SlideShare a Scribd company logo
DOI : 10.23883/IJRTER.2017.3371.MFRAG 396
The Utilization of Cloud Computing as Virtual Machine
Zuhri Ramadhan1
, Liza Fitriana2
, Dodi Siregar3
, Rachmat Aulia4
,
Andysah Putera Utama Siahaan5
1,5
Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia
2
Department of Informatics, AMIK Harapan, Medan, Indonesia
3,4
Department of Informatics, Sekolah Tinggi Teknik Harapan, Medan, Indonesia
5
Student of Universiti Malysia Perlis, Kangar, Malaysia
Abstract — Cloud computing has a significant role in the world of information technology, in
particular for the retrieval and storage of relevant information. Globally, it creates a more dynamic,
fast and precise function. In cloud computing, all information is stored online and does not require
hardware like a conventional system. All are available globally on the internet network. It also
eliminates the huge cost of buying and managing all existing hardware. Cloud computing has a quick
access speed and can be managed in real-time. The data on the server can be easily arranged and
distributed to people in need. It will lead the users to use and adapt this technology quickly. This
technology generates speed and reliability more than the previous technology.
Keywords — Cloud Computing, Information Technology, Virtual Machine
I. INTRODUCTION
Cloud computing has become a necessity in the era of technology. The large data users will be
increasingly interested in using this technology. The need for extensive data resulting in data storage
must be everywhere making it easier for users to access the data [1]. Storage needs are a costly thing
to do. To build a data storage server, this requires a huge cost. Online storage and information
technology are expected to reduce manufacturing and maintenance costs on server-related devices. As
well as with the operating system. The use of virtual machine helps users to lessen the cost of
purchasing hardware. This technology has more credibility than conventional technology. So this
technology will eventually reach the level of investment in service that is fast and easy. Keep in mind
also what exactly is cloud computing and what are the possible risks. In building cloud computing,
service providers must understand how to cope with the dangerous possibilities that will occur. Some
threats that occur should be anticipated so as not to damage the system located in the virtual machine
and data residing on online storage.
II. THEORIES
2.1 Cloud Computing
Cloud computing is the incorporation of internet technology with online media storage. The
real meaning is a use of technology that uses the internet and is controlled from the server. The server
can be placed anywhere depending on the service provider. The function of this server is to manage
data and applications related to data. Cloud computing helps consumers to use applications in data
processing without installing on their devices [2]. They can directly access private files on any
computer with internet access. So this technology produces high efficiency by centralizing storage at
a place.
Cloud computing is also an abstraction of the hidden complex infrastructure [3]. It is also a
computational method in which information technology-related capabilities are presented as a service
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 397
so that users can access it over the internet without knowing what is inside, the expert, or who has
control over the technology infrastructure that helps. Cloud computing alters a paradigm in which
information is permanently stored on servers on the internet and temporarily stored on a user's
computer including desktop, tablet, notebook, personal computer, handheld, sensors, monitors, etc.
There are several characteristics of cloud computing:
1. On-Demand Self-Services. A cloud computing service should be able to be utilized by the user
through a self-service mechanism and immediately available when it is necessary. When it needs
a service, it can be registered as self-service.
2. Broad Network Access. A cloud computing service should be accessible from anywhere,
anytime, by any device. It is connected to the service network. While connected to the Internet,
it must be able to access the service through laptops, desktops, internet cafes, mobile phones,
tablets, and other devices.
3. Resource Pooling. A cloud computing service should be centrally available and can share
resources efficiently. Because various customers share cloud computing, service providers must
be able to share loads efficiently, so that the system can be fully utilized.
4. Rapid Elasticity. A cloud computing service should be able to increase or decrease capacity as
needed. For example, if employees in the office increased, it should also be able to add users to
the application easily. If employees are reduced or placing a news website in a cloud computing
network or if there is an increase in traffic because there is important news, the speed and
capacity should be upgraded automatically.
5. Measured Service. A cloud computing service should be made available on a scalable basis, as
it will be used in the payment process. Keep in mind that cloud computing services are paid for
usage, so they must be measurable.
2.2 Virtual Machine
A virtual machine is a device that supports the performance of cloud computing. Cloud
computing requires good performance and fast. So it takes a backup system that can replace the main
system if experiencing constraints at the time of operation. A virtual machine can work just like a
conventional operating system. Systems established must be capable of approaching a real system [3].
With this, the device used should be adequate and of good quality. The virtual machine has two terms,
guest, and host. The virtual machine does not have a physical part but has a working process like a
system that has a physical. The virtual machine is called a guest operating system. This system is
simply installed on the computer running it or better known as the host operating system. The basic
technique of a virtual machine is to emulate hardware from a single computer consisting of CPU,
RAM, HDD to several environments, making it seem like it has the actual device on each of those
operating systems [6].
Figure 1. Virtual machine runs three operating systems
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 398
Figure 1 illustrates that the operating system Windows 7, Windows 8 and Windows 10 are
running on Mac OSX operating system. The three operating systems act as a guest operating system,
