This document provides an overview of cloud computing basics. It defines cloud computing as delivering computational resources like software and hardware as a service over the internet. Key aspects covered include the origin and evolution of cloud computing from the 1960s to present day, cloud components like clients, data centers and distributed servers, essential cloud characteristics, and architectural influences on cloud computing including high performance computing, utility computing, and autonomic computing. It also discusses service consolidation in computing.
The document discusses cloud computing, including its advantages of lower costs, pay-as-you-go computing, elasticity and scalability. It describes cloud computing models such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It also discusses major cloud computing vendors and the growing worldwide cloud services revenue.
This document provides an overview of CloudSim, an open-source simulation toolkit for modeling and simulating cloud computing environments and applications. It discusses CloudSim's architecture, features, and applications. CloudSim provides a framework for modeling data centers, cloud resources, virtual machines, and cloud services to simulate cloud computing infrastructure and platforms. It has been used by researchers around the world for applications like evaluating resource allocation algorithms, energy-efficient management of data centers, and optimization of cloud computing environments and workflows.
In today’s world the growing demand for knowledge has made cloud computing a center of attraction. Cloud computing is providing utility based services to all the users worldwide. It enables presentation of applications from consumers, scientific and business domains. However, data centers created for cloud computing applications consume huge amounts of energy, contributing to high operational costs and a large amount of carbon dioxide emission to the environment. With enhancement of data center, the power consumption is increasing at such a rate that it has become a key concern these days because it is ultimately leading to energy shortcomings and global climatic change. Therefore, we need green cloud computing solutions that can not only save energy, but also reduce operational costs.
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Cloud computing is a general term for networked services and resources provided over the internet. It allows users to access computing power, databases, and applications remotely through web services. Key characteristics include on-demand access to computing resources, elasticity to scale up or down based on needs, and a pay-as-you-go model where users only pay for what they use. Common cloud service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Virtualization is a core technology enabling cloud computing by allowing multiple virtual machines to run on a single physical machine. Major cloud providers include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
This document defines cloud computing and outlines its key characteristics. Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. Users can access these resources from anywhere without needing to manage the physical infrastructure. The cloud offers advantages like flexibility, scalability, device independence and reduced costs compared to maintaining physical servers. However, security, vendor lock-in and reliance on a stable internet connection are challenges to cloud computing adoption.
This document provides an introduction to cloud computing, including definitions and types of cloud services. It discusses cloud computing in education and Malaysia. Cloud computing refers to software and hardware managed remotely by third parties and accessed over the internet. There are three main types of cloud services: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Common cloud computing examples include Dropbox, Microsoft SkyDrive, Google Drive, and Apple iCloud. The document also discusses how cloud computing can benefit education through e-learning and how initiatives in Malaysia like the Shared Cloud Enterprise Services project aim to accelerate cloud adoption.
The document discusses cloud computing and Aleric's cloud computing platform and services. Some key points:
- Cloud computing provides on-demand access to massive computing resources via the internet as a service. Resources are dynamically allocated from data centers located worldwide.
- Aleric's cloud platform combines advantages of cloud and enterprise security, offering private, public, or hybrid clouds with customizable and secure storage, networking, and access.
- Aleric accelerates customers' time to market by providing a secure cloud platform, instant application deployment, and partnerships within its Cloud Computing Alliance program.
The document discusses cloud computing, including its advantages of lower costs, pay-as-you-go computing, elasticity and scalability. It describes cloud computing models such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It also discusses major cloud computing vendors and the growing worldwide cloud services revenue.
This document provides an overview of CloudSim, an open-source simulation toolkit for modeling and simulating cloud computing environments and applications. It discusses CloudSim's architecture, features, and applications. CloudSim provides a framework for modeling data centers, cloud resources, virtual machines, and cloud services to simulate cloud computing infrastructure and platforms. It has been used by researchers around the world for applications like evaluating resource allocation algorithms, energy-efficient management of data centers, and optimization of cloud computing environments and workflows.
In today’s world the growing demand for knowledge has made cloud computing a center of attraction. Cloud computing is providing utility based services to all the users worldwide. It enables presentation of applications from consumers, scientific and business domains. However, data centers created for cloud computing applications consume huge amounts of energy, contributing to high operational costs and a large amount of carbon dioxide emission to the environment. With enhancement of data center, the power consumption is increasing at such a rate that it has become a key concern these days because it is ultimately leading to energy shortcomings and global climatic change. Therefore, we need green cloud computing solutions that can not only save energy, but also reduce operational costs.
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Cloud computing is a general term for networked services and resources provided over the internet. It allows users to access computing power, databases, and applications remotely through web services. Key characteristics include on-demand access to computing resources, elasticity to scale up or down based on needs, and a pay-as-you-go model where users only pay for what they use. Common cloud service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Virtualization is a core technology enabling cloud computing by allowing multiple virtual machines to run on a single physical machine. Major cloud providers include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
This document defines cloud computing and outlines its key characteristics. Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. Users can access these resources from anywhere without needing to manage the physical infrastructure. The cloud offers advantages like flexibility, scalability, device independence and reduced costs compared to maintaining physical servers. However, security, vendor lock-in and reliance on a stable internet connection are challenges to cloud computing adoption.
