scholarly journals General Collective Intelligence and the Cloud

2021 ◽  
Author(s):  
Andy E Williams

The resources that can be made available on-demand through cloud computing are continually increasing. One potential addition is General Collective Intelligence or GCI, which has been defined as a platform that combines individuals into a single intelligence with the potential for exponentially greater general problem-solving ability (intelligence) than any individual. The concept of a cognitive computing platform involves leveraging GCI to orchestrate cooperation between any entities that are required in order to create the capacity to maximize any collective outcome targeted. Rather than executing programming code, a cognitive computing platform must execute functional models in which each of the functional operations composing that model is implemented in some programming language. All services that run on the cloud, as well as the cloud itself, can potentially be offered as cognitive computing platforms. Where current cloud computing limits customers to a particular cloud service vendor, cloud computing as a cognitive computing platform has the potential to completely decouple users from any such dependencies, while at the same time creating the potential for an exponential increase in demand for cloud services from those vendors that participate by decoupling their services in this way.

Cloud Computing is a trending technology. The main benefit is user will pay only for the resources which have been utilized in the cloud services. Data which are stored in cloud can be accessed by the people from anywhere in the world using internet connection. Because of difficulties in data access and lack of security, in the current database system people are moving to Cloud Service Provider (CSP). Network backup and recovery method are used in CSP so there is no data loss in case of hardware failure. In this paper, we planned an efficient model in cloud computing for data accessing which will reduce the search time of providing the public key of the data owner. Not only data storage and security, data access also plays an important role to consume less time. So, in this proposed system we are going to increase the time efficiency for the data accessing.


2020 ◽  
Author(s):  
Mueen Uddin ◽  
Anjum Khalique ◽  
Awais Khan Jumani

This paper reviews, discusses, and highlights some of the standard cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. Furthermore, we provide Blockchain-enabled solutions for virtualized cloud computing platform involving both the end-users as well as cloud service providers (CSP) to address and solve different security and privacy-related vulnerabilities using blockchain-enabled solutions to improve their cloud services and resource provisioning facilities.


2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Marco Battarra ◽  
Marco Consonni ◽  
Samuele De Domenico ◽  
Andrea Milani

This paper describes our work on STORM CLOUDS[1], a project with the main objective of migrating smart-city services, that Public Authorities (PAs) currently provided using traditional Information Technology, to a cloud-based environment. Our organization was in charge of finding the technical solutions, so we designed and implemented a cloud computing solution called Storm Clouds Platform (SCP), for that purpose. In principle, the applications we ported could run on a public cloud service, like Amazon Web ServicesTM[2] or Microsoft® Azure[3], that provide computational resources on a pay-per-use paradigm. However, these solutions have disadvantages due to their proprietary nature: vendor lock-in is one of the issues but other serious problems are related to the lack of full control on how data and applications are processed in the cloud. As an example, when using a public cloud, the users of the cloud services have very little control on the location where applications run and data are stored, if there is any. This is identified as one of the most important obstacles in cloud computing adoption, particularly in applications manage personal data and the application provider has legal obligation of preserving end user privacy[4]. This paper explains how we faced the problem and the solutions we found. We designed a cloud computing platform — completely based on open software components — that can be used for either implementing private clouds or for porting applications to public clouds.


Author(s):  
Srinivasa K. G. ◽  
Nishal Ancelette Pereira ◽  
Akshay K. Kallianpur ◽  
Subramanya E. Naligay

CloudStack is an Apache open source software that designed to install and handle large virtual machine (VM) networks, designed by Cloud.com and Citrix. This application is written in Java and was released under the terms of Apache License 2.0. This chapter discusses the easy availability and effortless scalability of CloudStack, which is an Infrastructure-as-a-service (IaaS) cloud computing platform software. We explore how CloudStack can either be used to setup public cloud services, or to provide a private cloud service.


2020 ◽  
Author(s):  
Andy E Williams

INTRODUCTION: General Collective Intelligence or GCI has been defined as a platform that combines individuals into a collective intelligence with the potential for exponentially greater general problem-solving ability (intelligence) than that of any individual in the group. Cognitive computing applications are executed by intelligent agents on a user’s behalf to optimize individual user outcomes. Cognitive computing platforms are executed by individuals organized by a GCI to achieve greater collective outcomes. The Peer to Peer Social Fabric (P2PSF) is an infrastructure platform proposed to enable the execution of cognitive computing applications or platforms.OBJECTIVES: To explore the functionality required by an infrastructure platform with the capacity to enable the operation of cognitive computing applications or platforms. And to determine whether the functionality of the proposed Peer to Peer Social Fabric is sufficient.METHODS: The requirements of collective cognitive computing were assessed, including the requirement to increase capacity for complexity, capacity to scale number of processes, and capacity to sustain processes. The proposed high-level specifications of the Peer to Peer Social Fabric were compared to those requirements to determine whether that functionality is sufficient.RESULTS: The proposed Peer to Peer Social Fabric appears to meet the requirements of both the operating system for GCI, as well as the requirements of a client enabling individuals and organizations to access either AGI or GCI functionality.CONCLUSION: All of the functionality required by he Peer to Peer Social Fabric might already exist, but an understanding of how that functionality must be combined in order to achieve the exponential increase in general problem-solving ability potentially possible through AGI or GCI is a new and important contribution.


End the age of digitalization, data generated from numerous online and offline sources in every second. The Data are having a considerable amount of size and several properties termed as Bigdata. It is challenging to store, manage processes, analyze, visualize, and extract useful information from Bigdata using traditional approaches in local machines. To resolve this cloud computing platform is the solution. Cloud computing has high-level processing units, storage, and applications that do not depend on user devices' performance. Many users can access resources and demanded services remotely from the cloud on a pay-as-use basis. That is why users are not needed to buy and install costly resources locally. Some cloud services providers are Google, AWS, IBM, and Microsoft, and they have their Bigdata analyzing robust systems and products in a cost-efficient manner. There are many Cloud Service Providers (CSP's) having different services of Bigdata analyzing filed. However, we discuss in the paper about an excellent service BigQuery in the Data warehouse product of Google to analyze and represent numerous samples of datasets in real-time for making the right decisions within a short time.


2020 ◽  
Author(s):  
Mueen Uddin ◽  
Anjum Khalique ◽  
Awais Khan Jumani

This paper reviews, discusses, and highlights some of the standard cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. Furthermore, we provide Blockchain-enabled solutions for virtualized cloud computing platform involving both the end-users as well as cloud service providers (CSP) to address and solve different security and privacy-related vulnerabilities using blockchain-enabled solutions to improve their cloud services and resource provisioning facilities.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


Author(s):  
Anjani Tiwari ◽  
Prof. Jatin Patel ◽  
Dr. Priyanka Sharma

Cloud solutions provide a powerful computing platform that enables individuals and Cloud users to perform a wide range of tasks, such as using an online storage system, implementing business applications, developing customized computer software, and establishing a realistic network environment. The number of people using cloud services has increased dramatically in recent years, and a massive amount of data has been stored in cloud computing environments. As a result, data breaches in cloud services are increasing year after year as a result of hackers who are constantly attempting to exploit cloud architecture's security vulnerabilities. In this paper, we investigate and analyse real-world cloud attacks in order to demonstrate the techniques used by hackers against cloud computing systems and how to prevent such malicious activities.


Sign in / Sign up

Export Citation Format

Share Document