scholarly journals A File Storage Service on a Cloud Computing Environment for Digital Libraries

2012 ◽  
Vol 31 (4) ◽  
pp. 34 ◽  
Author(s):  
Victor Jesus Sosa-Sosa ◽  
Emigdio M. Hernandez-Ramirez

This paper introduces a file storage service that is implemented on a private/hybrid cloud computing environment. The entire system was implemented using open source software. The characteristic of elasticity is supported by virtualization technologies allowing to increase and to decrease the computing and storage resources based on their demand. An evaluation of performance and resource consumption was made using several levels of data availability and fault tolerance. The set of modules included in this storage environment can be taken as a reference guide for IT staff that wants to have some experience building a modest cloud storage infrastructure.

Author(s):  
Alakh K. Verma ◽  
Dipendra K. Sinha

As data center managers consider deployment of a Cloud Computing environment the most important issues they consider include critical application data availability, storage agility and data protection strategies. Early adopters of Cloud Computing have already deployed Virtualization as a key technology in their Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) offerings. Cloud computing extends the benefits of virtualization by increasing the efficiency of server and storage utilization, reducing costs, improving operational efficiency and optimizing datacenter rack and floor space. It builds on first-generation system and storage virtualization with features such as application portability and storage agility to enable higher efficiencies and greater efficiencies across the enterprise. With recent innovation in storage, key features such as thin-provisioning, compression and de-duplication work in concert with virtualized infrastructure on the Storage Appliance to eliminate duplicate data blocks, compress data and allocate the amount of storage being consumed by users. Data services such as snapshots and clones provide instant and optionally, unattended backups that can be used in the short term for recovery of critical data. Disaster recovery is all the more important within the cloud computing environment and built in replication services enable a robust solution in case of a catastrophic event or simply for purposes of backup and recovery.


Author(s):  
K. Vinod Kumar ◽  
Ranvijay Ranvijay

<p><span>Recently, the utilization of cloud services like storage, various software, networking resources has extremely enhanced due to widespread demand of these cloud services all over the world. On the other hand, it requires huge amount of storage and resource management to accurately cope up with ever-increasing demand. The high demand of these cloud services can lead to high amount of energy consumption in these cloud centers. Therefore, to eliminate these drawbacks and improve energy consumption and storage enhancement in real time for cloud computing devices, we have presented Cache Optimization Cloud Scheduling (COCS) Algorithm Based on Last Level Caches to ensure high cache memory Optimization and to enhance the processing speed of I/O subsystem in a cloud computing environment which rely upon Dynamic Voltage and Frequency Scaling (DVFS). The proposed COCS technique helps to reduce last level cache failures and the latencies of average memory in cloud computing multi-processor devices. This proposed COCS technique provides an efficient mathematical modelling to minimize energy consumption. We have tested our experiment on Cybershake scientific dataset and the experimental results are compared with different conventional techniques in terms of time taken to accomplish task, power consumed in the VMs and average power required to handle tasks.</span></p>


Author(s):  
Taskeen Zaidi ◽  
Rampratap Rampratap

Cloud computing has been widely accepted by the researchers for the web applications. During the past years, distributed computing replaced the centralized computing and finally turned towards the cloud computing. One can see lots of applications of cloud computing like online sale and purchase, social networking web pages, country wide virtual classes, digital libraries, sharing of pathological research labs, supercomputing and many more. Creating and allocating VMs to applications use virtualization concept. Resource allocates policies and load balancing polices play an important role in managing and allocating resources as per application request in a cloud computing environment. Cloud analyst is a GUI tool that simulates the cloud-computing environment. In the present work, the cloud servers are arranged through step network and a UML model for a minimization of energy consumption by processor, dynamic random access memory, hard disk, electrical components and mother board is developed. A well Unified Modeling Language is used for design of a class diagram. Response time and internet characteristics have been demonstrated and computed results are depicted in the form of tables and graphs using the cloud analyst simulation tool.


2016 ◽  
Vol 12 (S325) ◽  
pp. 353-356
Author(s):  
Changhua Li ◽  
Chenzhou Cui ◽  
Linying Mi ◽  
Boliang He ◽  
Dongwei Fan ◽  
...  

