This document discusses 10 key research areas in cloud computing:
1. The Green Cloud - Improving energy efficiency and reducing consumption in cloud data centers.
2. Denial of Service issues - Addressing attacks that restrict access to cloud resources.
3. Cloud Verification, Validation and Testing - Developing strategies for testing cloud software, applications and designs.
4. Cloud Security - Ensuring secure architectures and managing security across distributed cloud networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Opportunistic job sharing for mobile cloud computingijccsa
Cloud Computing is the evolution of new business era which is covered with many of technologies.These
technology are taking advantage of economies of scale and multi tenancy which are used to decrees the
cost of information technology resources. Many of the organization are eager to reduce their computing
cost through the means of virtualization. This demand of reducing the computing cost and time has led to
the innovation of Cloud Computing. Itenhanced computing through improved deployment and
infrastructure costs and processing time. Mobile computing & its applications in smart phones enable a
new, rich user experience. Due to extreme usage of limited resources in smart phones it create problems
which are battery problems, memory space and CPU. To solve this problem, we propose a dynamic mobile
cloud computing architecture framework to use global resources instead of local resources. In this
proposed framework the usefulness of job sharing workload at runtime reduces the load at the local client
and the dynamic throughput time of the job through Wi-Fi Connectivity.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
A Virtualization Model for Cloud ComputingSouvik Pal
Cloud Computing is now a very emerging field in the IT industry as well as research field. The advancement of Cloud Computing came up due to fast-growing usage of internet among the people. Cloud Computing is basically on-demand network access to a collection of physical resources which can be provisioned according to the need of cloud user under the supervision of Cloud Service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. Virtualization technology is widely applied to modern data center for cloud computing. Virtualization is used computer resources to imitate other computer resources or whole computers. This paper provides a Virtualization model for cloud computing that may lead to faster access and better performance. This model may help to combine self-service capabilities and ready-to-use facilities for computing resources.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Opportunistic job sharing for mobile cloud computingijccsa
Cloud Computing is the evolution of new business era which is covered with many of technologies.These
technology are taking advantage of economies of scale and multi tenancy which are used to decrees the
cost of information technology resources. Many of the organization are eager to reduce their computing
cost through the means of virtualization. This demand of reducing the computing cost and time has led to
the innovation of Cloud Computing. Itenhanced computing through improved deployment and
infrastructure costs and processing time. Mobile computing & its applications in smart phones enable a
new, rich user experience. Due to extreme usage of limited resources in smart phones it create problems
which are battery problems, memory space and CPU. To solve this problem, we propose a dynamic mobile
cloud computing architecture framework to use global resources instead of local resources. In this
proposed framework the usefulness of job sharing workload at runtime reduces the load at the local client
and the dynamic throughput time of the job through Wi-Fi Connectivity.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
A Virtualization Model for Cloud ComputingSouvik Pal
Cloud Computing is now a very emerging field in the IT industry as well as research field. The advancement of Cloud Computing came up due to fast-growing usage of internet among the people. Cloud Computing is basically on-demand network access to a collection of physical resources which can be provisioned according to the need of cloud user under the supervision of Cloud Service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. Virtualization technology is widely applied to modern data center for cloud computing. Virtualization is used computer resources to imitate other computer resources or whole computers. This paper provides a Virtualization model for cloud computing that may lead to faster access and better performance. This model may help to combine self-service capabilities and ready-to-use facilities for computing resources.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the current emerging technology which saves the cost of users.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Performance Enhancement of Cloud Computing using ClusteringEditor IJMTER
Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance
of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it
provides distribution of computing resources. This distribution results in cost and energy reduction,
thus making efficient utilization of physical resources. Thus resource sharing and use of
virtualization allows improved performance for demanding scientific computing workloads. Number
of data centers and physical servers are underutilized so they are used inefficiently. So performance
evaluation and its enhancement in virtualized environment like public and private cloud are the
challenging issues. Performance of cloud environment is dependent on CPU & memory utilization,
Network and I/O disk operations. In order to improve the performance of the virtualization with
cloud computing, one of the solutions is to allow highly available data in the cluster form. Thus
replicas are available at each data centers and are highly available. In the proposed work, the I/O
parameters are chosen for increasing the performance in this domain. This enhancement can be
achieved through the clustering and caching technologies. The use of technology for data centers
clustering is proposed in this paper. Thus performance and scalability can be improved by reducing
the number of hits to the cloud database.
