scholarly journals Migracijos į debesų kompiuterijos aplinką modelis

Author(s):  
Laima Zalieckaitė ◽  
Viktorija Kazakevičiūtė ◽  
Vilma Kalinovienė

The paper examines one of cloud computing (CC) issues that is the migration process to the cloud computing environment. The purpose of the paper is to create a cloud computing migration model through the analysis of organization's information resource migration process.The paperuses scientific literature analysis and synthesis, proposes visualization and modeling methods, analysis of the factors and criteria that determine the content of the stages of the migration process. Global information technology (IT) research and IT consulting company studies and experience show that the volume of cloud computing applications is constantly rising. The trend was also observed in Lithuanian context. It was foundthat themarket forcloud computing application scenarioscould be possibly used in different areas: for individual users, small and medium-sized companies, large organizations and the public sector. The above observations demonstrate that the growing number of organizations will use cloud computing model to manage their information resources. The future of cloud computing technology users need to understand migration processes and therefore have a defined migration model.

Author(s):  
Richard Millham

In this chapter, the author examines the migration process of a legacy system, as a software-as-a-service model, to the Web, and he looks at some of the reasons that drive this legacy system migration. As migration is often a multi-step process, depending on the legacy system being migrated, the author outlines several techniques and transformations for each step of the migration process in order to enable legacy systems, of different types, to be migrated to the cloud. Of particular interest are the different methods to handle data-intensive legacy systems to enable them to function in a cloud computing environment with reduced bandwidth. Unlike the migration of an unstructured legacy system to a locally-distributed desktop system, system migration to a cloud computing environment poses some unique challenges such as restricted bandwidth, scalability, and security. Part of this migration process is adapting the transformed legacy system to be able to function in such an environment. At the end of the chapter, several small case studies of legacy systems, each of a different nature successfully migrated to the cloud, will be given.


2018 ◽  
Vol 72 ◽  
pp. 149-163
Author(s):  
Agnieszka Grzegorek

Many issues need to be considered and tackled before moving data into the cloud. Adoption of cloud computing raises concerns and questions in particular with respect to security, control and privacy in cloud computing environment. Users should be aware where their data will be stored and what law governs. In a case where personal data are to be processed it is important for the contracting parties to ensure that requirements and obligations placed on them pursuant to the EU data protection laws will be fulfilled. This article also includes an overview of typical terms and conditions of cloud computing contracts, stressing that most of contractual arrangements in current practice fall short of achieving a fair balance of rights and obligations arising under the contract between cloud providers and users. The aim of this study is to indicate regulations and guidelines which are applicable to cloud computing contracts as well as initiatives undertaken at the EU level and their role in building legal certainty and trust to cloud computing technology.


2014 ◽  
Vol 1049-1050 ◽  
pp. 2122-2125
Author(s):  
Hong Li Li

In this paper, the background of cloud computing technology to study how to optimize cloud computing data center energy efficiency mechanisms. This paper analyzes the DVFS energy saving strategy, virtualization energy saving strategy, turn off / on energy saving strategies, such as the current mainstream strategy, comparing different energy saving strategies have not applied scenes.


2016 ◽  
Vol 3 (1) ◽  
pp. 42
Author(s):  
Quanhui Ren ◽  
Hui Gao

<span style="color: black; line-height: 115%; font-family: 'Calibri','sans-serif'; font-size: 12pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to adapt to rapid development of network information technology, the application of cloud computing technology is increasingly widespread. However, the security problem in the cloud computing environment has not been effectively resolved. Currently, the research on this problem is getting more attention from the industry. In order to further investigate the information security issues of cloud computing environment, this article not only discusses the basic concept, characteristics and service model of cloud computing, but also focuses on the cloud computing security reference model and cloud cube model. In this paper, the information security problems and concrete solutions in the former cloud computing environment are discussed from different aspects.</span>


2014 ◽  
Vol 4 (1) ◽  
pp. 33-44 ◽  
Author(s):  
Anil Singh ◽  
Kamlesh Dutta ◽  
Avtar Singh

Cloud Computing has changed the strategy of the way of providing different services to business and government agent as well as to sole users. Cloud Computing provides scalable and on demand services to users irrespective of their physical area. But this computing technology has many challenges. One of them is on demand resource allocation. In this paper a resource allocation method is proposed based on Analytical Hierarchy Process (AHP) called Multicriteria Preference Synthesis (MPS) method. MPS method combines many AHP synthesis methods (Additive Normalization, EigenVector, Multicriteria Synthesis etc.) to assign the priorities to the users' tasks. In MPS method Error Criteria is used to provide the consistency in providing the priorities to users' tasks if any violation is there.


