scholarly journals Application level interoperability on IaaS cloud migration

2017 ◽  
Vol 1 (2) ◽  
pp. 72-78
Author(s):  
Soffa Zahara ◽  
Surya Sumpeno ◽  
Istas Pratomo

The increasing awareness of people about several benefits using cloud computing technology caused a lot of organizations, companies, and agencies are switching from utilizing physical infrastructure to cloud infrastructure, especially IaaS. Considering the strong market enthusiastic about cloud computing, cloud companies were racing competitions offer the best products with various advantages. In the process of utilizing cloud computing technology there are circumstances in which the company wants to move its infrastructure to other cloud providers caused by various aspects in order to meet better expectations of to the new provider. However, there are many obstacles in practice in the process of transfer system between two different environment or can be called migration. One of them is a vendor lock-in that caused system cannot be function properly especially application functionality after migration. This paper introduces improvement method of testing interoperability between systems that were migrated between different cloud providers which use different hypervisor technology. We also conduct interoperability application testing between several cloud providers.

The importance of cloud computing standards is the same as the World Wide Web standardization. There are plenty of prevalent standards around cloud computing that make different aspects of cloud computing possible. Standardization is a key answer and solution to the main question in this book (i.e., whether cloud computing will survive and remain on IT trends track or not). Standardization will bring interoperability, integration, and portability to the cloud computing landscape. With these three features, the main elements of IT (i.e., computation and data) can move from one cloud provider to another. Therefore, it eliminates vendor lock-in that is one of the barriers in cloud adoption. In addition, cloud interoperability will minimize cloud fragmentation. We need interoperability and portability to achieve cloud federation and to build hybrid cloud. In addition, there is still no de facto standard for moving workloads or data among different clouds. Cloud standardization needs to be addressed at various layers of a cloud infrastructure such as: virtual machine format, data, interface, context, and identity layers. This chapter reviews the emerging standards from the perspective of various organizations and standard bodies.


Fog computing is one of the most latest technology used by the cloud providers to safe guard the user data and service provider’s data servers. Fog computing acts as mediator between hardware and remote servers or cloud servers. Cloud computing still has the lot of vulnerabilities. Privacy to the users data is main issue in the present cloud computing. Whenever users uploads data into cloud server then user will lose their right on their own data because users don’t know about, what cloud providers do with users data, they can sell the users data for their own profit without knowing to users. Fog computing provides lot of services like operation of computer, storage and networking services between users and cloud computing data centers. With the networking services users can lose their data privacy or leakage without knowing to user. Because public clouds are not secure enough and users doesn’t know where data is storing in cloud servers. Breaking the data into small parts can lead to loss of data and which it can create way to attackers to steal data. Even data might be changed instated of one data with another. Intelligence can be applied in the fog computing technology to use of computing resources and security reasons. Applying multiple layers of security features by using kubernets can improve better service to user and user’s data can be safe from the attackers. Whenever user lost connection with the server kubernets establishes reconnection between user and server. RSA256 encryption is applied to users data with this we can provide better security between cloud server and users.


Author(s):  
Marcio R. M. Assis ◽  
Luiz Fernando Bittencourt ◽  
Rafael Tolosana-Calasanz ◽  
Craig A. Lee

With the maturation of the Cloud Computing, the eyes of the scientific community and specialized commercial institutions have turned to research related to the use of multiple clouds. The main reason for this interest is the limitations that many cloud providers individually face to meet all the inherent characteristics of this paradigm. Therefore, using multiple cloud organizations opens the opportunity for the providers to consume resources with more attractive prices, increase the resilience as well as to monetize their own idle resources. When considering customers, problems as interruption of services, lack of interoperability that lead to lock-in and loss of quality of services due to locality are presented as limiting to the adoption of Cloud Computing. This chapter presents an introduction to conceptual characterization of Cloud Federation. Moreover, it presents the challenges in implementing federation architectures, requirements for the development of this type of organization and the relevant architecture proposals.


2019 ◽  
Vol 28 (04) ◽  
pp. 1950012
Author(s):  
Nithya Ravi ◽  
Mala Thangarathinam

Cloud computing has invaded our lives so beautifully, that it is time to make cloud more productive. What makes Cloud computing novel is the possibility of an almost immediate resizing of resources on a pay-as-you-go usage model. With companies moving forward with various cloud initiatives, cloud consumers are discouraged from relinquishing their control of the infrastructure to the cloud providers. The rivalry among cloud providers to stay competitive in the market makes it necessary to lock-in its customers, and therefore customers cannot migrate easily to another due to non-interoperable APIs (Application Programming Interface), portability and migration issues. In addition, today’s cloud users are mobile devices and consuming a cloud service onto mobile device poses another set of risks. One way to handle this complexity is to devise an intermediary which can take care of the heterogeneity at the cloud and mobile level, and ensure a multi-cloud deployment of application by taking advantage of the best features from different vendors simultaneously. Thus, this paper is a sincere initiative to understand the problem beneath multi-cloud solutions and their embrace for the mobile world. Hence, the following paper begins with a broad coverage of existing work, gives an outline of a multi-cloud middleware, and discusses existing issues with API heterogeneity which is the prime point of concern in the vendor lock-in issue.


