Unique Fog Computing Taxonomy for Evaluating Cloud Services

Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

Fog computing has the potential to resolve cloud computing issues by extending the cloud service provider's reach to the edge of the cloud network model, right up to the cloud service consumer. This enables a whole new state of applications and services which increases the security, enhances the cloud experience, and keeps the data close to the user. This chapter presents a review on the academic literature research work on fog computing, introduces a novel taxonomy to classify cloud products based on fog computing elements, and then determines the best fit fog computing product to choose for the cloud service consumer.

Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

Fog computing has the potential to resolve cloud computing issues by extending the cloud service provider's reach to the edge of the cloud network model, right up to the cloud service consumer. This enables a whole new state of applications and services which increases the security, enhances the cloud experience, and keeps the data close to the user. This chapter presents a review on the academic literature research work on fog computing, introduces a novel taxonomy to classify cloud products based on fog computing elements, and then determines the best fit fog computing product to choose for the cloud service consumer.


Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

Cloud computing has slowly but surely become the foremost service provider for information technology applications and platform delivery. However, Cloud issues continue to exist, like cyberattacks, slow last mile latency, and clouds lack client-centric and location-aware applications to process real time data for efficient and customized application delivery. As an alternative, Fog Computing has the potential to resolve these issues by extending the Cloud service provider's reach to the edge of the Cloud network model, right up to the Cloud service consumer. This enables a whole new state of applications and services which increases the security, enhances the cloud experience and keeps the data close to the user. This research article presents a review on the academic literature research work on Fog Computing, introduces a novel taxonomy to classify cloud products based on Fog computing elements and then determine the best fit Fog Computing product to choose for the Cloud service consumer.


2018 ◽  
Vol 14 (4) ◽  
pp. 78-90
Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

Cloud computing has slowly but surely become the foremost service provider for information technology applications and platform delivery. However, Cloud issues continue to exist, like cyberattacks, slow last mile latency, and clouds lack client-centric and location-aware applications to process real time data for efficient and customized application delivery. As an alternative, Fog Computing has the potential to resolve these issues by extending the Cloud service provider's reach to the edge of the Cloud network model, right up to the Cloud service consumer. This enables a whole new state of applications and services which increases the security, enhances the cloud experience and keeps the data close to the user. This research article presents a review on the academic literature research work on Fog Computing, introduces a novel taxonomy to classify cloud products based on Fog computing elements and then determine the best fit Fog Computing product to choose for the Cloud service consumer.


Author(s):  
Akashdeep Bhardwaj

This article describes how the rise of fog computing to improve cloud computing performance and the acceptance of smart devices is slowly but surely changing our future and shaping the computing environment around us. IoT integrated with advances in low cost computing, storage and power, along with high speed networks and big data, supports distributed computing. However, much like cloud computing, which are under constant security attacks and issues, distributed computing also faces similar challenges and security threats. This can be mitigated to a great extent using fog computing, which extends the limits of Cloud services to the last mile edge near to the nodes and networks, thereby increasing the performance and security levels. Fog computing also helps increase the reach and comes across as a viable solution for distributed computing. This article presents a review of the academic literature research work on the Fog Computing. The authors discuss the challenges in Fog environment and propose a new taxonomy.


2018 ◽  
Vol 1 (1) ◽  
pp. 35-49 ◽  
Author(s):  
Akashdeep Bhardwaj

This article describes how the rise of fog computing to improve cloud computing performance and the acceptance of smart devices is slowly but surely changing our future and shaping the computing environment around us. IoT integrated with advances in low cost computing, storage and power, along with high speed networks and big data, supports distributed computing. However, much like cloud computing, which are under constant security attacks and issues, distributed computing also faces similar challenges and security threats. This can be mitigated to a great extent using fog computing, which extends the limits of Cloud services to the last mile edge near to the nodes and networks, thereby increasing the performance and security levels. Fog computing also helps increase the reach and comes across as a viable solution for distributed computing. This article presents a review of the academic literature research work on the Fog Computing. The authors discuss the challenges in Fog environment and propose a new taxonomy.


Cloud computing or in other words, shared computing is a unique way of sharing resources via the Internet. It combines and extends features of parallel processing, grid computing, and distributed computing. Cloud Computing environments provide a competent way to schedule and process various jobs on remote machines. Rather than relying on local machines, Cloud users access services remotely via high-speed networks. Various users submitting jobs to be processed to Cloud would expect Quality of Service (QoS). So, currently, many researchers are proposing various heuristics that provide QoS to cloud users. The job scheduler is responsible for scheduling various jobs to its best-matched resource to achieve desired QoS. There are Service Level Agreements (SLAs) between Cloud Service Providers (CSPs) and Cloud users, which need to be followed by both the parties. Benefits would be affected in case of not complying with SLAs. In this paper various SLAs like Hard SLA, Best Effort SLA and Soft SLA are proposed. Jobs with required QoS parameters like Reliability, Execution Time and Priority are submitted to the scheduler. QoS of resources is determined by parameters like Reliability, Job Completion Time and the Cost of the resource. Schedulers then assign the Job to the best-matched resource according to specified SLA. Simulation is performed for First Fit and Best Fit heuristic approaches. Performances of both the heuristic approaches are evaluated with performance parameters like Average Resource Utilization (ARU), Success Rate of Jobs (SR) and Total Completion Time (TCT). This research work is useful for various organizations that provide various Cloud services to users who seek different levels of QoS for various applications.


Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 317
Author(s):  
Chithambaramani Ramalingam ◽  
Prakash Mohan

The increasing demand for cloud computing has shifted business toward a huge demand for cloud services, which offer platform, software, and infrastructure for the day-to-day use of cloud consumers. Numerous new cloud service providers have been introduced to the market with unique features that assist service developers collaborate and migrate services among multiple cloud service providers to address the varying requirements of cloud consumers. Many interfaces and proprietary application programming interfaces (API) are available for migration and collaboration services among cloud providers, but lack standardization efforts. The target of the research work was to summarize the issues involved in semantic cloud portability and interoperability in the multi-cloud environment and define the standardization effort imminently needed for migrating and collaborating services in the multi-cloud environment.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


2015 ◽  
pp. 1464-1486
Author(s):  
Chengcheng Huang ◽  
Phil Smith ◽  
Zhaohao Sun

Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today's securing network solutions. However, there are some significant challenges in the implementation stage. For example, which VPN solution is easy to deploy in delivering cloud services? Which VPN solution is most user-friendly in enterprise clouds? This chapter explores these issues by implementing different VPNs in a virtual cloud network environment using open source software and tools. This chapter also reviews cloud computing and cloud services and looks at their relationships. The results not only provide experimental evidence but also facilitate the network implementers in deployment of secure network solutions for enterprise cloud services.


Sign in / Sign up

Export Citation Format

Share Document