scholarly journals Study of Query Optimization in Cloud

Cloud computing in very simple terms, is basically where a company uses someone else’s computing services (usually over the internet) instead of having to run that software on their own computers. Today, cloud computing plays an important role in service-oriented technologies. The main purpose of cloud computing is, it allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access and it allow users to easily and efficiently calculate and save resources. The recent approach is to process data expression and search. To improve cloud performance, it is necessary to optimize the processing time. Our research provides a comprehensive overview of the different models and methods used to optimize queries to reduce execution time and improve resource utilization. We conducted various query optimization research activities for the classic SQL and Map Reduce platforms.

2021 ◽  
Author(s):  
Tianrui Pang ◽  
Jiping Jiang ◽  
Fengyuan Zhang ◽  
Harsh Yadav ◽  
Yunlei Men ◽  
...  

<p>In the era of smart city, developing environmental decision support system (EDSS) integrated with monitoring, modelling, planning and control for smart management of urban river water quality has been widely accepted and implemented around the world. Construction and coupling localized water quality models, such as popular WASP and EFDC by USEPA, to meet different management requirements are fundamental for the surface water EDSS development. However, few reported the technique coupling the advanced version of WASP program with EDSS platform. </p><p>Traditional pathway of EDSS integrations or model coupling, e.g. database-oriented interaction, are non-modular, with low efficiency of share and reuse, and difficult for system updating. With the development of cloud computing and web services, the service-oriented design are the future trends of model coupling.</p><p>In this paper, a generic interface/module interacting with WASP V7.5 program is developed and the technical route of tightly coupling is proposed. The web service encapsulation of localized WASP models and advanced cloud computing services are implemented with the help of OpenGMS framework and SaaS (software as services) pattern. To meet the basic requirements of urban water quality management, the water assimilative capacity allocation and pollution load reduction planning are work out by the cloud computing services, which achieves operational running of EDSS.</p><p>The study area is located in Maozhou River Basin, an urban river in Shenzhen, China. According to the national water environment code and regulations, COD (chemical oxygen demand) and NH3-N (ammonia nitrogen) are set as the ending point for supervision and the corresponding WASP model of Maozhou River is constructed and calibrated by historical field data. The computing components and web-services are integrated into the comprehensive water quality management platform of Maozhou River through the model configuration and controlling data parameterization. One version of the Maozhou River EDSS has been deployed and is online on the Shenzhen ecological and environmental intelligent management and control center since January, 2021.</p><p>Along with WASP, service-oriented encapsulating of EFDC and SWMM based computing components for particular management purposes are also implemented based on the same technique route since both of them are developed by USEPA with similar inputs and outputs. The technology of model coupling and platform integration mentioned in this paper provides a valuable paradigm for linking other environment models into specific management business. Under the proposed technical pathway, the interaction of model interface between computation engine and system business layer can be easily updated along with the changes of management requirements. It provides the merits of rapidly development, easily deployment and maintenance.</p>


2021 ◽  
Vol 8 ◽  
Author(s):  
Aleksandr Kapitonov ◽  
Sergey Lonshakov ◽  
Vitaly Bulatov ◽  
Babak Kia Montazam ◽  
James White

This article is devoted to the historical overview of the Robot-as-a-Service concept. Several major scientific publications on the development of Robot-as-a-Service systems based on a service-oriented paradigm are considered. Much attention is paid to the analysis of a centralized approach in the development using cloud computing services and the search for the limitations of this approach. As a result, general conclusions on the reviewed publications are given, as well as the authors' own vision of Robot-as-a-Service systems based on the concept of robot economics.


2019 ◽  
Vol 8 (2) ◽  
pp. 66-92 ◽  
Author(s):  
Akhilesh Mahesh ◽  
Niranjali Suresh ◽  
Manish Gupta ◽  
Raj Sharman

Cloud computing has been instrumental in transforming the way we store, access and process data. With mobility being the primary objective of the current market, cloud computing offers exactly that. Cloud offers convenient access to a shared pool of computing resources that can be configured and deployed with minimal effort which is used to deliver computing services over the internet. Exercising these advantages come with a plethora of security risks that need to be addressed. The security issues in cloud are complex due to the nature of implementation and regulations that govern them. In this article, we examine existing research on cloud risk and the various frameworks to manage risk. The objective is to map the risk with the audit control and technology that will help in mitigating the risk. We analysed the various cloud security solutions and came up with a list that best help in the effective management of the cloud risk and security issues.


