To see the other types of publications on this topic, follow the link: Cloud, computing, administration.

Journal articles on the topic 'Cloud, computing, administration'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud, computing, administration.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Alshammari, Hamoud, and Christian Bach. "Administration Security Issues in Cloud Computing." International Journal of Information Technology Convergence and Services 3, no. 4 (August 31, 2013): 1–11. http://dx.doi.org/10.5121/ijitcs.2013.3401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zaharia-Rădulescu, Adrian-Mihai, and Ioan Radu. "Cloud computing and public administration: approaches in several European countries." Proceedings of the International Conference on Business Excellence 11, no. 1 (July 1, 2017): 739–49. http://dx.doi.org/10.1515/picbe-2017-0078.

Full text
Abstract:
Abstract The Digital Agenda for Europe 2020 has more objectives from increasing the participation of its citizens and consumers in the digital society to creating a fully interconnected society. These objectives can be supported through a high degree of digitization achieved at public administration level and an increased performance in delivering public services. Cloud computing is one of the ICT areas with a fast growth in the last years that presents a big promise for achieving the objectives of the Digital Agenda for Europe 2020. This paper aims to present what cloud computing is and how it can help the public administration to increase its performance. From Infrastructure as a Service continuing with Platform as a Service and moving up to Software as a Service each level of cloud computing is presented in here with its strong and weak points and how it is suitable for a given use case in public administration. The challenges and the risks of moving to cloud and the differences between public, private and hybrid cloud are also presented in the paper. The research done by the author is both theoretical and literature review and combines knowledge from different areas. An analysis and examples of cloud computing approach and implementation in several European Union countries are presented in this paper to facilitate the understanding of the subject. Cloud computing can help public administration to decrease costs, standardize services in different locations, integrate public resources and provide a higher transparency in the government act.
APA, Harvard, Vancouver, ISO, and other styles
3

Wilianto, Wilianto, and Iskandar Fitri. "Information Technology Service Management with Cloud Computing Approach to Improve Administration System and Online Learning Performance." CommIT (Communication and Information Technology) Journal 9, no. 2 (October 31, 2015): 51. http://dx.doi.org/10.21512/commit.v9i2.1655.

Full text
Abstract:
This work discusses the development of information technology service management using cloud computing approach to improve the performance of administration system and online learning at STMIK IBBI Medan, Indonesia. The network topology is modeled and simulated for system administration and online learning. The same network topology is developed in cloud computing using Amazon AWS architecture. The model is designed and modeled using Riverbed Academic Edition Modeler to obtain values of the parameters: delay, load, CPU utilization, and throughput. The simu- lation results are the following. For network topology 1, without cloud computing, the average delay is 54 ms, load 110 000 bits/s, CPU utilization 1.1%, and throughput 440 bits/s. With cloud computing, the average delay is 45 ms, load 2 800 bits/s, CPU utilization 0.03%, and throughput 540 bits/s. For network topology 2, without cloud computing, the average delay is 39 ms, load 3 500 bits/s, CPU utilization 0.02%, and throughput database server 1 400 bits/s. With cloud computing, the average delay is 26 ms, load 5 400 bits/s, CPU utilization email server 0.0001%, FTP server 0.001%, HTTP server 0.0002%, throughput email server 85 bits/s, FTP server 100 bits/sec, and HTTP server 95 bits/s. Thus, the delay, the load, and the CPU utilization decrease; but, the throughput increases. Information technology service management with cloud computing approach has better performance.
APA, Harvard, Vancouver, ISO, and other styles
4

Hauke, Krzysztof. "Processing model in cloud computing in public administration unit." Ekonomiczne Problemy Usług 123 (2016): 121–36. http://dx.doi.org/10.18276/epu.2016.123-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sudhakar, K., M. James Stephen, and P. V. G. D. Prasad Reddy. "Cloud Oriented Integrated Composite Services over SOA in Distributed Computing." International Journal of Engineering and Advanced Technology 10, no. 3 (February 28, 2021): 52–58. http://dx.doi.org/10.35940/ijeat.c2160.0210321.

Full text
Abstract:
Service-oriented architecture (SOA)[1] is an incessant term to deal with various administrations dependent on solicitations of various clients in various ongoing applications. Still, now, a few people don't have total information about what SOA really has done, they get confounded how SOA identifies with distributed computing. On account of cloud administration usage in SOA need security mindful help creation with finegrained stream control to make sure about web administrations at execution time to share various administrations to various clients in dispersed condition? Routinely various models were acquainted with investigating secure web administrations at execution of various administrations. Because of access control infringement, they will take high execution time and other leader boundaries profoundly, and furthermore they don't control access assurance arrangements in composite administrations, which may deliver bothersome information spillage. To conquer these infringement issues in SOA, we present Integrated Novel Multi-Level Composite Service Model (INMLCSM)[2] to lessen infringement calculation cost dependent on customer authentic and demonstrate customer composite administrations and furthermore perform nearby/distant strategy calculation for highest customers. We acquaint idea of change factor with characterize halfway administrations. Our proposed approach portrays forceful exploratory outcomes.
APA, Harvard, Vancouver, ISO, and other styles
6

Niranjanamurthy, M., M. P. Amulya, N. M. Niveditha, and P. Dayananda. "Creating a Custom Virtual Private Cloud and Launch an Elastic Compute Cloud (EC2) Instance in Your Virtual Private Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 4509–14. http://dx.doi.org/10.1166/jctn.2020.9106.

Full text
Abstract:
Cloud Computing is regarded to as putting away and getting to data over the web. The hard disk of your PC doesn’t hold this data. In Cloud computing, you can get to information from a remote server. Amazon Web Services (AWS) enables adaptable, solid, versatile, simple to-utilize and practical Cloud computing arrangements. AWS is an extensive, simple to utilize processing stage offered Amazon. A virtual private cloud (VPC) is devoted to the AWS account which is in the AWS cloud that acts coherently detached with different virtual systems. Amazon EC2 is a secure web administration which allows register with the modifiable limit in the cloud .In this work, we are giving route subtleties of Creating a custom VPC and dispatch an EC2 Instance in your VPC.
APA, Harvard, Vancouver, ISO, and other styles
7

Chaitanya, M., and K. Durga Charan. "A Review on Load Balancing Model Using Best Partition Technique." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 284. http://dx.doi.org/10.23956/ijarcsse.v7i8.69.

Full text
Abstract:
Load balancing makes cloud computing greater knowledgeable and could increase client pleasure. At reward cloud computing is among the all most systems which offer garage of expertise in very lowers charge and available all the time over the net. However, it has extra vital hassle like security, load administration and fault tolerance. Load balancing inside the cloud computing surroundings has a large impact at the presentation. The set of regulations relates the sport idea to the load balancing manner to amplify the abilties in the public cloud environment. This textual content pronounces an extended load balance mannequin for the majority cloud concentrated on the cloud segregating proposal with a swap mechanism to select specific strategies for great occasions.
APA, Harvard, Vancouver, ISO, and other styles
8

Tsohou, Aggeliki, Habin Lee, and Zahir Irani. "Innovative public governance through cloud computing." Transforming Government: People, Process and Policy 8, no. 2 (May 13, 2014): 251–82. http://dx.doi.org/10.1108/tg-09-2013-0033.

