Collaborative Cloud Computing for Resource Sharing Platform in Multiple Clouds

Author(s):  
K. Saritha ◽  
B. Manorama Devi
2020 ◽  
Vol 8 (6) ◽  
pp. 4530-4533

One of the most commonly used technology with massive demands in the field of distributed computing is cloud computing. Cloud computing has evolved in various forms like single cloud, hybrid cloud and multi-cloud. The evolution of cloud to handle hundred and thousands of user demands, at a time, thereby facilitating resource sharing, reduction in loss of information, elimination of data storage on server side and many many more the topic of task scheduling will be prominent in all forms of cloud computing and in distributed architecture. Here, we discuss the multiple cloud architecture and the scheduling techniques applied to evenly distribute the workload across multiple clouds. Algorithms like Cloud list Scheduling (CLS), Cloud min min scheduling (CMMS), Minimum completion cloud (MCC), Median max algorithm (MEMAX), Multiobjective scheduling (MOS) are some methods suggested in the past for finding a near to optimal solution for task allocation.


2014 ◽  
Vol E97.B (12) ◽  
pp. 2668-2679 ◽  
Author(s):  
Wei LIU ◽  
Ryoichi SHINKUMA ◽  
Tatsuro TAKAHASHI

10.29007/848q ◽  
2019 ◽  
Author(s):  
Mohammed O. Alannsary ◽  
Yasser M. Hausawi

Cloud computing is a relatively mature and robust technology that has promised its users with several proven advantages, such as cost reduction, immediate scalability, and resource sharing. The Cloud is built based on providing resources as services, such as providing Infrastructure, Platform, and Software as a Service. Such approach enables Cloud users to access these services based on their demand. In the government sector of Saudi Arabia, adoption and utilization of the Cloud is minimal. Despite being adopted officially, the Cloud has not been yet implemented properly. In our work we introduce how the government sector in Saudi Arabia can adopt and implement a Cloud Solution through utilizing its services and while considering issues related to its security.


2012 ◽  
Vol 5 (4) ◽  
pp. 551-563 ◽  
Author(s):  
Kyle Chard ◽  
Kris Bubendorfer ◽  
Simon Caton ◽  
Omer F. Rana

2021 ◽  
Vol 11 (4) ◽  
pp. 80-99
Author(s):  
Syed Imran Jami ◽  
Siraj Munir

Recent trends in data-intensive experiments require extensive computing and storage resources that are now handled using cloud resources. Industry experts and researchers use cloud-based services and resources to get analytics of their data to avoid inter-organizational issues including power overhead on local machines, cost associated with maintaining and running infrastructure, etc. This article provides detailed review of selected metrics for cloud computing according to the requirements of data science and big data that includes (1) load balancing, (2) resource scheduling, (3) resource allocation, (4) resource sharing, and (5) job scheduling. The major contribution of this review is the inclusion of these metrics collectively which is the first attempt towards evaluating the latest systems in the context of data science. The detailed analysis shows that cloud computing needs research in its association with data-intensive experiments with emphasis on the resource scheduling area.


2019 ◽  
pp. 592-620
Author(s):  
Poonam Saini ◽  
Awadhesh Kumar Singh

Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.


Author(s):  
Punit Gupta ◽  
Ravi Shankar Jha

With increase of information sharing over the internet or intranet, we require techniques to increase the availability of shared resource over large number of users trying to access the resources at the same time. Many techniques are being proposed to make access easy and more secure in distributed environment. Information retrieval plays an important to serve the most reliant data in least waiting, this chapter discuses all such techniques for information retrieval and sharing over the cloud infrastructure. Cloud Computing services provide better performance in terms of resource sharing and resource access with high reliability and scalability under high load.


2019 ◽  
Vol 2019 ◽  
pp. 1-15 ◽  
Author(s):  
Yazan Al-Issa ◽  
Mohammad Ashraf Ottom ◽  
Ahmed Tamrawi

Cloud computing is a promising technology that is expected to transform the healthcare industry. Cloud computing has many benefits like flexibility, cost and energy savings, resource sharing, and fast deployment. In this paper, we study the use of cloud computing in the healthcare industry and different cloud security and privacy challenges. The centralization of data on the cloud raises many security and privacy concerns for individuals and healthcare providers. This centralization of data (1) provides attackers with one-stop honey-pot to steal data and intercept data in-motion and (2) moves data ownership to the cloud service providers; therefore, the individuals and healthcare providers lose control over sensitive data. As a result, security, privacy, efficiency, and scalability concerns are hindering the wide adoption of the cloud technology. In this work, we found that the state-of-the art solutions address only a subset of those concerns. Thus, there is an immediate need for a holistic solution that balances all the contradicting requirements.


Author(s):  
Lubna Luxmi Dhirani ◽  
Thomas Newe ◽  
Shahzad Nizamani

Cloud computing migrations are increasing rapidly. The main influencing factor being IT management costs. IoT-based enterprises that started their cloud journey by setting up small private clouds within their enterprise have often found that as the applications and services they use broaden. Then the shift towards incorporating public clouds becomes inevitable. The current problem that many of these firms are encountering is the difficulty of managing multiple clouds that reside within different vendors running on different platforms, computational requirements, and vendor SLAs. Lack of support for a single standard for an overall multi-cloud hybrid model exposes the hybrid IT-management to further threats. This makes it difficult for an adopting enterprise to manage and maintain its cloud-based systems during peak performance hours, which often leads to system downtime. This chapter discusses various SLA issues specific to a hybrid multi-cloud environment and suggests possible solutions to help adopting firms in their management.


2020 ◽  
Vol 34 (06) ◽  
pp. 2050085 ◽  
Author(s):  
Jaishree Jain ◽  
Ajit Singh

Cloud computing is a model that permits usage of a distributed resource for cloud users using the pay-as-you-use method. It offers many advantages to users and companies, in terms of various resources and applications as a service. In spite of the existence of these advantages, there are a few limitations that place constraints on the utilization of a cloud computing environment. Security is an important concern in a cloud computing environment as it probes various security attacks. Therefore, in this work, a novel quantum-based Rivest–Shamir–Adleman (RSA) model is proposed for encryption of forensic reports during storage or data sharing on clouds. To evaluate the effectiveness of the proposed approach, a suitable simulation environment is designed for a multi-cloud environment. Experimental results reveal the proposed approach can efficiently encrypt and store data on multiple clouds without introducing potential overheads. Therefore, the proposed approach is more efficient for real-time applications.


Sign in / Sign up

Export Citation Format

Share Document