scholarly journals Comparing K-means, K-medoids and ISODATA Clustering Algorithms for a Cloud Service Search Engine

2019 ◽  
Vol 8 (3) ◽  
pp. 4978-4982

The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. Cloud computing theoretically provides all computing needs as services. Accordingly, a large number of cloud service providers exist and the number is constantly increasing. This presents a significant problem for a user to find a relevant service provider, and calls for developing a specialized search engine to help users select suitable services matching their needs. Towards this goal, we developed a search engine that crawls the web sites of various service providers, extracts service attributes from their JavaScript Object Notation (JSON) files and normalizes the attributes in a service table. Those attributes are clustered using one of three different algorithms (K-means, K-medoids, and ISODATA). The requirements of a given user are then matched against the centroids of the various clusters to help obtain the closest match. In this paper, we compared the three algorithms with respect to time and accuracy. The ISODATA algorithm exhibited the best performance.

2020 ◽  
pp. 519-546
Author(s):  
Mohammad Shalan

Cloud Computing (CC) services have made substantive advances in the past few years. It is rapidly changing the landscape of technology, and energizing the long-held promise of utility computing. Successful jump into CC is a considerable task, since the surroundings are not yet mature and the accompanied risk and governance frameworks are still evolving. This effort aims to portray an identity for CC services by employing risk and governance directions among other elements and techniques. Cloud Service Footprint (CSF) is considering practical aspects surrounding the CC paradigm and prescribing the associated directions. CSF will help Cloud Service Providers (CSPs) to characterize their service and benchmark themselves. The Client Enterprises (CEs) can utilize CSF dimensions to find a better way to navigate through CC service arena and to understand its parameters. Along with cost and functional capabilities, the Cloud Service Footprint (CSF) can provide enough information for business executives to evaluate CC services and make informed decisions.


Author(s):  
Mohammad Shalan

Cloud Computing (CC) services have made substantive advances in the past few years. It is rapidly changing the landscape of technology, and energizing the long-held promise of utility computing. Successful jump into CC is a considerable task, since the surroundings are not yet mature and the accompanied risk and governance frameworks are still evolving. This effort aims to portray an identity for CC services by employing risk and governance directions among other elements and techniques. Cloud Service Footprint (CSF) is considering practical aspects surrounding the CC paradigm and prescribing the associated directions. CSF will help Cloud Service Providers (CSPs) to characterize their service and benchmark themselves. The Client Enterprises (CEs) can utilize CSF dimensions to find a better way to navigate through CC service arena and to understand its parameters. Along with cost and functional capabilities, the Cloud Service Footprint (CSF) can provide enough information for business executives to evaluate CC services and make informed decisions.


2013 ◽  
Vol 4 (2) ◽  
pp. 38-53
Author(s):  
Ruay-Shiung Chang ◽  
Chih-Shan Liao ◽  
Chuan-Yu Liu

The development of cloud computing has advanced rapidly over the past few years. Benefiting from the dynamic characteristics of cloud computing, enterprises can purchase cloud services based on different aspects in order to save operating expenses. Many companies have seen the opportunities and changes in either cloud service providers or cloud service consumers. For the latter, with so many cloud providers to choose from, there is a need for an evaluation of standards to help find the most suitable service provider. In this paper, the essential factors of enterprise clouds are discussed. An evaluation model is defined, and a web-based enterprise cloud selection application is implemented.


Author(s):  
Akash Chowdhury ◽  
Swastik Mukherjee ◽  
Sourav Banerjee

The various services that are offered by IoT and Cloud Service Providers (CSPs) to the customers today feature a pay-per-use service-charging policy. Customers can choose and avail these services when they want, how they want, and from where they want on demand. Demand for these services has increased drastically over the years among individuals and enterprises worldwide, and thus, it is very important to keep up good Quality of Service (QoS). This chapter highlights the history of internet, the gradual evolution of cloud computing, the reasons behind it, evolution and concepts of the Internet of Things (IoT), CloudIoT and its necessities, and various applications and service fields of CloudIoT. This chapter also precisely highlights various concepts regarding maintenance of good QoS, controversies in QoS maintenance, different parameters that the QoS depends on, various problems faced in maintaining those parameters, and the possible solutions for overcoming those problems. Possible directions towards future works are also highlighted in this chapter.