Author(s):  
Tejal R. Patil

Cloud computing is a technology that allows users to access shared computing resources over the internet on demand, and it is an internet-based model for handling, storing, and processing data. It develops and deploys flexible enterprisewide operations on the cloud platform. In cloud we store, manage and process data on remote server. Many industries, such as banking, education the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, etc in cloud computing No experts required for hardware and software maintenance. Even No server space required. The cloud is provide better data security. Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (Platform as a Service) are three types of cloud computing services. This research paper analyses the cloud computing Architecture, different Deployment and service model and research technologies.


2020 ◽  
pp. 1518-1548
Author(s):  
Akhilesh Mahesh ◽  
Niranjali Suresh ◽  
Manish Gupta ◽  
Raj Sharman

Cloud computing has been instrumental in transforming the way we store, access and process data. With mobility being the primary objective of the current market, cloud computing offers exactly that. Cloud offers convenient access to a shared pool of computing resources that can be configured and deployed with minimal effort which is used to deliver computing services over the internet. Exercising these advantages come with a plethora of security risks that need to be addressed. The security issues in cloud are complex due to the nature of implementation and regulations that govern them. In this article, we examine existing research on cloud risk and the various frameworks to manage risk. The objective is to map the risk with the audit control and technology that will help in mitigating the risk. We analysed the various cloud security solutions and came up with a list that best help in the effective management of the cloud risk and security issues.


2016 ◽  
Vol 13 (2) ◽  
pp. 725 ◽  
Author(s):  
Agus Sutanto

Cloud Manufacturing is an advanced manufacturing model which provides services by utilizing a shared resource pool such as computers, servers, networking, Internet and application softwares. The term Cloud Manufacturing in the engineering literature is still fairly new. it comes from the term Cloud Computing which is earlier known as Internet services on demand. Here includes Software as a Service (SaaS) along with infrastructure, platform and other delieveries as a service. First introduced by F. Tao in 2011, Cloud Manufacturing combines the latest technologies such as cloud computing, internet of thing, manufacturing object virtualizations and service-oriented computing services. The advanced manufacturing service models related to this terminology will be described as literatur reviews in this paper. At the end of this paper was given a case study of the application of the Cloud Manufacturing for designing a web-based production facilities layout as a cloud software as a service for the users.Keywords: Cloud Manufacturing, layout, production facilities, web-basedAbstrakCloud Manufacturing dapat dikatakan sebagai sebuah model manufaktur yang berorientasikan pada penyediaan jasa dengan memanfaatkan sebuah resource pool yang dipakai secara bersama seperti komputer, server, jejaringan, internet dan perangkat lunak aplikasi. Istilah Cloud Manufacturing berasal dari istilah Cloud Computing yang lebih dahulu terkenal, sebagai suatu layanan perangkat lunak bagi pengguna (Software as a Service/ SaaS) dan perangkat keras yang memungkinkan penyediaan layanan tersebut. Istilah Cloud Manufacturing dalam berbagai literatur keteknikan terbilang masih baru. Pertama dicetuskan oleh F. Tao di tahun 2011, cloud manufacturing mengkombinasikan berbagai teknologi terkini seperti cloud computing, internet of thing, virtualisasi obyek manufaktur dan teknologi komputasi berorientasi pada pelayanan jasa. Perjalanan model manufaktur ini hingga literatur terakhir yang terkait akan dijelaskan pada tulisan ini. Pada bagian akhir dari tulisan ini diberikan sebuah gambaran studi kasus penerapan Cloud Manufacturing pada layanan untuk perencanaan fasilitas produksi berbasis Web, terutama untuk rancangan tataletak produksi, sebagai suatu layanan cloud perangkat lunak bagi pengguna.Kata kunci: Cloud Manufacturing, tataletak, fasilitas produksi, berbasis Web