This document provides an introduction to cloud computing, including definitions and types of cloud services. It discusses cloud computing in education and Malaysia. Cloud computing refers to software and hardware managed remotely by third parties and accessed over the internet. There are three main types of cloud services: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Common cloud computing examples include Dropbox, Microsoft SkyDrive, Google Drive, and Apple iCloud. The document also discusses how cloud computing can benefit education through e-learning and how initiatives in Malaysia like the Shared Cloud Enterprise Services project aim to accelerate cloud adoption.
The document discusses cloud computing and Aleric's cloud computing platform and services. Some key points:
- Cloud computing provides on-demand access to massive computing resources via the internet as a service. Resources are dynamically allocated from data centers located worldwide.
- Aleric's cloud platform combines advantages of cloud and enterprise security, offering private, public, or hybrid clouds with customizable and secure storage, networking, and access.
- Aleric accelerates customers' time to market by providing a secure cloud platform, instant application deployment, and partnerships within its Cloud Computing Alliance program.
Green computing refers to using computing resources efficiently and minimizing environmental impact. It involves implementing energy-efficient policies and practices when setting up and operating IT systems. The goals of green computing include minimizing energy consumption, purchasing green energy, and reducing employee/customer travel requirements. Green cloud computing aims to achieve efficient infrastructure utilization and processing while minimizing energy usage. It uses techniques like dynamic resource allocation and powering down underutilized servers.
This document discusses cloud computing, including:
1. It defines cloud computing as internet-based computing where virtual servers provide resources like software, infrastructure, platforms and devices to customers on a pay-as-you-use basis.
2. It describes the main types of clouds: SaaS, PaaS, and IaaS which provide software, platforms, and infrastructure as services respectively.
3. It outlines some key advantages like pay-as-you-use, location independence, instant scalability, and abstraction which allows enterprises to focus on their core business.
The document discusses the top 10 cloud service providers:
1. Amazon EC2 provides scalable computing resources that can be accessed over the internet and only pay for what is used.
2. Verizon offers vCloud Express which provides flexible and on-demand computing resources through an intuitive web console.
3. IBM provides private, hybrid, and public cloud solutions including infrastructure, platforms and software as a service.
It then briefly describes each of the top 10 providers and their key cloud computing offerings.
The document discusses cloud computing infrastructure models and service models. It describes public, private, and hybrid cloud infrastructure models and how they differ in terms of deployment location and control. It also outlines the three main service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). SaaS delivers applications over the internet, PaaS provides computing platforms, and IaaS offers virtualized computing infrastructure.
This PPT provides an introduction to cloud Computing. It briefly talks about fundamental cloud services, deployment models and the factors that made it an emerging paradigm.
The document presents a presentation on cloud computing. It begins with an outline of topics to be covered, including definitions of cloud computing, the history of cloud computing, components and characteristics of cloud computing, cloud service models, types of clouds, cloud architecture, properties, security, operating systems, applications, and advantages and disadvantages. It then goes on to define cloud computing and describe its various components, characteristics, service models including SaaS, PaaS, and IaaS. It also discusses types of clouds, properties, security considerations, operating systems, applications, and the advantages and disadvantages of cloud computing.
Cloud computing provides on-demand access to shared computing resources and infrastructure over the Internet. It refers to services delivered on-demand via the Internet from large pools of systems that are linked together. There are different types of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud computing architecture consists of a front end accessed by users and a back end of servers and storage that create the "cloud" of computing services.
This document discusses green cloud computing. It begins by defining cloud computing and green computing, noting that cloud computing requires large data centers that consume significant energy. It then discusses how green cloud computing aims to reduce this energy usage through techniques like server virtualization and energy-aware resource allocation. Specific strategies that cloud providers and data centers are taking to improve energy efficiency are also summarized, such as geographic placement of data centers and measures to optimize cooling.
Cloud computing allows users to access software and store data on remote servers over the internet rather than locally on their own computers. It provides various services including infrastructure, platforms, and applications. Major cloud providers include Amazon Web Services which offers services like Amazon EC2 for scalable computing capacity in the cloud. Cloud computing provides advantages like reduced costs and time to access resources compared to maintaining one's own datacenter, but also risks around security and control over the infrastructure.
The document discusses green cloud computing and describes a technical seminar presented by S.Sai Madhuri. It defines cloud computing and discusses types including SaaS, PaaS, and IaaS. It then explains green computing and green cloud computing, describing the core components and architecture of data centers. The document outlines the objective of calculating energy consumption using a green cloud simulator in VMWare Player to analyze existing systems and develop more efficient solutions.
This presentation provides an overview of cloud computing, including:
1. Cloud computing allows on-demand access to computing resources like servers, storage, databases, networking, software, analytics and more over the internet.
2. Key features of cloud computing include scalability, availability, agility, cost-effectiveness, and device/location independence.
3. Popular cloud storage services include Google Drive, Dropbox, and Apple iCloud which offer free basic storage with options to pay for additional storage.
Cloud computing is the on-demand delivery of IT resources and applications via the Internet with pay-as-you-go pricing. It evolved from earlier technologies like grid computing and utility computing by providing greater ease of use and on-demand scaling. A cloud broker acts as an intermediary between cloud service providers and customers, providing a unified interface and moving workloads between public and private clouds for improved performance and redundancy.
