Download as pdf or txt
Download as pdf or txt
You are on page 1of 89

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/338411743

Cloud Computing

Presentation · January 2020


DOI: 10.13140/RG.2.2.19285.17120

CITATIONS READS
0 2,694

1 author:

Amer Elameer
UNIVERSITY OF INFORMATION TECHNOLOGY & COMMUNICATIONS
99 PUBLICATIONS   44 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Feature Extraction Techniques on Facial Images: An Overview View project

Journal of Baghdad College for Economic Science (JBCEC) View project

All content following this page was uploaded by Amer Elameer on 06 January 2020.

The user has requested enhancement of the downloaded file.


Brief Contents Introduction

Abstract Cloud Computing has spread like a


Introduction marketing virus. But what is cloud
Options for Cloud Deployments computing? How does it work? How
Cloud Service Models can it help IT professionals and
businesses of all sizes? This paper
Virtualization
deals with the Fundamentals of Cloud
Types of virtualization
Computing, Virtualization, and Mobile
Mobile Cloud Computing (MCC)
Cloud Computing.
Advantageous of MCC
MCC Applications
What Is Cloud Computing?
MCC Issues v
CLOUD meaning:
Companies that own the cloud Computing
Common Location –independent
Many Flavors of Cloud Computing Online Utility on Demand
References Common: implies multi-tenancy not
Abstract single
or isolated tenancy
Cloud computing has come of age since Amazon's rollout of the Utility: implies pay-for-use.
first of its kind of cloud services in 2006. As a research theme, On Demand: implies infinite,
cloud computing now easily tops any list of topics in computer immediate, invisible scalability.
science because of its far-reaching implications in many areas Cloud Computing Is a general term
in computing, especially big data which without cloud computing used to describe a new class of
is at best a concept. network based computing that takes
place over the Internet, the storing of
data & application on remote servers
& accessing them via the internet
rather then saving or installing them on your personal or office NOTE: Organization can better
computer, a model for allowing convenient, on demand access control security & data, Ensure
from anywhere, to a shared pool of computing resources . compliance with regulations.
The scanning Cloud Server include:
1. Storage 3. Hybrid Cloud: is a cloud computing
2. Networking environment that uses a mix of on-
3. Applications premises, private cloud and third-party,
4. Services public cloud services with
orchestration between the two
platforms.
Options For Cloud Deployments:
1. Public Cloud: is one based on the standard cloud
computing model, in which a service provider makes
resources, such as virtual machines (VMs), app lications NOTE: Enterprise are able to develop
v
or storage, available to the general public over the a flexible & agile infrastructure to
internet. Public cloud services may be free or offered on meet the needs of the business, while
a pay-per-usage model. reducing costs.

Cloud Service Models:

2. Private Cloud: refers to a model of cloud computing


where IT services are provisioned over private IT
infrastructure for the dedicated use of a single
organization. A private cloud is usually managed via
internal resources. The terms private cloud and
virtual private cloud (VPC) are often used interchangeably.
1. IaaS (Infrastructure-as-a-Service) is a form of cloud and the application required to access
computing that provides virtualized computing resources the cloud computing system.
over the internet. Quickly & easily provision full Virtualization:
computing resources, including processing, storage & Virtualization is the ability to run
networks, no infrastructure management or control for multiple operating systems on a single
example (SUSE Open Stack Cloud). physical system and share the
underlying hardware resources. It is
2. PaaS (Platform-as-a-Service) the process by which one computer
access to a software development environment to allow hosts the appearance of many
them to create their own cloud application. Access to a computers.
software development environment to allow them to Virtualization is used to improve IT
create their own cloud application, control over the throughput and costs by using physical
application, some control over configuration settings for resources as a pool from which virtual
the application hosting environment, no infrastructure
v resources can be allocated.
control in example (Cloud Foundry).

Virtualization Architecture:
3. SaaS (Software-as-a-Service) is a software distribution
• A Virtual machine (VM) is an isolated
model in which a third-party provider hosts applications
runtime environment (guest OS and
and makes them available to customers over the Internet.
applications)
alongside infrastructure as a service (IaaS) and platform
• Multiple virtual systems (VMs) can
as a service (PaaS). Access to the application, litter or no
run on a single physical system.
control over the delivery for example (Gmail or
Salesforce.com).
Front end vs. back end:
The front end is the side the computer user, or client.
The back end is the cloud section of the system. The front Types of virtualization:
end includes the client's computer (or computer network)
• Hardware/Server Virtualization.
• Network Virtualization.
• Storage Virtualization. - Security and privacy
• Memory Virtualization. - Bandwidth costs
• Software Virtualization.
• Data Virtualization.
• Desktop virtualization.
Types of virtualization in cloud computing:
In cloud computing the virtualization can be done in two
ways either by storage virtualization or by software
virtualization. Key requirements for MCC:
1. Storage virtualization: The storage available is - Simple APIs Offering transparent
virtualized to get large virtual storage access and it is access to mobile services, and
further used for allocating memory to the cloud clients. requiring no specific knowledge of
2. Software virtualization: software built by the company underlying network technologies.
v
can be used by a large number of systems at the same - Web interface
time with the help of virtualization. - Internet access to remotely stored
application in the cloud.

Mobile Cloud Computing:


Features and challenge of cloud computing Features: Advantageous of MCC:
- Virtualization
- Reliability, usability and extensibility 1. Extending battery lifetime:
- Large scale - Battery is one of the main concerns for
mobile devices
Challenges:
- How to reduce power consumption
- Performance
- How to enhance the CPU performance
2. Improving data storage capacity and processing power: MCC Applications:
- MCC enables mobile users to store/access large data on the - Mobile Commerce
cloud.
- MCC helps reduce the running cost for computation intensive
applications.
- Mobile applications are not constrained by storage capacity on the
- Mobile Learning
devices because their data now is stored on the cloud.
3. Improving reliability & availability:
Keeping data and application in the clouds reduces the chance of
lost on the mobile devices.
- Mobile Healthcare
MCC can be designed as a comprehensive data security model for
both service providers and users:
- Protect copyrighted digital contents in clouds.
- Provide security services such as virus scanning, malicious code
detection authentication for mobile.
v
4. Dynamic provisioning - Mobile Gaming
- Dynamic on-demand provisioning of resources on a fine-grained,
self-service basis.
- No need for advanced reservation
5. Scalability MMC Issues:
- Mobile applications can be performed and scaled to meet the 1. Computing offload
unpredictable user demands. 2. Security
- Service providers can easily add and expand a service 3. Availability
6. Multi-tenancy 4. Enhancing the efficiency of data
Service providers can share the resources and costs to support a access
variety of applications and large no. of users. 5. Context aware mobile cloud services
7. Ease of Integration
Multiple services from different providers can be integrated easily
through the cloud and the Internet to meet the users’ demands.
Companies that own the cloud: Our Product:

1. IBM Company: - Sales Cloud: Sell


A full stack cloud platform that spans public, private and hybrid smarter and faster with
the world.
environments. Build with a robust suite of advanced data and AI tools
and draw on deep industry expertise to help you on your journey to the - Service Cloud: Support every
cloud. customer. Anytime. Anywhere.