Author(s):  
Shantanu Pal

Cloud computing has leaped ahead as one of the biggest technological advances of the present time. In cloud, users can upload or retrieve their desired data from anywhere in the world at anytime, making this the most important and primary function in cloud computing technology. While this technology reduces the geographical barriers and improves the scalability in the way we compute, keeping data in a Cloud Data Center (CDC) faces numerous challenges from unauthorized users and hackers within the system. Creating proper Service Level Agreements (SLA) and providing high-end storage security is the biggest barrier being developed for better Quality of Service (QoS) and implementation of a safer cloud computing environment for the Cloud Service Users (CSU) as well as for the Cloud Service Providers (CSP). Therefore, cloud applications need to have increased QoS and effective security measures and policies set in place to provide better services and to decline unauthorized access. The purpose of this chapter is to examine the cloud computing technology behind innovative business approaches and establishing SLA in cloud computing applications. This chapter provides a clear understanding of different cloud computing security challenges, risks, attacks, and solutions that exist in the present heterogeneous cloud computing environment. Storage security, different cloud infrastructures, the many advantages, and limitations are also discussed.


2014 ◽  
Vol 543-547 ◽  
pp. 3598-3601
Author(s):  
Wu Shi Gao

This article analyzes the problems of traditional public computer room building hardware life and use efficiency and maintenance management and so on, according to the present situation of construction of university public computer room. Propose a public computer room construction scheme to improve computer efficiency with virtualization technology in cloud computing environment. Through the example, we prove the superiority of the construction cost of public computer room, efficiency in the use, energy consumption, management and maintenance by cloud computing model.


2014 ◽  
Vol 998-999 ◽  
pp. 1195-1198
Author(s):  
Hua Yong Yang ◽  
Xin Zhang

As a mature technology, network video technology is widely accepted by the public. And it has the necessity and feasibility to be combined with the cloud computing technology. The paper analyzes the characteristics and technical needs of cloud network video service platform, and we proposed an infrastructure about how to use the cloud computing technology to build a flexible, reliable, energy-saving and safe services platform.


2014 ◽  
Vol 687-691 ◽  
pp. 1645-1648
Author(s):  
Chun Yan Kang ◽  
Tie Jun Shi

In the process of cloud computing, the dynamic hierarchical resource index is researched, and the independent confusion cloud computing is studied. This problem has become the focus of data processing. Therefore, it needs to establish improved dynamic layered resource index independent confuse cloud computing model. According to the theory of support vector machine, all of the resources are taken with dynamical layered processing, different levels of resources are taken with the independent confusion cloud computing. The experiment results show that, this algorithm is taken for the dynamic layered resource cloud computing, calculation efficiency can be improved, computational complexity and redundancy are reduced, meet the practical demands of dynamic hierarchical resource index independent confused cloud computing. It has good application value in the cloud computing application.


2014 ◽  
Vol 687-691 ◽  
pp. 3019-3022 ◽  
Author(s):  
Jun Jun Liu

Cloud computing technology is emerging technology in the field of information technology, and its technical advantage has brought new opportunities and challenges for the development and service of digital library in the Internet era. Virtualization is the key technology of cloud computing, and the paper discusses the virtualization of digital library in the cloud computing environment from technical level. Firstly, the paper introduced cloud computing and virtualization technology; then created a virtualized environment for digital library based on the cloud computing technology, and described the function of various levels; finally, the capacity of virtual machines appointment scheduling can be calculated according to formulas. The paper has great significance in enhancing the efficiency and quality of library service, constructing resource sharing system of digital library.


Sign in / Sign up

Export Citation Format

Share Document