cloud services
Recently Published Documents





Merrihan Badr Monir Mansour ◽  
Tamer Abdelkader ◽  
Mohammed Hashem AbdelAziz ◽  
El-Sayed Mohamed EI-Horbaty

Mobile edge computing (MEC) is a new computing paradigm that brings cloud services to the network edge. Despite its great need in terms of computational services in daily life, service users may have several concerns while selecting a suitable service provider to fulfil their computational requirements. Such concerns are: with whom they are dealing with, where will their private data migrate to, service provider processing performance quality. Therefore, this paper presents a trust evaluation scheme that evaluates the processing performance of a service provider in the MEC environment. Processing performance of service providers is evaluated in terms of average processing success rate and processing throughput, thus allocating a service provider in a relevant trust status. Service provider processing incompliance and user termination ratio are also computed during provider’s interactions with users. This is in an attempt to help future service users to be acknowledged of service provider’s past interactions prior dealing with it. Thus, eliminating the probability of existing compromised service providers and raising the security and success of future interactions between service providers and users. Simulations results show service providers processing performance degree, processing incompliance and user termination ratio. A service provider is allocated to a trust status according to the evaluated processing performance trust degree.

2022 ◽  
Vol 9 (3) ◽  
pp. 564-566
WenJun Huang ◽  
PeiYun Zhang ◽  
YuTong Chen ◽  
MengChu Zhou ◽  
Yusuf Al-Turki ◽  

2022 ◽  
Vol 22 (1) ◽  
pp. 1-35
Muhammad Junaid ◽  
Adnan Sohail ◽  
Fadi Al Turjman ◽  
Rashid Ali

Over the years cloud computing has seen significant evolution in terms of improvement in infrastructure and resource provisioning. However the continuous emergence of new applications such as the Internet of Things (IoTs) with thousands of users put a significant load on cloud infrastructure. Load balancing of resource allocation in cloud-oriented IoT is a critical factor that has a significant impact on the smooth operation of cloud services and customer satisfaction. Several load balancing strategies for cloud environment have been proposed in the past. However the existing approaches mostly consider only a few parameters and ignore many critical factors having a pivotal role in load balancing leading to less optimized resource allocation. Load balancing is a challenging problem and therefore the research community has recently focused towards employing machine learning-based metaheuristic approaches for load balancing in the cloud. In this paper we propose a metaheuristics-based scheme Data Format Classification using Support Vector Machine (DFC-SVM), to deal with the load balancing problem. The proposed scheme aims to reduce the online load balancing complexity by offline-based pre-classification of raw-data from diverse sources (such as IoT) into different formats e.g. text images media etc. SVM is utilized to classify “n” types of data formats featuring audio video text digital images and maps etc. A one-to-many classification approach has been developed so that data formats from the cloud are initially classified into their respective classes and assigned to virtual machines through the proposed modified version of Particle Swarm Optimization (PSO) which schedules the data of a particular class efficiently. The experimental results compared with the baselines have shown a significant improvement in the performance of the proposed approach. Overall an average of 94% classification accuracy is achieved along with 11.82% less energy 16% less response time and 16.08% fewer SLA violations are observed.

Irina Alekseevna Vorobeva ◽  
Alexander Vladimirovich Panov ◽  
Alexander Arkadyevich Safronov ◽  
Alexey Ivanovich Sazonov

The idea of cloud computing is not a new one, it has been developed and discussed for many years. Cloud computing is a model which allows to get access to the network upon request from the set of adjustable computing services, such as infrastructure, applications and storages. Cloud services and data storage products allow their users to store and share any type of document and file from any device connected to Internet. There are several types of cloud services, which can be subdivided into: SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service). Besides, there are several deployment models, such as public, residential, hybrid or community cloud. Cloud computing models are based on modern process paradigm, which offers new alternatives to the companies of various ranges for implementation of innovative business models. With the help of these new business models small companies will be able to use cloud computing platforms and to increase gradually their computation capacities and data storage capacities depending on the requirements in real time mode, which creates a unique opportunity for market competition. Keywords— cloud computing, IaaS, OpenStack, PaaS, SaaS.