IBM Smart Cloud: - Marketing Cloud:


- Commerce Cloud: Digital commerce,
Cloud computing changes the way we think a bout technology. Cloud
point of sale, and order management.
is a computing model providing web-based softwar e, mid dleware
- Quip: Create, edit, discuss, and
and computing resources on demand. Ar c hitectur e for Private organize your team’s work, all in one
& Hybrid Cloud (IBM Smart Cloud Foundation). place.
Cloud Computing as Se rvice for IT (IBM Smart Cloud Se rvices). - Salesforce Platform: Build apps fast.
Build business faster.
Software as a service (SaaS) business solutions (IBM Smart
Clo ud So lutions). Website: https://www.salesforce.com/
v

IBM is the Cloud for Business: 3. Microsoft Company

Windows Azure is an open and flexibl e


cloud platform that enables you to
quickly build, deploy and manage
app lications across a global network
of Microsoft managed dat ace nters.
You can build ap plications using any
language, tool or framework. And you
can integrate your public cloud
Website: https://www.ibm.com/cloud/ applications with yo ur existing IT
eenvir onm ent.
2. Salesforce Company: Key Features:
- Always up, Always on
Salesforce is India's world class cloud technology company that
- Open
builds your business faster, more securely, with greater
- Unlimited servers, unlimited storage
reliability and constant upgradeability. - Powerful Capabilitie s
- Security first
- Stay connected from anywhere
- Work better together
- Get stuff done faster
- Invisible IT that just works
- Go Green
Website: https://cloud.google.com/

5. Amazon Company
Windows Azure Feature:
Amazon Elastic Compute Cloud (Amazon
- Move Faster
EC2) is a web service that provides
- Save Money resizable compute capacity in the cloud.
It is designed to make web-scale
- Hybrid Consistency
computing easier for developers.
Amazon EC2's simple web service
interface allows you to obtain and
v
configure capacity with minimal
friction. It provides you with complete
control of your computing resources
and lets you run on Amazon's proven
computing environment. Amazon EC2
reduces the time required to obtain and
Website: https://azure.microsoft.com/ boot new server instances to minutes,
allowing you to quickly scale capacity,
4. Google Company:
both up and down, as your computing
Google Cloud ConnectforMicrosoft Office brings requirements change. Amazon EC2
changes the economics of computing b y
collaborative multi-person editingtothe familiar
allowing you to pay only for capacity
Microsoft Office experience. You can share, backup and that you actually use. Amazon EC2
s imultaneous ly editMicrosoft Word,PowerPoint,and Excel provides developers the tools to build
failure resilient applications and
documents with coworkers.
isolate themselves from common
Google Apps Key feature s are: failure scenarios.
Website: https://aws.amazon.com/ec2/
6. Rackspace Company: 2. Naas (Network as a Service):
Is a business model for delivering
enterprise-wide area network services
The cloud can quickly scale to thousands of servers to
make resources available asthey're needed. Rackspace virtually on a subscription basis. Small or
Cloud hosting customers never need to worry abo ut midsize businesses are the
buying new hardware to meet increasing traff ic classic NaaS buyers, especially those with
dema nds or huge traffic spikes. no existing investment in a WAN.

Rackspace Cloud offers four hosting products:


- Cloud Servers TM for on-demand computing Power
- Cloud Sites™ for robustw e b host ing 3. IPMaas (Identity & Policy Management
- Cloud Load Balancersfo r easy, on- de ma ndload balancing and high as a service):
availability
Provider manages identity and/or access
- Cloud Files™ for elast ic on linefile sto ra ge a nd CON.
control policy for customer

Website: https://www.rackspace.com/
v

Many Flavors of Cloud Computing References

1. https://www.cse.unr.edu/~mgunes/cp
e401/cpe401sp12/lect15_cloud.ppt
2. https://www.slideshare.net/Agarwalja
y/cloud-computing-simple-ppt-
41561620

3. https://www.slideshare.net/AkhilRaj16
/virtualization-cloud-computing-
47824409

1. Daas (Data as a Service): 4. https://www.slideshare.net/noumanashr


A service provider that enables data access on demand to users afawan/mobile-cloud-computing-
regardless of their geographic location. Also are similar to SaaS in 55534661?qid=26fd4c17-e008-4396-
that the information is stored in the cloud and is accessible by a wide a10a-efaa301f1fe0&v=&b=&from_search=4
range of systems and devices.
Abstract in those methods that are attributed to human
intelligence, it is a science first looking at the
With the development and development of the science of technology, definition of human intelligence and
the need for the development of Internet systems and their ease of use by
dimensions, and then simulate some of its
everyone, anywhere, anytime, without cost is a necessary need to invest
time, reduce cost and speed work. Therefore, in order to obtain more properties. Here it must be clarified that this
security services and development in the use of the principle of computing science is not intended to compare the human
artificial intelligence has been employed in this field, which is a quantum mind created by God and his ability and
leap in the advancement of the principle of computing where AI is a magnificence with the machine that is made by
behavior that makes software simulates human mental abilities and work
patterns. Years, but it is under investigation and theoretically where the creature, but this new science aims at
artificial intelligence allows computers to perform many tasks performed understanding the complex mental processes
by humans so that they can correct mistakes It includes many things such of the human mind in the practice of thinking
as machine learning and knowledge management as well as mobile and then translating these mental processes
applications to develop catboat and ocean sensors. In general, artificial into equivalent accounting processes that
intelligence can quickly contribute to a market for interactive applications,
according to a study by Forest Research. Worldwide will increase by increase the ability of the computer to solve
300% in 2017. Today, the application of intelligence has become practical complex problems. The artificial intelligence of
and effective. Cisco has announced its collaboration with COCEL in thev
use the computer can be defined as the ability to
of intelligent technologies to provide more services to users and more represent models of accounting (Models
ease Computer) for a field of life and identify the
To obtain them and greater efficiency in the completion of their work. The
staff at the call center will be supported by artificial intelligence basic relationships between elements, And
technologies where employees can respond to users' questions quickly. then develop reactions that are appropriate to
Adobe sensei is an application of artificial intelligence in the field of events and positions by representing an
computing where it helps to discover hidden opportunities and perform accounting model for a field of this area,
operations quickly and provide experiences related to each client. Adobe Artificial intelligence is therefore first linked
Sense helps you work better, smarter and faster as you understand Adobe
Sense The language of images and illustrations helps to deal with to its rhetoric with positions and the latest
repetitive and time-consuming tasks. It also looks at information in depth field of fields, And then retrieved and
and helps purify what it wants in seconds rather than hours. Adobe Sense developed, Second, the research handles are
is the framework for artificial intelligence and automatic learning to linked to the conclusion of useful conclusions,
extend Adobe Cloud Platform to help companies and organizations design It is clear that the difference
workflow and applications. Dedicated.
between the definitions of artificial
Introduction intelligence and the ability to develop the
model human capable and human above
Is a modern computer science that is looking for advanced methods mentioned is first invented and invented this
to program it to do work and conclusions similar even narrowly model, While the accounting model is a
representation of a model already developed in the human mind, Second, in the
types of conclusions that can be drawn from the model, man is capable of using
different types of mental processes such as innovation, invention and
reasoning, while accounting processes are limited to conclusions of common
axioms and rules programmed in the programs themselves on the other hand
Microsoft has defined cloud computing as "providing computing services
(servers, storage, databases, networks, software, analytics, and more) over
the Internet. Companies that provide these computing services are called cloud
providers and typically charge fees for cloud-based services, Such as the way
water or electricity bills are spent at home, while IBM has defined them as
Information you need to know when dealing
providing on-demand computing resources (all applications to data centers)
with clouds
over the Internet.
* What are my responsibilities, and what is
the responsibility of service providers?
Who is responsible for my data? Where is
Types of Clouds:
my data stored?
v
There are four forms of clouds :-
-This is probably the most important
1 – public cloud . questions you should ask yourself and your
2 – private cloud . cloud provider when looking for options.

