IaaS cloud computing services for libraries: cloud storage and virtual machines

2013 ◽  
Vol 29 (2) ◽  
pp. 87-100 ◽  
Author(s):  
Yan Han
Author(s):  
Marcus Tanque

Cloud computing consists of three fundamental service models: infrastructure-as-a-service, platform-as-a service and software-as-a-service. The technology “cloud computing” comprises four deployment models: public cloud, private cloud, hybrid cloud and community cloud. This chapter describes the six cloud service and deployment models, the association each of these services and models have with physical/virtual networks. Cloud service models are designed to power storage platforms, infrastructure solutions, provisioning and virtualization. Cloud computing services are developed to support shared network resources, provisioned between physical and virtual networks. These solutions are offered to organizations and consumers as utilities, to support dynamic, static, network and database provisioning processes. Vendors offer these resources to support day-to-day resource provisioning amid physical and virtual machines.


2017 ◽  
Vol 2 (6) ◽  
pp. 1-6
Author(s):  
Arash Mazidi ◽  
Elham Damghanijazi ◽  
Sajad Tofighy

The cloud computing has given services to the users throughout the world during recent years. The cloud computing services have been founded according to ‘As-Pay-You-Go’ model and some leading enterprises give these services. The giving these cloud-computing services has been developed every day and these requirements necessitate for more infrastructures and Internet providers (IPs). The nodes of data centers consume a lot of energy in cloud structure and disseminate noticeable amount of carbon dioxide into the environment. We define a framework and structure for cloud environment of efficient energy in the present paper. We examine the present problems and challenges based on this structure and then present and model management algorithms and source allocation in cloud computing environment in order to manage energy in addition to considering Service Level Agreement. The proposed algorithm has been implemented by cloudsim simulator where the obtained results from simulation of real-time data indicate that the proposed method is superior to previous techniques in terms of energy consumption and observance of Service Level Agreement. Similarly, number of live migration of virtual machines and quantity of transferred data has been improved.


2019 ◽  
pp. 84-126
Author(s):  
Marcus Tanque

Cloud computing consists of three fundamental service models: infrastructure-as-a-service, platform-as-a service and software-as-a-service. The technology “cloud computing” comprises four deployment models: public cloud, private cloud, hybrid cloud and community cloud. This chapter describes the six cloud service and deployment models, the association each of these services and models have with physical/virtual networks. Cloud service models are designed to power storage platforms, infrastructure solutions, provisioning and virtualization. Cloud computing services are developed to support shared network resources, provisioned between physical and virtual networks. These solutions are offered to organizations and consumers as utilities, to support dynamic, static, network and database provisioning processes. Vendors offer these resources to support day-to-day resource provisioning amid physical and virtual machines.


2020 ◽  
pp. 1781-1790
Author(s):  
ABDUL RASHID DAR ◽  
D Ravindran ◽  
Shahidul Islam

The cloud-users are getting impatient by experiencing the delays in loading the content of the web applications over the internet, which is usually caused by the complex latency while accessing the cloud datacenters distant from the cloud-users. It is becoming a catastrophic situation in availing the services and applications over the cloud-centric network. In cloud, workload is distributed across the multiple layers which also increases the latency. Time-sensitive Internet of Things (IoT) applications and services, usually in a cloud platform, are running over various virtual machines (VM’s) and possess high complexities while interacting. They face difficulties in the consolidations of the various applications containing heterogenetic workloads. Fog computing takes the cloud computing services to the edge-network, where computation, communication and storage are within the proximity to the end-user’s edge devices. Thus, it utilizes the maximum network bandwidth, enriches the mobility, and lowers the latency. It is a futuristic, convenient and more reliable platform to overcome the cloud computing issues. In this manuscript, we propose a Fog-based Spider Web Algorithm (FSWA), a heuristic approach which reduces the delays time (DT) and enhances the response time (RT) during the workflow among the various edge nodes across the fog network. The main purpose is to trace and locate the nearest f-node for computation and to reduce the latency across the various nodes in a network. Reduction of latency will enhance the quality of service (QoS) parameters, smooth resource distribution, and services availability. Latency can be an important factor for resource optimization issues in distributed computing environments. In comparison to the cloud computing, the latency in fog computing is much improved.


2020 ◽  
Vol 17 (4) ◽  
pp. 1590-1594
Author(s):  
V. Sathya ◽  
A. Shiny ◽  
S. Sajid Hussain ◽  
Ashutosh Gauda

Cloud computing is the movement of enlisting computing services like organization servers, accumulating databases, arranging, programming examination over the Internet. Companies offering these computing services are known as cloud providers and typically charge for cloud computing services based on usage, similar to how you are billed for water or electricity at home. It enables the companies to consume a compute resource, such as a Virtual Machine (VM), storage or an application, as a utility—just like electricity—rather than building and maintaining large computing materials in the house. Though servers are greatly protected against unauthorized access, there are incidents where classified data stored on servers are accessed by the maintenance staffs. So, the security plays a major role in cloud storage as when the user stores the data in the cloud, it stays there and anybody accessing it cannot be known at all. Hence, this paper mainly deals with the idea of storing data securely in the cloud using Symmetric and Asymmetric Cryptography algorithms including AES, 3DES, Blowfish, RSA along with modern Steganography LSB algorithm for wireless communication which hides the key inside the cover image.


This chapter introduces a trustworthy cloud computing architecture that uses the security properties offered by a virtual machine monitor that enforces the principle of least privilege. These security properties are a strong building block to provide trustworthy cloud computing services to cloud consumers. This chapter briefly explained about a proposed system to prevent insider attacks in cloud environment from cloud consumer and cloud service provider perspectives. The proposed framework is initiating how virtual machines are providing the most reliable security materials of the cloud computing architecture. For cloud consumers, the proposed architecture allocates the well-built security materials of the reliable cloud computing services.


2019 ◽  
Vol 9 (20) ◽  
pp. 4327
Author(s):  
Jueun Jeon ◽  
Jong Hyuk Park ◽  
Young-Sik Jeong

Cloud computing services that provide computing resources to users through the Internet also provide computing resources in a virtual machine form based on virtualization techniques. In general, supercomputing and grid computing have mainly been used to process large-scale jobs occurring in scientific, technical, and engineering application domains. However, services that process large-scale jobs in parallel using idle virtual machines are not provided in cloud computing at present. Generally, users do not use virtual machines anymore, or they do not use them for a long period of time, because existing cloud computing assigns all of the use rights of virtual machines to users, resulting in the low use of computing resources. This study proposes a scheme to process large-scale jobs in parallel, using idle virtual machines and increasing the resource utilization of idle virtual machines. Idle virtual machines are basically identified through specific determination criteria out of virtual machines created using OpenStack, and then they are used in computing services. This is called the idle virtual machine–resource utilization (IVM–ReU), which is proposed in this study.


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Sign in / Sign up

Export Citation Format

Share Document