Cloud computing provides on-demand access to shared computing resources like servers, storage, databases, networking, software and analytics over the internet. It delivers these resources as scalable services in three main categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Cloud computing offers advantages like lower costs, improved performance, unlimited storage and collaboration capabilities compared to traditional computing but requires a constant internet connection to access resources.
This is a brief introduction to Microsoft Azure cloud. I used these slides in an intro session for developers. I did few demos during the session that not included in the slide. Brand name and logos are properties of their respective owners.
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
This PPT contains Following Topics-
1.what is virtualization?
2.Examples of virtualization.
3.Techniques of virtualization.
4.Types of virtualization.
5.What is Hipervisor.
6.Types of Hypervisor with Diagrams.
Some set of examples are there like Virtual Box with demo image.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
This document discusses cloud computing. It defines cloud computing as using computer resources that are delivered as a service over the Internet. These resources include hardware, software, storage and databases. Users can access these resources from anywhere as needed rather than having the resources provided locally. The document then discusses key characteristics of cloud computing like multi-tenancy, scalability, on-demand resources and reliability. It also discusses different types of cloud models including public, private and hybrid clouds. Finally, it provides examples of cloud computing platforms like Amazon Web Services and Google Application Engine.
Green computing refers to using computing resources efficiently and minimizing environmental impact. It involves implementing energy-efficient policies and practices when setting up and operating IT systems. The goals of green computing include minimizing energy consumption, purchasing green energy, and reducing employee/customer travel requirements. Green cloud computing aims to achieve efficient infrastructure utilization and processing while minimizing energy usage. It uses techniques like dynamic resource allocation and powering down underutilized servers.
This document discusses cloud computing, including:
1. It defines cloud computing as internet-based computing where virtual servers provide resources like software, infrastructure, platforms and devices to customers on a pay-as-you-use basis.
2. It describes the main types of clouds: SaaS, PaaS, and IaaS which provide software, platforms, and infrastructure as services respectively.
3. It outlines some key advantages like pay-as-you-use, location independence, instant scalability, and abstraction which allows enterprises to focus on their core business.
The document discusses the top 10 cloud service providers:
1. Amazon EC2 provides scalable computing resources that can be accessed over the internet and only pay for what is used.
2. Verizon offers vCloud Express which provides flexible and on-demand computing resources through an intuitive web console.
3. IBM provides private, hybrid, and public cloud solutions including infrastructure, platforms and software as a service.
It then briefly describes each of the top 10 providers and their key cloud computing offerings.
The document discusses cloud computing infrastructure models and service models. It describes public, private, and hybrid cloud infrastructure models and how they differ in terms of deployment location and control. It also outlines the three main service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). SaaS delivers applications over the internet, PaaS provides computing platforms, and IaaS offers virtualized computing infrastructure.
This PPT provides an introduction to cloud Computing. It briefly talks about fundamental cloud services, deployment models and the factors that made it an emerging paradigm.
The document presents a presentation on cloud computing. It begins with an outline of topics to be covered, including definitions of cloud computing, the history of cloud computing, components and characteristics of cloud computing, cloud service models, types of clouds, cloud architecture, properties, security, operating systems, applications, and advantages and disadvantages. It then goes on to define cloud computing and describe its various components, characteristics, service models including SaaS, PaaS, and IaaS. It also discusses types of clouds, properties, security considerations, operating systems, applications, and the advantages and disadvantages of cloud computing.
Cloud computing provides on-demand access to shared computing resources and infrastructure over the Internet. It refers to services delivered on-demand via the Internet from large pools of systems that are linked together. There are different types of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud computing architecture consists of a front end accessed by users and a back end of servers and storage that create the "cloud" of computing services.
This document discusses green cloud computing. It begins by defining cloud computing and green computing, noting that cloud computing requires large data centers that consume significant energy. It then discusses how green cloud computing aims to reduce this energy usage through techniques like server virtualization and energy-aware resource allocation. Specific strategies that cloud providers and data centers are taking to improve energy efficiency are also summarized, such as geographic placement of data centers and measures to optimize cooling.
Cloud computing allows users to access software and store data on remote servers over the internet rather than locally on their own computers. It provides various services including infrastructure, platforms, and applications. Major cloud providers include Amazon Web Services which offers services like Amazon EC2 for scalable computing capacity in the cloud. Cloud computing provides advantages like reduced costs and time to access resources compared to maintaining one's own datacenter, but also risks around security and control over the infrastructure.
The document discusses green cloud computing and describes a technical seminar presented by S.Sai Madhuri. It defines cloud computing and discusses types including SaaS, PaaS, and IaaS. It then explains green computing and green cloud computing, describing the core components and architecture of data centers. The document outlines the objective of calculating energy consumption using a green cloud simulator in VMWare Player to analyze existing systems and develop more efficient solutions.
This presentation provides an overview of cloud computing, including:
1. Cloud computing allows on-demand access to computing resources like servers, storage, databases, networking, software, analytics and more over the internet.
2. Key features of cloud computing include scalability, availability, agility, cost-effectiveness, and device/location independence.
