Recent advances of resource allocation in network function virtualization

S Yang, F Li, S Trajanovski… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Network Function Virtualization (NFV) has been emerging as an appealing solution that
transforms complex network functions from dedicated hardware implementations to software …

A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

Task failure prediction in cloud data centers using deep learning

J Gao, H Wang, H Shen - IEEE transactions on services …, 2020 - ieeexplore.ieee.org
A large-scale cloud data center needs to provide high service reliability and availability with
low failure occurrence probability. However, current large-scale cloud data centers still face …

A survey on the edge computing for the Internet of Things

W Yu, F Liang, X He, WG Hatcher, C Lu, J Lin… - IEEE …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) now permeates our daily lives, providing important measurement
and collection tools to inform our every decision. Millions of sensors and devices are …

Secure data storage and recovery in industrial blockchain network environments

W Liang, Y Fan, KC Li, D Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The massive redundant data storage and communication in network 4.0 environments have
issues of low integrity, high cost, and easy tampering. To address these issues, in this article …

Erasure coding in windows azure storage

C Huang, H Simitci, Y Xu, A Ogus, B Calder… - 2012 USENIX Annual …, 2012 - usenix.org
Windows Azure Storage (WAS) is a cloud storage system that provides customers the ability
to store seemingly limitless amounts of data for any duration of time. WAS customers have …

Xoring elephants: Novel erasure codes for big data

M Sathiamoorthy, M Asteris, D Papailiopoulos… - arxiv preprint arxiv …, 2013 - arxiv.org
Distributed storage systems for large clusters typically use replication to provide reliability.
Recently, erasure codes have been used to reduce the large storage overhead of three …

Understanding network failures in data centers: measurement, analysis, and implications

P Gill, N Jain, N Nagappan - Proceedings of the ACM SIGCOMM 2011 …, 2011 - dl.acm.org
We present the first large-scale analysis of failures in a data center network. Through our
analysis, we seek to answer several fundamental questions: which devices/links are most …

Blockchain-based fair payment smart contract for public cloud storage auditing

H Wang, H Qin, M Zhao, X Wei, H Shen, W Susilo - Information Sciences, 2020 - Elsevier
Cloud storage plays an important role in today's cloud ecosystem. Increasingly clients tend
to outsource their data to the cloud. In spite of its copious advantages, integrity has always …

Why does the cloud stop computing? lessons from hundreds of service outages

HS Gunawi, M Hao, RO Suminto, A Laksono… - Proceedings of the …, 2016 - dl.acm.org
We conducted a cloud outage study (COS) of 32 popular Internet services. We analyzed
1247 headline news and public post-mortem reports that detail 597 unplanned outages that …