Hybrid Cloud: A New Paradigm in Cloud Computing

2021 ◽  
pp. 1-23
Author(s):  
Moumita Deb ◽  
Abantika Choudhury
2020 ◽  
Author(s):  
Zahra Zandesh

BACKGROUND The complicated nature of cloud computing encompassing internet-based technologies and service models for delivering IT applications, processing capability, storage, and memory space and some notable features motivate organizations to migrate their core businesses to the cloud. Consequently, healthcare organizations are much interested to migrate to this new paradigm despite challenges about security, privacy and compliances issues. OBJECTIVE The present study was conducted to investigate all related cloud compliances in health domain in order to find gaps in this context. METHODS All works on cloud compliance issues were surveyed after 2013 in health domain in PubMed, Scopus, Web of Science, and IEEE Digital Library databases. RESULTS Totally, 36 compliances had been found in this domain used in different countries for a variety of purposes. Initially, all founded compliances were divided into three parts as well as five standards, twenty-eight legislations and three policies and guidelines each of which is presented here by in detail. CONCLUSIONS Then, some main headlines like compliance management, data management, data governance, information security services, medical ethics, and patients' rights were recommended in terms of any compliance or frameworks and their corresponding patterns which should be involved in this domain.


The importance of cloud computing standards is the same as the World Wide Web standardization. There are plenty of prevalent standards around cloud computing that make different aspects of cloud computing possible. Standardization is a key answer and solution to the main question in this book (i.e., whether cloud computing will survive and remain on IT trends track or not). Standardization will bring interoperability, integration, and portability to the cloud computing landscape. With these three features, the main elements of IT (i.e., computation and data) can move from one cloud provider to another. Therefore, it eliminates vendor lock-in that is one of the barriers in cloud adoption. In addition, cloud interoperability will minimize cloud fragmentation. We need interoperability and portability to achieve cloud federation and to build hybrid cloud. In addition, there is still no de facto standard for moving workloads or data among different clouds. Cloud standardization needs to be addressed at various layers of a cloud infrastructure such as: virtual machine format, data, interface, context, and identity layers. This chapter reviews the emerging standards from the perspective of various organizations and standard bodies.


Author(s):  
Abdulelah Alwabel ◽  
Robert John Walters ◽  
Gary B. Wills

Cloud computing is a new paradigm that promises to move IT a step further towards utility computing, in which computing services are delivered as a utility service. Traditionally, Cloud employs dedicated resources located in one or more data centres in order to provide services to clients. Desktop Cloud computing is a new type of Cloud computing that aims at providing Cloud capabilities at low or no cost. Desktop Clouds harness non dedicated and idle resources in order to provide Cloud services. However, the nature of such resources can be problematic because they are prone to failure at any time without prior notice. This research focuses on the resource allocation mechanism in Desktop Clouds.The contributions of this chapter are threefold. Firstly, it defines and explains Desktop Clouds by comparing them with both Traditional Clouds and Desktop Grids. Secondly, the paper discusses various research issues in Desktop Clouds. Thirdly, it proposes a resource allocation model that is able to handle node failures.


Author(s):  
R. Priyadarshini ◽  
N. Malarvizhi ◽  
E. A. Neeba

Fog computing is a new paradigm believed to be an extension of cloud computing and services to the sting of the network. Similarly, like Cloud, Fog provides computing, data, storage, and various application services to the connected end-users. Fog computing uses one or a lot of combined end users or nearby end users edge devices to perform the configuration, communication, storage, control activity, and management functions over the infrastructure supported. This new paradigm solves the latency and information measure limitation issues encountered from the cloud computing. Primarily, the architecture of the fog computing is discussed and analyzed during this work and then indicates the connected potential security and trust problems. Then, however such problems are tackled within the existing literature is systematically reportable. Finally, the open challenges, analysis, trends, and future topics of security and trust in fog computing are mentioned.


