This document provides an introduction to cloud computing. It discusses what cloud computing is, its components including client computers, data centers, and distributed servers. It describes different cloud deployment models including public, private, and hybrid clouds. It also discusses different cloud service models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The document then covers advantages of cloud computing and provides a brief history of cloud computing from its origins in the 1960s to modern cloud technologies.
The document provides an overview of cloud architecture, services, and storage. It defines cloud architecture as the components and relationships between databases, software, applications, and other resources leveraged to solve business problems. The main components are on-premise resources, cloud resources, software/services, and middleware. Three common cloud service models are also defined - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Amazon Simple Storage Service (S3) is discussed as a cloud storage service that stores unlimited data in buckets with fine-grained access controls and analytics capabilities.
This document provides an overview of resource management and security in cloud computing. It discusses inter-cloud resource management, resource provisioning models including advance, dynamic and user self-provisioning, and the global exchange of cloud resources. It also covers why cloud security governance is needed, what cloud security governance entails, common challenges around lack of management buy-in, controls, roles and metrics. Finally, it discusses key objectives for an effective cloud security governance model and what virtualized security is compared to traditional physical security.
This document provides an overview of Service Oriented Architecture (SOA) and its enabling technologies. It discusses key SOA principles like loose coupling, standardized service contracts, and service reusability. The document also covers major SOA objectives, benefits, architecture layers, and the differences between SOA and web services. Web services are described as a standardized way for applications to communicate over the web using XML, SOAP, WSDL and other standards. The document contrasts SOA with public-subscribe and pull-based vs push-based messaging architectures.
Apache Hadoop is an open-source software framework for distributed storage and processing of large datasets across clusters of computers. It consists of Hadoop Common (libraries and utilities), HDFS (distributed file system), YARN (resource management), and MapReduce (programming model). Hadoop is designed to reliably handle failures of individual machines or racks of machines by detecting and handling failures in software. It allows programming in any language using Hadoop Streaming and exposes higher-level interfaces like Pig Latin and SQL through related projects.
This document discusses enabling technologies for cloud computing, focusing on service oriented architecture and representational state transfer (REST) systems. It describes service oriented architecture as a design approach involving independent services that communicate with each other over a network. It outlines the layered architecture for web services and grids, and compares grids and clouds, noting that grids apply static resources while clouds emphasize elastic resources. It provides a brief overview of REST, describing it as a way to get information content from websites by reading designated web pages containing XML files that describe and include preferred content.
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
Public-key cryptosystems produce constant-size cipher texts with efficient delegation
of decryption rights for any set of cipher texts. One can aggregate any set of secret keys and make
them as compact as a single key. The secret key holder can release a constant-size aggregate key for
flexible choices of cipher text set in cloud storage. In KAC, users encrypt a message not only under a
public-key, but also under an identifier of cipher text called class. That means the cipher texts are
further categorized into different classes. The key owner holds a master-secret called master-secret
key, which can be used to extract secret keys for different classes. More importantly, the extracted
key have can be an aggregate key which is as compact as a secret key for a single class, but
aggregates the power of many such keys, i.e., the decryption power for any subset of cipher text
classes. The key aggregate cryptosystem is enhanced with boundary less cipher text classes. The
system is improved with device independent key distribution mechanism. The key distribution
process is enhanced with security features to protect key leakage. The key parameter transmission
process is integrated with the cipher text download process.
This document discusses different types of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Database as a Service (DaaS), and Monitoring as a Service. It describes the key characteristics and advantages of each service type. Some potential issues and disadvantages are also outlined such as security concerns, vendor lock-in, and network dependence. Examples of major cloud service providers are provided for each service layer including Google, Amazon, Microsoft, and Salesforce.
The document provides an overview of cloud architecture, services, and storage. It defines cloud architecture as the components and relationships between databases, software, applications, and other resources leveraged to solve business problems. The main components are on-premise resources, cloud resources, software/services, and middleware. Three common cloud service models are also defined - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Amazon Simple Storage Service (S3) is discussed as a cloud storage service that stores unlimited data in buckets with fine-grained access controls and analytics capabilities.
This document provides an overview of resource management and security in cloud computing. It discusses inter-cloud resource management, resource provisioning models including advance, dynamic and user self-provisioning, and the global exchange of cloud resources. It also covers why cloud security governance is needed, what cloud security governance entails, common challenges around lack of management buy-in, controls, roles and metrics. Finally, it discusses key objectives for an effective cloud security governance model and what virtualized security is compared to traditional physical security.
This document provides an overview of Service Oriented Architecture (SOA) and its enabling technologies. It discusses key SOA principles like loose coupling, standardized service contracts, and service reusability. The document also covers major SOA objectives, benefits, architecture layers, and the differences between SOA and web services. Web services are described as a standardized way for applications to communicate over the web using XML, SOAP, WSDL and other standards. The document contrasts SOA with public-subscribe and pull-based vs push-based messaging architectures.
Apache Hadoop is an open-source software framework for distributed storage and processing of large datasets across clusters of computers. It consists of Hadoop Common (libraries and utilities), HDFS (distributed file system), YARN (resource management), and MapReduce (programming model). Hadoop is designed to reliably handle failures of individual machines or racks of machines by detecting and handling failures in software. It allows programming in any language using Hadoop Streaming and exposes higher-level interfaces like Pig Latin and SQL through related projects.
This document discusses enabling technologies for cloud computing, focusing on service oriented architecture and representational state transfer (REST) systems. It describes service oriented architecture as a design approach involving independent services that communicate with each other over a network. It outlines the layered architecture for web services and grids, and compares grids and clouds, noting that grids apply static resources while clouds emphasize elastic resources. It provides a brief overview of REST, describing it as a way to get information content from websites by reading designated web pages containing XML files that describe and include preferred content.
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
Public-key cryptosystems produce constant-size cipher texts with efficient delegation
of decryption rights for any set of cipher texts. One can aggregate any set of secret keys and make
them as compact as a single key. The secret key holder can release a constant-size aggregate key for
flexible choices of cipher text set in cloud storage. In KAC, users encrypt a message not only under a
public-key, but also under an identifier of cipher text called class. That means the cipher texts are
further categorized into different classes. The key owner holds a master-secret called master-secret
key, which can be used to extract secret keys for different classes. More importantly, the extracted
key have can be an aggregate key which is as compact as a secret key for a single class, but
aggregates the power of many such keys, i.e., the decryption power for any subset of cipher text
classes. The key aggregate cryptosystem is enhanced with boundary less cipher text classes. The
system is improved with device independent key distribution mechanism. The key distribution
process is enhanced with security features to protect key leakage. The key parameter transmission
process is integrated with the cipher text download process.
This document discusses different types of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Database as a Service (DaaS), and Monitoring as a Service. It describes the key characteristics and advantages of each service type. Some potential issues and disadvantages are also outlined such as security concerns, vendor lock-in, and network dependence. Examples of major cloud service providers are provided for each service layer including Google, Amazon, Microsoft, and Salesforce.