3. Popular cloud storage services include Google Drive, Dropbox, and Apple iCloud which offer free basic storage with options to pay for additional storage.
Cloud computing is the on-demand delivery of IT resources and applications via the Internet with pay-as-you-go pricing. It evolved from earlier technologies like grid computing and utility computing by providing greater ease of use and on-demand scaling. A cloud broker acts as an intermediary between cloud service providers and customers, providing a unified interface and moving workloads between public and private clouds for improved performance and redundancy.
Cloud computing provides on-demand access to shared computing resources like servers, storage, databases, networking, software and analytics over the internet. It delivers these resources as scalable services in three main categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Cloud computing offers advantages like lower costs, improved performance, unlimited storage and collaboration capabilities compared to traditional computing but requires a constant internet connection to access resources.
This is a brief introduction to Microsoft Azure cloud. I used these slides in an intro session for developers. I did few demos during the session that not included in the slide. Brand name and logos are properties of their respective owners.
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
This PPT contains Following Topics-
1.what is virtualization?
2.Examples of virtualization.
3.Techniques of virtualization.
4.Types of virtualization.
5.What is Hipervisor.
6.Types of Hypervisor with Diagrams.
Some set of examples are there like Virtual Box with demo image.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
This document discusses cloud computing. It defines cloud computing as using computer resources that are delivered as a service over the Internet. These resources include hardware, software, storage and databases. Users can access these resources from anywhere as needed rather than having the resources provided locally. The document then discusses key characteristics of cloud computing like multi-tenancy, scalability, on-demand resources and reliability. It also discusses different types of cloud models including public, private and hybrid clouds. Finally, it provides examples of cloud computing platforms like Amazon Web Services and Google Application Engine.
This document discusses different types of computing models including cloud computing, grid computing, utility computing, distributed computing, and cluster computing. It provides details on each model, including definitions, key characteristics, and examples. The document also evaluates cloud computing in terms of business drivers for adoption such as business growth, efficiency, customer experience, and assurance. It explains the NIST cloud computing model including deployment models (private, public, hybrid, community clouds) and service models (SaaS, PaaS, IaaS). Finally, it discusses differences between cloud computing, grid computing and cluster computing and provides a note on characteristics and properties of cloud computing.
The project aims to create an integrated digital platform for managing SUAP (Single Authorization Procedure) in compliance with current legislation. The platform will allow citizens, companies, and professionals to complete administrative procedures online in a more efficient and transparent manner. It will be used by the back office and users to open, close, or modify business activities. The work was commissioned by the SUAP office of the Murgia area to provide SUAP services completely online.
Cloud computing allows storing and accessing data and programs over the internet instead of on a local computer or server. It provides cost savings through a pay-as-you-go model without needing to own physical computing infrastructure. However, integrating cloud with IoT presents challenges like security issues due to resource-constrained IoT devices that cannot support complex encryption. Cloud-IoT integration also faces difficulties around data integration from diverse sources and ensuring communication across different devices and platforms. Effective strategies include using IoT SDKs, communication modules, local gateways, and cloud gateways to connect various types of devices to the cloud while addressing issues like latency, responsiveness, location awareness and mobility.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It addresses challenges with conventional computing like high costs of software licensing, limited scalability and physical security issues. Cloud computing delivers resources as a service on a pay-per-use basis and provides advantages like lower costs, better service levels, rapid scalability and low maintenance requirements.
Cloud computing allows users to access technology services over the Internet on an as-needed basis. It provides on-demand access to shared computing resources like networks, servers, storage, databases, software, analytics and more without users having to maintain the infrastructure. The key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service. The document discusses the history and components of cloud computing.
The document discusses cloud computing concepts including definitions, types of cloud computing (public, private, hybrid, community cloud), differences between cloud computing and traditional computing, advantages and disadvantages of cloud computing, examples of cloud computing, and more. Specifically, it defines cloud computing as a model for enabling network access to configurable computing resources that can be provisioned on-demand with minimal management effort. It also discusses key characteristics of cloud computing like scalability, device independence, and pay-per-use model.
This document provides an overview of cloud computing, including its key characteristics, service models, deployment models, examples, advantages and limitations. Specifically, it defines cloud computing as the delivery of computing resources such as servers, storage, databases and software over the internet. It describes the main service models of software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). It also outlines the deployment models of public, private and hybrid clouds and discusses some advantages like scalability, cost savings and disadvantages like security issues and dependence on internet connectivity.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1. Cloud computing involves delivering computing resources and services over the internet instead of relying on local servers or personal computers. It enables users to access applications and store/process data using remote servers.
2. There are three main types of cloud computing services: Infrastructure as a Service (IaaS) provides virtual computing resources; Platform as a Service (PaaS) offers platforms for developing applications; and Software as a Service (SaaS) delivers fully functional applications over the internet.
3. The main deployment models are public clouds which are owned by third parties and available publicly, private clouds which are dedicated to a single organization, and hybrid clouds which combine public and private clouds.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. It allows users to access technology-based services from the network cloud without knowledge of, expertise with, or control over the underlying technology infrastructure that supports them. Key benefits of cloud computing include lower costs, better scalability and flexibility.