Group seminar report on cloud computingSandhya Rathi
It is short and sobar.It contains information of
Architectural Considerations in that contains Cloud Platform, Cloud Storage, Cloud Services..... Types of Services is also contain in that
Software as a Service(SaaS) ,Platform as a Service(PaaS) , Infrastructure as a Service(IaaS)
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
Method of broadcasting is the well known operation that is used for providing support to different computing protocols in cloud computing. Attaining energy efficiency is one of the prominent challenges, that is quite significant in the scheduling process that is used in cloud computing as, there are fixed limits that have to be met by the system. In this research paper, we are particularly focusing on the cloud server maintenance and scheduling process and to do so, we are using the interactive broadcasting energy efficient computing technique along with the cloud computing server. Additionally, the remote host machines used for cloud services are dissipating more power and with that they are consuming more and more energy. The effect of the power consumption is one of the main factors for determining the cost of the computing resources. With the idea of using the avoidance technology for assigning the data center resources that dynamically depend on the application demands and supports the cloud computing with the optimization of the servers in use.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Hybrid Based Resource Provisioning in CloudEditor IJCATR
The data centres and energy consumption characteristics of the various machines are often noted with different capacities.
The public cloud workloads of different priorities and performance requirements of various applications when analysed we had noted
some invariant reports about cloud. The Cloud data centres become capable of sensing an opportunity to present a different program.
In out proposed work, we are using a hybrid method for resource provisioning in data centres. This method is used to allocate the
resources at the working conditions and also for the energy stored in the power consumptions. Proposed method is used to allocate the
process behind the cloud storage.
Clloud computing provisioing and benifits altanai bisht 2nd year , part iiALTANAI BISHT
What is a cloud?
Definition , Benefits
Usage scenarios , Architecture
Cloud provisioning and management
Automated provisioning
Reservation & Scheduling
Open source
Virtualization
Storage architecture in the cloud
Piloting innovations on a cloud
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the current emerging technology which saves the cost of users.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Performance Enhancement of Cloud Computing using ClusteringEditor IJMTER
Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance
of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it
provides distribution of computing resources. This distribution results in cost and energy reduction,
thus making efficient utilization of physical resources. Thus resource sharing and use of
virtualization allows improved performance for demanding scientific computing workloads. Number
of data centers and physical servers are underutilized so they are used inefficiently. So performance
evaluation and its enhancement in virtualized environment like public and private cloud are the
challenging issues. Performance of cloud environment is dependent on CPU & memory utilization,
Network and I/O disk operations. In order to improve the performance of the virtualization with
cloud computing, one of the solutions is to allow highly available data in the cluster form. Thus
replicas are available at each data centers and are highly available. In the proposed work, the I/O
parameters are chosen for increasing the performance in this domain. This enhancement can be
achieved through the clustering and caching technologies. The use of technology for data centers
clustering is proposed in this paper. Thus performance and scalability can be improved by reducing
the number of hits to the cloud database.
Group seminar report on cloud computingSandhya Rathi
It is short and sobar.It contains information of
Architectural Considerations in that contains Cloud Platform, Cloud Storage, Cloud Services..... Types of Services is also contain in that
Software as a Service(SaaS) ,Platform as a Service(PaaS) , Infrastructure as a Service(IaaS)
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
Method of broadcasting is the well known operation that is used for providing support to different computing protocols in cloud computing. Attaining energy efficiency is one of the prominent challenges, that is quite significant in the scheduling process that is used in cloud computing as, there are fixed limits that have to be met by the system. In this research paper, we are particularly focusing on the cloud server maintenance and scheduling process and to do so, we are using the interactive broadcasting energy efficient computing technique along with the cloud computing server. Additionally, the remote host machines used for cloud services are dissipating more power and with that they are consuming more and more energy. The effect of the power consumption is one of the main factors for determining the cost of the computing resources. With the idea of using the avoidance technology for assigning the data center resources that dynamically depend on the application demands and supports the cloud computing with the optimization of the servers in use.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Hybrid Based Resource Provisioning in CloudEditor IJCATR
The data centres and energy consumption characteristics of the various machines are often noted with different capacities.