3 – Community cloud . -It is important to understand this because


it may result in significant downtime or
4 – Hybrid cloud . loss of data.
Differ in terms of the different levels of security and management -For example, in infrastructure as a
required. service the actual data stored on the
Types of electronic cloud services virtual servers provided to you is at your
own risk, and when you are compromised
The cloud provides various services,the most famous :
you are responsible for restoring your
1 - Software As A Service (SaaS): Like Gamil backups.
2 - Platform as a Service (PaaS): Cloud Foundry -But in software as a service it is your
3 - Infrastructure as a Service (IaaS): such as SUSE OpenStack Cloud responsibility to keep your data usually
on the cloud provider, and to protect your data. Where is your important
data stored? Is the site secure? Is it a reliable data center? Those of us have not used Dropbox, Wool
Drive, Apple Cloud or other online storage
services.
These remote sites where we store our
data and pull them out whenever we like
and where we were and from any device we
had, Called cloud storage. The places
where we store our data are companies
that provide us with this service free of
charge (limited) or in return for money. As
we do, Enterprises and companies also use
these services. For enterprise use, cloud
storage is growing at a high rate, driven by
many workloads such as analytics, video,
and mobile applications.
v
References (2) While demand for storage is increasing,
_________________ most IT organizations are under constant
pressure to reduce the cost of information
Gartner, Predicts 2017: Cloud Computing Enters Its Second Decade, 2016
technology infrastructure through the use
Accenture. Oracle Cloud Performance Testing Results - Accenture. 2016 of shared cloud computing resources. He
[cited 2017 Aug 12]; Available from: also reiterated that it is important if
https://www.accenture.com/t20161013T060358Z__w__/us- software designers and hardware
engineers find a storage solution that
matches the requirements that fit their
Cloud Storage(3) workload. In many cases, many enterprises
wish to adopt a mixed cloud strategy that
uses a mix of localized storage and co-
storage.

What is cloud storage?

Cloud storage is a service model used to


store, manage, store, and be made
Cloud storage
available to users over a network, typically the Internet. Users pay a fee security services and development in the
to store their data. Although the cost per megabyte has been drastically use of the principle of computing has been
reduced, used artificial intelligence in this area, a
quantum leap in the advance of the
cloud storage providers are adding operational costs, making this
principle of computing where AI is the
technology more expensive for users. Cloud security remains a concern
behavior that makes software simulates
among users. Providers have tried to address these concerns by
human mental abilities and work patterns.
providing security capabilities such as encryption and authentication in
No one imagined in the sixties and
their services. Amazon has defined cloud storage as a "simple and
seventies what we are now, which
scalable tool that is used to store, access, and share data over the
reinforces the idea that everything that
Internet." Cloud storage providers own and maintain hardware and
some may see today is just a dream that
software While the user uses what they need in the web application.Using
will be achievable in the future. According
cloud storage eliminates the costs of owning, managing and maintaining
to a Forbes report, Internet technology is
your storage infrastructure, increasing mobility and providing access to
dominated by artificial intelligence and
data anywhere, anytime.
Block Shin, backed by cloud computing To
Some companies are working in cloud computing: : the attention of all now, showing potential
v
1 – Google that will make impossible impossible,
despite the lack of full knowledge of all
Google offers services : : Google App
capabilities so far.
Engine Google Compute Engine Google Cloud Storage Google Big What do these technologies mean?
Query Google Cloud SQL Google+ For Business Google ADs - First Internet Things: People over the
Google Analytics. course of history have been accustomed
2 – Amazon to measuring and manually collecting
Amazon offers services (: Amazon Elastic cloud computing (EC2) data in a process that has been time-
Amazon Elastic Map Reduce Auto Scaling Elastic Load Balancing consuming and prone to error.
Elastic cloud Front Relational DB services(RDS) Elastic Cloud - In modern times, thanks to cheap
Search Amazon Platform Amazon Infrastructure Amazon Green sensors and communication, billions of
Cloud Amazon App Scale Amazon windows Azure Cloud Stack) data can now be collected and analyzed
Artificial intelligence and support for cloud computing in an efficient manner, and completed in
Technology is accelerating faster than expectations and imaginations a time that may not exceed a second, and
every day. As technology develops, the need to develop and use Internet as a result everything has become
systems anywhere, anytime, without cost is a necessary need to invest dependent on intelligent sensors
time, reduce cost and speed work. Therefore, in order to obtain more
ranging from factory machines and cars to law enforcement officials. The current uses of these technologies are
certainly evolving and will not stop when
using voice assistants to ask questions and
buy things online.
- In the future, home sensors will monitor
user consumption through the Internet for
things, for artificial intelligence to report
what is running out of staple food at home,
for example, to ask about the desire to take
action to be verbally confirmed, with a
whole series of recorded events By "Block
Second / Artificial Intelligence: Machines are allowed to think and learn Shin" in the event of a dispute.
in human-like ways, and by combining the Internet of things with artificial
- In another example, a person periodically
intelligence, something more interesting than the two technologies will
interacts with health care professionals by
result if they are separate.
scheduling a doctor's appointment, sitting
v
-It allows the ability to recognize certain patterns in the billions of data in the waiting room for a while, trying to
and do so in fractions of a second, in ways that will be very difficult for remember his medical history, and
most people, as well as the evolution of algorithms to become smarter answering a set of questions before
over time. getting the necessary treatment.
Third / Block Shin: The use of this technology goes beyond being the basis But the future technological breakthrough
for digital currencies such as "configuring", which has the potential to will change this routine. It is enough for a
create records that can not be changed, permanent and searchable for person to wear smart health sensors to
events, transactions, contracts and official documents. monitor the timing of the drug, and in
combination with artificial intelligence will
-By expanding the thinking away from the current world into a new world
be able to detect sudden problems,
of independent systems that interact with each other, Block Shin will be
whether with blood pressure or sugar
able to provide a simple, cost-effective, sustainable record by containing
levels.
decisions taken and communicating on behalf of its users.
-These detailed health records are
available to the medical professional
chosen by the user in a simple and easy
way. The Internet will follow up on the state of health, artificial together, especially devices, cards and
intelligence monitors and interacts, and all interactions can be verified data centers, An integrated infrastructure
and protected by Block Shin. based on artificial intelligence, Which will
contribute to the integration of Atlas's 2017
- On the other hand, cybersecurity occupies many people, so it is possible
series based on artificial intelligence. The
to imagine what Internet things can do with huge sensor networks that
new platform will connect these devices to
record and analyze every action and every button.
give them greater capabilities by
- The power of artificial intelligence can help detect anything out of the accelerating their artificial intelligence
ordinary and identify potential threats, and take preventive action solutions. After that partnership, the
without human intervention, all of which are recorded on a reliable company can now provide a full range of
permanent record. computing options (UCS C480 ML) with the
Open cloud computing is the basis for the future of smart cities. addition of devices designed for each
Specialized "Internet Objects" and analytical systems to raise security phase of the life cycle of artificial
levels. intelligence and machine learning. This will
give customers a wide range of benefits
Software Application Programming
v
covering the various stages of data
Interface ... (4) collection and analysis near the edge to
data preparation and training in the data
Anyone can use it to take advantage of the computing capabilities of
center, leading to the immediate
online servers. Cloud networks will be the source of technology
development that represents the core of
intelligence in the near future, and cloud services should focus on
artificial intelligence technology (*) .it
developing the experiences of individuals rather than companies, as they
believes that by 2025, all enterprise
will connect them to servers that open the artificial intelligence horizons
technology solutions will be based on cloud
of all their future applications with ease. Infrastructure is open to all
computing technology, and that more than
developers to ensure their spread.
85 per cent of business applications will be
During the Huawei Connect 2016 conference, "Huawei Connect," Huawei's based on this technology as well. Global
CEO, Huawei, predicted that we will see the launch of the second experts have reviewed the latest trends in
generation of cloud computing over the next 10 years, which will provide cloud computing and how to make digital
smooth tools for all developers to adopt This technology is in their transition across industries.
programs and applications that target individuals. Huawei announced at
He added that the company has allocated
its Huawei Conference 2018 Conference on Artificial Intelligence
about $ 1 billion to raise one million
Technologies the launch of the Atlas Smart Computing platform, which
will ignite the future of artificial intelligence with great computing developers for the open cloud computing
capabilities. This platform integrates many products platform over the next five years, which
means increasing the momentum of this global trend significantly, and development of IT platforms Things, "and
get innovative applications that help everyone develop their daily huge data clouds, without the need for a
experiences. The company has also established an alliance of leading huge data center at the headquarters of any
technology companies in the world, aimed at seamless integration of company.
cloud computing technologies, including Intel, Linux Foundation,
* Smart cities are safe
Accenture, TianZi University and TianZi Biodiversity & Development
Center, Hexagon, Siemens, General Electric, Honeywell, Infosys, T- For smart cities, the Safe City Integrated
Systems, and S-Systems. In addition to the development of an Internet- Communications Platform offers advanced
Things IoT processor, a technology in which various devices capabilities for monitoring and capturing
communicate with one another and with personal computers and servers alerts from social networks and Internet
on the same SOA without user intervention, so as to develop the user devices, video presentations on any
experience and provide new features and functions, as well as platform problem in the city and alerting the party
for smart homes and others. Near-future applications will turn devices concerned, which develops functionality
into a mere gateway that passes data to the cloud, using open-source Smart cities dramatically.
software interfaces, which means that data processing will not be on the But the most important function in smart
user's device, but on specialized high-performance devices. This vmeans cities is to protect the population by
that the user does not need to acquire high-performance devices, thus identifying criminals by analyzing data
launching low-cost devices that handle large data over the Internet to from security cameras in important or
reach those services that encompass all walks of life to all segments of sensitive areas or during large events that
developing societies and raise the quality of their daily lives, especially attract visitors, with the ability of systems
in health and education. to analyze the behavior of suspected
* Industrial sector as well individuals And follow their movements.

