Storm Clouds Platform: a cloud computing platform for smart city applications

2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Marco Battarra ◽  
Marco Consonni ◽  
Samuele De Domenico ◽  
Andrea Milani

This paper describes our work on STORM CLOUDS[1], a project with the main objective of migrating smart-city services, that Public Authorities (PAs) currently provided using traditional Information Technology, to a cloud-based environment. Our organization was in charge of finding the technical solutions, so we designed and implemented a cloud computing solution called Storm Clouds Platform (SCP), for that purpose. In principle, the applications we ported could run on a public cloud service, like Amazon Web ServicesTM[2] or Microsoft® Azure[3], that provide computational resources on a pay-per-use paradigm. However, these solutions have disadvantages due to their proprietary nature: vendor lock-in is one of the issues but other serious problems are related to the lack of full control on how data and applications are processed in the cloud. As an example, when using a public cloud, the users of the cloud services have very little control on the location where applications run and data are stored, if there is any. This is identified as one of the most important obstacles in cloud computing adoption, particularly in applications manage personal data and the application provider has legal obligation of preserving end user privacy[4]. This paper explains how we faced the problem and the solutions we found. We designed a cloud computing platform — completely based on open software components — that can be used for either implementing private clouds or for porting applications to public clouds.

Author(s):  
Srinivasa K. G. ◽  
Nishal Ancelette Pereira ◽  
Akshay K. Kallianpur ◽  
Subramanya E. Naligay

CloudStack is an Apache open source software that designed to install and handle large virtual machine (VM) networks, designed by Cloud.com and Citrix. This application is written in Java and was released under the terms of Apache License 2.0. This chapter discusses the easy availability and effortless scalability of CloudStack, which is an Infrastructure-as-a-service (IaaS) cloud computing platform software. We explore how CloudStack can either be used to setup public cloud services, or to provide a private cloud service.


2020 ◽  
Author(s):  
Mueen Uddin ◽  
Anjum Khalique ◽  
Awais Khan Jumani

This paper reviews, discusses, and highlights some of the standard cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. Furthermore, we provide Blockchain-enabled solutions for virtualized cloud computing platform involving both the end-users as well as cloud service providers (CSP) to address and solve different security and privacy-related vulnerabilities using blockchain-enabled solutions to improve their cloud services and resource provisioning facilities.


End the age of digitalization, data generated from numerous online and offline sources in every second. The Data are having a considerable amount of size and several properties termed as Bigdata. It is challenging to store, manage processes, analyze, visualize, and extract useful information from Bigdata using traditional approaches in local machines. To resolve this cloud computing platform is the solution. Cloud computing has high-level processing units, storage, and applications that do not depend on user devices' performance. Many users can access resources and demanded services remotely from the cloud on a pay-as-use basis. That is why users are not needed to buy and install costly resources locally. Some cloud services providers are Google, AWS, IBM, and Microsoft, and they have their Bigdata analyzing robust systems and products in a cost-efficient manner. There are many Cloud Service Providers (CSP's) having different services of Bigdata analyzing filed. However, we discuss in the paper about an excellent service BigQuery in the Data warehouse product of Google to analyze and represent numerous samples of datasets in real-time for making the right decisions within a short time.


2020 ◽  
Author(s):  
Mueen Uddin ◽  
Anjum Khalique ◽  
Awais Khan Jumani

This paper reviews, discusses, and highlights some of the standard cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. Furthermore, we provide Blockchain-enabled solutions for virtualized cloud computing platform involving both the end-users as well as cloud service providers (CSP) to address and solve different security and privacy-related vulnerabilities using blockchain-enabled solutions to improve their cloud services and resource provisioning facilities.


2019 ◽  
Vol 13 (1) ◽  
pp. 119-129 ◽  
Author(s):  
Changhao Wang ◽  
Shining Li ◽  
Tao Cheng ◽  
Bingqi Li

2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Anastasia Panori ◽  
Agustín González-Quel ◽  
Miguel Tavares ◽  
Dimitris Simitopoulos ◽  
Julián Arroyo

During the last decade, there has been an increased interest on cloud computing and especially on the adoption of public cloud services. The process of developing cloud-based public services or migrating existing ones to the Cloud is considered to be of particular interest—as it may require the selection of the most suitable applications as well as their transformation to fit in the new cloud environment. This paper aims at presenting the main findings of a migration process regarding smart city applications to a cloud infrastructure. First, it summarises the methodology along with the main steps followed by the cities of Agueda (Portugal), Thessaloniki (Greece) and Valladolid (Spain) in order to implement this migration process within the framework of the STORM CLOUDS project. Furthermore, it illustrates some crucial results regarding monitoring and validation aspects during the empirical application that was conducted via these pilots. These findings should be received as a helpful experience for future efforts designed by cities or other organisations that are willing to move their applications to the Cloud.


2020 ◽  
Vol 10 (12) ◽  
pp. 4361
Author(s):  
Fernando De la Prieta ◽  
Sara Rodríguez-González ◽  
Pablo Chamoso ◽  
Yves Demazeau ◽  
Juan Manuel Corchado

The cloud computing paradigm has the ability to adapt to new technologies and provide consistent cloud services. These features have led to the widespread use of the paradigm, making it necessary for the underlying computer infrastructure to cope with the increased demand and the high number of end users. Platforms often use classical mathematical models for this purpose, helping assign computational resources to the services provided to the final user. Although this kind of model is valid and widespread, it can be refined through intelligent techniques. Therefore, this research presents a novel system consisting of a multi-agent system, which integrates a case-based reasoning system. The resulting system dynamically allocates resources within a cloud computing platform. This approach, which is distributed and scalable, can learn from previous experiences and produce better results in each resource allocation. A model of the system has been implemented and tested on a real cloud platform with successful results.


2015 ◽  
Vol 2015 ◽  
pp. 1-15 ◽  
Author(s):  
Lifa Wu ◽  
Shengli Zhou ◽  
Zhenji Zhou ◽  
Zheng Hong ◽  
Kangyu Huang

In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.


Cloud Computing is a trending technology. The main benefit is user will pay only for the resources which have been utilized in the cloud services. Data which are stored in cloud can be accessed by the people from anywhere in the world using internet connection. Because of difficulties in data access and lack of security, in the current database system people are moving to Cloud Service Provider (CSP). Network backup and recovery method are used in CSP so there is no data loss in case of hardware failure. In this paper, we planned an efficient model in cloud computing for data accessing which will reduce the search time of providing the public key of the data owner. Not only data storage and security, data access also plays an important role to consume less time. So, in this proposed system we are going to increase the time efficiency for the data accessing.


Sign in / Sign up

Export Citation Format

Share Document