scholarly journals Secured Data Transmission with Integrated Fault Reduction Scheduling in Cloud Computing

2021 ◽  
Vol 26 (2) ◽  
pp. 225-230
Author(s):  
Annabathula Phani Sheetal ◽  
Giddaluru Lalitha ◽  
Arepalli Peda Gopi ◽  
Vejendla Lakshman Narayana

Cloud computing offers end users a scalable and cost-effective way to access multi-platform data. While the Cloud Storage features endorse it, resource loss is also likely. A fault-tolerant mechanism is therefore required to achieve uninterrupted cloud service performances. The two widely used defect-tolerant mechanisms are task relocation and replication. But the replication approach leads to enormous overhead storage and computing as the number of tasks gradually increases. When a large number of defects occur, it creates more overhead storage and time complexity depending on task criticalities. An Integrated Fault Reduction Scheduling (IFRS) cloud computing model is used to resolve these problems. The probability of failure of a VM is calculated by finding the previous failures and active executions in this model. Then a fault-related adaptive recovery timer is retained, modified depending on the fault type. Experimental findings showed that IFRS reached 67% lower storage costs and 24% less response time when comparing with the current technique for sensitive tasks.

2021 ◽  
Vol 3 (3) ◽  
pp. 221-234
Author(s):  
Hari Krishnan Andi

This paper describes briefly about the concept of serverless cloud computing model, its usage in IT industries and its benefits. In the traditional model the developer is responsible for resource allocation, managing servers and owning of servers, and it included three models based upon the service such as IaaS, PaaS and SaaS. In IaaS (Infrastructure as a Service) the content storage and accessing of network is carried out by the cloud provider, SaaS (Software as a Service) here different software’s are provided to the user as a service, PaaS (Platform as a Service), the developer gets access to certain services for carrying out organizing process and run it accordingly. In serverless cloud computing, the developer need not worry about owning, management, and maintenance of servers as it is carried out by the cloud service provider. Hence by using this model, the time that is needed for a system to reach the market is very much reduced and is cost effective. Serverless architecture includes three categories namely, AWS Lambda, Azure, and Google cloud. It also includes certain challenges such as it cannot be used in the case where a process takes longer time to run and it is discussed below in this paper.


Author(s):  
Mohammed Radi ◽  
Ali Alwan ◽  
Abedallah Abualkishik ◽  
Adam Marks ◽  
Yonis Gulzar

Cloud computing has become a practical solution for processing big data. Cloud service providers have heterogeneous resources and offer a wide range of services with various processing capabilities. Typically, cloud users set preferences when working on a cloud platform. Some users tend to prefer the cheapest services for the given tasks, whereas other users prefer solutions that ensure the shortest response time or seek solutions that produce services ensuring an acceptable response time at a reasonable cost. The main responsibility of the cloud service broker is identifying the best data centre to be used for processing user requests. Therefore, to maintain a high level of quality of service, it is necessity to develop a service broker policy that is capable of selecting the best data centre, taking into consideration user preferences (e.g. cost, response time). This paper proposes an efficient and cost-effective plan for a service broker policy in a cloud environment based on the concept of VIKOR. The proposed solution relies on a multi-criteria decision-making technique aimed at generating an optimized solution that incorporates user preferences. The simulation results show that the proposed policy outperforms most recent policies designed for the cloud environment in many aspects, including processing time, response time, and processing cost. KEYWORDS Cloud computing, data centre selection, service broker, VIKOR, user priorities


