International Journal of Private Cloud Computing Environment and Management

2019 ◽  
2017 ◽  
Vol 10 (13) ◽  
pp. 445
Author(s):  
Purvi Pathak ◽  
Kumar R

High-performance computing (HPC) applications require high-end computing systems, but not all scientists have access to such powerful systems. Cloud computing provides an opportunity to run these applications on the cloud without the requirement of investing in high-end parallel computing systems. We can analyze the performance of the HPC applications on private as well as public clouds. The performance of the workload on the cloud can be calculated using different benchmarking tools such as NAS parallel benchmarking and Rally. The workloads of HPC applications require use of many parallel computing systems to be run on a physical setup, but this facility is available on cloud computing environment without the need of investing in physical machines. We aim to analyze the ability of the cloud to perform well when running HPC workloads. We shall get the detailed performance of the cloud when running these applications on a private cloud and find the pros and cons of running HPC workloads on cloud environment.


Author(s):  
Edy Kristianto

The Internet of Things (IOT) becomes the purpose of the development of information and communication technology. Cloud computing has a very important role in supporting the IOT, because cloud computing allows to provide services in the form of infrastructure (IaaS), platform (PaaS), and Software (SaaS) for its users. One of the fundamental services is infrastructure as a service (IaaS). This study analyzed the requirement that there must be based on a framework of NIST to realize infrastructure as a service in the form of a virtual machine to be built in a cloud computing environment.


2017 ◽  
Vol 10 (2) ◽  
pp. 438-445
Author(s):  
Riddhi Gaur ◽  
Uma Kumari

Internet based applications and data storage services can be easily acquired by the end users by the permission of Cloud computing. Providing security to the cloud computing environment has become important issue with the increased demand of cloud computing. Other than the traditional security methods, additional methods like control access, confidentiality, firewalls and user authentication are required in order to provide security to the cloud computing environment. One of the needful components in terms of cloud security is Intrusion Detection System (IDS). To detect various attacks on cloud, Intrusion Detection System (IDS) is the most commonly used mechanism. This paper discusses about the intrusion detection and different intrusion detection techniques namely anomaly based techniques and signature based techniques.


2014 ◽  
Vol 1 (1) ◽  
pp. 14-22
Author(s):  
Ghiri Basuki Putra

Cloud computing telah menjadi hal yang menarik untuk dibahas dikarenakan perkembangannya yang begitu pesat sejak pertama kali diperkenalkan mulai tahun 2000. Pemanfaatan cloud computing kepada penyimpanan data, pemakaian software secara bersama- sama serta penggunaan infrastruktur dan hardware pada jaringan atau komputer yang tergabung dalam sebuah cloud computing. Dengan cloud computing diharapkan adanya efesiensi dan kemudahan dalam  sumber daya baik software, data maupun hardware agar dapat digunakan bersama – sama. Perancangan cloud computing untuk laboratorium komputer Teknik Elektro Universitas Bangka Belitung bertujuan sebagai rancangan awal untuk pengembangan laboratorium komputer serta sebagai pusat pembelajaran dan penelitian cloud computing bagi mahasiswa Teknik Elektro. Perancangan cloud computing ini menggunakan metode Software as a Service (SaaS) dimana SaaS adalah layanan dari Cloud Computing dimana memakai software (perangkat lunak) yang telah disediakan sehingga tidak perlu setiap komputer di laboratorium menginstall software yang diperlukan selama tersedia di layanan Cloud Computing. Rancangan cloud computing di laboratorium menggunakan Private Cloud Computing merupakan pemodelan Cloud Computing yang memberikan lingkup yang lebih kecil untuk dapat memberikan layanan kepada pengguna tertentu misalnya pada sebuah jaringan komputer  lokal maupun pada skala perusahaan kecil maupun menengah.


Sign in / Sign up

Export Citation Format

Share Document