while Mac OSX is the host operating system. The four operating systems are running smoothly
together. This host operating system performance must be supported by the right hardware as well.
Virtual machine technology has several abilities such as backing up data, run multiple operating
systems, system rescue, and running of previous software [4] [5]. One of the most important
applications of virtual machine technology is cross platform integration.
Some other important apps performed in the virtual machine platform are:
1. Server Consolidation. If multiple servers run applications that take up only a small amount of
resources, the VM can be used to merge them into one server, even if they require different
operating systems.
2. Automation and Consolidation. Each virtual machine can act as a different environment; it is
usable to the developer, so there is is not necessary to provide the physical environment.
3. Easy System Recovery. Virtualization can perform system recovery that requires portability
and flexibility between platforms.
4. Software Demonstration. The virtual machine technology can provide a clean operating system
and its configuration.
III. RESULT AND DISCUSSION
In the use of cloud computing, users will get from some aspects especially the cost. Usually,
some vendors provide virtual operating system rental or data storage online. The amount of capacity
obtained depends on the ability of the customer to choose which is more suitable for their activities.
There are several benefits using cloud computing:
1. The start-up cost of this technology is not as expensive as building a physical system.
2. Cloud computing services can be easily upgraded or downgraded as needed.
3. Operational and usage costs will be based on how much capacity and speed desired
4. This service will use multi-tenant method (many customers in 1 platform).
5. The ability to adjust services will be unlimited.
6. Make more flexible, can easily be oriented to profit and rapid development.
7. Make operational and management easier, is possible because the personal system or a
company that is connected in a cloud can be easily monitored and arranged
As a service business, cloud computing technology has many risks. Data security is at stake.
As long as the data is online, it could lead to data theft by irresponsible people. It does not matter if
the data is not so important, but what about if the data is related to the defense of the country, it is more
dangerous. If the data is successfully stolen and sold to other countries, this will lead to leakage of
state defense and have a significant risk. Before using cloud computing services as a provider of
information technology, the risks that may occur should be addressed and avoided.
Some factors to consider before using cloud computing services:
1. Service level. Cloud providers may not be consistent with the performance of apps or
transactions. It requires understanding the service level obtained regarding transaction response
time, data protection and data recovery speed.
2. Privacy. Because other people/companies also do hosting, the possibility of data can be out or
read without the user's knowledge or approve from the user.
3. Compliance. Consider the regulation of the business owned, in this case theoretically Cloud
service provider, is expected to equalize the level of conformity for data storage within the
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 399
Cloud, but because this service is still effortless to be expected to be careful regarding data
storage.
4. Data ownership. Is the data still user's data once the data is stored in the cloud or the virtual
machine? Maybe this question is a little strange, but please note as it happens on Facebook that
tries to change terms of use its agreement also question this.
5. Data Mobility. Can a user share data between Cloud services? Moreover, if a user terminates
the cloud relationship how to get data back? What format will be used? Alternatively, can a
user make sure the copies of the data have been deleted? For a service that is still critical for a
company, the best advice is to ask these questions in detail and get all commitments in writing.
After all the factors work well, the next step is to improve the performance of the service. It
includes access speed and storage capacity. The most important thing is the speed at which users will
use this to download and upload files. The faster the speed offered, the more expensive it will cost to
get the service. Data security and convenience are indispensable in this service. This convenience can
be obtained from backup data or backup system provided by the virtual machine. So that if one day
experienced a constraint, the virtual machine could restore the work of the physical system is stalled.
IV. CONCLUSION
The use of cloud computing is beneficial to solve the problem of data capacity and convenience.
In this usage, the user does not have to worry anymore about the issue of electrical energy problems,
speed, and cost of maintenance on the system. Users simply by paying for services within a period,
have been getting services at a certain level. This service can also provide the operating system
virtually if the user wants to have applications that can run virtually. Virtualization is a method to make
an application independent of the system that the user must create.
REFERENCES
[1] E. Mugisha and G. Zhang, "Reliable Multi-cloud Storage Architecture Based on Erasure Code to Improve
Storage Performance and Failure Recovery," International Journal of Advanced Cloud Computing and
Applied Research, vol. 3, no. 1, pp. 26-40, 2017.
[2] A. Schwanenge, A. Schönl and C. Linnhoff-Popien, "Location-Based Cloud Resource Allocation Based
on Information of the Social Web," International Journal of Advanced Cloud Computing and Applied
Research, vol. 1, no. 1, pp. 1-12, 2013.
[3] Hamdani and A. P. U. Siahaan, "Virtualization Approach Theory and Application," IOSR Journal of
Electrical and Electronics Engineering, vol. 2, no. 5, pp. 187-191, 2016.
[4] Vijayrajan, "Analysis of Performance in the Virtual Machines Environment," International Journal of
Advanced Science and Technology, vol. 32, no. 7, pp. 53-64, 2011.
[5] I. Ali and N. Meghanathan, "Virtual Machines And Networks, Installation, Performance, Study,
Advantages and Virtualization Options," International Journal of Network Security & Its Applications, vol.
3, no. 1, pp. 1-15, 2011.
[6] A. P. U. Siahaan, "Comparison Analysis of CPU Scheduling: FCFS, SJF and Round Robin," International
Journal of Engineering Development and Research, vol. 4, no. 3, pp. 124-132, 2016.

