M. S. Kakade, K. R. Anupama, Sushil Nayak, Swarnab Garang
With the advent of internet of things (IoT), new network paradigms have emerged. One such technology is cloudlets. Cloudlets are being increasingly used in various IoT-based applications such as smart homes, smart cities, healthcare, and industrial automations. Cloudlets have an advantage of proximity to the end-device while offering services similar to the cloud. Existing cloudlets use IEEE 802.11 for communication between nodes. In this paper, the authors present a protocol customized for usage in cloudlets, which also considers various limitations of the node that constitute the cloudlet. The nodes on the cloudlet are generally constrained in terms of power and memory when compared to nodes on a cloud. The custom protocol also incorporates fault-tolerance, time synchronization, and factors such as task affinities for communication. The protocol proposed in this paper gave an excellent packet delivery ratio, the lowest being 91% even with increased bandwidth usage when compared to IEEE 802.11.
{"title":"Custom Network Protocol Stack for Communication Between Nodes in a Cloudlet System","authors":"M. S. Kakade, K. R. Anupama, Sushil Nayak, Swarnab Garang","doi":"10.4018/ijcac.339891","DOIUrl":"https://doi.org/10.4018/ijcac.339891","url":null,"abstract":"With the advent of internet of things (IoT), new network paradigms have emerged. One such technology is cloudlets. Cloudlets are being increasingly used in various IoT-based applications such as smart homes, smart cities, healthcare, and industrial automations. Cloudlets have an advantage of proximity to the end-device while offering services similar to the cloud. Existing cloudlets use IEEE 802.11 for communication between nodes. In this paper, the authors present a protocol customized for usage in cloudlets, which also considers various limitations of the node that constitute the cloudlet. The nodes on the cloudlet are generally constrained in terms of power and memory when compared to nodes on a cloud. The custom protocol also incorporates fault-tolerance, time synchronization, and factors such as task affinities for communication. The protocol proposed in this paper gave an excellent packet delivery ratio, the lowest being 91% even with increased bandwidth usage when compared to IEEE 802.11.","PeriodicalId":51857,"journal":{"name":"International Journal of Cloud Applications and Computing","volume":"42 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140425545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Osama R. S. Ramadan, Mohamed Yasin I. Afifi, Ahmed Yahya
Distributed cloud systems enable the distribution of computing resources across various geographical locations. While offering benefits like accelerated content delivery, the scalability and coherence maintenance of these systems pose significant challenges. Recent studies reveal shortcomings in existing distributed system schemes to meet modern cloud application demands and maintain coherence among heterogeneous system elements. This paper proposes a service-oriented network architecture for distributed cloud computing networks. Using a De Bruijn network as a software-defined overlay network, the architecture ensures scalability and coherence. Through service-based addressing, requests are issued to designated service address bands, streamlining service discovery. The architecture's evaluation through extensive simulations showcases sustainable scalability and inherent load-balancing properties. The paper concludes with insights into future research directions, emphasizing the extension of the proposed architecture to emerging distributed cloud use cases and decentralized security.
分布式云系统能够在不同的地理位置分配计算资源。这些系统在提供加速内容交付等优势的同时,其可扩展性和一致性维护也带来了巨大挑战。最近的研究揭示了现有分布式系统方案在满足现代云应用需求和保持异构系统元素之间一致性方面存在的不足。本文为分布式云计算网络提出了一种面向服务的网络架构。该架构使用 De Bruijn 网络作为软件定义的覆盖网络,确保了可扩展性和一致性。通过基于服务的寻址,请求被发送到指定的服务地址带,从而简化了服务发现过程。通过大量模拟对该架构进行评估,展示了其可持续的可扩展性和固有的负载平衡特性。论文最后对未来的研究方向提出了见解,强调将所提出的架构扩展到新兴的分布式云使用案例和分散式安全。
{"title":"A Distributed Cloud Architecture Based on General De Bruijn Overlay Network","authors":"Osama R. S. Ramadan, Mohamed Yasin I. Afifi, Ahmed Yahya","doi":"10.4018/ijcac.339892","DOIUrl":"https://doi.org/10.4018/ijcac.339892","url":null,"abstract":"Distributed cloud systems enable the distribution of computing resources across various geographical locations. While offering benefits like accelerated content delivery, the scalability and coherence maintenance of these systems pose significant challenges. Recent studies reveal shortcomings in existing distributed system schemes to meet modern cloud application demands and maintain coherence among heterogeneous system elements. This paper proposes a service-oriented network architecture for distributed cloud computing networks. Using a De Bruijn network as a software-defined overlay network, the architecture ensures scalability and coherence. Through service-based addressing, requests are issued to designated service address bands, streamlining service discovery. The architecture's evaluation through extensive simulations showcases sustainable scalability and inherent load-balancing properties. The paper concludes with insights into future research directions, emphasizing the extension of the proposed architecture to emerging distributed cloud use cases and decentralized security.","PeriodicalId":51857,"journal":{"name":"International Journal of Cloud Applications and Computing","volume":"34 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140424864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmad Althunibat, Bayan Alsawareah, Siti Sarah Maidin, Belal Hawashin, Iqbal Jebril, Belal Zaqaibeh, Haneen A. Al-khawaja
The identification of ambiguities in Arabic requirement documents plays a crucial role in requirements engineering. This is because the quality of requirements directly impacts the overall success of software development projects. Traditionally, engineers have used manual methods to evaluate requirement quality, leading to a time-consuming and subjective process that is prone to errors. This study explores the use of machine learning algorithms to automate the assessment of requirements expressed in natural language. The study aims to compare various machine learning algorithms according to their abilities in classifying requirements written in Arabic as decision tree. The findings reveal that random forest outperformed all stemmers, achieving an accuracy of 0.95 without employing a stemmer, 0.99 with the ISRI stemmer, and 0.97 with the Arabic light stemmer. These results highlight the robustness and practicality of the random forest algorithm.
{"title":"Detecting Ambiguities in Requirement Documents Written in Arabic Using Machine Learning Algorithms","authors":"Ahmad Althunibat, Bayan Alsawareah, Siti Sarah Maidin, Belal Hawashin, Iqbal Jebril, Belal Zaqaibeh, Haneen A. Al-khawaja","doi":"10.4018/ijcac.339563","DOIUrl":"https://doi.org/10.4018/ijcac.339563","url":null,"abstract":"The identification of ambiguities in Arabic requirement documents plays a crucial role in requirements engineering. This is because the quality of requirements directly impacts the overall success of software development projects. Traditionally, engineers have used manual methods to evaluate requirement quality, leading to a time-consuming and subjective process that is prone to errors. This study explores the use of machine learning algorithms to automate the assessment of requirements expressed in natural language. The study aims to compare various machine learning algorithms according to their abilities in classifying requirements written in Arabic as decision tree. The findings reveal that random forest outperformed all stemmers, achieving an accuracy of 0.95 without employing a stemmer, 0.99 with the ISRI stemmer, and 0.97 with the Arabic light stemmer. These results highlight the robustness and practicality of the random forest algorithm.","PeriodicalId":51857,"journal":{"name":"International Journal of Cloud Applications and Computing","volume":"53 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140430999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Al-Obaidy, Aysha Ebrahim, Ali Aljufairi, Ahmed Mero, Omar Eid
The aim of this article proposes an innovative solution for developing a museum-guide system, which employs a voice-activated assistant paired with 3-D hologram displays, that utilizes Amazon web services (AWS) to enhance the visitor experience at the Bahrain National Museum. The proposed system uses software engineering as a service (SaaS) and involves an agile development process model with microservice architecture that adapts cloud computing capabilities to provide scalability, reliability, and maintainability. The proposed system enhances the existing museum infrastructure and databases through a flexible, API-based architecture. The proposed system is highly adaptable and flexible in different desirable aspects of user experience goals. The implementation results proved that the system is highly reliable, adaptable, and efficient and has the potential to improve the user experience by transforming the way museum visitors explore and interact with user interfaces of the museum-guide system.