Full text
Abstract:
Purpose – The purpose of this paper is to identify and analyze challenges and to discuss proposed solutions for innovative public governance through cloud computing. Innovative technologies, such as federation of services and cloud computing, can greatly contribute to the provision of e-government services, through scaleable and flexible systems. Furthermore, they can facilitate in reducing costs and overcoming public information segmentation. Nonetheless, when public agencies use these technologies, they encounter several associated organizational and technical changes, as well as significant challenges. Design/methodology/approach – We followed a multidisciplinary perspective (social, behavioral, business and technical) and conducted a conceptual analysis for analyzing the associated challenges. We conducted focus group interviews in two countries for evaluating the performance models that resulted from the conceptual analysis. Findings – This study identifies and analyzes several challenges that may emerge while adopting innovative technologies for public governance and e-government services. Furthermore, it presents suggested solutions deriving from the experience of designing a related platform for public governance, including issues of privacy requirements, proposed business models and key performance indicators for public services on cloud computing. Research limitations/implications – The challenges and solutions discussed are based on the experience gained by designing one platform. However, we rely on issues and challenges collected from four countries. Practical implications – The identification of challenges for innovative design of e-government services through a central portal in Europe and using service federation is expected to inform practitioners in different roles about significant changes across multiple levels that are implied and may accelerate the challenges' resolution. Originality/value – This is the first study that discusses from multiple perspectives and through empirical investigation the challenges to realize public governance through innovative technologies. The results emerge from an actual portal that will function at a European level.
APA, Harvard, Vancouver, ISO, and other styles
9

Arya, Mamta, Himanshu S. Mahanta, S. N. Singh, and Om Prakash Dubey. "TRADITIONAL E-GOVERNANCE TO CLOUD BASED E- GOVERNANCE IN INDIA." International Journal of Students' Research in Technology & Management 6, no. 2 (March 3, 2018): 31–40. http://dx.doi.org/10.18510/ijsrtm.2018.626.

Full text
Abstract:
Both at the central and state levels administration of India has actualized various ICT (Information and Communication Technology) activities under the National e-Governance Plan (NeGP). The objective of NeGP to most extreme utilization of government services accessible to residents of India by means of electronic media in simplest and most ideal way. To build the quantity of e-exchanges in the nation, proficient administration conveyance to the natives, re-utilization of uses, making ideal utilization of existing foundation, reception of cloud based e-Governance is the main arrangement, accordingly accomplishing a definitive objective of NeGP. Distributed computing is the most recent propelled development in figuring, distributed computing assets are accessible at whatever point required and charges depends on the amount you utilize them. Broad distributed computing is just conceivable by the Internet, and this is the most widely recognized method for getting to cloud assets. The primary plan to think about on this is the means by which to keep up information in advanced arrangement with secure spot and usage in future for investigation and improvement at whatever time anyplace with least assets. It expects to convey more intuitive i.e. administrations to subjects and organizations through E-Governance. For this, distributed computing might prompt huge cost reserve funds and dependable method for information exchange. It involves use over the Internet of processing equipment and programming base and applications that are remotely facilitated.
APA, Harvard, Vancouver, ISO, and other styles
10

Ravi, Vijayalakshmi. "Cloud Computing Paradigm for Indian Education Sector." International Journal of Cloud Applications and Computing 2, no. 2 (April 2012): 41–47. http://dx.doi.org/10.4018/ijcac.2012040104.

Full text
Abstract:
The Indian education sector is constrained by cost but demand has been rising for cost-effective, robust software applications to deliver services for learning and administration. Existing systems are not scalable and require huge capex (Capital Expenditure) and IT staff to maintain the system, which has shifted the focus from the core education business to managing the overheads of IT operations. The Cloud Computing paradigm has emerged as the optimal solution to meet the requirements of cost effective, scalable, and secure systems. In this paper, the author examines how the deployment of cloud computing in the education sector in India can meet these challenges.
APA, Harvard, Vancouver, ISO, and other styles
11

Saikia, Ankur P., and L. P. Saikia. "A Survey on Secured Approach of External Cloud without Avoiding the Data Integrity." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 11 (November 30, 2017): 139. http://dx.doi.org/10.23956/ijarcsse.v7i11.476.

Full text
Abstract:
Cloud Computing settled state of mind has included a New York minute inmany organizations. Cloud Computing offers numerous advantages in uncertainty of delicate cost and administration of information. Guaranteeing the guarantee of exceed processing assumes a leisure activity part in the leave in the shade registering, as clients regularly five and dime shop imperative data by all of obscuration automated data suppliers in any case these suppliers make out be hazardous. Clients are pondering generally assaults on the arrangement of significant worth and the accessibility of their story in the diminish from terrible insiders and untouchables, and from accepting nobody guarantee worth of diminish administrations. These issues are strongly critical yet there are still around space for stake investigating in leave in the shade processing. Managing by the entire of "single cloud" suppliers is anticipated to wind up noticeably slight well known commonly clients appropriate to dangers of engagement in movement application accessibility blemish and the incident of wretched insiders in the fair hit cloud. An arrangement towards "multi-mists", or in particular words, "inter clouds" or "billow of-Cloud" has expanded as of late. The thought process of this freebee is to skim late research over each other to hit and multi-mists cash in the bank and to give conceivable arrangements. It is rely on that the examination into the demonstration with respect to of multi-cloud suppliers to sponsor security has gotten rare consideration from the exploration swarm than has the oversee of fair hit mists. This exchange tries to protect the consider of multi-mists guerdon to its adaptability to influenced a long story to short security chances that push the distributed computing buyer.
APA, Harvard, Vancouver, ISO, and other styles
12

Maruthi, V., P. Shanthi, and A. Umamakeswari. "Enhanced Adaptive Learning Mechanism for Cloud Selection." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 512. http://dx.doi.org/10.14419/ijet.v7i2.24.12149.

Full text
Abstract:
Estimation of cloud services in a distributed computing environment is taking more interests. There is a wealth of developing cloud benefit assets that makes it difficult for the user to select the best administration related to own applications in an evolving multiple cloud environment, particularly for online processing applications. To make clients to choose their interested cloud adequately, we need a model which holds the cloud profits, and hence dynamic cloud benefit determination procedure named Dynamic Cloud Selection (DCS) is adapted. In this procedure of selected services, every cloud benefit business deals with some group of cloud administrations, and executes the DCS method. This paper studies the cloud selection and proposed a way to improve the cloud selection based on related measures. The measures are reliability, response time, throughput, availability, utilization, resilience, scalability, and elasticity. The system is contrived to enhance the cloud benefit choice powerfully and to restore the best administration result to the client. These measures are used to form best selection strategy. User memory requirement is also considered to improve the preferred task. Experimental results proved that using this new strategy, best cloud selection is made efficiently.
APA, Harvard, Vancouver, ISO, and other styles
13

Mustafee, Navonil. "Exploiting grid computing, desktop grids and cloud computing for e‐science." Transforming Government: People, Process and Policy 4, no. 4 (October 12, 2010): 288–98. http://dx.doi.org/10.1108/17506161011081291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sharmila, Dr V., S. Poonguzhali, M. Srivani, P. Raghul, Dr V. Vennila, and Dr J. Preetha. "An Improved Secure Enabled Information Sharing on Hybrid Cloud." Revista Gestão Inovação e Tecnologias 11, no. 2 (June 5, 2021): 374–86. http://dx.doi.org/10.47059/revistageintec.v11i2.1674.

