Top PDF Analysis of interoperability and standards for cloud computing

Analysis of interoperability and standards for cloud computing

Analysis of interoperability and standards for cloud computing

Abstract : Cloud interoperability will enable cloud infrastructures to evolve into a worldwide, transparent platform in which applications aren’t restricted to enterprise clouds and cloud service providers. We must build new standards and interfaces that will enable enhanced portability and flexibility of virtualized applications. Cloud computing in computer science in recent times is considered as one of the emerging areas. This flexible infrastructure is providing excellent facilities for business entrepreneurs. Cloud computing offers the IT industry, however, has yet to be satisfactory research and development in this area. Our contribution in this paper focuses on the concept of cloud computing is one of the most advanced new technology for computer world. In this paper we analyze what are the different standards for cloud infrastructure and also study how interoperability is important factor in cloud environment. Cloud interoperability refers to customers’ ability to use the same artifacts, such as management tools, virtual server images, and so on, with a variety of cloud computing providers and platforms.
Mostrar mais

4 Ler mais

Benchmarking undedicated cloud computing providers for analysis of genomic datasets.

Benchmarking undedicated cloud computing providers for analysis of genomic datasets.

A major bottleneck in biological discovery is now emerging at the computational level. Cloud computing offers a dynamic means whereby small and medium-sized laboratories can rapidly adjust their computational capacity. We benchmarked two established cloud computing services, Amazon Web Services Elastic MapReduce (EMR) on Amazon EC2 instances and Google Compute Engine (GCE), using publicly available genomic datasets (E.coli CC102 strain and a Han Chinese male genome) and a standard bioinformatic pipeline on a Hadoop-based platform. Wall-clock time for complete assembly differed by 52.9% (95% CI: 27.5–78.2) for E.coli and 53.5% (95% CI: 34.4–72.6) for human genome, with GCE being more efficient than EMR. The cost of running this experiment on EMR and GCE differed significantly, with the costs on EMR being 257.3% (95% CI: 211.5–303.1) and 173.9% (95% CI: 134.6–213.1) more expensive for E.coli and human assemblies respectively. Thus, GCE was found to outperform EMR both in terms of cost and wall-clock time. Our findings confirm that cloud computing is an efficient and potentially cost-effective alternative for analysis of large genomic datasets. In addition to releasing our cost-effectiveness comparison, we present available ready-to-use scripts for establishing Hadoop instances with Ganglia monitoring on EC2 or GCE.
Mostrar mais

5 Ler mais

Cloud Computing & Grid Computing Environments

Cloud Computing & Grid Computing Environments

In this paper, we show that Clouds and Grids share a lot commonality in their vision, architecture and technology, but they also differ in various aspects such as security, programming model, business model, compute model, data model, applications, and abstractions. We also identify challenges and opportunities in both fields. We believe a close comparison such as this can help the two communities understand, share and evolve infrastructure and technology within and across, and accelerate Cloud Computing from early prototypes to production systems. What does the future hold? We will hazard a few predictions, based on our beliefs that the economics of computing will look more and more like those of energy. Neither the energy nor the computing grids of tomorrow will look like yesterday’s electric power grid. “Cloud” or “Grid”, we will need to support on-demand provisioning and configuration of integrated “virtual systems” providing the precise capabilities needed by an end-user. We will need to define protocols that allow users and service providers to discover and hand off demands to other providers, to monitor and manage their reservations, and arrange payment. We will need tools for managing both the underlying resources and the resulting distributed computations. We will need the centralized scale of today’s Cloud utilities, and the distribution and interoperability of today’s Grid facilities. Unfortunately, at least to date, the methods used to achieve these goals in today’s commercial clouds have not been open and general purpose, but instead been mostly Company.
Mostrar mais

5 Ler mais

Analysis on Digital Crime and Emergence of Technical Challenges with Cloud Computing

Analysis on Digital Crime and Emergence of Technical Challenges with Cloud Computing

