Understanding Cloud Computing

Author(s):  
Qusay F. Hassan ◽  
Alaa M. Riad ◽  
Ahmed E. Hassan

Cloud computing is simply considered the realization of the long-held dream of using computing resources in the same way as accessing public utilities. Although the term “cloud computing” has been added to the IT jargon for about four years, many people are still in doubt as to what its actual meaning is. Some people even argue that cloud computing might just be an old technology under a new name. Many questions are raised when it comes to this subject. Why cloud computing? Is it the same thing as web hosting on third party servers? What is the difference between it and other popular terms such as grid computing? Why should organizations consider it? And, is it risk-free? IT, business, and academia folks are continuously asking about cloud computing with the intention of better understanding and realizing it. This chapter tries to demystify cloud computing by means of introducing and simplifying its terms to readers with different IT interests.

2011 ◽  
Vol 3 (3) ◽  
pp. 54-56
Author(s):  
Prof. Milan Kantilal Vachhani ◽  
◽  
Dr. Kishor H Atkotiya

Author(s):  
Priyanshu Srivastava ◽  
Rizwan Khan

Today is the era of Cloud Computing Technology in IT Industries. Cloud computing which is based on Internet has the most powerful architecture of computation. It reckons in of a compilation of integrated and networked hardware, software and internet infrastructure. It has various avails atop grid computing and other computing. In this paper, I have given a brief of evaluation of cloud computing by reviewing more than 30 articles on cloud computing. The outcome of this review signalizes the face of the IT industries before and after the cloud computing.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Author(s):  
Melvin A. Eisenberg

Chapter 13 concerns the building blocks of formulas to measure expectation damages: replacement cost, market price, resale price, diminished value, and lost profits. Replacement-cost damages are based on the difference between the contract price and the actual or imputed cost of a replacement transaction. Resale-price damages are based on the difference between the contract price payable by a breaching buyer and the price the seller received on resale to a third party. Diminished-value damages are based on the difference between the value of the performance that a breaching seller rendered and the value of the performance that she promised to render. Lost-profit damages are based on the difference between the price a breaching buyer agreed to pay and the seller’s variable costs.


2013 ◽  
Vol 380-384 ◽  
pp. 2411-2414
Author(s):  
Yan Xin Ye ◽  
Jian Ming Cui ◽  
Jian Ming Lui

in order to study the development of the Windows Azure platform, the paper through the use of cloud computing, one of the platforms Windows Azure, using its Table Storage storage services,to realize a message board function; and realize a good combination of NET Framework and Windows Azure, and explore the Difference of the Microsoft Windows Azure cloud computing platform development and the difference between ordinary ASP.NET development.


2012 ◽  
Vol 263-266 ◽  
pp. 2020-2023
Author(s):  
Wei Li ◽  
Dong Xin Lu

This paper summarizes some issues occurred in the development of cloud computing. First we introduce the background of cloud computing and the difference between cloud computing and others. Then we talk about the architecture and the characteristics of cloud computing. In the end of this paper, we discuss some issues in cloud computing.


2011 ◽  
Vol 55-57 ◽  
pp. 1053-1057
Author(s):  
Gui De Zheng ◽  
Ming Chen

The next generation of scientific experiments and studies are being carried out by large collaborations of researchers distributed around the world engaged in analysis of huge collections of data generated by scientific instruments. Grid computing has emerged as an enabler for such collaborations as it aids communities in sharing resource to achieve common objective. This paper defines the problem of scheduling distributed data-intensive application on to Gird resource and presents a formal resource and application model for the problem.


Author(s):  
Shrutika Khobragade ◽  
Rohini Bhosale ◽  
Rahul Jiwahe

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.


Sign in / Sign up

Export Citation Format

Share Document