Cloud Computing Economy Research Papers (original) (raw)

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education... more

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.

In last two decades continues increase of comput-ational power and recent advance in the web technology cause to provide large amounts of data. That needs large scale data processing mechanism to handle this volume of data. MapReduce is a... more

In last two decades continues increase of comput-ational power and recent advance in the
web technology cause to provide large amounts of data. That needs large scale data
processing mechanism to handle this volume of data. MapReduce is a programming model
for large scale distributed data processing in an efficient and transparent way. Due to its
excellent fault tolerance features, scalability and the ease of use. Currently, there are several
options for using MapReduce in cloud environments, such as using MapReduce as a service,
setting up one’s own MapReduce cluster on cloud instances, or using specialized cloud
MapReduce runtimes that take advantage of cloud infrastructure services. Cloud computing
has recently emerged as a new paradigm that provide computing infrastructure and large
scale data processing mechanism in the network. The cloud is on demand, scalable and high
availability so implement of MapReduce on the top of cloud services cause faster, scalable
and high available MapReduce framework for large scale data processing. In this paper we
explain how to implement MapReduce in the cloud and also have a comparison between
implementations of MapReduce on AzureCloud, Amazon Cloud and Hadoop at the end.

Cloud computing is Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. Cloud computing is the hottest purpose built architecture created to support computer users.... more

Cloud computing is Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. Cloud computing is the hottest purpose built architecture created to support computer users. The cloud addresses three main areas of operation SaaS (software-as-a-service),PaaS (platform-as-a-service) and IaaS (infrastructure as a service). The large amount of data can be stored into cloud Data centers with low cost. We Integrate Data Mining and Cloud Computing to provide a quick access to this large volume amount of data on cloud. This paper aimed to study Clustering algorithm which can be applicable in cloud computing. This paper also describes the role of soft clustering in Cloud computing environment.

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector... more

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.

Cloud computing is a new technology that brings new challenges to all organizations around the world. Improving response time for user requests on cloud computing is a critical issue to combat bottlenecks. As for cloud computing,... more

Cloud computing is a new technology that brings new challenges to all organizations around the world. Improving response time for user requests on cloud computing is a critical issue to combat bottlenecks. As for cloud computing, bandwidth to from cloud service providers is a bottleneck. With the rapid development of the scale and number of applications, this access is often threatened by overload. Therefore, this paper our proposed Throttled Modified Algorithm(TMA) for improving the response time of VMs on cloud computing to improve performance for end-user. We have simulated the proposed algorithm with the CloudAnalyts simulation tool and this algorithm has improved response times and processing time of the cloud data center.

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education... more

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.

Considering the complexity of today"s service environment, Small-to-Medium sized Enterprises (SMEs) cannot afford to accept the status quo of service operations and therefore must have some clear business analytics objective to reach.... more

Considering the complexity of today"s service environment, Small-to-Medium sized Enterprises (SMEs) cannot afford to accept the status quo of service operations and therefore must have some clear business analytics objective to reach. Without clear metric objectives, organisations are almost destined for disaster since the allocation of resources may not have responded to the demand exerted from outside of the organisation. This is particularly true within a complex and rapidly changing cloud computing environment. The cloud dynamic ecosystem is moving towards a collection of services which interoperate across the Internet. This chapter offers a discussion on an approach to assessing cloud capabilities through Cloud Service Capability Assessment Framework (CSCAF). Service metrics plays a critical role in CSCAF and presents managers with a practical framework to carry out cloud capability assessments. The process may be simply described as publishing, retrieving, and managing cloud service descriptions, service publications which are matched with descriptions of consumer"s requirements and service matching.

One of the most fundamental services offered by cloud providers is data storage. Let us consider a practical data application. A company allows its staffs in the same group or department to store and share files in the cloud. By utilizing... more

One of the most fundamental services offered by cloud providers is data storage. Let us consider a practical data application. A company allows its staffs in the same group or department to store and share files in the cloud. By utilizing the cloud, the staffs can be completely released from the troublesome local data storage and maintenance. However, it also poses a significant risk to the confidentiality of those stored files. Specifically, the cloud servers managed by cloud providers are not fully trusted by users while the data files stored in the cloud may be sensitive and confidential, such as business plans. First, identity privacy is one of the most significant obstacles for the wide deployment of cloud computing. Without the guarantee of identity privacy, users may be unwilling to join in cloud computing systems because their real identities could be easily disclosed to cloud providers and attackers. Second, it is highly recommended that any member in a group should be able to fully enjoy the data storing and sharing services provided by the cloud, which is defined as the multiple-owner manner. The groups are normally dynamic in practice, e.g., new staff participation and current employee revocation in a company. The changes of membership make secure data sharing extremely difficult. On one hand, the anonymous system challenges new granted users to learn the content of data files stored before their participation, because it is impossible for new granted users to contact with anonymous data owners, and obtain the corresponding decryption keys. On the other hand, an efficient membership revocation mechanism without updating the secret keys of the remaining users is also desired to minimize the complexity of key management.

Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications,development of customized computer... more

Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications,development of customized computer software, and creation of a “realistic” network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition,countermeasures to cloud security breaches are presented.

Cloud computing enables services having five characteristics: on-demand, network access, resource pooling, rapid elasticity, and measured service. From the technological point of view cloud computing means separating the User Interface,... more

Cloud computing enables services having five characteristics: on-demand, network access, resource pooling, rapid elasticity, and measured service.
From the technological point of view cloud computing means separating the User Interface, Application Execution, and Hardware. From the industry structure point of view this has led to a new horizontalization of software industry to services layers: Software-as-a-Service, Platform-as-a-Service; and Infrastructure-as-a-Service. Besides these, also the client software layer belongs to the ecosystem. From the Finnish point of view, the role of mobile communications in the development needs also special attention.
Currently, cloud services have global yearly volume of 50−60B,whichisabout2percentofglobalICTindustry.ITindustrycloudserviceshadglobalvolumeof50-60 B, which is about 2 percent of global ICT industry. IT industry cloud services had global volume of 5060B,whichisabout2percentofglobalICTindustry.ITindustrycloudserviceshadglobalvolumeof17.4 M in 2009, which was about 2 percent of global IT services and software business.
In transition to the cloud, the success of software company is dependent on whether it can recognize a sustainable position in the new industry structure and whether in can reach the position.
The major new strategic risks related to cloud are the reduced lock-in of customers, and longer investment payback periods. The major new operational risk is the increased dependency on suppliers.

Cloud gaming is an emerging technology that combines cloud computing with computer games. Compared to traditional gaming, its core advantages include ease of development/deployment for developers, and lower technology costs for users... more

Cloud gaming is an emerging technology that combines cloud computing with computer games. Compared to traditional gaming, its core advantages include ease of development/deployment for developers, and lower technology costs for users given the potential to play on thin client devices. In this chapter, we firstly describe the approach, and then focus on the impact of latency, known as lag, on Quality of Experience, for so-called First Person Shooter games. We outline our approach to lag compensation whereby we equalize within reason the up and downlink delays in real-time for all players. We describe the testbed in detail, the open source Gaming Anywhere platform, the use of NTP to synchronise time, the network emulator and the role of the centralized log server. We then present results that firstly validate the mechanism and also use small scale and preliminary subjective tests to assess and prove its performance. We conclude the chapter by outlining ongoing and future work.

Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and... more

Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.

Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. The elements involved in cloud computing are clients, data center and... more

Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. The elements involved in cloud computing are clients, data center and distributed server. One of the main problems in cloud computing is load balancing. Balancing the load means to distribute the workload among several nodes evenly so that no single node will be overloaded. Load can be of any type that is it can be CPU load, memory capacity or network load. In this paper we presented an architecture of load balancing and algorithm which will further improve the load balancing problem by minimizing the response time. In this paper, we have proposed the enhanced version of existing regulated load balancing approach for cloud computing by comping the Randomization and greedy load balancing algorithm. To check the performance of proposed approach, we have used the cloud analyst simulator (Cloud Analyst). Through simulation analysis, it has been found that proposed improved version of regulated load balancing approach has shown better performance in terms of cost, response time and data processing time.

Cloud computing and education sounds ambiguous on the face of it. Naturally, it's because, very few individuals, publishers and users alike come from the education sector. In most cases, cloud computing is only associated with businesses... more

Cloud computing and education sounds ambiguous on the face of it. Naturally, it's because, very few individuals, publishers and users alike come from the education sector. In most cases, cloud computing is only associated with businesses and how they can leverage their efficiencies. Just to introduce how the cloud deserves a place in our current education institution, it's important to reiterate the education philosophy. Its essence is knowledge. It's this knowledge which brings advancement, achievement and success. However, there are several things which make these parameters unattainable. In blunt language, this is failure. Small classrooms, lack or resources, short-handed staff, lack of adequate teachers…the list is endless. One way or the other, cloud computing can be utilized to improve education standards and activities. The end result will be to curb the above problems and instead, boost performance.

