Internet has been a driving force towards the various technologies that have been developed. Arguably, one of the
most discussed among all of these is Cloud Computing. Cloud computing is seen as a trend in the present day scenario with almost all the organizations trying to make an entry into it. It is a promising and emerging technology for the next generation of IT applications. This paper presents the evolution, history, and definition of cloud computing and also presents a comprehensive analysis of the cloud computing by explaining its services and deployment models, and identifying various characteristics of concern.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In the context of the 4.0 revolution, technology applications, especially cloud computing will have strong impacts on all areas, including accounting systems of enterprises. Cloud computing contributes to helping the enterprise accounting apparatus become compact, help automate the input process, improve the accuracy of the input data. Besides, the issur of accounting, reporting, risk control and information security also became better, contributing to improving the effectiveness of accounting. However, besides the positive impacts, businesses also face many difficulties in deploying and applying cloud computing. However, this application requirement will become an inevitable trend contributing to improving the operational efficiency of enterprises. To promote this process requires from the State as well as businesses themselves must have awareness and appropriate decisions. Breakthroughs in information technology have dramatically changed the accounting industry and the creation of financial statements. The Internet and the technologies that use the power of the Internet are playing an important role in the management and accounting activities of businesses - who always tend to be ready to receive and use public innovations technology in collecting, storing, processing and reporting information.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Opportunistic job sharing for mobile cloud computingijccsa
Cloud Computing is the evolution of new business era which is covered with many of technologies.These
technology are taking advantage of economies of scale and multi tenancy which are used to decrees the
cost of information technology resources. Many of the organization are eager to reduce their computing
cost through the means of virtualization. This demand of reducing the computing cost and time has led to
the innovation of Cloud Computing. Itenhanced computing through improved deployment and
infrastructure costs and processing time. Mobile computing & its applications in smart phones enable a
new, rich user experience. Due to extreme usage of limited resources in smart phones it create problems
which are battery problems, memory space and CPU. To solve this problem, we propose a dynamic mobile
cloud computing architecture framework to use global resources instead of local resources. In this
proposed framework the usefulness of job sharing workload at runtime reduces the load at the local client
and the dynamic throughput time of the job through Wi-Fi Connectivity.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
ABSTRACT
In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
Cloud brokering service is an intermediate service which enables the producer-consumer business model
enforcing the easy access to cloud services from Cloud Service Providers (CSPs). Cloud broker is to
provide a platform where broker collects the information from the user, analyze the data, and sends those
data to the CSPs. Cloud broker also provides data integration services and modeling the data across all the
components or units of the cloud services. This paper deals with designing criteria and issues of cloud
broker, system activity of broker, and sequence diagram of system design with implementation procedure.
Efficient architectural framework of cloud computing Souvik Pal
Cloud computing is that enables adaptive, favorable and on-demand network access to a collective pool of adjustable and configurable computing physical resources which networks, servers, bandwidth, storage that can be swiftly provisioned and released with negligible supervision endeavor or service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. However, clouds are Internet-based concept and try to disguise complexity overhead for end users. Cloud service providers (CSPs) use many structural designs combined with self-service capabilities and ready-to-use facilities for computing resources, which are enabled through network infrastructure especially the internet which is an important consideration. This paper provides an efficient architectural Framework for cloud computing that may lead to better performance and faster access.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In the context of the 4.0 revolution, technology applications, especially cloud computing will have strong impacts on all areas, including accounting systems of enterprises. Cloud computing contributes to helping the enterprise accounting apparatus become compact, help automate the input process, improve the accuracy of the input data. Besides, the issur of accounting, reporting, risk control and information security also became better, contributing to improving the effectiveness of accounting. However, besides the positive impacts, businesses also face many difficulties in deploying and applying cloud computing. However, this application requirement will become an inevitable trend contributing to improving the operational efficiency of enterprises. To promote this process requires from the State as well as businesses themselves must have awareness and appropriate decisions. Breakthroughs in information technology have dramatically changed the accounting industry and the creation of financial statements. The Internet and the technologies that use the power of the Internet are playing an important role in the management and accounting activities of businesses - who always tend to be ready to receive and use public innovations technology in collecting, storing, processing and reporting information.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Opportunistic job sharing for mobile cloud computingijccsa
Cloud Computing is the evolution of new business era which is covered with many of technologies.These
technology are taking advantage of economies of scale and multi tenancy which are used to decrees the
cost of information technology resources. Many of the organization are eager to reduce their computing
cost through the means of virtualization. This demand of reducing the computing cost and time has led to
the innovation of Cloud Computing. Itenhanced computing through improved deployment and
infrastructure costs and processing time. Mobile computing & its applications in smart phones enable a
new, rich user experience. Due to extreme usage of limited resources in smart phones it create problems
which are battery problems, memory space and CPU. To solve this problem, we propose a dynamic mobile
cloud computing architecture framework to use global resources instead of local resources. In this
proposed framework the usefulness of job sharing workload at runtime reduces the load at the local client
and the dynamic throughput time of the job through Wi-Fi Connectivity.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
ABSTRACT
In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
Cloud brokering service is an intermediate service which enables the producer-consumer business model
enforcing the easy access to cloud services from Cloud Service Providers (CSPs). Cloud broker is to
provide a platform where broker collects the information from the user, analyze the data, and sends those
data to the CSPs. Cloud broker also provides data integration services and modeling the data across all the
components or units of the cloud services. This paper deals with designing criteria and issues of cloud
broker, system activity of broker, and sequence diagram of system design with implementation procedure.
Efficient architectural framework of cloud computing Souvik Pal
Cloud computing is that enables adaptive, favorable and on-demand network access to a collective pool of adjustable and configurable computing physical resources which networks, servers, bandwidth, storage that can be swiftly provisioned and released with negligible supervision endeavor or service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. However, clouds are Internet-based concept and try to disguise complexity overhead for end users. Cloud service providers (CSPs) use many structural designs combined with self-service capabilities and ready-to-use facilities for computing resources, which are enabled through network infrastructure especially the internet which is an important consideration. This paper provides an efficient architectural Framework for cloud computing that may lead to better performance and faster access.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Emerging cloud computing paradigm vision, research challenges and development...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
Cloud computing has recently emerged as one of the buzzwords in the IT industry. Several IT vendors are promising to offer computation, data/storage, and application hosting services, offering Service-Level Agreements (SLA) backed performance and uptime promises for their services. While these „clouds‟ are the natural evolution of traditional clusters and data centers, they are distinguished by following a pricing model where customers are charged based on their utilization of computational resources, storage and transfer of data. They offer subscription-based access to infrastructure, platforms, and applications that are popularly termed as IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and SaaS (Software as a Service). In order to improve the profit of service providers we implement a technique called hybrid pricing , where this hybrid pricing model is a pooled with fixed and spot pricing techniques.
