Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (220)
  • Open Access

    ARTICLE

    Container Introspection: Using External Management Containers to Monitor Containers in Cloud Computing

    Dongyang Zhan1,*, Kai Tan1, Lin Ye1,2, Haining Yu1,3, Hao Liu4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3783-3794, 2021, DOI:10.32604/cmc.2021.019432

    Abstract Cloud computing plays an important role in today's Internet environment, which meets the requirements of scalability, security and reliability by using virtualization technologies. Container technology is one of the two mainstream virtualization solutions. Its lightweight, high deployment efficiency make container technology widely used in large-scale cloud computing. While container technology has created huge benefits for cloud service providers and tenants, it cannot meet the requirements of security monitoring and management from a tenant perspective. Currently, tenants can only run their security monitors in the target container, but it is not secure because the attacker is able to detect and compromise… More >

  • Open Access

    ARTICLE

    Enhanced Trust Based Access Control for Multi-Cloud Environment

    N. R. Rejin Paul1,*, D. Paul Raj2

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3079-3093, 2021, DOI:10.32604/cmc.2021.018993

    Abstract Security is an essential part of the cloud environment. For ensuring the security of the data being communicated to and from the cloud server, a significant parameter called trust was introduced. Trust-based security played a vital role in ensuring that the communication between cloud users and service providers remained unadulterated and authentic. In most cloud-based data distribution environments, emphasis is placed on accepting trusted client users’ requests, but the cloud servers’ integrity is seldom verified. This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue. The proposed methodology… More >

  • Open Access

    ARTICLE

    Task Scheduling Optimization in Cloud Computing Based on Genetic Algorithms

    Ahmed Y. Hamed1,*, Monagi H. Alkinani2

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3289-3301, 2021, DOI:10.32604/cmc.2021.018658

    Abstract Task scheduling is the main problem in cloud computing that reduces system performance; it is an important way to arrange user needs and perform multiple goals. Cloud computing is the most popular technology nowadays and has many research potential in various areas like resource allocation, task scheduling, security, privacy, etc. To improve system performance, an efficient task-scheduling algorithm is required. Existing task-scheduling algorithms focus on task-resource requirements, CPU memory, execution time, and execution cost. In this paper, a task scheduling algorithm based on a Genetic Algorithm (GA) has been presented for assigning and executing different tasks. The proposed algorithm aims… More >

  • Open Access

    ARTICLE

    Cloud Data Center Selection Using a Modified Differential Evolution

    Yousef Sanjalawe1,2, Mohammed Anbar1,*, Salam Al-E’mari1, Rosni Abdullah1, Iznan Hasbullah1, Mohammed Aladaileh1

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3179-3204, 2021, DOI:10.32604/cmc.2021.018546

    Abstract The interest in selecting an appropriate cloud data center is exponentially increasing due to the popularity and continuous growth of the cloud computing sector. Cloud data center selection challenges are compounded by ever-increasing users’ requests and the number of data centers required to execute these requests. Cloud service broker policy defines cloud data center’s selection, which is a case of an NP-hard problem that needs a precise solution for an efficient and superior solution. Differential evolution algorithm is a metaheuristic algorithm characterized by its speed and robustness, and it is well suited for selecting an appropriate cloud data center. This… More >

  • Open Access

    ARTICLE

    Monarch Butterfly Optimization for Reliable Scheduling in Cloud

    B. Gomathi1, S. T. Suganthi2,*, Karthikeyan Krishnasamy3, J. Bhuvana4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3693-3710, 2021, DOI:10.32604/cmc.2021.018159

    Abstract Enterprises have extensively taken on cloud computing environment since it provides on-demand virtualized cloud application resources. The scheduling of the cloud tasks is a well-recognized NP-hard problem. The Task scheduling problem is convoluted while convincing different objectives, which are dispute in nature. In this paper, Multi-Objective Improved Monarch Butterfly Optimization (MOIMBO) algorithm is applied to solve multi-objective task scheduling problems in the cloud in preparation for Pareto optimal solutions. Three different dispute objectives, such as makespan, reliability, and resource utilization, are deliberated for task scheduling problems.The Epsilon-fuzzy dominance sort method is utilized in the multi-objective domain to elect the foremost… More >

