2017
DOI: 10.1155/2017/2376484
|View full text |Cite
|
Sign up to set email alerts
|

Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds

Abstract: Nowadays, a large number of groups choose to deploy their applications to cloud platforms, especially for the big data era. Currently, the hybrid cloud is one of the most popular computing paradigms for holding the privacy-aware applications driven by the requirements of privacy protection and cost saving. However, it is still a challenge to realize data placement considering both the energy consumption in private cloud and the cost for renting the public cloud services. In view of this challenge, a cost and e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
15
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 32 publications
(91 reference statements)
0
15
0
Order By: Relevance
“…The routers could enhance the performance of computation and storage, which could be fully utilized as the computing nodes. In the big data era, there are different performance requirements for the IoT applications, especially for the real-time applications; thus, such applications choose the edge computing nodes as a priority to host [9,10]. In the fog environment, the users could access and utilize the computation, storage, and network resources, like the way the customers use the cloud resources, and the virtualized technology is also applicative to provision the on-demand resources dynamically [11].…”
Section: Introductionmentioning
confidence: 99%
“…The routers could enhance the performance of computation and storage, which could be fully utilized as the computing nodes. In the big data era, there are different performance requirements for the IoT applications, especially for the real-time applications; thus, such applications choose the edge computing nodes as a priority to host [9,10]. In the fog environment, the users could access and utilize the computation, storage, and network resources, like the way the customers use the cloud resources, and the virtualized technology is also applicative to provision the on-demand resources dynamically [11].…”
Section: Introductionmentioning
confidence: 99%
“…The Service Level Agreement (SLA) of today's utility computing is centered around with multiple resources (denoted as multi‐resource), such as computation, storage, Internet traffic, bandwidth, and the availability of these resources. However, few large cloud systems consider all the multi‐resource as they map the workloads in their data center networks, most of them merely consider one or two kind of resources . For example, Amazon provides the CPU and memory resources for the users/tenants, but there is no bandwidth guarantee in network transmission; it does not provide bandwidth guarantee among the virtual machines (VMs) .…”
Section: Introductionmentioning
confidence: 99%
“…However, few large cloud systems consider all the multi-resource as they map the workloads in their data center networks, most of them merely consider one or two kind of resources. [4][5][6][7] For example, Amazon provides the CPU and memory resources for the users/tenants, but there is no bandwidth guarantee in network transmission 8 ; it does not provide bandwidth guarantee among the virtual machines (VMs). 9,10 Thus, how to efficiently mapping the workloads to the data center networks with multi-resource guarantee is a challenging issue.…”
Section: Introductionmentioning
confidence: 99%
“…Fog computing provides computing, storage, and networking service between mobile users and traditional Cloud platform, which is complementary to Cloud. The fog computing introduces the middle layer between the cloud and the mobile users, extending the cloudbased network architecture [3][4][5][6]. A basic fog framework is shown in Figure 1, each mobile user is connected to one of the fog nodes.…”
Section: Introductionmentioning
confidence: 99%