scholarly journals Efficiency of Semantic Web Implementation on Cloud Computing: A Review

2021 ◽  
Vol 1 (3) ◽  
pp. 1-9
Author(s):  
Kazheen Ismael Taher ◽  
Rezgar Hasan Saeed ◽  
Rowaida Kh. Ibrahim ◽  
Zryan Najat Rashid ◽  
Lailan M. Haji ◽  
...  

Semantic web and cloud technology systems have been critical components in creating and deploying applications in various fields. Although they are self-contained, they can be combined in various ways to create solutions, which has recently been discussed in depth. We have shown a dramatic increase in new cloud providers, applications, facilities, management systems, data, and so on in recent years, reaching a level of complexity that indicates the need for new technology to address such tremendous, shared, and heterogeneous services and resources. As a result, issues with portability, interoperability, security, selection, negotiation, discovery, and definition of cloud services and resources may arise. Semantic Technologies, which has enormous potential for cloud computing, is a vital way of re-examining these issues. This paper explores and examines the role of Semantic-Web Technology in the Cloud from a variety of sources. In addition, a "cloud-driven" mode of interaction illustrates how we can construct the semantic web and provide automated semantical annotations to web applications on a large scale by leveraging Cloud computing properties and advantages.

Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Author(s):  
Advokat Lars Perhard

Cloud Sweden is a story about how a group of experienced IT-people from different sectors of the industry came together and discussed a relatively new phenomenon called the Cloud; or what is today labelled as Cloud computing. And they realised there was a tremendous momentum and potential prosperity connected to it. They also concluded that in order to support potential users and to promote Sweden as an IT-oriented country in the forefront of the development there was a need for information – organisations considering migrating their IT functions to the Cloud should at least be able to make an informed decision. There are significant advantages with this new technology, but also a number of pitfalls that any user should be aware of. There were for example critical security issues at hand before when the servers were placed within the four walls of the office and there still are critical security issues relating to the Cloud. However, the issues to solve are different. Cloud Sweden was founded and the different branches of the group have produced a number of documents published on its website. Cloud Sweden has apart from a number of members working actively in the steering and competence groups several thousand members from the industry in a Linkedin network. In this article you will find a sample of what the legal group of Cloud Sweden has produced – a primer of legal issues that a migrant shall pay attention to before the leap into the Cloud. 


2012 ◽  
Vol 6-7 ◽  
pp. 143-148
Author(s):  
Jiao Li

The main purpose of writing this paper is to introduce the application of a new technology and business model--cloud computing to enterprises which are undertaking or will undertake the construction and operation of information management system, in order to solve the problems of high investment and low efficiency in information system construction and operation. The paper makes a general introduction to cloud computing, discusses the influence of cloud computing on enterprises taking into account the actual problems of enterprises, and puts an emphasis on how to use cloud computing for information management innovation. The paper puts forward a brand-new mode of enterprise information management - cloud services and points out the commercial application value of cloud computing, and enterprises can use the ideas in this paper for important reference in the process of information management innovation.


2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Vasileios Moysiadis ◽  
Panagiotis Sarigiannidis ◽  
Ioannis Moscholios

In the emerging area of the Internet of Things (IoT), the exponential growth of the number of smart devices leads to a growing need for efficient data storage mechanisms. Cloud Computing was an efficient solution so far to store and manipulate such huge amount of data. However, in the next years it is expected that Cloud Computing will be unable to handle the huge amount of the IoT devices efficiently due to bandwidth limitations. An arising technology which promises to overwhelm many drawbacks in large-scale networks in IoT is Fog Computing. Fog Computing provides high-quality Cloud services in the physical proximity of mobile users. Computational power and storage capacity could be offered from the Fog, with low latency and high bandwidth. This survey discusses the main features of Fog Computing, introduces representative simulators and tools, highlights the benefits of Fog Computing in line with the applications of large-scale IoT networks, and identifies various aspects of issues we may encounter when designing and implementing social IoT systems in the context of the Fog Computing paradigm. The rationale behind this work lies in the data storage discussion which is performed by taking into account the importance of storage capabilities in modern Fog Computing systems. In addition, we provide a comprehensive comparison among previously developed distributed data storage systems which consist of a promising solution for data storage allocation in Fog Computing.


2011 ◽  
Vol 20 (06) ◽  
pp. 1083-1106 ◽  
Author(s):  
ATE PENDERS ◽  
GREGOR PAVLIN ◽  
MICHIEL KAMERMANS

This paper introduces a new collaborative approach to construction of large scale service oriented systems supporting distributed reasoning. In particular, we assume systems in which complex situation assessment is carried out through composition of heterogeneous services, each specialized for a particular type of analysis. Different services are composed automatically by using service discovery and negotiation. One of the major challenges in such settings is efficient definition of a large number of different types of services. The presented solution supports efficient definition of services by using a combination of light weight service ontologies, efficient construction procedures and tools. In particular, machine-understandable descriptions of heterogeneous services with well defined syntax and semantics can be created by multiple designers, without complex coordination of collaborative design processes and without any knowledge of formal ontologies.


