scholarly journals Detailed Study of Cloud Storage Services on Aws Cloud (Amazon Web Services)

Author(s):  
Er. Krishan Kumar ◽  
Shipra

This research revolves around understanding the Cloud Storage Services offered by world's most famous Cloud Provider Amazon Web Services (AWS). We will be covering major Cloud Storage Services like EBS, S3 and EFS. But first let’s understand more about AWS. We should use these end-of-life services as a per-project and keep in mind the key benefits of these end-to-end services. Amazon EBS brings the highest end-to-end prices available with block for level of Amazon Elastic Compute Cloud (EC2) instances. Saves data to file system stored after EC2 status closure. Amazon EFS provides portable file storage, also designed for EC2. It can be used as a standard data source for any application or load that works in most cases. Using the EFS file system, you can configure file system installation settings. The main difference between EBS and EFS is that EBS is only accessible from a single EC2 state in your specific AWS region, while EFS allows you to mount a file system in multiple regions and scenarios.

2020 ◽  
Vol 17 (8) ◽  
pp. 3581-3585
Author(s):  
M. S. Roobini ◽  
Selvasurya Sampathkumar ◽  
Shaik Khadar Basha ◽  
Anitha Ponraj

In the last decade cloud computing transformed the way in which we build applications. The boom in cloud computing helped to develop new software design and architecture. Helping the developers to focus more on the business logic than the infrastructure. FaaS (function as a service) compute model it gave developers to concentrate only on the application code and rest of the factors will be taken care by the cloud provider. Here we present a serverless architecture of a web application built using AWS services and provide detail analysis of lambda function and micro service software design implemented using these AWS services.


2016 ◽  
Vol 5 (11) ◽  
pp. 401-406 ◽  
Author(s):  
Ryoma Kaneko ◽  
Praphan Pavarangkoon ◽  
Eiji Oki

Database migration is one of the important thing to make the data can be stored optimally and minimize risk of data lost. Data Synchronization and Transactional Replication can be used to do it. Transactional Replication is working on services area to migrate database stored in cloud to another cloud storage. Data Synchronization is used to synchronize migrated database with origin database. Data lost concerns remain as the big consideration to widespread the adoption. Many ways can be done to minimize the risks, one of them is by migrate the database that is already stored in cloud to another database in cloud. This research will conduct database migration using data synchronization and transaction replication. By using Azure and Amazon Web Services as Database Migration Services, these techniques allow SQL Database data to be easily replicated, and allows multiple SQL Databases to isolate mission-critical workloads from analytic queries that run relatively longer. The evaluation is by comparing these two migration services based on the synchronizing time of full loaded database migration. Migration result shows that database migration using transactional replication and data synchronization is influenced by the number of rows as well as size of the table, server location, also uploading and downloading speed in each database migration service.


Author(s):  
Philipp L. Rautenberg ◽  
Ajayrama Kumaraswamy ◽  
Alvaro Tejero-Cantero ◽  
Christoph Doblander ◽  
Mohammad R. Norouzian ◽  
...  

2020 ◽  
Author(s):  
Luan Teylo ◽  
Rafaela Brum ◽  
Luciana Arantes ◽  
Pierre Sens ◽  
Lúcia Drummond

Os provedores de nuvem oferecem vários serviços para processamento e armazenamento de dados. Alguns desses recursos são propensos a falhas ou revogações. Neste caso, a adoção de técnicas de tolerância a falhas é essencial para minimizar o impacto e o custo que estas falhas podem exercer na execução das aplicações e no orçamento dos usuários. Uma das soluções amplamente adotadas são as técnicas de checkpoint and recovery (CR), que gravam o estado atual da aplicação para que, caso ocorra falhas, esta seja reiniciada a partir do último estado gravado. Assim, essas abordagens exigem um local de armazenamento seguro e disponível ao longo de toda a execução. Felizmente, os serviços de nuvens também podem ser utilizados para este fim, uma vez que diferentes opções de armazenamento também são oferecidos. Neste trabalho, queremos avaliar três desses serviços: o Amazon Simple Storage Service (S3), o Amazon Elastic Block Store (EBS) e o Amazon Elastic File System (EFS). O objetivo é caracterizar e avaliar o desempenho desses serviços em relação a gravação e recuperação de checkpoints no contexto de falhas induzidas pela revogação de máquinas virtuais.


Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2433
Author(s):  
Christopher Kelly ◽  
Nikolaos Pitropakis ◽  
Alexios Mylonas ◽  
Sean McKeown ◽  
William J. Buchanan

In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The financial and operational advantages of moving IT infrastructure to specialised cloud providers are clearly compelling. However, with such volumes of private and personal data being stored in cloud computing infrastructures, security concerns have risen. Motivated to monitor and analyze adversarial activities, we deploy multiple honeypots on the popular cloud providers, namely Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure, and operate them in multiple regions. Logs were collected over a period of three weeks in May 2020 and then comparatively analysed, evaluated and visualised. Our work revealed heterogeneous attackers’ activity on each cloud provider, both when one considers the volume and origin of attacks, as well as the targeted services and vulnerabilities. Our results highlight the attempt of threat actors to abuse popular services, which were widely used during the COVID-19 pandemic for remote working, such as remote desktop sharing. Furthermore, the attacks seem to exit not only from countries that are commonly found to be the source of attacks, such as China, Russia and the United States, but also from uncommon ones such as Vietnam, India and Venezuela. Our results provide insights on the adversarial activity during our experiments, which can be used to inform the Situational Awareness operations of an organisation.


2016 ◽  
Vol 43 (8) ◽  
pp. 841-847
Author(s):  
Kyungjun Lee ◽  
Jiwon Kim ◽  
Sungtae Ryu ◽  
Hwansoo Han

Sign in / Sign up

Export Citation Format

Share Document