scholarly journals Cloud Implementation and Cloud Integration

2012 ◽  
Vol 2 (1) ◽  
pp. 1-5
Author(s):  
Lalit Kumar ◽  
Dr. Gurdev Singh ◽  
Prince Jain

Cloud computing is innovated model which deliversconvenient and on-demand computing services over internetto requested end users. Cloud service engineering is adiscipline that combines the business and technology thinkingfor purposes of engineering a cloud. The structure of cloudservice engineering plays an important role in order to createusable and economic cloud. The cloud development life cycle(CDLC) is the one of the component in structure of cloudengineering along with Base, Tools & Techniques andManagement components. CDLC consists of six phases thatare flexible, isolated executable and having feedback. Thework of this paper focuses on the cloud Implementation andIntegration phase of the CDLC. The cloud implementation isrelated to actual creation, enablement of the cloud services ofa computing system. The cloud integration performs the taskof integrating the various cloud solution in one cloudenvironment and deploys various resource, web service andapplications to the cloud.

2012 ◽  
Vol 2 (1) ◽  
pp. 28-31
Author(s):  
Gurdev Singh ◽  
Harmandeep Singh ◽  
Amandeep Singh

Cloud computing is model which uses combine concept of software-as-a-service and œutility computing ,provide convenient and on-demand services to requested end users. Cloud Engineering is a discipline that uses combination of the business and technology thinking for purposes of engineering a cloud. The structure and principles of cloud engineering plays an important role for the engineering of usable and economic cloud. The cloud development life cycle (CDLC) is the one of the component in structure of cloud engineering with Base, Tools & Techniques and Management components. CDLC is the iterated life cycle model for development, deployment and delivery of cloud. CDLC consists of six phases that are flexible, isolated executable and having feedback. The work on this paper focuses on the Understanding Requirement and Analysis phase of the CDLC. This paper lists and discusses the basic, content and operational requirements for the engineering of economic cloud. It also discuses feasibility checks for the requirements. Analysis part of this phase does the analysis of their cloud computing solution with another available computing solution such as grid computing, volunteer computing, utility computing, autonomic computing, client-server model and peer to peer model; and also does cloud planning for cloud implementation phase


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


2015 ◽  
Vol 12 (3) ◽  
pp. 48-77 ◽  
Author(s):  
Jun Zou ◽  
Yan Wang ◽  
Mehmet A. Orgun

Cloud computing services have been increasingly considered by businesses as a viable option for reducing IT expenditure. However, there are often associated problems with unmanaged accountability. This paper first analyses the accountability properties of a cloud service and then proposes the accountable cloud service (ACS) model to address those problems. In addition, the authors argue that from an accountability perspective a cloud service is a proactive system that needs to be modeled differently from the traditional reactive systems. They extend traditional structural operational semantics to cater for modeling of actors as well as scenarios of inaction and exception in state transitions. This leads to the creation of a new form of a process algebra called Accountable Process Algebra (APA). They also propose an Obligation Flow Diagram (OFD) as a simple method for conflict resolution and verification for the ACS model. The ACS model enables obligation specification, validation, decomposition, machine-interpretation, monitoring and reasoning, and ultimately facilitates accountability in cloud service consumption. Using Amazon S3 service as a case study, they show how to address those known accountability problems by using our ACS model. Finally the authors discuss the applicability of their model to cloud services in general.


Author(s):  
Frank Fowley ◽  
Claus Pahl ◽  
Li Zhang

Cloud service brokerage has been identified as a key concern for future Cloud technology research and development. Integration, customization, and aggregation are core functions of a Cloud service broker. The need to cater to horizontal and vertical integration in service description languages, horizontally between different providers and vertically across the different Cloud layers, has been well recognized. In this chapter, the authors propose a conceptual framework for a Cloud service broker in two parts: first, a reference architecture for Cloud service brokers; and second, a rich ontology-based template manipulation framework and operator calculus that describes the mediated and integrated Cloud services, facilitates manipulating their descriptions, and allows both horizontal and vertical dimensions to be covered. Structural aspects of that template are identified, formalized in an ontology, and aligned with the Cloud development and deployment process.


Author(s):  
Anil Aggarwal

Cloud services are becoming part of every company’s “right”mare. They know it is the future but are afraid to jump on the cloud computing bandwagon. This may be due to lack of standardization, evolving technology, and/or fear of loss of privacy and security. However, every emerging technology has its root in early adopters who defy the common wisdom, take chances, and help it to evolve into something marketable. They get the first advantage before it becomes a norm. History is full of such examples: e-commerce, m-commerce, online banking, check in through kiosk, et cetera. Companies who were early adopters still have an advantage over late adopters. Amazon.com and eBay are prime examples of this. As technology evolves, it transfers from “push” to “pull” cycle. Cloud services are in their infancy and still evolving around “push” cycle. The number of companies offering cloud services is multiplying exponentially. This chapter presents a systems approach to cloud computing services. Specifically, it examines issues in the context of the system development life cycle (SDLC). For completeness purposes, the chapter discusses issues in relation to SDLC; however, in practice, each user has to customize this approach to suit their own application(s).


Lex Russica ◽  
2019 ◽  
pp. 108-115
Author(s):  
V. A. Kanashevskiy

The paper examines the legal aspects of the use of cloud solutions by Russian banks of foreign providers. Despite the obvious advantages, there are many obstacles to such a use in the Russian legislation, including the lack of general regulation of cloud computing services, requirements for information security (licensing of encryption activities, certification of information systems), requirements of legislation on the localization of personal data databases, electronic databases of banks, etc. Based on the analysis of existing regulations, in particular the industry regulators, the author comes to the conclusion that foreign cloud service providers have the right to provide services to Russian financial institutions under certain conditions: cloud solutions should not include outsourcing of business functions entirely and should not involve the production of internal (domestic) money transfers (payments); foreign cloud provider has taken measures to protect the protected information; cross-border transfer of personal data and bank secrecy should be carried out in an impersonal form, etc.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


2019 ◽  
Vol 33 (01) ◽  
pp. 1850420 ◽  
Author(s):  
Harsimran Kaur ◽  
Anurag Rai ◽  
Sarvjit Singh Bhatia

In the real world, building the high quality cloud computing framework is the challenge for the researcher in the present scenario where on demand service is required. The services which are performing the non-functional activities are referred to as Quality-of Service (QoS). The experience of real-world usage services are generally required to obtain the QoS. Many organizations offer various cloud services, such as Amazon, HP and IBM, to the customers. No technique is available to measure the real-world usage and estimate the ranking of the cloud services. From the customer side, it is a very tough job to choose the right cloud service provider (SP), which fulfills all the requirements of the customers. To avoid the confusion to select the right CSP, this paper proposes QoS ranking prediction methods such as Cloud Rank1, Cloud Rank2 and Cloud Rank3. Various experiments are done on the real-world QoS data by using EC2 services of Amazon and providing healthy results and solutions.


2014 ◽  
Vol 543-547 ◽  
pp. 3632-3635
Author(s):  
Hui Juan Xie ◽  
Wei She ◽  
Chang Hao Han

Cloud computing system preserves the security and privacy of a user's data by replicating data among several clouds and by using the secret sharing approach. It uses the database management system DBMS (data source) to manage and control the operations between the clients and them ulti-clouds inside a cloud service provider [1]. Generally speaking, The Shamir's threshold scheme is suitable for the shares in the cloud computing. The Shamir's threshold scheme as a secret sharing scheme will attract more attention in the cloud computing in future.


Sign in / Sign up

Export Citation Format

Share Document