Service Oriented Software Engineering: Services as reusable components, Service Engineering, Software Development with Services. Service-oriented architectures, RESTful services
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
Cloud Computing has received much attention by the IT-Business world. As compared to the common
computing platforms, cloud computing is more flexible in supporting real-time computation and is
considered a more powerful model for hosting and delivering services over the Internet. However, since
cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread.
This article discusses some challenges facing cloud computing growth and conducts a comparison study
between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2
generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on
the needs of customers.
Cloud computing refers to computing resources and services that are provided over the internet. It allows users to access applications and store data on remote servers rather than local devices. There are different types of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud computing can be deployed using public, private, community, or hybrid models depending on factors like security needs and resource sharing requirements. Many universities and organizations are conducting research on cloud computing technologies.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
The document provides recommendations for books on cloud computing concepts and technologies. It then discusses the history and drivers of the Fourth Industrial Revolution powered by cloud, social, mobile, IoT, and AI technologies. The document defines cloud computing and discusses characteristics such as on-demand access to computing resources, utility computing models, and service delivery of infrastructure, platforms, and applications. It also outlines some major cloud platform providers including Eucalyptus, Nimbus, OpenNebula, and the CloudSim simulation framework.
Cloud computing IT-703 reveals the attractive features of cloud computing along with the driven technology i.e. virtualization as per the RGPV syllabus
This document discusses cyber forensics in cloud computing. It begins with an introduction to cloud computing concepts like virtualization, infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It then proposes steps for cloud forensics investigations, including collecting and storing data, performing signature-based and behavior-based analysis, and using network tools for forensics analysis and invasion detection. The goal is to define the new area of cloud forensics and analyze its challenges and opportunities.
Guddu Kumar. “A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions” United International Journal for Research & Technology (UIJRT) 1.2 (2019): 26-34.
cloud computing based its solutions term paperShashi Bhushan
This document discusses cloud computing, including its definition, key features, service layers, deployment models, and challenges. It defines cloud computing as dynamically scalable and virtualized resources provided over the internet. The main service layers are software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). The document also discusses private, public, and hybrid cloud deployment models and features like scalability, quality of service, and pricing models. Finally, it outlines challenges around performance, security, control, bandwidth costs, and reliability.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document reviews data security, accountability, and load balancing in cloud computing. It discusses how encryption, a trusted third party auditor, and effective resource utilization can help address issues related to data security, monitoring user access to data in the cloud, and reducing latency. The document provides an overview of cloud computing concepts and models before reviewing approaches to securing data, ensuring accountability for data access, and balancing loads across cloud resources. It analyzes parameters for evaluating load balancing algorithms and categorizes common static and dynamic algorithms.
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
Cloud storage is defined as "the storage of data online in the cloud," wherein a company's data is stored in and accessible from multiple distributed and connected resources that comprise a cloud. Although cloud service providers implement the best security standards and industry certifications, storing data and important files on external service providers always opens up risks. Using cloud-powered technologies means you need to provide your service provider with access to important business data. Meanwhile, being a public service opens up cloud service providers to security challenges on a routine basis. The ease in procuring and accessing cloud services can also give nefarious users the ability to scan, identify and exploit loopholes and vulnerabilities within a system. For instance, in a multi-tenant cloud architecture where multiple users are hosted on the same server, a hacker might try to break into the data of other users hosted and stored on the same server. The following paper deals with the service models of cloud computing along with types of cloud computing & characteristics of cloud. Further challenges and security issues in cloud computing is also discussed and at last conclusion and future demand for research in the field of cloud computing.
Exploring the cloud deployment and service delivery modelscloudresearcher
This document summarizes cloud computing deployment and service delivery models. It describes common cloud deployment models including private clouds for internal use, public clouds for external use, hybrid clouds combining public and private, and community clouds for specific groups. It also outlines emerging models like combined and inter clouds. For service delivery, it defines the main models of Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), explaining the level of control users have and examples of each.
“The upcoming sections cover introductory topic areas pertaining to the fundamental models used to categorize and define clouds and their most common service offerings, along with definitions of organizational roles and the specific set of characteristics that collectively distinguish a cloud.”
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceEditor Jacotech
This document summarizes a research paper on providing privacy and security in cloud Database-as-a-Service. The paper proposes using a RADIUS server for authentication, authorization, and accounting to secure the main cloud server and data center storing user databases. When users access or store data in the cloud data center, their passwords will be used to encrypt and decrypt their data, providing privacy while the RADIUS server monitors access.
This document describes implementing Software as a Service (SaaS) in a cloud computing environment. It discusses different cloud delivery models including SaaS, PaaS, and IaaS. It also covers cloud deployment models like public, private, and hybrid clouds. The document then demonstrates creating a virtual machine running Ubuntu to enable a basic calculator application as an example SaaS implementation in a cloud. It shows how to access and use the application within the virtual machine while it runs simultaneously with the host operating system.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
The document provides an overview of cloud computing including:
- Definitions of distributed computing, cluster computing, utility computing, and cloud computing as trends in computing.
- A brief history of cloud computing including early concepts in the 1960s and milestones like Salesforce.com in 1999 and Amazon Web Services in 2002.
- Descriptions of the types of cloud including public, private, hybrid, and community clouds.
- Explanations of cloud service models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).
- Discussions of cloud storage and advantages and disadvantages of cloud computing.
- Real-life examples of
Cloud computing refers to flexible, on-demand access to shared computing resources via the internet. Resources such as memory, storage, and processing power can be allocated as needed without direct involvement of IT staff. This allows organizations to scale their infrastructure up or down easily based on current needs. The term "cloud" originated as a symbol used to represent the public internet in network diagrams. Moving applications and services to cloud providers over the internet is now commonly referred to as migrating to the "cloud".
Cloud computing allows users to access computing resources like servers, storage, databases, networking, software, analytics and more over the internet. It provides scalability, reliability and cost savings. There are different cloud service models like Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Users can choose between public, private or hybrid cloud deployment models based on their needs.
Seminar on cloud computing by Prashant GuptaPrashant Gupta
Cloud computing relies on sharing computing resources over the internet rather than local servers. It provides software, platforms, and infrastructure as on-demand services with various advantages like lower costs, improved performance, and universal access, but also disadvantages like requiring constant internet and potential security and reliability issues. The document discusses concepts like cloud architecture, service models (SaaS, PaaS, IaaS), storage types (public, private, hybrid cloud), and advantages and disadvantages of cloud computing.
Service Oriented Software Engineering: Services as reusable components, Service Engineering, Software Development with Services. Service-oriented architectures, RESTful services
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
Cloud Computing has received much attention by the IT-Business world. As compared to the common
computing platforms, cloud computing is more flexible in supporting real-time computation and is
considered a more powerful model for hosting and delivering services over the Internet. However, since
cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread.
This article discusses some challenges facing cloud computing growth and conducts a comparison study
between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2
generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on
the needs of customers.