4.3. Risk with the Cloud: Security risks listed by the network and information security agency in a report on the cloud possibly attack on isolation mechanisms the compromising of management interfaces would give attackers access to a potentially greater set of resources than in traditional networked computing and possibility of a malicious insider within a cloud service provider. All the arguably an exacerbation of traditional information security concerns rather than something brought about exclusively by cloud computing mentioned operation high roller fraud based on denial of service attack to make a machine or network resource unavailable to its intended users that has nothing specific to the cloud. Cloud computing infrastructure is indeed today almost exclusively owned by private companies’ aspects and commercial interests should not be underestimated some of cloud services US based company Amazon for instance is presumed to account for 1% of all internet consumer traffic. Traditional frauds such as tax welfare fraud cost citizens a few hundred dollars a year with such crime the costs of defence monetary equivalent of prevention much less than the amounts stolen. Transitional frauds such as payment card fraud cost citizens a few tens of dollars a year online payment card fraud typically runs at basic points of turnover of e- commerce firms.
Mostrar mais

6 Ler mais

Cloud Computing and Agricultural Development of China: Theory and Practice

Cloud Computing and Agricultural Development of China: Theory and Practice

Cloud computing applications in agriculture makes agricultural producers do not need too much hardware and software investment, do not need to master advanced knowledge of computer and network technology; they can enjoy a more professional and more comprehensive services. The client just need to send the request to the cloud, then resources dispatch center will analysis and handle dynamically, and finally the corresponding processing results will be passed back to the client. For this calculation, the user does not need to know the calculation principle and process, simply according to the amount to pay. Agricultural producers can get planting and breeding techniques, pest control knowledge, and can also track and monitor the whole process of animals and plants from production, circulation to consumption, to achieve the scientific method in market forecasting, business decision-making, information collection and logistics.
Mostrar mais

6 Ler mais

Cloud Computing: A study of cloud architecture and its patterns

Cloud Computing: A study of cloud architecture and its patterns

The traditional model of application-centric access control, where each application keeps track of its collection of users and manages them, is not feasible in cloud based architectures. This is more so, because the user space maybe shared across applications that can lead to data replication, making mapping of users and their privileges a herculean task. Also, it requires the user to remember multiple accounts/passwords and maintain them. Cloud requires a user centric access control where every user request to any service provider is bundled with the user identity and entitlement information [8]. User identity will have identifiers or attributes that identity and define the user. The identity is tied to a domain, but is portable. User centric approach leaves the user with the ultimate control of their digital identities. User centric approach also implies that the system maintains a context of information for every user, in order to find how best to react to in a given situation to a given user request. It should support pseudonyms and multiple and discrete identities to protect user privacy. This can be achieved easily by using one of the open standards like OpenID or SAML.
Mostrar mais

6 Ler mais

Design and Implementation of a Cloud Computing Adoption Decision Tool: Generating a Cloud Road.

Design and Implementation of a Cloud Computing Adoption Decision Tool: Generating a Cloud Road.

Generally speaking, a commonly selected criterion when it comes to analyze the adoption of cloud computing is to analyze the corresponding return on investment (ROI). Though current surveys find cloud computing highly suitable for small and medium enterprises, a deeper anal- ysis of the economic aspects of migration to cloud architecture can provide very valuable infor- mation. Thus, various types of cloud cost-benefit analysis have been reported [21–23]. An evaluation of IT infrastructures to support the decision of whether to move information sys- tems into the cloud or not was attempted in Khajeh-Hosseini et al. [24], where a Cost Modeling tool is presented and evaluated using a case study of an organization that is considering migra- tion of some of its IT systems to the cloud, analyzing the specific resource usage and the deployment options being used by a system. A more generic model, containing variables which should be applicable to any company, was presented in [25], where a ROI model is imple- mented, identifying the factors that need to be considered and returning a certain profitability valuation from the change. Here, the concept of “initial information” is considered as a sce- nario definition, based on the entity’s IT utilization level and managed data characteristics. The tool includes some intangible benefits to give a broader picture. No supporting software was developed for the tool.
Mostrar mais

