scholarly journals How Much Energy Can Green HPC Cloud Users Save?

Author(s):  
David Guyon ◽  
Anne-Cecile Orgerie ◽  
Chrtistine Morin ◽  
Deb Agarwal
Keyword(s):  
Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


Author(s):  
Yuvaraj Natarajan ◽  
Srihari Kannan ◽  
Gaurav Dhiman

Background: Cloud computing is a multi-tenant model for computation that offers various features for computing and storage based on user demand. With increasing cloud users, the usage increases that highlights the problem of load balancing with limited resource availability based on dynamic cloud environment. In such cases, task scheduling creates fundamental issue in cloud environment. Introduction: Certain problems such as, inefficiencies in load balancing latency, throughput ratio, proper utilization of the cloud resources, better energy consumption and response time have been observed. These drawbacks can be efficiently resolved through the incorporation of efficient load balancing and task scheduling strategies. Method: In this paper, we develop an efficient co-operative method to solve the most recent approaches against load balancing and task scheduling have been proposed using Ant Colony Optimization (ACO). These approaches enables in the clear cut identification of the problems associated with the load balancing and task scheduling strategies in the cloud environment. Results: The simulation is conducted to find the efficacy of the improved ACO system for load balancing in cloud than the other methods. The result shows that the proposed method obtains reduced execution time, reduced cost and delay. Conclusion: A unique strategic approach is developed in this paper, Load Balancing, which works with the ACO in relation to the cloud workload balancing task through the incorporation of the ACO technique. The strategy for determining the applicant nodes is based on which the load balancing approach would essentially depend. By incorporating two different approaches: the maximum minute rules and the forward-backward ant, this reliability task can be established. This method is intended to articulate the initialization of the pheromone and thus upgrade the relevant cloud-based physical properties.


2020 ◽  
Vol 63 (8) ◽  
pp. 1216-1230 ◽  
Author(s):  
Wei Guo ◽  
Sujuan Qin ◽  
Jun Lu ◽  
Fei Gao ◽  
Zhengping Jin ◽  
...  

Abstract For a high level of data availability and reliability, a common strategy for cloud service providers is to rely on replication, i.e. storing several replicas onto different servers. To provide cloud users with a strong guarantee that all replicas required by them are actually stored, many multi-replica integrity auditing schemes were proposed. However, most existing solutions are not resource economical since users need to create and upload replicas of their files by themselves. A multi-replica solution called Mirror is presented to overcome the problems, but we find that it is vulnerable to storage saving attack, by which a dishonest provider can considerably save storage costs compared to the costs of storing all the replicas honestly—while still can pass any challenge successfully. In addition, we also find that Mirror is easily subject to substitution attack and forgery attack, which pose new security risks for cloud users. To address the problems, we propose some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification. Experimental results show that our scheme exhibits comparable performance with Mirror while achieving high security.


2021 ◽  
Vol 11 (3) ◽  
pp. 923
Author(s):  
Guohua Li ◽  
Joon Woo ◽  
Sang Boem Lim

The complexity of high-performance computing (HPC) workflows is an important issue in the provision of HPC cloud services in most national supercomputing centers. This complexity problem is especially critical because it affects HPC resource scalability, management efficiency, and convenience of use. To solve this problem, while exploiting the advantage of bare-metal-level high performance, container-based cloud solutions have been developed. However, various problems still exist, such as an isolated environment between HPC and the cloud, security issues, and workload management issues. We propose an architecture that reduces this complexity by using Docker and Singularity, which are the container platforms most often used in the HPC cloud field. This HPC cloud architecture integrates both image management and job management, which are the two main elements of HPC cloud workflows. To evaluate the serviceability and performance of the proposed architecture, we developed and implemented a platform in an HPC cluster experiment. Experimental results indicated that the proposed HPC cloud architecture can reduce complexity to provide supercomputing resource scalability, high performance, user convenience, various HPC applications, and management efficiency.