More Related Content

What's hot

Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
Offloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingOffloading in Mobile Cloud Computing
Offloading in Mobile Cloud Computing
Saif Salah
 
Case Study 2
Case Study 2Case Study 2
Case Study 2
Makia Lucas
 
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
Nico Huysamen
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
M2C2: A Mobility Management System For Mobile Cloud Computing
M2C2: A Mobility Management System For Mobile Cloud ComputingM2C2: A Mobility Management System For Mobile Cloud Computing
M2C2: A Mobility Management System For Mobile Cloud Computing
Karan Mitra
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
Module 3-cloud computing
Module 3-cloud computingModule 3-cloud computing
Module 3-cloud computing
Sweta Kumari Barnwal
 
APPLICATION OF AUTONOMIC COMPUTING PRINCIPLES IN VIRTUALIZED ENVIRONMENT
APPLICATION OF AUTONOMIC COMPUTING PRINCIPLES IN VIRTUALIZED ENVIRONMENTAPPLICATION OF AUTONOMIC COMPUTING PRINCIPLES IN VIRTUALIZED ENVIRONMENT
APPLICATION OF AUTONOMIC COMPUTING PRINCIPLES IN VIRTUALIZED ENVIRONMENT
cscpconf
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
Web OS in Cloud Computing: A Case study
Web OS in Cloud Computing: A Case studyWeb OS in Cloud Computing: A Case study
Web OS in Cloud Computing: A Case study
Eswar Publications
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
Mohammed Sajjad Ali
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Publishing House
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
Helly Patel
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Govardhan Gottigalla
 
An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...
CSCJournals
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
Balkees Shereek
 
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
acijjournal
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161
Kamal Jyoti
 

What's hot (19)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Offloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingOffloading in Mobile Cloud Computing
Offloading in Mobile Cloud Computing
 
Case Study 2
Case Study 2Case Study 2
Case Study 2
 
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
M2C2: A Mobility Management System For Mobile Cloud Computing
M2C2: A Mobility Management System For Mobile Cloud ComputingM2C2: A Mobility Management System For Mobile Cloud Computing
M2C2: A Mobility Management System For Mobile Cloud Computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Module 3-cloud computing
Module 3-cloud computingModule 3-cloud computing
Module 3-cloud computing
 
APPLICATION OF AUTONOMIC COMPUTING PRINCIPLES IN VIRTUALIZED ENVIRONMENT
APPLICATION OF AUTONOMIC COMPUTING PRINCIPLES IN VIRTUALIZED ENVIRONMENTAPPLICATION OF AUTONOMIC COMPUTING PRINCIPLES IN VIRTUALIZED ENVIRONMENT
APPLICATION OF AUTONOMIC COMPUTING PRINCIPLES IN VIRTUALIZED ENVIRONMENT
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Web OS in Cloud Computing: A Case study
Web OS in Cloud Computing: A Case studyWeb OS in Cloud Computing: A Case study
Web OS in Cloud Computing: A Case study
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161
 

Similar to The Utilization of Cloud Computing as Virtual Machine

106248842 cc
106248842 cc106248842 cc
106248842 cc
homeworkping7
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
dannyijwest
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
nischal52
 
Cloud Computing paradigm
Cloud Computing paradigmCloud Computing paradigm
Cloud Computing paradigm
Vidoushi B-Somrah
 
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating SystemVirtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
ijbuiiir1
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
IJSRED
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Garuda Trainings
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...
sushil Choudhary
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Sushil kumar Choudhary
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docx
susanschei
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 
CLOUD COMPUTING CHANTI-130 ( FOR THE COMPUTING2).pdf
CLOUD COMPUTING CHANTI-130 ( FOR THE COMPUTING2).pdfCLOUD COMPUTING CHANTI-130 ( FOR THE COMPUTING2).pdf
CLOUD COMPUTING CHANTI-130 ( FOR THE COMPUTING2).pdf
yadavkarthik4437
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
MANVENDRA PRIYADARSHI
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
IJEEE
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
IOSRjournaljce
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
Ravi Yasas
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
Raman Gill
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
ijcsa
 

Similar to The Utilization of Cloud Computing as Virtual Machine (20)

106248842 cc
106248842 cc106248842 cc
106248842 cc
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 
Cloud Computing paradigm
Cloud Computing paradigmCloud Computing paradigm
Cloud Computing paradigm
 
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating SystemVirtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docx
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
CLOUD COMPUTING CHANTI-130 ( FOR THE COMPUTING2).pdf
CLOUD COMPUTING CHANTI-130 ( FOR THE COMPUTING2).pdfCLOUD COMPUTING CHANTI-130 ( FOR THE COMPUTING2).pdf
CLOUD COMPUTING CHANTI-130 ( FOR THE COMPUTING2).pdf
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 

More from Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Universitas Pembangunan Panca Budi
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
Universitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Universitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Universitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
Universitas Pembangunan Panca Budi
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Universitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
Universitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Universitas Pembangunan Panca Budi
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
Universitas Pembangunan Panca Budi
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
Universitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Universitas Pembangunan Panca Budi
 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
 

Recently uploaded

Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 

Recently uploaded (20)

Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 

The Utilization of Cloud Computing as Virtual Machine

  • 1. DOI : 10.23883/IJRTER.2017.3371.MFRAG 396 The Utilization of Cloud Computing as Virtual Machine Zuhri Ramadhan1 , Liza Fitriana2 , Dodi Siregar3 , Rachmat Aulia4 , Andysah Putera Utama Siahaan5 1,5 Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia 2 Department of Informatics, AMIK Harapan, Medan, Indonesia 3,4 Department of Informatics, Sekolah Tinggi Teknik Harapan, Medan, Indonesia 5 Student of Universiti Malysia Perlis, Kangar, Malaysia Abstract — Cloud computing has a significant role in the world of information technology, in particular for the retrieval and storage of relevant information. Globally, it creates a more dynamic, fast and precise function. In cloud computing, all information is stored online and does not require hardware like a conventional system. All are available globally on the internet network. It also eliminates the huge cost of buying and managing all existing hardware. Cloud computing has a quick access speed and can be managed in real-time. The data on the server can be easily arranged and distributed to people in need. It will lead the users to use and adapt this technology quickly. This technology generates speed and reliability more than the previous technology. Keywords — Cloud Computing, Information Technology, Virtual Machine I. INTRODUCTION Cloud computing has become a necessity in the era of technology. The large data users will be increasingly interested in using this technology. The need for extensive data resulting in data storage must be everywhere making it easier for users to access the data [1]. Storage needs are a costly thing to do. To build a data storage server, this requires a huge cost. Online storage and information technology are expected to reduce manufacturing and maintenance costs on server-related devices. As well as with the operating system. The use of virtual machine helps users to lessen the cost of purchasing hardware. This technology has more credibility than conventional technology. So this technology will eventually reach the level of investment in service that is fast and easy. Keep in mind also what exactly is cloud computing and what are the possible risks. In building cloud computing, service providers must understand how to cope with the dangerous possibilities that will occur. Some threats that occur should be anticipated so as not to damage the system located in the virtual machine and data residing on online storage. II. THEORIES 2.1 Cloud Computing Cloud computing is the incorporation of internet technology with online media storage. The real meaning is a use of technology that uses the internet and is controlled from the server. The server can be placed anywhere depending on the service provider. The function of this server is to manage data and applications related to data. Cloud computing helps consumers to use applications in data processing without installing on their devices [2]. They can directly access private files on any computer with internet access. So this technology produces high efficiency by centralizing storage at a place. Cloud computing is also an abstraction of the hidden complex infrastructure [3]. It is also a computational method in which information technology-related capabilities are presented as a service
  • 2. International Journal of Recent Trends in Engineering & Research (IJRTER) Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457] @IJRTER-2017, All Rights Reserved 397 so that users can access it over the internet without knowing what is inside, the expert, or who has control over the technology infrastructure that helps. Cloud computing alters a paradigm in which information is permanently stored on servers on the internet and temporarily stored on a user's computer including desktop, tablet, notebook, personal computer, handheld, sensors, monitors, etc. There are several characteristics of cloud computing: 1. On-Demand Self-Services. A cloud computing service should be able to be utilized by the user through a self-service mechanism and immediately available when it is necessary. When it needs a service, it can be registered as self-service. 2. Broad Network Access. A cloud computing service should be accessible from anywhere, anytime, by any device. It is connected to the service network. While connected to the Internet, it must be able to access the service through laptops, desktops, internet cafes, mobile phones, tablets, and other devices. 3. Resource Pooling. A cloud computing service should be centrally available and can share resources efficiently. Because various customers share cloud computing, service providers must be able to share loads efficiently, so that the system can be fully utilized. 4. Rapid Elasticity. A cloud computing service should be able to increase or decrease capacity as needed. For example, if employees in the office increased, it should also be able to add users to the application easily. If employees are reduced or placing a news website in a cloud computing network or if there is an increase in traffic because there is important news, the speed and capacity should be upgraded automatically. 5. Measured Service. A cloud computing service should be made available on a scalable basis, as it will be used in the payment process. Keep in mind that cloud computing services are paid for usage, so they must be measurable. 2.2 Virtual Machine A virtual machine is a device that supports the performance of cloud computing. Cloud computing requires good performance and fast. So it takes a backup system that can replace the main system if experiencing constraints at the time of operation. A virtual machine can work just like a conventional operating system. Systems established must be capable of approaching a real system [3]. With this, the device used should be adequate and of good quality. The virtual machine has two terms, guest, and host. The virtual machine does not have a physical part but has a working process like a system that has a physical. The virtual machine is called a guest operating system. This system is simply installed on the computer running it or better known as the host operating system. The basic technique of a virtual machine is to emulate hardware from a single computer consisting of CPU, RAM, HDD to several environments, making it seem like it has the actual device on each of those operating systems [6]. Figure 1. Virtual machine runs three operating systems