Cloud computing refers to computing resources and services that are provided over the internet. It allows users to access applications and store data on remote servers rather than local devices. There are different types of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud computing can be deployed using public, private, community, or hybrid models depending on factors like security needs and resource sharing requirements. Many universities and organizations are conducting research on cloud computing technologies.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
The document provides recommendations for books on cloud computing concepts and technologies. It then discusses the history and drivers of the Fourth Industrial Revolution powered by cloud, social, mobile, IoT, and AI technologies. The document defines cloud computing and discusses characteristics such as on-demand access to computing resources, utility computing models, and service delivery of infrastructure, platforms, and applications. It also outlines some major cloud platform providers including Eucalyptus, Nimbus, OpenNebula, and the CloudSim simulation framework.
Cloud computing IT-703 reveals the attractive features of cloud computing along with the driven technology i.e. virtualization as per the RGPV syllabus
This document discusses cyber forensics in cloud computing. It begins with an introduction to cloud computing concepts like virtualization, infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It then proposes steps for cloud forensics investigations, including collecting and storing data, performing signature-based and behavior-based analysis, and using network tools for forensics analysis and invasion detection. The goal is to define the new area of cloud forensics and analyze its challenges and opportunities.
Guddu Kumar. “A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions” United International Journal for Research & Technology (UIJRT) 1.2 (2019): 26-34.
cloud computing based its solutions term paperShashi Bhushan
This document discusses cloud computing, including its definition, key features, service layers, deployment models, and challenges. It defines cloud computing as dynamically scalable and virtualized resources provided over the internet. The main service layers are software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). The document also discusses private, public, and hybrid cloud deployment models and features like scalability, quality of service, and pricing models. Finally, it outlines challenges around performance, security, control, bandwidth costs, and reliability.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document reviews data security, accountability, and load balancing in cloud computing. It discusses how encryption, a trusted third party auditor, and effective resource utilization can help address issues related to data security, monitoring user access to data in the cloud, and reducing latency. The document provides an overview of cloud computing concepts and models before reviewing approaches to securing data, ensuring accountability for data access, and balancing loads across cloud resources. It analyzes parameters for evaluating load balancing algorithms and categorizes common static and dynamic algorithms.
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
Cloud storage is defined as "the storage of data online in the cloud," wherein a company's data is stored in and accessible from multiple distributed and connected resources that comprise a cloud. Although cloud service providers implement the best security standards and industry certifications, storing data and important files on external service providers always opens up risks. Using cloud-powered technologies means you need to provide your service provider with access to important business data. Meanwhile, being a public service opens up cloud service providers to security challenges on a routine basis. The ease in procuring and accessing cloud services can also give nefarious users the ability to scan, identify and exploit loopholes and vulnerabilities within a system. For instance, in a multi-tenant cloud architecture where multiple users are hosted on the same server, a hacker might try to break into the data of other users hosted and stored on the same server. The following paper deals with the service models of cloud computing along with types of cloud computing & characteristics of cloud. Further challenges and security issues in cloud computing is also discussed and at last conclusion and future demand for research in the field of cloud computing.
Exploring the cloud deployment and service delivery modelscloudresearcher
This document summarizes cloud computing deployment and service delivery models. It describes common cloud deployment models including private clouds for internal use, public clouds for external use, hybrid clouds combining public and private, and community clouds for specific groups. It also outlines emerging models like combined and inter clouds. For service delivery, it defines the main models of Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), explaining the level of control users have and examples of each.
“The upcoming sections cover introductory topic areas pertaining to the fundamental models used to categorize and define clouds and their most common service offerings, along with definitions of organizational roles and the specific set of characteristics that collectively distinguish a cloud.”
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceEditor Jacotech
This document summarizes a research paper on providing privacy and security in cloud Database-as-a-Service. The paper proposes using a RADIUS server for authentication, authorization, and accounting to secure the main cloud server and data center storing user databases. When users access or store data in the cloud data center, their passwords will be used to encrypt and decrypt their data, providing privacy while the RADIUS server monitors access.
This document describes implementing Software as a Service (SaaS) in a cloud computing environment. It discusses different cloud delivery models including SaaS, PaaS, and IaaS. It also covers cloud deployment models like public, private, and hybrid clouds. The document then demonstrates creating a virtual machine running Ubuntu to enable a basic calculator application as an example SaaS implementation in a cloud. It shows how to access and use the application within the virtual machine while it runs simultaneously with the host operating system.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
The document provides an overview of cloud computing including:
- Definitions of distributed computing, cluster computing, utility computing, and cloud computing as trends in computing.
- A brief history of cloud computing including early concepts in the 1960s and milestones like Salesforce.com in 1999 and Amazon Web Services in 2002.
- Descriptions of the types of cloud including public, private, hybrid, and community clouds.
- Explanations of cloud service models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).
- Discussions of cloud storage and advantages and disadvantages of cloud computing.
- Real-life examples of
Cloud computing refers to flexible, on-demand access to shared computing resources via the internet. Resources such as memory, storage, and processing power can be allocated as needed without direct involvement of IT staff. This allows organizations to scale their infrastructure up or down easily based on current needs. The term "cloud" originated as a symbol used to represent the public internet in network diagrams. Moving applications and services to cloud providers over the internet is now commonly referred to as migrating to the "cloud".
Cloud computing allows users to access computing resources like servers, storage, databases, networking, software, analytics and more over the internet. It provides scalability, reliability and cost savings. There are different cloud service models like Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Users can choose between public, private or hybrid cloud deployment models based on their needs.
Seminar on cloud computing by Prashant GuptaPrashant Gupta
Cloud computing relies on sharing computing resources over the internet rather than local servers. It provides software, platforms, and infrastructure as on-demand services with various advantages like lower costs, improved performance, and universal access, but also disadvantages like requiring constant internet and potential security and reliability issues. The document discusses concepts like cloud architecture, service models (SaaS, PaaS, IaaS), storage types (public, private, hybrid cloud), and advantages and disadvantages of cloud computing.
The document discusses various aspects of cloud computing including:
- Cloud computing provides on-demand access to computing resources that can scale up or down depending on needs.
- It evolved from concepts like virtualization, utility computing, and service-oriented architecture.
- The basic components of cloud computing include clients, services, applications, platforms, storage, and infrastructure.
- Common cloud computing models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).
Cloud computing relies on sharing computing resources over the internet rather than local servers. It provides software, platforms, and infrastructure as on-demand services (SaaS, PaaS, IaaS). Key benefits include lower costs, improved performance, universal access, unlimited storage, and constant software updates. However, it requires constant internet and may be slow with low-speed connections while storing data in the cloud also raises security and reliability concerns. Overall, cloud computing provides massive computing power through a network of servers accessed remotely.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It addresses challenges with conventional computing like high costs of software licensing, limited scalability and physical security issues. Cloud computing delivers resources as a service on a pay-per-use basis and provides advantages like lower costs, better service levels, rapid scalability and low maintenance requirements.
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
This document provides an introduction to cloud computing security issues in infrastructure as a service (IaaS). It discusses how cloud computing works and the service models of software as a service, platform as a service, and IaaS. IaaS provides processing power, data storage, and other shared resources on a pay-as-you-go basis. The document focuses on security issues related to the IaaS model, examining security for service level agreements, utility computing, platform virtualization, networks and connectivity, and computer hardware. It also discusses how security issues with cloud software can impact IaaS and cloud computing overall.