Software-as-a-Service providers have been growing fast while the contemporary research literature has neglected analysis of their business-critical marketing and sales processes. In this paper we collect the key factors characterizing how... more

Software-as-a-Service providers have been growing fast while the contemporary research literature has neglected analysis of their business-critical marketing and sales processes. In this paper we collect the key factors characterizing how to market and sell SaaS to business customers into an eight dimensional model. We also use an explorative multi-case study to observe six SaaS providers and validate the model. The interviewed providers emphasized use of the Internet for marketing communication while personal direct sale was the dominating sales approach. Customer acquisition cost was the key performance indicator for marketing and sales while customer lifetime value and churn were the KPIs in customer relationship management.

In this modern age of science and technology, Cloud Computing has become an emerging technology that gains wide influence on information technology (IT) systems by providing a friendly environment to its user with various services such as... more

In this modern age of science and technology, Cloud Computing has become an emerging technology that gains wide influence on information technology (IT) systems by providing a friendly environment to its user with various services such as SaaS, PaaS,, and IaaS.. The trend of frequently adopting this technology by many different organizations automatically introduced new security risk on top of inherited risk. That's why security is considered as a key requirement for a robust and feasible multipurpose solution in cloud computing models. Due to the ever growing interest in cloud computing, researchers have explicit and constant effort to evaluate the current trends in security for such technology, considering both problems already identified and possible solutions . In our entire paper, we will try to show clear presentations for every cloud computing service model currently available, and noting how they differ from each other by using head-to-head presentation table that will further clear our concept about cloud models. At the end of the paper, we will try our best to discuss and analyze the opportunities & obstacles of cloud computing in developing countries.

Cloud computing that is an ever more important trend, is a virtual technology that uses the online world and central remote servers to own sharing of resources that include infrastructures, software, applications and business processes... more

Cloud computing that is an ever more important trend, is a virtual technology that uses the online world and central remote servers to own sharing of resources that include infrastructures, software, applications and business processes into the market environment to fulfil the elastic demand. In today's competitive conditions, the service strength, elasticity, options and flexibility created available from this scalable technology are quite tempting that makes the cloud computing to progressively becoming a underlying element of the organization computing environment. This chapter presents a review associated with ongoing state of Cloud Computing. It provides a conversation of this evolution means of cloud computing, attributes of Cloud, current technologies acquired in cloud computing. This chapter also provides a comparative study of cloud computing systems and their challenges.

Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the... more

Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. Thus, it is necessary to place cryptographically enhanced access control on the shared data. Identity-based encryption is a promising cryptographically primitive to build a practical data sharing system. However, access control is not static. That is, when some user’s authorization is expired, there should be a mechanism that can remove him/her from the system. Consequently, the revoked user cannot access both the previously and subsequently shared data. To this end, we propose a notion called revocable-storage identity-based encryption (RS-IBE), which can provide the forward/backward security of cipher text by introducing the functionalities of user revocation and cipher text update simultaneously. Furthermore, we present a concrete construction of RS-IBE, and prove its security in the defined security model. The performance comparisons indicate that the proposed RS-IBE scheme has advantages in terms of functionality and efficiency, and thus is feasible for a practical and cost-effective data-sharing system. Finally, we provide implementation results of the proposed scheme to demonstrate its practicability.

This Research paper explores importance of Software As A Service (SaaS) for efficient cloud computing in organizations and its implications. Enterprises now a days are betting big on SaaS and integrating this service delivery model of... more

This Research paper explores importance of Software As A Service (SaaS) for efficient cloud computing in organizations and its
implications. Enterprises now a days are betting big on SaaS and integrating this service delivery model of cloud computing
architecture in their IT services. SaaS applications are service centric cloud computing delivery model used as IT Infrastructure
which is multi-tenant architecture used to provide rich user experience with desired set of features requested by the cloud user. This
research paper also discusses the importance of SaaS application architecture, functionality, efficiency, advantages and
disadvantages.

Cloud computing is a realized wonder. It delights its users by providing applications, platforms and infrastructure without any initial investment. The " pay as you use " strategy comforts the users. The usage can be increased by adding... more

Cloud computing is a realized wonder. It delights its users by providing applications, platforms and infrastructure without any initial investment. The " pay as you use " strategy comforts the users. The usage can be increased by adding infrastructure, tools or applications to the existing application. The realistic beauty of cloud computing is that there is no need for any sophisticated tool for access, web browser or even smartphone will do. Cloud computing is a windfall for small organizations having less sensitive information. But for large organizations, the risks related to security may be daunting. Necessary steps have to be taken for managing the issues like confidentiality, integrity, privacy, availability and so on. In this paper availability is taken and studied in a multi-dimensional perspective. Availability is taken a key issue and the mechanisms that enable enhancement are analyzed.

