• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 769
  • 220
  • 122
  • 62
  • 54
  • 33
  • 32
  • 29
  • 28
  • 20
  • 15
  • 14
  • 9
  • 9
  • 7
  • Tagged with
  • 1583
  • 1583
  • 384
  • 276
  • 240
  • 238
  • 238
  • 236
  • 231
  • 222
  • 213
  • 208
  • 174
  • 171
  • 151
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

An Overview of Virtualization Technologies for Cloud Computing

Chen, Wei-Min 07 September 2012 (has links)
Cloud computing is a new concept that incorporates many existing technologies, such as virtualization. Virtualization is important for the establishment of cloud computing. With virtualization, cloud computing can virtualize the hardware resources into a huge resource pool for users to utilize. This thesis begins with an introduction to how a widely used service model classifies cloud computing into three layers. From the bottom up, they are IaaS, PaaS, and SaaS. Some service provides are taken as examples for each service model, such as Amazon Beanstalk and Google App Engine for PaaS; Amazon CloudFormation and Microsoft mCloud for IaaS. Next, we turn our discussion to the hypervisors and the technologies for virtualizing hardware resources, such as CPUs, memory, and devices. Then, storage and network virtualization techniques are discussed. Finally, the conclusions and the future directions of virtualization are drawn.
12

Lightweight task mobility support for elastic cloud computing

Ma, Ka-kui., 馬家駒. January 2011 (has links)
Cloud computing becomes popular nowadays. It allows applications to use the enormous resources in the clouds. With the combination of mobile computing, mobile cloud computing is evolved. With the use of clouds, mobile applications can offload tasks to clouds in client-server model. For cloud computing, migration is an important function for supporting elasticity. Lightweight and portable task migration support allows better resource utilization and data access locality, which are essentials for the success of cloud computing. Various migration techniques are available, such as process migration, thread migration, and virtual machine live migration. However, for these existing migration techniques, migrations are too coarse-grained and costly, and this offsets the benefits from migration. Besides, the migration path is monotonic, and mobile and clouds resources cannot be utilized. In this study, we propose a new computation migration technique called stack-on-demand (SOD). This technique is based on the stack structure of tasks. Computation migration is carried out by exporting parts of the execution state to achieve lightweight and flexible migration. Compared to traditional task migration techniques, SOD allows lightweight computation migration. It allows dynamic execution flows in a multi-domain workflow style. With its lightweight feature, tasks of a large process can be migrated from clouds to small-capacity devices, such as iPhone, in order to use the unique resources, such as photos, found in the devices. In order to support its lightweight feature, various techniques have been introduced. To allow efficient access to remote objects in task migration, we propose an object faulting technique for efficient detection of remote objects. This technique avoids the checking of object status. To allow portable, lightweight application-level migration, asynchronous migration technique and twin method hierarchy instrumentation technique are proposed. This allows lightweight task migration from mobile device to cloud nodes, and vice versa. We implement the SOD concept as a middleware in a mobile cloud environment to allow transparent execution migration of Java programs. It has shown that SOD migration cost is pretty low, comparing to several existing migration mechanisms. We also conduct experiments with mobile devices to demonstrate the elasticity of SOD, in which server-side heavyweight processes can run adaptively on mobile devices to use the unique resources in the devices. On the other hand, mobile devices can seamlessly offload tasks to the cloud nodes to use the cloud resources. In addition, the system has incorporated a restorable communication layer, and this allows parallel programs to communicate properly with SOD migration. / published_or_final_version / Computer Science / Doctoral / Doctor of Philosophy
13

Cloud-assisted multimedia content delivery

Wu, Yu, 吴宇 January 2013 (has links)
Cloud computing, which is among the trendiest computing paradigms in recent years, is believed to be most suitable for supporting network-centric applications by providing elastic amounts of bandwidth for accessing a wide range of resources on the y. In particular, geo-distributed cloud systems are widely in construction nowadays. They span multiple data centers at different geographical locations, thus offering many advantages to large-scale multimedia applications because of the abundance of on-demand storage/bandwidth capacities and their geographical proximity to different groups of users. In this thesis, we investigate the common fundamental challenges in how to efficiently leverage the power of cloud resources to facilitate multimedia content delivery in various modern real world applications, from different perspectives. First, from the perspective of application providers, we propose tractable procedures for both model analysis and system designs of supporting representative large scale multimedia applications in a cloud system, i.e., VoD streaming applications and social media applications, respectively. We further verify the effectiveness of these algorithms and the feasibility of their deployment under dynamic realistic settings in real-life cloud systems. Second, from the perspective of end users, we target our focus at mobile users. The rapidly increasing power of personal mobile devices, dwarfing even high-end devices, is providing much richer contents and social interactions to users on the move, and many more challenging applications are on the horizon. We explore the tough challenges of how to effectively exploit cloud resources to facilitate mobile services by introducing two cloud-assisted mobile systems (i.e., CloudMoV and vSky-Conf), and explain in details their design philosophies and implementation. Finally, from the perspective of the cloud providers, we realize existing data center networks lack the flexibility to support many core services, given our hands-on experiences from working with public cloud systems. One of the specific problem is, “bulk data transfers across geo-distributed datacenters". After formulating a novel and well-formed optimization model for treating the data migration problem, we design and implement a Delay Tolerant Migration (DTM) system based on the Beacon platform and standard OpenFlow APIs. The system realizes a reliable Datacenter to Datacenter (D2D) network by applying the software defined networking (SDN) paradigm. Real-world experiments under realistic network traffic demonstrate the efficiency of the design. / published_or_final_version / Computer Science / Doctoral / Doctor of Philosophy
14