Cloud computing Definition, Types of cloud, Cloud services: Benefits and challenges of cloud computing, Evolution of Cloud Computing, Applications cloud computing, Business models around Cloud, Major Players in Cloud Computing, Issues in Cloud - Eucalyptus - Nimbus - Open Nebula, CloudSim.
1. Cloud computing involves delivering computing resources and services over the internet instead of relying on local servers or personal computers. It enables users to access applications and store/process data using remote servers.
2. There are three main types of cloud computing services: Infrastructure as a Service (IaaS) provides virtual computing resources; Platform as a Service (PaaS) offers platforms for developing applications; and Software as a Service (SaaS) delivers fully functional applications over the internet.
3. The main deployment models are public clouds which are owned by third parties and available publicly, private clouds which are dedicated to a single organization, and hybrid clouds which combine public and private clouds.
This document discusses cloud computing and its scope in Nepal. It begins with definitions of cloud computing, noting that it relies on sharing computing resources over the internet. The document then provides a brief history of cloud computing and describes the basic cloud architecture involving clients, distributed servers, and data centers. It discusses various cloud models including SaaS, PaaS, and IaaS. The document outlines benefits of cloud computing like reduced costs and improved scalability. It concludes that cloud computing has significant future scope in Nepal for applications like e-governance and distance learning.
The origin of the term cloud computing is unclear but it refers to computing resources that are dynamically provisioned over the internet. Early concepts of cloud computing involved time-sharing mainframe computers in the 1950s and virtual machines in the 1970s. Telecommunications companies started offering virtual private networks in the 1990s. Grid computing, utility computing, SaaS, and cloud computing evolved the concept further, providing on-demand access to computing resources and applications delivered as a service.
The document discusses the history, evolution, definitions, models, benefits, drawbacks and security issues related to cloud computing. It explains how cloud computing emerged from advances in broadband networks, computing power and the internet. The different types of cloud models - SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud and community cloud - are defined along with their characteristics.
Cloud computing allows users to access shared computer resources like applications, storage, and servers over the internet rather than installing software locally. It provides services through front-end interfaces while hardware and software infrastructure in the back-end produce these interfaces. There are different cloud service and deployment models including SaaS, PaaS, IaaS, and public, private, hybrid, and community clouds. While cloud computing provides benefits like scalability, cost savings, and flexibility, challenges include security issues, downtime, and lack of control over the infrastructure.
Cloud computing allows users to access shared computer resources like applications, storage, and servers over the internet rather than installing software locally. It provides services through front-end user interfaces while hardware and software infrastructure in the back-end produce these interfaces. There are different cloud service and deployment models including SaaS, PaaS, IaaS, and public, private, hybrid, and community clouds. While cloud computing provides benefits like scalability, cost savings, and flexibility, challenges include security issues, downtime, and lack of control over the infrastructure.
Cloud computing concepts have evolved since the 1950s with early concepts like remote job entry (RJE). The cloud symbol emerged in the 1970s to represent computing networks. In the 1990s, virtual private networks provided cloud-like services at lower costs. The term "cloud computing" arose in the late 1990s and cloud services became popular in the mid-2000s with Amazon's EC2 launch. Major tech companies like Microsoft, IBM, and Oracle now offer cloud computing platforms and services.
Cloud computing is a model of computing where resources are accessed via the internet rather than locally. With cloud computing, software and documents are stored on remote servers rather than individual computers. This allows for collaboration and access from any device with an internet connection. Cloud computing provides advantages like unlimited storage, universal access, automatic updates, and reduced costs, but also risks like dependence on internet access and potential security issues if data is lost or stolen.
Cloud computing involves accessing applications and data storage over the internet instead of on a local computer. It provides scalable resources, software, and data storage through large distributed server networks. Key elements include clients that access cloud services, data centers that house servers, and distributed servers across multiple locations. Common cloud services are Software as a Service (SaaS), Platform as a Service (PaaS), and Hardware as a Service (HaaS). Cloud deployment options include private, public, hybrid, and community clouds depending on the organization and intended users.
Cloud computing refers to services and applications delivered over the internet. There are three main service models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). There are also four deployment models for cloud computing: private cloud, public cloud, hybrid cloud, and community cloud. The document discusses the characteristics and differences between the various service and deployment models of cloud computing.
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfDr. Radhey Shyam
The document provides an overview of data analytics and big data concepts. It discusses the characteristics of big data, including the four V's of volume, velocity, variety and veracity. It describes different types of data like structured, semi-structured and unstructured data. The document also introduces popular big data platforms like Hadoop, Spark and Cassandra. Finally, it outlines key reasons for the need of data analytics, such as enabling better decision making and improving organizational efficiency.
SE-UNIT-3-II-Software metrics, numerical and their solutions.pdfDr. Radhey Shyam
1) The document discusses software metrics and Halstead's software science measures including program length, vocabulary, volume, difficulty, and effort. It provides the formulas to calculate these measures and an example calculation for a C function.
2) Guidelines are provided for identifying operands and operators when applying Halstead's measures to source code. Various program elements like variables, functions, and statements are classified.
3) References on software engineering and metrics are listed at the end.
Introduction to Data Analytics and data analytics life cycleDr. Radhey Shyam
The document provides an overview of data analytics and big data concepts. It discusses the characteristics of big data, including the four V's of volume, velocity, variety and veracity. It also describes different types of data like structured, semi-structured and unstructured data. The document then introduces big data platforms and tools like Hadoop, Spark and Cassandra. Finally, it discusses the need for data analytics in business, including enabling better decision making and improving efficiency.
This document provides an overview of database normalization concepts. It begins by defining normalization as the process of organizing data in a database to eliminate redundant data and ensure data dependencies are properly represented by constraints. It then discusses first normal form (1NF), which requires each cell to contain a single value. Candidate keys and super keys are also defined. The document concludes by briefly mentioning higher normal forms up to fifth normal form (5NF) and some alternative database design approaches such as NoSQL and graph databases.
The document provides information about the syllabus for the Data Analytics (KIT-601) course. It includes 5 units that will be covered: Introduction to Data Analytics, Data Analysis techniques including regression modeling and multivariate analysis, Mining Data Streams, Frequent Itemsets and Clustering, and Frameworks and Visualization. It lists the course outcomes and Bloom's taxonomy levels. It also provides details on the topics to be covered in each unit, including proposed lecture hours, textbooks, and an evaluation scheme. The syllabus aims to discuss concepts of data analytics and apply techniques such as classification, regression, clustering, and frequent pattern mining on data.
This document provides an introduction to the concepts of data analytics and the data analytics lifecycle. It discusses big data in terms of the 4Vs - volume, velocity, variety and veracity. It also discusses other characteristics of big data like volatility, validity, variability and value. The document then discusses various concepts in data analytics like traditional business intelligence, data mining, statistical applications, predictive analysis, and data modeling. It explains how these concepts are used to analyze large datasets and derive value from big data. The goal of data analytics is to gain insights and a competitive advantage through analyzing large and diverse datasets.