2017 ◽  
Vol 30 (4) ◽  
pp. 644-665 ◽  
Author(s):  
Marc Walterbusch ◽  
Adrian Fietz ◽  
Frank Teuteberg

Purpose On account of its easy and intuitive usage as well as obvious advantages (e.g. access to work data from anywhere, at any time and through any means) the evolutionary cloud computing paradigm favors the use of shadow IT. Since many employees are not aware of the associated risks and possible legal violations, unauthorized use of cloud computing services could result in substantial risk exposure for any company. The purpose of this paper is to explore and to extend the body of knowledge concerning the topic of cloud computing with regard to shadow IT. Design/methodology/approach The aim of this contribution is to identify the reasons for the use of cloud computing services and the resulting shadow IT from an employee’s perspective, to demonstrate the counteractions a company may take against the unauthorized use of cloud computing services and to elaborate on the inherent opportunities and risks. We follow a mixed-methods approach consisting of a systematic literature review, a cloud computing awareness study, a vignette study and expert interviews. Findings Based on a triangulation of the data sets, the paper at hand proposes a morphological box as well as a two-piece belief-action-outcome model, both from an employee’s and employer’s point of view. Our findings ultimately lead to recommendations for action for employers to counteract the risk exposure. Furthermore, also employees are sensitized by means of insights into the topic of unauthorized usage of cloud computing services in everyday working life. Research limitations/implications The limitations of the triangulation reflect the limitations of each applied research method. These limitations justify why a mixed-methods approach is favored – rather than relying on a single source of data – because data from various sources can be triangulated. Practical implications The paper includes recommendations for action for the handling of the unauthorized usage of cloud computing services within a company, e.g., the set up of a company-wide cloud security strategy and the conduction of an anonymous employee survey to identify the status quo. Originality/value This paper fulfills an identified need to explore the usage of cloud computing services within the context of shadow IT.


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


10.31355/33 ◽  
2018 ◽  
Vol 2 ◽  
pp. 105-120
Author(s):  
Hamed Motaghi ◽  
Saeed Nosratabadi ◽  
Thabit Qasem Atobishi

NOTE: THIS ARTICLE WAS PUBLISHED WITH THE INFORMING SCIENCE INSTITUTE. Aim/Purpose................................................................................................................................................................................................. The main objective of the current study is to develop a business model for service providers of cloud computing which is designed based on circular economy principles and can ensure the sustainable consumption. Background Even though the demand for cloud computing technology is increasing day by day in all over the world, the current the linear economy principles are incapable to ensure society development needs. To consider the benefit of the society and the vendors at the same time, the principles of circular economy can address this issue. Methodology................................................................................................................................................................................................. An extensive literature review on consumption, sustainable consumption, circular economic, business model, and cloud computing were conducted. the proposed model of Osterwalder, Pigneur and Tucci (2005) is admitted designing the circular business model. Contribution................................................................................................................................................................................................. The proposed model of the study is the contribution of this study where provides the guidelines for the cloud computing service providers to achieve both their economic profits and the society’ needs. Findings Finding reveals that if the cloud computing service providers design their business model based on the “access” principle of circular economy, they can meet their economic profits and the society’ needs at a same time. Recommendations for Practitioners.............................................................................................................................................................. It is recommended to the startup and the existing businesses to utilize the proposed model of this study to reach a sustainable development. Recommendation for Researchers................................................................................................................................................................ It proposes a new circular business model and its linkages with community building. Impact on Society............................................................................................................................................................................................ The proposed model of the study provides guidelines to the cloud computing service providers to design a business model which is able not only to meet their economic profit, but also to meet the society’s and customers’ benefits. Future Research............................................................................................................................................................................................... Future researches can build on this research model which proposed in this study to examine the limitations of this model by using empirical researches.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Sign in / Sign up

Export Citation Format

Share Document