Cloud Computing

2012 ◽  
Vol 3 (2) ◽  
pp. 51-59 ◽  
Author(s):  
Nawsher Khan ◽  
A. Noraziah ◽  
Elrasheed I. Ismail ◽  
Mustafa Mat Deris ◽  
Tutut Herawan

Cloud computing is fundamentally altering the expectations for how and when computing, storage, and networking resources should be allocated, managed, consumed, and allow users to utilize services globally. Due to the powerful computing and storage, high availability and security, easy accessibility and adaptability, reliable scalability and interoperability, cost and time effective cloud computing is the top, needed for current fast growing business world. A client, organization or a trade that adopting emerging cloud environment can choose a well suitable infrastructure, platform, software, and a network resource, for any business, where each one has some exclusive features and advantages. The authors first develop a comprehensive classification for describing cloud computing architecture. This classification help in survey of several existing cloud computing services developed by various projects globally such as Amazon, Google, Microsoft, Sun and Force.com and by using this survey’s results the authors identified similarities and differences of the architecture approaches of cloud computing.

Author(s):  
Babangida Zubairu

The emergence of new innovations in technology changes the rate of data generated in health-related institutions and the way data should be handled. As such, the amount of data generated is always on the increase, which demands the need of advanced, automated management systems and storage platforms for handling large biomedical data. Cloud computing has emerged as the promising technology for present and future that can handle large amount of data and enhance processing and management of the data remotely. One of the disturbance concerns of the technology is the security of the data. Data in the cloud is subject to security threats, and this has highlighted the need for exploring security measures against the threats. The chapter provides detailed analysis of cloud computing deployment strategies and risks associated with the technology and tips for biomedical data storage and processing through cloud computing services.


2014 ◽  
Vol 556-562 ◽  
pp. 5797-5800
Author(s):  
Song Jie Gong ◽  
Xue Mei Zhang

The appearance of cloud security system makes the spread of computer viruses possess some new features. The open environment in cloud computing is much more complex, and can not fully adapt to the new application of computer network such as cloud computing. Cloud computing offers the advanced capabilities of sharing, where the computing and storage capabilities are outsourced on demand, With the wide use of cloud computing services, tenants require higher and higher security assurance. Through the research and analyss of security in cloud computing, the design model of anti-spam electronic commerce security system based on cloud computing is presented, and the functional modules of the system are analyzed. Lastly, the construction model of anti-spam electronic commerce security system is advanced.


Author(s):  
Karuppasamy M. ◽  
Balakannan S. P.

Cloud computing services are proliferation. The Cloud computing resources face major pitfall in energy consumes. The prime of energy consumption in cloud computing is by means of client computational devices, server computational devices, network computational devices and power required to cool the IT load. The cloud resources contribute high operational energy cost and emit more carbon emission to the environment. Therefore the cloud services providers need green cloud environment resolution to decrease the operational energy cost along with environmental impact. The most important objective of this effort is to trim down the energy from utilized and unutilized (idle) cloud resources and save the energy in cloud resources efficiently. To achieve the sustainable green cloud environment from an Energy Saving Algorithm used to choose the appropriate virtual services so that the power at the client, server, and network recourses can be reduced.  


2019 ◽  
pp. 1748-1768
Author(s):  
Babangida Zubairu

The emergence of new innovations in technology changes the rate of data generated in health-related institutions and the way data should be handled. As such, the amount of data generated is always on the increase, which demands the need of advanced, automated management systems and storage platforms for handling large biomedical data. Cloud computing has emerged as the promising technology for present and future that can handle large amount of data and enhance processing and management of the data remotely. One of the disturbance concerns of the technology is the security of the data. Data in the cloud is subject to security threats, and this has highlighted the need for exploring security measures against the threats. The chapter provides detailed analysis of cloud computing deployment strategies and risks associated with the technology and tips for biomedical data storage and processing through cloud computing services.


2018 ◽  
Vol 7 (2.12) ◽  
pp. 18
Author(s):  
Yoon Su Jeong ◽  
Yong Tae Kim ◽  
Gil Cheol Park

Background/Objectives: Recently, as the fourth industrial revolution has emerged, cloud computing services have been attracting attention for efficient use of Internet-based computing resources. Among the cloud computing services, even if the data processed by the mobile device is encrypted after being stored in the server, the confidential information can be leaked. Therefore, there is a need for the key generation for data encryption and decryption.Methods/Statistical analysis: In this paper, we propose a key distribution protocol that enables mobile devices to securely encrypt and decrypt keys in an efficient manner in a cloud environment. The main purpose of the proposed protocol is to maximize the efficiency and cost reduction of key generation, which can securely transmit and receive data, in a situation where the size of data used in the cloud environment and the storage location are increasing. As a result of the performance evaluation, the proposed method improved the authentication processing time by 4.1% on average compared with the existing protocol, and the average throughput rate of the server per unit time was 6.5%. In addition, the communication delay time between the authentication server and the mobile device improved by 9.3% on average, and the authentication overhead of the server was 11.5% lower than that of the conventional method.Findings: In order to solve this problem, the proposed protocol can solve the security problem of the mobile device because it can receive the authentication through the one - way hash function and the XOR operation using the encrypted data using the session key.Improvements/Applications: In future studies, we will apply the proposed protocol to the actual environment based on the results of this study and compare it with the results obtained from the theoretical studies. 


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Sign in / Sign up

Export Citation Format

Share Document