• فهرس المقالات Service Level Agreement

      • حرية الوصول المقاله

        1 - A MAPE-K Loop Based Model for Virtual Machine Consolidation in Cloud Data Centers
        Negin Najafizadegan Eslam Nazemi Vahid Khajehvand
        Today, with the rise of cloud data centers, power consumption has increased and cloud infrastructure management has become more complex. On the other hand, meeting the needs of cloud users is an important goal in the cloud infrastructure. To solve such problems, an auto أکثر
        Today, with the rise of cloud data centers, power consumption has increased and cloud infrastructure management has become more complex. On the other hand, meeting the needs of cloud users is an important goal in the cloud infrastructure. To solve such problems, an autonomous model with predictive capability is needed to do virtual machine consolidation at runtime effectively. In fact, using the feedback system of autonomous systems can make this process simpler and more optimized. The goal of this research is to propose a cloud resource management model that makes the virtual machine consolidation process autonomous, and by using a prediction method compromises between service level agreement violations and energy consumption reduction. In this research, an autonomous model is presented which detects overloaded servers in the analysis phase by a prediction algorithm. Also, at the planning phase, a multi heuristic algorithm based on learning automata is proposed to find proper servers for virtual machine placement. Cloudsim version 3.0.3 was used to evaluate the proposed model. The results show that the proposed model has reduced averagely the service level agreement violations, energy and migration counts by 67.08%, 11.61% and 70.64% respectively, compared to other methods. تفاصيل المقالة
      • حرية الوصول المقاله

        2 - A Literature Review on Cloud Computing Security Issues
        Zahra Ghanbari
        The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and stor أکثر
        The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Cloud Computing environment. Security and privacy are the key issues for Cloud Computing and still face some enormous challenges. This article contains a review of ten technical literatures relating security challenges and security issues of Cloud Computing. I review the methodology and subsequently solution, analysis, finding and other important points in these lectures. This article summarizes ten lectures which can be utilized as a brief reference for researchers about Security issues in Cloud Computing. تفاصيل المقالة