This document is a slide presentation by Dr. Radhey Shyam on the topics of reinforcement learning and genetic algorithms. It discusses various types of applications that genetic algorithms can be used for, including control systems, design optimization, scheduling, robotics, machine learning, signal processing, game playing, and solving combinatorial optimization problems. Examples provided include gas pipeline control, missile evasion, aircraft design, manufacturing scheduling, neural network design, filter design, and solving the traveling salesman problem.
This document provides an overview of self-organizing maps (SOMs), a type of artificial neural network. It discusses the biological motivation for SOMs, which are inspired by self-organizing systems in the brain. The document outlines the basic architecture and learning algorithm of SOMs, including initialization, training procedures, and classification. It also reviews various properties of SOMs, such as their ability to approximate input spaces and perform topological ordering and density matching. Finally, applications of SOMs are briefly mentioned, such as for speech recognition, image analysis, and data visualization.
The document describes Convolutional Neural Networks (CNNs). It explains that CNNs are a type of neural network that uses convolutional layers, which apply filters to input data to extract features. This helps reduce the number of parameters needed compared to fully connected networks. The document provides examples of how CNNs can be used for image recognition, speech recognition, and text classification by applying filters that move across spatial or temporal dimensions of the input data.
1) The document discusses software metrics and Halstead's software science measures including program length, vocabulary, volume, difficulty, and effort. It provides the formulas to calculate these measures and an example calculation for a C function.
2) Guidelines are provided for identifying operands and operators when applying Halstead's measures to source code. Various program elements like variables, functions, and statements are classified.
3) The document also discusses other software metrics like lines of code (LOC) and function points which can be used to measure size and complexity. It provides a sample calculation of LOC and function points for a simple program.
The document provides an overview of Software Requirement Specification (SRS) and Software Quality Assurance (SQA). It discusses the importance of well-written requirements documents, as without them developers do not know what to build and customers do not know what to expect. The document also outlines different types of requirements like functional, non-functional, user and system requirements. It describes various requirements elicitation techniques like interviews, brainstorming sessions, use case approach etc. Finally, it discusses modeling requirements using tools like data flow diagrams, data dictionaries and entity relationship diagrams.
This document provides a 3 paragraph summary of a software engineering course titled "Software Engineering (KCS-601)" taught by Dr. Radhey Shyam at SRMCEM Lucknow. The course contents were compiled by Dr. Shyam and are available for students' academic use. Students can contact Dr. Shyam via email for any queries regarding the course material.
This document provides an overview of the unit 3 course material for Software Design taught by Dr. Radhey Shyam at SRMCEM Lucknow. The document discusses key concepts in software design including the importance of design, characteristics of good and bad design, coupling and cohesion, modularization, design models, high level design and architectural design. Specific topics covered include software design documentation, conceptual vs technical design, types of coupling and cohesion, advantages of modular systems, design frameworks, and strategies for design such as top-down, bottom-up, and hybrid approaches.
This document discusses image representation and description techniques. It begins by explaining that image segmentation results in a set of regions that need to be represented, often by their boundaries or internal characteristics, and described using features. Several boundary and regional representation and description methods are then outlined, including chain codes, shape numbers, Fourier descriptors, statistical moments, topology, and textures.
This document discusses image segmentation using morphological watersheds. It begins by explaining the concepts of regional minima, catchment basins, and watershed lines in a topographic representation of an image. It then describes the watershed algorithm which involves flooding the image from regional minima and building dams when flood waters would merge. The resulting dams represent the watershed lines and segmented boundaries. The document provides examples to illustrate the flooding process and discusses how markers can be used to limit oversegmentation from noise.
This document discusses image restoration and contains summaries of several lecture slides on image degradation and restoration models, noise models, and frequency domain filtering techniques for periodic noise reduction. It was compiled by Dr. Radhey Shyam with contributions from Dr. Philippe Cattin, and is intended for academic use by students to help explain basic concepts of image restoration.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Cc unit 1 updated
1. Cloud Computing (KCS-713)
Unit-1: Introduction To Cloud Computing
Dr. Radhey Shyam
Professor
Department of Computer Science and Engineering
SRMGPC Lucknow
(Affiliated to Dr. A.P.J. Abdul Kalam Technical University, Lucknow)
Unit-1 have been compiled/prepared by Dr. Radhey Shyam, with grateful acknowledgment who made their
course contents freely available. Feel free to use this study material for your own academic purposes. For
any query, the communication can be made through my mail shyam0058@gmail.com.
Date: December 14, 2021
2. Cloud Computing (KCS713)
(UNIT – I)
Introduction To Cloud Computing
What is the Cloud
Cloud also referred to as a network cloud. The cloud is a term referring to accessing computer,
information technology (IT), and software applications through a network connection, often by
accessing data centers using wide area networking (WAN) or Internet connectivity.
“It’s a place other than your computer that you can use to store your stuff.”
Almost all IT resources can live in the cloud: A software program or application, a service, or
an entire infrastructure. For example, if a business wanted to build an IT infrastructure, typically it
would install the servers, software, and networking resources it needed, but nearly all of those
services and resources are now accessible by going to third parties that offer them in the cloud.
Cloud computing is the delivery of different services through the Internet. These resources
include tools and applications like data storage, servers, databases, networking, and
software.
These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS),
Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The name cloud computing was
inspired by the cloud symbol that's often used to represent the Internet in flowcharts and diagrams.
1
3. Cloud Components
In a simple, topological sense, a cloud computing Solution is made up of several elements: Client
Computers, Distributed Servers and Data Centers are the three components of Cloud Computing.
As shown in fig. these components make up the three parts of a cloud computing solution.
1. Client Computers: They are, typically, the computers that just sit on your desk. But they might
also be laptops, tablets computers, mobiles phones, or PDAs.
The following are different types of Clients in Cloud Computing.
1. Mobile: Its include PDAs or Smartphone’s, like a blackberry, windows, iphones etc.
2. Thin: Clients are computers that do not have internal hard drives, but rather let the server do
all the work, but then display the information.
3. Thick: This type of client is a regular computer, using a web browser like firebox or internet
explorer to connect to the cloud.
The advantages of Thin Clients are
1) Lower hardware costs
2) Lower IT costs
3) Security
4) Data security
5) Less power consumption.
2
4. 2. Data Center:
The data center is the collection of servers where the application to which you subscribe is housed. It
could be a large room in the basement of your building or a room full of servers on the other side of
the world that you access via the Internet. A growing trend in the IT world is vitalizing servers. That
is, software can be installed allowing multiple instances of virtual servers to be used. In this way, you
can have half a dozen virtual servers running on one physical server.
3. Distributed Servers:
But the servers don’t all have to be housed in the same location. Often, servers are in geographically
disparate locations. But to you, the cloud subscriber, these servers act as if they’re humming away
right next to each other. This gives the service provider more flexibility in options and security. For
instance, Amazon has their cloud solution in servers all over the world. If something were to happen
at one site, causing a failure, the service would still be accessed through another site.