Efficient Transaction Processing for Short-Lived Transactions in the Cloud

Choy, Sharon January 2013 (has links)
The cloud, in the past few years, has become the preferred platform for hosting web applications. Many of these web applications store their data in a distributed cloud storage system, which greatly simplifies application development and provides increased availability and reliability. However, with increasing user demand for web applications, these cloud storage systems often become the performance bottleneck. To address the cloud's performance demands, many storage system features, such as strong consistency and transactional support, are often omitted in favour of performance. Nonetheless, transactions remain necessary to ensure data integrity and application correctness. In this thesis, we introduce CrossStitch, which is an efficient transaction processing framework for distributed key-value storage systems. CrossStitch supports general transactions, where transactions include both computation and key accesses. It is specifically optimized for short-lived transactions that are typical of cloud-deployed web applications. In CrossStitch, a transaction is partitioned into a series of components that form a transaction chain. These components are executed and the transaction is propagated along the storage servers instead of being executed on the application server. This chained structure, in which servers only communicate with their immediate neighbours, enables CrossStitch to implement a pipelined version of two-phase commit to ensure transactional atomicity. CrossStitch is able to eliminate a significant amount of setup overhead using this structure by executing the transaction and the atomic commit protocol concurrently. Therefore, CrossStitch provides low latency and efficient transactional support for cloud storage systems. Our evaluation demonstrates that CrossStitch is a scalable and efficient transaction processing framework for web transactions.
15

Impacts sécuritaires de l’adoption du cloud computing dans les petites et moyennes entreprises

Bouaynaya, Wafa 07 December 2017 (has links)
Ce travail doctoral s’intéresse aux impacts sécuritaires de l’usage du cloud computing dans les petites et moyennes entreprises (PME). Il repose sur une méthodologie de recherche mixte, à la fois qualitative et quantitative, en adoptant une posture épistémologique orientée réalisme critique (Mingers, 2002,2004). Son objectif est de mettre en lumière les éléments d’une théorie d’explication et de prédiction (Gregor, 2006) de la portée sécuritaire de l’adoption du cloud computing dans les petites et moyennes entreprises. Les résultats de notre recherche se matérialisent au travers la présentation et la publication de quatre travaux académiques : Un premier article publié (un modèle d’acheminement des données depuis les PME vers ses fournisseurs cloud potentiels), deux articles acceptés pour publication (un modèle du transfert des risques SI dans un écosystème cloud computing, une mise en lumière de la délégation du rôle du DSI) et un dernier article en cours d’évaluation (la caractérisation de la réversibilité d’un service cloud). La thèse contribue à une meilleure compréhension des conséquences sécuritaires inter- et intra-organisationnelles, entre autres à travers la mobilisation des théories de la firme et la modélisation mathématique. Elle propose, en outre, un nouveau coefficient d’estimation de la concordance pour des hypothèses indépendantes, / This doctoral work focuses on security impacts of the cloud computing use in SMEs. It is elaborated through a mixed research methodology by adopting a critical realism position (Mingers, 2002, 2004). Its objective is to implement a theory of explanation and prediction (Gregor, 2006) applied to the safe scope of the cloud computing adoption in small and medium enterprises. The results of our research are materialized through the publication of an article (a model of data transmission from SMEs to its potential cloud suppliers) two articles accepted for publication (a model of the transfer of risks SI in a cloud computing ecosystem, highlighting the delegation of the role of the CIO) and an article under evaluation (the characterization of the reversibility of a cloud service). The thesis contributes to a better understanding of the inter- and intra-organizational security consequences, among others through the mobilization of firm theories and the mathematical modeling. It also proposes a new coefficient of agreement estimation for independent assumptions.
16

Accounting for stewardship in the cloud

Duncan, Robert A. K. January 2016 (has links)
Managing information security in the cloud is a challenge. Traditional checklist approaches to standards compliance might well provide compliance, but may not provide adequate security assurance. The complexity of cloud relationships must be acknowledged and explicitly managed by recognising the implications of the self-interest of each party involved. We develop a conceptual modelling framework for cloud security assurance that can be used as a starting point for achieving effective continuous security assurance, together with a high level of compliance.
17

Rozšíření SOA do platformy cloud computing / Rozšíření SOA do platformy Cloud Computing