We present a Systematic Literature Review (SLR) on Cloud Computing that selected 51 papers from first tier journals and conferences in the period 2008-2012. The selective approach captures the economical perspective on Cloud Computing... more

We present a Systematic Literature Review (SLR) on Cloud Computing that selected 51 papers from first tier journals and conferences in the period 2008-2012. The selective approach captures the economical perspective on Cloud Computing highlighting especially the business issues, cost/pricing models, and legal issues raised by the adoption of this new technological approach. Finally, it also spots emerging issues as a general lack of framework for security and service level management that respond to the peculiar profile of Cloud Computing.

Cloud computing is useful to companies and organizations as it eliminates the requirement for them to plan ahead for provisioning, and allows them to start with small resources and increase gradually as the service demand rises. There are... more

Cloud computing is useful to companies and organizations as it eliminates the requirement for them to plan ahead for provisioning, and allows them to start with small resources and increase gradually as the service demand rises. There are challenges in adopting cloud computing; but with obstacles, we have opportunities for research in several aspects of cloud computing. One of the main issue is the data security and privacy of information stored and processed at the cloud service provider's systems. In this work, we surveyed several research works on cloud computing related to security challenges and privacy issues. The primary goal of this paper is to provide a insight into the security challenges of cloud computing and fy approaches and solutions which have been proposed and adopted by the cloud service.

Everybody has a supposition on what is a Cloud computing. Cloud computing is a modern area emerged by distributed computing that offers many powerful benefits to different organizations. It has an ability to rent a server or a thousand of... more

Everybody has a supposition on what is a Cloud computing. Cloud computing is a modern area emerged by distributed computing that offers many powerful benefits to different organizations. It has an ability to rent a server or a thousand of servers via information technology (IT) services whole the world. The capabilities of Cloud computing are obtained by running a geophysical modeling application on most powerful systems. Organizations can improve their efficiency to quickly and reliably respond to the needs of their customers. It is performed by making a contract for various Cloud services such as applications, software, data storages, and processing capabilities. There are some risks in Cloud-based servers such as maintaining the security of systems, asserting the privacy of information, and insuring the wise expenditures of IT resources. In 2004, Cloud computing progressed to public awareness. Essentially, various companies such as Amazon, Google, and Facebook use Cloud technology as a model for running their own infrastructures. This causes the dedicated services to be always on, occurring on the running systems to be upgraded, and accordance with demand to be scaled considerably. Cloud computing involves a range of underlying technologies and configuration options instead of being as a single system. Organizations should consider the strengths and weaknesses of the Cloud technology, service models, and deployment methods through evaluating services to meet their requirements.
A Cloud system can extremely store and secure large amounts of data that is accessible only by authorized users and applications. It is supported and sponsored by a Cloud service provider which installs a powerful platform on the Cloud systems. The platform involves some of the required abilities such as the operating system, Apache, a MySQL database, Perl, Python, and PHP with a capability for automatically scaling in response to changing the different workloads. Cloud computing can utilize some applications such as sales automation, email, and forum management on the Internet. Internet can protect data while providing a consumer’s service as well it is able to utilize the Cloud storage for holding an application, personal data, and business. A Cloud system with the aid of the Internet can use a small number of Web services in order to integrate maps, photos, and GPS information.
This book discusses about the main concepts of Cloud computing. It is an appropriate tutorial for ordinary and professional people to acquire some required information about Cloud technology. Chapter 1 introduces the overall and fundamental characteristic of Cloud systems such as Web services, Grid computing, and hardware virtualization. In Chapter 2, the architectures of Cloud computing including the deployment models and the service models defined for Cloud-based servers are described carefully. Chapter 3 explains various applications of Cloud computing in various applications such as file storage, Cloud database, and email. In Chapter 4, some popular consumer applications designed by Cloud-based systems such as Evernote, iCloud, and Spotify are represented completely. Chapter 5 discusses about the different usages of Cloud servers such Cloud monitoring, healthcare, and banking. In Chapter 6, the security issues of Cloud computing such as privacy, reliability, and compliance are presented carefully. Chapter 7 points out the famous simulation tools designed for Cloud-based issues such as CloudSim, Xen hypervisor, and UEC. Finally, Chapter 8 introduces some well-liked companies established for Cloud-based usages such as CloudLock, CloudMunch, and CloudPhysics.
I hope that this book can help to ordinary people and professional researchers to design and implement various applications with Cloud technology. Undoubtedly, this book like any humanistic product is not devoid of any problem. Hence, the next version of this book can be published more appropriate than current version according to valuable suggestions of dear readers. I wish that this book can assist to computer science to design complex systems and to solve some of the exiting problems. Finally, I am grateful from anyone who assisted me to publish this book.