Examples of Popular Services that Use the Cloud
If you want to store, manage or take files from the cloud, you almost always need a personal account
for security reasons. Free accounts, which most people use, usually just require an email address
and a password.
o Dropbox: Dropbox is like your personal folder in the sky (or in the cloud) that can be
accessed from anywhere.
o Google Drive: Google Drive is just like Dropbox, but it integrates with all of your Google
tools like Google Docs, Gmail and others.
o Microsoft OneDrive: Much like Google Drive, Microsoft OneDrive is cloud storage that
integrates with integrates with your Microsoft applications, such as Word or Excel.
o Spotify: Spotify is a free music streaming service with a subscription option so that you can
enjoy thousands upon thousands of songs as often as you want.
o Netflix: Similar to Spotify, Netflix is a TV show and movie streaming service.
Advantages
Cloud computing has many advantages. It’s often faster to provision the service, and in many cases,
you can gain access to it instantly. Remote users can access cloud resources from wherever they
have a connection, rather than being
limited by physical geography.
o Convenience: does not require installing a specific piece of software to access or
manipulating cloud application.
3
5. o (Scalability) Elasticity: Companies can scale up as computing needs increase and scale
down again as demands decrease. This eliminates the need for massive investments in
local infrastructure, which may or may not remain active.
o Low costs
o Offers online development and deployment tools, programming runtime environment
through Platform as a Service model
o Security
o Anytime, anywhere access
o High availability
o Pay per use
1. There are certain technologies that are working behind the cloud computing platforms making
cloud computing flexible, reliable, and usable. These technologies are listed below:
Virtualization
Service-Oriented Architecture (SOA)
Grid Computing (distributed computing)
Utility Computing
1.1 Service-Oriented Architecture (SOA)
1.2 Grid Computing (also called "distributed computing") is a collection of computers working
together to perform various tasks. It distributes the workload across multiple systems, allowing
computers to contribute their individual resources to a common goal.
4
6. In order for systems in a computing grid to work together, they must be physically connected (over a
network or the Internet) and run software that allows them to communicate. The software used in
grid computing is called middleware since it translates the information passed from one system to
another into a recognizable format. This allows the data computed by one node within the grid to be
stored or processed by another system on the grid. “Grid computing is a processor architecture that
combines computer resources from various domains to reach a main objective. In grid computing,
the computers on the network can work on a task together, thus functioning as a supercomputer.”
Example: online gaming, Facebook, Twitter, LinkedIn, Typically applications like weather forecasting,
protein folding and earthquake simulation is prime candidates for a grid infrastructure.
1.3 Virtualization
1.4 Utility Computing is the process of providing computing service through an on-demand, pay-
per-use billing method. Utility computing is a computing business model in which the provider
owns, operates and manages the computing infrastructure and resources, and the subscriber
accesses it as and when required on a rental.
Example : Amazon E2C, Google AppEngine, Microsoft Azura
5
7. 1. There are certain services and models working behind the scene making the cloud computing
feasible and accessible to end users. The following are the working models for cloud
computing:
o Deployment models
o Service models
Cloud computing deployment models
There are various types of clouds, each of which is different from the other. It is often divided into
three categories (See Figure):
o public
o private
o Hybrid, referring to who has access to the services or infrastructure.
Public-cloud services are made available to anybody that wants to purchase. Public cloud services
are sold on demand, typically by the minute or hour, though long-term commitments are available for
many services. Customers only pay for the CPU cycles, storage or bandwidth they consume. Public
clouds can also typically be deployed much faster and with more scalability and accessibility than
on-premises infrastructure. Leading public cloud service providers include Amazon Web Services
(AWS), Microsoft Azure, IBM and Google Cloud Platform.
Private-cloud services are built by enterprises for use by their employees and partners only. In
other word it is a cloud environment set aside for the exclusive use of one organization.
Top Vendors: HPE, VMware, Dell EMC, IBM, Red Hat, Microsoft, OpenStack.
6
8. A hybrid cloud is a combination of both a public and private cloud with some level of integration
between the two. In which some critical data resides in the enterprise’s private cloud while other data
is stored in and accessible from a public cloud. Hybrid clouds seek to deliver the advantages of
scalability, reliability, rapid deployment and potential cost savings of public clouds with the security
and increased control and management of private clouds.
Top Vendors: Combination of both public and private cloud providers
Types of cloud computing services (Or Common Cloud Service Models or Types of
Cloud Computing)
Cloud computing is not a single piece of technology like a microchip or a cellphone. Rather, it's a
system primarily comprised of three services:
o software-as-a-service (SaaS)
o platform-as-a-service (PaaS)
o infrastructure-as-a-service (IaaS)
There are many other service models all of which can take Like XaaS, i.e. Anything as a Service.
This can be Network a as Service, Business as a Service, Identity as a Service, Database as a
Service or Strategy as a Service. The Infrastructure as a Service ( IaaS) is the most basic level of
service. Each of the service models make use of
the underlying(fundamental) service model, i.e. each inherits the security and management
mechanism from the underlying model, as shown in the following diagram.
7
9. (I) Infrastructure-as-a-service (IaaS)
Its provide access to fundamental resources such as physical machines, virtual machines, virtual
storage, etc. It involves a method for delivering everything from operating systems to servers and
storage through IP-based connectivity as part of an on-demand service. Clients can avoid the need
to purchase software or servers, and instead procure these resources in an outsourced, on-demand
service. Popular examples of the IaaS system include IBM Cloud and Microsoft Azure.
(II) Platform as a Service (PaaS)
It provide the runtime environment for applications, development & deployment tools etc. PaaS is a
computing platform being delivered as a service. PaaS shares some similarities with SaaS, the
primary difference being that instead of delivering software online, it is actually a platform for creating
software that is delivered via the Internet. Here the platform is outsourced in place of a company or
data center purchasing and managing its own hardware and software layers. Most PaaS are
designed for developers and aim to simplify the process of creating and deploying software.
For example, a Web developer might use a PaaS that includes operating system software, Web
server software, a database and related Web development tools. The leading PaaS vendors include
Amazon Web Services, Microsoft Azure, IBM and Google Cloud Platform, Heroku.
(III) Software as a Service (SaaS)
SaaS is a software delivery method that provides access to software and its functions remotely as a
Web-based service. Instead of paying an upfront fee to purchase and/or license software, SaaS
customers pay a recurring (often monthly or annual) fee to subscribe to the service. In general, they
can access the SaaS from any Internet-connected device, any time day or night. Well-known
examples of SaaS include Salesforce, Microsoft Office 365, Google G Suite, Dropbox, Adobe
Creative Cloud and others.
When it comes to providing services, the big players in the corporate computing sphere include:
o Google Cloud
o Amazon Web Services (AWS)
o Microsoft Azure
o IBM Cloud
o Aliyun
8
10. 2. Features of Cloud Computing
Following are the characteristics of Cloud Computing:
o Resource pooling is the sharing of computing capabilities, leads to increased resource
utilization rates.
o On-Demand Self-Service: A consumer can unilaterally provision computing capabilities, such
as server time and network storage, as needed automatically without requiring human
interaction with each service provider. In simple word the consumer performs all the actions
needed to acquire the service herself, instead of going through an IT department, for example.