Full text
Abstract:
Distributed computing guarantees the adaptable conveyance of figuring administrations in a pay-more only as costs arise way. It permits clients to effectively scale their foundation and save money on the general expense of activity. Anyway Cloud administration contributions can possibly flourish if clients are happy with administration execution. Permitting immediate access and adaptable scaling while at the same time keeping up the help leaves and offering serious costs represents a critical test to Cloud registering suppliers. Moreover administrations will stay accessible over the long haul just if this business creates a steady income stream. To address these difficulties we present novel approach based assistance confirmation control models that target expanding the income of Cloud suppliers while considering educational vulnerability with respect to asset prerequisites. Our assessment shows that arrangement based methodologies measurably altogether outflank the early bird gets the worm draws near, which are still cutting edge. Moreover the outcomes give bits of knowledge in how and how much vulnerability contrarily affects income.
APA, Harvard, Vancouver, ISO, and other styles
15

Ravichandran, S., and J. Sathiamoorthy. "An Innovative Performance of Refuge using Stowage Main Servers in Cloud Computing Equipment." Asian Journal of Computer Science and Technology 10, no. 1 (May 5, 2021): 13–17. http://dx.doi.org/10.51983/ajcst-2021.10.1.2695.

Full text
Abstract:
Distributed computing has been imagined as the cutting edge engineering of IT Enterprise. It moves the application programming and information bases to the incorporated enormous server farms, where the administration of the information and administrations may not be completely dependable. There are various security issues for distributed computing as it envelops numerous innovations including networks, information bases, working frameworks, virtualization, asset planning, exchange the board, load adjusting, simultaneousness control and memory the executives. Putting away information in an outsider's cloud framework causes genuine worry over information secrecy. Hence, security issues for a large number of these frameworks and advancements are material to distributed computing. We propose a key worker encryption conspire and incorporate it with a decentralized deletion code with the end goal that a safe conveyed stockpiling key framework is defined respectively.
APA, Harvard, Vancouver, ISO, and other styles
16

Dupree, Jason. "AirSet: Cloud Computing and All-in-One Resource http://www.airset.com." Public Services Quarterly 5, no. 4 (November 30, 2009): 266–67. http://dx.doi.org/10.1080/15228950903288611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Gnana Sophia, S., K. K. Thanammal, and S. SSujatha. "A SURVEY OF HOMOMORPHIC ENCRYPTION OF DATA IN CLOUD FOR SECURE STORAGE." International Journal of Advanced Research 9, no. 4 (April 30, 2021): 955–64. http://dx.doi.org/10.21474/ijar01/12789.

Full text
Abstract:
Cloud computing is the transportation of computing assistance and the opportunity of computer system assets for storing of data and calculating ability without the administration of the user. Against the publishing business and the technical applications of cloud, more probable users are still to join the cloud and the users of cloud can put their less confidential data in the cloud. Loss of security in the cloud is an important problem. The information will be encrypted and gathered in the storage of cloud .The problem here is the informations can be send to or from a cloud in encrypted mode, the servers that function the cloud will not any task on it. In this paper wereviewe the homomorphic encryption techniques, Advantages and disadvantages of various research papers.
APA, Harvard, Vancouver, ISO, and other styles
18

Ramasree, T. "Resource Allocation Using Particle Swarm Optimization Algorithm in Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 2679–82. http://dx.doi.org/10.22214/ijraset.2021.37856.

Full text
Abstract:
Abstract: Cloud computing is now widely used in organisations and bussiness firms because of its on-demand accessibility of framework assets, web innovation, and pay-as-you-go principle. Despite of numerous advantages of cloud computing, such as availability and accessibility, it also has few significant drawbacks. The most fundamental issue is the resource management, where Cloud computing provides IT assets such as memory, network, storage, and so on based on a virtualization concept and a pay-as-you-go model. Much research has gone into the administration of these assets. The suggested framework employs the particle swarm optimization algorithm method for assigning and performing the tasks of an application. The proposed algorithm will likely reduce task completion time, cost by utilizing the maximum resources. The proposed system is evaluated using the cloudsim toolkit. Keywords: Particle swarm optimization algorithm, Resource allocation, Cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
19

Naresh, V., M. Anudeep, M. Saipraneeth, A. Saikumar Reddy, and V. Navya. "Encryption-Based Secure and Efficient Access Control to Out Sourced Data in Cloud Computing." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 315. http://dx.doi.org/10.14419/ijet.v7i2.32.15703.

Full text
Abstract:
The cloud stockpiling framework, comprising of capacity servers, gives long haul stockpiling administrations on the Internet. Maintaining the data in the cloud computing of third parties generates: serious concern about the confidentiality of data and the reduction of data management costs. Nonetheless, we should give security certifications to outside information. We plan and actualize a protected cloud stockpiling framework that gives secure, secure and available record security for document administration and secure information exchange. It includes foreign files with a file access policy, possibly deleting files, to avoid being denied to anyone with a file access policy. To achieve these security objectives, a set of password keys is implemented that maintain a host (s) or head (s) separately. We offer a twofold edge intermediary coding plan and incorporate it with a decentralized disposal code, which is detailed with a safely Cloud storage framework. The Cloud storage system not only provides a secure and stable search and storage of data, but also allows the user to transfer their data to the user of the backup to another user without the data being returned.
APA, Harvard, Vancouver, ISO, and other styles
20

Salih, Muna Hadi. "The Impact of Cloud Computing and Its Applications on Libraries and Information Centers." Journal of Educational and Social Research 10, no. 6 (November 18, 2020): 237. http://dx.doi.org/10.36941/jesr-2020-0123.

Full text
Abstract:
This study aims to know to what extent Iraqi Universities libraries made use of cloud computing services in providing its services on one hand, and what are the challenges that face it on the other hand. Also, the study aims to discover the technological skills of the librarians which enable them to use the cloud computing technique. The study sample consists of all librarians in university libraries, 80 female and male employees. The questionnaire was used for collecting information and analyzing information and SPSS package. The study concluded that librarians are aware of cloud computing technique and own technological skills enable them to use it. However, the decision of this technology application should be made by the higher administration. Thus, flexible plans and strategies must be made to help make changes and modifications to cope up with developments of new technologies in general and cloud computing in particular.
APA, Harvard, Vancouver, ISO, and other styles
21

Pardesi, Hitesh, and Naveen Kumari. "Study of Various Multi Keyword Search in Cloud Computing." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 318. http://dx.doi.org/10.23956/ijarcsse.v7i8.80.