The public cloud workloads of different priorities and performance requirements of various applications when analysed we had noted
some invariant reports about cloud. The Cloud data centres become capable of sensing an opportunity to present a different program.
In out proposed work, we are using a hybrid method for resource provisioning in data centres. This method is used to allocate the
resources at the working conditions and also for the energy stored in the power consumptions. Proposed method is used to allocate the
process behind the cloud storage.
Clloud computing provisioing and benifits altanai bisht 2nd year , part iiALTANAI BISHT
What is a cloud?
Definition , Benefits
Usage scenarios , Architecture
Cloud provisioning and management
Automated provisioning
Reservation & Scheduling
Open source
Virtualization
Storage architecture in the cloud
Piloting innovations on a cloud
Read more here: http://entrepreneurs.about.com/od/businessideas/fl/Make-Money-Online-with-a-Blog.htm
Strategies for running a profitable blog from Amanda McCormick, About.com Guide to Entrepreneurship. In this live interactive session, we'll cover the following topics:
Targeting a Profitable Niche: How will you find the right audience for you blog? Ask yourself the right questions, find a profitable niche and tweak your business plan to align better with profit opportunity.
Getting Set Up: Choose the right blogging platform for you blog. Do you want to use WordPress, Blogger or Tumblr? Are you ready to choose your own host?
Building a Following: Many bloggers just starting out figuring, if I write about something interesting to me, my blog will naturally find a following. But it takes more than great content to build a following. Email marketing, press, social media and networking all make a huge impact on how many followers you can attract.
Strategies for Monetizing: Finally, the all-important question of how will you monetize your blog? Ads are a natural first choice, but there are many other opportunities, including information products and affiliate marketing. Many bloggers who make a profit do so by taking a hybrid approach. In this article, we'll look at a number of ways to monetize your blog.
Ponencia: Presentación del Internet Media Lab (Grupo de Investigación UCM Ref. 970620. Director Jesús Flores) en el II Seminario de Grupos de Investigación de la Facultad de Ciencias de la Información de la Universidad Complutense de Madrid (13 de marzo de 2013)
Cloud computing has been a buzzword in the IT industry for quite some time now. Though it has been around for quite a while, its popularity has increased manifold in the last few years. The reason for this is simple – the benefits of cloud computing are simply too hard to ignore.
In a nutshell, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
https://dailytimeupdate.com/cloud-computing-definition/
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESijccsa
Cloud computing refers to a location that allows us to preserve our precious data and use computing and
networking services on a pay-as-you-go basis without the need for a physical infrastructure. Cloud
computing now provides us with powerful data processing and storage, exceptional availability and
security, rapid accessibility and adaption, ensured flexibility and interoperability, and time and cost
efficiency. Cloud computing offers three platforms (IaaS, PaaS, and SaaS) with unique capabilities that
promise to make it easier for a customer, organization, or trade to establish any type of IT business. We
compared a variety of cloud service characteristics in this article, following the comparing, it's
straightforward to pick a specific cloud service from the possible options by comparison with three chosen
cloud providers such as Amazon, Microsoft Azure, and Digital Ocean. By using findings of this study to not
only identify similarities and contrasts across various aspects of cloud computing, as well as to suggest
some areas for further study.
Cloud computing is a pay-per-use model enabling convenient, on-demand network access to shared pool of configurable computing resources (e.g., networks, services, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
In this paper, fast, efficient, simple and widely used
Set Partitioned Embedded bloCK based coding is done on
Multiple Descriptions of transformed image. The maximum
potential of this type of coding can be exploited with discrete
wavelet transform (DWT) of images. Two correlated
descriptions are generated from a wavelet transformed image
to ensure meaningful transmission of the image over noise
prone wireless channels. These correlated descriptions are
encoded by set partitioning technique through SPECK coders
and transmitted over wireless channels. Quality of
reconstructed image at the decoder side depends upon the
number of descriptions received. More the number of
descriptions received at output side, more enhance the quality
of reconstructed image. However, if any of the multiple
description is lost, the receive can estimate it exploiting the
correlation between the descriptions. The simulations
performed on an image on MATLAB gives decent
performance and results even after half of the descriptions is
lost in transmission.