2019 ◽  
pp. 1844-1868
Author(s):  
Ute Riemann

Business processes are not only variable, they are dynamic as well. A key benefit of BPM is the ability to adjust processes accordingly in response to changing market requirements. In parallel to BPM, enterprise cloud computing technology has emerged to provide a more cost effective solution to businesses and services while making use of inexpensive computing solutions, which combines pervasive, internet, and virtualization technologies (). Despite the slow start the business benefits of cloud computing are as such that the transition of BPM to the cloud is now underway. Cloud services refer to the operation of a virtualized, automated, and service-oriented IT landscape that allows the flexible provision and usage-based invoicing of resources, services, and applications via a network or the Internet. The generic term “X-as-a-Service” summarized the business models delivering almost everything as a service. BPM in the cloud is often regarded as a SaaS application. More recently, BPM is being regarded as a PaaS as it facilitates the creation and deployment of applications, in this case business process solutions. The PaaS landscape is the least developed of the four cloud based software delivery models previously discussed. PaaS vendors, such as IBM, Oracle, Microsoft delivered an application platform with managed cloud infrastructure services however more recently the PaaS market has begun to evolve to include other middleware capabilities including process management. BPM PaaS is the delivery of BPM technology as a service via a cloud service provider. In order to be classified as a PaaS a BPM suite requires the following capabilities: the architecture should be multi-tenant, it should be hosted off premise and it should offer elasticity and metering by use capabilities. When we refer to BPM in the cloud what we are really referring to is a combination of BPM PaaS and BPaaS (Business Process as a Service). Business Process as a Service (BPaaS) is a set of pre-defined business processes that allows the execution of customized business processes in the cloud. BPaaS is a complete pre-integrated BPM platform hosted in the cloud and delivered as a service, for the development and execution of general-purpose business process application. Although such a service harbors an economic potential, questions that need to be answered are as follows: Can an individual and company-specific business process supported by a standardized cloud solution, or should we protect process creativity and competitive differentiation by allowing the company to design the processes individually and solely support basic data flows and structures? Does it make sense to take a software solution “out of the box” that handles both data and process in a cloud environment, or would this hinder the creativity of business (process) development leading to a lower quality of processes and consequently to a decrease in the competitive positioning of a company? How to manage the inherent compliance and security topic. Within a completely integrated business application system, all required security aspects can be implemented as safeguards with just enough money. Within the cloud, however, advanced standards and identity prove is required to monitor and measure information exchange across the federation. Thereby there seems to be no need for developing new protocols, but a standardized way to collect and evaluate the collected information.


2015 ◽  
Vol 5 (2) ◽  
pp. 53-61 ◽  
Author(s):  
Shimaa Ouf ◽  
Mona Nasr

The population is living in a complex world at information explosion age. Today in Enterprises, the size and complexity of managing information have been increasing significantly and the demand for cost efficient information storage and processing grows higher. Enterprises need to optimize their IT management and minimize server maintenance costs become greater as usage demands prove to be increasingly unpredictable. Cloud computing offers a promising solution. Cloud computing is a computing model that relies on a large, centralized data center to store and process a great wealth of information. Computing power and storage space are provided on-demand to Enterprises that outsource their IT management to the cloud service provider. The immediate advantage to this computing model is a lower infrastructure maintenance cost. Since Enterprises that use cloud no longer require on-site servers, they eliminate the associated cost in IT management and electrical power.


2019 ◽  
Vol 8 (3) ◽  
pp. 3132-3143

In recent days cloud computing and cloud-based service, provisions play a vital and significant role in Internet-based information computing. It interrelates various applications like sales, purchase, banking, customer service, etc. and it behaves entirely as a service-oriented platform or environment. The primary objective of the cloud computing is sharing the resources within increased efficiency regarding time and cost for all kind of customers who needs a cloud service badly and immediately. Though the energy is high, it cannot assure that the cloud computing, service providing, and customer maintenance are highly secured. Service providers in the cloud are not strictly public; it may be private, community and hybrid. Malicious activities can be created or occurred in the middle of the communication and it is difficult to predict a particular person in the middle becomes a malicious user, from where and how. Secured data transmission and discussion in cloud computing considered as the main problem, and various earlier research works focused on tightening the security. The primary objective of this paper is to discuss different security mechanisms applied to multiple malicious threats in the cloud to understand the various issues and challenges faced in earlier research works. It provides a summary of the risks, appropriate method and the limitations and it helps to understand the primary and main problems related to security.


