Advances in Systems Analysis, Software Engineering, and High Performance Computing - Advanced Research on Cloud Computing Design and Applications
Latest Publications


TOTAL DOCUMENTS

20
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781466686762, 9781466686779

Author(s):  
Saswati Sarkar ◽  
Anirban Kundu

In this chapter, Cloud disk searching technique is going to be proposed. Cloud based searching mechanism shows the utility of indexing, balancing, and data storage in cloud. The Chapter exhibits complexity of cloud based searching algorithms in real-time scenario. The proposed cloud based disk searching technique using parallel channels is searching data in less time consumption.Comparison graphs have been demonstrated for time difference realization in cloud. Parallel concepts have been introduced to facilitate searching the cloud. Sequential and several parallel situations have been compared using time graphsLoad balance monitoring, data searching and data accessing in less time have been introduced in this chapter.


Author(s):  
Sutirtha Kumar Guha ◽  
Anirban Kundu ◽  
Rana Dattagupta

In this chapter a domain based ranking methodology is proposed in cloud environment. Web pages from the cloud are clustered as ‘Primary Domain' and ‘Secondary Domain'. ‘Primary' domain Web pages are fetched based on the direct matching with the keywords. ‘Primary Domain' Web pages are ranked based on Relevancy Factor (RF) and Turbulence Factor (TF). ‘Secondary Domain' is constructed by Nearest Keywords and Similar Web pages. Nearest Keywords are the keywords similar to the matched keywords. Similar Web pages are the Web pages having Nearest Keywords. Matched Web pages of ‘Primary' and ‘Secondary' domain are ranked separately. A wide range of Web pages from the cloud would be available and ranked more efficiently by this proposed approach.


Author(s):  
Stuart Dillon ◽  
Florian Stahl ◽  
Gottfried Vossen

Cloud services are ubiquitous today and increasingly used for a variety of purposes, including personal and professional communication, social networking, media streaming, calendar management, file storage etc. In recent years, a fast evolution of cloud services from private applications to corporate usage has been observed. This has led to the question of how private and business cloud services can be dual-accessed through a single device, in particular a mobile device that is used as part of a BYOD (Bring Your Own Device) policy. This chapter considers the issues that arise from a consolidation of private and professional applications when accessed from a single device and introduces the term “personal cloud” to characterise such situations. It also surveys recent work in the field and finally presents an approach to cloud governance from a business perspective focusing in particular on security tokens, hardware keys and smart containers, thereby providing a glimpse into the future of IT service personalization.


Author(s):  
Abdullah El-Haj ◽  
Shadi Aljawarneh

The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System (MPDS) which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices.


Author(s):  
Sanjay P. Ahuja ◽  
Thomas F. Furman ◽  
Kerwin E. Roslie ◽  
Jared T. Wheeler

There are several public cloud providers that provide service across different cloud models such as IaaS, PaaS, and SaaS. End users require an objective means to assess the performance of the services being offered by the various cloud providers. Benchmarks have typically been used to evaluate the performance of various systems and can play a vital role in assessing performance of the different public cloud platforms in a vendor neutral manner. Amazon's EC2 Service is one of the leading public cloud service providers and offers many different levels of service. The research in this chapter focuses on system level benchmarks and looks into evaluating the memory, CPU, and I/O performance of two different tiers of hardware offered through Amazon's EC2. Using three distinct types of system benchmarks, the performance of the micro spot instance and the M1 small instance are measured and compared. In order to examine the performance and scalability of the hardware, the virtual machines are set up in a cluster formation ranging from two to eight nodes. The results show that the scalability of the cloud is achieved by increasing resources when applicable. This chapter also looks at the economic model and other cloud services offered by Amazon's EC2, Microsoft's Azure, and Google's App Engine.