Cloud computing is on-demand access, via the internet, to computing resources—applications, servers (physical servers and virtual servers), data storage, development tools, networking capabilities, and more—hosted at a remote data center managed by a cloud services provider (or CSP). The CSP makes these resources available for a monthly subscription fee or bills them according to usage.
The Slide Explains the concepts of Cloud Computing. Covers various definitions of Cloud Computing. Its Models, Types, Advantages, Challenges. A must to understand what is Cloud Computing.
Cloud Computing Training in Noida at APTRON Solutions_ Your Path to Cloud Mas...APTRON Solutions Noida
Upon completing our Cloud Computing Training in Noida, you'll be well-prepared for a variety of roles in the cloud computing industry, such as Cloud Architect, Cloud Administrator, DevOps Engineer, and Cloud Security Specialist. With the certification and skills gained at APTRON Solutions, you'll be positioned for a rewarding career with ample growth opportunities.
https://aptronsolutions.com/best-cloud-computing-training-in-noida.html
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GridMate - End to end testing is a critical piece to ensure quality and avoid...
E04432934
1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org
ISSN (e): 2250-3021, ISSN (p): 2278-8719
Vol. 04, Issue 04 (April. 2014), ||V3|| PP 29-34
International organization of Scientific Research 29 | P a g e
Research Areas in Cloud Computing
Madhuri Sharma1
, Parveen Kumar2
1
(Department of computer science and engineering, Lovely Professional University, Phagwara, India)
2
(Department of computer science and engineering, Lovely Professional University, Phagwara, India)
Abstract: - Now days every organization is migrating towards cloud computing as cloud computing is
considered being more flexible and scalable as compared to other technologies. The technology simply means to
provide the computing resources and services through a network. Amazon EC2, yahoo emails, Gmail, Google
connect are few of the examples of cloud computing. Since cloud technology is widely adapted issues with this
technology must be focused very carefully. This paper overviews the major areas which must be explored in
cloud computing.
Keywords: - Cloud Computing, Cloud Gaming, Data Centers, Data Migration, Green Cloud.
I. INTRODUCTION
Now days when cloud computing services such as Amazon EC2, yahoo emails, Gmail, Google connect
etc. becoming so popular, it seems many people are yet not clear about the word “cloud computing”. Cloud
computing simply means to provide the computing resources and services through a network. The provisioning
of computing resources such as platform, software, hardware, database service etc is usually through internet.
According to RajKumar Buyya [2] cloud computing is defined as “a type of parallel and distributed system
consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and
presented as one or more unified computing resources based on service-level agreements established through
negotiation between the service provider and consumers”. According to Lizhe Wang [1] cloud computing
defined as “a set of network enabled services, providing scalable, QoS guaranteed, normally personalized,
inexpensive computing infrastructures on demand, which could be accessed in a simple and pervasive way.”
Figure 1: Cloud Computing Resources
Moreover, National Institute of Standards and Technology defines cloud computing as “ a model for enabling
convenient, on- demand network access to a shared pool of configurable computing resources such as networks,
servers, storage, applications and services that can be frequently provisioned and released with minimal
management effort or service provider interaction” [3][4]. According to NIST, this cloud model highly promotes
availability as it constitutes the five important characteristics as:
On-demand:
Cloud computing is considered to be on-demand as all the computing resources and services are provided to the
end users as and when they needed without any delay. These resources released when they are no longer
required and the service charged only for used resources.
Resource Pooling:
Cloud computing considered to be a hub of pooled resources including certain platforms, storage, database,
software and other resources. All these resources are provided to many customers from a single implementation
using certain physical as well as virtual components.
2. Research Areas in Cloud Computing
International organization of Scientific Research 30 | P a g e
Broad Network Access:
All the pooled resources over the clouds can be accessed via a standard network generally internet with a client
side platform as endpoint (browsers).
