scholarly journals Parallel Processing Strategies for Geospatial Data in a Cloud Computing Infrastructure

2022 ◽  
Vol 14 (2) ◽  
pp. 398
Author(s):  
Pieter Kempeneers ◽  
Tomas Kliment ◽  
Luca Marletta ◽  
Pierre Soille

This paper is on the optimization of computing resources to process geospatial image data in a cloud computing infrastructure. Parallelization was tested by combining two different strategies: image tiling and multi-threading. The objective here was to get insight on the optimal use of available processing resources in order to minimize the processing time. Maximum speedup was obtained when combining tiling and multi-threading techniques. Both techniques are complementary, but a trade-off also exists. Speedup is improved with tiling, as parts of the image can run in parallel. But reading part of the image introduces an overhead and increases the relative part of the program that can only run in serial. This limits speedup that can be achieved via multi-threading. The optimal strategy of tiling and multi-threading that maximizes speedup depends on the scale of the application (global or local processing area), the implementation of the algorithm (processing libraries), and on the available computing resources (amount of memory and cores). A medium-sized virtual server that has been obtained from a cloud service provider has rather limited computing resources. Tiling will not only improve speedup but can be necessary to reduce the memory footprint. However, a tiling scheme with many small tiles increases overhead and can introduce extra latency due to queued tiles that are waiting to be processed. In a high-throughput computing cluster with hundreds of physical processing cores, more tiles can be processed in parallel, and the optimal strategy will be different. A quantitative assessment of the speedup was performed in this study, based on a number of experiments for different computing environments. The potential and limitations of parallel processing by tiling and multi-threading were hereby assessed. Experiments were based on an implementation that relies on an application programming interface (API) abstracting any platform-specific details, such as those related to data access.

Author(s):  
Marko Vulić ◽  
Pavle Petrović ◽  
Ivanka Kovačević ◽  
Vanjica Ratković Živanović

A new vision of higher education systems, in which the student is the central subject of the teaching process, opens up new learning opportunities that include customization of teaching methods to the students’ needs, and new modes of communication both between teachers and students and among students themselves. The main subject of this chapter is the implementation and improvement of the Student Relationship Management (SRM) concept as a cloud service in an e-education system by using social media. The experimental part of the chapter presents the design and implementation of an e-education model based on cloud computing. The proposed model is implemented at the Faculty of Organizational Sciences, University of Belgrade, by using the existing cloud computing infrastructure of the Laboratory for E-Business.


2020 ◽  
Author(s):  
Dinesh Arpitha R ◽  
Sai Shobha R

Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses a new security risk towards correctness of data stored at cloud. The data storage in the cloud has been a promising issue in these days. This is due to the fact that the users are storing their valuable data and information in the cloud. The users should trust the cloud service providers to provide security for their data. Cloud storage services avoid the cost storage services avoids the cost expensive on software, personnel maintains and provides better performance less storage cost and scalability, cloud services through internet which increase their exposure to storage security vulnerabilities however security is one of the major drawbacks that preventing large organizations to enter into cloud computing environment. This work surveyed on several storage techniques and this advantage and its drawbacks.


Cloud Computing is a trending technology. The main benefit is user will pay only for the resources which have been utilized in the cloud services. Data which are stored in cloud can be accessed by the people from anywhere in the world using internet connection. Because of difficulties in data access and lack of security, in the current database system people are moving to Cloud Service Provider (CSP). Network backup and recovery method are used in CSP so there is no data loss in case of hardware failure. In this paper, we planned an efficient model in cloud computing for data accessing which will reduce the search time of providing the public key of the data owner. Not only data storage and security, data access also plays an important role to consume less time. So, in this proposed system we are going to increase the time efficiency for the data accessing.


2019 ◽  
Vol 28 (04) ◽  
pp. 1950012
Author(s):  
Nithya Ravi ◽  
Mala Thangarathinam

Cloud computing has invaded our lives so beautifully, that it is time to make cloud more productive. What makes Cloud computing novel is the possibility of an almost immediate resizing of resources on a pay-as-you-go usage model. With companies moving forward with various cloud initiatives, cloud consumers are discouraged from relinquishing their control of the infrastructure to the cloud providers. The rivalry among cloud providers to stay competitive in the market makes it necessary to lock-in its customers, and therefore customers cannot migrate easily to another due to non-interoperable APIs (Application Programming Interface), portability and migration issues. In addition, today’s cloud users are mobile devices and consuming a cloud service onto mobile device poses another set of risks. One way to handle this complexity is to devise an intermediary which can take care of the heterogeneity at the cloud and mobile level, and ensure a multi-cloud deployment of application by taking advantage of the best features from different vendors simultaneously. Thus, this paper is a sincere initiative to understand the problem beneath multi-cloud solutions and their embrace for the mobile world. Hence, the following paper begins with a broad coverage of existing work, gives an outline of a multi-cloud middleware, and discusses existing issues with API heterogeneity which is the prime point of concern in the vendor lock-in issue.