2014 ◽  
Vol 20 (4) ◽  
pp. 409-433 ◽  
Author(s):  
Issam Kouatli

Purpose – The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility of happening with that of new technologies like cloud computing with Mobility access. Cloud computing is a new structure of IT that is becoming the main part of the new model of business environment. However, issues regarding such new hype of technology do not come without obstacles. These issues have to be addressed before full acceptability of cloud services in a globalized business environment. Businesses need to be aware of issues of concerns before joining the cloud services. This paper also highlights these issues and shows the comparison table to help businesses with appropriate decision-making when joining the cloud. Design/methodology/approach – A historical review of emerged vulnerabilities as IT systems evolved was conducted, then these vulnerabilities were categorized into eight different categories, each of which composed of multiple vulnerability types. Simple scoring techniques were used to build a “risk” analysis table where each vulnerability type was given a score based on availability of matured solution and the likeliness of happening, then in case of vulnerability type, another score was used to derive the impact of such vulnerability. The resulted weighted score can be derived from the multiplication of likeliness to happen score with that of its impact in case it did happen. Percentage of seriousness represented by the percentage of the derived weighted score of each of the vulnerabilities can then be concluded. Similar table was developed for issues related to cloud computing environment in specific. Findings – After surveying the historical background of IT systems and emerged vulnerabilities as well as reviewing the common malicious types of system vulnerabilities, this paper identifies 22 different types of vulnerability categorized in eight different categories. This comparative study explores amount of possible vulnerabilities in new technology like cloud computing services. Specific issues for cloud computing were also explored and a similar comparative study was developed on these issues. The result of the comparative study between all types of vulnerabilities since the start of IT system development till today’s technology of cloud computing, shows that the highest percentage vulnerability category was the one related to mobility access as mobile applications/systems are relatively newly emerged and do not have a matured security solution(s). Practical implications – Learning from history, one can conclude the current risk factor in dealing with new technology like cloud computing. Businesses can realize that decision to join the cloud requires thinking about the issues mentioned in this paper and identifying the most vulnerability types to try to avoid them. Originality/value – A new comparative study and new classification of vulnerabilities demonstrated with risk analysis using simple scoring technique.


The introduction of cloud computing has revolutionized business and technology. Cloud computing has merged technology and business creating an almost indistinguishable framework. Cloud computing has utilized various techniques that have been vital in reshaping the way computers are used in business, IT, and education. Cloud computing has replaced the distributed system of using computing resources to a centralized system where resources are easily shared between user and organizations located in different geographical locations. Traditionally the resources are usually stored and managed by a third-party, but the process is usually transparent to the user. The new technology led to the introduction of various user needs such as to search the cloud and associated databases. The development of a selection system used to search the cloud such as in the case of ELECTRE IS and Skyline; this research will develop a system that will be used to manage and determine the quality of service constraints of these new systems with regards to networked cloud computing. The method applied will mimic the various selection system in JAVA and evaluate the Quality of service for multiple cloud services. The FogTorch search tool will be used for quality service management of three cloud services.


2017 ◽  
Vol 7 (6) ◽  
pp. 2268-2272
Author(s):  
B. Heydari ◽  
M. Aajami

Due to its efficient, flexible, and dynamic substructure in information technology and service quality parameters estimation, cloud computing has become one of the most important issues in computer world. Discovering cloud services has been posed as a fundamental issue in reaching out high efficiency. In order to do one’s own operations in cloud space, any user needs to request several various services either simultaneously or according to a working routine. These services can be presented by different cloud producers or different decision-making policies. Therefore, service management is one of the important and challenging issues in cloud computing. With the advent of semantic web and practical services accordingly in cloud computing space, access to different kinds of applications has become possible. Ontology is the core of semantic web and can be used to ease the process of discovering services. A new model based on ontology has been proposed in this paper. The results indicate that the proposed model has explored cloud services based on user search results in lesser time compared to other models.


Cloud computing is a computing tool for humankind. In recent years, it is using to generate IT services, appliances for higher activities computing and outsourcing in a cost-efficient and flexible way. In modern times, a variety of types of bandwidth eater are growing speedily Cloud computing is growing phenomenal gradually to supply the different kinds of cloud services and applications to the internet-based customer. Cloud computing utilizes Internet applications to execute the large-scale jobs. The most important objective of cloud computing is to allocate and calculate different services transparently throughout a scalable network of machines. Load balancing is one of the significant issues in Cloud Computing. Loads should be divided as CPU load, the capacity of memory and system load which is the measurement of work that a computation system performs. Load balancing is a modern method where the load is being shared amongst several machines of a distributed system to enhance the utilization of various applications and response time of multiple tasks and prevent overloading situation and under loading situation. In or approach, we developed an algorithm, LBMMS, which combines all least completion time. For this study, LBMMS presents the proficient deployment of various resources in cloud computing


2020 ◽  
pp. 1750-1769
Author(s):  
Alexandru Aurel Costan ◽  
Bogdan Iancu ◽  
Petru Cosmin Rasa ◽  
Alexandru Radu ◽  
Adrian Peculea ◽  
...  

Cloud computing is considered the next step in the evolution of technological applications, services and products development, in the Future Internet and Internet of Things context. The permanent connection of users to the Internet has become widespread, so almost all available resources (data, software) can be placed on the Internet, shared between users - sometimes completely independently of others, and brought from the Internet to the user's computer on demand. The chapter highlights the benefits of using hybrid technology with a focus towards entrepreneurs and business innovators. Intercloud systems are built of heterogeneous services, offered by different providers of cloud computing. To emphasize the business opportunities offered by innovative Intercloud approaches, an architecture for the interconnection of cloud services offered by multiple cloud providers, with applications to e-health, is presented. The main concepts and business benefits of using Intercloud systems and an architecture for interconnecting cloud services from multiple cloud providers is described.


Sign in / Sign up

Export Citation Format

Share Document