scholarly journals A Review of Evolutionary Trends in Cloud Computing and Applications to the Healthcare Ecosystem

2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Mbasa Joaquim Molo ◽  
Joke A. Badejo ◽  
Emmanuel Adetiba ◽  
Vingi Patrick Nzanzu ◽  
Etinosa Noma-Osaghae ◽  
...  

Cloud computing is a technology that allows dynamic and flexible computing capability and storage through on-demand delivery and pay-as-you-go services over the Internet. This technology has brought significant advances in the Information Technology (IT) domain. In the last few years, the evolution of cloud computing has led to the development of new technologies such as cloud federation, edge computing, and fog computing. However, with the development of Internet of Things (IoT), several challenges have emerged with these new technologies. Therefore, this paper discusses each of the emerging cloud-based technologies, as well as their architectures, opportunities, and challenges. We present how cloud computing evolved from one paradigm to another through the interplay of benefits such as improvement in computational resources through the combination of the strengths of various Cloud Service Providers (CSPs), decrease in latency, improvement in bandwidth, and so on. Furthermore, the paper highlights the application of different cloud paradigms in the healthcare ecosystem.

Author(s):  
Akash Chowdhury ◽  
Swastik Mukherjee ◽  
Sourav Banerjee

The various services that are offered by IoT and Cloud Service Providers (CSPs) to the customers today feature a pay-per-use service-charging policy. Customers can choose and avail these services when they want, how they want, and from where they want on demand. Demand for these services has increased drastically over the years among individuals and enterprises worldwide, and thus, it is very important to keep up good Quality of Service (QoS). This chapter highlights the history of internet, the gradual evolution of cloud computing, the reasons behind it, evolution and concepts of the Internet of Things (IoT), CloudIoT and its necessities, and various applications and service fields of CloudIoT. This chapter also precisely highlights various concepts regarding maintenance of good QoS, controversies in QoS maintenance, different parameters that the QoS depends on, various problems faced in maintaining those parameters, and the possible solutions for overcoming those problems. Possible directions towards future works are also highlighted in this chapter.


Author(s):  
Akash Chowdhury ◽  
Swastik Mukherjee ◽  
Sourav Banerjee

The various services that are offered by IoT and Cloud Service Providers (CSPs) to the customers today feature a pay-per-use service-charging policy. Customers can choose and avail these services when they want, how they want, and from where they want on demand. Demand for these services has increased drastically over the years among individuals and enterprises worldwide, and thus, it is very important to keep up good Quality of Service (QoS). This chapter highlights the history of internet, the gradual evolution of cloud computing, the reasons behind it, evolution and concepts of the Internet of Things (IoT), CloudIoT and its necessities, and various applications and service fields of CloudIoT. This chapter also precisely highlights various concepts regarding maintenance of good QoS, controversies in QoS maintenance, different parameters that the QoS depends on, various problems faced in maintaining those parameters, and the possible solutions for overcoming those problems. Possible directions towards future works are also highlighted in this chapter.


2019 ◽  
Vol 11 (4) ◽  
pp. 14-27
Author(s):  
Dawei Xie ◽  
Haining Yang ◽  
Jing Qin ◽  
Jixin Ma

As cloud computing provides affordable and scalable computational resources, delegating heavy computing tasks to the cloud service providers is appealing to individuals and companies. Among different types of specific computations, the polynomial evaluation is an important one due to its wide usage in engineering and scientific fields. Cloud service providers may not be trusted, thus, the validity and the privacy of such computation should be guaranteed. In this article, the authors present a protocol for publicly verifiable delegations of high degree polynomials. Compared with the existing solutions, it ensures the privacy of outsourced functions and actual results. And the protocol satisfies the property of blind verifiability such that the results can be publicly verified without learning the value. The protocol also improves in efficiency.