20 Ler mais

ORAT FOR GREEN CLOUD COMPUTING

ORAT FOR GREEN CLOUD COMPUTING

Cloud computing services are quickly ahead in reputation. They permit the consumer to charge, only at the time when desirable, only a preferred quantity of calculating resources (processing capability and storage space capability) out of a massive distributed computing resources [9] without upsetting concerning the position or interior structures of these resources. The National Institute of Standards and Technology (NIST) recognized four necessary distinctiveness of cloud computing: resource pooling [10]. The reputation of cloud computing be obliged to amplify in the network speed, and to the reality that virtualization and network computing technologies have turn into commercially accessible. It is predictable that endeavors will hasten their movement from construction and possessing their individual systems to leasing cloud computing services [11]. To run common server resources [12], in this services “offer” for possessions as a purpose of distributed performance. Only time is calculated and scheduled for each incoming task, and random selection of resources is done [13]. In this work, an optimal resource allocation method is used for optimization of resource usage based on users’ task. III. PROPOSED OPTIMAL RESOURCE ALLOCATION TECHNIQUE FOR GREEN CLOUD COMPUTING
Mostrar mais

9 Ler mais

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES

comprehensive and commonly accepted set of standards. As a result, many standard development organizations were established in order to research and develop the specifi cations. Organizations like Cloud Security Alliance, European Network and Information Security Agency, Cloud Standards Customer Council, etc. have developed best practices regulations and recommendations. Other establishments, like Distributed Management Task Force, The European Telecommunications Standards Institute, Open Grid Forum, Open Cloud Consortium, National Institute of Standards and Technology, Storage Networking Industry Association etc., centered their activity on the development of working standards for different aspects of the cloud technology. The excitement around cloud has created a fl urry of standards and open source activity leading to market confusion. That is why certain working groups like Cloud Standards Coordination, TM Forum, etc. act to improve collaboration, coordination, information and resource sharing between the organizations acting in this research fi eld.
Mostrar mais

8 Ler mais

An analysis of the alignment of the contracts for Cloud Computing with the norms and recommendations

An analysis of the alignment of the contracts for Cloud Computing with the norms and recommendations

This study evaluated whether the content of the contracts for the provision of IT services platforms in Computer Cloud (PaaS) of some suppliers is adequate to ensure the good practices of an offer and use these services by vendors and clients. To can be auditable, the services agreements must comply with the recommendations and standards of the regulatory bodies and these must clearly be being in their contracts. Through a literature review, this study analyzed the established standards and recommendations under consideration by groups of normative research of the cloud environment. After, we conducted a study about the contractual clauses for the provision of IT services platforms in Cloud for some well- known suppliers that divulge their contracts on the web. A comparison between the recommendations and the terms of these contracts demonstrates there is still a lot to improve this relationship to provide compliance to safety auditability between both parties.
Mostrar mais

9 Ler mais

Encrypted IT Auditing and Log Management on Cloud Computing

Encrypted IT Auditing and Log Management on Cloud Computing

The data which is collected using above qualitative data collection methods is nothing but just the rough materials that researchers gathering from different aspects of world related to their research problems and questions. Qualitative data is collected in different forms like objects, photos, video recordings of behaviors, choices patterns in computer materials. But words are frequently are raw materials which are further analyzed by qualitative researchers using the different techniques of data analysis. There many methods are available for the researchers to analyze the qualitative data depending on qualitative researcher basic philosophical approach. According to Huber man and Mile, the process of qualitative data analysis is made up of three parallel flows of activities such as data display, data reduction, as well as conclusion verification or drawing. Hence most of the qualitative analysis researchers use the technique data reduction method for the analysis of collected data in order to seek the correct meaning of it for particular research. [9] [10]
Mostrar mais

4 Ler mais

Role of cloud computing in higher study

Role of cloud computing in higher study

Cloud computing in higher studies open avenues for better research, discussion and collaboration. It also provides a software desktop environment, which minimizes hardware problems. Cloud computing also enables classes to be run on remote locations. Many institutes have moved their resources online with libraries filled with hundreds of thousands of books that students can access at any time. It will expand a lot within the coming few years. Some problems such as platform security, technical standards, regulatory and other services are not well resolved yet in practice, pending further research and exploration. Either way, e-learning application model based on cloud computing will not stop its pace to proceed. As the cloud computing technologies become more sophisticated and the applications of cloud computing become increasingly widespread, e-learning will certainly usher in a new era of cloud computing.
Mostrar mais