Rapid Elasticity:
Cloud computing provides its users an illusion of having infinite resource availability which they may demand
any time remotely to get their work done. Moreover cloud computing considered to be highly elastic as
resources can be easily pooled or removed from the data centers.
Measured Service:
Over the cloud computing the usage of resources can be monitored, controlled and reported which provides
complete transparency to both providers as well as to the consumers of the service.
Therefore we can say that cloud computing highly differs from certain traditional computing technology as
cloud computing technology is considered to be highly scalable, flexible, and available that provides high level
of abstraction in a way that it encapsulates as an abstract entity that provides various levels of services to its end
users. That is the end users demands for a particular service and gets that service immediately without bothering
how and from where this service is provided to them.
Many researchers mentioned the benefits of using cloud computing especially for business purposes.
Cloud computing infrastructure consists of hardware, software, platform, databases, networks and App Servers,
which allows enterprises to invest more efficiently in their hardware and software investments. So more and
more enterprises are moving towards cloud computing as it helps them to reduce their computing costs via
virtualization technologies. By using cloud computing the overall cost of infrastructure and administration
reduced greatly moreover the enterprises also take advantage to improved utilization and faster deployments.
But before heading towards cloud computing the enterprises must consider the effects, benefits as well as the
drawbacks of cloud computing to the organization. It would be advisable to organizations with high level of
maturity and greater technological process to use cloud computing for greater benefits.
Undoubtedly cloud computing possess many benefits, but still there are certain problems which needs to be
faced and handled properly. Especially the issues of security and economics of enterprises must be researched
before utilizing cloud computing. Certain issues such as The Green Cloud, Denial of Service, cloud Verification
Validation and Testing, Cloud Security, Data migration, Harvesting Unused Resources and Ad hoc Cloud,
Scalability in the Cloud, caching and Session State Management in the Cloud must take into account. The
following sections of this paper will focus on such issues of cloud computing which must explored and handled.
II. BENEFITS OF CLOUD COMPUTING
Now days all the services delivered to organizations and business models are been changes
tremendously by cloud computing. All the organizations prefer to adopt the outsourcing approach for
infrastructures i.e. hardware, software, databases etc., rather than investing in them. Moreover cloud computing
meets the requirements of flexibility, on-demand and scalability model, hence preferred by organizations so that
they can upgrade and grow rapidly. Major benefits of cloud computing are as [4] [7]:
Reduced Cost:
Cloud computing is greatly contributing to reduce the investment cost and availing the resources to
organizations at very low investments. Enterprises can utilize a cloud provider, or adopting cloud paradigms
internally, can save operational and maintenance expenses. All the operation can be performed by using the
outsourced resources such as platforms, databases, storage space etc.
Sustainability:
Cloud computing is considered to be highly sustainable in terms managing huge amount of resources efficiently
and less consumption of energy as compared to traditional data centers. More efficiently designed clouds and
data centers can face little problems or inefficiencies related to poor energy efficient clouds which consume
more energy and mismanagement of service.
Flexibility:
As in cloud computing we can easily integrate new services and resources so this technology can be considered
as highly flexible. Moreover scheduling or migrations of loads can be managed and handled efficiently with
clouds.
Improved Automation:
3. Research Areas in Cloud Computing
International organization of Scientific Research 31 | P a g e
Now days cloud computing is becoming highly automated not only in providing the services and resources, but
also de-provisioned in a highly automated fashion. This improvement is ultimately increasing the efficiency of
overall network in cloud computing.
Accessibility:
Cloud computing technology is highly accessible as it makes data and services publicly available without make
vulnerable sensitive information. So, users can access their data over cloud securely and remotely as and when
they required.
In spite of all the above mentioned benefits of cloud computing, this technology suffers from certain issues that
must be focused and handled properly.
