Enabling Technologies to Cloud Computing Research Papers (original) (raw)
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education... more
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.
With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies... more
With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies in addition to the problems related to the flow of information and methods go down and take an interest in the advantage of them face the researchers. In any case, such a great
significance comes with a support of a great infrastructure that includes large data centers comprising thousands of server units and other supporting equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is based on the internet, an image from the internet. Cloud Computing is a developed technology, cloud computing, possibly offers an overall economic benefit, in that end users shares a large, centrally achieved pool of storing and computing resources, rather than owning and managing their own systems. But, it needs to be environment friendly also. This review paper gives a general overview of cloud computing, also it describes cloud computing, architecture of cloud computing, characteristics of cloud computing, and different services and deployment model of cloud computing. This
paper is for anyone who will have recently detected regarding cloud computing and desires to grasp a lot of regarding cloud computing.
Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business... more
Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacentres (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g., Dropbox, Salesforce). And it examines the business and private ‘clouders’ using these services. The first part of the paper argues that hosting companies, services providers and clouders have mutual informational (epistemic) obligations to provide and seek information about relevant issues such as consumer privacy, reliability of services, data mining and data ownership. The concept of interlucency is developed as an epistemic virtue governing ethically effective communication. The second part considers potential forms of government restrictions on or proscriptions against the development and use of cloud computing technology. Referring to the concept of technology neutrality, it argues that interference with hosting companies and cloud services providers is hardly ever necessary or justified. It is argued, too, however, that businesses using cloud services (e.g., banks, law firms, hospitals etc. storing client data in the cloud) will have to follow rather more stringent regulations.
Cloud computing technology has experienced exponential growth over the past few years. It provides many advantages for both individuals and organizations. However, at the same time, many issues have arisen due to the vast growth of cloud... more
Cloud computing technology has experienced exponential growth over the past few years. It provides many advantages for both individuals and organizations. However, at the same time, many issues have arisen due to the vast growth of cloud computing. Organizations often have concerns about the migration and utilization of cloud computing due to the loss of control over their outsourced resources and cloud computing is vulnerable to risks. Thus, a cloud provider needs to manage the cloud computing environment risks in order to identify, assess, and prioritize the risks in order to decrease those risks, improve security, increase confidence in cloud services, and relieve organizations' concerns on the issue of using a cloud environment. Considering that a conventional risk management framework does not fit well with cloud computing due to the complexity of its environment, research in this area has become widespread. The aim of this paper is to review the previously proposed risk management frameworks for cloud computing and to make a comparison between them in order to determine the strengths and weaknesses of each of them. The review will consider the extent of the involvement and participation of consumers in cloud computing and other issues.
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector... more
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.
This paper studies a fourth emerging service model of cloud computing, Business Process as a Service (BPaaS). BPaaS is generating hype but it is under researched with a lack of clarity regarding how BPaaS differentiates itself from other... more
This paper studies a fourth emerging service model of cloud computing, Business Process as a Service (BPaaS). BPaaS is generating hype but it is under researched with a lack of clarity regarding how BPaaS differentiates itself from other service models and what opportunities and challenges it presents for management and organisations attempting to implement it. In this paper we examine the theoretical underpinnings of BPaaS with a view to developing an understanding of the potential value of adopting the BPaaS model and its implications for the realisation of business value from cloud computing. We develop the SEIFS framework (Situation, Elemental, Integration, Flexibility, and Scalability) to provide guidance in the classification of cloud services as BPaaS or otherwise and attempt to validate this framework by using a series of case studies based in Irish cloud computing firms. Our paper aims to contribute to the literature by addressing confusion in the classification of cloud services, and specifically BPaaS. We also provide insights for prospective BPaaS providers to factor into their service design and discuss how BPaaS can provide a competitive advantage. Finally, we identify and discuss a number of areas for future research.
Cloud computing is a new technology that brings new challenges to all organizations around the world. Improving response time for user requests on cloud computing is a critical issue to combat bottlenecks. As for cloud computing,... more
Cloud computing is a new technology that brings new challenges to all organizations around the world. Improving response time for user requests on cloud computing is a critical issue to combat bottlenecks. As for cloud computing, bandwidth to from cloud service providers is a bottleneck. With the rapid development of the scale and number of applications, this access is often threatened by overload. Therefore, this paper our proposed Throttled Modified Algorithm(TMA) for improving the response time of VMs on cloud computing to improve performance for end-user. We have simulated the proposed algorithm with the CloudAnalyts simulation tool and this algorithm has improved response times and processing time of the cloud data center.
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education... more
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.
Cloud computing can raise ethical issues. In many cases these will depend on particular applications and circumstances. The present paper sets out to identify ethical issues of cloud computing that arise from the fundamental nature of the... more
Cloud computing can raise ethical issues. In many cases these will depend on particular applications and circumstances. The present paper sets out to identify ethical issues of cloud computing that arise from the fundamental nature of the technology rather than any specific circumstances. The paper describes how these general features were identified, how ethical issues arising from them were collected and it concludes by discussing means of addressing them.