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Analysis on Business Value of Cloud ComputingIOSR Journals
Abstract: The high costs incurred in multiple supplier/Buyer transaction forms the basis for the introduction of
a high-value agent service. This type of agent-based model can lower the cost for both buyers and sellers,
including monetary, mental and physical expenditure. Cloud computing is not just about cost. It can provide a
platform for a business to achieve its ambitions of having an “inclusive” IT system that covers entire supply
chain and its customers, enabling and generating business growth more effectively.
Keywords: Cloud computing, inclusive, Supply chain
A review on serverless architectures - function as a service (FaaS) in cloud ...TELKOMNIKA JOURNAL
Emergence of cloud computing as the inevitable IT computing paradigm, the perception of the compute reference model and building of services has evolved into new dimensions. Serverless computing is an execution model in which the cloud service provider dynamically manages the allocation of compute resources of the server. The consumer is billed for the actual volume of resources consumed by them, instead paying for the pre-purchased units of compute capacity. This model evolved as a way to achieve optimum cost, minimum configuration overheads, and increases the application's ability to scale in the cloud. The prospective of the serverless compute model is well conceived by the major cloud service providers and reflected in the adoption of serverless computing paradigm. This review paper presents a comprehensive study on serverless computing architecture and also extends an experimentation of the working principle of serverless computing reference model adapted by AWS Lambda. The various research avenues in serverless computing are identified and presented.
Group seminar report on cloud computingSandhya Rathi
It is short and sobar.It contains information of
Architectural Considerations in that contains Cloud Platform, Cloud Storage, Cloud Services..... Types of Services is also contain in that
Software as a Service(SaaS) ,Platform as a Service(PaaS) , Infrastructure as a Service(IaaS)
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...Eswar Publications
In recent years, cloud computing become mainstream technology in IT industry offering new trends to software,
platform and infrastructure as a service over internet on a global scale by centralizing storage, memory and bandwidth. This new technology raises some new opportunities in producing different business operations which influence some new business benefits also some different risks issues are involved using cloud computing. This paper attempts to identify cloud computing approaches, highlights its business opportunities and help cloud computing user to analysis the cloud computing risks and to produce different solving approaches. This paper is targeted towards business and IT leaders considering a move to the cloud for some or all of their business applications.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
With a rapid growth of the mobile applications and development of cloud computing concept, mobile cloud
computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud
computing into the mobile environment and overcomes obstacles related to the performance, security etc discussed in
mobile computing. This paper gives an overview of the MCC including the definition, architecture, and applications. The
issues, existing solutions and approaches are presented.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
Method of broadcasting is the well known operation that is used for providing support to different computing protocols in cloud computing. Attaining energy efficiency is one of the prominent challenges, that is quite significant in the scheduling process that is used in cloud computing as, there are fixed limits that have to be met by the system. In this research paper, we are particularly focusing on the cloud server maintenance and scheduling process and to do so, we are using the interactive broadcasting energy efficient computing technique along with the cloud computing server. Additionally, the remote host machines used for cloud services are dissipating more power and with that they are consuming more and more energy. The effect of the power consumption is one of the main factors for determining the cost of the computing resources. With the idea of using the avoidance technology for assigning the data center resources that dynamically depend on the application demands and supports the cloud computing with the optimization of the servers in use.
Abstract Beauty of Cloud Computing is its Simplicity. A lot of visions exist for Cloud computing terminology. Here is a re-collection of facts about cloud computing. Basic approach for understanding CC technology Interview of cloud technology as well as proposal for further empirical work in modeling cloud computing technologies Index Terms: Parameters; Models; Privacy; Maintenance; Protected cloud
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Emerging cloud computing paradigm vision, research challenges and development...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
Cloud computing has recently emerged as one of the buzzwords in the IT industry. Several IT vendors are promising to offer computation, data/storage, and application hosting services, offering Service-Level Agreements (SLA) backed performance and uptime promises for their services. While these „clouds‟ are the natural evolution of traditional clusters and data centers, they are distinguished by following a pricing model where customers are charged based on their utilization of computational resources, storage and transfer of data. They offer subscription-based access to infrastructure, platforms, and applications that are popularly termed as IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and SaaS (Software as a Service). In order to improve the profit of service providers we implement a technique called hybrid pricing , where this hybrid pricing model is a pooled with fixed and spot pricing techniques.
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Analysis on Business Value of Cloud ComputingIOSR Journals
Abstract: The high costs incurred in multiple supplier/Buyer transaction forms the basis for the introduction of
a high-value agent service. This type of agent-based model can lower the cost for both buyers and sellers,
including monetary, mental and physical expenditure. Cloud computing is not just about cost. It can provide a
platform for a business to achieve its ambitions of having an “inclusive” IT system that covers entire supply
chain and its customers, enabling and generating business growth more effectively.
Keywords: Cloud computing, inclusive, Supply chain
A review on serverless architectures - function as a service (FaaS) in cloud ...TELKOMNIKA JOURNAL
Emergence of cloud computing as the inevitable IT computing paradigm, the perception of the compute reference model and building of services has evolved into new dimensions. Serverless computing is an execution model in which the cloud service provider dynamically manages the allocation of compute resources of the server. The consumer is billed for the actual volume of resources consumed by them, instead paying for the pre-purchased units of compute capacity. This model evolved as a way to achieve optimum cost, minimum configuration overheads, and increases the application's ability to scale in the cloud. The prospective of the serverless compute model is well conceived by the major cloud service providers and reflected in the adoption of serverless computing paradigm. This review paper presents a comprehensive study on serverless computing architecture and also extends an experimentation of the working principle of serverless computing reference model adapted by AWS Lambda. The various research avenues in serverless computing are identified and presented.
Group seminar report on cloud computingSandhya Rathi
It is short and sobar.It contains information of
Architectural Considerations in that contains Cloud Platform, Cloud Storage, Cloud Services..... Types of Services is also contain in that
Software as a Service(SaaS) ,Platform as a Service(PaaS) , Infrastructure as a Service(IaaS)
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...Eswar Publications
In recent years, cloud computing become mainstream technology in IT industry offering new trends to software,
platform and infrastructure as a service over internet on a global scale by centralizing storage, memory and bandwidth. This new technology raises some new opportunities in producing different business operations which influence some new business benefits also some different risks issues are involved using cloud computing. This paper attempts to identify cloud computing approaches, highlights its business opportunities and help cloud computing user to analysis the cloud computing risks and to produce different solving approaches. This paper is targeted towards business and IT leaders considering a move to the cloud for some or all of their business applications.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
With a rapid growth of the mobile applications and development of cloud computing concept, mobile cloud
computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud
computing into the mobile environment and overcomes obstacles related to the performance, security etc discussed in
mobile computing. This paper gives an overview of the MCC including the definition, architecture, and applications. The
issues, existing solutions and approaches are presented.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
Method of broadcasting is the well known operation that is used for providing support to different computing protocols in cloud computing. Attaining energy efficiency is one of the prominent challenges, that is quite significant in the scheduling process that is used in cloud computing as, there are fixed limits that have to be met by the system. In this research paper, we are particularly focusing on the cloud server maintenance and scheduling process and to do so, we are using the interactive broadcasting energy efficient computing technique along with the cloud computing server. Additionally, the remote host machines used for cloud services are dissipating more power and with that they are consuming more and more energy. The effect of the power consumption is one of the main factors for determining the cost of the computing resources. With the idea of using the avoidance technology for assigning the data center resources that dynamically depend on the application demands and supports the cloud computing with the optimization of the servers in use.