This document discusses cloud computing and related concepts:
1. Cloud computing is a model for delivering computing resources such as hardware and software via a network. Users can access scalable resources from the cloud without knowing details of the infrastructure.
2. Technologies like virtualization, distributed storage, and broadband internet access enable cloud computing. This shifts processing to large remote data centers managed by cloud providers.
3. For service providers, cloud computing offers benefits like reduced infrastructure costs and improved efficiency. For users, it provides flexible access to resources without upfront investment or management overhead.
Cloud computing allows users to access computing resources like servers, storage, databases, networking, software, analytics and more over the internet. It provides scalability, reliability and cost savings. There are different cloud service models like Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Users can choose between public, private or hybrid cloud deployment models based on their needs.
Cloud computing is a technology that uses internet-connected remote servers rather than local hardware or software to maintain data and applications. This allows users to access files and applications from any device with an internet connection. Key benefits include reduced costs, increased storage, automatic updates, flexibility, and mobility. However, users relinquish direct control and responsibility of their data to the cloud provider.
It's a simple presentation I did it with my friend Khawlah Al-Mazyd last year as a one topic should we cover it through doing Advanced Network course.
2010 - King Saud Universty
Riyadh - Saudi Arabia
The document discusses cloud computing, including definitions, key characteristics, components, roles, and implementations. It defines cloud computing as using web-based tools and storing information on remote servers operated by another company. Key characteristics include scalability, multi-tenancy, pay-per-use pricing, and device/location independence. The main components are infrastructure, storage, platforms, applications, services, and clients. Implementations discussed include the Virtual Computing Laboratory and Amazon EC2.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document discusses cloud computing and defines it as the delivery of computing resources over the Internet. It describes the key characteristics of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It also discusses the benefits of cloud computing such as cost savings, scalability, reliability, and simplified maintenance. Finally, it outlines the important components needed to build a dynamic cloud infrastructure including service management, asset management, virtualization, and energy efficiency.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
2. Cloud computing
Cloud computing is the process of delivering or
providing computational resources like software
and/or hardware as a service over the cloud (internet).
3. With cloud computing the users can access the
database resources through internet from anywhere in
the world. The databases in the cloud are very
dynamic.
4. Origin of cloud computing
This concept of providing resources via global
networks starts from 1960’s.
This idea was introduced byJ.C.R.Licklider, who was
responsible for ARPANET in 1969.
After the wide internet usage in 1990’s, large
bandwidth was offered. Thus this concept came to use
by public.
Contd…….
5. first milestones for cloud-computing was the
introduction of salesforce.com in 1999.
the concept of delivering enterprise applications
through a simple website.
Amazon Web Services in 2002 was the next major
development in cloud computing, which provided a
group of cloud based services.
Contd….
6. Amazon launched its Elastic Compute Cloud (EC2) in
2002 as a commercial web service - to hire/rent
computers on which they can run their own
applications.
introduction of web2.0 in 2009. Web2.0 is a website
that allows the users to interact with each other in a
social media creator. Examples of Web2.0 include
social networking websites, blogs etc.
7. Google and others started to offer browser based
enterprise applications, through services such as
Google apps.
virtualization technology, development of universal
high-speed bandwidth and universal software
standards.
Most of the IT professionals use cloud computing as it
offers increased storage space, high flexibility and very
low cost.
8. Cloud Components
There are three cloud components, They are
1. Clients
2. Data centers
3. Distributed servers
9. Clients
Clients are the end user devices where the users
interact with cloud to manage their information.
They are usually computers and also
laptops,notebook computers, tablets, mobile phones,
PDAs etc.
10. Clients usually filtered in three categories, they are
1. Mobile clients.
2. Thin clients.
3. Thick clients.
11. Mobile clients:This refer to mobile devices including
PDAs or smart phones like iPhone.
12. Thin Clients:This refer to computers that do not have
internal hard drives. They allow the server do all the
work, but then display the information on the screen.
13. Thick clients:This refers to regular computers, that
uses a web browser like Chrome, Firefox, Internet
Explorer to connect to the internet.
14. Data Centers
The data center is the collection of numerous
servers.
It could be a large room with full of servers
located anywhere in the world.
The clients can access these servers through the
cloud.
15. Distributed Servers
Servers are in geographically separate locations in the
world.
For the cloud subscriber, these servers act as if they
are very near.
This gives the service provider more flexibility in
security and options.
16. For example,Amazon has servers all over the world. If
there is a failure at one site, the service would still be
accessed through another site.
18. On demand self service
allows user to receive the services such as computing
resources, server time, network storage automatically
without direct interaction with the service provider.
Some of the popular on demand self service providers
are AWS (Amazon Web
Services), Google, Microsoft, IBM,Salseforce.com.
19. Broad network access
This is another essential aspect that is available over
the network. They are accessed by using standard
mechanisms in thick or thin client platforms.
20. Location independent resource
pooling
The service providers resources are pooled in order to
serve multiple consumers.
There is a sense of location independence as the
customer has no control over location where the
resources are provided.
Consumers need not worry about how the cloud
allocates the provided resources.
21. Rapid elasticity
The definition of elasticity is the ability to scale the
resources up and down as required. The storage on
cloud seems to be unlimited for the client. The
consumer can use as much as he needs at any time.
