State-of-the-Art Technology in Cloud and Network Infrastructure

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (15 July 2024) | Viewed by 2909

Special Issue Editors


E-Mail Website
Guest Editor
Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China
Interests: cloud and network technology; network security

E-Mail Website
Guest Editor
College of Computer and Data Science/College of Software, Fuzhou University, Fuzhou 350000, China
Interests: network systems; network security

E-Mail Website
Guest Editor
Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China
Interests: network systems; network security

Special Issue Information

Dear Colleagues,

Recently, more delay-sensitive and availability-required applications (e.g., web search and online trading) have been deployed over geo-distributed clouds. The applications impose strict requirements for both intra-cloud and inter-cloud networks to guarantee the SLA. In reality, there are two main requirements, i.e., performance and security. Firstly, building a dedicated line for applications is expensive; therefore, adopting new technologies (e.g., SDN and deep learning) that improve user experience in an economical manner is essential for network and cloud providers. Secondly, infrastructures are bearing many threats from the internet, and many attacks can cause significant economic losses; thus, detecting and eliminating security incidents is important. This Special Issue focuses on cloud network optimization technology and security technology to guarantee user experience. We aim to bring together researchers, industry practitioners, and individuals working on these related areas to share their new ideas, latest findings, and state-of-the-art results.

In this Special Issue, original research articles and reviews are welcome. Research areas may include (but are not limited to) the following:

  • All types of wide-area, data center, and cloud networks algorithms.
  • All aspects of networks and networked systems such as architecture, packet-processing hardware and software, virtualization, mobility, resource management, performance, energy consumption, topology, robustness, security, diagnosis, verification, privacy, economics, evolution, and interactions with applications.
  • All types of computer network design, analysis, and experimental approaches such as theory, measurements, and machine learning-based techniques.

Dr. Han Zhang
Dr. Yingya Guo
Dr. Yahui Li
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • computer network
  • cloud
  • security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 601 KiB  
Article
Verification of an Evolving Security Scheme in the Internet of Vehicles
by Weiyang Xin, Hanning Zhang, Chunxiang Xu, Jiangyuan Yao, Deshun Li and Ting Jin
Electronics 2023, 12(21), 4438; https://doi.org/10.3390/electronics12214438 - 28 Oct 2023
Viewed by 973
Abstract
The security scheme of the Internet of Vehicles (IoV) protects the vehicles from network attacks. However, during the experimental deployment of the IoV, people usually pay attention to its function and performance, and only develop a security scheme empirically when security defects are [...] Read more.
The security scheme of the Internet of Vehicles (IoV) protects the vehicles from network attacks. However, during the experimental deployment of the IoV, people usually pay attention to its function and performance, and only develop a security scheme empirically when security defects are found. When a security scheme becomes very complex, it is very difficult to find the security vulnerability and to modify it. In view of this, we propose a verification method to verify the security of an evolving security scheme. This method uses formal methods to verify the evolving security scheme, actively finds the security problems of the security scheme, and promotes the evolution of the security scheme accordingly. This method is applied to the scenario of the IoV and its security scheme—the method evolves the Internet of Vehicles configuration and the security properties, establishes a corresponding formal model, and then iteratively verifies this using a formal method. The approach can fully simulate the evolution process of a security scheme in the IoV during deployment, and can effectively find the corresponding security vulnerabilities, to promote the evolving security scheme in the IoV, which supports the feasibility and usability of the method. Full article
(This article belongs to the Special Issue State-of-the-Art Technology in Cloud and Network Infrastructure)
Show Figures

Figure 1

20 pages, 4003 KiB  
Article
ABLA: Application-Based Load-Balanced Approach for Adaptive Mapping of Datacenter Networks
by Ahmad Nahar Quttoum, Ayoub Alsarhan, Abidalrahman Moh’d, Osama Alshareet, Suhieb Nawaf, Fawaz Khasawneh, Mohammad Aljaidi, Mohammed Alshammari and Anjali Awasthi
Electronics 2023, 12(17), 3689; https://doi.org/10.3390/electronics12173689 - 31 Aug 2023
Cited by 3 | Viewed by 1388
Abstract
Cloud-based services are growing more rapidly than ever, and so does the management challenge on their providers’ side. Cloud-based datacenter networks are built with nodes of huge processing power, connected by high bandwidth capacities to carry their interior traffic requirements. However, such cloud [...] Read more.
Cloud-based services are growing more rapidly than ever, and so does the management challenge on their providers’ side. Cloud-based datacenter networks are built with nodes of huge processing power, connected by high bandwidth capacities to carry their interior traffic requirements. However, such cloud networks still have limits that are imposed not necessarily by their physical components, but by the schemes of resource management being deployed. Traditionally, for an institute to provide services, it needs to have its own datacenter facility that interconnects its servers through a topology that matches its desired administrative policies and scaling objectives. With the theme of cloud-based IaaS, such datacenter topologies can be created virtually over the cloud. Nowadays, a significant part of those institutes who provide us with our daily services have their infrastructures hosted over cloud ones. Therefore, resources of such cloud networks need to be efficiently utilized, in order to keep their performance and hosting prices competitive. A typical datacenter network mainly consists of server nodes and network links. Besides the resources of the server nodes, the network bandwidth resources are considered a crucial key determinant for the whole datacenter performance. Indeed, a server without sufficient bandwidth capacities is almost useless. Proposals in the literature present schemes for resource utilization on either side of the problem at a time: the nodes or the links. Working in isolation can never deliver efficient mapping solutions. ABLA is an Application-Based, and Load balancing Approach for adaptive mapping proposal. ABLA’s methodology tackles both sides of the datacenter, the nodes and links. It starts by (1) breaking down the node’s resource requirement for the requested applications to be hosted over the virtual server machines besides (2) reading the topological connectivity and bandwidth requirements for each virtual node to all other nodes in the virtual datacenter topology. Compared to other models in the literature, the simulation results show that our proposed ABLA model provides for complete mapping services via load-balanced hosting networks. This allows for competitive hosting prices, with higher performance and service satisfaction rates. Full article
(This article belongs to the Special Issue State-of-the-Art Technology in Cloud and Network Infrastructure)
Show Figures

Figure 1

Back to TopTop