Abstract Beauty of Cloud Computing is its Simplicity. A lot of visions exist for Cloud computing terminology. Here is a re-collection of facts about cloud computing. Basic approach for understanding CC technology Interview of cloud technology as well as proposal for further empirical work in modeling cloud computing technologies Index Terms: Parameters; Models; Privacy; Maintenance; Protected cloud
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...Eswar Publications
Load balancing is a computer networking method to distribute workload across multiple computers or a computer cluster, network links, central processing units, disk drives, or other resources, to achieve optimal resource utilization, maximize throughput, minimize response time, and avoid overload. Using multiple components with load balancing, instead of a single component, may increase reliability through redundancy. The
load balancing service is usually provided by dedicated software or hardware, such as a multilayer switch or a Domain Name System server. In this paper, the existing static algorithms used for simple cloud load balancing have been identified and also a hybrid algorithm for developments in the future is suggested.
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
In this paper, fast, efficient, simple and widely used
Set Partitioned Embedded bloCK based coding is done on
Multiple Descriptions of transformed image. The maximum
potential of this type of coding can be exploited with discrete
wavelet transform (DWT) of images. Two correlated
descriptions are generated from a wavelet transformed image
to ensure meaningful transmission of the image over noise
prone wireless channels. These correlated descriptions are
encoded by set partitioning technique through SPECK coders
and transmitted over wireless channels. Quality of
reconstructed image at the decoder side depends upon the
number of descriptions received. More the number of
descriptions received at output side, more enhance the quality
of reconstructed image. However, if any of the multiple
description is lost, the receive can estimate it exploiting the
correlation between the descriptions. The simulations
performed on an image on MATLAB gives decent
performance and results even after half of the descriptions is
lost in transmission.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Addressing the cloud computing security menaceeSAT Journals
Abstract Cloud Computing is fast gaining popularity today with its scalable, flexible and on-demand service provision. It brings cost saving and agility to organization with pay-as-you-go approach. Abundant resources are available and the user has a huge range to select from. Cloud facilitates virtualization, simplification, automation and accelerated delivery of application and services for a sustainable business advantage. As much as the technological benefit, cloud computing also has security issues. Security in cloud computing is essential for providing quality of service. In this paper we address security issues which concern cloud computing environment today. We analyze Cloud Computing and security menace it faces due to different threats. Index Terms: Cloud Computing, Cloud Service Provider (CSP), Cloud Security, Cloud User, SaaS, PaaS, IaaS, StaaS
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...IJCI JOURNAL
Cloud computing is widely considered a transformative force in the computing world and is poised to
replace the traditional office setup as an industry standard. However, given the relative novelty of these
services and challenges such as the impact of physical distance on round-trip time (rtt), questions have
arisen regarding system performance and associated billing structures. The primary objective of this study
is to address these concerns. We aim to alleviate doubts by leveraging a fuzzy logic system to classify
distances between regions that support computing services and compare them with the conventional web
hosting format. To achieve this, we analyse the responses of one of these services, like amazon web
services, across different distance categories (near, medium, and far) between regions and strive to
conclude overall system performance. Our tests reveal that significant data is consistently lost during
customer transmission despite exhibiting superior round-trip times. We delve into this issue and present
our findings, which may illuminate the observed anomalous behaviour.
A challenge for security and service level agreement in cloud computingeeSAT Journals
Abstract One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing. Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
The advent of container orchestration and cloud computing, as well as associated security and compliance complexities, make it challenging for the enterprises to develop robust, secure, manageable and extendable architectures which would be applicable to the public and private cloud. The main challenges stem from the fact that on-premises, private cloud and third-party, public cloud services often have seemingly different and sometimes conflicting requirements to tenant provisioning, service deployment, security and compliance and that can lead to rather different architectures which still have a lot of commonalities but evolve independently. Understanding and bridging the functionality gaps between such architectures is highly desirable in terms of common approaches, API/SPI as well as maintainability and extendibility. The authors discuss and propose common architectural approaches to the dynamic tenant provisioning and
service orchestration in public, private and hybrid clouds focusing on deployment, security, compliance, scalability and extendibility of stateful Kubernetes runtimes.
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
The advent of container orchestration and cloud computing, as well as associated security and compliance complexities, make it challenging for the enterprises to develop robust, secure, manageable and extendable architectures which would be applicable to the public and private cloud. The main challenges stem from the fact that on-premises, private cloud and third-party, public cloud services often have seemingly different and sometimes conflicting requirements to tenant provisioning, service deployment, security and compliance and that can lead to rather different architectures which still have a lot of commonalities but evolve independently. Understanding and bridging the functionality gaps between such architectures is highly desirable in terms of common approaches, API/SPI as well as maintainability and extendibility. The authors discuss and propose common architectural approaches to the dynamic tenant provisioning and service orchestration in public, private and hybrid clouds focusing on deployment, security, compliance, scalability and extendibility of stateful Kubernetes runtimes.
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing
rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this
increasing mass of data requires more computer equipment to meet the various needs of the organizations.
To better capitalize their investment, the over-equipped organizations open their infrastructures to others by
exploiting the Internet and other important technologies such as virtualization by creating a new computing
model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the
history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources
which includes software and infrastructure with the help of virtualization. This paper presents a brief review
of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud
computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
Intellectual Point is a Global Information Technology, Training, Consulting and Software Development Company. Intellectual Point provides professional hands-on computer and IT training as well as certifications to prepare you with the marketable skills and knowledge needed for today’s competitive job market.
Similar to Advance Computing Paradigm with the Perspective of Cloud Computing-An Analytical Study (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analytical Study
1. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3257-3265 (2017) ISSN: 0975-0290
3257
Advance Computing Paradigm with the
Perspective of Cloud Computing-An Analytical
Study
Anamika Gaur
Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota,
Rajasthan, India
Email: annugaur192@gmail.com
Sangeeta Gaud
Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota,
Rajasthan, India
Email: sangeetagaud5@gmail.com
Aaditya Jain
Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota,
Rajasthan, India
Email: aadityajain58@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Internet has been a driving force towards the various technologies that have been developed. Arguably, one of the
most discussed among all of these is Cloud Computing. Cloud computing is seen as a trend in the present day
scenario with almost all the organizations trying to make an entry into it. It is a promising and emerging
technology for the next generation of IT applications. This paper presents the evolution, history, and definition of
cloud computing and also presents a comprehensive analysis of the cloud computing by explaining its services and
deployment models, and identifying various characteristics of concern.
