Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 2 dokumen yang sesuai dengan query
cover
Brian Samuel Matthew
Abstrak :
Skripsi ini menyajikan analisis kinerja komprehensif penyeimbang beban dalam konteks lingkungan Apache CloudStack berbasis Prometheus. Seiring dengan berkembangnya komputasi awan, efisiensi mekanisme penyeimbangan beban memainkan peran penting dalam memastikan pemanfaatan sumber daya yang optimal dan keandalan layanan. Memanfaatkan Prometheus untuk pemantauan dan pengumpulan metrik, penelitian ini bertujuan untuk mengevaluasi kinerja berbagai konfigurasi penyeimbang beban yang diterapkan di Apache CloudStack, serta memberikan analisis terhadap mengapa penyeimbang beban dapat meningkatkan efisiensi distribusi paket sebesar 23%. ......This thesis provides a complete performance analysis of load balancers in Prometheus-based Apache CloudStack setups. As cloud computing evolves, the effectiveness of load balancing techniques becomes critical in guaranteeing optimal resource usage and service reliability. Using Prometheus for monitoring and metric collecting, this study seeks to assess the performance of several load balancer configurations implemented in Apache CloudStack, and also providing analysis as to why load balancer can increase the efficiency of traffic distribution by up to 23%.
Depok: Fakultas Teknik Universitas Indonesia, 2024
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Devi Thiyagarajan
Abstrak :
Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud computing: security. Data owners lack in having direct control over files stored in the cloud and consequently, the problem of data security arises. An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud.
Depok: Faculty of Engineering, Universitas Indonesia, 2015
UI-IJTECH 6:3 (2015)
Artikel Jurnal  Universitas Indonesia Library