Considering the complexity of today"s service environment, Small-to-Medium sized Enterprises (SMEs) cannot afford to accept the status quo of service operations and therefore must have some clear business analytics objective to reach.... more
Considering the complexity of today"s service environment, Small-to-Medium sized Enterprises (SMEs) cannot afford to accept the status quo of service operations and therefore must have some clear business analytics objective to reach. Without clear metric objectives, organisations are almost destined for disaster since the allocation of resources may not have responded to the demand exerted from outside of the organisation. This is particularly true within a complex and rapidly changing cloud computing environment. The cloud dynamic ecosystem is moving towards a collection of services which interoperate across the Internet. This chapter offers a discussion on an approach to assessing cloud capabilities through Cloud Service Capability Assessment Framework (CSCAF). Service metrics plays a critical role in CSCAF and presents managers with a practical framework to carry out cloud capability assessments. The process may be simply described as publishing, retrieving, and managing cloud service descriptions, service publications which are matched with descriptions of consumer"s requirements and service matching.
With the pragmatic realization of computing as a utility, Cloud Computing is has recently emerged as a highly successful alternative IT paradigm through on-demand resource provisioning and almost perfect reliability. The rapidly growing... more
With the pragmatic realization of computing as a utility, Cloud Computing is has recently emerged as a highly successful alternative IT paradigm through on-demand resource provisioning and almost perfect reliability. The rapidly growing customer demands for computing and storage resources are responded by the Cloud providers with the deployment of large scale data centers across the globe. Efficiency and scalability of these data centers, as well as the performance of the hosted applications highly depend on the allocations of the physical resource (e.g., CPU, memory, storage, and network bandwidth). Very recently, network-aware Virtual Machine (VM) placement and migration is developing as a very promising technique for the optimization of compute-network resource utilization, energy consumption, and network traffic minimization. This chapter presents the related background information and a taxonomy that characterizes and classifies the various components of network-aware VM placement and migration techniques. An elaborate survey and comparative analysis of the state of the art techniques is also put forward. Besides highlighting the various aspects and insights of the network-aware VM placement and migration strategies and algorithms recently proposed by the research community, the survey further identifies the limitations of the existing techniques and discusses on the future research directions.
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications,development of customized computer... more
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications,development of customized computer software, and creation of a “realistic” network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition,countermeasures to cloud security breaches are presented.
Cloud gaming is an emerging technology that combines cloud computing with computer games. Compared to traditional gaming, its core advantages include ease of development/deployment for developers, and lower technology costs for users... more
Cloud gaming is an emerging technology that combines cloud computing with computer games. Compared to traditional gaming, its core advantages include ease of development/deployment for developers, and lower technology costs for users given the potential to play on thin client devices. In this chapter, we firstly describe the approach, and then focus on the impact of latency, known as lag, on Quality of Experience, for so-called First Person Shooter games. We outline our approach to lag compensation whereby we equalize within reason the up and downlink delays in real-time for all players. We describe the testbed in detail, the open source Gaming Anywhere platform, the use of NTP to synchronise time, the network emulator and the role of the centralized log server. We then present results that firstly validate the mechanism and also use small scale and preliminary subjective tests to assess and prove its performance. We conclude the chapter by outlining ongoing and future work.
Cloud computing environments facilitate applications by providing virtualized resources that can be provisioned dynamically. Computing resources are delivered by Virtual Machines (VMs). In such a scenario, resource scheduling algorithms... more
Cloud computing environments facilitate applications by providing virtualized resources that can be provisioned dynamically. Computing resources are delivered by Virtual Machines (VMs). In such a scenario, resource scheduling algorithms play an important role where the aim is to schedule applications effectively so as to reduce the turn-around time and improve resource utilization. The problem of this paper is how to dynamically allocate the submitted jobs to the available resources in order to complete the tasks within a minimum turn-around time as well as utilizing cloud resources effectively. The objective of this paper is to propose new scheduling algorithm on cloud computing environment using Shortest Remaining Job First (SRJF) algorithm. The methodology of this paper depends on simulation using cloudsim. The results of this paper revealed that the proposed algorithm (SRJF) performed better than the default scheduling algorithm.
Cloud computing that is an ever more important trend, is a virtual technology that uses the online world and central remote servers to own sharing of resources that include infrastructures, software, applications and business processes... more
Cloud computing that is an ever more important trend, is a virtual technology that uses the online world and central remote servers to own sharing of resources that include infrastructures, software, applications and business processes into the market environment to fulfil the elastic demand. In today's competitive conditions, the service strength, elasticity, options and flexibility created available from this scalable technology are quite tempting that makes the cloud computing to progressively becoming a underlying element of the organization computing environment. This chapter presents a review associated with ongoing state of Cloud Computing. It provides a conversation of this evolution means of cloud computing, attributes of Cloud, current technologies acquired in cloud computing. This chapter also provides a comparative study of cloud computing systems and their challenges.
The objective of the proposed system is designed to perform Mobile Banking in a secured way. To achieve this, the concept of Biometric person recognition method is introduced through the mobile devices. Biometrics can be categorized into... more
The objective of the proposed system is designed to perform Mobile Banking in a secured way. To achieve this, the
concept of Biometric person recognition method is introduced through the mobile devices. Biometrics can be
categorized into two categories, they are Physiological and Behavioral. Physiological is based upon the direct
measurements of a part of the human body and Behavioral is based on the action performed by the user. So, the author
decided to use the face recognition method, it is purely based on the physiological characteristic of the human body.