Author(s):  
Goknur Arzu Akyuz ◽  
Mohammad Rehan

Cloud concept is directly related with the beyond-ERP integrity and collaboration across a number of heterogeneous Supply Chain (SC) partner infrastructures. The technology enables partners to form a collaborative SC community without the burden of significant IT investment. Cloud applications offer significant opportunities from SC perspective, and the assimilation of the Cloud Technology is not complete yet in the Supply Chain domain. It also involves various barriers from implementation perspective, as well as the concerns related with vendor lock-in, security, reliability, privacy and data ownership. This chapter provides a comprehensive coverage of the opportunities and barriers as well as the generic treatment from SC perspective. It also highlights how the cloud technology represents a perfect fit with the ideas of ‘Collaborative Supply Chains', ‘Business Process Outsourcing' and ‘long-term strategic partnerships, which are the key themes characterizing the Supply Chains of today's era. This chapter reveals that the intersection of the topics ‘Cloud computing' and ‘Supply Chain' is a promising area for further research. Further studies in a multi-partner setting with respect to a variety of configurations, case studies and applications, as well as the security, reliability and data ownership issues are justified.


Author(s):  
Jeffrey Chang ◽  
Mark Johnston

Cloud computing refers to a scalable network infrastructure where consumers receive IT services such as software and data storage through the Internet on a subscription basis. Potential benefits include cost savings, simpler IT and reduced energy consumption. The UK government and local authorities, like commercial organisations, are considering cloud-based services. Concerns have been raised, however, over issues such as security, access, data protection and ownership. This study attempts to investigate the likely impact of cloud computing on local government based on a conceptual framework and case studies of four London borough councils. It reveals that the concept of cloud computing is new and not clearly understood. Local authorities, who face further cuts in government funding, welcome a cloud-based IT infrastructure which may lead to considerable savings. Yet local government is conservative, so with their risk-adverse attitude local authorities are more likely to adopt a hybrid approach to implementation.


Author(s):  
Amruta More ◽  
Sheetal Vij ◽  
Debajyoti Mukhopadhyay

The research in the area of automated negotiation systems is going on in many universities. This research is mainly focused on making a practically feasible, faster and reliable E-negotiation system. The ongoing work in this area is happening in the laboratories of the universities mainly for training and research purpose. There are number of negotiation systems such as Henry, Kasbaah, Bazaar, Auction Bot, Inspire, Magnet. Our research is based on making an agent software for E-negotiation which will give faster results and also is secure and flexible. Cloud Computing provides security and flexibility to the user data. Using these features we propose an E-negotiation system, in which, all product information and agent details are stored on the cloud. This system proposes three conditions for making successful negotiation. First rule based, where agent will check user requirements with rule based data. Second case based, where an agent will see case based data to check any similar previous negotiation case is matching to the user requirement. Third bilateral negotiation model, if both rules based data and case based data are not matching with the user requirement, then agent use bilateral negotiation model for negotiation. After completing negotiation process, agents give feedback to the user about whether negotiation is successful or not. Using rule based reasoning and case based reasoning this system will improve the efficiency and success rate of the negotiation process.


Author(s):  
Shadi Aljawarneh

The research community found that a software system should be evolved once every few months to ensure it is adapted to the real-world environment. The system evolution requires regularly amendments that append, delete, or alter features. It also migrates or converts the software system from one operating platform to another. These amendments may result in requirements/ specifications that were satisfied in a previous release of a software system not being satisfied in the subsequent versions. As a result, software evolutionary changes violate security requirements, and then a system may become vulnerable to different kinds of attacks. In this paper, concepts and visions are presented to avoid/minimize the Cloud security issues.


Author(s):  
Bassam Al-Shargabi ◽  
Omar Sabri

the motivation behind this chapter is that Service Oriented architecture issued to compose an application as a set of services that are language and platform independent, communicate with each other, Therefore, user preferences rules in web service composition process plays crucial role and has opened a wide spectrum of challenge, In this chapter, an agent for composing web services based on user preferences was introduced to fulfill a certain process, where the user preferences are essential for determining which web service are to be selected. In other word, the agent designed to maintain the following function: an intelligent web services selection and planning based on user preferences(such as price or availability), along with web services execution, tracking and adaptation.


Sign in / Sign up

Export Citation Format

Share Document