The introduction of new computing and networking paradigms, which leverage virtualization and service-oriented architectures, has brought far more agility than ever in the creation and concatenation of digital services. Yet it raises new security and privacy concerns that cannot be properly tackled by existing tools and models. In this paper,...
-
2020 (v1)PublicationUploaded on: April 14, 2023
-
2017 (v1)Publication
Telecom operators have recently started to deploy massive computing and storage resources at the very edge of their access networks, hence evolving their infrastructures into large, distributed, and capillary computing environments, capable of placing applications very close to users and terminals and well-suited to effectively fulfill the...
Uploaded on: April 14, 2023 -
2016 (v1)Publication
The application of effective energy management strategies in data centers is often hindered by the substantial conict between the interests of cloud users and infrastructure owners. As a matter of fact, cloud users require that the service level they are paying for is tightly met, whereas data center owners try to cut down their operational...
Uploaded on: April 14, 2023 -
2019 (v1)Publication
In last years, the security appliance is becoming a more important and critical challenge considering the growing complexity and diversification of cyber-attacks. The current solutions are often too cumbersome to be run in virtual services and Internet of Things (IoT) devices. Therefore, it is necessary to evolve to a more cooperative models,...
Uploaded on: March 27, 2023 -
2017 (v1)Publication
The consolidation of resources is one of the most efficient strategies to reduce the power consumption in data centers. Various algorithms have been proposed in order to reduce the total number of required servers and network devices. The practice developed in response to the problem of server sprawl, a situation in which multiple,...
Uploaded on: April 14, 2023 -
2020 (v1)Publication
Efficient usage of IT equipment in Data Centers requires modulating their power-consumption according to the actual workload. The most effective strategy to this aim consists in consolidating as many applications as possible on the smallest number of servers, so that idle devices can be shut down or put in low-power states. Usually, this...
Uploaded on: April 14, 2023 -
2017 (v1)Publication
The consolidation of resources is one of the most efficient strategies to reduce the power consumption in data centers. Various algorithms have been proposed in order to reduce the total number of required servers and network devices. The practice developed in response to the problem of server sprawl, a situation in which multiple,...
Uploaded on: April 14, 2023 -
2017 (v1)Publication
The growing interest in distributed, context-aware and data-sensitive applications is pushing the evolution of computing infrastructures from centralized to distributed models, which could effectively tackle the execution of complex software frameworks over geographical scale. The concept of cloud continuum that extends computing...
Uploaded on: April 14, 2023 -
2018 (v1)Publication
Power management and load balancing in data centers are becoming critical with the growing size of the infrastructure. In front of an increasing number of cloud networks, virtual machines (VMs) and containers, smart management and control decisions are required, in order to instantiate or mobilize these virtual components. As regards reducing...
Uploaded on: April 14, 2023 -
2021 (v1)Publication
Evolving business models are progressively pushing for increasing digitalization of existing and novel processes. The ICT industry is already addressing this need by massive introduction of virtualization paradigms and tight integration with the physical environment, which allow the creation of multi-domain and complex business service chains....
Uploaded on: March 27, 2023 -
2019 (v1)Publication
The definition of elastic network services that can be orchestrated at run-time brings unprecedented agility and dynamicity in network operation, but also complicates security management. As a matter of fact, cyber-security appliances are still largely stuck to traditional paradigms, based on relatively static topologies and the security...
Uploaded on: April 14, 2023 -
2019 (v1)Publication
The growing complexity and diversification of cyber-attacks are largely reflected in the increasing sophistication of security appliances, which are often too cumbersome to be run in virtual services and IoT devices. Hence, the design of cyber-security frameworks is today looking at more cooperative models, which collect security-related data...
Uploaded on: April 14, 2023 -
2019 (v1)Publication
The uptake of virtualization and cloud technologies has pushed novel development and operation models for the software, bringing more agility and automation. Unfortunately, cyber-security paradigms have not evolved at the same pace and are not yet able to effectively tackle the progressive disappearing of a sharp security perimeter. In this...
Uploaded on: April 14, 2023 -
2022 (v1)Publication
With the progressive implementation of digital services over virtualized infrastructures and smart devices, the inspection of network traffic becomes more challenging than ever, because of the difficulty to run legacy cybersecurity tools in novel cloud models and computing paradigms. The main issues concern i) the portability of the service...
Uploaded on: February 22, 2023 -
2020 (v1)Publication
The 'arm race' against malware developers requires to collect a wide variety of performance measurements, for instance to face threats leveraging information hiding and steganography. Unfortunately, this process could be time-consuming, lack of scalability and cause performance degradations within computing and network nodes. Moreover, since...
Uploaded on: March 27, 2023 -
2018 (v1)Publication
The advent of fifth generation is promising to push far more intelligence than today to the network boundary, hence boosting novel computing models based on fog/edge paradigms. The need for proximity in computation, coupled with various forms of mobility, will be responsible for dynamic shifting of workload within the system, with large...
Uploaded on: April 14, 2023 -
2018 (v1)Publication
Mobility has always been a big challenge in cellular networks, because it is responsible for traffic fluctuations that eventually result into inconstant resource usage and the need for proper Quality of Service management. When applications get deployed at the network edge, the challenges even grow because software is harder to hand-over than...
Uploaded on: April 14, 2023