The Face recognition technique implementation is done with the two existing algorithms (i.e) Viola Jones and Principle
Component Analysis(PCA).The Viola Jones method is mainly used to check whether the image is present in the frame or
not. The PCA method is based on Eigen values and Eigen vectors and performs distance calculation based on features of
the face. With this proposed idea, secured access to restricted data/services during a standard Web Session is possible
with the small handheld devices. For the image capturing and forwarding process the Android mobile is used
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most... more
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most businesses are using technology for daily basis tasks. However, it still is not used all over the world. In Kurdistan Region-Iraq (KRI), most of the SMEs still use the old way of working and follow the paper-based method for their daily basis tasks. According to a survey, more than seventy percent of SMEs in Kurdistan are not using software to manage human resource management tasks. However, some big companies are using HRMS; but even then, there is a lack of use of Cloud Technology. In this study, a model of the Enterprise Human Resource Management System (EHRMS) is proposed and implemented to solve the HR problems in this area using Cloud Technology. The proposed system consists of sixteen standard modules which used usually with famous HRM systems....
Enterprise Resource Planning (ERP) systems is a comprehensive integrated system that governs all aspects of a business. It gives your business automation and integration for core processes such as taking client orders, planning operations... more
Enterprise Resource Planning (ERP) systems is a comprehensive integrated system that governs all aspects of a business. It gives your business automation and integration for core processes such as taking client orders, planning operations and maintaining inventory records and commercial data. Using ERP systems provide the user transparency into the entire business development, by which all the departments can view the information documented to guarantee that the correct procedures are happening. This enables the ERP system to act as a central core for end-to-end workflow and data. With the advances in the technology and customer requirement forced ERP designers to cope with the new progress. Consequently, new designs for the ERP system were done to please companies and customers by developing new ERP business models. Today, ERP covers a wide range of functionality within themselves and become a popular Solution in a business organization. Moreover, among the biggest challenge for ERP program designers is to keep their speed with the manufacturing part, which has been moving rapidly from product-centric to a customer-centric focus. This request encouraged most ERP sellers to add multifunction and modules to their core systems. In this paper, we discuss and analyze ERP, ERP types, the ERP design that might be promising in the future as well as discussing factors that could affect the future of ERP systems.
Indonesia is a developing country that began to utilize information technology in education. A form of its implementation is the use of e-learning. However, in practice there are still some obstacles, such as learning resources are not... more
Indonesia is a developing country that began to utilize information technology in education. A form of its implementation is the use of e-learning. However, in practice there are still some obstacles, such as learning resources are not evenly distributed, limited access to services provided, qualified educators resources are concentrated in specific areas. This led to the emergence of disparities educational process, and technology gap due to differences in ICT infrastructure owned by any educational institution.
Therefore this study proposes architecture of cloud-based open learning to solve these problems. The term open learning is used in order to encouraging the development of the concept of Indonesia Open Educational Resources (IOER) and as well as the adoption of concept of cloud computing. There are several phase that we conducted in this research such as analysis, design, implementation, testing, and evaluation phase. The design of the proposed architecture consists of six layers: (1) Infrastructure, (2) Platform, (3) Application, (4) Service, (5) Access, (6) User. As a result of the implementation from this architecture is a prototype of Indonesia - Virtual Open Learning System (iVOLS).
In experiment, personalization e-learning runs as a service that need large storage and other shared facilities to conduct the program so the system can delivered different learning materials to different learners. The e-learning personalization in cloud environment classified successful if the learners got the best performance on learning and it shown by their evaluation score. Based on the test results and evaluation showed that the availability on Cloud-Based Open Learning further meet user needs. This is indicated by the presence of a simple infrastructure services, application services with just one stage and the availability of a wider range of data and the resource sharing. In accessibility, Cloud-Based Open Learning provides easy access to the user. By economically, the result of evaluation showed that Cloud-Based Open Learning has an investment of 35.61% efficiency, increase Return On Investment (ROI) of 60.95% and Net Present Value (NPV) of 81.97% from the user's perspective. While from the provider’s perspective, Cloud-Based Open Learning has an investment of 200% efficiency, increase Return On Investment (RoI) of 220.4% and Net Present Value (NPV) of 109.55%.
Job scheduling is one of the most important research problems in distributed systems, particularly cloud environments/computing. The dynamic and heterogeneous nature of resources in such distributed systems makes optimum job scheduling a... more
Job scheduling is one of the most important research problems in distributed systems, particularly cloud environments/computing. The dynamic and heterogeneous nature of resources in such distributed systems makes optimum job scheduling a non-trivial task. Maximal resource utilization in cloud computing demands/necessitates an algorithm that allocates resources to jobs with optimal execution time and cost. The critical issue for job scheduling is assigning jobs to the most suitable resources, considering user preferences and requirements. In this paper, we present a hybrid approach called FUGE that is based on fuzzy theory and Genetic Algorithm (GA) that aims to perform optimal load balancing considering execution time and cost. We modify the Standard Genetic Algorithm (SGA) and use fuzzy theory to devise a fuzzy-based steady-state GA in order to improve SGA performance in term of makespan. In details, the FUGE algorithm assigns jobs to resources by considering Virtual Machine (VM) processing speed, VM memory, VM bandwidth, and the job lengths. We mathematically prove our optimization problem which is convex with well-known analytical conditions (specifically, KKT conditions). We compare the performance of our approach to several other cloud scheduling models. The results of the experiments show the efficiency of the FUGE approach in terms of execution time, execution cost, and average degree of imbalance.