22. Measured services
Another essential attribute is that the resources can be
measured, controlled and reported.
This provides transparency for both provider and
consumer of the used service.
Metering capability is used to control and optimize
resource use.
23. Architectural influences
High Performance Computing
is the use of super computers and parallel processing
techniques for solving complex computational problems.
HPC technology focuses on developing parallel processing
algorithms and systems by incorporating both administration
and parallel computational techniques.
High-performance computing (HPC) evolved due to meet
increasing demands for processing speed.
24. HPC brings together several technologies such as
computer architecture,
algorithms,
programs and electronics,
and system software under a single canopy to solve
advanced problems effectively and quickly.
25. A highly efficient HPC system requires a high-
bandwidth, low-latency network to connect
multiple nodes and clusters.
26. HPC technology is implemented in multidisciplinary
areas including:
Geographical data
Scientific research
Oil and gas industry modelling
Electronic design automation
Climate modelling
Media and entertainment
27. Utility and enterprise grid
computing
Utility computing is a service providing model in
which a service provider makes computer resources
and infrastructure management available to the
customer whenever needed.
The consumer is charged for specific usage of the
resources. It is an On- Demand computing method.
28. Renting the computer resources such as hardware,
network bandwidth, software to the customer on
demand basis is called on demand computing.
This type of approach is also called as Pay per use
model or metered service.
29. The method used in utility computing is becoming
popular in enterprise computing. It is sometimes used
for consumer market, internet service, web site access,
file sharing and other applications.
30. The main advantage of this model is there is no initial
cost or at-least low cost to get the required computer
resources.
leaders in utility computing are IBM, HP, Microsoft
and then industries like Google, Amazon etc
31. Enterprise Grid Computing
Enterprise-grid computing is a form of computing
particularly inside an enterprise. It is a collection of
network components under the control of a grid
management entity
32. This management entity manages the assignment of
resources to services to meet the specific business
goals.
Enterprise computing is used in single data center or
multiple data centers. Enterprise- grid supports
various types of workloads such as transactions.
33.
34. These types of grids are used to meet the specific set of
business goals.
The services that run on an enterprise-grid may range
from the traditional commercial enterprise
applications such as ERP to new concepts such as
distributed applications.
35. Enterprise computing enables the companies to the
following
To dynamically provide resources.
To simplify tasks.
To consolidate computing components.
To set standards across enterprise.
To scale the resources and workload.
36. Some of the advantages of enterprise-grid computing
are,
It reduces hardware, software costs
It also reduces employee costs.
It improves the quality of service through quick
response time.
37. Autonomic computing
Autonomic computing refers to the self managing
characteristics of distributed computing resources,
adapting to unpredictable changes.
It controls the functioning computer applications and
systems without input from the user. This computing
model has systems that run themselves, capable of
doing high level functions.
38. The complexity of the system is invisible to the users.
The concept of autonomic computing was first
introduced by IBM in 2001. This model aims to
develop computer systems capable of self
management. This overcomes the rapidly growing
complexity of computing systems management.
39. These systems take decisions on their own by using
high level policies.
It will constantly check and optimize the status. Thus
it automatically adapts itself to changing conditions.
An autonomic computing framework is composed of
autonomic components ( AC ) interacting with each
other.
40. The following are the main components of autonomic
computing:
Two main control loops ( local and global )
Sensors ( for self monitoring )
Effectors ( for self adjustments )
Knowledge
Planner ( for analyzing policies ).
41. Service Consolidation
In computing, consolidation refers to when data
storage or server resources are shared among multiple
users and accessed by multiple applications.
42. Consolidation aims to make more efficient use of
computer resources and prevent servers and storage
equipment from being under-utilized and taking too
much space.
43. The two main types of consolidation are server
consolidation and storage consolidation.
44. Server consolidation involves reducing the number
of servers and server locations within an organization.
The intended result is more efficient use of server
resources and occupied space.
However, this also increases the complexity of the
servers, data and applications, which may be
challenging for users.
45. Server virtualization attempts to address this problem
by masking that complexity from users.
46. Another option is to use blade servers, which are
actual servers in the form of modular circuit boards on
a card.
They occupy less rack space and consume less power.
47. Storage consolidation, or storage convergence, is a
method of centralizing data storage through any one
of three architectures:
Network Attached Storage (NAS).
Redundant Array of Independent Disks (RAID)
Storage Area Network (SAN):
48. Network Attached Storage (NAS): Dedicated storage
hard drives do not have to compete with other
computers for processing resources.
49. Redundant Array of Independent Disks (RAID): Data
is located on multiple disks but appears as a single
logical drive.
50. Storage Area Network (SAN): Fiber channel
technology is used to provide high throughput, data
sharing, data migration and service to many clients
(also called subscribers) over a large geographical area.
SANS is the most sophisticated storage consolidation
method of the three.
51. Horizontal Scaling
Horizontal scaling is the capability of an operation to
be scaled up to meet the demand through request and
the distribution of request across the servers as in Fig
1.3
as demand increases the servers are scaled up.
Scalability is the capacity of a model to be enlarged to
handle the expanding volume of production in an
effective way.