2020 ◽  
Vol 1 (46) ◽  
pp. 427-436
Author(s):  
Cherviakova T ◽  

The article is devoted to the analysis of theoretical and practical aspects of technology of cloud computing, revealing of the main problems of providing information security of various models of cloud services and models of deployment of cloud environments, as well as the choice of methods for providing security of data processing and methods for improving the safety of cloud computing. Object of research - information security technology cloud computing. The purpose of the work is to analyze the theoretical and practical aspects of information security technology of cloud computing, determination of their principles and perspectives. Methods of research - analysis, synthesis, generalization, systematization, graphic. One of the main approaches to the implementation of cloud infrastructure is the virtualization technology - the provision of computing resources abstracted from their real hardware implementation. With the increase in the degree of cloud computing technology openness, the flexibility of its operation and the universality of access, the security of the system decreases and requires more complicated methods of ensuring its security. The cloud computing system can be exposed to several types of security threats, including threats to the integrity, privacy and availability of its resources, data, and virtual infrastructure. The construction of the cloud computing security system requires taking into account the model of its deployment (private, public or hybrid cloud) and the differences in the levels of control and access for user and provider in different cloud service models (IaaS, PaaS, SaaS). The most effective and thus universal way of ensuring data protection in the cloud, as well as its confidentiality and integrity, is to use the data encryption at the file level when transmitting over information networks and when storing inside the cloud. IT-administrators and users can partially regain control over the security of their data, using security­based solutions based on data encryption. Using the appropriate encryption methods prevents unauthorized access to data, regardless of where they are located, in the process of transmitting or storing it in the cloud, and allowing organizations to take advantage of cloud computing without compromising or minimizing risk. KEYWORDS: CLOUD COMPUTING, CLOUD SERVICES, INFORMATION SECURITY.


Author(s):  
S. Karthiga Devi ◽  
B. Arputhamary

Today the volume of healthcare data generated increased rapidly because of the number of patients in each hospital increasing.  These data are most important for decision making and delivering the best care for patients. Healthcare providers are now faced with collecting, managing, storing and securing huge amounts of sensitive protected health information. As a result, an increasing number of healthcare organizations are turning to cloud based services. Cloud computing offers a viable, secure alternative to premise based healthcare solutions. The infrastructure of Cloud is characterized by a high volume storage and a high throughput. The privacy and security are the two most important concerns in cloud-based healthcare services. Healthcare organization should have electronic medical records in order to use the cloud infrastructure. This paper surveys the challenges of cloud in healthcare and benefits of cloud techniques in health care industries.


Author(s):  
Ramandeep Kaur

A lot of research has been done in the field of cloud computing in computing domain.  For its effective performance, variety of algorithms has been proposed. The role of virtualization is significant and its performance is dependent on VM Migration and allocation. More of the energy is absorbed in cloud; therefore, the utilization of numerous algorithms is required for saving energy and efficiency enhancement in the proposed work. In the proposed work, green algorithm has been considered with meta heuristic algorithms, ABC (Artificial Bee colony .Every server has to perform different or same functions. A cloud computing infrastructure can be modelled as Primary Machineas a set of physical Servers/host PM1, PM2, PM3… PMn. The resources of cloud infrastructure can be used by the virtualization technology, which allows one to create several VMs on a physical server or host and therefore, lessens the hardware amount and enhances the resource utilization. The computing resource/node in cloud is used through the virtual machine. To address this problem, data centre resources have to be managed in resource -effective manner for driving Green Cloud computing that has been proposed in this work using Virtual machine concept with ABC and Neural Network optimization algorithm. The simulations have been carried out in CLOUDSIM environment and the parameters like SLA violations, Energy consumption and VM migrations along with their comparison with existing techniques will be performed.


Author(s):  
Priyanshu Srivastava ◽  
Rizwan Khan

Today is the era of Cloud Computing Technology in IT Industries. Cloud computing which is based on Internet has the most powerful architecture of computation. It reckons in of a compilation of integrated and networked hardware, software and internet infrastructure. It has various avails atop grid computing and other computing. In this paper, I have given a brief of evaluation of cloud computing by reviewing more than 30 articles on cloud computing. The outcome of this review signalizes the face of the IT industries before and after the cloud computing.


2019 ◽  
pp. 1-4
Author(s):  
C. T. Kantharaja

Cloud computing technology has signicant role in academic libraries. Most of the library services are available on cloud platform and library software vendors developed their Library Management Software on cloud platform. It is the right time for library professionals to upgrade their technical skills to provide good services to the library stakeholders. This study shows the library services and facilities available on cloud. It is the right time to migrate to cloud


Sign in / Sign up

Export Citation Format

Share Document