In the current scenarios, there was a huge demand for the wearable devices due to the development of clouds and cloudlet technology. So there has been wide essential to offer a better medical care to the people. For processing the patient... more

In the current scenarios, there was a huge demand for the wearable devices due to the development of clouds and cloudlet technology. So there has been wide essential to offer a better medical care to the people. For processing the patient medical information from one system to another includes various phases such as data collection, data storage, data sharing, etc. In the case of traditional healthcare system, it needs medical data transformation to cloud which includes user's sensitive data and further cause's communication energy consumption. Basically, medical data sharing referred as a most challenging issue. So, this research provides an apt solution to the medical data sharing. Here, a novel healthcare system is being developed by making use of flexibility of cloudlet. The cloudlet mainly functions to provide privacy protection, data sharing and intrusion detection. NTRU (Number Theory Research Unit) method is being initially used here to encrypt the user's information that is being gathered through wearable devices. This information will be further transmitted to the nearest cloudlet in an energy efficient way. Apart from this method, this research also proposes a new trust model to assist the users to choose trustable partners whoever wishes to share the information stored in cloudlet. This model mainly helps the patients who are suffering from some health problems by communicating with each other. The user's medical information which is being stored in remote cloud of hospital is classified into three parts and further secures them. For securing the healthcare system from malicious attacks this research developed a novel collaborative IDS (Intrusion Detection System) method through cloudlet mesh. As this can secure the remote healthcare big data cloud from various attacks. Finally, NTRU and AES-Rijndael algorithm are being used in order to attain more robust functionality. For implementation, Java technologies have been used to prove that proposed scheme remains effective.

Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. The elements involved in cloud computing are clients, data center... more

Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. The elements involved in cloud computing are clients, data center and distributed server. One of the main problems in cloud computing is load balancing. Balancing the load means to distribute the workload among several nodes evenly so that no single node will be overloaded. Load can be of any type that is it can be CPU load, memory capacity or network load. In this paper we presented an architecture of load balancing and algorithm which will further improve the load balancing problem by minimizing the response time. In this paper, we have proposed the enhanced version of existing regulated load balancing approach for cloud computing by comping the Randomization and greedy load balancing algorithm. To check the performance of proposed approach, we have used the cloud analyst simulator (Cloud Analyst). Through simulat...

These days the common term used for distinguishing the services such as availability, data mobility, cost effective, privacy and security is “Cloud Computing Technology”. Cloud computing can solve technical issues, reduce organization... more

These days the common term used for distinguishing the services such as availability, data mobility, cost effective, privacy and security is “Cloud Computing Technology”. Cloud computing can solve technical issues, reduce organization cost, and make data available anytime, anywhere. Like many technologies, cloud computing is facing lot of challenges; one of these challenges is “Trust relationship”. In this paper we will propose a model called “Cloud Computing Trust Relationship Model (CCTRM)”. This model will enhance the security and privacy for cloud computing environment. CCTRM model will be used in telecommunication and non telecommunication organizations, governments sectors, and private sectors to implement trust relationship between them and cloud computing service providers. This trust will allow the organization to obtain cloud computing services safely without
the need to be worry about security and privacy on their cloud.

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education... more

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.

in this paper focuses on development of cloud computing, privacy security issues have become increasingly prominent, which is of concern to industry and academia. We review the research progress on privacy security issues from the... more

in this paper focuses on development of cloud computing, privacy security issues have become increasingly prominent, which is of concern to industry and academia. We review the research progress on privacy security issues from the perspective of several privacy security protection technologies in cloud computing. First, we introduce some privacy security risks of cloud computing and propose a comprehensive privacy security protection framework.

Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. The elements involved in cloud computing are clients, data center... more

Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. The elements involved in cloud computing are clients, data center and distributed server. One of the main problems in cloud computing is load balancing. Balancing the load means to distribute the workload among several nodes evenly so that no single node will be overloaded. Load can be of any type that is it can be CPU load, memory capacity or network load. In this paper we presented an architecture of load balancing and algorithm which will further improve the load balancing problem by minimizing the response time. In this paper, we have proposed the enhanced version of existing regulated load balancing approach for cloud computing by comping the Randomization and greedy load balancing algorithm. To check the performance of proposed approach, we have used the cloud analyst simulator (Cloud Analyst). Through simulat...

Cloud computing is an innovation that brings significant gains for organizations to reduce total cost of ownership and increase agility to provide the ICT platform. Elasticity is one of the key features of this model, allowing gains from... more

Cloud computing is an innovation that brings significant gains for organizations to reduce total cost of ownership and increase agility to provide the ICT platform. Elasticity is one of the key features of this model, allowing gains from the match between supply and demand of resources: on the one hand reduces idleness and advanced investment, on the other avoids the lack of resources in the event of a peak in demand. The definition of the new concepts to communicate the strategy to be used, the term "Private Cloud" has been sometimes used to define a cloud provided by an organization for its own exclusive use. In these particular cases, the resources to fulfil peaks on demand came along with an increasing investment, and the so-called "private cloud" comes to be only in the technological aspect of supply format upon request, but on resources already contracted. But when analyzing the economic effect of this strategy, it is concluded that the expected gains with a cloud arrangement is not reached, by contrast, costs go up by the increase in total idleness of resources.

In this modern age of science and technology, Cloud Computing has become an emerging technology that gains wide influence on information technology (IT) systems by providing a friendly environment to its user with various services... more

In this modern age of science and technology, Cloud Computing has become an emerging
technology that gains wide influence on information technology (IT) systems by providing a friendly
environment to its user with various services such as SaaS, PaaS,, and IaaS.. The trend of frequently adopting
this technology by many different organizations automatically introduced new security risk on top of inherited
risk. That’s why security is considered as a key requirement for a robust and feasible multipurpose solution in
cloud computing models. Due to the ever growing interest in cloud computing, researchers have explicit and
constant effort to evaluate the current trends in security for such technology, considering both problems already
identified and possible solutions . In our entire paper, we will try to show clear presentations for every cloud
computing service model currently available, and noting how they differ from each other by using head-to-head
presentation table that will further clear our concept about cloud models. At the end of the paper, we will try
our best to discuss and analyze the opportunities & obstacles of cloud computing in developing countries.

Cloud computing has an indispensable role in the modern digital scenario. The fundamental challenge of cloud systems is to accommodate user requirements which keep on varying. This dynamic cloud environment demands the necessity of... more

Cloud computing has an indispensable role in the modern digital scenario. The fundamental challenge of cloud systems is to accommodate user requirements which keep on varying. This dynamic cloud environment demands the necessity of complex algorithms to resolve the trouble of task allotment. The overall performance of cloud systems is rooted in the efficiency of task scheduling algorithms. The dynamic property of cloud systems makes it challenging to find an optimal solution satisfying all the evaluation metrics. The new approach is formulated on the Round Robin and the Shortest Job First algorithms. The Round Robin method reduces starvation, and the Shortest Job First decreases the average waiting time. In this work, the advantages of both algorithms are incorporated to improve the makespan of user tasks.

In this paper we will present a reliable scheduling algorithm in cloud computing environment. In this algorithm we create a new algorithm by means of a new technique and with classification and considering request and acknowledge time of... more

In this paper we will present a reliable scheduling algorithm in cloud computing environment. In this algorithm we create a new algorithm by means of a new technique and with classification and considering request and acknowledge time of jobs in a qualification function. By evaluating the previous algorithms, we understand that the scheduling jobs have been performed by parameters that are associated with a failure rate. Therefore in the proposed algorithm, in addition to previous parameters, some other important parameters are used so we can gain the jobs with different scheduling based on these parameters. This work is associated with a mechanism. The major job is divided to sub jobs. In order to balance the jobs we should calculate the request and acknowledge time separately. Then we create the scheduling of each job by calculating the request and acknowledge time in the form of a shared job. Finally efficiency of the system is increased. So the real time of this algorithm will be improved in comparison with the other algorithms. Finally by the mechanism presented, the total time of processing in cloud computing is improved in comparison with the other algorithms.

