Research on the Cloud Services Plat Form Architecture of Digital Library Based on Cloud Computing Technology

2014 ◽  
Vol 989-994 ◽  
pp. 4799-4801
Author(s):  
Shan Hong Zhu ◽  
Tao Kuang

The Digital Library has begun to enter the cloud computing era after experienced the Internet era, This paper constructed a cloud services plat form of digital library based on cloud computing technology, then described the service processes and the operating mechanism of the digital library cloud services plat form.

2015 ◽  
pp. 466-489
Author(s):  
K. Palanivel ◽  
S. Kuppuswami

Cloud computing is an emerging computing model which has evolved as a result of the maturity of underlying prerequisite technologies. There are differences in perspective as to when a set of underlying technologies becomes a “cloud” model. In order to categorize cloud computing services, and to expect some level of consistent characteristics to be associated with the services, cloud adopters need a consistent frame of reference. The Cloud Computing Reference Architecture (CCRA) defines a standard reference architecture and consistent frame of reference for comparing cloud services from different service providers when selecting and deploying cloud services to support their mission requirements. Cloud computing offers information retrieval systems, particularly digital libraries and search engines, a wide variety of options for growth and reduction of maintenance needs and encourages efficient resource use. These features are particularly attractive for digital libraries, repositories, and search engines. The dynamic and elastic provisioning features of a cloud infrastructure allow rapid growth in collection size and support a larger user base, while reducing management issues. Hence, the objective of this chapter is to investigate and design reference architecture to Digital Library Systems using cloud computing with scalability in mind. The proposed reference architecture is called as CORADLS. This architecture accelerates the rate at which library users can get easy, efficient, faster and reliable services in the digital environment. Here, the end user does not have to worry about the resource or disk space in cloud computing.


Author(s):  
Christoph Reich ◽  
Sandra Hübner ◽  
Hendrik Kuijs

Cloud computing is used to provide users with computer resources on-demand any time over the Internet. At the Hochschule Furtwangen University (HFU) students, lecturers, and researchers can leverage cloud computing to enhance their e-learning experience. This chapter presents how cloud computing provides on-demand virtual desktops for problem solving, on-demand virtual labs for special courses, and on-demand collaboration platforms to support research groups. The focus is how cloud services can be used, how they can be integrated into the existing HFU-IT infrastructure, and how new didactic models could look.


2012 ◽  
pp. 1609-1620
Author(s):  
Anette Weisbecker

Cloud Computing has become the predominant paradigm in information technology for the use of distributed resources. It enables the Internet of Services where different provider offer services and compose services to new value added services. For the emerging service value chains the quality the services plays an important role. Therefore, beside software engineering methods aspects like quality of services, business models, and the interaction with the customer have to be considered during the development of cloud services. This chapter describes how these aspects can be integrated in the development process by combining software and service engineering methods and considering quality as a critical success factor in the design time.


2011 ◽  
Vol 186 ◽  
pp. 596-600 ◽  
Author(s):  
Ji Yi Wu ◽  
Qian Li Shen ◽  
Jian Lin Zhang ◽  
Qi Xie

Cloud computing, with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. After an objective analysis of the security challenge and problem, in current cloud computing development, the latest research progress in the field of cloud security were summarized. Finally, the important research directions in the field were pointed out. It’s will be a new trend for the cloud computing and trusted computing technology to integrate..


Author(s):  
K. Balaji, Et. al.

The evolution of IT led Cloud computing technology emerge as a new prototype in providing the services to its users on rented basis at any time or place. Considering the flexibility of cloud services, innumerable organizations switched their businesses to the cloud technology by setting up more data centers. Nevertheless, it has become mandatory to provide profitable execution of tasks and appropriate  resource utilization. A few approaches were outlined in literature to enhance performance, job scheduling, storage resources, QoS and load distribution. Load balancing concept permits data centers to avert over-loading or under-loading in virtual machines that as such is an issue in cloud computing domain. Consequently, it necessitate the researchers to layout and apply a proper load balancer for cloud environment. The respective study represents a view of problems and threats faced by the current load balancing techniques and make the researchers find more efficient algorithms.