For Industrial Internet, analysts expect the industry to reach $ 151 billion The technology can analyze video
by 2020, indicating its importance and rapid adoption of the technology recordings of up to an hour in one minute,
in the industry. Examples of this are Schindler's elevators for the Internet and assemble important parts into one
of Things technology, so sensors send data on more than a million brief presentation of specialized security
elevators to cloud servers to simulate elevator work, anticipate elevator forces, increasing security and protection
problems, report possible closures to other lifts around the world, To for all.
increase passenger safety levels and significantly reduce operating In addition to many functions, for example,
costs.The open cloud computing platform includes FusionCloud, if a person wants to attend a meeting, the
FusionStorage6 and FusionStage Paas, which provides 31 services in car will be equipped with a storage system
computing, warehousing, data transfer, security, data and database contains all the dates of meetings and
analysis, software development, testing, launch and management, and
places of their presence, the car will pass the shortcut to access in time 3. that span a multi-cloud world. Whether the
and in the event of delay due to congestion will send a report to the cloud is private, public or hybrid, or any
management of the meeting on the occurrence of delay with the A combination of these types, customers can
picture of the location and nature of the congestion. All this is done by adopt multiple cloud architectures by
supporting artificial intelligence for the cloud computing system. simplifying how customers communicate
and protect their cloud. With the help of
- Advanced techniques to support the evolution towards digital automated learning, users unite across
transformation: cloud structures - including one policy and
one security check - by learning user
preferences and performing applications
across public and private cloud platforms
for seamless interoperability.
4. Data visualization from the network
focuses on providing data and ideas to
support usage
Due to the high pressure on the networks, Cisco has unveiled the latest 5. models ranging from infrastructure
v improvement to security threat
technology in the public and private sectors under the slogan "a safe and
investigation, giving customers the ability
smart platform for digital business" at GITEX 2018. And almost the value
to extract value from the data that
of the artificial intelligence market will reach about 5.05 billion US dollars
passes through their network in the
by 2020. From data centers to the block chain, "Block Qin" and artificial
timeframe that delivers the most value.
intelligence and the Internet of things and large data, the world is
6. Empowering employee and customer
witnessing a quantum leap towards digitization, enhanced by ICT
experience: It has the ability to connect
solutions that include computing Cloud . people, teams, and customers together,
At GITEX, Cisco is accompanying the customer through a converged and artificial intelligence is an implicit
journey based on its secure and intelligent platform for digital work, component of our technology to share
reviving digital innovations through five key pillars, including: and experience employees and
customers through simplicity,
1. Reinventing the network: The potential of automated learning gives automation, and improved experience.
us the ability to analyze large amounts of network data - from 7. Integrate security into network fabric:
telemetry to traffic patterns, transforming the motion itself and have a more rapid detection capability
self-healing from internal shocks such as hardware failures and than anything abnormal and investigate
external shocks such as electronic attacks. the matter, isolating faulty devices,
2. Enable a multi-cloud world: Networking, security, analytics and devices or devices.
management capabilities are assembled to provide cloud solutions
8. The Gartner Foundation highlighted the most important strategic will be delivered to the nearest point of these
directions in technology as part of ContinuousNEXT. The future terminals by routing terminals using
strategy is in the form of automated objects and enhanced intelligence. Internet objects technology, which will
For example, artificial intelligence is used in conjunction with Internet develop complementary models based on a
technologies, Provide high-IQ areas and integration. This impact is cloud-managed package of central services,
combined to create new opportunities, and to leapfrog the quality of At the central server level, but within
the top 10 strategic trends in technology that the Gartner Foundation servers deployed to work environments, and
highlights in 2019, such as self-control objects including aircraft, on the terminals themselves.
robots and machines. For example, a plane scans a field and results
Quantitative Computing (Future)
show that it is ready Harvesting with intelligence will direct a
reference to a self-controlled harvester to do its job, and other
examples

v
Is one of the non-classical types of
computing that works on the quantum
state of subatomic particles (eg, electrons
and ions), which represent information as
elements in the form of quantum bits.

Parallel performance and exponential


Through enhanced analysis, the HR, Finance, Sales, Marketing, scalability of quantum computers indicate
Customer Service, Procurement and Asset Management departments that they excel in addressing the very
will be improved so that all employees can make the right decisions complex problems of conventional systems,
and actions within the context of their work, but not just experts, or when compared to the long time that
analysts and data scientists. Enhanced analysis automates the process traditional algorithms take to solve a
of data generation, visualization and visualization, eliminating the need problem. "CEOs and IT leaders should begin
for professional data scientists to intervene in many situations. This planning quantitative computing
will result in the emergence of a citizen data science, a set of emerging investments to enhance their knowledge,
capabilities and practices that enable users, And analysis processes, how they are applied to address business
from deriving predictive and instructional insights from data.The problems on the ground, As well as speed
concept of possible peripherals also refers to devices used by people. to learn and it is still a rising technology.
Instead of collecting and delivering content to the cloud server, they
The computerization of the quantity has great capabilities and influential
at the security level. However, we do not believe that this upward trend
will revolutionize the world of things in the next few years, but most
institutions should know and monitor the rise and spread of quantum
computing technologies by 2022 and start investing them between 2023.

