Research and Application of Cloud Computing Technology in Agricultural Information Resources Sharing Service

2013 ◽  
Vol 756-759 ◽  
pp. 1522-1526 ◽  
Author(s):  
Jiao Ye ◽  
Gui Fen Chen ◽  
Guang Wei Zeng

In order to realize the sharing of agricultural information resources and improve the level of agricultural information service in Jilin Province, this paper introduces cloud computing technology into the construction of agricultural information resources sharing service. Firstly, introduce the concept, service forms and architecture of cloud computing. Secondly, establish the agricultural information resources sharing cloud service platform and analysis the agricultural information consultation mode in cloud computing environment. Finally, analysis the advantages and significance of cloud computing technology in agricultural information resources sharing.

Author(s):  
Shantanu Pal

Cloud computing has leaped ahead as one of the biggest technological advances of the present time. In cloud, users can upload or retrieve their desired data from anywhere in the world at anytime, making this the most important and primary function in cloud computing technology. While this technology reduces the geographical barriers and improves the scalability in the way we compute, keeping data in a Cloud Data Center (CDC) faces numerous challenges from unauthorized users and hackers within the system. Creating proper Service Level Agreements (SLA) and providing high-end storage security is the biggest barrier being developed for better Quality of Service (QoS) and implementation of a safer cloud computing environment for the Cloud Service Users (CSU) as well as for the Cloud Service Providers (CSP). Therefore, cloud applications need to have increased QoS and effective security measures and policies set in place to provide better services and to decline unauthorized access. The purpose of this chapter is to examine the cloud computing technology behind innovative business approaches and establishing SLA in cloud computing applications. This chapter provides a clear understanding of different cloud computing security challenges, risks, attacks, and solutions that exist in the present heterogeneous cloud computing environment. Storage security, different cloud infrastructures, the many advantages, and limitations are also discussed.


2014 ◽  
Vol 536-537 ◽  
pp. 611-615
Author(s):  
Bang Fan Liu ◽  
Hui Hui Zhong ◽  
Tao Tao ◽  
Yu Han Hu

Cloud computing appears for the development of e-government to provide new ideas and direction. By the basic of cloud computing to build e-government information resources sharing cloud service centers, it is benefit for integration and sharing of information resources, at the same time, information security has also been effectively guaranteed; of course, it is not only Conducive to the establishment of efficient and transparent service-oriented, conservation-oriented, dynamic government; and facilitate to public oversight and political participation, but also conducive to improve the government's own work. Construction of e-government information resources sharing cloud service centers, technology is support system is to protect, to change the concept of interaction and look at the effectiveness.


Author(s):  
Yuan Zheng ◽  
Xiangbin Wen

With the continuous innovation and development of modern computer science and mobile Internet and other information technologies, artificial intelligence (AI) is not a new thing. It has been widely studied and applied in many fields, and it is very important for people in modern society. The research fields of artificial intelligence mainly include: deep learning, natural language processing, computer vision, intelligent robot, automatic programming, data mining and so on. All kinds of industrial production and daily life will bring a very important practical significance and far-reaching influence. The rapid development and improvement of AI have effectively changed the daily life of modern people and improved work efficiency, and promoted the vigorous and healthy development of human economic and social civilization and the progress of information technology. When widely used, traditional network information and big data processing technologies are difficult to adapt to its development needs. Only by closely combining cloud computing technology with other technologies can it play a better role and give full play to AI technology and its development. The enthusiasm and promotion of related application technologies have promoted the smooth progress of AI technology and related undertakings. With the development and improvement of cloud computing technology, more and more users tend to use the cloud to work. However, a large number of cloud service failures occurred, causing huge losses for enterprises and individuals. In order to prevent damage to the interests of enterprises and individuals, cloud service providers will provide high-quality services as much as possible. This paper aims to study the application of AI technology in cloud computing environment resources, research on the indicator of reliability, and propose a cloud service reliability verification method for the infrastructure-as-a-service layer. Experimental research shows that through the reliability detection method in this paper, users can easily and quickly obtain the reliability of the purchased cloud service, and can intuitively feel whether the performance of each server meets the promised situation in the cloud service provider’s SLA.


2013 ◽  
Vol 373-375 ◽  
pp. 1719-1723
Author(s):  
Lu Ning ◽  
Yan Li Xing

Cloud computing technology widely used in the library, change the concept on library, access to information, saved and service. This paper analyzes the impact of cloud computing technology applications for library, discusses aspects of the application of cloud computing technology acquired in the library information resources organization, information resources, information resources, services and information resources sharing.


2014 ◽  
Vol 513-517 ◽  
pp. 1425-1430
Author(s):  
Xiu Zhen Feng ◽  
Peng Hao

Cloud computing technology created a brand new approach for further information resources management and utilization. Based on exploring characteristics and applications of cloud computing technology, the study in this paper is focused on cloud service with information resources. The aim of this study is to construct a cloud service model, namely Information Resource as a Service (IRaaS). Our model depicts the components of IRaaS and relationships among those components, which builds up a prime foundation for further studying on both information resource management and service.


2016 ◽  
pp. 1053-1066 ◽  
Author(s):  
Nitin Nagar ◽  
Ugrasen Suman

Cloud computing is comprised of major demand from the every group of organization because of easy availability and cost effectiveness. The responsibilities of cloud service providers will become increasing more due to the great progression in every cloud computing deployment model (public, private and hybrid) and service models (SaaS, PaaS and IaaS). In this perspective, cloud computing faces multiple challenges, especially in cloud computing security at all levels (e.g., host, network, application and data levels). Authentication is the constantly the biggest concerned for IT industries to adopt cloud computing environment. The availability, performance, key logger attack, malicious insiders, outsider attacks and service disruptions explore (service hijacking) issues are the key research challenges in the cloud computing authentication level. In this aspect, traditional user name and password is not enough as a single factor (first factor). This paper has proposed a secure cloud computing framework which uses first factor as a crypt user name and password with the ATM pin as a second factor called M-pin. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.


2018 ◽  
Vol 72 ◽  
pp. 149-163
Author(s):  
Agnieszka Grzegorek

Many issues need to be considered and tackled before moving data into the cloud. Adoption of cloud computing raises concerns and questions in particular with respect to security, control and privacy in cloud computing environment. Users should be aware where their data will be stored and what law governs. In a case where personal data are to be processed it is important for the contracting parties to ensure that requirements and obligations placed on them pursuant to the EU data protection laws will be fulfilled. This article also includes an overview of typical terms and conditions of cloud computing contracts, stressing that most of contractual arrangements in current practice fall short of achieving a fair balance of rights and obligations arising under the contract between cloud providers and users. The aim of this study is to indicate regulations and guidelines which are applicable to cloud computing contracts as well as initiatives undertaken at the EU level and their role in building legal certainty and trust to cloud computing technology.


2014 ◽  
Vol 1049-1050 ◽  
pp. 2122-2125
Author(s):  
Hong Li Li

In this paper, the background of cloud computing technology to study how to optimize cloud computing data center energy efficiency mechanisms. This paper analyzes the DVFS energy saving strategy, virtualization energy saving strategy, turn off / on energy saving strategies, such as the current mainstream strategy, comparing different energy saving strategies have not applied scenes.


Sign in / Sign up

Export Citation Format

Share Document