Design and Use of Virtualization Technology in Cloud Computing2017

Articles

  • Search by keyword
  • Search by citation
  1. Citation: Journal of Cloud Computing 2018 7:19

    • View Full Text
    • View PDF
  2. Citation: Journal of Cloud Computing 2018 7:18

    • View Full Text
    • View PDF
  3. Citation: Journal of Cloud Computing 2018 7:17

    • View Full Text
    • View PDF
  4. Citation: Journal of Cloud Computing 2018 7:16

    • View Full Text
    • View PDF
  5. Citation: Journal of Cloud Computing 2018 7:15

    • View Full Text
    • View PDF
  6. Modelling trust and risk for cloud services

    A joint trust and risk model is introduced for federated cloud services. The model is based on cloud service providers' performance history. It addresses provider and consumer concerns by relying on trusted th...

    Authors: Erdal Cayirci and Anderson Santana de Oliveira

    Citation: Journal of Cloud Computing 2018 7:14

    • View Full Text
    • View PDF
  7. Citation: Journal of Cloud Computing 2018 7:13

    • View Full Text
    • View PDF
  8. A hybrid approach to automatic IaaS service selection

    Cloud computing provides on-demand resources and removes the boundaries of resources' physical locations. By providing virtualized computing resources in an elastic manner over the internet, IaaS providers all...

    Authors: Sima Soltani, Patrick Martin and Khalid Elgazzar

    Citation: Journal of Cloud Computing 2018 7:12

    • View Full Text
    • View PDF
  9. Cloud application deployment with transient failure recovery

    Application deployment is a crucial operation for modern cloud providers. The ability to dynamically allocate resources and deploy a new application instance based on a user-provided description in a fully aut...

    Authors: Ioannis Giannakopoulos, Ioannis Konstantinou, Dimitrios Tsoumakos and Nectarios Koziris

    Citation: Journal of Cloud Computing 2018 7:11

    • View Full Text
    • View PDF
  10. Citation: Journal of Cloud Computing 2018 7:10

    • View Full Text
    • View PDF
  11. Citation: Journal of Cloud Computing 2018 7:9

    • View Full Text
    • View PDF
  12. Citation: Journal of Cloud Computing 2018 7:8

    • View Full Text
    • View PDF
  13. Citation: Journal of Cloud Computing 2018 7:7

    • View Full Text
    • View PDF
  14. Evaluating cloud database migration options using workload models

    A key challenge in porting enterprise software systems to the cloud is the migration of their database. Choosing a cloud provider and service option (e.g., a database-as-a-service or a manually configured set ...

    Authors: Martyn Ellison, Radu Calinescu and Richard F. Paige

    Citation: Journal of Cloud Computing 2018 7:6

    • View Full Text
    • View PDF
  15. Citation: Journal of Cloud Computing 2018 7:5

    • View Full Text
    • View PDF
  16. Citation: Journal of Cloud Computing 2018 7:4

    • View Full Text
    • View PDF
  17. Citation: Journal of Cloud Computing 2018 7:3

    • View Full Text
    • View PDF
  18. Citation: Journal of Cloud Computing 2018 7:2

    • View Full Text
    • View PDF
  19. CFaaS: bilaterally agreed evidence collection

    A common cloud forensic model proposed by researchers is 'Cloud-Forensic-as-a-Service' where consumers have to access it as a service to collect forensic data from cloud environments. The 'Cloud-Forensic-as-a-...

    Authors: Ahmed Nour Moussa, Norafida Ithnin and Anazida Zainal

    Citation: Journal of Cloud Computing 2018 7:1

    • View Full Text
    • View PDF
  20. Citation: Journal of Cloud Computing 2017 6:31

    • View Full Text
    • View PDF
  21. Citation: Journal of Cloud Computing 2017 6:30

    • View Full Text
    • View PDF
  22. Citation: Journal of Cloud Computing 2017 6:29

    • View Full Text
    • View PDF
  23. Citation: Journal of Cloud Computing 2017 6:28

    • View Full Text
    • View PDF
  24. Citation: Journal of Cloud Computing 2017 6:27

    • View Full Text
    • View PDF
  25. Classifying malware attacks in IaaS cloud environments

    In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies ...

    Authors: Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann de Meer and Hans P. Reiser

    Citation: Journal of Cloud Computing 2017 6:26

    • View Full Text
    • View PDF
  26. Citation: Journal of Cloud Computing 2017 6:25

    • View Full Text
    • View PDF
  27. Citation: Journal of Cloud Computing 2017 6:24

    • View Full Text
    • View PDF
  28. A critical survey of live virtual machine migration techniques

    Virtualization techniques effectively handle the growing demand for computing, storage, and communication resources in large-scale Cloud Data Centers (CDC). It helps to achieve different resource management ob...