{"title":"Software Engineering for Developing a Cloud Computing Museum-Guide System","authors":"H. Al-Obaidy, Aysha Ebrahim, Ali Aljufairi, Ahmed Mero, Omar Eid","doi":"10.4018/ijcac.339200","DOIUrl":"https://doi.org/10.4018/ijcac.339200","url":null,"abstract":"The aim of this article proposes an innovative solution for developing a museum-guide system, which employs a voice-activated assistant paired with 3-D hologram displays, that utilizes Amazon web services (AWS) to enhance the visitor experience at the Bahrain National Museum. The proposed system uses software engineering as a service (SaaS) and involves an agile development process model with microservice architecture that adapts cloud computing capabilities to provide scalability, reliability, and maintainability. The proposed system enhances the existing museum infrastructure and databases through a flexible, API-based architecture. The proposed system is highly adaptable and flexible in different desirable aspects of user experience goals. The implementation results proved that the system is highly reliable, adaptable, and efficient and has the potential to improve the user experience by transforming the way museum visitors explore and interact with user interfaces of the museum-guide system.","PeriodicalId":51857,"journal":{"name":"International Journal of Cloud Applications and Computing","volume":"112 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140448510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The high levels of energy use for cloud computing affect carbon emissions and climate change. This research thoroughly compares the energy utilisation of conventional and high-speed three-tier data centres (DCs). The green cloud simulator (GCS) was used to compare network configurations and energy-saving algorithms for each cloud's energy consumption in 10 trials. The power saver schedule algorithm used the least server energy, while the green and RR schedule algorithms used more. Despite the testing of several energy conservation approaches, core switch and aggregate switch energy usage remained unchanged. Although the high-speed three-tier DC architecture used more energy than the standard design, this is a key difference between the two network topologies. The authors discuss the power saver schedule algorithm's benefits for server energy utilisation. This study shows how three-tier DC architecture can save money by reducing core switch and aggregation switch energy use. These evaluations should include the make span coefficient, and future research should focus on DC transform energy-saving techniques.
{"title":"Empirical Comparison of Energy Efficiency Between 3-Tier and High-Speed 3-Tier Network Topologies","authors":"Manal Alkoshman, Saleh Atiewi","doi":"10.4018/ijcac.332766","DOIUrl":"https://doi.org/10.4018/ijcac.332766","url":null,"abstract":"The high levels of energy use for cloud computing affect carbon emissions and climate change. This research thoroughly compares the energy utilisation of conventional and high-speed three-tier data centres (DCs). The green cloud simulator (GCS) was used to compare network configurations and energy-saving algorithms for each cloud's energy consumption in 10 trials. The power saver schedule algorithm used the least server energy, while the green and RR schedule algorithms used more. Despite the testing of several energy conservation approaches, core switch and aggregate switch energy usage remained unchanged. Although the high-speed three-tier DC architecture used more energy than the standard design, this is a key difference between the two network topologies. The authors discuss the power saver schedule algorithm's benefits for server energy utilisation. This study shows how three-tier DC architecture can save money by reducing core switch and aggregation switch energy use. These evaluations should include the make span coefficient, and future research should focus on DC transform energy-saving techniques.","PeriodicalId":51857,"journal":{"name":"International Journal of Cloud Applications and Computing","volume":"12 2.1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134907793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A liquefied petroleum gas plant facility (LPGPF) is a series of binary distillation columns used to separate natural gas into four alkanes: ethane, propane, butane, and pentane. The conventional distillation column design consists of three binary distillation columns and six heat exchangers to perform the process. Each heat exchanger consumes immense energy to heat up the reboiler and condense the distillate. There are several process technologies that can minimize distillation column energy consumption. In this research, a fully thermally coupled distillation column (FTCDC) was proposed to minimize energy consumption by reducing the number of heat exchangers and tray columns. An FTCDC has the capability to reduce capital expenditure, operational expenditure, and total annual cost (TAC). The complexity of the FTCDC arises from its process integration. In each column, the intersection composition depends on complex mass and energy balances at the column inlet and outlet and each tray. Process integration, including material recycling and heat recovery, increases the complexity significantly. Moreover, the decision variables are multi-intersection composition for each column to achieve optimum objective function, increasing the number and complexity of the computational load such that effective stochastic optimization algorithms are required. The proposed method was designed using a rigorous vapor liquid equilibrium (VLE) FTCDC model and incorporated with recent stochastic optimization algorithms, such as a genetic algorithm, particle swarm optimization (PSO), an imperialist competitive algorithm, and a duelist algorithm, to determine hydrocarbon composition in the FTCDC intersection. To increase the efficiency and effectiveness of the FTCDC optimization design, cloud computing was utilized. The result was compared with conventional methods such as Fenske-Underwood-Gilliland, a Fenske-Underwood-Gilliland modification, and VLE. The optimization objective function is to minimize TAC with hydrocarbon composition in the FTCDC intersection as decision variables. The optimization using the VLE-PSO method reduces TAC up to 26.28%. All designs were validated using a rigorous model with Aspen HYSYS commercial software. This study's primary goal is to improve the performance of FTCDCs using stochastic algorithms and cloud-based computing capacity. The large amount of computation is handled by cloud-based computing resources, enabling reliability and durability.