Cloud computing is constantly evolving with innovations. So, the cloud service providers are investing big in finding solutions for the challenges confronted by the business organizations in the ever-changing technological world. However, still, there is a little reluctance among the organizations to ultimately adopt the public cloud because the mission-critical applications and the mission-critical data require high-level security and availability which are questionable in the equally growing hacking technology. The hacker's comfort zone is Internet, and the Internet is the primary medium for communication between enterprises and cloud service providers. So, the cloud service providers come up with a solution called Direct-Cloud which bypasses the internet and establishes a private connection between the enterprise and cloud service provider. The primary objective of this paper is to familiarize the terminology direct-cloud as it makes a massive move in Cloud Computing. So, this paper presents a study that describes direct-cloud, its architecture, benefits, the comparison between different direct-cloud solutions and the guidelines to choose a suitable direct-cloud solution. Also, the terminologies Multi-Cloud and ConnectedCloud are gaining attention among the enterprises to meet the growing needs of the business. Hence the paper further explores the direct-cloud deployment in the multi-cloud and connected-cloud environment


Author(s):  
J. Craig Mudge

Cloud computing is a mode of acquisition of infrastructure where a cloud service provides on demand computing and on-demand storage, accessible over the web, with a matching business model, namely pay-per-use. Lower cost, sometimes a factor of five, is achieved by automating operations in warehouse-sized data centres, sharing the hefty burden of cooling, physical security, and power backup, and the use of commodity components. As access to storage managed by cloud service providers gained market acceptance, the phrase “the cloud” came into use to refer to the location of information stored with a cloud service provider to be shared (business documents and photos) or copied for backup (against losing a phone or deleting information on a laptop).  Security, and to a lesser extent privacy, concerns are the major barriers to the adoption of cloud computing, but the leading cloud service providers have responded to the point that sensitive information, such as medical records and credit-card-holder data, is now held in the cloud. 


2015 ◽  
Vol 8 (2) ◽  
Author(s):  
Hitesh Marwaha ◽  
Dr. Rajeshwar Singh

Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. Cloud Computing is a computing model, in which customer plug into the “cloud” to access IT resources which are priced and provided “on-demand”. The major challenges that prevent Cloud Computing from being adopted are recognized by organizations are security issues. Many techniques for securing the data in cloud are proposed by researcher but almost all methods have some drawbacks and till date no appropriate method has not been proposed that Cloud service providers can win the trust of customer. In this research paper the various security issues are reviewed along with cloud computing service providers which will give a deep insight for cloud service providers as well as researchers to work on the areas and make cloud computing a“trusted computing “and hardening the confidence of organizations towards cloud computing migration.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


Author(s):  
Theo Lynn

Abstract Cloud computing is the dominant paradigm in modern computing, used by billions of Internet users worldwide. It is a market dominated by a small number of hyperscale cloud service providers. The overwhelming majority of cloud customers agree to standard form click-wrap contracts, with no opportunity to negotiate specific terms and conditions. Few cloud customers read the contracts that they agree to. It is clear that contracts in cloud computing are primarily an instrument of control benefiting one side, the cloud service provider. This chapter provides an introduction to the relationship between psychological trust, contracts and contract law. It also offers an overview of the key contract law issues that arise in cloud computing and introduces some emerging paradigms in cloud computing and contracts.


2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Yao Lu ◽  
John Panneerselvam ◽  
Lu Liu ◽  
Yan Wu

Given the increasing deployments of Cloud datacentres and the excessive usage of server resources, their associated energy and environmental implications are also increasing at an alarming rate. Cloud service providers are under immense pressure to significantly reduce both such implications for promoting green computing. Maintaining the desired level of Quality of Service (QoS) without violating the Service Level Agreement (SLA), whilst attempting to reduce the usage of the datacentre resources is an obvious challenge for the Cloud service providers. Scaling the level of active server resources in accordance with the predicted incoming workloads is one possible way of reducing the undesirable energy consumption of the active resources without affecting the performance quality. To this end, this paper analyzes the dynamic characteristics of the Cloud workloads and defines a hierarchy for the latency sensitivity levels of the Cloud workloads. Further, a novel workload prediction model for energy efficient Cloud Computing is proposed, named RVLBPNN (Rand Variable Learning Rate Backpropagation Neural Network) based on BPNN (Backpropagation Neural Network) algorithm. Experiments evaluating the prediction accuracy of the proposed prediction model demonstrate that RVLBPNN achieves an improved prediction accuracy compared to the HMM and Naïve Bayes Classifier models by a considerable margin.


Sign in / Sign up

Export Citation Format

Share Document