    Authors: Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K. Awasthi, Emmanuel S. Pilli and Divya Kapil

    Citation: Journal of Cloud Computing 2017 6:23

    • View Full Text
    • View PDF
  29. Citation: Journal of Cloud Computing 2017 6:22

    • View Full Text
    • View PDF
  30. Citation: Journal of Cloud Computing 2017 6:21

    • View Full Text
    • View PDF
  31. Citation: Journal of Cloud Computing 2017 6:20

    • View Full Text
    • View PDF
  32. Citation: Journal of Cloud Computing 2017 6:19

    • View Full Text
    • View PDF
  33. Source camera identification: a distributed computing approach using Hadoop

    The widespread use of digital images has led to a new challenge in digital image forensics. These images can be used in court as evidence of criminal cases. However, digital images are easily manipulated which...

    Authors: Muhammad Faiz, Nor Badrul Anuar, Ainuddin Wahid Abdul Wahab, Shahaboddin Shamshirband and Anthony T. Chronopoulos

    Citation: Journal of Cloud Computing 2017 6:18

    • View Full Text
    • View PDF
  34. Citation: Journal of Cloud Computing 2017 6:17

    • View Full Text
    • View PDF
  35. Citation: Journal of Cloud Computing 2017 6:16

    • View Full Text
    • View PDF
  36. Citation: Journal of Cloud Computing 2017 6:15

    • View Full Text
    • View PDF
  37. Towards energy aware cloud computing application construction

    The energy consumption of cloud computing continues to be an area of significant concern as data center growth continues to increase. This paper reports on an energy efficient interoperable cloud architecture ...

    Authors: Django Armstrong, Karim Djemame and Richard Kavanagh

    Citation: Journal of Cloud Computing 2017 6:14

    • View Full Text
    • View PDF
  38. Citation: Journal of Cloud Computing 2017 6:13

    • View Full Text
    • View PDF
  39. Citation: Journal of Cloud Computing 2017 6:12

    • View Full Text
    • View PDF
  40. Migration of a SCADA system to IaaS clouds – a case study

    SCADA systems allow users to monitor and/or control physical devices, processes, and events remotely and in real-time. As these systems are critical to industrial processes, they are often run on highly reliab...

    Authors: Philip Church, Harald Mueller, Caspar Ryan, Spyridon V. Gogouvitis, Andrzej Goscinski and Zahir Tari

    Citation: Journal of Cloud Computing 2017 6:11

    • View Full Text
    • View PDF
  41. Citation: Journal of Cloud Computing 2017 6:10

    • View Full Text
    • View PDF
  42. Citation: Journal of Cloud Computing 2017 6:9

    • View Full Text
    • View PDF
  43. Citation: Journal of Cloud Computing 2017 6:8

    • View Full Text
    • View PDF
  44. Citation: Journal of Cloud Computing 2017 6:7

    • View Full Text
    • View PDF
  45. Citation: Journal of Cloud Computing 2017 6:6

    • View Full Text
    • View PDF
  46. Dynamic spatial index for efficient query processing on the cloud

    Data owners with large volumes of data can outsource spatial databases by taking advantage of the cost-effective cloud computing model with attractive on-demand features such as scalability and high computing ...

    Authors: Ibrahim Kamel, Ayesha M. Talha and Zaher Al Aghbari

    Citation: Journal of Cloud Computing 2017 6:5

    • View Full Text
    • View PDF
  47. Citation: Journal of Cloud Computing 2017 6:4

    • View Full Text
    • View PDF
  48. An autonomic prediction suite for cloud resource provisioning

    One of the challenges of cloud computing is effective resource management due to its auto-scaling feature. Prediction techniques have been proposed for cloud computing to improve cloud resource management. Thi...

    Authors: Ali Yadavar Nikravesh, Samuel A. Ajila and Chung-Horng Lung

    Citation: Journal of Cloud Computing 2017 6:3

    • View Full Text
    • View PDF
  49. Citation: Journal of Cloud Computing 2017 6:2

    • View Full Text
    • View PDF
  50. Citation: Journal of Cloud Computing 2017 6:1

    • View Full Text
    • View PDF
  • Editorial Board
  • Sign up for article alerts and news from this journal
  • ISSN: 2192-113X (electronic)

Benefit from our free funding service

New Content Item

We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding.

Learn more here

.

Design and Use of Virtualization Technology in Cloud Computing2017

Source: https://journalofcloudcomputing.springeropen.com/articles?searchType=journalSearch&sort=PubDate&page=4

0 Response to "Design and Use of Virtualization Technology in Cloud Computing2017"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel