Examining of QoS in Cloud Computing Technologies and IoT Services

Author(s):  
Akash Chowdhury ◽  
Swastik Mukherjee ◽  
Sourav Banerjee

The various services that are offered by IoT and Cloud Service Providers (CSPs) to the customers today feature a pay-per-use service-charging policy. Customers can choose and avail these services when they want, how they want, and from where they want on demand. Demand for these services has increased drastically over the years among individuals and enterprises worldwide, and thus, it is very important to keep up good Quality of Service (QoS). This chapter highlights the history of internet, the gradual evolution of cloud computing, the reasons behind it, evolution and concepts of the Internet of Things (IoT), CloudIoT and its necessities, and various applications and service fields of CloudIoT. This chapter also precisely highlights various concepts regarding maintenance of good QoS, controversies in QoS maintenance, different parameters that the QoS depends on, various problems faced in maintaining those parameters, and the possible solutions for overcoming those problems. Possible directions towards future works are also highlighted in this chapter.

Author(s):  
Akash Chowdhury ◽  
Swastik Mukherjee ◽  
Sourav Banerjee

The various services that are offered by IoT and Cloud Service Providers (CSPs) to the customers today feature a pay-per-use service-charging policy. Customers can choose and avail these services when they want, how they want, and from where they want on demand. Demand for these services has increased drastically over the years among individuals and enterprises worldwide, and thus, it is very important to keep up good Quality of Service (QoS). This chapter highlights the history of internet, the gradual evolution of cloud computing, the reasons behind it, evolution and concepts of the Internet of Things (IoT), CloudIoT and its necessities, and various applications and service fields of CloudIoT. This chapter also precisely highlights various concepts regarding maintenance of good QoS, controversies in QoS maintenance, different parameters that the QoS depends on, various problems faced in maintaining those parameters, and the possible solutions for overcoming those problems. Possible directions towards future works are also highlighted in this chapter.


Author(s):  
Jayashree K ◽  
Babu R ◽  
Chithambaramani R

The Internet of Things (IoT) architecture has gained an increased amount of attention from academia as well as the industry sector as a significant methodology for the development of innovative applications and systems. Currently, the merging of this architecture with that of Cloud computing has been largely motivated by the need for various applications and infrastructures in IoT. In addition to this, the Cloud ascends as an eminent solution that would help solve various challenges that are faced by the IoT standard when varied physical devices. There are an excessive number of Cloud service providers the web along with many other services. Thus, it becomes critical to choose the provider who can be efficient, consistent, and suitable, and who can deliver the best Quality of Service (QoS). Thus, this chapter discusses QoS for cloud computing and IoT.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Mbasa Joaquim Molo ◽  
Joke A. Badejo ◽  
Emmanuel Adetiba ◽  
Vingi Patrick Nzanzu ◽  
Etinosa Noma-Osaghae ◽  
...  

Cloud computing is a technology that allows dynamic and flexible computing capability and storage through on-demand delivery and pay-as-you-go services over the Internet. This technology has brought significant advances in the Information Technology (IT) domain. In the last few years, the evolution of cloud computing has led to the development of new technologies such as cloud federation, edge computing, and fog computing. However, with the development of Internet of Things (IoT), several challenges have emerged with these new technologies. Therefore, this paper discusses each of the emerging cloud-based technologies, as well as their architectures, opportunities, and challenges. We present how cloud computing evolved from one paradigm to another through the interplay of benefits such as improvement in computational resources through the combination of the strengths of various Cloud Service Providers (CSPs), decrease in latency, improvement in bandwidth, and so on. Furthermore, the paper highlights the application of different cloud paradigms in the healthcare ecosystem.