Keywords - Cloud Computing, Characteristics, Cloud Computing Service Models, Cloud Computing Deployment
Models.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: May 31, 2017 Date of Acceptance: June 15, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
The Cloud computing is not a brand-new technology,
but today it is one of the most emerging technology due to
its powerful and important force of change the manner
data and services are managed. In today world, every
institution needs to start searching out where exactly
Cloud Computing (CC) is required in their business so that
they will gain a competitive advantage by staying and
remaining competitive in their business sector. An
exceptional characteristic of cloud computing is it pay per
use one as the cloud user is only required to pay just for
the used services [1] [2].
This paper presents a selected short review on Cloud
Computing by explaining its evolution, history, and
definition of cloud computing. This paper also provides a
literature review on concepts and deployment models of
cloud computing. The structure of this paper is organized
as follows. After the introduction, the evolution, history,
and definition of cloud computing will be given in next
section. Then, the essentials characteristics of cloud
computing will be briefly explained. Service models of
cloud computing will be discussed in next section, and
then Cloud computing deployment models will be
reviewed. The last section of the paper contains a
discussion of the roots of cloud computing, then a
conclusion, and finally, the references of the paper will be
listed.
II. EVOLUTION HISTORY AND DEFINITION OF
CLOUD COMPUTING
The Cloud computing is not exactly a new technology
concept as it seems to be originated after the computer
diagrams network that represents the internet like a cloud
[3]. The emerging technology has been very significant in
both business environment and academic environment [4].
Many definitions have been given to it in different ways
and the researcher has noticed that all these tons of
definitions mainly focused on the service and technical
characteristics. For the past few years, the most used
definitions among all the attributed definition to the CC
remain the NIST definition, which stands for the National
Institute of Standards and Technology [5]. According to
NIST on the definition of CC, it is a model which enable
suitable, on-demand access network to distribute band of
configured computing assets such as network, storages,
servers, services and application which precipitously
provisioned and released with minimum management
effort or interaction provider cloud [6]. In the other hand,
another author said that CC is a set of applications,
hardware and system software aimed to deliver good
quality of services (QoS) to the end user throughout the
used of the internet [7]. According to Bohm et al. [8],
cloud computing is an innovation that can be seen in
different ways, particularly from the technology
perspective which happens to be an advancement
computing as well as applying virtualization concepts to
2. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3257-3265 (2017) ISSN: 0975-0290
3258
be able to utilize hardware more effectively and
efficiently. He furthermore explained that cloud
computing can possibly change the way, how computing
resources and applications are cloud computing and
computing evolution provided, breaking up traditional
value chains and making room for new business models.
Cloud Computing cannot be given a general definition
because of the fact that its application is wide, therefore,
the definitions are dependent on what integration it would
be used for.
Bohm et al. [8] defined it also as an IT deployment model
that is based on virtualization in which the related
resources such as infrastructure, applications and data are
been deployed over the internet as a form of distributed
service by the service provider responsible for providing
that service. The service can also be scaled based on
individual demands, as the pricing can be flexible to the
extent that it can be on a pay-per-use basis. Another
definition given by Stavinoha [9] says that cloud
computing is a model that can be used to enable
convenient network access based on demand to a shared
pool of computing resources that is configurable (for
example, networks, servers, storage, applications, and
services) and can quickly provisioned to be released with
the most minimum management and effort from the
service provider as well as their respective interaction. For
Rashmi et al. [10] CC can be defined looking at two (2)
viewpoints such as the user and organization viewpoints.
Therefore, for the user viewpoint, CC delivers a
significant for obtaining computing based services without
the need of deeply knowing the fundamental technology
used, and for the organization it offers services for the
consumers and the business need in the easiest manner by
delivering unbounded scale and differentiated service
quality to foster speedy innovation and making decision.
The concept of CC refers to a system where the resources
of a data centre are shared by using virtualized technology
that can also deliver elastic, on-demand and instant
services to customers and let the customer pay by using
the pay per use method [11]. This definition is graphically
depicted in Fig. 1 However, according to Oliveira et al.
[12], even though CC is not totally a new concept, CC
faced a lake of standardized definition.
Different definitions from different researcher showing the
strength of CC a different perspective but all centered
around one thing: in their respective definition, they all
say it is one form of the model. This makes it very distinct
and more emphasis is laid on the model itself. Before the
models are considered, there is a need to examine the
characteristics of cloud computing critically, as it deals
and relates to the models.
Fig. 1 The schematic view of cloud computing [10]
III. CHARACTERISTICS OF CLOUD COMPUTING
Essential characteristics of cloud computing as explained
by different researchers including Dillon et al. [13], Mell
& Grance [6], Srinivas et al. [14], and Stavinoha [9].
According to the NIST definition of cloud computing,
essential characteristics of cloud computing are the
following five characteristics:
3.1 The on Demand Self Service
This is explained in terms of users, which can unilaterally
provide computing capabilities that is needed
automatically without the supervision or interaction of a
human from eachservice provider. The computing
capabilities can be server time or network storage.
3.2 The Broad Network Access
This is explained using computing capabilities that are
available via the internet or network and can be accessed
through a channeled and standard mechanism, which is put
in place to promote the use of heterogeneous platforms,
which can be either very thin or very thick. Examples of
the platforms might include smartphones, tablets, laptops,
and workstation computers.
3.3 The Resource Pooling
The computing resources of the provider are pooled to
serve multiple users using a multi-tenant model, with
different physical and virtual resources dynamically
assigned and reassigned according to consumer demand.
There is a sense of location-independence in that the
customer generally has no control or knowledge over the
exact location of the provided resources but may be able to
specify location at a higher level of abstraction (e.g.,
country, state, or data centre).
3.4 The Rapid Elasticity
In this case, computing capabilities are explained in terms
of the elasticity that is provided as well as released. The
release might be automatic in some cases in order to
actually scale inwardly and outwardly. This scaling is also
used to commensurate the demand from customers. From
the user's perspective, the capabilities that are made
3. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3257-3265 (2017) ISSN: 0975-0290
3259
available often appears as if it is unlimited which can be
appropriated in terms of quantity and time.
3.5 The Measure Service
Cloud system, in this case, is controlled and optimised
automatically with the resource that is used by the
leverage: this is a metering capability that is used as
abstraction at some point as it is seen appropriate to
theexact type of service. The resource can also be used to
do a lot more like monitoring, controlling, and also
reporting as it further provides transparency for the
provider and user as well as far as utilized service are
concerned.