  • 3. International Journal of Recent Trends in Engineering & Research (IJRTER) Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457] @IJRTER-2017, All Rights Reserved 398 Figure 1 illustrates that the operating system Windows 7, Windows 8 and Windows 10 are running on Mac OSX operating system. The three operating systems act as a guest operating system, while Mac OSX is the host operating system. The four operating systems are running smoothly together. This host operating system performance must be supported by the right hardware as well. Virtual machine technology has several abilities such as backing up data, run multiple operating systems, system rescue, and running of previous software [4] [5]. One of the most important applications of virtual machine technology is cross platform integration. Some other important apps performed in the virtual machine platform are: 1. Server Consolidation. If multiple servers run applications that take up only a small amount of resources, the VM can be used to merge them into one server, even if they require different operating systems. 2. Automation and Consolidation. Each virtual machine can act as a different environment; it is usable to the developer, so there is is not necessary to provide the physical environment. 3. Easy System Recovery. Virtualization can perform system recovery that requires portability and flexibility between platforms. 4. Software Demonstration. The virtual machine technology can provide a clean operating system and its configuration. III. RESULT AND DISCUSSION In the use of cloud computing, users will get from some aspects especially the cost. Usually, some vendors provide virtual operating system rental or data storage online. The amount of capacity obtained depends on the ability of the customer to choose which is more suitable for their activities. There are several benefits using cloud computing: 1. The start-up cost of this technology is not as expensive as building a physical system. 2. Cloud computing services can be easily upgraded or downgraded as needed. 3. Operational and usage costs will be based on how much capacity and speed desired 4. This service will use multi-tenant method (many customers in 1 platform). 5. The ability to adjust services will be unlimited. 6. Make more flexible, can easily be oriented to profit and rapid development. 7. Make operational and management easier, is possible because the personal system or a company that is connected in a cloud can be easily monitored and arranged As a service business, cloud computing technology has many risks. Data security is at stake. As long as the data is online, it could lead to data theft by irresponsible people. It does not matter if the data is not so important, but what about if the data is related to the defense of the country, it is more dangerous. If the data is successfully stolen and sold to other countries, this will lead to leakage of state defense and have a significant risk. Before using cloud computing services as a provider of information technology, the risks that may occur should be addressed and avoided. Some factors to consider before using cloud computing services: 1. Service level. Cloud providers may not be consistent with the performance of apps or transactions. It requires understanding the service level obtained regarding transaction response time, data protection and data recovery speed. 2. Privacy. Because other people/companies also do hosting, the possibility of data can be out or read without the user's knowledge or approve from the user. 3. Compliance. Consider the regulation of the business owned, in this case theoretically Cloud service provider, is expected to equalize the level of conformity for data storage within the
  • 4. International Journal of Recent Trends in Engineering & Research (IJRTER) Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457] @IJRTER-2017, All Rights Reserved 399 Cloud, but because this service is still effortless to be expected to be careful regarding data storage. 4. Data ownership. Is the data still user's data once the data is stored in the cloud or the virtual machine? Maybe this question is a little strange, but please note as it happens on Facebook that tries to change terms of use its agreement also question this. 5. Data Mobility. Can a user share data between Cloud services? Moreover, if a user terminates the cloud relationship how to get data back? What format will be used? Alternatively, can a user make sure the copies of the data have been deleted? For a service that is still critical for a company, the best advice is to ask these questions in detail and get all commitments in writing. After all the factors work well, the next step is to improve the performance of the service. It includes access speed and storage capacity. The most important thing is the speed at which users will use this to download and upload files. The faster the speed offered, the more expensive it will cost to get the service. Data security and convenience are indispensable in this service. This convenience can be obtained from backup data or backup system provided by the virtual machine. So that if one day experienced a constraint, the virtual machine could restore the work of the physical system is stalled. IV. CONCLUSION The use of cloud computing is beneficial to solve the problem of data capacity and convenience. In this usage, the user does not have to worry anymore about the issue of electrical energy problems, speed, and cost of maintenance on the system. Users simply by paying for services within a period, have been getting services at a certain level. This service can also provide the operating system virtually if the user wants to have applications that can run virtually. Virtualization is a method to make an application independent of the system that the user must create. REFERENCES [1] E. Mugisha and G. Zhang, "Reliable Multi-cloud Storage Architecture Based on Erasure Code to Improve Storage Performance and Failure Recovery," International Journal of Advanced Cloud Computing and Applied Research, vol. 3, no. 1, pp. 26-40, 2017. [2] A. Schwanenge, A. Schönl and C. Linnhoff-Popien, "Location-Based Cloud Resource Allocation Based on Information of the Social Web," International Journal of Advanced Cloud Computing and Applied Research, vol. 1, no. 1, pp. 1-12, 2013. [3] Hamdani and A. P. U. Siahaan, "Virtualization Approach Theory and Application," IOSR Journal of Electrical and Electronics Engineering, vol. 2, no. 5, pp. 187-191, 2016. [4] Vijayrajan, "Analysis of Performance in the Virtual Machines Environment," International Journal of Advanced Science and Technology, vol. 32, no. 7, pp. 53-64, 2011. [5] I. Ali and N. Meghanathan, "Virtual Machines And Networks, Installation, Performance, Study, Advantages and Virtualization Options," International Journal of Network Security & Its Applications, vol. 3, no. 1, pp. 1-15, 2011. [6] A. P. U. Siahaan, "Comparison Analysis of CPU Scheduling: FCFS, SJF and Round Robin," International Journal of Engineering Development and Research, vol. 4, no. 3, pp. 124-132, 2016.