Author(s):  
L. Arockiam ◽  
S. Monikandan ◽  
G. Parthasarathy

Cloud computing provides huge computing services to the business for improving the organizational growth. Basic requirement needed for this technology is Internet but provides higher capability when compared to the Internet. Cloud computing is a combination of computation, software, data access and also provides storage services. In Cloud, storage of data and the location of stored data are not known to the user. Cloud computing adopts the concept of virtualization, service oriented architecture, autonomic, and utility computing. The cloud has more advantages and easy to implement with any business logics. Cloud delivers services from different data sources and servers located on different geographical location but the user gets single point of view from the cloud service. This paper presents the survey on cloud computing, it includes cloud architecture, different models of deployment, and characteristics of Clouds. Cloud computing saves time, money and effort. The nature of cloud computing and their dependence on broad band internet might pose some serious issues for cloud provider and cloud users. This paper also describes some of the issues and challenges related to the cloud computing. Finally, the paper presents an observation study and suggests where to apply the cloud and where not to.


2019 ◽  
Vol 3 (02) ◽  
pp. 42-47
Author(s):  
Noor Hazwani Mohamad Puad ◽  
Asma Md Ali ◽  
Mohd Adam Suhaimi ◽  
Husnayati Hussin

The objective of this study is to discover the perspectives of cloud providers towards cloud computing adoption in Malaysia in terms of the challenges faced by cloud providers and reasons for the adoption. Data were collected through semi structured interviews with three cloud providers. The findings indicated security concern, difficulties in learning cloud computing infrastructure, changes in IT roles, high cost of bandwidth and life span of IT equipment as challenges faced by cloud providers in providing cloud service in Malaysia. This study also discovered cloud scalability, end-to-end management, high level security, and customizable as the reasons on cloud computing adoption. The findings of this study help people to understand more about the current situation of cloud computing adoption in Malaysia. Keywords—cloud adoption, cloud computing, cloud providers, Malaysia.


Biometrics ◽  
2017 ◽  
pp. 205-232
Author(s):  
Tarunpreet Bhatia ◽  
A. K. Verma

Cloud computing is a way of providing unlimited storage capacity and enhancing parallel processing capabilities without investing in new infrastructure or licensing new software. Designing a secure data access for cloud computing platform is a big challenge as more and more information is placed over cloud by individuals and companies. It is not enough to authenticate a device, or even a user to a device. Cloud computing requires a level of trust that can only be possible through biometric identity assurance, as biometrics offer the unique ability to bind an identity to an actual user, not just to a logical or physical token or credential. This chapter evaluates cloud security by identifying unique security requirements and attempts to present viable solutions based on biometrics to eliminate possible threats. It provides a comprehensive and structured overview of biometric authentication for enhancing cloud security.


Author(s):  
Tarunpreet Bhatia ◽  
A. K. Verma

Cloud computing is a way of providing unlimited storage capacity and enhancing parallel processing capabilities without investing in new infrastructure or licensing new software. Designing a secure data access for cloud computing platform is a big challenge as more and more information is placed over cloud by individuals and companies. It is not enough to authenticate a device, or even a user to a device. Cloud computing requires a level of trust that can only be possible through biometric identity assurance, as biometrics offer the unique ability to bind an identity to an actual user, not just to a logical or physical token or credential. This chapter evaluates cloud security by identifying unique security requirements and attempts to present viable solutions based on biometrics to eliminate possible threats. It provides a comprehensive and structured overview of biometric authentication for enhancing cloud security.


2014 ◽  
Vol 27 (3) ◽  
pp. 339-357 ◽  
Author(s):  
Bozidar Radenkovic ◽  
Marijana Despotovic-Zrakic ◽  
Zorica Bogdanovic ◽  
Vladimir Vujin ◽  
Dusan Barac

This paper introduces an innovative model for harnessing cloud computing infrastructure within an e-learning ecosystem. The main goal was to design a scalable, reliable and secure IT environment that provides a plethora of e-learning services and seamless integration of the heterogeneous e-learning components through IaaS, PaaS and SaaS cloud service models. The e-learning services are tailored to foster courses for IT engineers in the areas of mobile technologies, social computing, Internet of Things and big data. The model was implemented and evaluated in the e-learning ecosystem of the E-business Lab, University of Belgrade.


Sign in / Sign up

Export Citation Format

Share Document