Recent advances of resource allocation in network function virtualization
Network Function Virtualization (NFV) has been emerging as an appealing solution that
transforms complex network functions from dedicated hardware implementations to software …
transforms complex network functions from dedicated hardware implementations to software …
A survey of role mining
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
Task failure prediction in cloud data centers using deep learning
A large-scale cloud data center needs to provide high service reliability and availability with
low failure occurrence probability. However, current large-scale cloud data centers still face …
low failure occurrence probability. However, current large-scale cloud data centers still face …
A survey on the edge computing for the Internet of Things
The Internet of Things (IoT) now permeates our daily lives, providing important measurement
and collection tools to inform our every decision. Millions of sensors and devices are …
and collection tools to inform our every decision. Millions of sensors and devices are …
Secure data storage and recovery in industrial blockchain network environments
The massive redundant data storage and communication in network 4.0 environments have
issues of low integrity, high cost, and easy tampering. To address these issues, in this article …
issues of low integrity, high cost, and easy tampering. To address these issues, in this article …
Erasure coding in windows azure storage
Windows Azure Storage (WAS) is a cloud storage system that provides customers the ability
to store seemingly limitless amounts of data for any duration of time. WAS customers have …
to store seemingly limitless amounts of data for any duration of time. WAS customers have …
Xoring elephants: Novel erasure codes for big data
Distributed storage systems for large clusters typically use replication to provide reliability.
Recently, erasure codes have been used to reduce the large storage overhead of three …
Recently, erasure codes have been used to reduce the large storage overhead of three …
Understanding network failures in data centers: measurement, analysis, and implications
We present the first large-scale analysis of failures in a data center network. Through our
analysis, we seek to answer several fundamental questions: which devices/links are most …
analysis, we seek to answer several fundamental questions: which devices/links are most …
Blockchain-based fair payment smart contract for public cloud storage auditing
Cloud storage plays an important role in today's cloud ecosystem. Increasingly clients tend
to outsource their data to the cloud. In spite of its copious advantages, integrity has always …
to outsource their data to the cloud. In spite of its copious advantages, integrity has always …
Why does the cloud stop computing? lessons from hundreds of service outages
We conducted a cloud outage study (COS) of 32 popular Internet services. We analyzed
1247 headline news and public post-mortem reports that detail 597 unplanned outages that …
1247 headline news and public post-mortem reports that detail 597 unplanned outages that …