{"title":"Enhancing Techno Economic Efficiency of FTC Distillation Using Cloud-Based Stochastic Algorithm","authors":"Toto Haksoro, Aulia Siti Aisjah, None Sreerakuvandana, Mosiur Rahaman, Totok Ruki Biyanto","doi":"10.4018/ijcac.332408","DOIUrl":"https://doi.org/10.4018/ijcac.332408","url":null,"abstract":"A liquefied petroleum gas plant facility (LPGPF) is a series of binary distillation columns used to separate natural gas into four alkanes: ethane, propane, butane, and pentane. The conventional distillation column design consists of three binary distillation columns and six heat exchangers to perform the process. Each heat exchanger consumes immense energy to heat up the reboiler and condense the distillate. There are several process technologies that can minimize distillation column energy consumption. In this research, a fully thermally coupled distillation column (FTCDC) was proposed to minimize energy consumption by reducing the number of heat exchangers and tray columns. An FTCDC has the capability to reduce capital expenditure, operational expenditure, and total annual cost (TAC). The complexity of the FTCDC arises from its process integration. In each column, the intersection composition depends on complex mass and energy balances at the column inlet and outlet and each tray. Process integration, including material recycling and heat recovery, increases the complexity significantly. Moreover, the decision variables are multi-intersection composition for each column to achieve optimum objective function, increasing the number and complexity of the computational load such that effective stochastic optimization algorithms are required. The proposed method was designed using a rigorous vapor liquid equilibrium (VLE) FTCDC model and incorporated with recent stochastic optimization algorithms, such as a genetic algorithm, particle swarm optimization (PSO), an imperialist competitive algorithm, and a duelist algorithm, to determine hydrocarbon composition in the FTCDC intersection. To increase the efficiency and effectiveness of the FTCDC optimization design, cloud computing was utilized. The result was compared with conventional methods such as Fenske-Underwood-Gilliland, a Fenske-Underwood-Gilliland modification, and VLE. The optimization objective function is to minimize TAC with hydrocarbon composition in the FTCDC intersection as decision variables. The optimization using the VLE-PSO method reduces TAC up to 26.28%. All designs were validated using a rigorous model with Aspen HYSYS commercial software. This study's primary goal is to improve the performance of FTCDCs using stochastic algorithms and cloud-based computing capacity. The large amount of computation is handled by cloud-based computing resources, enabling reliability and durability.","PeriodicalId":51857,"journal":{"name":"International Journal of Cloud Applications and Computing","volume":"3 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135168494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ala Hamarsheh, Ahmad Alqeerm, Iman Akour, Mohammad Alauthman, Amjad Aldweesh, Ali Mohd Ali, Ammar Almomani, Someah Alangari
The impending exhaustion of internet protocol (IP) version four (IPv4) addresses necessitates a transition to the more expansive IP version six (IPv6) protocol. However, this shift faces challenges due to the widespread legacy of IPv4 infrastructure and resistance among organizations to overhaul networks. Host-based translators offer a critical bridging solution by enabling IPv6-only devices to communicate with IPv4-only devices through software-level protocol translation. This paper comprehensively evaluates four pivotal host-based translator mechanisms—bump-in-the-stack (BIS), bump-in-the-application programming interface (API) (BIA), BIA version 2 (BIAv2), and bump-in-the-host (BIH). Using simulated networks with diverse configurations of IPv4/IPv6 applications, hosts, and routing protocols, the authors assessed performance through metrics including packet loss, convergence time, traffic throughput, and overhead. The results reveal variability in effectiveness across both translators and scenarios. BIAv2 demonstrated advantages in throughput and overhead due to stateless mapping. The research underscores the importance of selecting the optimal translation approach for specific network environments and goals. It guides smoother IPv6 adoption by demonstrating how host-based translators can facilitate coexistence during transition. Further exploration of performance tradeoffs can continue guiding effective deployment strategies.
