scholarly journals Cloud Computing Present Limitations and Future Trends

Author(s):  
Ahmad AlTwaijiry

Cloud computing is still in its early stage. There are several companies, both big and small, that provide a diverse range of cloud-based services. There are several types of apps, such as complete programs, support services, mail filtering services, and storage services. IT professionals have become used to using some of the many cloud-based services as business requirements required. Cloud computing aggregators and integrators, on the other hand, are already developing, providing bundles of goods and services as a single point of access to the cloud. This research attempts to explore the current limitations and future trends of cloud computing. More specifically, this research discusses current limitations such as limited control, Cloud outage, Vendor lock-in, Cloud security, Energy consumption and the future trends to combat these limitations such as Edge computing, Hybrid and Multi-Cloud solutions, green cloud computing, serverless computing.

Author(s):  
Rahul Neware

The development of the Internet of Things (IoT) has triggered a virtual wave of interconnection and intercommunication among an enormous number of universal things. This has caused an exceptional surge of colossal heterogeneous information, known as an information explosion. Until now, cloud computing has filled in as a proficient method to process and store these data. Still, it came to light that by utilizing just cloud computing, pesky issues like, the expanding requests of actual-time or speed-sensitive applications and the restrictions on system transfer speed could not be solved. Consequently, another computing platform, called fog computing has been advanced as a supplement to the cloud arrangement. Fog computing spreads the cloud administrations and services to the edge of the system, and brings processing, communications and reserving and storage capacity closer to edge gadgets and end-clients and, in the process, aims at enhancing versatility, low latency, transfer speed and safety and protection. This paper takes an extensive and wide-ranging view of fog computing, covering several aspects. At the outset is outlined the many-layered structural design of fog computing and its attributes. After that, chief advances like communication and inter-exchange, computing, reserving and storage, asset administration, naming, safety and safeguarding of privacy are delineated while showing how this backup and facilitate the installations and various applications. Then, numerous applications like augmented reality (AR), healthcare, gaming and brain-machine interface, vehicular computing, smart scenarios etc. are highlighted to explain the fog computing application milieu. Following that, it is shown that how, despite fog computing being a features-rich platform, it is dogged by its susceptibility to several security, privacy and safety concerns, which stem from the nature of its widely distributed and open architecture. Finally, some suggestions are advanced to address some of the safety challenges discussed so as to propel the further growth of fog computing.


Author(s):  
Judith Herrin

This book explores the exceptional roles that women played in the vibrant cultural and political life of medieval Byzantium. This book evokes the complex and exotic world of Byzantium's women, from empresses and saints to uneducated rural widows. Drawing on a diverse range of sources, the book sheds light on the importance of marriage in imperial statecraft, the tense coexistence of empresses in the imperial court, and the critical relationships of mothers and daughters. It looks at women's interactions with eunuchs, the in-between gender in Byzantine society, and shows how women defended their rights to hold land. The book describes how women controlled their inheritances, participated in urban crowds demanding the dismissal of corrupt officials, followed the processions of holy icons and relics, and marked religious feasts with liturgical celebrations, market activity, and holiday pleasures. The vivid portraits that emerge here reveal how women exerted an unrivalled influence on the patriarchal society of Byzantium, and remained active participants in the many changes that occurred throughout the empire's millennial history. The book brings together the author's finest essays on women and gender written throughout the long span of her career. This volume includes three new essays published here for the very first time and a new general introduction. It also provides a concise introduction to each essay that describes how it came to be written and how it fits into her broader views about women and Byzantium.


Author(s):  
Sharon F. Matusik ◽  
Jessica Jones

Crowdfunding has become a major consideration for individuals looking to fund their ideas, endeavors, and businesses. This phenomenon raises interesting questions for management scholars, such as what theories help to explain the nuance of crowdfunding as a form of entrepreneurial financing. With regard to what leads to crowdfunding campaign success, this chapter argues that there are mixed motives associated with contributing to these campaigns, and theoretical dynamics vary according to these different motives. The chapter also notes two fundamental differences of crowdfunding from more traditional means of funding early-stage ventures: the nature of engagement and preference toward product or person. Drawing on theory related to capabilities, the chapter identifies conditions under which crowdfunding is likely to be more and less advantageous based on these two dimensions. In summary, it provides a model that explains important sources of heterogeneity (i.e., motives) and homogeneity (i.e., diffused engagement and product lock-in) within the crowdfunding phenomenon that add nuance to theory in the entrepreneurial financing literature.


