By Topic

2014 IEEE 6th International Conference on Cloud Computing Technology and Science

15-18 Dec. 2014

Filter Results

Displaying Results 1 - 25 of 181
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1192 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - xix
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2014, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2014, Page(s):xxii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Message from Steering Committee

    Publication Year: 2014, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (28 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2014, Page(s):xxv - xxvii
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Program Committees

    Publication Year: 2014, Page(s):xxviii - xxxv
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Award Committee

    Publication Year: 2014, Page(s): xxxvi
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2014, Page(s): xxxvii
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2014, Page(s):xxxviii - xlii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SRL: A Scalability Rule Language for Multi-cloud Environments

    Publication Year: 2014, Page(s):1 - 9
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    The benefits of cloud computing have led to a proliferation of infrastructures and platforms covering the provisioning and deployment requirements of many cloud-based applications. However, the requirements of an application may change during its life cycle. Therefore, its provisioning and deployment should be adapted so that the application can deliver its target quality of service throughout its... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bejo: Behavior Based Job Classification for Resource Consumption Prediction in the Cloud

    Publication Year: 2014, Page(s):10 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    Resource prediction (e.g. CPU/memory utilization) of cloud computing jobs has attracted substantial amount of attention. Existing works use regression methods based on historical information of jobs, with an impractical assumption that the job to be predicted has the same class as the historical jobs. To address this problem, we propose to take the category of the jobs into consideration for effec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability Analysis on Open Stack IaaS Cloud: Bug Anaysis and Fault Injection

    Publication Year: 2014, Page(s):18 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    This paper proposes a comparative study of cloud dependability between two methods -- bug analysis and fault injection for assessing the impact of component failure on cloud service availability. We focus on the IaaS cloud with open source platform Open Stack. The actual bug data are analyzed to show numerical examples of dependability assessment. A fault injection tool has also been developed to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The CACTOS Vision of Context-Aware Cloud Topology Optimization and Simulation

    Publication Year: 2014, Page(s):26 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (671 KB)

    Recent advances in hardware development coupled with the rapid adoption and broad applicability of cloud computing have introduced widespread heterogeneity in data centers, significantly complicating the management of cloud applications and data center resources. This paper presents the CACTOS approach to cloud infrastructure automation and optimization, which addresses heterogeneity through a com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classifying Requirements for Variability Optimization in Multitenant Applications

    Publication Year: 2014, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    Software as a Service (SaaS) providers can serve thousands of customers, which have hundreds of thousands of overlapping requirements, using a single application instance to offer service at a lower price. Even with a potentially large number of customers with varying requirements, a multitenant application should make co-tenancy transparent to the tenants, which means that every tenant must appea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimization Framework for Cloud-Sensor Systems

    Publication Year: 2014, Page(s):38 - 45
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    Imminent massive-scale IoT deployments require a Cloud-Sensor architecture to facilitate an ecosystem of friction-free integration and programmability. In addition to these two functional requirements, challenging performance and scalability requirements must be addressed by any such architecture. We have introduced the Cloud-Edge-Beneath (CEB) architecture which addresses scalability and performa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Performance of Mobile Interactive Data-Streaming Applications with Multiple Cloudlets

    Publication Year: 2014, Page(s):46 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (637 KB) | HTML iconHTML

    Improving performance of a mobile application by offloading its computation onto a cloudlet has become a prevalent paradigm. Among mobile applications, the category of interactive data-streaming applications is emerging while having not yet received sufficient attention. During computation offloading, the performance of this category of applications (including response time and throughput) depends... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Game-Theoretic Distributed Virtual Energy Cloud Topology Control for Mobile Smart Grid

    Publication Year: 2014, Page(s):54 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    In this paper, the problem of energy distribution using virtual energy-cloud to the plug-in hybrid electric vehicles (PHEVs) is studied as a single leader multiple follower non-cooperative Stackelberg game. In this game, the energy-cloud service provider acts as the leader, and decides the price to be paid by each PHEV according to its usage. On the other hand, the PHEVs act as the followers, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Job Scheduling for Cloud Computing Integrated with Wireless Sensor Network

    Publication Year: 2014, Page(s):62 - 69
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    The powerful data storage and data processing abilities of cloud computing (CC) and the ubiquitous data gathering capability of wireless sensor network (WSN) complement each other in CC-WSN integration, which is attracting growing interest from both academia and industry. However, job scheduling for CC integrated with WSN is a critical and unexplored topic. To fill this gap, this paper first analy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FlowK: Information Flow Control for the Cloud

    Publication Year: 2014, Page(s):70 - 77
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions and although a wealth of law and regulation has emerged, the technical basis for enforcing and demonstrating compliance lags behind. Our Cloud Safety Net project aims to show that Information Flow Control (IFC) can augment existing security mechanisms and provide continuous enforcement of extended. Finer-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifying Secure Information Flow in Federated Clouds

    Publication Year: 2014, Page(s):78 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB) | HTML iconHTML

    Federated cloud systems increase the reliability and reduce the cost of computational support to an organization. However, the resulting combination of secure private clouds and less secure public clouds impacts on the security requirements of the system. Therefore, applications need to be located within different clouds, which strongly affects the information flow security of the entire system. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VLOC: An Approach to Verify the Physical Location of a Virtual Machine In Cloud

    Publication Year: 2014, Page(s):86 - 94
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB) | HTML iconHTML

    The geolocation of data stored and being processed in cloud is an important issue for many organisations due to obligations that require sensitive data to reside or be processed in particular countries. In this paper we introduce an approach, named VLOC, to verify the physical location of a virtual machine on which the customer applications and data are stored. VLOC is implemented as a software wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.