scholarly journals Peer to Peer Cloud Providers Federation

Author(s):  
Nourah Fahad Janbi Nourah Fahad Janbi

The increasing demand of the cloud services and with the emergence of many could service providers, the need for cloud federation is inevitable. In cloud federation, many could services providers are collaborating with each other to improve the resources usage, cost, quality of service they provide. To form this federation a management framework is required to facilitate the communication between these providers. This framework can be centralized or distributed, distributed Peer to Peer cloud federation improve extensibility, scalability and fault-tolerant. On the other hand, it is challenging in term of complexity, security and manageability of the federation. In this paper we propose a fully distributed P2P Cloud Federation (PPCF) architecture. PPCF provide a way to connect heterogenous cloud providers to share resources and improve the cloud elasticity. The architecture combines different software technologies to fulfil the cloud federation requirements.

Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 317
Author(s):  
Chithambaramani Ramalingam ◽  
Prakash Mohan

The increasing demand for cloud computing has shifted business toward a huge demand for cloud services, which offer platform, software, and infrastructure for the day-to-day use of cloud consumers. Numerous new cloud service providers have been introduced to the market with unique features that assist service developers collaborate and migrate services among multiple cloud service providers to address the varying requirements of cloud consumers. Many interfaces and proprietary application programming interfaces (API) are available for migration and collaboration services among cloud providers, but lack standardization efforts. The target of the research work was to summarize the issues involved in semantic cloud portability and interoperability in the multi-cloud environment and define the standardization effort imminently needed for migrating and collaborating services in the multi-cloud environment.


Author(s):  
Sanjay P. Ahuja ◽  
Thomas F. Furman ◽  
Kerwin E. Roslie ◽  
Jared T. Wheeler

There are several public cloud providers that provide service across different cloud models such as IaaS, PaaS, and SaaS. End users require an objective means to assess the performance of the services being offered by the various cloud providers. Benchmarks have typically been used to evaluate the performance of various systems and can play a vital role in assessing performance of the different public cloud platforms in a vendor neutral manner. Amazon's EC2 Service is one of the leading public cloud service providers and offers many different levels of service. The research in this chapter focuses on system level benchmarks and looks into evaluating the memory, CPU, and I/O performance of two different tiers of hardware offered through Amazon's EC2. Using three distinct types of system benchmarks, the performance of the micro spot instance and the M1 small instance are measured and compared. In order to examine the performance and scalability of the hardware, the virtual machines are set up in a cluster formation ranging from two to eight nodes. The results show that the scalability of the cloud is achieved by increasing resources when applicable. This chapter also looks at the economic model and other cloud services offered by Amazon's EC2, Microsoft's Azure, and Google's App Engine.


2019 ◽  
Vol 7 (2) ◽  
pp. 220-248
Author(s):  
Björn Lundqvist

Abstract In the Internet of Things (IoT), the amount and smart use of data will determine whether or not a firm can compete successfully. Manufacturing firms will collect data through sensors in their devices and, at least in the cases of SMEs, likely store the collected data in the cloud, purchasing cloud services and storage from the large e-platform providers doubling as cloud providers. The e-platform providers will also collect data from users of their other services. These data are often generated by the same firms that purchase cloud services when they use the e-platforms to sell goods and services. Access to the data and to data analytics on fair business terms, and the possibility to switch cloud and service providers are vital for the SMEs and, in general, to create a competitive and vibrant IoT. However, cloud and e-platform customers seem to be facing difficulties. According to the EU Commission, SMEs are finding it particularly hard to engage cloud and e-platform providers, and to gain access to cloud services on reasonable, transparent terms. The contracts are skewed in favour of the cloud providers. The customers get locked in and may be obliged to agree not to assert any of their intellectual property rights vis-à-vis the cloud provider or the cloud provider’s network. Moreover, the cloud and e-platform providers may under certain circumstances access and make use of the users’ data, and that may give them a competitive advantage vis-à-vis the users, since the providers may have access to much more data, even data originating from the users’ competitors, suppliers, customers, etc. They can thus use all the data available to them to obtain a fuller picture of whole industries, and they may use that advantage in data to leverage and enter users’ markets. Indeed, they may use the data in the cloud for data-driven business strategies to enter the core market of the firms that have provided them with data in the first place. This article discusses whether competition law can address the conduct of the cloud and e-platform providers, so that firms may access and make use of all the possibilities that the IoT harbours.