2021 ◽  
Vol 13 (2) ◽  
pp. 24
Author(s):  
Mohammed Amine Bouras ◽  
Qinghua Lu ◽  
Sahraoui Dhelim ◽  
Huansheng Ning

Identity management is a fundamental feature of Internet of Things (IoT) ecosystem, particularly for IoT data access control. However, most of the actual works adopt centralized approaches, which could lead to a single point of failure and privacy issues that are tied to the use of a trusted third parties. A consortium blockchain is an emerging technology that provides a neutral and trustable computation and storage platform that is suitable for building identity management solutions for IoT. This paper proposes a lightweight architecture and the associated protocols for consortium blockchain-based identity management to address privacy, security, and scalability issues in a centralized system for IoT. Besides, we implement a proof-of-concept prototype and evaluate our approach. We evaluate our work by measuring the latency and throughput of the transactions while using different query actions and payload sizes, and we compared it to other similar works. The results show that the approach is suitable for business adoption.


2021 ◽  
Vol 164 (3-4) ◽  
Author(s):  
Wake Smith ◽  
Claire Henly

AbstractIn this paper, we seek to ground discussions of the governance of stratospheric aerosol injection research in recent literature about the field including an updated understanding of the technology’s deployment logistics and scale, pattern of effects, and research pathways. Relying upon this literature, we evaluate several common reservations regarding the governance of pre-deployment research and testing including covert deployment, technological lock-in, weaponization, slippery slope, and the blurry line between research and deployment. We conclude that these reservations are no longer supported by literature. However, we do not argue that there is no reason for concern. Instead, we enumerate alternative bases for caution about research into stratospheric aerosol injection which are supported by an up-to-date understanding of the literature. We conclude that in order to establish the correct degree and type of governance for stratospheric aerosol injection research, the research community must focus its attention on these well-grounded reservations. However, while these reservations are supported and warrant further attention, we conclude that none currently justifies restrictive governance of early-stage stratospheric aerosol injection research.


2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Kai Peng ◽  
Victor C. M. Leung ◽  
Xiaolong Xu ◽  
Lixin Zheng ◽  
Jiabin Wang ◽  
...  

Mobile cloud computing (MCC) integrates cloud computing (CC) into mobile networks, prolonging the battery life of the mobile users (MUs). However, this mode may cause significant execution delay. To address the delay issue, a new mode known as mobile edge computing (MEC) has been proposed. MEC provides computing and storage service for the edge of network, which enables MUs to execute applications efficiently and meet the delay requirements. In this paper, we present a comprehensive survey of the MEC research from the perspective of service adoption and provision. We first describe the overview of MEC, including the definition, architecture, and service of MEC. After that we review the existing MUs-oriented service adoption of MEC, i.e., offloading. More specifically, the study on offloading is divided into two key taxonomies: computation offloading and data offloading. In addition, each of them is further divided into single MU offloading scheme and multi-MU offloading scheme. Then we survey edge server- (ES-) oriented service provision, including technical indicators, ES placement, and resource allocation. In addition, other issues like applications on MEC and open issues are investigated. Finally, we conclude the paper.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


2008 ◽  
Vol 205 (6) ◽  
pp. 1331-1342 ◽  
Author(s):  
Sandra Weller ◽  
Maria Mamani-Matsuda ◽  
Capucine Picard ◽  
Corinne Cordier ◽  
Damiana Lecoeuche ◽  
...  

T cell–dependent immune responses develop soon after birth, whereas it takes 2 yr for humans to develop T cell–independent responses. We used this dissociation to analyze the repertoire diversification of IgM+IgD+CD27+ B cells (also known as “IgM memory” B cells), comparing these cells with switched B cells in children <2 yr of age, with the aim of determining whether these two subsets are developmentally related. We show that the repertoire of IgM+IgD+CD27+ B cells in the spleen and blood displays no sign of antigen-driven activation and expansion on H-CDR3 spectratyping, despite the many antigenic challenges provided by childhood vaccinations. This repertoire differed markedly from those of switched B cells and splenic germinal center B cells, even at the early stage of differentiation associated with μ heavy chain expression. These data provide evidence for the developmental diversification of IgM+IgD+CD27+ B cells, at least in very young children, outside of T cell–dependent and –independent immune responses.


2012 ◽  
Vol 3 (2) ◽  
pp. 51-59 ◽  
Author(s):  
Nawsher Khan ◽  
A. Noraziah ◽  
Elrasheed I. Ismail ◽  
Mustafa Mat Deris ◽  
Tutut Herawan

Cloud computing is fundamentally altering the expectations for how and when computing, storage, and networking resources should be allocated, managed, consumed, and allow users to utilize services globally. Due to the powerful computing and storage, high availability and security, easy accessibility and adaptability, reliable scalability and interoperability, cost and time effective cloud computing is the top, needed for current fast growing business world. A client, organization or a trade that adopting emerging cloud environment can choose a well suitable infrastructure, platform, software, and a network resource, for any business, where each one has some exclusive features and advantages. The authors first develop a comprehensive classification for describing cloud computing architecture. This classification help in survey of several existing cloud computing services developed by various projects globally such as Amazon, Google, Microsoft, Sun and Force.com and by using this survey’s results the authors identified similarities and differences of the architecture approaches of cloud computing.


Sign in / Sign up

Export Citation Format

Share Document