Examples of service, in this case, includes storage,
processing, bandwidth, and active user accounts. Fig. 2
briefly demonstrates the essential characteristics of cloud
computing.
Fig. 2 Characteristics of cloud computing
IV. SERVICE MODELS OF CLOUD COMPUTING
According to the NIST CC consists of three principal
model services which the Software as a Service (SaaS),
the Platform as a Services (PaaS) and the Infrastructure as
a Service (IaaS) [1].
The service models of CC are made based on modern-day
data centres which integrate the three service models
which are the Software as a Service (SaaS), Platform as a
Services (PaaS) and Infrastructure as a Service (IaaS) and
provide them as utilities by letting consumers to pay just
for what they use (pay per use.) Data centres provide the
hardware in which the clouds run on and they form the
foundation of the cloud. Data centres are generally built of
numerous servers linked with each other; and are sited in
thickly crowded bands, where there is minimal risk of a
natural disaster [1].
4.1 The Software as a Service (SaaS)
Software as a Services or Software- as a Products well
known as (SaaS) is the first layer of CC service models is
the platform which enables various users at the same time
via the used of object code and data [15]. It is different
from the traditional software as it needs own traditional
software and hardware which SaaS does not need [16].
SaaS software is bought and installed into a personal
computer, like a model of distribution where applications
are accessible by vendors and providers of services, and
provide the availability of the data to the end users via a
typical platform mostly the internet. It is appropriate a
progressively predominant distribution model since it
underlined the technology that carries service-oriented
architecture (SOA) and web services advanced and
innovative developing methodologies start to become
famous. Software as a Service is moreover frequently
related to a licensing model such as pay-as-you-go
subscription. Additionally, service broadband has been
progressively accessible to sustenance end user to have
access to more regions all over the globe [17]. According
to the above statement, the best example will be Google
Docs.
4.2 The Platform as a Service (PaaS)
Platform as a Service (SaaS) model is a middleware of CC
service models which offers a platform of computing and
stack solution like a service [18]. This model allows user
or customers to build their own using software provider’s
libraries or tools and maintain the deployment of the
software and other services. the cost of this model is
reduced to businesses, as they don’t necessity to be
managed both software and hardware needed to create the
application, meaning that Platform as a Service (PaaS)
model provides applications deployment by lowered the
expenses and complication of purchasing and controlling
both hardware and software and provisioning capabilities
of hosting [19]. The example of Platform as a Service
(PaaS) examples according to the given explanation will
be SQL database, Microsoft’s Azure.
4.3 The Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) is the third service model
of CC and it is the most comprehensive. In the IaaS, the
supplier provisions the needed processing, networks
storage, and additionally necessary resources of computing
and the customers are allowed to implement and run many
sorts of software that might be needed such as operating
applications and systems. The customers do not administer
or maintain the underlined CC system but have total power
over the systems operating such as space, applications
implemented, and perhaps regulator that is limited for
networking selection components [4]. This model provides
platform as computer environment or infrastructure (both
hardware and software) for the users.
The service model is payment scheme is defined based on
the usage meaning that user only pays only for the service
the user has used the billing payment can be based on the
amount of storage per GB like the internet mobile data
used in GB, data transfer, usage of computing per hour
[20]. The suitable example of Infrastructure as a Service
(IaaS) based on the above statements is host firewalls but
beside that another examples of the IaaS is the Amazon’s
Web Services Elastic Compute Cloud (EC2) and Secure
Storage Service (S3).
Fig. 3 depicts the hierarchical view of cloud computing
service models. Based on this figure, in any of these
service models, the customers have total control over the
4. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3257-3265 (2017) ISSN: 0975-0290
3260
infrastructure’s cloud providers. Between these three
service models, it can be noticed that IaaS is the service
model that has the maximum control over the
infrastructure providers. While compared to IaaS, PaaS
has the minimum control over the infrastructure providers.
All the services offered in IaaS, are part of the cloud
provider’s responsibilities. Lastly, SaaS is an
infrastructure distributed to customers throughout a
network. The customers of this service have very
miniature control over the infrastructure. To manage and
control the fundamental infrastructure and platform is the
segment of the cloud provider’s responsibilities.
Fig. 3 Cloud computing service models[1]
V. THE CLOUD COMPUTING DEPLOYMENT
MODELS
Choosing the suitable type of CC to be implemented by an
institution is the first important step to take as it promises
a successfully CC implementation by that institution as
different types of CC require diverse skills and resource.
According to Chauhan et al. [22], many institutions that
have been failing in the implementation of their CC failed
because of choosing the wrong CC. Institutions must
examine their data precisely,before deciding which type of
CC to choose so that they can avoid failure of
implementation.
There exist four models that have been totally adopted in
any CC research-based, according to their distribution and
physical location. There based on previous researches on
CC, the deployment models of CC have been classified as
the following:
5.1 The Private Cloud
This deployment model functioned especially on behalf of
company meaning this type of CC services is not
accessible by the public; it is survived by the company. It
might exist on or off the locations as the users of this type
of CC can be from diverse units or departments but
belonging to the same specific company. The private cloud
is known as the most security cloud as it data processes are
controlled and managed in the company exclusive of any
limitation of bandwidth network, security disclosures, and
legitimate requirements using services of public cloud may
necessitate [23]. In the private cloud, it possible that the
fundamental cloud’s infrastructure can be leased or
owned, even operated and managed by the company itself,
a third-party or both [6]. It delivers many outcomes to a
public cloud computing environment, for example,
becoming a service-based also elastic. Examples Amazon
Virtual Private Cloud [5].
According to Parsi & Laharika [24], private clouds are
classified into two variations which are:
The on premise private cloud
Also, called as the internal cloud, this type of private cloud
is held inside the institution’s personal data centre. It
offers an additional uniform procedure plus security, yet is
frequently restricted in size and scalability. Moreover, an
organization's Information Technology (IT) unit would
encounter the costs of capital and operational for the
physical resources with this model. This type of private
cloud is best utilized for applications (apps) which
necessitate total control and configurability of the different
infrastructures and security (protection).
The Externally-Hosted Private Cloud
The type of private cloud model called the externally
hosted is held by an outside CC provider. This CC service
provider encourages a restrictive CC environment with
complete guarantees of confidentiality. This type of
private clouds is advised to institutions that do not favour
using a public cloud infrastructure due to the fact of the
because of the risks associated with the physical resources
sharing.
According to Thakur et al. [15], some characteristics of
private cloud are as below:
Enhanced Security Measures
In an IT sector security is one of the requirement that
many institutions seek for particularly when it comes to
financial institutions. For example, the security and
confidentiality issues are the principal concern in the
banks. The private cloud model arrives well furnished with
a customizable and thorough firewall and a plethora of
security and confidentiality tools that guarantee extreme
safety against illegal usages, such as hacking and other.
