Drivers and Inhibitors for the Adoption of Public Cloud Services in Germany

Author(s):  
Patrick Lübbecke ◽  
Markus Siepermann ◽  
Richard Lackes
Keyword(s):  
Author(s):  
Sanjay P. Ahuja ◽  
Thomas F. Furman ◽  
Kerwin E. Roslie ◽  
Jared T. Wheeler

There are several public cloud providers that provide service across different cloud models such as IaaS, PaaS, and SaaS. End users require an objective means to assess the performance of the services being offered by the various cloud providers. Benchmarks have typically been used to evaluate the performance of various systems and can play a vital role in assessing performance of the different public cloud platforms in a vendor neutral manner. Amazon's EC2 Service is one of the leading public cloud service providers and offers many different levels of service. The research in this chapter focuses on system level benchmarks and looks into evaluating the memory, CPU, and I/O performance of two different tiers of hardware offered through Amazon's EC2. Using three distinct types of system benchmarks, the performance of the micro spot instance and the M1 small instance are measured and compared. In order to examine the performance and scalability of the hardware, the virtual machines are set up in a cluster formation ranging from two to eight nodes. The results show that the scalability of the cloud is achieved by increasing resources when applicable. This chapter also looks at the economic model and other cloud services offered by Amazon's EC2, Microsoft's Azure, and Google's App Engine.


Author(s):  
Sanjay P. Ahuja ◽  
Neha Soni

Web 2.0 applications have become ubiquitous over the past few years because they provide useful features such as a rich, responsive graphical user interface that supports interactive and dynamic content. Social networking websites, blogs, auctions, online banking, online shopping and video sharing websites are noteworthy examples of Web 2.0 applications. The market for public cloud service providers is growing rapidly, and cloud providers offer an ever-growing list of services. As a result, developers and researchers find it challenging when deciding which public cloud service to use for deploying, experimenting or testing Web 2.0 applications. This study compares the scalability and performance of a social-events calendar application on two Infrastructure as a Service (IaaS) cloud services – Amazon EC2 and HP Cloud. This study captures and compares metrics on three different instance configurations for each cloud service such as the number of concurrent users (load), as well as response time and throughput (performance). Additionally, the total price of the three different instance configurations for each cloud service is calculated and compared. This comparison of the scalability, performance and price metrics provides developers and researchers with an insight into the scalability and performance characteristics of the three instance configurations for each cloud service, which simplifies the process of determining which cloud service and instance configuration to use for deploying their Web 2.0 applications. This study uses CloudStone – an open-source, three-tier web application benchmarking tool that simulates Web 2.0 application activities – as a realistic workload generator and to capture the intended metrics. The comparison of the collected metrics indicates that all of the tested Amazon EC2 instance configurations provide better scalability and lower latency at a lower cost than the respective HP Cloud instance configurations; however, the tested HP Cloud instance configurations provide a greater storage capacity than the Amazon EC2 instance configurations, which is an important consideration for data-intensive Web 2.0 applications.


2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Anastasia Panori ◽  
Agustín González-Quel ◽  
Miguel Tavares ◽  
Dimitris Simitopoulos ◽  
Julián Arroyo

During the last decade, there has been an increased interest on cloud computing and especially on the adoption of public cloud services. The process of developing cloud-based public services or migrating existing ones to the Cloud is considered to be of particular interest—as it may require the selection of the most suitable applications as well as their transformation to fit in the new cloud environment. This paper aims at presenting the main findings of a migration process regarding smart city applications to a cloud infrastructure. First, it summarises the methodology along with the main steps followed by the cities of Agueda (Portugal), Thessaloniki (Greece) and Valladolid (Spain) in order to implement this migration process within the framework of the STORM CLOUDS project. Furthermore, it illustrates some crucial results regarding monitoring and validation aspects during the empirical application that was conducted via these pilots. These findings should be received as a helpful experience for future efforts designed by cities or other organisations that are willing to move their applications to the Cloud.


2020 ◽  
Vol 1 (9) ◽  
pp. 59-68
Author(s):  
Ivan Opirskyy ◽  
Andrii Vynar

Phishing, as a type of information attack, has been used by intruders for selfish purposes for quite some time. They are very popular in the criminal world because it is much easier for a person to make certain profitable actions than a program. With the advent of new technologies, this type of attack has gradually adapted to the new conditions of engagement with its victim. Cloud services have become a great modern and widespread tool for phishing campaigns. The use of such services has given to malicious actors a number of significant advantages over the use of their own computing resources. The relative cheapness and ease of exploitation of these technologies has played an important role. The problem of information security with using cloud technologies is that this type of attack is difficult to detect, even more to prevent, without significantly affecting the comfort of using end users of information systems. The article analyzes the relevance of this type of attacks based on real data. We considered the algorithm of their work during a life cycle and analyzes the use of the basic available security methods of protection, their feasibility and problems of use. The analysis showed that not all modern security methods are capable of detecting and preventing phishing attacks, which use public cloud services. Even a combination of several or all methods cannot guarantee high protection for users against phishing threats. In the article were mentioned some examples of phishing campaigns that took place during 2019 and used such popular public cloud services as Azure Blob storage created by Microsoft and Google Drive developed by Google. A basic list of tips was also provided that would increase the level of security for internet users in order to reduce the risk of potential data compromise or its consequences.


Author(s):  
Srinath Perera ◽  
Rajika Kumarasiri ◽  
Supun Kamburugamuva ◽  
Senaka Fernando ◽  
Sanjiva Weerawarana ◽  
...  

2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Ping Zhang ◽  
Mimoza Durresi ◽  
Arjan Durresi

Internet mobile users are concerned more and more about their privacy nowadays as both researches and real world incidents show that leaking of communication and location privacy can lead to serious consequence, and many research works have been done to anonymize individual user from aggregated location data. However, just the communication itself between the mobile users and their peers or website could collect considerable privacy of the mobile users, such as location history, to other parties. In this paper, we investigated the potential privacy risk of mobile Internet users and proposed a scalable system built on top of public cloud services that can hide mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation cost.


2019 ◽  
Vol 9 (13) ◽  
pp. 2746 ◽  
Author(s):  
Jiong Shi ◽  
Liping Jin ◽  
Jun Li

Internet of Things (IoT) has become one of the key factors that enables, drives and accelerates the digital transformation all over the world. The vision of the IoT is not only the immediate access to the data but also the ability to turning data into intelligence. As such, there is a growing number of public cloud computing providers offering IoT related services, including data processing, data analyzing and data visualization. However, with tens of billions of microcontroller-powered devices getting involved in the era of IoT, the concerns for overall security, privacy and cost are rising constantly and exponentially. Furthermore, these issues cannot be solved by public cloud computing providers since they mainly focus on the software and services rather than on the end devices. In this article, an integrated solution including Azure Sphere devices and Azure cloud services is proposed to provide a comprehensive and efficient way to ensure security that starts in the device and extends to the cloud with limited budgets. Moreover, the implementation details including hardware components, software design and Azure cloud integration are presented to demonstrate the feasibility and efficiency of the proposed solution.


Sign in / Sign up

Export Citation Format

Share Document