III. RESEARCH AREAS IN CLOUD COMPUTING
1. The Green Cloud:
In cloud computing there are certain distributed resources that requires to be managed across a
heterogeneous computing environment. All these resources consumes large amount of energy as they appears to
be “always on” to the end users point of view. The techniques by which all the distribution of resources is done
are highly inefficient in terms of energy usage. So while studying the Green Cloud computing we analyze the
whole energy consumption of the computing resources, this would be based on the types of services and
conditions to facilitate green cloud computing to save overall energy consumption in the related information
communication systems. Now days when everything is mobile dependent we may explore green mobile
communication under Green Cloud Computing. So under green cloud computing we certainly explore and
research the use of virtualization in system and network resources in order to minimize energy usage while still
fulfilling the service requirements and operational constraints of a cloud. Certain work has been done towards
green cloud computing in context of the major causes of energy inefficiency in data centers is the idle power
wasted when servers run at low utilization. The study made certainly focus on how to keep servers run at low
utilization by workload consolidation. Moreover it is been claimed that the request arrival rate at servers
fluctuate with time. So, in regard with these mechanisms has been developed to predict the future arrival rates
from history and estimate the optimal number of servers for a class of arrival rates. Various literatures provide
the solutions for dimensions such as: energy-efficient hardware, energy-aware scheduling, power-minimization
in server cluster and power-minimization in mobile as well as wired networks. Feng- Seng Chu [5] focus greatly
on the overall impact on energy consumption brought by cloud computing and find out when it is green.
2. Denial of service issues in cloud computing:
Since cloud computing dynamically provides the resources, there could the situations when the network
is attacked by denial of service attacks as a result of which the cloud network, its resources and the end users
keep on waiting for avail the services but won’t avail it due to denial of service attacks. The attack of denial of
service simply means that the users and the cloud resources are restricted to interact with each other by some
third party. Resulting to this cloud may keeps on wasting the resources. So this issue must be explored and
handled carefully in cloud computing. A.M. Lonea [6] made a study in which they analyze and detect the
Distributed Denial of Service attacks in cloud computing environments. Such attacks provide great disruptions
in the cloud network. In their study they propose a saluting to combine the evidences obtained from Intrusion
Detection Systems deployed in virtual machines of the cloud systems with data fusion methodology in the front-
end. So, when attacks appear, the VM-based IDS will yield alerts, which will be stored into the database of
cloud. Then they provide a solution to analyze the alerts generated by IDSs using Dempster-Shafer theory
operations and fault-tree analysis for the pointed attacks.
3. Cloud VV and T Metrics:
Verification, Validation and Testing are the basic necessities of a system evaluation and adoption but
when the system and data sources are distributed such as in cloud computing all these activities are performed in
random manner. The general testing strategies and models for testing the code, application and the design may
not be applicable in a cloud or may be the software developed for centralized environment may not work in the
same way with cloud computing. There are certain areas of research in validation, verification and testing of
cloud from formal verification to empirical research and metric validation of multipart or parallel analysis. In
cloud computing Testing can be applied to systems, security, architecture models and other constructs within the
cloud environment. Apart from this failure analysis, taxonomies, error handling and recognition are all related
areas of research under cloud verification, validation and testing in cloud computing. Jarry Gao [15] made a
study and provides a comprehensive tutorial on cloud testing and cloud-based application testing. This paper
provides a complete overview about cloud testing and thoughts in minds of engineers and managers in context
of it. This paper provides a clear vision for web based software testing and cloud based software applications. In
4. Research Areas in Cloud Computing
International organization of Scientific Research 32 | P a g e
this paper they also highlight and compare different commercial products and solutions that supports cloud
testing.
4. Cloud Security:
Cloud security is the major concern when we talk about distributed networks and cloud computing. All
the clouds, data centers, stored applications and other architectures must be protected with appropriate and
dependable securities. Certain issues must be taken into account while providing cloud security such as: should
security be centralized or decentralized? Who should manage the security services? Type of security required?
Hassan Zaki [8] introduces four cloud security problems as: XML Signature Element Wrapping, Browser
Security, Cloud Malware Injection Attack and Flooding Attacks and proposes the counter measures. Hongwei
Li [9] focus on authentication over the cloud, both of users and services in a significant issue for the trust and
security of the cloud computing. The paper is based on identity-based hierarchical model for cloud computing
and certain encryption and signature schemes and presents an identity-based authentication protocol for cloud
computing and services.