Cloud computing offers a range of new opportunities for developing countries to do what they could not do earlier with computers and the Internet. Cloud computing infrastructure and applications are able to interact with users who have... more
Cloud computing offers a range of new opportunities for developing countries to do what they could not do earlier with computers and the Internet. Cloud computing infrastructure and applications are able to interact with users who have mobile phones, Tablet PCs, OLPC [one-laptop-per-child], and other mobile devices. This paper looks at how cloud computing will surpass the Internet in adoption and usage as this technology's users are on the other side of the digital divide. Mobile phones and other devices have penetrated and saturated developing countries where the Internet has failed. This paper looks at the diffusion of mobile phones and devices in developing countries and its continuous dramatic rise. 15MobilePhonesand15 Mobile Phones and 15MobilePhonesand20 Tablet PCs are now in the hands of those technology-connectivity-deprived billions. This paper will look at how cloud computing and mobile devices combine present new opportunities for developing countries. Because the mobile phone and devices user market is too big to be ignored, cloud service providers, in collaboration, with mobile service providers have deployed hundreds of cloud-enabled applications and are continuing in their endeavour to provide an endless range of products. This paper looks at some popular mobile applications that are helping development efforts, such as m-Banking, m-Education, m-Health, m-Agriculture, and others that already exist and are popular within developing countries. Each technology has its good [opportunities], bad [challenges], and ugly [issues] side. There is an attempt to address the issues and challenges in deploying mobile applications via cloud computing in developing countries when compared to developed countries. For example, issues such as connectivity to remote regions and the challenges faced by service providers and governments to subsidise and provide mobile applications to those who are already struggling with sustenance.
Cloud computing is useful to companies and organizations as it eliminates the requirement for them to plan ahead for provisioning, and allows them to start with small resources and increase gradually as the service demand rises. There are... more
Cloud computing is useful to companies and organizations as it eliminates the requirement for them to plan ahead for provisioning, and allows them to start with small resources and increase gradually as the service demand rises. There are challenges in adopting cloud computing; but with obstacles, we have opportunities for research in several aspects of cloud computing. One of the main issue is the data security and privacy of information stored and processed at the cloud service provider's systems. In this work, we surveyed several research works on cloud computing related to security challenges and privacy issues. The primary goal of this paper is to provide a insight into the security challenges of cloud computing and fy approaches and solutions which have been proposed and adopted by the cloud service.
Everybody has a supposition on what is a Cloud computing. Cloud computing is a modern area emerged by distributed computing that offers many powerful benefits to different organizations. It has an ability to rent a server or a thousand of... more
Everybody has a supposition on what is a Cloud computing. Cloud computing is a modern area emerged by distributed computing that offers many powerful benefits to different organizations. It has an ability to rent a server or a thousand of servers via information technology (IT) services whole the world. The capabilities of Cloud computing are obtained by running a geophysical modeling application on most powerful systems. Organizations can improve their efficiency to quickly and reliably respond to the needs of their customers. It is performed by making a contract for various Cloud services such as applications, software, data storages, and processing capabilities. There are some risks in Cloud-based servers such as maintaining the security of systems, asserting the privacy of information, and insuring the wise expenditures of IT resources. In 2004, Cloud computing progressed to public awareness. Essentially, various companies such as Amazon, Google, and Facebook use Cloud technology as a model for running their own infrastructures. This causes the dedicated services to be always on, occurring on the running systems to be upgraded, and accordance with demand to be scaled considerably. Cloud computing involves a range of underlying technologies and configuration options instead of being as a single system. Organizations should consider the strengths and weaknesses of the Cloud technology, service models, and deployment methods through evaluating services to meet their requirements.
A Cloud system can extremely store and secure large amounts of data that is accessible only by authorized users and applications. It is supported and sponsored by a Cloud service provider which installs a powerful platform on the Cloud systems. The platform involves some of the required abilities such as the operating system, Apache, a MySQL database, Perl, Python, and PHP with a capability for automatically scaling in response to changing the different workloads. Cloud computing can utilize some applications such as sales automation, email, and forum management on the Internet. Internet can protect data while providing a consumer’s service as well it is able to utilize the Cloud storage for holding an application, personal data, and business. A Cloud system with the aid of the Internet can use a small number of Web services in order to integrate maps, photos, and GPS information.
This book discusses about the main concepts of Cloud computing. It is an appropriate tutorial for ordinary and professional people to acquire some required information about Cloud technology. Chapter 1 introduces the overall and fundamental characteristic of Cloud systems such as Web services, Grid computing, and hardware virtualization. In Chapter 2, the architectures of Cloud computing including the deployment models and the service models defined for Cloud-based servers are described carefully. Chapter 3 explains various applications of Cloud computing in various applications such as file storage, Cloud database, and email. In Chapter 4, some popular consumer applications designed by Cloud-based systems such as Evernote, iCloud, and Spotify are represented completely. Chapter 5 discusses about the different usages of Cloud servers such Cloud monitoring, healthcare, and banking. In Chapter 6, the security issues of Cloud computing such as privacy, reliability, and compliance are presented carefully. Chapter 7 points out the famous simulation tools designed for Cloud-based issues such as CloudSim, Xen hypervisor, and UEC. Finally, Chapter 8 introduces some well-liked companies established for Cloud-based usages such as CloudLock, CloudMunch, and CloudPhysics.
I hope that this book can help to ordinary people and professional researchers to design and implement various applications with Cloud technology. Undoubtedly, this book like any humanistic product is not devoid of any problem. Hence, the next version of this book can be published more appropriate than current version according to valuable suggestions of dear readers. I wish that this book can assist to computer science to design complex systems and to solve some of the exiting problems. Finally, I am grateful from anyone who assisted me to publish this book.
