2020
DOI: 10.1007/978-3-030-41110-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Next Generation Cloud Architectures

Abstract: This chapter discusses the evolution of cloud infrastructures and the impact of IoT. We discuss the need for heterogeneous resources integration in resource provisioning and the necessity to find the golden ratio between the cloud, fog and edge for optimal user experience. Complexity across the cloud-to-thing continuum is escalating rapidly. One way that cloud computing can adapt is to incorporate self-management and selforganization techniques and methods to preserve service availability and avoid user Qualit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
(23 reference statements)
0
3
0
Order By: Relevance
“…The OWASP “Top 10 Cloud Risks” [ 39 ], highlighted two issues revealed by the d-TM analysis method, “User Identity Federation” and “Infrastructure Security”. Furthermore, Denial-of-Service (DoS) attack and threats relating to identity management are also considered in [ 2 , 40 , 41 ]. The consequences of a cloud account takeover are even more difficult to trace and mitigate.…”
Section: Discussionmentioning
confidence: 99%
“…The OWASP “Top 10 Cloud Risks” [ 39 ], highlighted two issues revealed by the d-TM analysis method, “User Identity Federation” and “Infrastructure Security”. Furthermore, Denial-of-Service (DoS) attack and threats relating to identity management are also considered in [ 2 , 40 , 41 ]. The consequences of a cloud account takeover are even more difficult to trace and mitigate.…”
Section: Discussionmentioning
confidence: 99%
“…Depending on the required level of availability and the relevance of characteristics related to the location, security, and privacy of information, there are different forms of implementation, usually framed in public or private clouds. More recently, hybrid cloud models (complementing private cloud services with public cloud services) and multi-cloud (using cloud services from different service providers) have become increasingly important to make infrastructures more adaptable to existing needs and services more resilient [5], [20], [21]. In the context of MEC [6], [22], and edge computing [17] in general, the aim is to bring centralized cloud functionalities to the edge so that customers can take advantage of the functionalities while benefiting from response times that are more appropriate to the characteristics of the services being implemented [23], [24].…”
Section: A Cloud Servicesmentioning
confidence: 99%
“…IoT devices are very heterogeneous, ranging from very constrained sensors to heavier embedded systems, in order to deal with all the new and various business opportunities. For instance, some new use cases incorporate the Cloud-to-Thing Continuum [1] and increased virtualisation [2] for the smallest devices to make the IoT device simpler to code, more portable, easier to deploy and in the end cheaper to produce with increased efficiency for the ecosystem.…”
Section: Introductionmentioning
confidence: 99%