Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book addresses fundamental concepts and practical implementations in cloud computing environments, focusing on load balancing and resource management. As cloud computing's popularity grows, expertise in infrastructure management is crucial for delivering flawless subscription-based services and hosted data solutions. The book presents novel models for cloud resource management to improve operational efficiency through better virtual machine (VM) placements. Beginning with task scheduling and resource allocation basics, the book progresses to resource management concepts. It introduces innovative models for dynamic resource allocation, heuristic approaches for optimal host selection, secure resource management frameworks, multi-objective VM allocation schemes, and data security models. A significant contribution is an effective model integrating load balancing, resource management, Quality of Service (QoS), security, and cloud performance for Infrastructure as a Service (IaaS). The book offers innovative methodologies for dynamic resource allocation and service administration in cloud datacenters. It presents traffic management techniques to reduce energy consumption, improve resource utilization, and enhance security through optimized VM placement, with experimental validation. These models improve response time, throughput, resource utilization, energy consumption, and failure node management. Security is addressed through secure VM placement strategies, making it harder for attackers to achieve co-tenancy. A multi-objective approach for secure load balancing optimizes multiple conflicting objectives simultaneously. The book includes cyber-threat countermeasures and provides recommendations for organizations and users. Suitable for senior undergraduate and graduate courses in cloud computing, resource allocation, security, and energy consumption methods, the book includes examples and tutorials using Cloudsim tools for beginners. This helps them understand virtual infrastructure and service design. The methodologies benefit both cloud service providers and customers, offering cost-effective solutions for revenue maximization. The comprehensive approach makes the book valuable for academic study and practical application in cloud computing environments.
Dr. Sakshi Patni is a researcher and academician in the domain of Computer Science and Engineering. Currently, she is working as Research Professor in the Department of Computing, Gachon University, Seongnam-Si, South Korea. Dr. Patni has received her Ph.D. degree in Computer Science from the National Institute of Technology, Kurukshetra, India in 2020. Her major research interests include Cloud Computing, Edge Computing, Resource Management, Artificial Intelligence and Information Security.
Dr. Deepika Saxena is a researcher and academician in the domain of Computer Science and Engineering. Currently, she is working as an Associate Professor in the Division of Information Systems in the Department of Computer Science and Engineering, The University of Aizu, Japan. Dr. Saxena has received her Ph.D. degree in Computer Science from the National Institute of Technology, Kurukshetra, India; and Post Doc from the Department of Computer Science, Goethe University, Frankfurt, Germany. Her major research interests include Neural networks, Evolutionary algorithms, Scheduling, and Security in cloud computing.
Dr. Ashutosh Kumar Singh is an esteemed researcher and academician in the domain of Electrical and Computer engineering. Currently, he is appointed as a Director of Indian Institute of Information Technology, Bhopal, Madhya Pradesh, India. He has more than 22 years of research, teaching, and administrative experience in various University systems of India, the UK, Australia, and Malaysia. Dr. Singh obtained his Ph. D. degree in Electronics Engineering from Indian Institute of Technology-BHU, India; Post Doc from Department of Computer Science, University of Bristol, United Kingdom and Charted Engineer from United Kingdom. He is involved in reviewing process in different journals and conferences of repute including IEEE Transactions of computer, IET, IEEE conference on ITC, ADCOM, etc.
Introduction.- Task Scheduling.- Resource Allocation Methods.- Dynamic Resource Allocation Models.- Secure Cloud Resource Management.- Heuristic Models for Optimal Host Selection.- Secure and Energy efficient Cloud Traffic Management Schemes.- Data Security and Leakage Detection Models.- Conclusion and Future Trends.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.