To move or not to move: Cost optimization in a dual cloud-based storage architecture (Englisch)

In: Journal of Network and Computer Applications   ;  75 ;  223-235  ;  2016
  • ISSN:
  • Aufsatz (Zeitschrift)  /  Elektronische Ressource

Wie erhalte ich diesen Titel?


Download ist DRM geschützt.

Kommerziell Vergütung an den Verlag: 36,00 € Grundgebühr: 4,00 € Gesamtpreis: 40,00 €
Akademisch Vergütung an den Verlag: 36,00 € Grundgebühr: 2,00 € Gesamtpreis: 38,00 €

Abstract IT enterprises have recently witnessed a dramatic increase in data volume and faced with challenges of storing and retrieving their data. Thanks to the fact that cloud infrastructures offer storage and network resources in several geographically dispersed data centers (DCs), data can be stored and shared in scalable and highly available manner with little or no capital investment. Due to diversity of pricing options and variety of storage and network resources offered by cloud providers, enterprises encounter nontrivial choice of what combination of storage options should be used in order to minimize the monetary cost of managing data in large volumes. To minimize the cost of data storage management in the cloud, we propose two data object placement algorithms, one optimal and another near optimal, that minimize residential (i.e., storage, data access operations), delay, and potential migration costs in a dual cloud-based storage architecture (i.e., the combination of a temporal and a backup DC). We evaluate our algorithms using real-world traces from Twitter. Results confirm the importance and effectiveness of the proposed algorithms and highlight the benefits of leveraging pricing differences and data migration across cloud storage providers (CSPs).

Inhaltsverzeichnis – Band 75

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.

The coverage problem in visual sensor networks: A target oriented approach
Zannat, Hafsa / Akter, Taslima / Tasnim, Mashrura / Rahman, Ashikur | 2016
Optimal drone placement and cost-efficient target coverage
Zorbas, Dimitrios / Di Puglia Pugliese, Luigi / Razafindralambo, Tahiry / Guerriero, Francesca | 2016
Block Negative Acknowledgement protocol for reliable multicast in IEEE 802.11
Daldoul, Yousri / Meddour, Djamal-Eddine / Ahmed, Toufik / Boutaba, Raouf | 2016
Cost-aware service brokering and performance sentient load balancing algorithms in the cloud
Naha, Ranesh Kumar / Othman, Mohamed | 2016
The rise of “malware”: Bibliometric analysis of malware study
Razak, Mohd Faizal Ab / Anuar, Nor Badrul / Salleh, Rosli / Firdaus, Ahmad | 2016
A novel hybrid medium access control protocol for inter-M2M communications
Verma, Pawan Kumar / Verma, Rajesh / Prakash, Arun / Tripathi, Rajeev / Naik, Kshirasagar | 2016
Piconet construction and restructuring mechanisms for interference avoiding in bluetooth PANs
Zhang, Qiaoyun / Chen, Guilin / Zhao, Liang / Chang, Chih-Yung | 2016
Towards an open source architecture for multi-operator LTE core networks
Marco Alaez, Ricardo / Alcaraz Calero, Jose M. / Belqasmi, Fatna / El-Barachi, May / Badra, Mohamad / Alfandi, Omar | 2016
GOSPF: An energy efficient implementation of the OSPF routing protocol
D'Arienzo, M. / Romano, S.P. | 2016
High throughput graphics processing unit based Fano decoder
Ates, Ozgur / Keskin, Selcuk / Kocak, Taskin | 2016
A survey on service function chaining
Bhamare, Deval / Jain, Raj / Samaka, Mohammed / Erbad, Aiman | 2016
Towards scalable security analysis using multi-layered security models
Hong, Jin B. / Kim, Dong Seong | 2016
A new explicit congestion notification scheme for satellite IP networks
Utsumi, Satoshi / Zabir, Salahuddin Muhammad Salim / Prabhavat, Sumet | 2016
Efficient event handling in Wireless Sensor and Actor Networks: An on-line computation approach
Konstantopoulos, Charalampos / Pantziou, Grammati / Venetis, Ioannis E. / Gavalas, Damianos | 2016
A survey on cloud computing security: Issues, threats, and solutions
Singh, Saurabh / Jeong, Young-Sik / Park, Jong Hyuk | 2016
To move or not to move: Cost optimization in a dual cloud-based storage architecture
Mansouri, Yaser / Buyya, Rajkumar | 2016
The past, present, and future of transport-layer multipath
Habib, Sana / Qadir, Junaid / Ali, Anwaar / Habib, Durdana / Li, Ming / Sathiaseelan, Arjuna | 2016
Copy-move forgery detection: Survey, challenges and future directions
Warif, Nor Bakiah Abd / Wahab, Ainuddin Wahid Abdul / Idris, Mohd Yamani Idna / Ramli, Roziana / Salleh, Rosli / Shamshirband, Shahaboddin / Choo, Kim-Kwang Raymond | 2016
Optimization based spectral partitioning for node criticality assessment
Asif, Waqar / Lestas, Marios / Khaliq Qureshi, Hassaan / Rajarajan, Muttukrishnan | 2016
Survey on low power real-time wireless MAC protocols
Bartolomeu, Paulo / Alam, Muhammad / Ferreira, Joaquim / Fonseca, José | 2016
Buyer seller watermarking protocols issues and challenges – A survey
Khan, Abid / Jabeen, Farhana / Naz, Farah / Suhail, Sabah / Ahmed, Mansoor / Nawaz, Sarfraz | 2016
Towards native code offloading based MCC frameworks for multimedia applications: A survey
Shuja, Junaid / Gani, Abdullah / Rehman, Muhammad Habib ur / Ahmed, Ejaz / Madani, Sajjad A. / Khan, Muhammad Khurram / Ko, Kwangman | 2016
Workflow-supported social networks: Discovery, analyses, and system
Park, Minjae / Ahn, Hyun / Kim, Kwanghoon Pio | 2016
A virtual replica node-based flash crowds alleviation method for sensor overlay networks
Shao, Xun / Jibiki, Masahiro / Teranishi, Yuuichi / Nishinaga, Nozomu | 2016
PRADD: A path reliability-aware data delivery protocol for underwater acoustic sensor networks
Nowsheen, Nusrat / Karmakar, Gour / Kamruzzaman, Joarder | 2015
Editorial board
| 2016