Science will continue to progress as it is now perceived and some believe


that it is a dream that can be achieved. Over time, it will become a reality
accepted by all and applied on the ground.(*)

Applications using artificial intelligence are:(**)


1 - Facebook uses artificial intelligence for facial recognition to see
people in the pictures.
2 - Flip card is an application that is used to market online search by
relevant images.
3 - Siri from Apple is an audio assistant that uses intelligence with fixed
algorithms.
4 - KOKLE Alo smart application helps the user to exchange messages
and files as it can determine the numbers that the user communicates v
with.
5- Alexa Amazon is a smart personal assistant that can deal with its
users by voice and organizes the lists of tasks as it tells the latest news
and weather conditions. With the advent and spread of artificial
intelligence more and more the world enters a new era of automation..

Reference & Links that Extracted from the content the seminar.
All content following this page was uploaded by Abdelrahman Osman on
22 March 2018.
(**)https://www.wamda.com/ar/memakersge/2017/08/
(*)www.menaherald.com/tech/information-technology
*https://www.menaherald.com/tech/information-technology/10
(1) Arab British Academy for Higher Education and Definition
(2) of cloud computing
Abstract. Particularly for commercial web
applications. The on-demand, pay-as-you-
The Cloud computing providers are unable to predict geographic
go model creates a flexible and cost-
distribution of users consuming their services, hence the load
effective means to access compute
coordination must happen automatically, and distribution of services
resources. For these reasons, the
must change in response to changes in the load. To counter this problem,
scientific computing community has shown
we advocate creation of federated Cloud computing environment
increasing interest in exploring cloud
(InterCloud) that facilitates just-in-time, opportunistic, and scalable
computing. However, the underlying
provisioning of application services, consistently achieving QoS targets
implementation and performance of clouds
under variable workload, resource and network conditions. The overall
are very different from those at traditional
goal is to create a computing environment that supports dynamic
supercomputing centers. It is therefore
expansion or contraction of capabilities (VMs, services, storage, and
critical to evaluate the performance of
database) for handling sudden variations in service demands, The
HPC applications in today’s cloud
proposed InterCloud environment supports scaling of applications
environments to understand the tradeoffs
across multiple vendor clouds. We have validated our approach by
inherent in migrating to the cloud. This
conducting a set of rigorous performance evaluation study using the
work represents the most comprehensive
CloudSim toolkit. v
evaluation to date comparing conventional
1-1 Introduction HPC platforms to Amazon EC2, using real
applications representative of the
Today the use of cloud computing applications is mushrooming at an
workload at a typical supercomputing
ever increasing rate . But what exactly in cloud computing ? " cloud
computing is a technology that allows the users to access software center. Overall results indicate that EC2 is
applications ,hardware , six times slower than a typical mid-range
storage , computing processes directly from the web , these device Linux cluster, and twenty times slower than
have direct , Fast and cheap links to the internet which make it easier a modern HPC system. The interconnect on
to upload and download programs and applications such the internet and
the EC2 cloud platform severely limits
online network storage services, Cloud computing has seen tremendous
growth, performance and causes significant
variability work together. This model. relies
on remote servers

1-2 Defining Cloud Computing


application
A cloud application, or cloud application, is
a software program where cloud-based
and local components For processing logic
that is accessed through a web browser
with a continual internet connection and refers to both the services. Customers only pay for
applications delivered as services over the Internet and the the CPU cycles, storage or bandwidth they
hardware and systems software in the data centers That provide consume. Leading public cloud service
those services. The services themselves have long been referred to as providers include Amazon Web Services
Software as a Service (SaaS).a Some vendors use terms such as IaaS (AWS), Microsoft Azure, IBM and Google Cloud
(Infrastructure as a Service) and PaaS (Platform as a Service) to Platform. A hybrid cloud is a combination of
describe their products, The line between “low-level” infrastructure public cloud services and an on-premises
and a higher-level “platform” is not crisp. We believe the two are more private cloud, with orchestration and
alike than different, Similarly, the computing users to plan far ahead automation between the two. Companies can
for provisioning. run mission-critical workloads or sensitive
 The elimination of an up-front commitment by cloud users, thereby applications on the private cloud and use the
allowing companies to start small and increase hardware resources public cloud to handle workload bursts or
only when there is an increase in their needs. spikes in demand. The goal of a hybrid cloud
 The ability to pay for use of computing resources on a short-term basis is to create a unified, automated, scalable
as needed (for example, processors by the hour and storage by the environment that takes advantage of all that
day) and release them as needed, thereby rewarding conservation by a public cloud infrastructure can provide,
letting machines and storage go when they are no longer useful. while still maintaining control over mission-
critical data. In addition, organizations are
1-3: How Does Cloud Computing Work? v
increasingly embracing a multicloud
Cloud computing provides a simple way to access servers, storage, model, or the use of multiple infrastructure-
databases and a broad set of application services over the Internet. A as-a-service providers. This enables
Cloud services platform such as Amazon Web Services owns and applications to migrate between
maintains the network-connected hardware required for these different cloud providers or to even operate
application services, while you provision and use what you need via a concurrently across two or more cloud
web application. providers. Organizations adopt multicloud
1-4: Types of cloud computing services Although cloud computing for various reasons. For example, they
has changed over time, it has been divided into three broad service could do so to minimize the risk of a cloud
categories: infrastructure as a service (IaaS), platform as a service service outage or to take advantage of more
(PaaS) and software as a service (SaaS). competitive pricing from a particular
1-5: Cloud computing deployment models provider.
Cloud computing services can be private, public or hybrid. Multicloud implementation and application
Private cloud services are delivered from a business's data center to development can be a challenge because of
internal users. This model offers the versatility and convenience of the the differences between cloud providers'
cloud, while preserving the management, control and security common services and application program
to local data centers. Internal users may or may not be billed for interfaces (APIs). Multicloud deployments
services through IT chargeback. Common private cloud technologies should become easier, however, as
and vendors include VMware and OpenStack. In the public cloud model, providers' services and APIs converge and
a third-party cloud service provider delivers the cloud service over the become more homogeneous through
internet. Public cloud services are sold on demand, typically by the
minute or hour, though long-term commitments are industry initiatives
available such as the Open Cloud Computing Interface.
for many
consume storage space on a computer or
communications device. Assuming a
reasonably fast internet connection, a
well-written cloud application offers all the
interactivity of a desktop application, along
with the portability of a web application.

1-8 :Cloud applications and. web


applications

With the advancement of remote computing


technology, clear lines between cloud and web
applications have blurred. The term cloud