Dedicated Resources
One of the principles of private cloud is “no bargain”. Like
a supporter of private cloud, enterprises have their
personal dedicated resources, for example, the time of
processor and the data buses that guarantee ideal
execution.
Better Customization
The private cloud model is acquiescent and customizable
as it can be built to outfit the precise requests of a
business. This in turns allows the business to take
additional control over their own data to ensure security.
5. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3257-3265 (2017) ISSN: 0975-0290
3261
The private cloud models are consenting and adaptable as
they can be made to outfit the exact solicitations of a
business. This in turns permits the business to have more
control over their information keeping in mind the end
goal to guarantee security.
5.2 The Public Cloud
The public cloud model comes with many features as it
offers applications, data storages, and many different
services to its users coming from its service provider. This
is based on the characteristic of the pay-as-you-go model.
This cloud model is built with a perspective to provide
boundless memory storage and expanded data
transmission through the Internet to all organizations. It is
also hosted, owned, and operated by a third-party service
provider. It is as well as takes into account every sort of
prerequisites from little, medium and enormous
organizations [25]. It is considerate as the easiest to be
setup since it liberates that supporter from burdens of
equipment, application or transfer speed costs.
Organization pays for only those services and resources
they have used. Customers must pay their bill of public
cloud services, monthly.
It does not require any hardware device as it can function
on the major principle of storage demand scalability. The
accepted examples of public clouds are Amazon Elastic
Cloud Compute, Google App Engine, and Blue Cloud by
IBM and Azure Services Platform by Windows
[23].Briefly, this cloud is known for its availability to the
public or bigger of the institution from the third party that
is based on providing services to its client through the
internet. Nevertheless, it does not mean that the client’s
data will be publically exposed to be visible as the public
cloud dealers always deliver an authorized and
authentication access control for the clients. This cloud
provides a cost-effective and elastics meaning to solutions
deployed [23].
According to Parsi & Laharika [24] public cloud provides
four basic characteristics, which are the following:
Flexible and Elastic Environment
The public cloud for example Google App engine and
Amazon elastic CC provides to its customers a greatly
adaptable environment of the cloud. It empowers
customers in sharing and storing information based on the
customer’s own abilities. The CC owner also can choose
what they want to share and what they do not want to
share with their customers.
Freedom of Self-Service
The public cloud inspires it customers in making a cloud
all alone exclusive of taking anybody's assistance. This is
called as the pre-configured clouds, which exist on the
Internet. The principal thing is that organizations that
desire to choose the public cloud need to do is to visit the
portals of the public cloud begin with it. They do not need
to have relied on any third-party support in making or
running this sort of cloud. As it will directly be overseen
and took care of by them like they will be the principal
owner of it.
Pay for what is used
This specific characteristic empowers the technology of
cloud to be extra accessible by organisations to operate in
a synchronized manner. The further organization uses the
services of cloud, the well prosperous the future business
will be. Nevertheless, the charging for the payment is done
based on the basic cloud services utilised by customers.
Availability and Reliability
The fact that the public cloud is accessible to all and
believes in agility is one of the many other characteristics
if the public cloud. The users have the possibility to time
their work at whatever period they want also from
whatever side of the globe. Not just customers end up
being free to run basic assignments of the business but
they are additionally extra productive in reinforcing
customer relationships over the globe.
5.3 The Hybrid Cloud
This cloud is made of many of both private or public cloud
which is shared between the different institutions that have
similar interests and requirements, it’s can be internally
managed and it can also be managed by the third-party
which is inside or outside hosted. The bills of this cloud
are increasing over some clients; consequently, some of
the bill savings benefits of CC are accomplished. This
could assist in limiting the benefits spending expenses for
its founding as the prices are distributed among the
companies; most of the government agencies in a single
region cloud may be shareable, but not the non-
government agencies [24]. However, organizations can
maintain their cost and security at a reasonable level; but
at the same time, there are some issues regarding
standardization and interoperability of clouds, which
should be considered [25].
According to Sujay [26], some characteristics of the
hybrid clouds are:
Optimal Use
The typical centres of data in the server resources are used
from five to twenty (20) %. The reason behind that is the
crest loads, which are ten (10) times higher than that of the
typical burden. In this way, servers are generally sitting
still - making pointless costs. Hybrid cloud could extend
server use by scaling out to open assets to take care of
hosts.
Data Centre Consolidation
Rather than giving the capacity to adjust to most sceptical
situation circumstances, a private cloud simply needs
resources in typical cases. The contrasting option to
impact out grants server union and therefore achieving the
abatement in working costs. This incorporates the
hardware, power, cooling, maintaining, as well as service
costs.
Risk Transfer
Organizations personally are maintaining and running
their server (the centre of their data) and private cloud.
6. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3257-3265 (2017) ISSN: 0975-0290
3262
The service provider of the public cloud provider musts
ensures an extreme uptime for their service. Utilizing the
hybrid cloud, the danger of misestimating workload is
relocated to the cloud seller from the service operator. The
clear majority of the cloud providers have the SLAs,
which guarantee an uptime of more than 99.9%
consistently, for example, downtime of max. Nine hours
for each year.
Availability
The extreme accessibility in the corporate server (the
centre of their data) is troublesome as well as costly, as it
necessitates data redundancy, data reinforcements, and
geographical scattering. Particularly within the
organizations where Information Technology is not the
focus corporate, the skill around there is somewhat
restricted. In a hybrid cloud, the public cloud might scale
up or completely overtake operations if the organization's
server (the centre of their data) is not available because of
some failures and some attacks of Distributed Denial of
Service (DDoS).
5.4 Community Cloud
The community cloud infrastructure is supervised, then
utilized by a different number of institutions that have the
same core business, projects or shareable demands
infrastructures such as software and hardware so that the
running costs of IT can be reduced. Therefore, this cloud
can be manageable by either the joined institutions or the
cloud that provides the services [15]. Academic clouds are
an example of community cloud.
The cloud computing deployment models are graphically
depicted in Fig. 4.
Fig. 4 Cloud computing deployment models
VI. THE ROOTS OF CLOUD COMPUTING
Cloud Computing originality is to be followed by the
evolution of countless technologies innovations most
strikingly the advancement of hardware technology for
example multi-core chips, virtualization, and managing
systems, for example, automation of data centre, internet
technologies advancement like Web services, service-
oriented architecture, Web 2.0, distributed computing
notion, grid computing as well as cluster computing [27].
6.1 Grid Computing
Begun during the mid-1990s, like a consequence of the
requirement for the computing systems obliging the next
expanding requirement for very quick calculating
scientific intensive data applications. The fundamental
objective of the grid is uniting huge computer that is
distributed, capacity assets as well as interface remotely
found PCs through an extensive system, in this way
wiping out the topographical barriers and guaranteeing
that unmoving resources are used to the best [28].