In the current scenarios, there was a huge demand for the wearable devices due to the development of clouds and cloudlet technology. So there has been wide essential to offer a better medical care to the people. For processing the patient... more
In the current scenarios, there was a huge demand for the wearable devices due to the development of clouds and cloudlet technology. So there has been wide essential to offer a better medical care to the people. For processing the patient medical information from one system to another includes various phases such as data collection, data storage, data sharing, etc. In the case of traditional healthcare system, it needs medical data transformation to cloud which includes user's sensitive data and further cause's communication energy consumption. Basically, medical data sharing referred as a most challenging issue. So, this research provides an apt solution to the medical data sharing. Here, a novel healthcare system is being developed by making use of flexibility of cloudlet. The cloudlet mainly functions to provide privacy protection, data sharing and intrusion detection. NTRU (Number Theory Research Unit) method is being initially used here to encrypt the user's information that is being gathered through wearable devices. This information will be further transmitted to the nearest cloudlet in an energy efficient way. Apart from this method, this research also proposes a new trust model to assist the users to choose trustable partners whoever wishes to share the information stored in cloudlet. This model mainly helps the patients who are suffering from some health problems by communicating with each other. The user's medical information which is being stored in remote cloud of hospital is classified into three parts and further secures them. For securing the healthcare system from malicious attacks this research developed a novel collaborative IDS (Intrusion Detection System) method through cloudlet mesh. As this can secure the remote healthcare big data cloud from various attacks. Finally, NTRU and AES-Rijndael algorithm are being used in order to attain more robust functionality. For implementation, Java technologies have been used to prove that proposed scheme remains effective.
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most... more
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most businesses are using technology for daily basis tasks. However, it still is not used all over the world. In Kurdistan Region-Iraq (KRI), most of the SMEs still use the old way of working and follow the paper-based method for their daily basis tasks. According to a survey, more than seventy percent of SMEs in Kurdistan are not using software to manage human resource management tasks. However, some big companies are using HRMS; but even then, there is a lack of use of Cloud Technology. In this study, a model of the Enterprise Human Resource Management System (EHRMS) is proposed and implemented to solve the HR problems in this area using Cloud Technology. The proposed system consists of sixteen standard modules which used usually with famous HRM systems....
With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form... more
With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to securely process or analyze these encrypted data without disclosing any useful information, and to achieve the rights management efficiently. In this paper, we propose the encrypted data processing protocols for cloud computing by utilizing additively homomorphic encryption and proxy cryptography. For the traditional homomorphic encryption schemes with many limitations, which are not suitable for cloud computing applications. We simulate a cloud computing scenario with flexible access control and extend the original homomorphic cryptosystem to suit our scenario by supporting various arithmetical calculations. We also prove the correctness and security of our protocols, and analyze the advantages and performance by comparing with some latest works.
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education... more
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.
Providing real-time cloud services to Vehicular Clients (VCs) must cope with delay and delay-jitter issues. Fog computing is an emerging paradigm that aims at distributing small-size self-powered data centers (e.g., Fog nodes) between... more
Providing real-time cloud services to Vehicular Clients (VCs) must cope with delay and delay-jitter issues. Fog computing is an emerging paradigm that aims at distributing small-size self-powered data centers (e.g., Fog nodes) between remote Clouds and VCs, in order to deliver data-dissemination real-time services to the connected VCs. Motivated by these considerations, in this paper, we propose and test an energy-efficient adaptive resource scheduler for Networked Fog Centers (NetFCs). They operate at the edge of the vehicular network and are connected to the served VCs through Infrastructure-to-Vehicular (I2V) TCP/IP-based single-hop mobile links. The goal is to exploit the locally measured states of the TCP/IP connections, in order to maximize the overall communication-plus-computing energy efficiency, while meeting the application-induced hard QoS requirements on the minimum transmission rates, maximum delays and delay-jitters. The resulting energy-efficient scheduler jointly performs: (i) admission control of the input traffic to be processed by the NetFCs; (ii) minimum-energy dispatching of the admitted traffic; (iii) adaptive reconfiguration and consolidation of the Virtual Machines (VMs) hosted by the NetFCs; and, (iv) adaptive control of the traffic injected into the TCP/IP mobile connections. The salient features of the proposed scheduler are that: (i) it is adaptive and admits distributed and scalable implementation; and, (ii) it is capable to provide hard QoS guarantees, in terms of minimum/maximum instantaneous rates of the traffic delivered to the vehicular clients, instantaneous rate-jitters and total processing delays. Actual performance of the proposed scheduler in the presence of: (i) client mobility; (ii) wireless fading; and, (iii) reconfiguration and consolidation costs of the underlying NetFCs, is numerically tested and compared against the corresponding ones of some state-of-the-art schedulers, under both synthetically generated and measured real-world workload traces.