Web Services ◽  
2019 ◽  
pp. 2255-2270
Author(s):  
Muhammad Anshari ◽  
Yabit Alas ◽  
Norazmah Yunus ◽  
Norakmarul Ihsan binti Pg Hj Sabtu ◽  
Malai Hayati Sheikh Abdul Hamid ◽  
...  

The recent adoption of cloud computing, Web 2.0 (web as a platform), and Big Data technologies have become the main driver of the paradigm shift. For higher education, choosing the right platform for a next generation of Learning Management System (LMS) namely LMS 2.0 is becoming more important than choosing a tool in the new paradigm. This chapter discusses factors for higher institution in determining a future direction for its LMS to take advantage of pervasive knowledge management, efficiency and effectiveness of operations. Literature studies have deployed for this study to portray the state of future LMS initiative. We found that the trends of cloud computing and big data will be predominant factor in viewing future LMS adoption and implementation. LMS 2.0 can be a solution to make learning systems in a higher education is flexible in terms of resources adoption, quality of learning, knowledge management, and implementation.


Web Services ◽  
2019 ◽  
pp. 1563-1587
Author(s):  
Wu He ◽  
Feng-Kwei Wang

As a new IT paradigm for users, cloud computing has the potential to transform the way that IT resources are utilized and consumed. Many multinational enterprises (MNEs) are interested in cloud computing but do not know how to adopt and implement cloud computing in their enterprise settings. In an effort to help MNEs understand cloud computing and develop successful enterprise adoption strategies for cloud computing, the authors propose a hybrid cloud model for MNEs and illustrate the utility of this model by using two case studies. Insights for adopting and implementing this model in international settings are provided as well.


Web Services ◽  
2019 ◽  
pp. 351-376
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing has recently emerged as a new paradigm of computing for hosting and delivering services over the Internet. It replaces computing as a personal commodity by computing as a public utility. It is attractive solution to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. However, despite the significant benefits, these technologies present many challenges including lack of security. The chapter presents an advanced survey focusing on cloud computing concept. It highlights its key concepts and presents a physical architecture of this environment. Finally, the chapter defines virtualization technology as a factor for cloud computing surge and discuses security issues that damage these systems. The aim of this chapter is to provide a better understanding of the design challenges of cloud computing.


Author(s):  
Rajinder Sandhu ◽  
Adel Nadjaran Toosi ◽  
Rajkumar Buyya

Cloud computing provides resources using multitenant architecture where infrastructure is created from one or more distributed datacenters. Scheduling of applications in cloud infrastructures is one of the main research area in cloud computing. Researchers have developed many scheduling algorithms and evaluated them using simulators such as CloudSim. Their performance needs to be validated in real-time cloud environments to improve their usefulness. Aneka is one of the prominent PaaS software which allows users to develop cloud application using various programming models and underline infrastructure. This chapter presents a scheduling API developed for the Aneka software platform. Users can develop their own scheduling algorithms using this API and integrate it with Aneka to test their scheduling algorithms in real cloud environments. The proposed API provides all the required functionalities to integrate and schedule private, public, or hybrid cloud with the Aneka software.


Author(s):  
Stojan Kitanov ◽  
Toni Janevski

Pushing computing, control, data storage, and processing into the cloud has been a key trend in the past decade. However, the cloud alone encounters growing limitations, such as reduced latency, high mobility, high scalability, and real-time execution in order to meet the upcoming computing and intelligent networking demands. A new paradigm called fog computing has emerged to overcome these limits. Fog extends cloud computing and services to the edge of the network. It provides data, computing, storage, and application services to end-users that can be hosted at the network edge. It reduces service latency, and improves QoS/QoE, that results in superior user experience. This chapter is about introduction and overview of fog computing, comparison between fog computing and cloud computing, fog computing and mobile edge computing, possible fog computing architecture, applications of fog computing, and possible research directions.


Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


Sign in / Sign up

Export Citation Format

Share Document