Therefore, Grid Computing incorporate numerous
managerial fields from various topographical localities to
resolve a solitary errand and are rapidly released [29]. The
standard protocols expansion from different Grid
Computing activities provided the transportation of
resources of computing throughout the Internet on-demand
[30]. Nevertheless, the acknowledgment of the quality of
service (QoS) in the grids is the significant test. Grid
contrasts from the cluster as in network resources are
intended to be slackly paired. The inevitable developments
in computing carry about the necessity for the release of
computing-as-a-service, quite than computing-as-a-
product. As indicated by Hashemi & Bardsiri [30], they
explained Grid Computing in terms of application usage,
data and storage as well as network resource saying “Grid
computing is categorically defined or explained in terms
of distributed computing which involves a large amount of
coordination also sharing computing, application, data
storage among other, as well as network resources across
dispersed organization”. The organization must be
dynamically and geographically dispersed for it the real
essence of grid computing to be clearer and more
meaningful to the organization concerned. Further
explanation showed that the reason and vision behind grid
computing were to allow access to computer-based
resources. It also has the following characteristics:
Large Scale: The capability of dealing with the
huge quantity of resources, which could be a bit
costly as the cost, can be few millions.
Geographical Distribution: the ability to access the
resource from distant places.
Heterogeneity: the ability to host both software and
hardware that can range from data to files, software
component, and even programs.
Resource sharing: allowing access of resources in a
grid belonging different organizations.
Multiple Administrations: the ability for different
organisations to create distinctive security as well
7. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3257-3265 (2017) ISSN: 0975-0290
3263
as policies of admin so that the resources they own
will be accessible and usable.
Dependable Access: the ability of the grid
computing to ensure safe delivery of service
underneath established service quality.
Consistent Access: the ability of the grid to be
created through standard services, protocols as well
as the interface to interact.
6.2 Hardware Virtualization
The virtualization idea get is originality from the time
virtual machines were introduced (an occurrence of the
physical machines) by IBM during the 1960s [31]. The
thought behind utilizing virtual machines (VM) is because
they empower computing resource-sharing (hardware) as
well as time. Therefore, a virtual machines sponsor
advance decrease of equipment like hardware expense but
then enhancing profitability by permitting different clients
synchronous access to the instance of a computing
resource [29]. The hardware virtualization offers to the
clients the capacity of running different software on a
similar physical machine, hiding all features that are
detailed in the physical machine from the clients.
6.3 Autonomic Computing
According to Boom [32], autonomic computing combines
both the study and capability of the computer system with
the ability to achieve autonomously desired behaviour,
further explanation was using a specific example saying
“self-tuned system has the ability to tune their respective
performance based on the needs of their intended
missions. In this case, the self-protected system
automatically handles intrusion attacks from an external
source, as a self-manage system do not really requirement
human-made configuration. Another distinct behaviour is
that self-healing system is capable of repairing them as the
case maybe while the self-managed system can also be
constructed broadly as having the capability of managing
all type of behaviour”. According to Autonomic
computing is described by four important features which
are self-optimization, self-protection, self-configuration,
lastly self-healing [27].
6.4 Web Service and Service Oriented Architecture
(SOA)
Web Services (WS) open standard development have
specially added to the integrated business systems
enhancements and supporting. These innovations in Web
services empower data sharing amongst running
application upon various chatting platforms, in this way
creating single internal data application's accessible by
others throughout the internet [27]. Web services were
developed throughout current renowned technologies such
as Extensible Mark-up Language (XML) as well as
Hypertext Transfer Protocol (HTTP), which are
subsequently skilled on behalf of procurement of
mechanisms to carry services and implement SOA.
SOA intended to address prerequisite of slackly paired,
standard-based, as well as independent protocol dispersed
computing [29]. The advancement of Web services
empowers the creation of influential services supporting
simple and quick access on-demand in a reliable manner.
Supercomputers have assumed the main part for
calculation-intensive purposes, for example, quantum
physics and climate conjecture applications, nevertheless,
deploying supercomputers to do such errands is not
practical, therefore, the advancement of cluster computing
[29]. Cluster computing comprises of agathering of
parallel and distributed PCs working firmly together to
perform an errand that would typically not be
accomplished with a solitary PC. Cluster computing is
generally connected over a quick Local Area Network
(LAN) Internet [27]. The fundamentally favorable position
of groups over single PC is the procurement for high
accessibility, the load-adjusting and diminished expense of
sending contrasted with conveying a supercomputer
Internet [27]. High accessibility of cluster computing
group is accomplished using repetitive hubs such that the
hubs can provide for service in case of a failure of the
system. Fig. 5 illustrates the convergence of these
technologies and the development of cloud computing.
Fig. 5 Emergence of cloud computing from the
advancement in computing technologies [28]
VII. CONCLUSION
Considering the historic growth of providing IT resources,
cloud computing has been recognised as the freshest and
most flexible delivery model of providing IT. It can be
considered as the resulting evolution of the traditional on
premise computing spanning outsourcing stages from
aggregate to the specific, and from the multi-seller
outsourcing to an advantage free delivery. Cloud
computing is a technology used for increasing the capacity
or add capabilities progressively without putting resources
in new infrastructure, training new personnel, or licensing
new software. It is a very promising technology, which is
allowing organisations to effectively manage their
resource limitations with slightest amount of capital
8. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3257-3265 (2017) ISSN: 0975-0290
3264
investment and meet dynamic demands efficiently. Cloud
computing offers deployment architecture, with the
capability to address vulnerabilities recognised in
traditional IS yet its dynamic qualities can deflect the
effectiveness of traditional countermeasures. Different
cloud models can be selected varying upon the specific
desires of the organisation. This paper discussed the
concept of cloud by explaining it evolution and history,
and giving different definitions of cloud computing. It also
addressed the service and deployment models of cloud
computing, it characteristics and root.
ACKNOWLEDGEMENTS
We would like to express my deep sense of respect and
gratitude towards all the faculty members, Department of
Computer Science & Engineering in R. N. Modi
Engineering College Kota, and thanks to each person who
has been the guiding force behind this work. Without their
unconditional support it wouldn't have been possible.
REFERENCES
[1] Aaditya Jain and Dr. Bala Buksh, “Overview of Cloud
Computing with Security Issues, Challenges and
Countermeasures”, International Conference on
Recent Research Development in Science,
Engineering and Management (ICRRDSEM), Pune,
ISBN:978-81-931039-0-6, May 2016.
[2] Akande, A.O., N.A. April, and J.-P. Van Belle,
“Management Issues with Cloud Computing”, in
Proceedings of the Second International Conference
on Innovative Computing and Cloud Computing.
