Research on the Construction of Digital Library Virtual Environment Based on the Cloud Computing Technology

2015 ◽  
Vol 733 ◽  
pp. 830-833 ◽  
Author(s):  
Xing Yan Qian

With the growth in demand for information processing, considering that cloud computing technology and virtual digital libraries have common goal. In this paper, take the cloud computing as the basis of virtual digital libraries, firstly, research the digital library virtualization under the circumstance of cloud computing; secondly, study digital books Museum of virtualized resources in a cloud computing environment integration and sharing mechanism; finally, creating digital library environment with cloud computing virtualization technology driven.

2014 ◽  
Vol 687-691 ◽  
pp. 3019-3022 ◽  
Author(s):  
Jun Jun Liu

Cloud computing technology is emerging technology in the field of information technology, and its technical advantage has brought new opportunities and challenges for the development and service of digital library in the Internet era. Virtualization is the key technology of cloud computing, and the paper discusses the virtualization of digital library in the cloud computing environment from technical level. Firstly, the paper introduced cloud computing and virtualization technology; then created a virtualized environment for digital library based on the cloud computing technology, and described the function of various levels; finally, the capacity of virtual machines appointment scheduling can be calculated according to formulas. The paper has great significance in enhancing the efficiency and quality of library service, constructing resource sharing system of digital library.


2013 ◽  
Vol 347-350 ◽  
pp. 3312-3316
Author(s):  
Hong Jun Chen ◽  
Xue Qin Wu

The positive factors of the cloud computing: the great commercial value, the cheap and convenient use, has been recognized widely. But there are many risks on security. These security risks will greatly restrict the development of cloud computing. Cloud security risks such as: the cloud platform is easily vulnerable, cloud resources is easily abused, the cloud platform data is accessed by unauthorized user or the data is missing, the violations in the network is difficult to trace and survey, and the service providers replacement will affect the migration of the users data and services. So we research the virtualization technology, data backup and disaster recovery technology, encryption technology of data storage and transmission, the authentication technology of service providers and users, risk assessment, and legal constraints and safety training. Our research is strived to obtain a secure cloud computing environment.


2018 ◽  
Vol 72 ◽  
pp. 149-163
Author(s):  
Agnieszka Grzegorek

Many issues need to be considered and tackled before moving data into the cloud. Adoption of cloud computing raises concerns and questions in particular with respect to security, control and privacy in cloud computing environment. Users should be aware where their data will be stored and what law governs. In a case where personal data are to be processed it is important for the contracting parties to ensure that requirements and obligations placed on them pursuant to the EU data protection laws will be fulfilled. This article also includes an overview of typical terms and conditions of cloud computing contracts, stressing that most of contractual arrangements in current practice fall short of achieving a fair balance of rights and obligations arising under the contract between cloud providers and users. The aim of this study is to indicate regulations and guidelines which are applicable to cloud computing contracts as well as initiatives undertaken at the EU level and their role in building legal certainty and trust to cloud computing technology.


2014 ◽  
Vol 1049-1050 ◽  
pp. 2122-2125
Author(s):  
Hong Li Li

In this paper, the background of cloud computing technology to study how to optimize cloud computing data center energy efficiency mechanisms. This paper analyzes the DVFS energy saving strategy, virtualization energy saving strategy, turn off / on energy saving strategies, such as the current mainstream strategy, comparing different energy saving strategies have not applied scenes.


2016 ◽  
Vol 3 (1) ◽  
pp. 42
Author(s):  
Quanhui Ren ◽  
Hui Gao

<span style="color: black; line-height: 115%; font-family: 'Calibri','sans-serif'; font-size: 12pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to adapt to rapid development of network information technology, the application of cloud computing technology is increasingly widespread. However, the security problem in the cloud computing environment has not been effectively resolved. Currently, the research on this problem is getting more attention from the industry. In order to further investigate the information security issues of cloud computing environment, this article not only discusses the basic concept, characteristics and service model of cloud computing, but also focuses on the cloud computing security reference model and cloud cube model. In this paper, the information security problems and concrete solutions in the former cloud computing environment are discussed from different aspects.</span>


2014 ◽  
Vol 4 (1) ◽  
pp. 33-44 ◽  
Author(s):  
Anil Singh ◽  
Kamlesh Dutta ◽  
Avtar Singh

Cloud Computing has changed the strategy of the way of providing different services to business and government agent as well as to sole users. Cloud Computing provides scalable and on demand services to users irrespective of their physical area. But this computing technology has many challenges. One of them is on demand resource allocation. In this paper a resource allocation method is proposed based on Analytical Hierarchy Process (AHP) called Multicriteria Preference Synthesis (MPS) method. MPS method combines many AHP synthesis methods (Additive Normalization, EigenVector, Multicriteria Synthesis etc.) to assign the priorities to the users' tasks. In MPS method Error Criteria is used to provide the consistency in providing the priorities to users' tasks if any violation is there.


Author(s):  
Shantanu Pal

Cloud computing has leaped ahead as one of the biggest technological advances of the present time. In cloud, users can upload or retrieve their desired data from anywhere in the world at anytime, making this the most important and primary function in cloud computing technology. While this technology reduces the geographical barriers and improves the scalability in the way we compute, keeping data in a Cloud Data Center (CDC) faces numerous challenges from unauthorized users and hackers within the system. Creating proper Service Level Agreements (SLA) and providing high-end storage security is the biggest barrier being developed for better Quality of Service (QoS) and implementation of a safer cloud computing environment for the Cloud Service Users (CSU) as well as for the Cloud Service Providers (CSP). Therefore, cloud applications need to have increased QoS and effective security measures and policies set in place to provide better services and to decline unauthorized access. The purpose of this chapter is to examine the cloud computing technology behind innovative business approaches and establishing SLA in cloud computing applications. This chapter provides a clear understanding of different cloud computing security challenges, risks, attacks, and solutions that exist in the present heterogeneous cloud computing environment. Storage security, different cloud infrastructures, the many advantages, and limitations are also discussed.


2014 ◽  
Vol 543-547 ◽  
pp. 3598-3601
Author(s):  
Wu Shi Gao

This article analyzes the problems of traditional public computer room building hardware life and use efficiency and maintenance management and so on, according to the present situation of construction of university public computer room. Propose a public computer room construction scheme to improve computer efficiency with virtualization technology in cloud computing environment. Through the example, we prove the superiority of the construction cost of public computer room, efficiency in the use, energy consumption, management and maintenance by cloud computing model.


Sign in / Sign up

Export Citation Format

Share Document