Useful resource Optimization and Safety for Cloud Providers
2014 | ISBN: 1848215991 | English | 192 pages | PDF | 1 MB
This e-book features a research of trustworthiness, percentile response time, service availability, and authentication within the networks between customers and cloud service suppliers, and at service stations or websites that could be owned by totally different service suppliers. The primary a part of the ebook accommodates an evaluation of percentile response time, which is likely one of the most essential SLA (service degree agreements) metrics. Efficient and correct numerical options for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical answer is included in a useful resource allocation drawback. Particularly, the authors current an strategy for the useful resource optimization that minimizes the entire value of pc assets required whereas preserving a given percentile of the response time. Within the second half, the strategy is prolonged to think about trustworthiness, service availability, and the percentile of response time in Net providers. These QoS metrics are clearly outlined and their quantitative evaluation offered. The authors then keep in mind these QoS metrics in a trust-based useful resource allocation drawback through which a set of cloud computing assets is utilized by a service supplier to host a typical Net providers software for single-class buyer providers and multipleclass buyer providers respectively. Lastly, within the third a part of the ebook a radical efficiency analysis of two notable public key cryptography-based authentication methods; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Using Tickets for Software Servers (PKTAPP, a.okay.a. KX.509/KCA); is given, when it comes to computational and communication occasions. The authors then show their efficiency distinction utilizing queuing networks. PKTAPP has been proposed to deal with the scalability challenge of PKCROSS. Nevertheless, their in-depth evaluation of those two methods exhibits that PKTAPP doesn’t carry out higher than PKCROSS in a large-scale system. Thus, they suggest a brand new public key cryptography-based group authentication method. The efficiency evaluation demonstrates that the brand new method can scale higher than PKCORSS and PKTAPP.