2018 ◽  
Vol 19 (4) ◽  
pp. 351-360
Author(s):  
Prabu S ◽  
Gpinath Ganapathy ◽  
Ranjan Goyal

Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment


2014 ◽  
Vol 3 (2) ◽  
pp. 55-62 ◽  
Author(s):  
Arezoo Jahani ◽  
Leyli Mohammad Khanli ◽  
Seyed Naser Razavi

Cloud computing is a kind of computing model that promise accessing to information resources in request time and subscription basis. In this environment, there are different type of user’s application with different requirements. In addition, there are different cloud Service providers which present spate services with various qualitative traits. Therefore determining the best cloud computing service for users with specific applications is a serious problem. Service ranking system compares the different services based on quality of services (QoS), in order to select the most appropriate service. In this paper, we propose a W_SR (Weight Service Rank) approach for cloud service ranking that uses from QoS features. Comprehensive experiments are conducted employing real-world QoS dataset, including more than 2500 web services over the world. The experimental results show that execution time of our approach is less than other approaches and it is more flexible and scalable than the others with increase in services or users.


Author(s):  
Dapeng Wang ◽  
Jinsong Wu

This chapter discusses and surveys the concepts, demands, requirements, solutions, opportunities, challenges, and future perspectives and potential of Carrier Grade Cloud Computing (CGCC). This chapter also introduces a carrier grade distributed cloud computing architecture and discusses the benefits and advantages of carrier grade distributed cloud computing. Unlike independent cloud service providers, telecommunication operators may integrate their conventional communications networking capabilities with the new cloud infrastructure services to provide inexpensive and high quality cloud services together with their deep understandings of, and strong relationships with, individual and enterprise customers. The relevant design requirements and challenges may include the performance, scalability, service-level agreement management, security, network optimization, and unified management. The relevant key issues in CGCC designs may include cost effective hardware and software configurations, distributed infrastructure deployment models, and operation processes.


2011 ◽  
Vol 29 (2) ◽  
pp. 214-224 ◽  
Author(s):  
P.Y. Thomas

PurposeThis paper aims to explore the educational potential of “cloud computing” (CC), and how it could be exploited in enhancing engagement among educational researchers and educators to better understand and improve their practice, in increasing the quality of their students' learning outcomes, and, thus, in advancing the scholarship of teaching and learning (SoTL) in a higher education context.Design/methodology/approachAdoption of the ideals of SoTL is considered an important approach for salvaging the higher education landscape around the world that is currently in a state of flux and evolution as a result of rapid advances in information and communications technology, and the subsequent changing needs of the digital natives. The study is based on ideas conceptualised from reading several editorials and articles on server virtualisation technology and cloud computing in several journals, with the eSchool News as the most important one. The paper identifies two cloud computing tools, their salient features and describes how cloud computing can be used to achieve the ideals of SoTL.FindingsThe study reports that the cloud as a ubiquitous computing tool and a powerful platform can enable educators to practise the ideals of SoTL. Two of the most useful free “cloud computing” applications are the Google Apps for Education which is a free online suite of tools that includes Gmail for e‐mail and Google Docs for documents, spreadsheets, and presentations, and Microsoft's cloud service (Live@edu) including the SkyDrive. Using the cloud approach, everybody can work on the same document at the same time to make corrections as well as improve it dynamically in a collaborative manner.Practical implicationsCloud computing has a significant place in higher education in that the appropriate use of cloud computing tools can enhance engagement among students, educators, and researchers in a cost effective manner. There are security concerns but they do not overshadow the benefits.Originality/valueThe paper provides insights into the possibility of using cloud computing delivery for originating a new instructional paradigm that makes a shift possible from the traditional practice of teaching as a private affair to a peer‐reviewed transparent process, and makes it known how student learning can be improved generally, not only in one's own classroom but also beyond it.


Sign in / Sign up

Export Citation Format

Share Document