The consumer’s request is then automatically processed by the cloud infrastructure, without
human intervention on the provider’s side.
o Easy Maintenance: The servers are easily maintained and the downtime is very low; in some
cases, there is no downtime. The cloud computing comes up with an update every time by
gradually making it better. The updates are more compatible with the devices and perform
faster than older ones along with the bugs which are fixed.
o Large Network Access: The user can access the data of the cloud or upload the data to the
cloud from anywhere just with the help of a device and an internet connection. These
capabilities are available all over the network and accessed with the help of internet.
9
11. o Availability: The capabilities of the cloud can be modified as needed and can extend a lot. It
analyzes the storage usage and allows the user to buy extra storage if needed for a very small
amount. This service is available anytime and can be accessed from anywhere.
o Automation System: Cloud computing automatically analyzes the data needed and supports a
metering capability at some level of services. We can monitor, control, and report the usage. It
will provide transparency for the host as well as the customer.
o Economical: It is the one-time investment as the company (host) has to buy the storage and a
small part of it can be provided to the many companies which save the host from monthly or
yearly costs. Only the amount which is spent is on the basic maintenance and a few more
expenses which are very less.
o Security: This is one of the best features of cloud computing. It creates a snapshot of the data
stored so that the data may not get lost even if one of the server damages. The data stores
within the storage devices which cannot hack and utilize by any other person. The storage
service is quick and reliable which can access from anywhere just with the help of a device and
internet connection.
o Pay – as You – Go: In cloud computing, the user has to pay only for the service or the space
they have utilized. There is no hidden or extra charge which is to be paid. The service is
economical and most of the time some space allows for free.
o Measured Service: Cloud computing resources used to monitor and the company uses it for
recording. This resource utilization is analyzed by supporting charge-per-use capabilities. This
means that the resource usages which can be either virtual server instances that are running in
the cloud are getting monitored measured and reported by the service provider. The model pay
as you go is variable based on actual consumption of the manufacturing organization.
3. A history of cloud computing
It was a gradual evolution that started in the 1950s with mainframe computing.
Multiple users were capable of accessing a central computer through dumb terminals, whose only
function was to provide access to the mainframe. Because of the costs to buy and maintain
mainframe computers, it was not practical for an organization to buy and maintain one for every
employee. Nor did the typical user need the large (at the time) storage capacity and processing
10
12. power that a mainframe provided. Providing shared access to a single resource was the solution that
made economical sense for this sophisticated piece of technology.
The history of cloud computing starts way back in the 1960s, when an “intergalactic computer
network” (was a computer networking concept similar to today's Internet ) was first suggested, and in
recent years the technology has served to shake-up both the enterprise IT and supplier landscape.
Who invented cloud computing?
Cloud computing has evolved through a number of phases that include grid and utility computing,
application service provision and software as a service (SaaS), but the overarching (very Important)
concept of delivering computing resources through a global network is rooted in the 1960s.
The idea of an “intergalactic computer network” was introduced in the 1960s by JCR Licklider, who
was responsible for enabling the development of the Advanced Research Projects Agency Network
(ARPANET) in 1969. His vision was for everyone on the globe to be interconnected and accessing
programs and data at any site, from anywhere.
“It laid the foundation for grid computing, an early forerunner of cloud, which linked together
geographically dispersed computers to create a loosely coupled network. In turn this led to the
development of utility computing which is closer to what Licklider originally envisioned,” she
continues.
“It’s also closer to what we think of as the cloud today, with a service provider owning, operating and
managing the computing infrastructure and resources, which are made available to users on an on-
demand, pay-as-you-go basis.”
After some time, around 1970, the concept of virtual machines (VMs) was created.
Using virtualization software like VMware, it became possible to execute one or more operating
systems simultaneously in an isolated environment. Complete computers (virtual) could be executed
inside one physical hardware which in turn can run a completely different operating system.
The virtual machine (VM) operating system took the 1950s’ shared access mainframe to the
next level, permitting multiple distinct computing environments to reside on one physical
environment. Virtualization came to drive the technology, and was an important catalyst in the
communication and information evolution.
11
13. In the 1990s, telecommunications companies started offering virtualized private network
connections.
Historically, telecommunications companies only offered single dedicated point–to-point data
connections. The newly offered virtualized private network connections had the same service quality
as their dedicated services at a reduced cost. Instead of building out physical infrastructure to allow
for more users to have their own connections, telecommunications companies were now able to
provide users with shared access to the same physical infrastructure. The following list briefly
explains the evolution of cloud computing:
• Grid computing: Solving large problems with parallel computing
• Utility computing: Offering computing resources as a metered service
SaaS: Network-based subscriptions to application
Cloud computing: Anytime, anywhere access to IT resources delivered dynamically as a service
Now, let’s talk a bit about the present.
SoftLayer is one of the largest global providers of cloud computing infrastructure. IBM already has
platforms in its portfolio that include private, public and hybrid cloud solutions. The purchase of
SoftLayer guarantees an even more comprehensive infrastructure as a service (IaaS) solution. While
many companies look to maintain some applications in data centers, many others are moving to
public clouds. Even now, the purchase of bare metal can be modeled in commercial cloud (for
example, billing by usage or put another way, physical server billing by the hour). The result of this is
that a bare metal server request with all the resources needed, and nothing more, can be delivered
with a matter of hours.
4. Hypervisor
The hypervisor is software that can virtualize the hardware resources. A hypervisor is a hardware
virtualization technique that allows multiple guest operating systems (OS) to run on a single host
system at the same time. A hypervisor is also known as a virtual
machine manager (VMM). These virtual machines are also
referred as guest machines and they all share the hardware of
the physical machine like memory, processor, storage and other
related resources. This improves and enhances the utilization of
the underlying resources.
Types of Hypervisor – Hypervisors can be divided into two
types:
Type 1: Also known as native or bare-metal hypervisors,
12
14. these run directly on the host computer’s hardware to control the hardware resources and to manage
guest operating systems.
Examples of Type 1 hypervisors include VMware ESXi,
Citrix XenServer and Microsoft Hyper-V hypervisor.
Type 2: Also known as hosted hypervisors, these
run within a formal operating system environment. In
this type,
the hypervisor runs as a distinct second layer while the
operating system runs as a third layer above the
hardware.
5. Distributed Computing
A distributed system is a network of autonomous computers that communicate with each
other in order to achieve a goal. The computers in a distributed system are independent and do not
physically share memory or processors. They communicate with each other using messages, pieces
of information transferred from one computer to another over a network. Messages can
communicate many things: computers can tell other computers to execute a procedures with
particular arguments, they can send and receive packets of data, or send signals that tell other
computers to behave a certain way.
Examples of distributed systems / applications of distributed computing:
Intranets, Internet, WWW, email.
Telecommunication networks: Telephone networks and Cellular networks.
Network of branch office computers -Information system to handle automatic processing of orders,
Real-time process control: Aircraft control systems,
Electronic banking,
Airline reservation systems,
Sensor networks,
There are two predominant ways of organizing computers in a distributed system. The first is
the client-server architecture, and the second is the peer-to-peer architecture.
