inefficiency mainly occurs during data movement.Transferring large data to computing nodes is very time-con suming and also violates the rationale of Hadoop,which is to move computation to the data.To address this issue,we developed a dis tributed cache system and virtual machine scheduler.We show that our prototype can improve performance significantly when run ning different applications.  相似文献   

9.
Mobile search is beset with problems because of mobile terminal constraints and also because its characteristics are different from the traditional Internet search model. This paper analyzes cloud computing technologies-especially mass data storage, parallel computing, and virtualization-in an attempt to solve technical problems in mobile search. The broad prospects of cloud computing are also discussed.  相似文献   

10.
Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services.Transparency and accountability for data managed in the cloud is necessary.Specifically,when using a cloudhost service,a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data.This is a multi-party system.Three particular trust models can be used according to the credibility of these providers.This pa per describes techniques for preventing data leakage that can be used with these different models.  相似文献   

11.
Analysis of Hot Topics in Cloud Computing   总被引:1,自引:0,他引:1  
In the field of cloud computing, topics such as computing resource virtualization, differences between grid and cloud computing, relationship between high-performance computers and cloud computing centers, and cloud security and standards have attracted much research interest. This paper analyzes these topics and highlights that resource virtualization allows information services to be scalable, intensive, and specialized; grid computing involves using many computers for large-scale computing tasks, while cloud computing uses one platform for multiple services; high-performance computers may not be suitable for a cloud computing; security in cloud computing focuses on trust management between service suppliers and users; and based on the existing standards,standardization of cloud computing should focus on interoperability between services.  相似文献   

12.
云计算的出现给IT领域带来了一场新的变革,今年是云计算发展非常重要的一年。随着全球对云计算研究的热潮,国际国内各大IT公司相继推出自己的云计算产品,这些云计算产品无一例外都是通过网络向用户提供服务的,这样对数据安全、可靠性和云计算服务自身的健壮性存在着挑战。随着云计算广泛的应用,传统的软件架构也将受到挑战,特别是在3层软件架构中的数据服务层将发生变化。  相似文献   

13.
云计算热点问题分析   总被引:6,自引:0,他引:6  
在云计算的研究和应用中一些热点问题比较突出,如:如何理解计算资源及其虚拟化、云计算与网格计算的差异、云计算中心与高性能计算机的关系、云安全和云标准等。文章对此给出了一些见解:计算资源的虚拟化促使信息服务走向规模化、集约化和专业化;网格计算是"多为一",而云计算是"一为多";部署于高性能计算中心的高性能计算机未必适合云计算;云安全已经将传统安全问题发展为服务方和被服务方之间的信任和信任管理问题;在现有标准的基础上,云计算标准将需更加关注服务的互操作等。  相似文献   

14.
伍虎  唐彦 《数字通信》2012,39(2):10-13
分析了云计算发展的4个阶段:电厂模式、效用计算、网格计算和云计算,指出云计算的发展有微电子工业技术、计算技术、通信技术、虚拟技术、Web技术、智能终端技术等7大关键技术支撑。分析了云计算将对云产业链各个环节带来的变革。得出结论:云计算的发展是一个不断积累和演变的过程,云计算大规模经营时代已经到来。  相似文献   

15.
网格计算及分布式计算、并行计算发展到一定阶段后衍生出了云计算。云计算是上述计算方法的商业实现。云计算是一种新型的计算模型,其基础体系结构属于云计算的技术层次,主要说明系统属性和设计思想;云计算的服务集合源于服务类型,说明能带给客户什么。云计算的核心技术有数据存储技术、数据管理技术、编程模型和云安全。云计算的应用范围和领域也十分广泛。  相似文献   

16.
针对移动互联网时代日益发展带来的安全性问题,在既要满足服务的多样性,又要满足服务安全性的双重使命下,如何构建移动互联网云计算时代开放安全的云服务,文中提出了一种开放的安全服务体系。同时,基于开发安全服务体系的各种技术特征,设计并构建了一个云服务平台架构,可以提供能力开放应用云、企业安全私有应用云和认证鉴权公共应用云。  相似文献   

17.
毛矛 《电声技术》2017,41(3):54-56
当前云计算在各领域中的应用越来越广泛,其理念的优越性可以提供强大计算能力和庞大的存储能力,系统的运行更加稳定,成本更低。云计算标准化了计算机的使用与管理过程,中小企业可以将精力更加专注于业务,以购买服务的方式进行IT资源的使用;大企业可以构建自己的私有云平台,灵活定制自身的业务,自由使用更加稳定的IT资源。广播系统也在积极的部署私有云平台,强化广播的内容制作、内容发布、和平台运营能力。但是在监控领域,广播的监控系统构架还可以通过灵活利用云计算技术继续加强,以满足广播向新媒体转型的发展需要。不讨论云计算的实现技术,主要探讨云计算在广播监控系统中的应用,分析利用云计算技术构建广播监控系统,重点阐述其系统构架和数据分析方法,体现云计算技术在监控领域的优势所在。  相似文献   

18.
随着云计算技术及应用的快速发展与普及,云计算安全也越来越受到业界的关注。从云计算技术对电信行业的影响出发,介绍了电信运营商云计算应用的发展现状及应用特点,进一步分析了运营商在开展云计算应用过程中面临的主要安全挑战和发展机遇,并在此基础上介绍了电信运营商云计算应用安全防护体系和云安全实践案例,最后,文章对云计算安全的未来发展进行了展望。  相似文献   

19.
为推动云计算战略在中国移动的有效落地,中国移动广东公司积极开展云计算应用的研究与验证,并形成了一系列应用成果。本文首先介绍了广东移动对云计算技术应用的整体规划,然后具体讲述广东移动对云计算技术的相关应用实践,包括在虚拟化资源池、终端桌面云以及分布式云计算等领域的应用成果,并对实践经验和应用效果进行了总结,最后对广东移动云计算技术应用的进一步发展和演进进行了展望。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号