5. Data Migration:
In distributed networks and cloud computing the cost and time required to move data over the network
is a major issue. Certain issues such as: how to migrate data from one location to another over the cloud, where
to store that data, how to provide data to its users, load balancing and job scheduling over the cloud in various
data centers must be focused under data migration in the cloud. The aim of this study is to investigate the issues
that may affect data migration in the cloud and to propose mechanisms to specify policies for data migrations.
Samuil Islam [11] proposed a design which hosts various data centers in certain remote locations where each
data centre may hold multiple databases on a pool of servers. Salim Bitam [10] made a study to resolve the issue
of job scheduling in various data centers over the cloud. An algorithm is also proposed by him for efficient job
scheduling based on bees life.
6. Harvesting unused resources and Ad hoc Cloud:
In cloud computing there might be certain situations when ad-hoc cloud is required to provide cloud
services, rather than introducing dedicated machines within the data centers, that the existing infrastructure of
the organization is not fulfilling. In case a hug number of ad-hoc resources are placed over cloud even if they are
of no longer use, the overall performance of cloud network decreases. So the goal of this study is to investigate
which are the ad-hoc computing resources within an enterprise, how the underused computing resources within
an enterprise may be harvested and harnessed to improve return on IT investment. The study made for this will
make all the harvested resources available in a form of ad-hoc clouds, the architectures and deployment models
of which depends on the supply of resources and demands for cloud services. Alaa Eldeen S Ahmed [12] made a
study to manage and utilize cloud computing underused resources. In this study they propose a new approach to
model an efficient and improved IaaS services. This improved approach focus on extending the available cloud
computing platform infrastructure by harvesting underused genetic computing resources that are available
broadly in public domains. The proposed approach aims to improve the computing power for the cloud
computing platform without charging any extra cost.
7. Scalability in the Cloud:
The cloud so deployed must be highly scalable. High scale cloud can be achieved by two ways: Scale
up i.e. getting bigger VM or scale out i.e. more VMs. Certain companies provide high scaled clouds this way eg.
Amazon EC2, Azure, Google App Engine. Aarti Singh [16] made a study to ensure reliable, secure, sustainable
and scalable infrastructures in cloud computing for hosting internet based application services. In their study
they propose an agent based framework for providing scalability in cloud computing environment which is
supported by an algorithms for evaluating another cloud when the approachable cloud becomes overloaded and
for searching closest datacenters with least response time of virtual machine.
8. Session State Management in Cloud:
The session state is used to store and retrieve information or values for a user across ASP.Net pages in
a web application. There are four available modes to store session values in ASP.NET: State Server which stores
session state in another process called ASP.NET state service, SQL Server which stores session state in a SQL
Server database, In-Proc which stores session state in the individual web server’s memory, and Custom which
lets you choose a custom storage provider. So, this study focuses greatly on how session state is managed and
implemented in cloud for web applications. Example in Azure standard session state management for ASP.NET
applications is done in memory, which will not work where an application is scaled out over multiple instances.
In an Alternative session state management involving storing the state in persistent store need to be used instead
5. Research Areas in Cloud Computing
International organization of Scientific Research 33 | P a g e
say Azure tables or SQL Azure. So we may compare and contrast various session state management techniques
and their features on different cloud platforms such as Azure, Google App Engine etc.
9. Cloud Gaming:
Now days when cloud computing is expanding so rapidly, on-demand gaming known as cloud gaming
is also most popular application of cloud these days. A lot of work has been done to make this application more
efficient and convenient for its end users. Gwendal Simon [14] made a study in this context. They demonstrate
via a large-scale measurement study that the current cloud computing infrastructure is not able to meet the
requirements necessary for acceptable game play for hug number for end users, which is limiting the number of
users for an on-demand gaming service. Furthermore Chun- Ying Huang [13] made a study towards cloud
gaming and propose a cloud gaming system named as Gaming Any Where, which is considered as a first open
cloud gaming system. The proposed is also considered to be highly extensible, portable and reconfigurable.
10. Caching in Cloud:
Under this area of research an investigation for caching solutions for web applications in clouds is
done. In this we need to examine all types of caching that the cloud provides such as CDN in Azure. Here we
also need to focus on output of caching and the caching of application data example asp.net caching in Azure,
distributed caching using memcached or windows Azure AppFabric Caching. We may compare and contrast
various caching solution and examine performance improvements that can be obtained from use of these
technologies.