2013. ACM.
[3] Sharma, R. and R.K. Trivedi, “Literature review:
Cloud Computing–Security Issues, Solution and
Technologies”, International Journal of Engineering
Research ISSN, 2013: p. 2319-6890.
[4] Khan, A.W., S.U. Khan, M. Ilyas, and M.I. Azeem,
“A literature survey on data privacy/protection issues
and challenges in cloud computing”, IOSR Journal of
Computer Engineering (IOSRJCE) ISSN, 2012: p.
2278-0661.
[5] Sriram, I. and A. Khajeh-Hosseini, “Research agenda
in cloud technologies” arXiv preprint
arXiv:1001.3259, 2010.
[6] Mell, P. and T. Grance, “The NIST definition of cloud
computing”, 2011.
[7] Islam, S. and J.-C. Grégoire, “Giving users an edge: A
flexible Cloud model and its application for
multimedia”, Future Generation Computer Systems,
2012. 28(6): p. 823-832.
[8] Böhm, M., S. Leimeister, C. Riedl, and H. Krcmar,
“Cloud computing and computing evolution”, B.
Smith ,“An approach to graphs of linear forms, 2010.
[9] Stavinoha, K.E., What is Cloud Computing and Why
Do We Need It. 2010, Citeseer.
[10]Rai, R., G. Sahoo, and S. Mehfuz, “Securing software
as a service model of cloud computing: Issues and
solutions”, arXiv preprint arXiv:1309.2426, 2013.
[11]Khorshed, M.T., A.S. Ali, and S.A. Wasimi, “A
survey on gaps, threat remediation challenges and
some thoughts for proactive attack detection in cloud
computing”, Future Generation computer systems,
2012. 28(6): p. 833-851.
[12]Oliveira, T., M. Thomas, and M. Espadanal,
“Assessing the determinants of cloud computing
adoption: An analysis of the manufacturing and
services sectors”, Information & Management, 2014.
51(5): p. 497-510.
[13]Dillon, T., C. Wu, and E. Chang, “Cloud computing:
issues and challenges”, in 24th IEEE international
conference on advanced information networking and
applications. 2010.
[14]Srinivas, J., K.V.S. Reddy, and A.M. Qyser, “Cloud
computing basics”, International journal of advanced
research in computer and communication engineering,
2012. 1(5).
[15]Thakur, N., D. Bisen, V. Rohit, and N. Gupta,“Review
on Cloud Computing: Issues, Services and Models”,
International Journal of Computer Applications, 2014.
91(9).
[16]Ashrafa, I., “An Overview of Service Models of Cloud
Computing”, Int. J. of Multidisciplinary and Current
research, 2014.
[17]Rao, C.C., M. Leelarani, and Y.R. Kumar, “Cloud:
Computing Services and Deployment Models”,
International Journal of Engineering and Computer
Science, 2013. 2(12).
[18]Khurana, S. and A.G. Verma, “Comparison of Cloud
Computing Service Models: SaaS, PaaS,
IaaS”,International Journal of Electronics &
Communication Technology IJECT, 2013.
[19]Fernandes, D.A., L.F. Soares, J.V. Gomes, M.M.
Freire, and P.R. Inácio, “Security issues in cloud
environments: a survey”. International Journal of
Information Security, 2014. 13(2): p. 113-170.
[20]Salleh, S.M., S.Y. Teoh, and C. Chan. “Cloud
Enterprise Systems: A Review Of Literature And Its
Adoption”, in PACIS. 2012.
[21]Tehrani, S.R. and F. Shirazi, “Factors influencing the
adoption of cloud computing by small and medium
size enterprises (SMEs)”in International Conference
9. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3257-3265 (2017) ISSN: 0975-0290
3265
on Human Interface and the Management of
Information. 2014. Springer.
[22]Chauhan, V.K., K. Bansal, and P. Alappanavar,
“Exposing cloud computing as a failure”,
International journal of engineering science and
technology, 2012. 4(4).
[23]Kim, W., “Cloud Computing: Today and Tomorrow”,
Journal of object technology, 2009. 8(1): p. 65-72.
[24]Parsi, K. and M. Laharika, “A Comparative Study of
Different Deployment Models in a Cloud”,
International Journal of Advanced Research in
Computer Science and Software Engineering, 2013.
3(5): p. 512-515.
[25]Grossman, R.L., “The case for cloud computing”,IT
professional, 2009. 11(2): p. 23-27.
[26]Sujay, R., “Hybrid cloud: A new era”,International
Journal of Computer Science and Technology
(IJCST), 2011. 2(2): p. 323-326.
[27]Badger, L., T. Grance, R. Patt-Corner, and J. Voas,
“Draft cloud computing synopsis and
recommendations”, NIST special publication, 2011.
800: pp. 146.
[28]Sadashiv, N. and S.D. Kumar, “Cluster, grid and
cloud computing: A detailed comparison. in
Computer Science & Education (ICCSE)”, 6th
International Conference on. 2011. IEEE.
[29]Muhammad, A.R., “Towards cloud adoption in
Africa: The case of Nigeria”,International Journal of
Scientific & Engineering Research, 6 (1), 2015: p.
657-664.
[30]Hashemi, S.M. and A.K. Bardsiri, “Cloud computing
Vs. grid computing”,ARPN Journal of Systems and
Software, 2012. 2(5): p. 188-194.
[31]Voorsluys, W., J. Broberg, and R. Buyya,
“Introduction to cloud computing”, Cloud computing:
Principles and paradigms, 2011: p. 1-44.
[32]Boon, M. What is autonomic computing? 2011.
Biographies and Photographs
Anamika Gaur is currently pursuing
B.Tech III year in Computer Science
& Engg. from R. N. Modi
Engineering College Kota, which is
affiliated to Rajasthan Technical
University, Kota (Raj). His area of
interests are Cloud Computing, Data
Structure, and Information Security.
Sangeeta Gaud is currently pursuing
B.Tech final year in Computer
Science & Engg. from R. N. Modi
Engineering College Kota, which is
affiliated to Rajasthan Technical
University, Kota (Raj). His area of
interests are Computer Networks,
Cloud Computing and Wireless network applications.
Aaditya Jain is currently pursuing
M.Tech in Computer Science &
Engineering from R. N. Modi
Engineering College (RMEC) Kota
which is affiliated to Rajasthan
Technical University, Kota (Raj). He
received B.E. degree in Computer
Science & Engineering from
Mandsaur Institute of Technology Mandsaur which is
affiliated to Rajiv Gandhi Proudyogiki Vishwavidyalaya,
Bhopal (MP) in 2013. He is the author of many scientific
publications in International and National Conferences and
Journals. His two papers has awarded by “Best Paper
Award” in International Conferences. His areas of
interests are Cloud Computing, Internet of Things, Cloud
Based Security, Next Generation Techniques, Network
Security, Cryptography, Mobile Ad Hoc Networks, and
Wireless Sensor Networks.