In Cloud computing environments, computing resources are available for users, and they only pay for used resources The most important issues in cloud computing are scheduling and energy consumption which many researchers worked on them.... more
In Cloud computing environments, computing resources are
available for users, and they only pay for used resources The most important issues in cloud computing are scheduling and energy consumption which many researchers worked on them. In these systems a scheduling mechanism has two phases: task prioritization and processor selection. Di fferent priorities may cause to di fferent makespan and for each processor which assigned to the task, the energy consumption is di fferent. So
a good scheduling algorithm must assign priority to each task and select the best processor for them, in such a way that makespan and energy consumption be minimized. In this paper, we proposed a two phase's algorithm for scheduling, named TETS, the first phase is task prioritization and the second phase is processor assignment.We use three prioritization methods for prioritize the tasks and produce optimized initial chromosomes and assign the tasks to processors which is an energy-aware model. Simulation results indicate that our algorithm is better than previous algorithms in terms of energy consumption and makespan. It can improve
the energy consumption by 20% and makespan by 4%.
in this paper focuses on development of cloud computing, privacy security issues have become increasingly prominent, which is of concern to industry and academia. We review the research progress on privacy security issues from the... more
in this paper focuses on development of cloud computing, privacy security issues have become increasingly prominent, which is of concern to industry and academia. We review the research progress on privacy security issues from the perspective of several privacy security protection technologies in cloud computing. First, we introduce some privacy security risks of cloud computing and propose a comprehensive privacy security protection framework.
The increase in energy consumption is the most critical problem worldwide. The growth and development of complex data-intensive applications have promulgated the creation of huge data centers that have heightened the energy demand. In... more
The increase in energy consumption is the most critical problem worldwide. The growth and development of complex data-intensive applications have promulgated the creation of huge data centers that have heightened the energy demand. In this article, the need for energy efficiency is emphasized by discussing the dual role of cloud computing as a major contributor to increasing energy consumption and as a method to reduce energy wastage. This article comprehensively and comparatively studies existing energy efficiency techniques in cloud computing and provides the taxonomies for the classification and evaluation of the existing studies. The article concludes with a summary providing valuable suggestions for future enhancements.
Personal Health Record (PHR) is a patient-centric model of health information exchange, which greatly facilitates the storage, access and share of personal health information. In order to share the valuable resources and reduce the... more
Personal Health Record (PHR) is a patient-centric model of health information exchange, which greatly facilitates the storage, access and share of personal health information. In order to share the valuable resources and reduce the operational cost, the PHR service providers would like to store the PHR applications and health information data in the cloud. The private health information may be exposed to unauthorized organizations or individuals since the patient lost the physical control of their health information. Ciphertext-Policy Attribute-Based Signcryption (CP-ABSC) is a promising solution to design cloud-assisted PHR secure sharing system. It provides fine-grained access control, confidentiality, authenticity and sender privacy of PHR data. However, a large number of pairing and modular exponentiation computations bring heavy computational overhead during designcryption process. In order to reconcile the conflict of high computational overhead and low efficiency in the designcryption process, an outsourcing scheme is proposed in this paper. In our scheme, the heavy computations are outsourced to Ciphertext Transformed Server (CTS), only leaving a small computational overhead for the PHR user.
Cloud computing is a realized wonder. It delights its users by providing applications, platforms and infrastructure without any initial investment. The "pay as you use" strategy comforts the users. The usage can be increased by adding... more
Cloud computing is a realized wonder. It delights its users by providing applications, platforms and infrastructure without any initial investment. The "pay as you use" strategy comforts the users. The usage can be increased by adding infrastructure, tools or applications to the existing application. The realistic beauty of cloud computing is that there is no need for any sophisticated tool for access, web browser or even smartphone will do.
Grid systems and cloud servers are two distributed networks that deliver computing resources (e.g., file storages) to users’ services via a large and often global network of computers. Virtualization technology can enhance the efficiency... more
Grid systems and cloud servers are two distributed networks that deliver computing resources (e.g., file storages) to users’ services via a large and often global network of computers. Virtualization technology can enhance the efficiency of these networks by dedicating the available resources to multiple execution environments. This chapter describes applications of virtualization technology in grid systems and cloud servers. It presents different aspects of virtualized networks in systematic and teaching issues. Virtual machine abstraction virtualizes high-performance computing environments to increase the service quality. Besides, grid virtualization engine and virtual clusters are used in grid systems to accomplish users’ services in virtualized environments, efficiently. The chapter, also, explains various virtualization technologies in cloud severs. The evaluation results analyze performance rate of the high-performance computing and virtualized grid systems in terms of bandwidth, latency, number of nodes, and throughput.
Emergence of cloud computing encourages the local organizations to oriented and provision resources and Virtual Machines VMs dynamically from public cloud. One of the important objectives of provisioning resources is speeding up the... more
Emergence of cloud computing encourages the local organizations to oriented and provision resources and Virtual Machines VMs dynamically from public cloud. One of the important objectives of provisioning resources is speeding up the execution time of distributed application for meeting applications with deadline constraints. The researchers have been worked hardly to suggest different algorithms and approaches for dynamic resources provisioning in order to meet application deadline. These researches concentrate on some factors to prevent deadline violation, but they ignore other factors. In this paper, we aim to evaluate what is the effect of most important factors together on meeting deadline when resources are provisioned from public cloud. These factors such as different time factors, VMs deployment time, data set size and data locality and data transmission time. Also, we evaluate the impact of these factors on the number of cloud resources estimations and the latency time that exceeds the deadline in case of deadline violation. To confirm results, CloudSim toolkit is used. The results show how all these factors together impact on the ability of meeting deadline. It also showed that to avoid deadline violation the importance of provisioning resources of the closet providers in case short deadline or large data set.