IV. CONCLUSION
Since Cloud Computing is expanding rapidly and is widely adapted, all the areas must be investigated
very carefully. On the bases of investigations and information gathered certain measures must be taken to
improve the overall performance, security, reliability and availability of the system. The major research areas
have been discussed in this paper over which certain investigations can be made, but there may be yet other
domains under cloud computing which must be focused and investigated.
V. ACKNOWLEDGMENTS
I, Madhuri Sharma
would like to express my gratitude to all those who gave me the possibility to complete this work. I
would like to thank my GOD for giving strength to complete this task and to my mentor,
Mr. Parveen Kumar
for providing support and material related to the area of this research. His valuable suggestions also helped me
to stay focused and follow the path described by him.
I would also like to thank to my department heads, management of LPU for supporting me throughout the
entire work and contributing to the completion of this dissertation work in their own distinct way.
REFERENCES
[1] Lizhe Wang, Gregor von Laszewski, Andrew Younge, Xi He, Marcel Kunze, Jie Tao, and Cheng Fu
(2008) "Cloud Computing: a Perspective Study." New Generation Computing 28, no. 2 pp: 137-146.
[2] Wickremasinghe, Bhathiya, and Rajkumar Buyya. (2009) "CloudAnalyst: A CloudSim-based Tool for
Modelling and Analysis of Large Scale Cloud Computing Environments." MEDC Project Report 22.6
[3] Sriram, Ilango, and Ali Khajeh-Hosseini (2010) "Research agenda in cloud technologies." arXiv preprint
arXiv:1001.3259.
[4] Kapil Bakshi, (2011) "Considerations for cloud data centers: Framework, architecture and adoption."
Aerospace Conference, IEEE. Version 2, pp 1-7
[5] Feng-Seng Chu, Kwang-Cheng Chen and Chen-Mou Cheng "Toward Green Cloud Computing" ACM,
February, 2011
[6] A.M.Lonea, D.E.Popescu and H.Tianfield "Detecting DDoS Attacks in Cloud Computing Environment",
ISSN Frbruary, 2013 pp-70-78
[7] Rao, N. Mallikharjuna, C. Sasidhar, and V. Sathyendra Kumar. (2010) "Cloud computing through
mobile-learning." (IJACSA) International Journal of Advanced Computer Science and Applications, Vol.
1, no. 6, pp: 42-47.
[8] Hassan Zaki and Danish Jamil "Security Issues in Cloud Computing and Counter Measures", April,2011,
Vol.3 pp 2672-2676
[9] Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang "Identity- Based Authentication for Cloud
Computing" ,2009 LNCS 5931,pp 157-166
6. Research Areas in Cloud Computing
International organization of Scientific Research 34 | P a g e
[10] Salim Bitam. (2012) "Bees Life Algorithm for job scheduling in cloud computing." International
Conference on Computing and Information Technology. ICCIT, pp 186- 191
[11] Samil Islam and Farah Habib Chanchary "Data Maigration: Connecting Databases in the Cloud" ICCIT
2012, pp: 450-455
[12] Alaa Eldeen S Ahmed, Abdulwahab K Alsammak and Essam Algizawy. Article: A New Approach to
Manage and Utilize Cloud Computing Underused Resources. International Journal of Computer
Applications 76(11):29-36, 2013
[13] Huang, Chun-Ying, "GamingAnywhere: An open cloud gaming system." Proceedings of the 4th ACM
Multimedia Systems Conference. ACM, 2013.
[14] Gwendal Simon, Catherine Rosenbery, Sharon Choy and Bernard Wong "The Brewing Storm in Cloud
Gaming: A Measurement Study on Cloud to End-User Latency" IEEE, 2012.
[15] Jerry Gao, Xiaoying Bai and Wei-Tek Tsai “Cloud Testing- Issues, Challenges, Need and Practice” SEIJ
Vol. 1, No. 1, 2011 pp: 9-23
[16] Aarti Singh, Manisha Malhotra, “Agent Based Framework for Scalability in Cloud Computing”, ISSN
2229-3345 Vol. 3, No. 4, 2012, pp: 41-45