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
I Patias ◽  
V Georgiev

Abstract Issue Given the importance, of cloud environments for mobile telemedicine information systems, focus is given in this paper on the challenges rising. We discuss the pros of the access to computing services and resources on demand without having own infrastructures, and the need of advanced interoperability data formats and application program interfaces (APIs) to facilitate the usage of the infrastructure. Description of the problem Cloud-Oriented Architecture (COA) describes the architecture, where applications act as services and serve other applications in the cloud environment. The aim is IT infrastructure and software applications to be optimized for their use in cloud computing environments. But what happens in the specific field of health as data interoperability for mobile telemedicine information systems? Results Two architectures were presented using a patient's compliance and engagement solution. A simple Representational State Transfer (REST) based architectural style was implemented in a three-layered architecture first and then compared to a cloud federation model. In the second the interaction goes through the federation via a middleware layer. Internal operations of cloud providers in the federation are still transparent to the cloud users. The middleware layer aims to coordinate the interaction with cloud users and providers in the federation. But, to avoid delays in those interactions interoperability of data formats and APIs. Lessons A Fast Healthcare Interoperability Resources (FHIR) based application was developed. Mobile telemedicine information systems are a strong instrument in patients' compliance. Many systems have proved that the used resources combined can solve clinical and administrative problems in a secure environment. Key messages The use of cloud is wide spread in the health sector. The challenge is to combine this infrastructure into one federated platform and maximize the added value by using advanced interoperability data formats and APIs.


Author(s):  
Anakath Arasan ◽  
Rajakumar Sadaiyandi ◽  
Fadi Al-Turjman ◽  
Arun Sekar Rajasekaran ◽  
Kalai Selvi Karuppuswamy

2021 ◽  
Vol 18 (3) ◽  
pp. 1-25
Author(s):  
Weijia Song ◽  
Christina Delimitrou ◽  
Zhiming Shen ◽  
Robbert Van Renesse ◽  
Hakim Weatherspoon ◽  
...  

Infrastructure-as-a-Service cloud providers sell virtual machines that are only specified in terms of number of CPU cores, amount of memory, and I/O throughput. Performance-critical aspects such as cache sizes and memory latency are missing or reported in ways that make them hard to compare across cloud providers. It is difficult for users to adapt their application’s behavior to the available resources. In this work, we aim to increase the visibility that cloud users have into shared resources on public clouds. Specifically, we present CacheInspector , a lightweight runtime that determines the performance and allocated capacity of shared caches on multi-tenant public clouds. We validate CacheInspector ’s accuracy in a controlled environment, and use it to study the characteristics and variability of cache resources in the cloud, across time, instances, availability regions, and cloud providers. We show that CacheInspector ’s output allows cloud users to tailor their application’s behavior, including their output quality, to avoid suboptimal performance when resources are scarce.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3807 ◽  
Author(s):  
Haonan Sun ◽  
Rongyu He ◽  
Yong Zhang ◽  
Ruiyun Wang ◽  
Wai Hung Ip ◽  
...  

Today cloud computing is widely used in various industries. While benefiting from the services provided by the cloud, users are also faced with some security issues, such as information leakage and data tampering. Utilizing trusted computing technology to enhance the security mechanism, defined as trusted cloud, has become a hot research topic in cloud security. Currently, virtual TPM (vTPM) is commonly used in a trusted cloud to protect the integrity of the cloud environment. However, the existing vTPM scheme lacks protections of vTPM itself at a runtime environment. This paper proposed a novel scheme, which designed a new trusted cloud platform security component, ‘enclave TPM (eTPM)’ to protect cloud and employed Intel SGX to enhance the security of eTPM. The eTPM is a software component that emulates TPM functions which build trust and security in cloud and runs in ‘enclave’, an isolation memory zone introduced by SGX. eTPM can ensure its security at runtime, and protect the integrity of Virtual Machines (VM) according to user-specific policies. Finally, a prototype for the eTPM scheme was implemented, and experiment manifested its effectiveness, security, and availability.


Author(s):  
Thierry Goubier ◽  
Andrea Ajmar ◽  
Carmine D’Amico ◽  
Paul Dubrulle ◽  
Susanna Grita ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document