Author(s):  
Bhupesh Kumar Dewangan ◽  
Amit Agarwal ◽  
Venkatadri M. ◽  
Ashutosh Pasricha

Cloud computing is a platform where services are provided through the internet either free of cost or rent basis. Many cloud service providers (CSP) offer cloud services on the rental basis. Due to increasing demand for cloud services, the existing infrastructure needs to be scale. However, the scaling comes at the cost of heavy energy consumption due to the inclusion of a number of data centers, and servers. The extraneous power consumption affects the operating costs, which in turn, affects its users. In addition, CO2 emissions affect the environment as well. Moreover, inadequate allocation of resources like servers, data centers, and virtual machines increases operational costs. This may ultimately lead to customer distraction from the cloud service. In all, an optimal usage of the resources is required. This paper proposes to calculate different multi-objective functions to find the optimal solution for resource utilization and their allocation through an improved Antlion (ALO) algorithm. The proposed method simulated in cloudsim environments, and compute energy consumption for different workloads quantity and it increases the performance of different multi-objectives functions to maximize the resource utilization. It compared with existing frameworks and experiment results shows that the proposed framework performs utmost.


2011 ◽  
Vol 55 ◽  
pp. 117-130
Author(s):  
Angelė Pečeliūnaitė

Informacinės komunikacinės technologijos sparčiai vystosi ir tobulėja. Debesų kompiuterija (Cloud Computing) yra dar viena naujovė, sparčiai pradėjusi plisti XXI a. pradžioje. Debesų kompiuterija – tai galimybė naudotis kompiuterine ir programine įranga internete ir mokėti tik už tai, kiek teikiama paslauga buvo pasinaudota. Debesų kompiuterijos paslaugos pirmiausia buvo orientuotos į verslą. Šio straipsnio tikslas – apžvelgti debesų technologijas ir jų teikiamas galimybes akademinei bendruomenei – studijoms, mokslui, bendradarbiavimui ir mokslinei komunikacijai. Analizuojamos trijų korporacijų siūlomos paslaugos, kreipiant dėmesį į paslaugų įvairovę, galimybes rengti projektus, konferencijas etc., technologijos saugumą, mobilumą ir paslaugų kainą. Tyrimo išvadose pabrėžiama, kad debesų kompiuterija yra patraukli mokslui ir studijoms. Debesį galima panaudoti studijoms, moksliniam darbui, bendradarbiavimui ir mokslinėje komunikacijoje, tik svarbu pasirinkti poreikius tenkinantį atitinkamą debesį.Pagrindiniai žodžiai: debesų technologijos, debesų kompiuterija, viešas ir privatus debesis, virtualus privatus tinklas, SaaS, PaaS, IaaS, virtualizacijos procesai, duomenų centrai, Microsoft Office 365, Microsoft Web Apps, Zoho debesis, Google Apps studijoms, mokslo komunikacija.Cloud Computing: The job, co-operation and communication Does Cloud Meet the Needs of Students and Scholars?Angelė Pečeliūnaitė SummaryThe information and communication technologies are rapidly evolving and progressing. Cloud computing is one of the innovations that began rapidly spreading from the beginning of the 21st century. The article summarizes the cloud computing paradigm, an introduction to cloud computing platforms, the cloud service offered by the cloud providers, and highlights the attractive features of this technology. The collaboration and communication methods in the cloud are discussed. The cloud computing services were primarily focused on business. The aim of the article is an overview of the cloud technologies and opportunities for the academic community – in studies, research, col-laboration and scientific communication.Delic divides research into three significant periods: empirical, theoretical, and experimental/simulation (Delic et al., 2010, p. 3). This article falls within the third study phase: an experimen-tal study comparing the services of three selected cloud providers. We analyze the cloud services of Zoho Web Apps, Microsoft Web Apps and Google Apps for Education according to the selected five categories (information gathered from web sites and company experts speaking): education in a variety of services offered working with documents and projects, scientific communication and col-laboration, data protection, mobility and price.The results have shown that cloud services are attractive to the educational community. The largest variety of service diversity and performance improvements are offered by the Microsoft and Zoho clouds on the SaaS and PaaS platforms. Zoho is a leader of these cloud services. The most attractive environment for scientific communication and collaboration (including mobility) is the Microsoft cloud. Data protection takes care of all service providers: SLA of 99.9% guarantee. Zoho uses web encryption for 256-bit SSL, and Microsoft 128-bit SSL / TSL. Google Apps for Education is in many ways behind the above-mentioned corporations, while Google's cloud services are offered to meet students' needs; services are provided free of charge.The investigation was conducted in December 1–15, 2010.