11th International Conference on Cloud Computing: Services and Architecture (CLOUD 2022) helps enterprises transform business and technology. Companies have begun to look for solutions that would help reduce their infrastructures costs... more

11th International Conference on Cloud Computing: Services and Architecture (CLOUD 2022) helps enterprises transform business and technology. Companies have begun to look for solutions that would help reduce their infrastructures costs and improve profitability. Cloud computing is becoming a foundation for benefits well beyond IT cost savings. Yet, many business leaders are concerned about cloud security, privacy, availability and data protection. To discuss and address these issues, we are inviting researchers who focus on cloud computing to shed more light on this emerging field. This conference aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including (but not limited to):

For the execution of the scientific applications, different methods have been proposed to dynamically provide execution environments for such applications that hide the complexity of underlying distributed and heterogeneous... more

For the execution of the scientific applications, different methods have been proposed to dynamically provide execution environments for such applications that hide the complexity of underlying distributed and heterogeneous infrastructures. Recently virtualization has emerged as a promising technology to provide such environments. Virtualization is a technology that abstracts away the details of physical hardware and provides virtualized resources for high-level scientific applications. Virtualization offers a cost-effective and flexible way to use and manage computing resources. Such an abstraction is appealing in Grid computing and Cloud computing for better matching jobs (applications) to computational resources. This work applies the virtualization concept to the Condor dynamic resource management system by using Condor Virtual Universe to harvest the existing virtual computing resources to their maximum utility. It allows existing computing resources to be dynamically provisioned at run-time by users based on application requirements instead of statically at design-time thereby lay the basis for efficient use of the available resources, thus providing way for the efficient use of the available resources.

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector... more

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.

In the recent years, Cloud Co mputing has been one of the top ten new technologies which provides various services such as software, platform and infrastructure for internet users. The Cloud Co mputing is a promising IT paradig m which... more

In the recent years, Cloud Co mputing has been one of the top ten new technologies which provides various services such as software, platform and infrastructure for internet users. The Cloud Co mputing is a promising IT paradig m which enables the Internet evolution into a global market of collaborating services. In order to provide better services for cloud customers, cloud providers need services that are in cooperation with other services. Therefore, Cloud Co mputing semantic interoperability plays a key role in Cloud Co mputing services. In this paper, we address interoperability issues in Cloud Co mputing environments. After a description of Cloud Co mputing interoperability fro m different aspects and references, we describe two architectures of cloud service interoperability. Architecturally, we classify existing interoperability challenges and we describe them. Moreover, we use these aspects to discuss and compare several interoperability approaches.

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector... more

Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.

2nd International Conference on Cloud Computing and IOT (CCCIOT 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Cloud computing and IoT. The aim of the... more

2nd International Conference on Cloud Computing and IOT (CCCIOT 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Cloud computing and IoT. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

The advent of cloud computing has driven away the notion of having sophisticated hardware devices for performing computing intensive tasks. This feature is very essential for resource-constrained devices. In mobile cloud computing, it is... more

The advent of cloud computing has driven away the notion of having sophisticated hardware devices for
performing computing intensive tasks. This feature is very essential for resource-constrained devices. In
mobile cloud computing, it is sufficient that the device be a thin client i.e. which concentrates solely on
providing a graphical user interface to the end-user and the processing is done in the cloud. We focus on
adaptive display virtualization where the display updates are computed in advance using synchronization
techniques and classifying the job as computationally intensive or not based on the complexity of the
program and the interaction pattern. Based on application, the next possible key-press is identified and
those particular frames are pre-fetched into the local buffer. Based on these two factors, a decision is
then made whether to execute the job locally or in the cloud or whether we must take the next frame from
the local buffer or pull it from server. Jobs requiring greater interaction are executed locally in the
mobile to reduce interaction delay. If a job is to be executed in the cloud, then the results of the
processing alone are sent via the network to the device. The parameters are varied in runtime based on
network conditions and application parameters to minimise the interaction delay.

The impact of globalization coupled with the pressure as a result of the recent economic downturn have stirred increased customers outlook on availability, scalability and efficiency to enterprise information technology (IT) solutions.... more

The impact of globalization coupled with the pressure as a result of the recent economic downturn have stirred increased customers outlook on availability, scalability and efficiency to enterprise information technology (IT) solutions. The increasing interest of a broad base of business leaders and organisations centre on how best cloud computing can contain these requirements to reduce or eliminate the huge capital outlay for infrastructure ownership, increase efficiency, ensure higher return on investment (ROI), dynamic provisioning and utility –like pay-as-use services. However, a number of these enterprises along with some information security professionals have expressed fear of the cloud, stating their unflinching consciousness on security, privacy and forensic issues associated with this new computing platform for the next generation of the Internet. As with any emerging technology, cloud computing offers a rare opportunity to rework security and IT controls for a better tomorrow. In an environment where security and privacy has become paramount to enterprise customers, risk of unauthorized access to information in the cloud poses a significant concern to cloud computing stakeholders. This paper defines clouds, describes cloud computing with the different models and characteristics. The paper focuses on unveiling the fear to cloud adoption due to numerous associated security, privacy and forensic concerns in the cloud while also examining both the business and security benefits of this emerging computing paradigm. Finally, as a move in the new direction, appropriate suggestions on measures on how to ameliorate the security issues have been prescribed.

Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. The elements involved in cloud computing are clients, data center... more

Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. The elements involved in cloud computing are clients, data center and distributed server. One of the main problems in cloud computing is load balancing. Balancing the load means to distribute the workload among several nodes evenly so that no single node will be overloaded. Load can be of any type that is it can be CPU load, memory capacity or network load. In this paper we presented an architecture of load balancing and algorithm which will further improve the load balancing problem by minimizing the response time. In this paper, we have proposed the enhanced version of existing regulated load balancing approach for cloud computing by comping the Randomization and greedy load balancing algorithm. To check the performance of proposed approach, we have used the cloud analyst simulator (Cloud Analyst). Through simulat...

Financial services Industry lags in adopting Cloud computing technology amongst all industries due to privacy, security and several regulatory concerns. The research is based on qualitative and quantitative analysis techniques for cloud... more

Financial services Industry lags in adopting Cloud computing technology amongst all industries due to privacy, security and several regulatory concerns. The research is based on qualitative and quantitative analysis techniques for cloud adoption risk assessment leading to decision making based on acceptable risk response. The evaluation on how suitable the Risk IT Framework would be in determining SaaS adoption suitability privacy, security and regulatory burden is taken into account. Based on interview of IT executives across three different companies, and a survey of 1979 IT professionals, the paper focuses on analyzing the main concerns for cloud computing adoption within the Financial service Industry and explain a new risk assessment approach that is most suitable to increase cloud computing adoption within the financial service industry by taking into account Return on Investment (ROI).

Rapid adoption of cloud services in recent years has been driven by multiple factors, such as faster time-to-market and improved scalability enabled by public cloud infrastructure. Hybrid clouds, combining the in-house capacities with... more

Rapid adoption of cloud services in recent years has been driven by multiple factors, such as faster time-to-market and improved scalability enabled by public cloud infrastructure. Hybrid clouds, combining the in-house capacities with on-demand capacity of public clouds, achieve both the increased utilization rate of the in-house infrastructure and the limited use of more expensive public cloud, thereby lowering the total costs for the cloud user. In this paper, an analytical model of hybrid cloud costs is introduced, wherein the costs of computing and data communication are taken into account. Using this model, the cost-efficient division of the computing capacity between the private and the public portion of a hybrid cloud can be identified. By analyzing the model, it is shown analytically that the greater the volume of data transferred to/from the public cloud, the greater portion of the capacity should be allocated to the private cloud. Keywords-hybrid cloud; cost model; data communications cost

The emergence of the Internet, and more recently cloud computing, has tremendous technological, economic, social as well as cultural effects. Such technological development certainly affects legal framework and calls for careful... more

The emergence of the Internet, and more recently cloud computing, has tremendous technological, economic, social as well as cultural effects. Such technological development certainly affects legal framework and calls for careful assessment whether, and, if so how, the existing legal principles and doctrines should be adjusted. Despite the fact that cloud-based technologies have swiftly coated almost every aspect of communication, the discussion regarding its legal implications has been very fragmentary. This paper focuses on a rather specific aspect concerning the intersection of private international law and intellectual property rights in the cloud environment. Although the Internet is one of the most economically rewarding markets for the exploitation of the intellectual property, the ubiquity of the world wide web is also associated with a number of risks. One of the risks which should be considered by right holders and intermediaries operating in the digital environment concern...

We present a Systematic Literature Review (SLR) on Cloud Computing that selected 51 papers from first tier journals and conferences in the period 2008-2012. The selective approach captures the economical perspective on Cloud Computing... more

We present a Systematic Literature Review (SLR) on Cloud Computing that selected 51 papers from first tier journals and conferences in the period 2008-2012. The selective approach captures the economical perspective on Cloud Computing highlighting especially the business issues, cost/pricing models, and legal issues raised by the adoption of this new technological approach. Finally, it also spots emerging issues as