  • Open Access

    ARTICLE

    A Multi-Objective Secure Optimal VM Placement in Energy-Efficient Server of Cloud Computing

    Sangeetha Ganesan*, Sumathi Ganesan

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 387-401, 2021, DOI:10.32604/iasc.2021.019024

    Abstract Cloud Computing has been economically famous for sharing the resources of third-party applications. There may be an increase in the exploitation of the prevailing Cloud resources and their vulnerabilities as a result of the aggressive growth of Cloud Computing. In the Cache Side Channel Attack (CSCA), the attackers can leak sensitive information of a Virtual Machine (VM) which is co-located in a physical machine due to inadequate logical isolation. The Cloud Service Provider (CSP) has to modify either at the hardware level to isolate their VM or at the software, level to isolate their applications. The hardware isolation requires changes… More >

  • Open Access

    ARTICLE

    Resource Management and Task Offloading Issues in the Edge–Cloud Environment

    Jaber Almutairi1, Mohammad Aldossary2,*

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 129-145, 2021, DOI:10.32604/iasc.2021.018480

    Abstract With the increasing number of Internet of Things (IoT) devices connected to the internet, a platform is required to support the enormous amount of data they generate. Since cloud computing is far away from the connected IoT devices, applications that require low-latency, real-time interaction and high quality of service (QoS) may suffer network delay in using the Cloud. Consequently, the concept of edge computing has appeared to complement cloud services, working as an intermediate layer with computation capabilities between the Cloud and IoT devices, to overcome these limitations. Although edge computing is a promising enabler for issues related to latency… More >

  • Open Access

    ARTICLE

    Packet Optimization of Software Defined Network Using Lion Optimization

    Jagmeet Kaur1, Shakeel Ahmed2, Yogesh Kumar3, A. Alaboudi4, N. Z. Jhanjhi5, Muhammad Fazal Ijaz6,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2617-2633, 2021, DOI:10.32604/cmc.2021.017470

    Abstract There has been an explosion of cloud services as organizations take advantage of their continuity, predictability, as well as quality of service and it raises the concern about latency, energy-efficiency, and security. This increase in demand requires new configurations of networks, products, and service operators. For this purpose, the software-defined network is an efficient technology that enables to support the future network functions along with the intelligent applications and packet optimization. This work analyzes the offline cloud scenario in which machines are efficiently deployed and scheduled for user processing requests. Performance is evaluated in terms of reducing bandwidth, task execution… More >

  • Open Access

    ARTICLE

    Negotiation Based Combinatorial Double Auction Mechanism in Cloud Computing

    Zakir Ullah1, Asif Umer1, Mahdi Zaree2, Jamil Ahmad1, Faisal Alanazi3,*, Noor Ul Amin1, Arif Iqbal Umar1, Ali Imran Jehangiri1, Muhammad Adnan1

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2123-2140, 2021, DOI:10.32604/cmc.2021.015445

    Abstract Cloud computing is a demanding business platform for services related to the field of IT. The goal of cloud customers is to access resources at a sustainable price, while the goal of cloud suppliers is to maximize their services utilization. Previously, the customers would bid for every single resource type, which was a limitation of cloud resources allocation. To solve these issues, researchers have focused on a combinatorial auction in which the resources are offered by the providers in bundles so that the user bids for their required bundle. Still, in this allocation mechanism, some drawbacks need to be tackled,… More >

  • Open Access

    ARTICLE

    Investigating the Role of Trust Dimension as a Mediator on CC-SaaS Adoption

    Hiba Jasim Hadi*, Mohd Adan Omar, Wan Rozaini Sheik Osman

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 373-386, 2021, DOI:10.32604/iasc.2021.018207

    Abstract The public sector of Iraq has been struggling from poor management of resources and numerous difficulties that affect its governmental organization’s development, such as financial issues resulting from corruption, insecurity, and the lack of IT resources and infrastructure. Thus, cloud computing Software as a Service (CC-SaaS) can be a useful solution to help governmental organizations increase their service efficiency through the adoption of low-cost technology and provision of better services. The adoption of CC-SaaS remains limited in Iraqi public organizations due to numerous challenges, including privacy and protection, legal policy, and trust. Trust was found to be an effective facilitator… More >

Displaying 141-150 on page 15 of 220. Per Page