With the availability of a wide range of cloud Virtual Machines (VMs) it is difficult to determine which VMs can maximise the performance of an application. Benchmarking is commonly used to this end for capturing the performance of VMs.... more
With the availability of a wide range of cloud Virtual Machines (VMs) it is difficult to determine which VMs can maximise the performance of an application. Benchmarking is commonly used to this end for capturing the performance of VMs. Most cloud benchmarking techniques are typically heavyweight-time consuming processes which have to benchmark the entire VM in order to obtain accurate benchmark data. Such benchmarks cannot be used in real-time on the cloud and incur extra costs even before an application is deployed. In this paper, we present lightweight cloud benchmarking techniques that execute quickly and can be used in near real-time on the cloud. The exploration of lightweight benchmarking techniques are facilitated by the development of DocLite-Docker Container-based Lightweight Benchmarking. DocLite is built on the Docker container technology which allows a user-defined portion (such as memory size and the number of CPU cores) of the VM to be benchmarked. DocLite operates in two modes, in the first mode, containers are used to benchmark a small portion of the VM to generate performance ranks. In the second mode, historic benchmark data is used along with the first mode as a hybrid to generate VM ranks. The generated ranks are evaluated against three scientific high-performance computing applications. The proposed techniques are up to 91 times faster than a heavyweight technique which benchmarks the entire VM. It is observed that the first mode can generate ranks with over 90% and 86% accuracy for sequential and parallel execution of an application. The hybrid mode improves the correlation slightly but the first mode is sufficient for benchmarking cloud VMs.
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most... more
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most businesses are using technology for daily basis tasks. However, it still is not used all over the world. In Kurdistan Region-Iraq (KRI), most of the SMEs still use the old way of working and follow the paper-based method for their daily basis tasks. According to a survey, more than seventy percent of SMEs in Kurdistan are not using software to manage human resource management tasks. However, some big companies are using HRMS; but even then, there is a lack of use of Cloud Technology. In this study, a model of the Enterprise Human Resource Management System (EHRMS) is proposed and implemented to solve the HR problems in this area using Cloud Technology. The proposed system consists of sixteen standard modules which used usually with famous HRM systems....
In recent years, the cloud has become an attractive execution environment for parallel applications, which introduces novel opportunities for versatile optimizations. Particularly promising in this context is the elasticity characteristic... more
In recent years, the cloud has become an attractive execution environment for parallel applications, which introduces novel opportunities for versatile optimizations. Particularly promising in this context is the elasticity characteristic of cloud environments. While elasticity is well established for client-server applications, it is a fundamentally new concept for parallel applications. However, existing elasticity mechanisms for client-server applications can be applied to parallel applications only to a limited extent. Efficient exploitation of elasticity for parallel applications requires novel mechanisms that take into account the particular runtime characteristics and resource requirements of this application type. To tackle this issue, we propose an elasticity description language. This language facilitates users to define elasticity policies, which specify the elasticity behavior at both cloud infrastructure level and application level. Elasticity at the application level is supported by an adequate programming and execution model, as well as abstractions that comply with the dynamic availability of resources. We present the underlying concepts and mechanisms, as well as the architecture and a prototypical implementation. Furthermore, we illustrate the capabilities of our approach through real-world scenarios.
Since the cloud computing [1] platform is widely accepted by the industry, variety of applications are designed targeting to a cloud platform. Database as a Service (DaaS) is one of the powerful platform of cloud computing. There are many... more
Since the cloud computing [1] platform is widely accepted by the industry, variety of applications are designed targeting to a cloud platform. Database as a Service (DaaS) is one of the powerful platform of cloud computing. There are many research issues in DaaS platform and one among them is the data synchronization issue. There are many approaches suggested in the literature to synchronise a local database by being in cloud environment. Unfortunately, very few work only available in the literature to synchronise a cloud database by being in the local database. The aim of this paper is to provide an algorithm to solve the problem of data synchronization from local database to cloud database.
ABSTRACT In this contribution, we design and test the performance of a distributed and adaptive resource management controller, which allows the optimal exploitation of Cognitive Radio and soft-input/soft-output data fusion in Vehicular... more
ABSTRACT In this contribution, we design and test the performance of a distributed and adaptive resource management controller, which allows the optimal exploitation of Cognitive Radio and soft-input/soft-output data fusion in Vehicular Access Networks. The ultimate goal is to allow energy and computing-limited car smartphones to utilize the available Vehicular-to-Infrastructure WiFi connections for performing traffic offloading towards local or remote Clouds by opportunistically acceding to a spectral-limited wireless backbone built up by multiple Roadside Units. For this purpose, we recast the afforded resource management problem into a suitable constrained stochastic Network Utility Maximization problem. Afterwards, we derive the optimal cognitive resource management controller, which dynamically allocates the access time-windows at the serving Roadside Units (i.e., the access points) together with the access rates and traffic flows at the served Vehicular Clients (i.e., the secondary users of the wireless backbone). Interestingly, the developed controller provides hard reliability guarantees to the Cloud Service Provider (i.e., the primary user of the wireless backbone) on a per-slot basis. Furthermore, it is also capable to self-acquire context information about the currently available bandwidth-energy resources, so as to quickly adapt to the mobility-induced abrupt changes of the state of the vehicular network, even in the presence of fadings, imperfect context information and intermittent Vehicular-to-Infrastructure connectivity. Finally, we develop a related access protocol, which supports a fully distributed and scalable implementation of the optimal controller.
3rd International Conference on Cloud and Internet of Things (ICCIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Cloud and IoT. The aim of the conference... more
3rd International Conference on Cloud and Internet of Things (ICCIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Cloud and IoT. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cuttingedge development in the field. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Cloud computing and Internet of Things.