{"title":"Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols","authors":"Ala Hamarsheh, Ahmad Alqeerm, Iman Akour, Mohammad Alauthman, Amjad Aldweesh, Ali Mohd Ali, Ammar Almomani, Someah Alangari","doi":"10.4018/ijcac.332765","DOIUrl":"https://doi.org/10.4018/ijcac.332765","url":null,"abstract":"The impending exhaustion of internet protocol (IP) version four (IPv4) addresses necessitates a transition to the more expansive IP version six (IPv6) protocol. However, this shift faces challenges due to the widespread legacy of IPv4 infrastructure and resistance among organizations to overhaul networks. Host-based translators offer a critical bridging solution by enabling IPv6-only devices to communicate with IPv4-only devices through software-level protocol translation. This paper comprehensively evaluates four pivotal host-based translator mechanisms—bump-in-the-stack (BIS), bump-in-the-application programming interface (API) (BIA), BIA version 2 (BIAv2), and bump-in-the-host (BIH). Using simulated networks with diverse configurations of IPv4/IPv6 applications, hosts, and routing protocols, the authors assessed performance through metrics including packet loss, convergence time, traffic throughput, and overhead. The results reveal variability in effectiveness across both translators and scenarios. BIAv2 demonstrated advantages in throughput and overhead due to stateless mapping. The research underscores the importance of selecting the optimal translation approach for specific network environments and goals. It guides smoother IPv6 adoption by demonstrating how host-based translators can facilitate coexistence during transition. Further exploration of performance tradeoffs can continue guiding effective deployment strategies.","PeriodicalId":51857,"journal":{"name":"International Journal of Cloud Applications and Computing","volume":"30 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135168825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amjad Aldweesh, Mohammad Alauthman, Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad al-Qerem, Ammar Almoman, Brij B. Gupta
Blockchain technology and the metaverse are revolutionizing digital experiences by merging secure, cryptographic systems with shared virtual spaces. These advancements have immense potential across various sectors, including social interaction, education, and commerce. Despite these enhancements, current research remains fragmented. Thus, a comprehensive exploration of this domain is needed. This article conducts a systematic mapping study to understand research trends, challenges, and opportunities in the blockchain-based metaverse. The authors scrutinized 43 articles, categorizing them based on research themes and methodologies. Their analysis revealed a significant focus on technical aspects like blockchain implementation in virtual worlds and the design of virtual economies. The authors also found research that explores the social and cultural impacts of the blockchain-based metaverse. This study, thus, underscores the potential of the evolving field, emphasizing the need for research to fully understand its technical and societal implications. It also stresses the importance of evaluating the long-term sustainability, scalability, and potential risks associated with this promising, complex domain.
{"title":"The Meta-Fusion","authors":"Amjad Aldweesh, Mohammad Alauthman, Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad al-Qerem, Ammar Almoman, Brij B. Gupta","doi":"10.4018/ijcac.331752","DOIUrl":"https://doi.org/10.4018/ijcac.331752","url":null,"abstract":"Blockchain technology and the metaverse are revolutionizing digital experiences by merging secure, cryptographic systems with shared virtual spaces. These advancements have immense potential across various sectors, including social interaction, education, and commerce. Despite these enhancements, current research remains fragmented. Thus, a comprehensive exploration of this domain is needed. This article conducts a systematic mapping study to understand research trends, challenges, and opportunities in the blockchain-based metaverse. The authors scrutinized 43 articles, categorizing them based on research themes and methodologies. Their analysis revealed a significant focus on technical aspects like blockchain implementation in virtual worlds and the design of virtual economies. The authors also found research that explores the social and cultural impacts of the blockchain-based metaverse. This study, thus, underscores the potential of the evolving field, emphasizing the need for research to fully understand its technical and societal implications. It also stresses the importance of evaluating the long-term sustainability, scalability, and potential risks associated with this promising, complex domain.","PeriodicalId":51857,"journal":{"name":"International Journal of Cloud Applications and Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135093326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Containers are a key technology in modern cloud environments. They provide a lightweight manner to package and deploy service applications compared to virtual machines, with an isolated processing approach. The state-of-the-art containers LB algorithms do not take into account efficient mapping between container requirements and servers' capabilities, resulting in wastage of resources and increased response time, which negatively impacts the overall QoS. This manuscript proposes a new LB algorithm for containers called resource-aware least busy (RALB). RALB not only considers the current load of each node (as per the least connection) but also takes into account the current resource requirements of containers. It assigns containers to the least busy server with optimal capacity from a resource perspective. The authors implemented a prototype of the algorithm, and simulation results shows that more even distribution of workload and better utilization of resources across the nodes can be achieved, resulting in lower latency and high reliability compared to the randomized algorithm.
{"title":"Resource-Aware Least Busy (RALB) Strategy for Load Balancing in Containerized Cloud Systems","authors":"Zakariyae Bouflous, M. Ouzzif, Khalid Bouragba","doi":"10.4018/ijcac.328094","DOIUrl":"https://doi.org/10.4018/ijcac.328094","url":null,"abstract":"Containers are a key technology in modern cloud environments. They provide a lightweight manner to package and deploy service applications compared to virtual machines, with an isolated processing approach. The state-of-the-art containers LB algorithms do not take into account efficient mapping between container requirements and servers' capabilities, resulting in wastage of resources and increased response time, which negatively impacts the overall QoS. This manuscript proposes a new LB algorithm for containers called resource-aware least busy (RALB). RALB not only considers the current load of each node (as per the least connection) but also takes into account the current resource requirements of containers. It assigns containers to the least busy server with optimal capacity from a resource perspective. The authors implemented a prototype of the algorithm, and simulation results shows that more even distribution of workload and better utilization of resources across the nodes can be achieved, resulting in lower latency and high reliability compared to the randomized algorithm.","PeriodicalId":51857,"journal":{"name":"International Journal of Cloud Applications and Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43934358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The integration of IoT and cloud poses increased security challenges. Implementing security mechanisms in IoT systems is challenging due to the availability of limited resources, large number of devices, heterogeneity of devices, generation of bulk data, etc. Likewise, cloud resources are also vulnerable to security issues due to virtualization, insider threats, data loss, data breaches, insecure APIs, etc. Security is of major concern with the integration of IoT and cloud. The primary objective of this review is to highlight the security issues associated with an IoT system and cloud system and with the integration of the two, as well as to highlight solutions in each case. The secondary objective is to describe popular IoT-cloud platforms and also to highlight how such platforms facilitate secure integration. Ultimately a highlight on a shared responsibility model of implementing security is emphasized as both IoT users and cloud service providers have to cooperatively share the responsibility to deploy secure cloud-based IoT applications.
{"title":"Integration of the Internet of Things and Cloud","authors":"Chellammal Surianarayanan, P. Chelliah","doi":"10.4018/ijcac.325624","DOIUrl":"https://doi.org/10.4018/ijcac.325624","url":null,"abstract":"The integration of IoT and cloud poses increased security challenges. Implementing security mechanisms in IoT systems is challenging due to the availability of limited resources, large number of devices, heterogeneity of devices, generation of bulk data, etc. Likewise, cloud resources are also vulnerable to security issues due to virtualization, insider threats, data loss, data breaches, insecure APIs, etc. Security is of major concern with the integration of IoT and cloud. The primary objective of this review is to highlight the security issues associated with an IoT system and cloud system and with the integration of the two, as well as to highlight solutions in each case. The secondary objective is to describe popular IoT-cloud platforms and also to highlight how such platforms facilitate secure integration. Ultimately a highlight on a shared responsibility model of implementing security is emphasized as both IoT users and cloud service providers have to cooperatively share the responsibility to deploy secure cloud-based IoT applications.","PeriodicalId":51857,"journal":{"name":"International Journal of Cloud Applications and Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46506062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}