2022 ◽  
Vol 2022 ◽  
pp. 1-12
Se-Joon Park ◽  
Yong-Joon Lee ◽  
Won-Hyung Park

Recently, due to the many features and advantages of cloud computing, “cloud service” is being introduced to countless industries around the world at an unbelievably rapid pace. However, with the rapid increase in the introduction of cloud computing services, security vulnerabilities are increasing and the risk of technology leakage from cloud computing services is also expected to increase in social network service. Therefore, this study will propose an AWS-based (Amazon Web Services) security architecture configuration method that can be applied for the entire life cycle (planning, establishment, and operation) of cloud services for better security in AWS Cloud Services, which is the most used cloud service in the world. The proposed AWS security guide consists of five different areas, Security Solution Selection Guide, Personal Information Safeguard Guide, Security Architecture Design Guide, Security Configuration Guide, and Operational Security Checklist, for a safe social network. The AWS Security Architecture has been designed with three reference models: Standard Security Architecture, Basic Security Architecture, and Essential Security Architecture. The AWS Security Guide and AWS Security Architecture proposed in this paper are expected to help many businesses and institutions that are hoping to establish and operate a safe and reliable AWS cloud system in the social network environment.

2022 ◽  
Vol 2022 ◽  
pp. 1-10
Lan Zhang

With the continuous development of social economy, social sport is more and more valued and favored by the people as a universal and nationwide sport, but it should be noted that social sport involves a wide range of aspects, but due to its particularity, it is also constrained by economic development. In view of these needs and limitations, three technical methods of entropy method, RSR (rank-sum ratio), and TOPSIS are introduced, to sort out the development of social sports, national physical development, social sports guidance, and the number of people to be measured in various places based on the relevant technologies of smart cities in this paper, realize the application analysis of social sports in the public service level. This paper aims to provide a scientific evaluation and evaluation method for social sports information cloud services. The results of simulation experiments show that the evaluation of social sports information cloud service quality based on smart cities is effective, and the comprehensive application of methods can be implemented perfectly, and the further promotion and popularization of social sports services can be realized.

2022 ◽  
Vol 30 (1) ◽  
pp. 655-689
Osama Abied ◽  
Othman Ibrahim ◽  
Siti Nuur-Ila Mat Kamal

Cloud computing in governments has become an attraction to help enhance service delivery. Improving service delivery, productivity, transparency, and reducing costs necessitates governments to use cloud services. Since the publication of a review paper on cloud adoption elements in e-governments in 2015, cloud computing in governments has evolved into discussions of cloud service adoption factors. This paper concentrates on the adoption of cloud computing in governments, the benefits, models, and methodologies utilized, and the analysis techniques. Studies from 2010 up to 2020 have been investigated for this paper. This study has critically peer-reviewed articles that concentrate on cloud computing for electronic governments (e-Governments). It exhibits a systematic evaluation of the empirical studies focusing on cloud adoption studies in e-governments. This review work further categorizes the articles and exhibits novel research opportunities from the themes and unexhausted areas of these articles. From the reviewed articles, it has been observed that most of the articles have employed the quantitative approach, with few utilizing qualitative and mixed-method approaches. The results reveal that cloud computing adoption could help solve problems in learning, such as infrastructure issues, cost issues, and improve service delivery and transparency. This review gives more information on the future directions and areas that need attention, like the trust of cloud computing in e-governments.

2022 ◽  
pp. 205-224
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.

2022 ◽  
pp. 1-16
Mohammed Nasser Al-Suqri

The chapter provides an in-depth overview and analysis for developing policies and strategies for managing a pandemic based on information and data. While looking for the credibility of an information source, various parameters are subjected for considerations (i.e., infection and death rates per given time, availability of personal protective equipment [PPE], overall population attitude, current strategy response rate, society behaviors, outcomes of policies interventions for curbing the spread of the virus, and many more). To critically analyze pandemic information and data usage along with issues and challenges that arise in collecting, extracting, or using various forms of information and data for pandemic management, numerous national action plans, world health databases, pandemic monitoring smart applications, government published infection-to-death ratios, and health cloud services are interpreted and discussed.

2022 ◽  
Paul Ohagen ◽  
Sebastian Lins ◽  
Scott Thiebes ◽  
Ali Sunyaev

Sign in / Sign up

Export Citation Format

Share Document