Cloud computing has an indispensable role in the modern digital scenario. The fundamental challenge of cloud systems is to accommodate user requirements which keep on varying. This dynamic cloud environment demands the necessity of... more
Cloud computing has an indispensable role in the modern digital scenario. The fundamental challenge of cloud systems is to accommodate user requirements which keep on varying. This dynamic cloud environment demands the necessity of complex algorithms to resolve the trouble of task allotment. The overall performance of cloud systems is rooted in the efficiency of task scheduling algorithms. The dynamic property of cloud systems makes it challenging to find an optimal solution satisfying all the evaluation metrics. The new approach is formulated on the Round Robin and the Shortest Job First algorithms. The Round Robin method reduces starvation, and the Shortest Job First decreases the average waiting time. In this work, the advantages of both algorithms are incorporated to improve the makespan of user tasks.
In this paper we will present a reliable scheduling algorithm in cloud computing environment. In this algorithm we create a new algorithm by means of a new technique and with classification and considering request and acknowledge time of... more
In this paper we will present a reliable scheduling algorithm in cloud computing environment. In this algorithm we create a new algorithm by means of a new technique and with classification and considering request and acknowledge time of jobs in a qualification function. By evaluating the previous algorithms, we understand that the scheduling jobs have been performed by parameters that are associated with a failure rate. Therefore in the proposed algorithm, in addition to previous parameters, some other important parameters are used so we can gain the jobs with different scheduling based on these parameters. This work is associated with a mechanism. The major job is divided to sub jobs. In order to balance the jobs we should calculate the request and acknowledge time separately. Then we create the scheduling of each job by calculating the request and acknowledge time in the form of a shared job. Finally efficiency of the system is increased. So the real time of this algorithm will be improved in comparison with the other algorithms. Finally by the mechanism presented, the total time of processing in cloud computing is improved in comparison with the other algorithms.
3rdInternationalConferenceonInternetofThings(CIoT2021)willprovideanexcellentinternational forum for sharing knowledge and results in theory,methodology and applicationsofIoT.Authors are solicited to contribute to the conference... more
3rdInternationalConferenceonInternetofThings(CIoT2021)willprovideanexcellentinternational forum for sharing knowledge and results in theory,methodology and applicationsofIoT.Authors are solicited to contribute to the conference by submitting articles that illustrate researchresults, projects, surveying works and industrial experiences that describe significant advances inthe areas ofInternetofThings
For the execution of the scientific applications, different methods have been proposed to dynamically provide execution environments for such applications that hide the complexity of underlying distributed and heterogeneous... more
For the execution of the scientific applications, different methods have been proposed to dynamically provide execution environments for such applications that hide the complexity of underlying distributed and heterogeneous infrastructures. Recently virtualization has emerged as a promising technology to provide such environments. Virtualization is a technology that abstracts away the details of physical hardware and provides virtualized resources for high-level scientific applications. Virtualization offers a cost-effective and flexible way to use and manage computing resources. Such an abstraction is appealing in Grid computing and Cloud computing for better matching jobs (applications) to computational resources. This work applies the virtualization concept to the Condor dynamic resource management system by using Condor Virtual Universe to harvest the existing virtual computing resources to their maximum utility. It allows existing computing resources to be dynamically provisioned at run-time by users based on application requirements instead of statically at design-time thereby lay the basis for efficient use of the available resources, thus providing way for the efficient use of the available resources.
Cloud Computing is the next generation way of communication, Physical and structure barriers to networking and communication will be removed while convenience and security will be enhanced by Cloud Computing. Cloud Computing... more
Cloud Computing is the next generation way of communication, Physical and structure barriers to networking and communication will be removed while convenience and security will be enhanced by Cloud Computing. Cloud Computing make mobile devices to replace PCs. This will pave the ways to social networking which enhances social integration and new ways of business planning and undertakings. In the future, Cloud providers specialize in a given area which will make users enjoy better and cheaper services.
In this paper, we develop the optimal minimum-energy scheduler for the dynamic online joint allocation of the task sizes, computing rates, communication rates and communication powers in virtualized Networked Data Centers (NetDCs) that... more
In this paper, we develop the optimal minimum-energy scheduler for the dynamic online joint allocation of the task sizes, computing rates, communication rates and communication powers in virtualized Networked Data Centers (NetDCs) that operates under hard per-job delay-constraints. The referred NetDC’s infrastructure is composed by multiple frequency-scalable Virtual Machines (VMs), that are interconnected by a bandwidth and power-limited switched Local Area Network (LAN). Due to the nonlinear power-vs.-communication rate relationship, the resulting Computing-Communication Optimization Problem (CCOP) is inherently nonconvex. In order to analytically compute the exact solution of the CCOP, we develop a solving approach that relies on the following two main steps: (i) we prove that the CCOP retains a loosely coupled structure, that allows us to perform the lossless decomposition of the CCOP into the cascade of two simpler sub-problems; and, (ii) we prove that the coupling between the aforementioned sub-problems is provided by a (scalar) constraint, that is linear in the offered workload. The resulting optimal scheduler is amenable of scalable and distributed online implementation and its analytical characterization is in closed-form. After numerically testing its actual performance under randomly time-varying synthetically generated and real-world measured workload traces, we compare the obtained performance with the corresponding ones of some state-of-the-art static and sequential schedulers.