Author(s):  
Akash Chowdhury ◽  
Swastik Mukherjee ◽  
Sourav Banerjee

The various services that are offered by IoT and Cloud Service Providers (CSPs) to the customers today feature a pay-per-use service-charging policy. Customers can choose and avail these services when they want, how they want, and from where they want on demand. Demand for these services has increased drastically over the years among individuals and enterprises worldwide, and thus, it is very important to keep up good Quality of Service (QoS). This chapter highlights the history of internet, the gradual evolution of cloud computing, the reasons behind it, evolution and concepts of the Internet of Things (IoT), CloudIoT and its necessities, and various applications and service fields of CloudIoT. This chapter also precisely highlights various concepts regarding maintenance of good QoS, controversies in QoS maintenance, different parameters that the QoS depends on, various problems faced in maintaining those parameters, and the possible solutions for overcoming those problems. Possible directions towards future works are also highlighted in this chapter.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


Author(s):  
Theo Lynn

Abstract Cloud computing is the dominant paradigm in modern computing, used by billions of Internet users worldwide. It is a market dominated by a small number of hyperscale cloud service providers. The overwhelming majority of cloud customers agree to standard form click-wrap contracts, with no opportunity to negotiate specific terms and conditions. Few cloud customers read the contracts that they agree to. It is clear that contracts in cloud computing are primarily an instrument of control benefiting one side, the cloud service provider. This chapter provides an introduction to the relationship between psychological trust, contracts and contract law. It also offers an overview of the key contract law issues that arise in cloud computing and introduces some emerging paradigms in cloud computing and contracts.


2021 ◽  
Author(s):  
Prudhvi Parne

With recent advances in technology, internet has drastically changed the computing world from the concept of parallel computing to distributed computing to grid computing and now to cloud computing. The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. Unfortunately, many banks are still hesitant to adopt cloud technology. New technologies such as cloud and AI will have the biggest impacts on the banking industry. For banks and credit unions wanting to achieve greater business agility, cloud technology enables organizations to respond instantly to changing market conditions, leveraging data and applied analytics to achieve customer experience and operational productivity benefits. As a result, cloud computing comes in to provide a solution to such challenges making banking a reliable and trustworthy service. This paper aims at cloud computing strategy, impact in banking and financial institutions and discusses the significant reliance of cloud computing.


2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Yao Lu ◽  
John Panneerselvam ◽  
Lu Liu ◽  
Yan Wu

Given the increasing deployments of Cloud datacentres and the excessive usage of server resources, their associated energy and environmental implications are also increasing at an alarming rate. Cloud service providers are under immense pressure to significantly reduce both such implications for promoting green computing. Maintaining the desired level of Quality of Service (QoS) without violating the Service Level Agreement (SLA), whilst attempting to reduce the usage of the datacentre resources is an obvious challenge for the Cloud service providers. Scaling the level of active server resources in accordance with the predicted incoming workloads is one possible way of reducing the undesirable energy consumption of the active resources without affecting the performance quality. To this end, this paper analyzes the dynamic characteristics of the Cloud workloads and defines a hierarchy for the latency sensitivity levels of the Cloud workloads. Further, a novel workload prediction model for energy efficient Cloud Computing is proposed, named RVLBPNN (Rand Variable Learning Rate Backpropagation Neural Network) based on BPNN (Backpropagation Neural Network) algorithm. Experiments evaluating the prediction accuracy of the proposed prediction model demonstrate that RVLBPNN achieves an improved prediction accuracy compared to the HMM and Naïve Bayes Classifier models by a considerable margin.


Sign in / Sign up

Export Citation Format

Share Document