13
15. Client/Server Systems
The client-server architecture is a way to dispense a service from a central source. There is a single
server that provides a service, and multiple clients that communicate with the server to consume its
products. In this architecture, clients and servers have different jobs. The server's job is to respond
to service requests from clients, while a client's job is to use the data provided in response in order to
perform some task.
Peer-to-peer Systems
The client-server model is appropriate for service-oriented situations. However, there are other
computational goals for which a more equal division of labor is a better choice. The term peer-to-
peer is used to describe distributed systems in which labor is divided among all the components of
the
14
16. system. All the computers send and receive data, and they all contribute some processing power
and memory. As a distributed system increases in size, its capacity of computational resources
increases. In a peer-to-peer system, all components of the system contribute some processing
power and memory to a distributed computation.
15
17. 6. What is Parallel computing?
Serial Computing:
o A problem is broken into a discrete series of instructions
o Instructions are executed sequentially one after another
o Executed on a single processor
o Only one instruction may execute at any moment in time
16
18. Parallel Computing:
In the simplest sense, parallel computing is the simultaneous use of multiple compute resources to
solve a computational problem:
A problem is broken into discrete parts that can be solved concurrently
Each part is further broken down to a series of instructions
Instructions from each part execute simultaneously on different processors
An overall control/coordination mechanism is employed
Advantages of Parallel Computing over Serial Computing are as follows:
1. It saves time and money as many resources working together will reduce the time and cut
potential costs.
2. It can be impractical to solve larger problems on Serial Computing.
Difference between Parallel and Distributed Computing
Definition---Parallel computing is a type of computation in which many calculations or
execution of processes are carried out simultaneously. Whereas, a distributed system is a
system whose components are located on different networked computers which communicate
and coordinate their actions by passing messages to one another. Thus, this is the
fundamental difference between parallel and distributed computing.
Number of computers---Parallel computing occurs in a single computer whereas distributed
computing involves multiple computers.
Functionality---In parallel computing, multiple processors execute multiple tasks at the same
time. However, in distributed computing, multiple computers perform tasks at the same time.
Hence, this is another difference between parallel and distributed computing.
17
19. Memory---Moreover, memory is a major difference between parallel and distributed
computing. In parallel computing, the computer can have a shared memory or distributed
memory. In distributed computing, each computer has its own memory.
Communication---In parallel computing, the processors communicate with each other using a
bus. In distributed computing, computers communicate with each other via the network.
Usage---Parallel computing helps to increase the performance of the system. In contrast,
distributed computing allows scalability, sharing resources and helps to perform computation
tasks efficiently. So, this is also a difference between parallel and distributed computing.
7. Elasticity in Cloud
Typically, elasticity is a system’s ability to shrink or expand infrastructure resources potentially as
required in order to adjust to workload variations simply in an autonomic way, ensuring resource
efficiencies. Application of ‘Elastic Services’ usually means that each resource available in the
system infrastructure has to be elastic. Such resources include software, hardware, connectivity,
QoS and other matters that are utilized in inelastic applications. Thus, it may turn out to be a
negative trait where certain applications’ performances should have absolutely guaranteed
performance.
The dynamic adaptation of capacity, e.g., by altering the use of computing resources, to meet a
varying workload is called "elastic computing". Elasticity aims at matching the amount of resource
allocated to a service with the amount of resource it actually requires, avoiding over- or under-
provisioning.
18
20. Over-provisioning---allocating more resources than required, should be avoided as the service
provider often has to pay for the resources that are allocated to the service. For example, an
Amazon EC2 M4 extra-large instance costs US$0.239/hour. If a service h as allocated two virtual
machines when only one is required, the service provider wastes $2,095 every year. Hence, the
service provider's expenses are higher than optimal and their profit is reduced.
Under-provisioning---allocating fewer resources than required, must be avoided, otherwise the
service cannot serve its users with a good service. In the above example, under-provisioning the
website may make it seem slow or unreachable. Web users eventually give up on accessing it, thus,
the service provider loses customers. On the long term, the provider's income will decrease, which
also reduces their profit.
SCALABILITY - ability of a system to increase the workload on its current hardware resources scale
up;
ELASTICITY - ability of a system to increase the workload on its current and additional (dynamically
added on demand) hardware resources (scale out);
8. Provisioning
In general, provisioning means "providing" or making something available. The term is used in a
variety of contexts in IT. For example, in grid computing, to provision is to activate a grid component,
such as a server, or switch, so that it is available for use. In a storage area network (SAN), storage
provisioning is the process of assigning storage to optimize performance. In telecommunications
terminology, provisioning means providing a product or service, such as wiring or bandwidth.
Cloud provisioning is the allocation of a cloud provider's resources and services to a customer.
Cloud provisioning is a key feature of the cloud computing model, relating to how a customer
procures cloud services and resources from a cloud provider. The growing catalog of cloud services
that customers can provision includes infrastructure as a service, software as a service and platform
as a service, in public or private cloud environments.
There are three different delivery models:
Dynamic/On-Demand Provisioning: The customer or requesting application is provided with
resources on run time. With dynamic provisioning, cloud resources are deployed flexibly to match a
customer's fluctuating demands. The deployments typically scale up to accommodate spikes in
usage and scale down when demands decrease. The customer is billed on a pay-per-use basis.
When dynamic provisioning is used to create a hybrid cloud environment, it is sometimes referred to
as cloud bursting.
19
21. User Provisioning: The user/customer adds a cloud device or device themselves. With user
self-provisioning, also called cloud self-service, the customer buys resources from the cloud provider
through a web interface or portal. This usually involves creating a user account and paying for
resources with a credit card. Those resources are then quickly spun up and made available for use --
within hours, if not minutes. Examples of this type of cloud provisioning include employee purchasing
cloud-based productivity applications via the Microsoft Office 365 suite or Google Apps for Business.
Post-Sales/Advanced Provisioning: The customer is provided with the resource upon
contract/service signup. With advanced provisioning, the customer signs a formal contract of service
with the cloud provider. The provider then prepares the agreed-upon resources or services for the
customer and delivers them. The customer is charged a flat fee or is billed on a monthly basis.
From a provider’s standpoint, cloud provisioning can include the supply and assignment of required
cloud resources to the customer. For example, the creation of virtual machines, the allocation of
storage capacity and/or granting access to cloud software.
References:
[1] R Shyam, P Srivastava, DS Kushwaha, “A Taxonomy and Survey of Cloud Computing [Security
Issues and Challenges]”, BL Joshi, 62, 2012.
[2] PK Varshney, P Singh, R Shyam, “Weak Spots of Cloud Computing and Their Revelations”, BL
20
22. Joshi, 109, 2012.
[3] Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, “Distributed and Cloud Computing, From Parallel
Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.
[4] Rittinghouse, John W., and James F. Ransome, “Cloud Computing: Implementation,
Management and Security”, CRC Press, 2017.
[5] Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi, “Mastering Cloud Computing”, Tata
Mcgraw Hill, 2013.
[6] Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing – A Practical Approach”, Tata
Mcgraw Hill, 2009.
[7] George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the
Cloud”: Transactional Systems for EC2 and Beyond (Theory in Practice), O’Reilly, 2009.
21