53. Methods of adding more resources for a particular
application falls into two broad categories, they are
Horizontal-scaling
Vertical-scaling
54. This ( horizontal-scaling) is achieved by adding more
servers by using clustering and load balancing
solution.
55. Numerous number of computers may be configured in
a cluster to obtain combined computing power.
Horizontal scaling is also called as scale out.
56. An example of the scaling method is scaling out from
one web server system to three servers. This type of
scaling is used by the cloud computing as it is very
cheaper. In a cloud the load will be distributed across
various additional servers.
57. This model created the demand in sharing data with
enormous I/O performance and particularly for the
processing of huge volume of data.
58. Web services
Web services are a set of services over the web or the
technical term cloud. This a service which is “always
on”, same as in the concept of utility computing. It is a
standard way for integrating the web applications, It is
considered as the next evolution of web. Web services
converts your applications into Web application which
can be published, found and used over the internet.
59. Web services communicate using open protocols and
can be used by other applications.
These services are hardware independent, operating
system independent, programming language
independent.
The basic platform for these services are XML and
HTTP.
61. The components of web services are web service server
code, web service consumer code, SOAP, XML, WSDL
and UDDI.SOAP is a protocol for accessing web
service. It stands for Simple Object Access Protocol.
SOAP is a communication protocol for sending
messages
62. XML is a markup language. It stands for eXtensible
Markup Language. The contents are encoded in xml
codes. WSDL is an XML based language. It stands
for Web Services Description Language. It is used
to describe and locate the services.
63. UDDI is a directory service. It stands for Universal
Description, Discovery and Integration. UDDI is
used for storing the information about the web
services.
64. High Scalability Architecture
Scalability is the ability of a model to be enlarged to
handle the growing amount of work in an effective
manner.
The cloud resources can be rapidly scaled ( i.e.,
increased ) based on the demand which includes
storage, CPU time, memory, web service requests.
Customers buy the services given by service provider
based on scalability, availability and performance.
65. High scalability architecture is an important
parameter to select a service provider. In cloud
computing, it is important to have a High scalability
architecture that is capable of handling numerous
users on an on-demand basis.
66. To achieve this, Google introduced Bigtable which has
high scalability architecture. Bigtable was developed
with very high speed, flexibility and has very high
scalability.
67. A Bigtable database is petabytes(PB) in size and spans
thousands of distributed servers.
Each bigtable is a multi dimensional table.
The table is made up of rows and columns.
Each cell has a time stamp. With this stamp, you can
select certain versions of a web page or delete cells that
are older than a given date and time.
68.
69. Since the tables are very large, Bigtable splits them at
row boundaries and saves them as tables.
Each tables is about 200 MB and each server stores
about 100 tables.
The data from a database is likely to be stored in many
different servers.
70. This architecture also allows for load balancing ( i.e.,)
If one table is getting a lot of queries, it can move the
busy table to another machine that is not busy.
Also, when a machine fills up, it can compress some
tablets freeing more drive space.
71. Benefits of cloud computing
It offers various advantages in which the main
components are listed below:
Scalability
Simplicity
Vendors
Security
72.
73. Scalability:
The ability of a model to be extended to manage the
amount of work growth in an effective manner is
called scalability.
Cloud-computing resources can be rapidly scaled
according to subscribers convenience.
74. If there is a sudden necessity for more computer
resources, instead of buying new equipment we can
buy additional resources form cloud providers.
After the endeavor is over we can stop using those
services.
75. Simplicity:
In most cases cloud-computing is free to use. It is very
simple that users can easily understand which is the
biggest advantage of cloud-computing. It is possible to
get our application started instantly.
76. Vendors:
The service providers are called vendors. Some of the
well known vendors
are Google, Amazon,Microsoft, IBM. These providers
offer reliable services to their customers.
77. Security:
There are also some risks when using a cloud vendor.
But the reputed firms work hard to keep their
consumers data safe and secure.
They use complex cryptographic algorithms to
authenticate users. To make it even more secure we
can encrypt our information before storing it in cloud.
78. Limitations in cloud
There is not any product without a few flaws and so is
cloud computing. There are some cases where the
cloud computing may not be the best solution for
computational requirements. Such cases are called as
limitations,there are two main limitations:
79. 1 Sensitive Information
2 Application development
80. 1 Sensitive Information :
Storing sensitive information on the cloud is always
dangerous. Any important information about a person
or an organization is called sensitive information.
81. Some of the popularly known limitations in the issue
of sensitive information are:
Government can get the information from service
providers easily.
In few cases, the service providers itself share our data
with marketing companies.
82. The best way is to encrypt the data before storing it in
cloud or sending it to third party. Programs like PGP (
Pretty Good Privacy ) or open source True Crypt can
encrypt the file so that only the one who owns the
password can view the details stored in the uploaded
file.
83. Application development :
This is the other important limitation in cloud
computing. In some cases the applications we need
may not be available on cloud or not work as expected.
84. Reasons:
And sometimes some applications will not be securely
communicated over the internet.
In that case our data will be at risk. Thus there are only
two ways to get the desired product.
85. One is, to develop their own application and other is to
approach application developer to build the desired
product for you.