AbstractAstronomy cloud computing environment is a cyber-Infrastructure for Astronomy Research initiated by Chinese Virtual Observatory (China-VO) under funding support from NDRC (National Development and Reform commission) and CAS (Chinese Academy of Sciences). Based on virtualization technology, astronomy cloud computing environment was designed and implemented by China-VO team. It consists of five distributed nodes across the mainland of China. Astronomer can get compuitng and storage resource in this cloud computing environment. Through this environments, astronomer can easily search and analyze astronomical data collected by different telescopes and data centers , and avoid the large scale dataset transportation.


2013 ◽  
Vol 284-287 ◽  
pp. 3370-3374 ◽  
Author(s):  
Ming Shen Jian ◽  
Fu Jie Jhan ◽  
Han Chun Chang ◽  
Ta Yuan Chou ◽  
Jun Hong Shen

This paper develops a parallel and distributed evolutionary algorithm based on the cloud computing environment and feedback control algorithm to help planners solve the emergency logistic problems. The cloud environment is emulated and used as various virtual machines with different types of evolution procedures. To yield both exploration and exploitation, two crossover processes are deployed on different virtual machines. In the process of crossover, local optimal solutions can be competed and evaluated to form new populations so that the search space can be expanded and the advantaged crossover procedures can be further adopted. The proposed feedback control algorithm based on the evaluation of evolution algorithm can interact and emphasize the process with better performance. According to proposed feedback algorithm, virtual machines with different on demand formatted crossover algorithms can be dynamically established and adopted. Taking the advantage of cloud computing environment and the proposed feedback control algorithm of evolution algorithm, planners can take less effort on deploying both computation power and storage space. Also, it can further applied in various complicated applications more practically.


Cloud Computing has become a desirable state for the mobile users by providing anytime and anywhere access to various services and resources. Likewisemultimedia data such as audio, images, video and gif files covers the maximum part of the network traffic, as most of the data shared, produced, processed and stored through numerous sources such as smart phones, computers, sensor networks, satellites, medical records etc. is of multimedia type. Such form of data requires huge computing power and storage capacities along with the major security constraints. Mobile devices with limited configuration and low computing powers are not able to match with the high level computing and manipulations required by costly multimedia softwares. That’s why demand for the Multimedia Cloud Computing came into frames. As multimedia data has distinct computing, storage and security constraints, this field has become anemerging and latest area of research. Many researches have also proposed separate architectures for Multimedia Cloud Computing. Security, integrity and confidentiality of private and secret media files is always a matter of stake for cloud users as well as for cloud providers. For multimedia cloud security concerns, cryptography is a guaranteed solution.This paper has discussed about the various needs and challenges faced by the multimedia cloud providers. This work has also proposed a hybrid cryptography algorithm based end-to-end encryption (E2EE) approach to maintain integrity and confidentiality in multimedia cloud computing environment. The second last section provides a performance analysis for the algorithm in terms of tables and graphs to justify the results


Author(s):  
Khumani ◽  
Priya Roy ◽  
Swapnil ◽  
Suman Madan

In this paper our intention is to soundly preserve records into the cloud, with the aid of the usage of splitting statistics into numerous chunks and storing components of it on cloud with inside the route of a way that preserves statistics confidentiality, guarantees availability and integrity. The all at once superior use of cloud computing with inside the various corporation and IT industries offers new software program with low fee. Cloud computing is beneficial in phrases of low fee and accessibility of records. Cloud computing offers lot of blessings with low fee and of records accessibility via Internet. Ensuring the protection of cloud computing can be a outstanding take into account the cloud computing environment, as customers regularly preserve touchy records with cloud garage corporations, however the ones corporations additionally may be untrusted. So, sharing statistics in normal way at the same time as keeping statistics from an untrusted cloud stays a tough issue. Our method guarantees the protection and privateness of consumer touchy records with the aid of the usage of storing statistics at some point of unmarried cloud, with the use of AES, DES and RC2 sets. KEYWORDS— Cloud computing, Data Security, Cryptography, Storage.


Sign in / Sign up

Export Citation Format

Share Document