1-6: Benefits of cloud apps


Fast response to business needs. Cloud applications can be updated,
tested and deployed quickly, providing enterprises with fast time to
market and agility. This speed can lead to culture shifts in business
v
application has gained great cachet,
operations Reduced costs. The size and scale of data centers run by
sometimes leading application vendors
major cloud infrastructure and service providers, along with competition
with any online aspect to brand them as
among providers, has led to lower prices. Cloud-based applications can
cloud applications. Cloud and web
be less expensive to operate and maintain than equivalents on-premises
applications access data residing on
installation.
distant storage. Both use server
Improved data sharing and security. Data stored on cloud services is
processing power that may be located on
instantly available to authorized users. Due to their massive scale, cloud
premises or in a distant data center. A key
providers can hire world-class security experts and implement
difference between cloud and web
infrastructure security measures that typically only large enterprises
applications is architecture. A web
can obtain. Centralized data managed by IT operations personnel is more
application or web-based application must
easily backed up on a regular schedule and restored should disaster
have a continuous internet connection to
recovery become necessary.
function. Conversely, a cloud application or
1-7 :How cloud applications work
cloud-based application performs
Data is stored and compute cycles occur in a remote data center
processing tasks on a local computer or
typically operated by a third-party company. A back end ensures uptime,
workstation. An internet connection is
security and integration and supports multiple access methods. Cloud
required primarily for downloading or
applications provide quick responsiveness and don't need to permanently
uploading data. A web application is
reside on the local device. They can function offline, but can be updated
unusable if the remote server is
online. While under constant control, cloud applications don't always
unavailable. If the remote server becomes
unavailable in a cloud application, the
software installed on the local user device can still operate, although it interface (GUI) at the top. At some point in
cannot upload and download data until service at the remote server is this stack, a cloud application transfers
restored. The difference between cloud and web applications can be responsibility from the end user to the
illustrated with two common productivity tools, email and word cloud; this is where it becomes critical to
processing. Gmail, for example, is a web application that requires only understand the status of resources and
a browser and internet connection. Through the browser, it's possible the way cloud applications and services
to open, write and organize messages using search and sort perform. In many cases, the best source
capabilities. All processing logic occurs on the servers of the service for obtaining cloud application
provider (Google, in this example) via either the internet's HTTP or performance information isn’t native
HTTPS Protocols. A CRM application accessed through a browser under management tools but instead it comes
a fee-based software as a service (SaaS) arrangement is a web from management data available from end
application. Online banking and daily crossword puzzles are also user application and platform tools. By
considered web applications that don't install software locally. looking at how the bottom layer runs,
An example of a word-processing cloud application that is installed on a admins can determine cloud performance.
workstation is Word's Microsoft Office 365. The application performs Application tools that enterprises use in-
tasks locally on a machine without an internet connection. The cloud house function as part of the application
aspect comes into play when users save work to an Office 365 cloud image that moved to the cloud. Often,
server. admins can manage software components
v
in the cloud using native tools. But because
1-9: Cloud applications and desktop applications the cloud replaces traditional data center
Desktop applications are platform-dependent and require a separate hardware and software, those components
version for each operating system. The need for multiple versions must be managed solely in the cloud. The
increases development time and cost, and complicates testing, version centerpiece of any cloud application
control and support. Conversely, cloud applications can be accessed management strategy is an integrated
through a variety of devices and operating systems and are platform- management console, such as those
independent, which typically leads to significant cost savings. included in products from CA Technologies,
Every device on a desktop application requires its own installation. IBM and HP. These software tools allow
Because it's not possible to enforce an upgrade whenever a new version administrators to link the management
is available, it's tricky to have all users running the same one. The need console’s GUI and tools with software and
to provide support for multiple versions simultaneously can become a hardware application programming
burden on tech support. Cloud applications don't face version control interfaces (APIs). A cloud application
issues since users can access and run only the version available on the management console allows admins to
cloud. monitor underlying software and hardware
1-10 :integrated cloud application management elements from a single interface. The
Cloud applications need to meet certain service-level requirements for interface can integrate vertical
availability and performance. And that means administrators must be components in the resource stack --
able to measure and enforce service-level agreements. Despite being a servers, storage, middleware, etc. -- with a
useful application resource, the cloud can complicate this. Applications horizontal set of applications that could
running in the cloud are effectively a stack, with server and storage contribute to worker productivity. The
hardware at the bottom and application software and the graphical user mission is to create an integrated cloud
application management view that corresponds to the workers’ view of database replication to establish a copy of
their information resources. This helps ensure cloud application quality your database in the cloud before moving
of experience (QoE). the system. If you’re using the cloud for
1-11: Managing applications in the cloud disaster recovery (DR), a replica may
the application, compliance requirements can create roadblocks, and already exist in the cloud. With this method,
bandwidth problems can occur if your cloud provider does not support your production system remains live while
low-level networking services such as multicasting. changes are written to the replica. The time
After you’ve assessed which applications can run in a public cloud, there needed to switch from the current
are other factors to consider -- configuration, data migration and production system to a cloud-based system
monitoring. What are some of the most common configuration tasks you is minimized. Bulk back and restore is
need to keep in mind when migrating an app to the cloud? This checklist another approach to data migration, which
outlines key points: fits with non-transaction-based systems,
-Service catalogs may contain older versions of virtual machines (VMs) such as data warehouses and other
that are not sufficiently patched for your needs. Use base images that business intelligence (BI) databases used
have the latest security and functional patches. for data mining. However, this approach can
- Review all daemons and services running on an image and shut down delay the initial loading of the cloud-based
all images that aren’t needed. This will reduce the attack service of all database as well as incremental updates. In
VMs. addition, not all data is stored in relational
- Configure firewalls between application layers to minimize network v
databases. For file-based data stores, you
traffic between layers. For example, you should only open ports that are may want to use rsync , a synchronization
needed to accept and respond to queries and support management utility often used for mirroring and backup.
protocols. Rsync is available for Unix/Linux and
-If you require strong encryption, such as PCI DSS, ensure your SSL/TLS Windows platforms.
encryption is strong. The client and server in an SSL session negotiate 1-13 :Use of Cloud Computing
which cipher suite to use; they may not use strong encryption if not Applications and Services
configured to do so.
-When using a hybrid cloud model, configure a virtual private network use webmail services, store data online, or
(VPN) to secure communications between internal and external use software programs such as word
resources. processing applications whose
-Use SSL server certificates to authenticate servers and support functionality is located on the web. In doing
encrypted communications. Depending on your architecture, you might so, these users are making use of “cloud
be able to use domain level or subject alternate name (SAN) certificates computing,” an emerging architecture by
to help minimize the number of certificates you have to manage. which data and applications reside in
- Use configuration tools such as Chef or Puppet to automate cloud cyberspace, allowing users to access them
management tasks. through any web-connected device.
1-12: Methods for moving data to the cloud Most internet users are unlikely to be
In addition to configuring cloud resources, you’ll need a plan to move data aware of the term “cloud computing.” But
from the existing system to the cloud-based system. There are several online Americans who use webmail
approaches to migrating data; the best option will depend on your services such as Hotmail or Gmail are
enterprise’s requirements and architecture. One approach is to use taking advantage of data storage
capabilities managed by a network of computers, which in turn permits
access to a user’s email through whatever device he has at hand.

Conclusion
Cloud computing has seen tremendous growth, particularly for
commercial web applications. The on-demand, pay-as-you-go model
creates a flexible and cost-effective means to access compute
resources.
cloud computing is a technology that allows the users to access
software applications ,hardware , storage , computing processes
directly from the web , these device have direct , fast and cheap links
to the internet which make it easier to upload and download programs
and applications such the internet and online network storage services
We predict cloud computing will grow, so developers should take it into
account.