86. Security concerns
In cloud computing world, security is a two sided coin.
The security is very important particularly when
moving critical applications and sensitive data to
public and shared environments.
87. Privacy concern with a third party
The important security concern is for privacy
considerations. That is, if third party is hosting all our
data, we do not know if it is safe or not. Everything
that is placed on cloud can be accessed by anyone.
88. There are also other privacy concerns because
government can get the data that is placed on cloud
easily from organization’s servers.
Though there are popular companies who provide
good security to keep the data safe, it can be hacked.
89. The best procedure is not to perform critical tasks on a
cloud platform without extensive security.
90. If it cannot be managed then it is advisable to have less
critical data on cloud.
91. Security level of third party
Service providers are doing all they can to protect their
customer’s data.
As a matter of fact, the vendors will have to make sure
that the subscriber has been fully satisfied from their
service or else the firm will not be gaining customers.
92. Most of the security problems are due to loss of
control, lack of trust and multi-tenancy.
93. Multi-tenancy – it is an architecture in which single
instance of a software application serves multiple
customers. Each customer is called tenant.
94. These problems exist mainly in third party
management models. So there should be strong
protection measures in order to prevent the hacking of
data.
95. Security Benefits
Providers do endeavor to ensure security. Cloud
provide some of the security measures ensuring the
customers data are safe:
96. Centralised Data
There are some good security traits that come
with centralizing your data, making your system more
inherently secure.
97. Reduced Data Leakage:
If the data is centralized and the various devices
used like laptop, notebook computers can access
the data, no need to backup the data.
There is threat for theft of the handheld devices. If the
data are lost and although any security measures like
encryption is applied and it may be compromised and
the entire data may be in the hands of the thief.
98. Moreover by maintaining data on the cloud,
employing strong access control, limiting the
employee downloading to only what they need to
perform a task, computing can limit the amount of
information that could be potentially be lost.
99. Monitoring benefits:
Central storage is easier to control and monitor. The
flipside is the nightmare scenario of comprehensive
data theft. If your data is maintained on a cloud, it is
easier to monitor security than have to worry about the
security of numerous servers and clients.
100. The security professional figuring out smart ways to
protect and monitor access to data stored in one place
(with the benefit of situational advantage) than trying
to figure out all the places where the company data
resides.
101. You can get the benefits of Thin Clients today but
Cloud Storage provides a way to centralize the data
faster and potentially cheaper. The logistical challenge
today is getting Terabytes of data to the Cloud in the
first place.
102. Instant Swapover - if a server in the Cloud gets
compromised (i.e. broken into), then clone that server
at the click of a mouse and make the cloned disks
instantly available to the Cloud Forensics server.
When the swapover is performed its seamless to the
users. No need to spend time to replicate the data or
fix the breach. Abstracting the hardware allows to do it
instantly.
103. Logging
In cloud logging is improved. Logging is often an
afterthought, to solve the issues insufficient disk space
is allocated. Cloud Storage changes all this - no more
‘guessing’ how much storage you need for standard
logs.
Contd…..
104. With your logs in the Cloud you can leverage Cloud
Compute to index those logs in real-time and get the
benefit of instant search results.
This help to Compute instances and to measure in and
scale as needed based on the logging load - meaning a
true real-time view.
105. Most modern operating systems offer extended
logging in the form of a C2 audit trail. This is rarely
enabled for fear of performance degradation and log
size. Now you can ‘opt-in’ easily - if you are willing to
pay for the enhanced logging, you can do so. Granular
logging makes compliance and investigations easier.
106. Secure builds
When you developed your own network and you
have to buy third-party security software to get the
level of protection you want. With the cloud solution,
those tools can be bundled in and available to you and
you can develop your system with whatever level of
security you desire.
107. Easier to test impact of security changes: this is a
big one. Spin up a copy of your production
environment, implement a security change and test
the impact at low cost, with minimal startup time.
This is a big deal and removes a major barrier to
‘doing’ security in production environments.
108. Improve the state of security software
(performance)
Drive vendors to create more efficient security
software: Billable CPU cycles get noticed. More
attention will be paid to inefficient processes; e.g.
poorly tuned security agents. Process accounting will
make a comeback as customers target ‘expensive’
processes. Security vendors that understand how to
squeeze the most performance from their software will
win.
109. Security Testing
Reduce cost of testing security: a SaaS provider only
passes on a portion of their security testing costs. It is
shared among the cloud users. The end results is that
because you are in a pool with others but you never see
the other users but you realize the lower cost for
testing.
110. Even with Platform as a Service (PaaS) where your
developers get to write code, but the cloud code –
scanning tools check for security weakness.
111. Government Policies:
To implement the policy, Government of India has
made an initial step “GI Cloud” which has been coined
as ‘Meghraj’. The focus of this initiative is to accelerate
delivery of e-services in the country while optimizing
the expenditure of the Government.
112.
113. Meity( Ministry of Electronics and Information
Technology) has empanelled the following companies
for providing cloud computing services to government
departments :
Microsoft Corp.,
Hewlett Packard,
IBM India ,
Tata Communications,
Bharat Sanchar Nigam Ltd (BSNL),
Net Magic IT Services,
Sify Technologies and
CtrlS Data Centers.