7 Ler mais

CLOUD COMPUTING SECURITY

CLOUD COMPUTING SECURITY

To secure the structure that is to be implemented we need to come up with a security analysis process. This will include what type of assets there are to be protected from a company point of view, what threats can be run against a company, what countermeasures can be put in place to stop these attacks from taking place. When dealing with assets we need to look at what assets are we trying to protect and what properties of these assets must be protected. For dealing with threats we must look at what kind of attacks can be launched against a company with this type of structure. [8].When it comes to the topic of assets in a company we need to look at aspects such as customer data, customer applications and client computing devices. This would include confidentially, integrity and availability of the data. Confidentiality deals with the unauthorised access of data, integrity dealing with the safe enclosure of data and of course availability dealing with the data being available to the customer at all times. Types of threats include failures in provider security, attacks by a customer or hacker, availability and reliability issues. The customer must trust the provider security therefore it is essential that it be monitored regularly. [8]
Mostrar mais

6 Ler mais

Review and analysis of networking challenges in cloud computing

Review and analysis of networking challenges in cloud computing

 All the computing and storage resources of a VM are normally saved in files. To support VM migration (Medina and Garcia 2014) transparently and reliably among distinct cloud technologies, it is necessary to use a portable format to save and share the complete status information among different technologies without any compatibility problems. In this way, the Desktop Management Task Force (DMTF) has produced a specification designated by Open Virtualization Format (OVF) to completely describe the VM in a neutral and universal format for use across many vendor platforms (DMTF_a 2014).  Cloud federation is a very recent aspect in the cloud arena, fuelled by the user’s need for pervasive access to the application’s portfolio and data. Also, the application could be from a provider, and the data being used by that application can be stored in another provider. Assuming this type of emergent scenario, the providers will be much better off in terms of business if they cooperate. Therefore, the providers are likely to establish peering agreements, producing compatible APIs to offer easy access to their clouds. In fact, this could occur even before the standardization organizations produce any standards in this area. If this occurs, the provider and vendor innovation could significantly impact the successful implementation of cloud federation.
Mostrar mais

32 Ler mais

Analysis of the Health Information and Communication System and Cloud Computing

Analysis of the Health Information and Communication System and Cloud Computing

in all organisations Buble, M. et. al (2005) [1]. SWOT analysis is powerful and it can open up new possibilities in a short period of time from which numerous advantages can be gained. It is used to detect drawbacks of organisation or information system so that the perils can be suppressed and eliminated. With the help of SWOT analysis in this thesis there will be evaluation of impracticability and the possibility of acquisition of cloud computing in the health sector for the improvement of health services based on a sample (example) from thesis: de la Torre-Díez et. al (2013), Kuo, M. H. et. al (2011) and Wessella AM et. al (2013) [3],[8], [14]. For example, the thesis of Wessella AM et al (2013) clearly demonstrates the research of the usage of medicine with patients at primary healthcare with the help of electronic health record on the sample of 20 partners of research Network PPRNet [14]. PPRNet is research Network of primary care on which practical database is accessible for the users of electronic health record. Research has been conducted due to the reason of avoiding potentially unsuitable therapies and due to adverse events’ recording. This article is yet another example of successful appliance of electronic health record and it can be concluded that electronic health record can as well be very effective support system in decision making and implementing audit in the primary health care (Wesselli AM et. al, 2013) [14].
Mostrar mais

