scholarly journals A Relevant SNC Application for Data Computation using Python Programming

Author(s):  
K Pooja ◽  
◽  
Dr Shailaja S ◽  

Multiple applications of cloud servicing can be seen in the field of logical programming as well as IT industries. Complex computations over local machines may demand for plenty of system resources thereby delaying the data processing operations. In order to achieve speed in processing one must opt for cloud computing techniques. Extensive maneuver of cloud services is desirable for scientific computation of user data and application. This will require a platform designed in a way to meet the specific requirements of individual users, providing an ease for moving their data and applications over different devices. Symbolic-Numeric Computation using cloud service platform is presented in the paper. In this approach user tasks are presented in the form of symbolic expressions using languages like Java, C/C++, APIs etc. Proposed work employs Python programming for carrying out compilation process.

Author(s):  
Fang Zhiyuan ◽  
Wei Li

Health Information eXchange (HIX) is a part of Happiness Cloud Service Platform of Happiness Guangdong in Guangdong Province of China based on innovation of cloud-based business model. This article illustrates the hospital health care business services system based on cloud computing. major business functions of HIX includes integrated mobile medical information services, and mobile health information services. Key cloud service platform capabilities include appointment of HIX registration, doctor-patient interaction and Health Manager System, medical statistical analysis, and the other integrated support module including service platform and platform management provided by two major cloud computing technologies of SaaS and PaaS. Medical cloud services of HIX is an innovative business model for cloud computing, that is, the medical and health services provided to the public going though by cloud computing all over Guangdong Province in China.


2015 ◽  
Vol 2015 ◽  
pp. 1-15 ◽  
Author(s):  
Lifa Wu ◽  
Shengli Zhou ◽  
Zhenji Zhou ◽  
Zheng Hong ◽  
Kangyu Huang

In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


2021 ◽  
Vol 27 (2) ◽  
Author(s):  
H. Hamza ◽  
A.F.D Kana ◽  
M.Y. Tanko ◽  
S. Aliyu

Cloud computing is a model that aims to deliver a reliable, customizable and scalable computing environment for end-users. Cloud computing is one of the most widely used technologies embraced by sectors and academia, offering a versatile and effective way to store and retrieve documents. The performance and efficiency of cloud computing services always depend upon the performance of the execution of user tasks submitted to the cloud system. Scheduling of user tasks plays a significant role in improving the performance of cloud services. Accordingly, many dependent task scheduling algorithms have been proposed to improve the performance of cloud services and resource utilization; however, most of the techniques for determining which task should be scheduled next are inefficient. This research provided an enhanced algorithm for scheduling dependent tasks in cloud that aims at improving the overall performance of the system. The Dependent tasks were represented as a directed acyclic graph (DAG) and the number of dependent tasks and their total running time were used as a heuristic for determining which path should be explored first. Best first search approach based on the defined heuristic was used to traverse the graph to determine which task should be scheduled next. The results of the simulation using WorkflowSim toolkit showed an average improvement of 18% and 19% on waiting time and turnaround time were achieved respectively.


Author(s):  
Ajai K. Daniel

The cloud-based computing paradigm helps organizations grow exponentially through means of employing an efficient resource management under the budgetary constraints. As an emerging field, cloud computing has a concept of amalgamation of database techniques, programming, network, and internet. The revolutionary advantages over conventional data computing, storage, and retrieval infrastructures result in an increase in the number of organizational services. Cloud services are feasible in all aspects such as cost, operation, infrastructure (software and hardware) and processing. The efficient resource management with cloud computing has great importance of higher scalability, significant energy saving, and cost reduction. Trustworthiness of the provider significantly influences the possible cloud user in his selection of cloud services. This chapter proposes a cloud service selection model (CSSM) for analyzing any cloud service in detail with multidimensional perspectives.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2018 ◽  
Vol 10 (4) ◽  
pp. 17-32
Author(s):  
Mustafa I.M. Eid ◽  
Ibrahim M. Al-Jabri ◽  
M. Sadiq Sohail

Research interests on cloud computing adoption and its effectiveness in terms of cost and time has been increasing. However, one of the challenging decisions facing management in adopting cloud services is taking on the right combinations of cloud service delivery and deployment models. A comprehensive review of literature revealed a lack of research addressing this selection decision problem. To fill this research gap, this article proposes an expert system approach for managers to decide on the right combination of service delivery and deployment model selection. The article first proposes a rule-based expert system prototype, which provides advice based on a set of factors that represent the organizational conditions and requirements pertaining to cloud computing adoption. Next, the authors evaluate the system prototype. Lastly, the article concludes with a discussion of the results, its practical implications, limitations, and further research directions.


2014 ◽  
Vol 989-994 ◽  
pp. 5498-5503
Author(s):  
Chun Xiao Wang ◽  
Ying Guo ◽  
Xiu Gang Guo

Based on the research in cross-regional resource scheduling and massive data storage, the article built public service platform including IaaS, PaaS and SaaS. It provided all kinds of management software and business software for middle size enterprise users, and provided the development, testing, deployment platform for software vendors, and provided unified resource management, monitoring and maintenance for platform operators which finally become cloud service platform to support enterprise management and software development lifecycle. This helps to form a self-loop and self-development cloud computing ecosystem, to form the linkage of cloud services production, cloud services consumption and cloud service management, and to provide comprehensive information support for the growth and development of middle size enterprise.


2012 ◽  
Vol 241-244 ◽  
pp. 3177-3183
Author(s):  
Jie Zhang ◽  
Li Wen He ◽  
Fei Yi Huang ◽  
Bin Liu

This paper proposed a service discovery architecture (SDA) that can be applied in cloud computing environments. This architecture supports common service discovery capabilities to achieve cloud service discovery function in cloud computing environments. The main idea is that, cloud services can be divided into different cloud service domains (CSD) according to the characteristics of the functions of cloud services, each CSD has a sub-service directory, and there is also a root service directory above all sub-service directories. Setting of two-level service directories can achieve the most suitable massive cloud services quickly. Finally, through mathematical modeling, theoretical analyses, and numerical simulations, the performance analyses of the architecture are studied. The results show the validity and advantages of the SDA.


Sign in / Sign up

Export Citation Format

Share Document