2019 ◽  
Vol 8 (3) ◽  
pp. 4978-4982

The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. Cloud computing theoretically provides all computing needs as services. Accordingly, a large number of cloud service providers exist and the number is constantly increasing. This presents a significant problem for a user to find a relevant service provider, and calls for developing a specialized search engine to help users select suitable services matching their needs. Towards this goal, we developed a search engine that crawls the web sites of various service providers, extracts service attributes from their JavaScript Object Notation (JSON) files and normalizes the attributes in a service table. Those attributes are clustered using one of three different algorithms (K-means, K-medoids, and ISODATA). The requirements of a given user are then matched against the centroids of the various clusters to help obtain the closest match. In this paper, we compared the three algorithms with respect to time and accuracy. The ISODATA algorithm exhibited the best performance.


Cloud computing is constantly evolving with innovations. So, the cloud service providers are investing big in finding solutions for the challenges confronted by the business organizations in the ever-changing technological world. However, still, there is a little reluctance among the organizations to ultimately adopt the public cloud because the mission-critical applications and the mission-critical data require high-level security and availability which are questionable in the equally growing hacking technology. The hacker's comfort zone is Internet, and the Internet is the primary medium for communication between enterprises and cloud service providers. So, the cloud service providers come up with a solution called Direct-Cloud which bypasses the internet and establishes a private connection between the enterprise and cloud service provider. The primary objective of this paper is to familiarize the terminology direct-cloud as it makes a massive move in Cloud Computing. So, this paper presents a study that describes direct-cloud, its architecture, benefits, the comparison between different direct-cloud solutions and the guidelines to choose a suitable direct-cloud solution. Also, the terminologies Multi-Cloud and ConnectedCloud are gaining attention among the enterprises to meet the growing needs of the business. Hence the paper further explores the direct-cloud deployment in the multi-cloud and connected-cloud environment


Author(s):  
J. Craig Mudge

Cloud computing is a mode of acquisition of infrastructure where a cloud service provides on demand computing and on-demand storage, accessible over the web, with a matching business model, namely pay-per-use. Lower cost, sometimes a factor of five, is achieved by automating operations in warehouse-sized data centres, sharing the hefty burden of cooling, physical security, and power backup, and the use of commodity components. As access to storage managed by cloud service providers gained market acceptance, the phrase “the cloud” came into use to refer to the location of information stored with a cloud service provider to be shared (business documents and photos) or copied for backup (against losing a phone or deleting information on a laptop).  Security, and to a lesser extent privacy, concerns are the major barriers to the adoption of cloud computing, but the leading cloud service providers have responded to the point that sensitive information, such as medical records and credit-card-holder data, is now held in the cloud. 


2015 ◽  
Vol 8 (2) ◽  
Author(s):  
Hitesh Marwaha ◽  
Dr. Rajeshwar Singh

Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. Cloud Computing is a computing model, in which customer plug into the “cloud” to access IT resources which are priced and provided “on-demand”. The major challenges that prevent Cloud Computing from being adopted are recognized by organizations are security issues. Many techniques for securing the data in cloud are proposed by researcher but almost all methods have some drawbacks and till date no appropriate method has not been proposed that Cloud service providers can win the trust of customer. In this research paper the various security issues are reviewed along with cloud computing service providers which will give a deep insight for cloud service providers as well as researchers to work on the areas and make cloud computing a“trusted computing “and hardening the confidence of organizations towards cloud computing migration.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


Author(s):  
Theo Lynn

Abstract Cloud computing is the dominant paradigm in modern computing, used by billions of Internet users worldwide. It is a market dominated by a small number of hyperscale cloud service providers. The overwhelming majority of cloud customers agree to standard form click-wrap contracts, with no opportunity to negotiate specific terms and conditions. Few cloud customers read the contracts that they agree to. It is clear that contracts in cloud computing are primarily an instrument of control benefiting one side, the cloud service provider. This chapter provides an introduction to the relationship between psychological trust, contracts and contract law. It also offers an overview of the key contract law issues that arise in cloud computing and introduces some emerging paradigms in cloud computing and contracts.


Sign in / Sign up

Export Citation Format

Share Document