2015 ◽  
Vol 2015 ◽  
pp. 1-15 ◽  
Author(s):  
Lifa Wu ◽  
Shengli Zhou ◽  
Zhenji Zhou ◽  
Zheng Hong ◽  
Kangyu Huang

In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.


2021 ◽  
pp. 382-418
Author(s):  
Johan David Michels ◽  
Ian Walden

This chapter addresses the emerging regulatory framework for cybersecurity and considers its implications for the provision and use of cloud services. It focuses on cybersecurity measures that target service providers on whom large numbers of consumers and businesses depend, rather than measures triggered by the nature of the data being processed. The chapter first reviews the main elements of the Network and Information Systems (NIS) Directive, one of the principal cybersecurity instruments in the EU. It then examines how cloud providers are regulated as Digital Service Providers (DSPs) under the NIS Directive. Cloud providers are also indirectly regulated by the NIS Directive, when they form part of the supply chain of a regulated operator of essential services (OES), the primary target of the measure. The chapter also looks at other EU legal instruments that impose cybersecurity requirements in relation to specific sectors and activities. Finally, it considers concerns that this new regulatory framework may lead to only incremental improvements in the cybersecurity of Europe's critical infrastructure and digital services, while generating substantial compliance activity, aimed at placating regulators and reassuring the general public.


2019 ◽  
Vol 8 (2) ◽  
pp. 2079-2084

Nowadays cloud computing is a driving force which has a large impact on each aspect of our lives and widely used in today's business structure. With its capacity and capability, it is widely accepted by many organizations and users. Cloud computing provides numerous benefits to end users and companies in terms of cost, maintenance, management due to which many organizations prefer to use its services with open hands. With the increasing demand, day-by-day service providers also increased and the user has a choice to choose the best one based on their demand Cloud Storage is one such service that provides cost effective storage solution to the users. They provide unlimited storage to the users based on the requirement and charge according to that only. User can rely on them for the storage but apart from the numerous benefits security and privacy remains the biggest concern whenever a user moves to cloud services. Security triad comprises of authentication, Integrity, and availability remains the concern for every user while moving towards cloud-based services. Almost everyday industry and academician working on finding an effective and efficient way, which could provide secure migration of user data in the cloud. One of the solutions could be the use of cryptographic techniques to provide data security. Cryptography is accepted largely to ensure the privacy and security of data in cloud computing. In this paper, several cryptographic technique discussed which are expected to provide the solution to the user's problem when they tend to move towards cloud computing.


2018 ◽  
Vol 17 ◽  
pp. 03028 ◽  
Author(s):  
Jing Li ◽  
Qinyuan Li

Cloud computing has attracted more and more attention as it reduces the cost of IT infrastructure of organizations. In our country, business Cloud services, such as Alibaba Cloud, Huawei Cloud, QingCloud, UCloud and so on are gaining more and more uses, especially small or median organizations. In the cloud service scenario, the program and data are migrating into cloud, resulting the lack of trust between customers and cloud service providers. However, the recent study on Cloud computing is mainly focused on the service side, while the data security and trust have not been sufficiently studied yet. This paper investigates into the data security issues from data life cycle which includes five steps when an organization uses Cloud computing. A data management framework is given out, including not only the data classification but also the risk management framework. Concretely, the data is divided into two varieties, business and personal information. And then, four classification levels (high, medium, low, normal) according to the different extent of the potential adverse effect is introduced. With the help of classification, the administrators can identify the application or data to implement corresponding security controls. At last, the administrators conduct the risk assessment to alleviate the risk of data security. The trust between customers and cloud service providers will be strengthen through this way.


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 563
Author(s):  
Babu Rajendiran ◽  
Jayashree Kanniappan

Nowadays, many business organizations are operating on the cloud environment in order to diminish their operating costs and to select the best service from many cloud providers. The increasing number of Cloud Services available on the market encourages the cloud consumer to be conscious in selecting the most apt Cloud Service Provider that satisfies functionality, as well as QoS parameters. Many disciplines of computer-based applications use standardized ontology to represent information in their fields that indicate the necessity of an ontology-based representation. The proposed generic model can help service consumers to identify QoS parameters interrelations in the cloud services selection ontology during run-time, and for service providers to enhance their business by interpreting the various relations. The ontology has been developed using the intended attributes of QoS from various service providers. A generic model has been developed and it is tested with the developed ontology.


Sign in / Sign up

Export Citation Format

Share Document