Full text
Abstract:
With the approach of cloud computing, data proprietors are induced to outsource their important information administration systems from adjacent spots to the business open cloud for proficient flexibility. As needs be, enabling a mixed cloud data look organization is of crucial essentialness. Considering the colossal number of data customers and documents in the cloud, it is vital to allow diverse watchwords in the chase request and return reports in the demand of their relevance to these catchphrases. Related wears down accessible encryption focus on single watchword chase or Boolean catchphrase look for, and sometimes sort the rundown things. In this paper, we describe and deal with the testing issue of insurance defending multi-catchphrase situated look for over encoded data in disseminated computing (MRSE).
APA, Harvard, Vancouver, ISO, and other styles
22

Pardesi, Hitesh, and Naveen Kumari. "Study of Various Multi Keyword Search in Cloud Computing." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 308. http://dx.doi.org/10.23956/ijarcsse/v7i7/0130.

Full text
Abstract:
With the approach of cloud computing, information proprietors are persuaded to outsource their unpredictable data management frameworks from nearby places to the business open cloud for efficient adaptability. Accordingly, empowering a scrambled cloud information look administration is of vital significance. Considering the huge number of information clients and archives in the cloud, it is important to permit different watchwords in the hunt demand and return reports in the request of their pertinence to these catchphrases. Related chips away at searchable encryption concentrate on single watchword hunt or Boolean catchphrase seek, and once in a while sort the list items. In this paper, surprisingly, we characterize and take care of the testing issue of protection safeguarding multi-catchphrase positioned seek over encoded information in distributed computing (MRSE).
APA, Harvard, Vancouver, ISO, and other styles
23

Patra, Sudhansu Shekhar, and R. K. Barik. "Dynamic Dedicated Server Allocation for Service Oriented Multi-Agent Data Intensive Architecture in Biomedical and Geospatial Cloud." International Journal of Cloud Applications and Computing 4, no. 1 (January 2014): 50–62. http://dx.doi.org/10.4018/ijcac.2014010105.

Full text
Abstract:
Cloud computing has recently received considerable attention, as a promising approach for delivering Information and Communication Technologies (ICT) services as a utility. In the process of providing these services it is necessary to improve the utilization of data centre resources which are operating in most dynamic workload environments. Datacenters are integral parts of cloud computing. In the datacenter generally hundreds and thousands of virtual servers run at any instance of time, hosting many tasks and at the same time the cloud system keeps receiving the batches of task requests. It provides services and computing through the networks. Service Oriented Architecture (SOA) and agent frameworks renders tools for developing distributed and multi agent systems which can be used for the administration of cloud computing environments which supports the above characteristics. This paper presents a SOQM (Service Oriented QoS Assured and Multi Agent Cloud Computing) architecture which supports QoS assured cloud service provision and request. Biomedical and geospatial data on cloud can be analyzed through SOQM and has allowed the efficient management of the allocation of resources to the different system agents. It has proposed a finite heterogeneous multiple vm model which are dynamically allocated depending on the request from biomedical and geospatial stakeholders.
APA, Harvard, Vancouver, ISO, and other styles
24

Donepudi, Praveen Kumar. "Leveraging Cloud Computing and High Performance Computing (HPC) Advances for Next Generation Projects and Technologies." American Journal of Trade and Policy 7, no. 3 (December 1, 2020): 73–78. http://dx.doi.org/10.18034/ajtp.v7i3.499.

Full text
Abstract:
The scene of cloud computing has essentially changed throughout the most recent decade. Not just have more providers and administration contributions have barged in the space, yet additionally, cloud foundation that was generally restricted to single providers data centers is currently advancing. In this paper, we initially talk about the changing cloud foundation and consider the utilization of framework from numerous providers and the advantage of decentralizing computing ceaselessly from data centers. These patterns have brought about the requirement for a variety of new computing architectures that will be offered by future cloud framework. These models are predicted to affect certain areas, for example, connecting individuals and devices, data-intensive computing, the service space, and self-learning frameworks. At long last, we spread out a guide of difficulties that should be tended to for understanding the capability of cutting edge cloud frameworks. Architectural and metropolitan design ventures are continually breaking barriers of scale and unpredictability and consistently look for improved proficiency, maintainability, building energy performance, and cost-efficiency. Simulation and largescale information processing are presently the basic components of this cycle. Ongoing advances in calculations and computational force offer a way to address the complicated elements of a coordinated entire structure framework. Nonetheless, adaptability is a critical boundary to the acknowledgment of entire structure frameworks devices for configuration, control, and improvement. This position paper presents a bunch of strategies, for example, quick plan boundary space exploration, large-scope high accuracy simulation, and integrated multi-disciplinary improvement for semi-or completely automated projects. These procedures are very computing escalated, and have customarily just been accessible to the examination network. Be that as it may, once empowered by advances in cloud computing and high-performance computing, these procedures can encourage the intelligent plan measure bringing about improved results and decreased advancement process durations.
APA, Harvard, Vancouver, ISO, and other styles
25

P, Dayaker, Chandrasekhara Reddy T, Honey Diana P, and A. Mallikarjun Reddy. "Recent Trends in Security and Privacy of Sensitive Data in Cloud Computing." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 241. http://dx.doi.org/10.14419/ijet.v7i4.6.20484.

Full text
Abstract:
Cloud Computing (CC) is reforming many biological communities by furnishing associations with registering assets including simple organization, network, design, Romanization, and adaptability. This change in perspective raises an expansive scope of security and protection issues that must be thought about. Multi-tenure, loss of control, and trust are entering challenges in cloud processing conditions. This paper surveys the current advancements and a wide show of both earlier and frontier extends on cloud security and protection. We classify the current look into as per the cloud reference engineering coordination, asset control, physical asset, and cloud benefit administration layers, in spite of inspecting the current improvements in security safeguarding touchy information approaches in CC, such as, security risk demonstrating and protection upgrading conventions and arrangements.
APA, Harvard, Vancouver, ISO, and other styles
26

Marchisotti, Gustavo Guimarães, Luiz Antonio Joia, and Rodrigo Baroni de Carvalho. "A REPRESENTAÇÃO SOCIAL DE CLOUD COMPUTING PELA PERCEPÇÃO DOS PROFISSIONAIS BRASILEIROS DE TECNOLOGIA DA INFORMAÇÃO." Revista de Administração de Empresas 59, no. 1 (February 2019): 16–28. http://dx.doi.org/10.1590/s0034-759020190103.

Full text
Abstract:
RESUMO Este estudo busca identificar a representação social sobre Cloud Computing, pela percepção dos profissionais brasileiros de Tecnologia da Informação (TI). Os dados empíricos foram coletados por meio de questionários on-line respondidos por uma amostra por acessibilidade de 221 profissionais de TI e analisados por meio da Teoria da Representação Social (TRS), operacionalizada pelas técnicas de evocação livres de palavras e do quadro de quatro casas de Vergès, bem como pelas análises implicativa, léxica e de conteúdo. Como resultado, identificou-se que o núcleo central da representação social associada ao Cloud Computing é composto pelas palavras: nuvem, armazenamento, disponibilidade, internet, virtualização e segurança. Assim, conclui-se que os profissionais de TI no Brasil têm uma visão mais operacional do que estratégica do Cloud Computing. Essa visão funcional, congruente com parte da literatura científica sobre o tema, fundamenta-se basicamente em aspectos relacionados à segurança, armazenamento e disponibilidade dos dados armazenados no Cloud Computing, faltando uma percepção do valor estratégico do Cloud Computing, baseada na viabilização de novos modelos de negócio. Finalmente, este artigo traz uma contribuição metodológica original ao usar a TRS - por meio da aplicação conjunta das análises implicativa, léxica e de conteúdo - na definição de um constructo específico.
APA, Harvard, Vancouver, ISO, and other styles
27

A., Selvakumar, and Gunasekaran G. "A Novel Approach of Load Balancing and Task Scheduling Using Ant Colony Optimization Algorithm." International Journal of Software Innovation 7, no. 2 (April 2019): 9–20. http://dx.doi.org/10.4018/ijsi.2019040102.

Full text
Abstract:
Cloud computing is a model for conveying data innovation benefits in which assets are recovered from the web through online devices and applications, instead of an immediate association with a server. Clients can set up and boot the required assets and they need to pay just for the required assets. Subsequently, later on giving a component to a productive asset administration and the task will be a vital target of Cloud computing. Load balancing is one of the major concerns in cloud computing, and the main purpose of it is to satisfy the requirements of users by distributing the load evenly among all servers in the cloud to maximize the utilization of resources, to increase throughput, provide good response time and to reduce energy consumption. To optimize resource allocation and ensure the quality of service, this article proposes a novel approach for load-balancing based on the enhanced ant colony optimization.
APA, Harvard, Vancouver, ISO, and other styles
28

Kumar K, Antony, Neeba E A, Durai S, and Ravikumar . "Secured cryptographic data model for cloud." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 128. http://dx.doi.org/10.14419/ijet.v7i1.7.10632.

Full text
Abstract:
Cloud computing turns into the cutting edge engineering of IT Enterprise. Cloud essential key thought is to move the whole information models into the server farms where the portability and administration of information isn't completely reliable. The principle challenge in the cloud is the client information and framework application information is gotten to from the cloud supplier's premises; even security arrangements sent in the premises don't take care of the demand of the clients where the need differs. The on-request security arrangement is alluring, yet now days all the cloud suppliers are utilizing encryption systems to exchange the information and information ask for and reaction. Consequently in this proposition, another security show is proposed for the cloud model to give security highlights. The new thought is to apply elliptic curve cryptography to give the security highlights to on request information handling. This proposition explores the essential issue of cloud computing information security. At last the security demonstrate is conveyed in the cloud OS "open stack" and "cloud stack".
APA, Harvard, Vancouver, ISO, and other styles
29

L.Swathi, K., P. Divya, A. Amruthavarshini, and Dr B.VijayaBabu. "Implementation of Identity Management Using Open ID Protocol." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 104. http://dx.doi.org/10.14419/ijet.v7i2.32.13538.

Full text
Abstract:
Identity Management has turned into an imperative theme in the distributed computing conditions, where cloud suppliers need to control usernames, passwords and other data used to recognize, validate and approve clients for some, unique facilitated applications. Every one of the vulnerabilities seen on non-cloud arrangements are presently found in the cloud, yet different issues are presented. One would be the capacity to oversee characters of clients when sending information to the cloud .Second would be the identity administration of clients accepting information from the cloud. Furthermore, third would be administration of user id’s when information is moved from cloud to cloud. Open ID is an open standard and decentralized confirmation protocol. Promoted by the non-benefit Open ID Foundation, it enables clients to be verified by co-working locales (known as Relying Parties or RP) utilizing an outsider administration, taking out the requirement for website admin to give their own particular specially appointed login frameworks, and enabling clients to sign into numerous inconsequential sites without having a different personality and secret key for each.
APA, Harvard, Vancouver, ISO, and other styles
30

Tamrakar, Dr Ashish Kumar, Dr Abhishek Verma, Dr Vishnu Kumar Mishra, and Dr Megha Mishra. "Time and Cost Based Cloud Resource Optimization System." Journal of University of Shanghai for Science and Technology 23, no. 09 (September 24, 2021): 1167–77. http://dx.doi.org/10.51201/jusst/21/09656.

Full text
Abstract:
Cloud computing is an emerging technology through which resources can be shared over the internet with different users either free or on a rent basis. Resource scheduling in cloud computing is a challenging area for researchers as is maximum utilization can opt through efficient resource scheduling algorithm. Other than this, virtual machine provisioning, packaging, and availability guarantee decrease the performance. Resource management in cloud could be a time and cost effective activity if it is managed property. These resources are accessible and computable which is totally dependent upon the management techniques applied in cloud.In a cloud setting, heterogeneous, vulnerability, and scattering of resources creates many issues of distribution among the workloads which need to be compute. Specialists still face inconveniences to pick the prudent, material and expend less time to execution of resource portion to the cloud. This investigation delineates an expansive composed writing examination of asset administration inside the space of cloud typically and cloud asset administration based on SLA with multi-objective functions like cost and time. In this paper, an autonomic cloud resource management technique is proposed to resolve identified issues by adopting the self-characteristics mechanism and improved Antlion optimization algorithm and tested in cloudsim toolkit and Aws Ec2 environment. The implementation results of proposed work are the evidence that it is better performing as compared with the existing frameworks, however, the performance evaluation method depends upon the different cloud environment and it may vary.
APA, Harvard, Vancouver, ISO, and other styles
31

El-Sofany, Hosam F., and Samir Abou El-Seoud. "Performance Analysis of an Effective Approach to Protect Cloud Systems against Application Layer Based Attacks." International Journal of Online and Biomedical Engineering (iJOE) 15, no. 03 (February 14, 2019): 82. http://dx.doi.org/10.3991/ijoe.v15i03.9931.

Full text
Abstract:
Cloud computing is a new paradigm for hosting hardware and software resources and provides a web-based services to organizations and consumers. It also provides an easy to use and on-demand access to cloud based computing resources that can be published by easy, minimal administration and with a great efficiency. Services of cloud computing are accessing and sharing through internet connection thus it is open for attacker to attack on its security. Application layer based attacks is one of Distributed Denial of Service attacks (DDoS) that can cause a big problem in cloud security. The main objective of DDoS attacks is to infect computer resources (e.g., software applications, network, CPU, etc.) and make them not working properly for the authorized users. In DDoS, the attacker tries to overload the web-based service with traffic. HTTP and XML-based DDoS attacks are founded under the application layer based category of DoS attacks. This category of attack is focused on particular web applications. The main objective of this research paper is to introduce an effective approach to protect cloud-based systems against application layer based attacks. Complexity analysis, effectiveness and performance evaluations of the presented approach are presented. The feedbacks of the experimental results were highly promising, for protecting cloud computing systems against both DoS and DDoS attacks. Correlation analysis model is also used to validate the efficiency of the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
32

Suriansyah, Mohamad Iqbal, Iyan Mulyana, Junaidy Budi Sanger, and Sandi Winata. "Compute functional analysis leveraging the IAAS private cloud computing service model in packstack development." ILKOM Jurnal Ilmiah 13, no. 1 (April 30, 2021): 9–17. http://dx.doi.org/10.33096/ilkom.v13i1.693.9-17.

Full text
Abstract:
Analyzing compute functions by utilizing the IAAS model for private cloud computing services in packstack development is one of the large-scale data storage solutions. Problems that often occur when implementing various applications are the increased need for server resources, the monitoring process, performance efficiency, time constraints in building servers and upgrading hardware. These problems have an impact on long server downtime. The development of private cloud computing technology could become a solution to the problem. This research employed Openstack and Packstack by applying one server controller node and two servers compute nodes. Server administration with IAAS and self-service approaches made scalability testing simpler and time-efficient. The resizing of the virtual server (instance) that has been carried out in a running condition shows that the measurement of the overhead value in private cloud computing is more optimal with a downtime of 16 seconds.
APA, Harvard, Vancouver, ISO, and other styles
33

Naveen Kumar, S., and K. Nirmala. "Cloud security: to prevent unauthorized access using an efficient key management authentication algorithm." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 607. http://dx.doi.org/10.14419/ijet.v7i1.1.10787.

Full text
Abstract:
Presently a-days Cloud registering is rising field in light of its Performance, high accessibility, easily. Information store is principle future that cloud benefit gives to the huge association to store tremendous measure of information. Yet at the same time numerous associations are not prepared to execute distributed computing innovation since absence of security. So the principle goal of this paper is to understand the security issues and to anticipate unapproved access in distributed storage, it should be possible with the assistance of an effective validation strategy by utilizing cross breed verification calculation to give security of the information in cloud and guarantee amending code to keep up the nature of administration. In any case, solid client confirmation that confines illicit access to the administration giving servers is the foremost prerequisite for securing cloud condition
APA, Harvard, Vancouver, ISO, and other styles
34

Rajkumar, N., and E. Kannan. "Attribute-Based Collusion Resistance in Group-Based Cloud Data Sharing using LKH Model." Journal of Circuits, Systems and Computers 29, no. 02 (May 9, 2019): 2030001. http://dx.doi.org/10.1142/s0218126620300019.

Full text
Abstract:
Utilizing cloud computing, users can avail a compelling and effective approach for information sharing between collective individuals in the cloud with the facility of less administration cost and little maintenance. Security in cloud computing refers to procedures, standards and processes created to provide assurance for security of information in the cloud environment. In this paper, we project a secure data sharing method in cloud for dynamic members by producing keys for users using Logic Key Hierarchy (LKH) model, i.e., a tree-based key generation technique. We have generated this key using reverse hashing and one way hash-based technique so that no exiled user can predict the new key and new users cannot predict the old keys of the network group. From numerous experiments, this work is proved to be the best in maintaining forward secrecy, backward secrecy and group compromise attacks and consumes less computation cost compared to any other hash-based key generation techniques.
APA, Harvard, Vancouver, ISO, and other styles
35

Honni, Honni. "Pengembangan Model Aplikasi Administrasi Pelayanan Kesehatan di Puskemas dengan Cloud Computing Berbasiskan Open Source." ComTech: Computer, Mathematics and Engineering Applications 4, no. 2 (December 1, 2013): 1026. http://dx.doi.org/10.21512/comtech.v4i2.2544.

Full text
Abstract:
Puskemas as community health centers becomes one of the main focuses of development on the agenda of the Government of Indonesia beside education. Therefore, we purpose to develop an affordable online system of health care administration based on open source using cloud computing approach. It can be used for collecting data of patients, diseases, and treatment of patients at Puskesmas. The methods used are literature study related to cloud computing, survey design and data collection infrastructure of information technology thatcan be applied to online health services, analysis of survey data on actual conditions in some centers and other health care centers in Jakarta, then making model of online health services such as physician consulting, prescribing and disease diagnosis. The result is a web-based application system of health care administration of Puskesmas, which utilizes cloud computing technology and development architectures that are both modular and dynamic. The application model combines the benefits of open-source applications with a flexible design system. It also supports mobile devices to improve the quality of patient care. Web-based network structure allows both online and inter-section between institutions which can be accessed anytime, anywhere, through mobile devices.Development application model is also adapted to the function of the business processes and administrative processes that exist in Puskesmas throughout Indonesia. Each model is also expected to be integrated to optimize efficiency and has been adapted to the service system of Dinas Kesehatan and Health Ministery.
APA, Harvard, Vancouver, ISO, and other styles
36

Sangeetha, Mrs, and R. Arun. "An Improved Energy-Efficient Hybrid Framework Eehf – Algorithm for Green Cloud Computing." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 1, 2021): 180–85. http://dx.doi.org/10.51201/jusst/21/05206.

Full text
Abstract:
This paper deals with the relocation of multi-target Virtual Machines (VMs) in a cloud server farm. The proposed VM movement technique at the cloud server farm meanders VMs from underutilized to full capacity Physical Machines (PMs) to energy-efficient Physical Machines (PMs). Furthermore, the multi-target VMs relocation technique not only reduces the forced use of PMs and switches but also confirms the essence of administration by preserving the SLA at the cloud server farm. A novel energy-efficient hybrid (EEHF) system for enhancing the proficiency of electrical energy usage in data centers is carried out and evaluated in this paper. Instead of focusing on only one approach as in previous related works, the proposed system is truly based on solicitation preparation and worker booking. Until managing the preparation, the EEH system sorts the errand clients’ requests according to their time and force requirements. It has a booking system that takes power use into account when making planning decisions. It also has a precise calculation that determines if under burdened employees should be rested or dozed in overburdened workers, virtual machines that should be floated, and workers that will receive moved virtual machines VMs. When compared to other strategies, our proposed VMs development strategy may find a great balance among three conflict goals. Furthermore, the shroud-based cloud sim test results show that our proposed multi-target VMs relocation strategy outperforms best-in-class VMs movement strategies like the Random VMs relocation system in terms of energy efficiency and SLA penetration at the cloud server farm.
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Chih-Yung, and Jih-Fu Tu. "An Implementation Model of Teaching Evaluation Questionnaire System Based on Cloud Computing." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/180528.

Full text
Abstract:
The teaching evaluation questionnaire in the university has been an essential routine. The administrative staff of academic affairs shall obey the rules, fairness, and valid principles within the period of finishing teaching evaluation questionnaire. To ensure the accuracy and timeliness of the large number of questionnaires, it makes the administrative staff of academic affairs face the challenge and pressure if the students are too many. Program potency low or bad often came from the development staff being familiar with bad program development idea; the bad designs of system program in itself causes the factor proportion to occupy more higher, because the similar application program mode of writing is, respectively, different. However, the exploiter may find the method of the little consumption of system resources to complete the similar work task. We develop the software service of cloud platform and the educational administration personnel operates process in the software service of cloud platform. The cloud platform reduces the system wait and calculation time of questionnaire, improves and simplifies system operation flow, and promotes 10 times of program efficiencies as well as solving the load overweight problem of potency bottleneck.
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Chi-Yuan, Han-Chieh Chao, Tin-Yu Wu, Chun-I. Fan, Jiann-Liang Chen, Yuh-Shyan Chen, and Jenq-Muh Hsu. "IoT-IMS Communication Platform for Future Internet." International Journal of Adaptive, Resilient and Autonomic Systems 2, no. 4 (October 2011): 74–94. http://dx.doi.org/10.4018/jaras.2011100105.

Full text
Abstract:
In recent years, Internet of Things (IoT) and Cloud Computing are the hottest issues of Future Internet. However, there is a lack of common fabric for integrating IoT and Cloud. In telecommunications, the IMS (IP Multimedia Subsystem), based on the All-IP and Open Services Architecture, has been regarded as the trend for Next Generation Network (NGN). The IMS communication platform is the most suitable fabric for integrating IoT and Cloud. This paper focuses on different aspects including Cloud Service Framework, Data Sensing and Communication Technology, Collaborative Authentication and Privacy Protection Mechanism, Operation, Administration, and Maintenance (OA&M), Mobility and Energy-Saving Management, and Application Services. This paper not only provides the discussion of open challenges, but also proposes a possible solution based on the above-mentioned aspects for Future Internet.
APA, Harvard, Vancouver, ISO, and other styles
39

Wilianto, Wilianto, and Iskandar Fitri. "Information Technology Service Management with Cloud Computing Approach to Improve Administration System And Online Learning Performance." CommIT (Communication and Information Technology) Journal 9, no. 2 (October 1, 2015): 51. http://dx.doi.org/10.21512/commit.v9i2.893.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kadu, Mr N. B. "Availability-Aware Multi-Objective Cluster Allocation Optimization in Energy-Efficient Datacenters." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 3498–507. http://dx.doi.org/10.22214/ijraset.2021.35944.

Full text
Abstract:
With increasing network virtualization, data centre's workloads are modified in depth to serve various service-oriented applications, often defined by a time-bound service response, which, in turn, places a heavy demand on data center networks. Network virtualization in computing is the technique of integrating network resources and network functions in hardware and software into one virtual network, the software-based administration entity. Number of people ask for the server simultaneously, thereby slowing down the service.It is so costly to buy a new server that we developed a virtual system by creating a virtual system. With a trend to increase the number of cloud apps in the datacenter. There are numerous physical machines (PMs) linked via switches in the datacenter. Hardware PM resources for adaptable and elastic computing capabilities are usually shared via virtualization technology. Usually a cloud application is implemented in a virtual cluster that includes many virtual machines which occupy PM resources on request.
APA, Harvard, Vancouver, ISO, and other styles
41

Muharlisiani, Lusy Tunik, Henny Sukrisno, Emmy Wahyuningtyas, Shofiya Syidada, and Dina Chamidah. "Arrangement of Archives of Cloud Computing Based and Utilization of Microsoft Access." Proceeding of Community Development 1 (January 30, 2018): 198. http://dx.doi.org/10.30874/comdev.2017.26.

Full text
Abstract:
Service at the “Kelurahan” is a very important part in determining the success of development, especially in public service. The problem faced is the lack of skill level of the “Kelurahan” apparatus with the more dynamic demands of the community and the archive management system is still conventional and manual that is writing the identity of the archive into the book agenda, expedition, control card, and borrowed archive card, so it takes a more practical electronic system, effective and efficient so required to develop themselves in order to improve public services. Conventional administration and archive management must be transformed into cloud-based computing (digital), for which archiving managers should always be responsive and follow these developments and wherever possible in order to utilize for archival activities, with greater access expected archives are evidence at once able to talk about historical facts and events and be able to give meaning and benefit to human life, so archives that were only visible and readable at archival centers can now be accessed online, and even their services have led to automated service systems. Using Microsoft Access which its main function is to handle the process of data manipulation and manufacture of a system, this system is built so that the bias runs on Cloud which means Cloud itself is a paradigm in which information is permanently stored on servers on the internet and stored. The purpose of this program is the implementation of administrative management that has been based cloud computing (digital) and is expected to be a solution in managing the archive so that if it has been designed and programmed, it can be stored in the computer and benefi- cial to the “Kelurahan” apparatus and add in the field of management archives in the form of improving the quality of service to the community, can facilitate and scientific publications.
APA, Harvard, Vancouver, ISO, and other styles
42

Zhu, Chun-xiao. "Analysis on Tax Collection and Management of Digital Economy." E3S Web of Conferences 253 (2021): 03046. http://dx.doi.org/10.1051/e3sconf/202125303046.

Full text
Abstract:
Digital economy is a new form of economic and social development based on a new generation of information technology. The rapid development of cloud computing, Internet of Things, big data, 5G and other information technologies and infrastructure have promoted the rapid development of China's digital economy. Due to the digitization of goods and services and the intangibility of assets in the digital economy model, it has also brought opportunities and challenges to the traditional tax collection and management model. This paper introduces the current scale of China's digital economy and the impact of the digital economy on China's tax collection and administration, clarifies the opportunities and challenges facing China's current tax collection and administration model, and combines the case analysis of China's digital economy tax collection and administration to give corresponding countermeasures and suggestions.
APA, Harvard, Vancouver, ISO, and other styles
43

C., Padmanaban, Eklas, Holm-Nielsen, and Hemalatha. "Location-Based Optimized Service Selection for Data Management with Cloud Computing in Smart Grids." Energies 12, no. 23 (November 27, 2019): 4517. http://dx.doi.org/10.3390/en12234517.

Full text
Abstract:
: To maximize the utilization, reliability and availability of power resources, some distribution strategy has to be implemented, which is possible nowadays with the support of modern information technologies (IT). To further develop power utilization, the customer should be aware of efficient power utilization, and the problem of customer management has to be resolved, where payment of electric bills could be through online solutions. A customer-aware power regulatory model is proposed that provides awareness to the consumer regarding the usage of electrical energy, in a secure and reliable solution that combines the features of electrical engineering with cloud computing to ensure better performance in notifying issues, which is done based on location and enhances the operation of smart grids. Instant electric meters are equipped with remote gadgets which communicate with a central cloud administration to produce electric bills for the client. The model provides mindfulness by showing history/notifications and suggestions for energy utilization through the smart meters. The user is provided with security keys to view the reading values and pay bills. To make the solution more accessible, the electronic data will be maintained on various servers at different locations of the cloud. Subsequently, there will be a service provider who manages service requests. A hardwired electric meter transmits the electric readings, which in turn access the particular service to make an entry for the particular connection on the cloud. The usage data will also be maintained at different locations in the cloud, which are accessible to different levels of users with appropriate security measures. The user accessibility is controlled by a Third Party Auditor (TPA) that computes the trustworthiness of users using a trust management scheme. This article also proposes a hash function, which computes and verifies the signature of the keys submitted by the users and also has a higher completeness ratio, which reaches 0.93, than typical methods. This is noteworthy, and the investigation results prove the system’s proficiency in providing assured service.
APA, Harvard, Vancouver, ISO, and other styles
44

Rakhmatullaev, Marat. "Information Support of High Schools in Corporate Library Network." SOCIETY, INTEGRATION, EDUCATION. Proceedings of the International Scientific Conference 2 (July 24, 2015): 333. http://dx.doi.org/10.17770/sie2014vol2.653.

Full text
Abstract:
The paper includes information about some results of research on information library network of more than sixty Uzbekistan universities to provide them with scientific and educational information. It is being known there can be a great number of models of their realization and also their efficiency differs. Therefore, it is very important to find effective models of decision-making in information library network (ILN). At present time Cloud technologies have started to be developed actively both in corporate networks, and in global information environments. Use Cloud Computing in information-library networks can essentially raise efficiency as of user service, and of network administration. The experiments done in corporate network of academic libraries of Uzbekistan using ARMAT system have shown advantages of its applications.
APA, Harvard, Vancouver, ISO, and other styles
45

Scale, Mark-Shane E. "Assessing the Impact of Cloud Computing and Web Collaboration on the Work of Distance Library Services." Journal of Library Administration 50, no. 7-8 (September 27, 2010): 933–50. http://dx.doi.org/10.1080/01930826.2010.488995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Adhab, Ayad Hasan, Emir Kalik, and Ahmed K. Al Ani. "Design Smart E-Government Application by Proposed A Hybrid Architecture Model Depend on Edge and Cloud Computing." Electronic Government, an International Journal 1, no. 1 (2022): 1. http://dx.doi.org/10.1504/eg.2022.10040285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Zhao, Bo Wen. "Monitoring Technological Analysis of Communication Network Platform." Applied Mechanics and Materials 687-691 (November 2014): 2630–34. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2630.

Full text
Abstract:
Node virtual network platform is designed and realized in allusion to node administration application scenarios in cloud computing, and distributed database and virtual network model with dynamic network features are put forward; nodes build node network through self-discovery packet and provide ability of addressing capability through built-in database engine. In the environment of super-large scale, node degree influences the whole virtual network platform. Through test, this platform can meet the needs of dynamic condition of application node brought by the explosive application request.
APA, Harvard, Vancouver, ISO, and other styles
48

Sayginer, Can, and Tuncay Ercan. "UNDERSTANDING DETERMINANTS OF CLOUD COMPUTING ADOPTION USING AN INTEGRATED DIFFUSION OF INNOVATION (DOI)-TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL (TOE) MODEL." Humanities & Social Sciences Reviews 8, no. 1 (January 16, 2020): 91–102. http://dx.doi.org/10.18510/hssr.2020.8115.

Full text
Abstract:
Purpose of the study: This study aims to investigate the internal and external factors for CC adoption decisions of companies in Izmir, Turkey using a combination of DOI and TOE models. Methodology: This is a confirmatory survey of businesses, forming a questionnaire for 176 IT decision-makers of non-cloud or cloud user businesses in the city of Izmir in Turkey. SmartPLS 3.0 software is used to assess the determinants affecting cloud computing adoption. Main Findings: The study identified relative advantage, compatibility, complexity, and top management support, using security and privacy concerns and cost savings as mediating variables of relative advantage for CC adoption. The survey results indicated that complexity and top management supports are significantly important for efficient CC adoption. The model explained 41.2 percent of CC adoption. Applications of this study: The study is believed to be useful in fields including business development for most sectors, computing, cloud providers as well as researchers on business administration, sales, marketing, and IT infrastructure. Particularly this study and the suggested framework will help companies and businesses adopt CC appropriately. Moreover, as suggested in the study, governments can use such frameworks when encouraging cloud providers to support companies in their decision making and transition periods for CC adoption. Novelty/Originality of this study: This study will undoubtedly contribute to the decision making processes of the companies for CC adoption. Through the integrated in-depth analysis of the factors that affect the adoption decisions in an industrial region of Turkey, the study will also provide valuable data for the researchers and businesses within similar company personas.
APA, Harvard, Vancouver, ISO, and other styles
49

Andreetto, Paolo, Fabrizio Chiarello, and Sergio Traldi. "CAOS: a tool for OpenStack accounting management." EPJ Web of Conferences 214 (2019): 07006. http://dx.doi.org/10.1051/epjconf/201921407006.

Full text
Abstract:
The analysis and understanding of resources utilization in shared infrastructures, such as cloud environments, is crucial in order to provide better performance, administration and capacity planning. The management of resource usage of the OpenStack-based cloud infrastructures hosted at INFN-Padova, the Cloud Area Padovana and the INFN-PADOVA-STACK instance of the EGI Federated cloud, started with the deployment of Ceilometer, the OpenStack component responsible for collecting and managing accounting information. However, by using Ceilometer alone we found some limiting problems related to the way it handles information: among others, the imbalance between storage and data retention requirements, and the complexity in computing custom metrics. In this contribution we present a tool, called CAOS, which we have been implementing to overcome the aforementioned issues. CAOS collects, manages and presents the data concerning resource usage of our OpenStack-based cloud infrastructures. By gathering data from both the Ceilometer service and Open-Stack API, CAOS enables us to track resource usage at different levels (e.g. per project), in such a way that both current and past consumption ofresources can be easily determined, stored and presented.
APA, Harvard, Vancouver, ISO, and other styles
50

Segall, Richard S., and Gao Niu. "Big Data and Its Visualization With Fog Computing." International Journal of Fog Computing 1, no. 2 (July 2018): 51–82. http://dx.doi.org/10.4018/ijfc.2018070102.

Full text
Abstract:
Big Data is data sets that are so voluminous and complex that traditional data processing application software are inadequate to deal with them. This article discusses what is Big Data, and its characteristics, and how this information revolution of Big Data is transforming our lives and the new technology and methodologies that have been developed to process data of these huge dimensionalities. Big Data can be discrete or a continuous stream of data, and can be accessed using many types and kinds of computing devices ranging from supercomputers, personal work stations, to mobile devices and tablets. Discussion is presented of how fog computing can be performed with cloud computing as a mechanism for visualization of Big Data. An example of visualization techniques for Big Data transmitted by devices connected by Internet of Things (IoT) is presented for real data from fatality analysis reporting system (FARS) managed by the National Highway Traffic Safety Administration (NHTSA) of the United States Department of Transportation (USDoT). Big Data web-based visualization software are discussed that are both JavaScript-based and user interface-based. Challenges and opportunities of using Big Data with fog computing are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography