Construction on Virtualized Environment for Digital Library Based on Cloud Computing Technology

2014 ◽  
Vol 687-691 ◽  
pp. 3019-3022 ◽  
Author(s):  
Jun Jun Liu

Cloud computing technology is emerging technology in the field of information technology, and its technical advantage has brought new opportunities and challenges for the development and service of digital library in the Internet era. Virtualization is the key technology of cloud computing, and the paper discusses the virtualization of digital library in the cloud computing environment from technical level. Firstly, the paper introduced cloud computing and virtualization technology; then created a virtualized environment for digital library based on the cloud computing technology, and described the function of various levels; finally, the capacity of virtual machines appointment scheduling can be calculated according to formulas. The paper has great significance in enhancing the efficiency and quality of library service, constructing resource sharing system of digital library.

2015 ◽  
Vol 733 ◽  
pp. 830-833 ◽  
Author(s):  
Xing Yan Qian

With the growth in demand for information processing, considering that cloud computing technology and virtual digital libraries have common goal. In this paper, take the cloud computing as the basis of virtual digital libraries, firstly, research the digital library virtualization under the circumstance of cloud computing; secondly, study digital books Museum of virtualized resources in a cloud computing environment integration and sharing mechanism; finally, creating digital library environment with cloud computing virtualization technology driven.


Author(s):  
Mousa Elrotub ◽  
Ahmed Bali ◽  
Abdelouahed Gherbi

The problem of balancing user requests in cloud computing is becoming more serious due to the variation of workloads. Load balancing and allocation processes still need more optimizing methodologies and models to improve performance and increase the quality of service. This article describes a solution to balance user workload efficiently by proposing a model that allows each virtual machine (VM) to maximize the serving number of requests based on its capacity. The model measures VMs' capacity as a percentage and maps groups of user requests to appropriate active virtual machines. Finding the expected patterns from a big data repository, such as log data, and using some machine learning techniques can make the prediction more efficiently. The work is implemented and evaluated using some performance metrics, and the results are compared with other research. The evaluation shows the efficiency of the proposed approach in distributing user workload and improving results.


In the cloud computing frameworks, when utilizing virtualization technology, the client's mentioned information data or storing away assistance is obliged by a lot of imparted virtual machines (VM) in a scale and flexible way. These VMs are put in at least one server point as per the point stores capacities or probabilities. The VM arrangement accessibility refers to the probability that in any event one lot of all client's mentioned VMs works during the requested. In this research paper we proposed an algorithm for better VM placement load balancing. Allocation is made based on the Assignment Problems arrangement strategy idea, which is planned for cloud computing. Assignment issues whose decision making parameters are summed up numbers as triangular fuzzy set as well as Centroid Ranking Technique is used for ranking the dataset. The linguistic variables are used to change the subjective information into quantitative information. Another positioning strategy is proposed to defuzzify the fuzzy numbers, trailed by Hungarian system for ideal cost and time. A numerical model is proposed methodology for better assignment of VM in the physical machine for cloud computing environment.


Author(s):  
. Monika ◽  
Pardeep Kumar ◽  
Sanjay Tyagi

In Cloud computing environment QoS i.e. Quality-of-Service and cost is the key element that to be take care of. As, today in the era of big data, the data must be handled properly while satisfying the request. In such case, while handling request of large data or for scientific applications request, flow of information must be sustained. In this paper, a brief introduction of workflow scheduling is given and also a detailed survey of various scheduling algorithms is performed using various parameter.


2014 ◽  
Vol 1008-1009 ◽  
pp. 1513-1516
Author(s):  
Hai Na Song ◽  
Xiao Qing Zhang ◽  
Zhong Tang He

Cloud computing environment is regarded as a kind of multi-tenant computing mode. With virtulization as a support technology, cloud computing realizes the integration of multiple workloads in one server through the package and seperation of virtual machines. Aiming at the contradiction between the heterogeneous applications and uniform shared resource pool, using the idea of bin packing, the multidimensional resource scheduling problem is analyzed in this paper. We carry out some example analysis in one-dimensional resource scheduling, two-dimensional resource schduling and three-dimensional resource scheduling. The results shows that the resource utilization of cloud data centers will be improved greatly when the resource sheduling is conducted after reorganizing rationally the heterogeneous demands.


2020 ◽  
Vol 178 ◽  
pp. 375-385
Author(s):  
Ismail Zahraddeen Yakubu ◽  
Zainab Aliyu Musa ◽  
Lele Muhammed ◽  
Badamasi Ja’afaru ◽  
Fatima Shittu ◽  
...  

2013 ◽  
Vol 347-350 ◽  
pp. 3312-3316
Author(s):  
Hong Jun Chen ◽  
Xue Qin Wu

The positive factors of the cloud computing: the great commercial value, the cheap and convenient use, has been recognized widely. But there are many risks on security. These security risks will greatly restrict the development of cloud computing. Cloud security risks such as: the cloud platform is easily vulnerable, cloud resources is easily abused, the cloud platform data is accessed by unauthorized user or the data is missing, the violations in the network is difficult to trace and survey, and the service providers replacement will affect the migration of the users data and services. So we research the virtualization technology, data backup and disaster recovery technology, encryption technology of data storage and transmission, the authentication technology of service providers and users, risk assessment, and legal constraints and safety training. Our research is strived to obtain a secure cloud computing environment.


2018 ◽  
Vol 72 ◽  
pp. 149-163
Author(s):  
Agnieszka Grzegorek

Many issues need to be considered and tackled before moving data into the cloud. Adoption of cloud computing raises concerns and questions in particular with respect to security, control and privacy in cloud computing environment. Users should be aware where their data will be stored and what law governs. In a case where personal data are to be processed it is important for the contracting parties to ensure that requirements and obligations placed on them pursuant to the EU data protection laws will be fulfilled. This article also includes an overview of typical terms and conditions of cloud computing contracts, stressing that most of contractual arrangements in current practice fall short of achieving a fair balance of rights and obligations arising under the contract between cloud providers and users. The aim of this study is to indicate regulations and guidelines which are applicable to cloud computing contracts as well as initiatives undertaken at the EU level and their role in building legal certainty and trust to cloud computing technology.


2020 ◽  
Vol 17 (6) ◽  
pp. 2430-2434
Author(s):  
R. S. Rajput ◽  
Dinesh Goyal ◽  
Rashid Hussain ◽  
Pratham Singh

The cloud computing environment is accomplishing cloud workload by distributing between several nodes or shift to the higher resource so that no computing resource will be overloaded. However, several techniques are used for the management of computing workload in the cloud environment, but still, it is an exciting domain of investigation and research. Control of the workload and scaling of cloud resources are some essential aspects of the cloud computing environment. A well-organized load balancing plan ensures adequate resource utilization. The auto-scaling is a technique to include or terminate additional computing resources based on the scaling policies without involving humans efforts. In the present paper, we developed a method for optimal use of cloud resources by the implementation of a modified auto-scaling feature. We also incorporated an auto-scaling controller for the optimal use of cloud resources.


Sign in / Sign up

Export Citation Format

Share Document