Qylafku, Denis January 2010 (has links)
The aim of my diploma thesis is to introduce cloud computing as an alternative to traditional internal information technology and its benefits for a company. Diploma thesis focuses on three main goals. The first one concerns advantages and disadvantages of cloud computing in comparison to internal information technology. The second one is identification of possible processes and services available for migration into cloud computing. The third goal of the diploma thesis is development of investment analysis which compares not only initial costs on internal information technology and cloud computing, but also costs of both variants within three years. The main contribution of the diploma thesis is to define whether the cloud computing is economically beneficial for the company or not. The argument for categorizing cloud computing is in the reason that the company does not have to use all services within the cloud computing but only these, which the company considers as the most beneficial from cost and operation point of view. Another contribution of the diploma thesis is deployment of data, services and processes into a chosen cloud computing platform. Investment analysis allows through cost comparison of both options understand whether it is more beneficial to choose cloud computing or internal Information Technology platform. During this decision making the company also considers its business character and the fact whether the company operates locally or globally.
18

Approaches to Provisioning Network Topology of Virtual Machines in Cloud Systems

Shafaatdoost, Mani 16 November 2012 (has links)
The current infrastructure as a service (IaaS) cloud systems, allow users to load their own virtual machines. However, most of these systems do not provide users with an automatic mechanism to load a network topology of virtual machines. In order to specify and implement the network topology, we use software switches and routers as network elements. Before running a group of virtual machines, the user needs to set up the system once to specify a network topology of virtual machines. Then, given the user’s request for running a specific topology, our system loads the appropriate virtual machines (VMs) and also runs separated VMs as software switches and routers. Furthermore, we have developed a manager that handles physical hardware failure situations. This system has been designed in order to allow users to use the system without knowing all the internal technical details.
19

Video file distribution among geo-distributed cloud servers

He, Jingzhu 02 September 2016 (has links)
With the emergence of cloud computing, many applications are migrated onto clouds. Video-on-demand (VoD) can be implemented on the cloud platform with geo-distributed cloud servers to serve worldwide users. New videos are distributed to these geo-distributed cloud servers. This distribution should be properly scheduled based on the videos' sizes, videos' popularities and the available network bandwidth, so that the mean completion time is minimized. We formulate this problemas a preemptive scheduling problem, prove that it is NP-hard, and design a heuristic scheduling algorithm to solve it. This algorithm iteratively determines: 1) themost preferred file to be received by the most preferred destination server by pairwise analysis and PageRank, and 2) the most preferred source servers which can transmit this file to the most preferred destination server with appropriate data rates. The simulation results demonstrate that the proposed scheduling algorithm gives much smaller mean completion time than four scheduling algorithms.
20

The adoption of cloud-based Software as a Service (SaaS): a descriptive and empirical study of South African SMEs

Maserumule, Mabuke Dorcus 31 October 2019 (has links)
A research report submitted to the Faculty of Commerce, Law and Management, University of the Witwatersrand, Johannesburg, in partial fulfilment of the requirements for the degree of Master of Commerce by (MCom) in the field of Information Systems, 2019 / The purpose of this study was to describe the state of cloud-based software (SaaS) adoption among South African SMEs and to investigate the factors affecting their adoption of SaaS solutions. The technological, organisational and environmental (TOE) factors influencing cloud-based software adoption within SMEs were identified through a review of existing TOE literature. In addition, institutional theory and diffusion of innovation theory were also used to underpin the study. A research model hypothesising the outcome of the identified TOE factors on the adoption of cloud-based software was developed and tested. Specifically, factors hypothesised to influence SaaS adoption were compatibility, security concern, top management support and coercive pressures. This study employed a relational, quantitative research approach. A structured questionnaire was developed and administered as an online survey. Data was collected from a sample of 134 small and medium enterprises (SMEs) that provided usable responses. The collected data was used to firstly describe the state of adoption. Secondly, the extent to which various TOE factors impact on adoption was examined through the use of multiple regression. It was found that compatibility, security concern, top management support and coercive pressures influence adoption while trust, cost, relative advantage, complexity, geographic dispersion, normative and mimetic pressures did not have significant effects. This study adds value to the Information Systems literature as it uses the TOE framework alongside institutional theory and diffusion of innovation theory to explain the adoption of cloud-based software solutions by South African SMEs. This study provides information on the current state of adoption for cloud-based software within SMEs in South Africa. Organisations can also learn about the factors contributing to this adoption. Organisations can also be informed that for adoption to be successful, technological, organisational and environmental factors must be taken into consideration. Results assist organisations wanting to implement cloud-based software solutions. Specifically, results provide a benchmark for SMEs on where their organisations stand compared to other organisations with regards to SaaS adoption (for example whether they are lagging behind, they are on par, or whether they are innovators). This could inform their IT procurement decisions, e.g. to consider whether cloud-based software solutions are strategic and necessary to keep abreast with peers and competitors. / PH2020

Page generated in 0.0975 seconds