7 Ler mais

Adoção de sistemas cloud computing

Adoção de sistemas cloud computing

O modelo permite avaliar a norma subjetiva do individuo sendo função entre as expectativas percebidas e a motivação da pessoa para cumprir essas expectativas (Fishbein & Ajzen, 1975). O objetivo da TRA tende assim a explicar comportamentos intencionais. A intenção comportamental tem sido definida como a probabilidade subjetiva de um utilizador de sistemas de informação realizar um comportamento específico. A atitude refere-se ao grau de afeto que um utilizador tem em relação ao comportamento alvo. A norma subjetiva refere-se à opinião das pessoas mais importantes para o individuo relativamente a efetuar ou não o comportamento em assunto. A importância da informação é estimada através de regressões múltiplas de modo a determinar a influência causal relativa dos componentes de atitude e normativos esperando assim variações entre as diversas situações (Fishbein & Ajzen, 1975). O modelo proporciona desta forma uma teoria fundamentada sobre as ligações motivacionais entre estímulos externos e o resultado comportamental. Introduzido por Davis (1989), nasce o Modelo de Aceitação de Tecnologia, Technology Acceptance Model (TAM), desenvolvido a pensar exclusivamente nos Sistemas de Informação, com o objetivo de os avaliar no que diz respeito à sua aceitação e utilização. O Modelo sugere desta forma que quando os utilizadores estão perante uma nova tecnologia, um conjunto de fatores influenciam a sua decisão sobre quando e como a usar. O propósito de desenvolvimento do Modelo TAM surgiu de um contrato da IBM Canadá com Massachusetts Institute of Technology (MIT), nos anos 80, com o objetivo de avaliar o potencial do mercado para novos produtos da marca e possibilitar uma explicação dos fatores da
Mostrar mais

83 Ler mais

Cloud Computing para a Administração Pública Portuguesa

Cloud Computing para a Administração Pública Portuguesa

Com a crescente expansibilidade de informação a prestar e a consequente expansão das competências atribuídas à DGAL, identificada a necessidade de fazer face ao exponencial volume de trafego verificado, nos diversos websites disponibilizados, com vista à gestão eficiente do balanceador de trafego adquirido para fazer face a esta situação, o candidato, em janeiro de 2009, frequentou o curso de F5 BIG-IP Administration and Installation 19 , na empresa AFINA - Sistemas Informáticos, S.A, o qual lhe permitiu uma profunda compreensão sobre o balanceador de trafego BIG-IP LTM, assim como a sua completa instalação, configuração e gestão otimizada.
Mostrar mais

69 Ler mais

Adoption of the Guidelines for Higher Education Libraries in Portugal: contributions to assessment

Adoption of the Guidelines for Higher Education Libraries in Portugal: contributions to assessment

More recently, several institutions have updated their documents, conducting prospective reflections that help us prepare the future. ACRL (2018) updated its Standards for Libraries in Higher Education. In this guiding document, the principles are based on the main functions performed by libraries and for their evaluation. The principles are converted into performance indicators that become measurable evidence through the results obtained, and that means a periodical evaluation. This evaluation concerns institutional effec- tiveness, professional values, educational role, discovery, collections, spaces, management, administration and leadership, staff and external relations. Also, RLUK (2018) recently presented its “Reshaping Scholarship Strategic Plan 2018–2021”. Only two strategic lines guide this plan for Research Libraries in the UK:
Mostrar mais

22 Ler mais

Some methods for sensitivity analysis of systems / networks

Some methods for sensitivity analysis of systems / networks

The procedure is that, the arrange values of n parameters into a matrix of nm, and randomize elements of each column, the m input of n parameters are thus obtained. Each row of the matrix can be taken as the input values of a parameter, and use them as model input to get model output. Finally, build multivariable regression between model outputs and inputs and use regression coefficients or partial correlation coefficients as the sensitivity values of corresponding parameters. Stepwise regression is more reliable in this method (Qi et al., 2016; Zhang, 2016b).
Mostrar mais

8 Ler mais

Implementation of Cloud Computing into VoIP

Implementation of Cloud Computing into VoIP

Some service providers develop some technical method aimed to avoid the security treats from the interior. For instance, some providers limit the authority to access and manage the hardware, monitor the procedures, and minimize the number of staff who has privilege to access the vital parts of the infrastructure. However, at the provider backend, the administrator can also access the customer’s VM-machine. Security within cloud computing is an especially worrisome issue because of the fact that the devices used to provide services do not belong to the users themselves. The users have no control of, nor any knowledge of, what could happen to their data. This, however, is becoming increasingly challenging because as security developments are made, there always seems to be someone to figure out a way to disable the security and take advantage of user information.
Mostrar mais

10 Ler mais

Show all 10000 documents...