Author(s):  
K. Balaji , Et. al.

The evolution of IT led Cloud computing technology emerge as a new prototype in providing the services to its users on rented basis at any time or place. Considering the flexibility of cloud services, innumerable organizations switched their businesses to the cloud technology by setting up more data centers. Nevertheless, it has become mandatory to provide profitable execution of tasks and appropriate  resource utilization. A few approaches were outlined in literature to enhance performance, job scheduling, storage resources, QoS and load distribution. Load balancing concept permits data centers to avert over-loading or under-loading in virtual machines that as such is an issue in cloud computing domain. Consequently, it necessitate the researchers to layout and apply a proper load balancer for cloud environment. The respective study represents a view of problems and threats faced by the current load balancing techniques and make the researchers find more efficient algorithms.


Author(s):  
Kujtim Mustafa ◽  
Isak Shabani

<p>We are living in the era of internet and smartphones. Almost everybody in developing countries has at least one smartphone or connection to the internet through any other mobile device. So developing mobile software for the people or government is a big chance to make people life easier. The time has become a very important factor for which you can’t even pay for extra time, so making life easier for those people who don’t have time is big chance not losing it. All the data that are generated from the software or services is the best match to store those data on cloud, with which we don’t care about privacy and protection, availability to access them, manipulation of them and so on. In this paper, we describe how this newly emerged paradigm of cloud computing can be helpful for mobile e-Governance. Using cloud of course has a cost, but if you can’t give the same conditions that cloud gives, it is best choice to store the data on cloud. If we use cloud you don’t have to pay for all the IT staff who cares about the data, servers, databases, networks, with those money you can pay for cloud services. We start by an introduction about the cloud and e-Government, continuing with what the benefits and challenges of the e-Government and cloud are computing, the relationship of e-Government and cloud computing, mobile e-Governance in cloud and some examples of some countries that are using mobile e-Government in cloud. <br />Keywords: e-Government, e-Governance, Cloud Computing, Mobile, Data Storage</p>


2022 ◽  
Vol 2022 ◽  
pp. 1-14
Author(s):  
Zhenzhong Zhang ◽  
Wei Sun ◽  
Yanliang Yu

With the vigorous development of the Internet of Things, the Internet, cloud computing, and mobile terminals, edge computing has emerged as a new type of Internet of Things technology, which is one of the important components of the Industrial Internet of Things. In the face of large-scale data processing and calculations, traditional cloud computing is facing tremendous pressure, and the demand for new low-latency computing technologies is imminent. As a supplementary expansion of cloud computing technology, mobile edge computing will sink the computing power from the previous cloud to a network edge node. Through the mutual cooperation between computing nodes, the number of nodes that can be calculated is more, the types are more comprehensive, and the computing range is even greater. Broadly, it makes up for the shortcomings of cloud computing technology. Although edge computing technology has many advantages and has certain research and application results, how to allocate a large number of computing tasks and computing resources to computing nodes and how to schedule computing tasks at edge nodes are still challenges for edge computing. In view of the problems encountered by edge computing technology in resource allocation and task scheduling, this paper designs a dynamic task scheduling strategy for edge computing with delay-aware characteristics, which realizes the reasonable utilization of computing resources and is required for edge computing systems. This paper proposes a resource allocation scheme combined with the simulated annealing algorithm, which minimizes the overall performance loss of the system while keeping the system low delay. Finally, it is verified through experiments that the task scheduling and resource allocation methods proposed in this paper can significantly reduce the response delay of the application.


Author(s):  
Pappu Sowmya ◽  
R Kumar

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization’ is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.


2018 ◽  
pp. 910-925
Author(s):  
Kashif Munir ◽  
Sellapan Palaniappan

Cloud computing is set of resources and services offered through the internet. Cloud services are delivered from data centers located throughout the world. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. In this chapter we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud environment. This chapter also discusses secure cloud architecture for organizations to strengthen the security.


Sign in / Sign up

Export Citation Format

Share Document