v
Abstract
Cloud computing supplies on demand services over the Internet with the 1- CLOUD COMPUTING BUILDING BLOCKS
help of a large amount of virtual storage. The main features of cloud There are typically three major types of
computing is that the user does not have any setup of expensive cloud computing services. The three are
computing infrastructure and the cost of its services is less. Which Software as a Service (SaaS), Platform as
means handing data to the third party. Despite the numerous benefits a Service (PaaS), and Infrastructure as a
of cloud computing. But the idea of moving from local computing to Service (IaaS). In most cases, the ‘layers’
remote computing it could be risky by many of security issues and of cloud computing are represented as a
challenges for both consumer and provider. Because the cloud pyramid with IaaS at the bottom, PaaS at
computing services deliver to the users by third party which turn up a the middle and SaaS sits at the top.
new security issues Describing and differentiating the three is
key to gaining a better understanding of
1- Introduction Cloud computing.
Computing as a service has seen a unusual growth in recent years. The
SaaS is the cloud computing layer most
primary motivation for this growth has been the promise of reduced
people have interacted with and are likely
capital and operating expenses, and the ease of dynamically scaling and
to use in their day to day lives. Software as
deploying new services without maintaining a dedicated compute v
a service is where computing applications
infrastructure. Hence, cloud computing has begun to rapidly transform
are accessed through the internet; this
the way organizations view their IT resources. From a scenario of a
eliminates the need to download, install and
single system consisting of single operating system and single run applications on local computers. In
application, organizations have been moving into cloud computing,
most cases, these applications are
where resources are available in abundance and the user has a wide
managed by a third party vendor. The user
range to choose from. Cloud computing is a model for enabling
has to log into an account in order to gain
convenient, on-demand network access to a shared pool of configurable access to the applications interface.
computing resources that can be rapidly provisioned and released with
service provider interaction or minimal management effort. Here, the PaaS A platform is a software
end-users need not to know the details of a specific technology while environment used to develop and run
hosting their application, as the service is completely managed by the applications. So Platform as a Service
Cloud Service Provider (CSP). Users can consume services at a rate (PaaS) can be defined as a computing
that is set by their particular needs. This on-demand service can be platform that enables the creation, testing
provided any time. CSP would take care of all the necessary complex and implementation of software easily and
operations on behalf of the user. It would provide the complete system quickly without the complexities of buying
which allocates the required resources for execution of user and maintaining the infrastructure and
applications and management of the entire system flow. additional software. Unlike SaaS which is
software delivered via the internet, PaaS
provides a platform for creation of applications over the internet. private cloud services, although each of
Another difference between PaaS and SaaS is the aspect of them has its own separate and different
management. In PaaS, the vendors manage networking, storage, entity. The choice of public and private
servers, virtualization, OS, middleware and runtime, but the end users cloud services depends on several factors,
are the ones who manage the data and applications. including security, cost and flexibility.
IaaS delivers Cloud Computing infrastructure to organizations, 1- Cloud Computing Risk Issues
including things such as servers, network, operating
The CIAsystems,
Triad and
storage, through virtualization technology. These cloud servers are  Confidentiality: Confidentiality is
typically provided to the client through a dashboard or an API, and IaaS the prevention of the intentional or
clients have complete control over the entire infrastructure. IaaS unintentional unauthorized disclosure of
provides the same technologies and capabilities as a traditional data contents. Loss of confidentiality can occur
center without having to physically maintain or manage all of it. IaaS in many ways. For example, loss of
clients can still access their servers and storage directly, but it is all confidentiality can occur through the
outsourced through a “virtual data center” in the cloud. Also cloud intentional release of private company
computing consists of four deployment models; Private cloud, Public information or through a misapplication of
cloud, Hybrid cloud and network rights. Some of the elements of
v
telecommunications used to ensure
Community cloud. Details about the models are given below.
confidentiality are as follows: Network
Public Clouds Public clouds are owned and operated by third parties; security protocols
they deliver superior economies of scale to customers, as the  Network authentication services
infrastructure costs are spread among a mix of users, giving each  Data encryption services
individual client an attractive low-cost, “Pay-as-you-go” model. All a- Integrity: Integrity is the
customers share the same infrastructure pool with limited guarantee that the message sent is the
configuration, security protections, and availability variances. These are message received and that the message is
managed and supported by the cloud provider. One of the advantages of not intentionally or unintentionally altered.
a Public cloud is that they may be larger than an enterprises cloud, thus Loss of integrity can occur through an
providing the ability to scale seamlessly, on demand. intentional attack to change information
Private Clouds cloud infrastructure is provisioned for exclusive use by (for example, a website defacement) or,
a single organization comprising multiple consumers. It may be owned, more commonly, unintentionally (data is
managed, and operated by the organization, a third party, or some accidentally altered by an operator).
combination of them, and it may exist on or off premises. Integrity also contains the concept of
nonrepudiation of a message source, which
Hybrid Clouds The hybrid cloud is a type of cloud computing, a we will describe later. Some of the
combination private cloud, and public cloud. The hybrid cloud brings
together the services and benefits that can be provided by public and
b- elements used to ensure integrity include the following: Additional factors that directly affect cloud
 Firewall services software assurance include authentication,
 Communications security management authorization, auditing, and accountability
 Intrusion detection services
3- Authentication is the testing or
c- Availability: This concept refers to the elements that create
reconciliation of evidence of a user’s
reliability and stability in networks and systems. It ensures that
identity. It establishes the user’s identity
connectivity is accessible when needed, allowing authorized users to
and ensures that users are who they claim
access the network or systems. Also included in that assurance is the
to be. For example, a user presents an
guarantee that security services for the security practitioner are
identity (user ID) to a computer login
usable when they are needed. The concept of availability also tends to
screen and then has to provide a password.
include areas in an information system (IS) that are traditionally not
The computer system authenticates the
thought of as pure security (such as guarantee of service, performance,
user by verifying that the password
and up time), yet are obviously affected by breaches such as a denial-
corresponds to the individual presenting
of-service (DoS) attack. Some of the elements that are used to ensure
the ID.
availability are as follows:
- Fault tolerance for data availability, such as backups and redundant
v 4- Authorization refers to rights and
disk systems privileges granted to an individual or
- Acceptable logins and operating process performance process that enable access to computer
- Reliable and interoperable security processes and network security resources and information assets. Once a
mechanisms user’s identity and authentication are
established, authorization levels determine
2- Cloud Computing Security Challenges the extent of system rights a user can hold.
Cloud services present many challenges to an organization. When an
organization migrates to consuming cloud services, and especially 5- Auditing to maintain operational
public cloud services, much of the computing system infrastructure assurance, organizations use two basic
will now be under the control of a third-party Cloud Services methods: system audits and monitoring.
Provider (CSP). Many of these challenges can and should be These methods can be employed by the
addressed through management initiatives. Some general cloud customer, the cloud provider, or both,
management processes will be required regardless of the nature of depending on asset architecture and
the organization’s business. These include the following: deployment.
- Security policy implementation
- Computer intrusion detection and response  A system audit is a one-time or
- Virtualization security management periodic event to evaluate security.
3- Cloud Security Services
 Monitoring refers to an ongoing activity that examines either the adequate protection against both damage
system or the users, such as intrusion detection. by the elements, e.g. caused by storms and
flooding, and against unauthorized entry. If
6- Accountability a customer requires a particularly high
is the ability to determine the actions and behaviors of a single level of availability for their services, the
CSP should also reserve capacities in
individual within a cloud system and to identify that particular individual.
backup or redundant data centers which
Audit trails and logs support accountability and can be used to conduct can compensate for another data center
postmortem studies in order to analyze historical events and the failing. The data centers should be located
individuals or processes associated with those events. Accountability far enough away from each other
is related to the concept of nonrepudiation, wherein an individual geographically so that a controllable
cannot successfully deny the performance of an action. damage event

7- Security architecture 8- Server security


If a Cloud Computing platform is to be made operationally secure, all The servers represent the environment for
the issues potentially posing a threat to the confidentiality, integrity performing the processes and their
and availability of the data stored there needs to be examined. Besides computations. For this reason, the
a well-structured procedural model for all IT processes, it is important operating systems deployed on the
that a security architecture be setup to protect resources (employees,
v servers should be hardened to the extent
infrastructure, networks, IT systems, applications, data, etc.) and that that they offer the smallest possible area
the customer is securely isolated. A robust separation of customers at to attack. To achieve this, when the basic
every level in the Cloud Computing stack (application, servers, installation is being undertaken, only the
networks, storage, etc.) is a fundamental requirement that each Cloud necessary software packages should be
Computing platform should meet. This requirement applies equally both added and any superfluous programs and
to public and private clouds. The issues described below should be services should be disabled or, better,
examined when setting up a solid security architecture for Cloud uninstalled. Standard measures to protect
Computing. IT systems, such as host firewalls, host-
based intrusion detection systems, etc.
a- Data center security should be implemented and regular
Data centers form the technical basis for Cloud Computing. To this integrity reviews run on important system
extent, it is important that every CSP ensures their systems are secure files. Host-based intrusion detection
incompliance with the current state the technology. This includes systems are characterized by the fact that
permanent monitoring of access, for example using video monitoring they are run on the IT system to be
systems, movement sensors, alarm systems and trained security monitored. They are typically deployed to
personnel. Any provision components which are essential for detect attacks made at the application or
operations, for example the power supply, air-conditioning and Internet operating system level.
connection, should be designed to be redundant. Modern fire protection Examples of such attacks are policy
precautions also need to be taken, and tested on a regular basis. violations by users, failed login attempts
Overall, a data center should form a security area that affords and malware such as Trojan horses.
9- Network security to be addressed at each phase of the
software development process, and
In the past, Cloud Computing platforms have often been misused either programs and modules may only be
by placing malware there which is then used to send spam, or their deployed if they have been properly tested
processing power has been exploited to crack passwords using brute and approved by the CSP’s security
force attacks or to hide command and control servers (C&C servers) manager.
used to control botnets. To prevent these and similar attacks as well
as the misuse of resources, each CSP should take effective security a- General Security
measures to defend against network-based attacks. As well as the Recommendations
usual IT security measures such as anti-virus protection, Trojan The following list provides general
detection, spam protection, firewalls, Application Layer Gateway and recommendation for cloud computing
IDS/IPS systems, particular care should be taken to encrypt all security:
communication between the CSP and the customer and between the
provider’s sites. If a third party provider is required to deliver the - Install and maintain a firewall
services, the communication with them also needs to be encrypted. The configuration A firewall should be placed at
incorrect configuring of a system is frequently the reason for each external network interface and
successful attacks. As Cloud Computing platforms consist of many between each security zone within the
different components, 28 Security architecture – Network security the cloud. This would assure that all ingress
overall configuration is very complex. Changing a configuration v
and egress traffic is being filtered.
parameter for one component (e.g. virtualization server) can, when However, firewall rules should be written
interacting with other components (e. g. network or storage) lead to carefully so as not to allow unwanted
security vulnerabilities, faulty functions and/or failures. For this traffic and close all unused ports.
reason, the components deployed need to be securely and carefully
configured. All CSPs should also ensure that their networks are - Do not use vendor-supplied defaults for
suitably segmented, preventing any faults from spreading freely. passwords and other security parameters.
The default usernames, passwords, and
10- Application and platform security other security parameters are well known
In the case of offerings in the PaaS area, customers no longer have to other cloud users, and probably many
to worry specifically about database accesses, scalability, access outsiders. It is vital the first step done
controls, etc., as the platform provides these functionalities for them. when you receive your account
Due to the fact that the customers use the platform’s core authorizations that you change passwords
functionalities to develop their own software, they can only succeed for all accounts.
in developing software securely, if the entire software stack on the - Ensure that no unnecessary functions or
platform is developed and upgraded professionally and securely. CSPs processes are active. When unnecessary
typically deploy not just a large number of different software processes or functions are active, it is
components, but they also continue to upgrade them in order to be highly probable that these processes or
able to optimally provide their customers with the services in the functions have open ports on the firewall
runtime environment. When developing software, all CSPs must have side. When you run unnecessary processes,
established security as a fixed component in the software you are broadening the range of threats
development life cycle process (SDLC process). Security issues need with an unnecessary exposure to
Vulnerabilities in processes and functions that you do not even need.
In many operating systems, the list of services and processes enabled
by default can be very long.

v
Abstract resources and computer systems
available on demand that can provide a
In the age of the Internet, the age of information technology, the amount
number of integrated computer services
of data and information available on the Internet is enormous and
without being restricted to local resources
accumulate files in public computers and private, and requires a large
in order to facilitate user access. These
sector of the community to access this information in a system that
resources include data storage, backup,
allows them to access them and individuals see them at any time, starting
and self-synchronization, and include
From seeking information to institutions including educational
software processing and scheduling
institutions, schools, institutes, universities, etc.). As storage costs
capabilities. When connected, the user can
continue to rise, organizations are faced with the challenges of data
control these resources through a simple
recovery and backup, demonstrating the importance of cloud computing,
software interface that simplifies and
which aims to protect and manage data more efficiently, efficiently and
ignores internal details and processes.
easily. Cloud computing is the new solution for managing and storing data
Paul et al. (2010) also see cloud computing:
and information, Students access applications from anywhere, anytime
network services that offer cheap, secure,
and from any connected device . on-demand platforms that can be
v
accessed and used in easy ways. The
Introduction National Center for Standards and
The meaning of cloud computing is shifting from the use of electronic Technology defines the cloud as: On-
applications to computers or connecting to the internal network to be demand at any time and from any place to
through the Internet browser and anywhere in the world and only need the resources on the Internet and can be
to connect to the Internet, and to illustrate the technology of cloud deployed and deployed with minimal effort
computing will be presented concept and concepts associated with it: or interaction with the service provider
Such resources include the API, servers,
Cloud computing (core concepts): cloud computing has been widely
stores, applications, blogs, presentations,
seen and reflected on its concept, Hussam and Akron (2013, Hosam, F, et
and mail messages Documents,
al.) Have stated that cloud computing is a technology that relies on the
conversations, software, and networks.
transfer of processing and storage space to the so-called cloud G server
Beneficiaries can be granted security
is accessed through the Internet, thus turning IT programs from
access to such resources by utilizing self-
products to services. Thus, this technology contributes to the removal of service and cloud-based cloud
the problems of maintenance and development of information technology
technologies on demand through
programs on the companies used for them, and therefore the focus of smartphones, tablets, laptops, and
the efforts of the beneficiaries on the use of these services only. Al-
computers (Mell, P, Grance, T, 2009). This
Zoube, M) emphasized that cloud computing is a term that refers to online
definition of the concept of computing is more comprehensive and creation of new services across the web in
illustrative. the light of cloud computing. Cloud
computing enables learners to connect
Cloud computing features :
from anywhere to access and share
Cloud computing technology has enabled many of its features, including: resources through the interactive
1 - Hosting data on an external system. interface and environment. Learning is a
flexible learning environment that
2 - Many services have a pay structure where they only need to pay when
transcends time and space where learners
the service is used 3. Development is feasible so that companies can
sit in front of computers in their schools,
make changes to the storage base according to the requirements.
homes, or anywhere else studying
4 - Reduce spending: compared to traditional data storage. programmed courses on the computer or
through websites, interacting and
5- Ease of access: Cloud computing systems enable you to access your
communicating with their peers and
organization's data from anywhere and at any time, from computers of
teachers simultaneously or
all kinds, mobile phones and smartphones.
asynchronously to access sources,
6- Continuity of service: One of the most important characteristics to information, etc. . According to Mohamed
v
be searched when choosing between cloud computing systems, Abdel Hamid (2008), the e-learning
companies providing this service periodically back up their customer environment is the environment that
data and important files, and updates to drivers, to ensure that data is transcends geographical and temporal
not lost due to interruption Power supply or any malfunctions in the boundaries to provide and benefit from the
drivers. 7- Security and protection: The mission of the cloud service educational service.
provider is to provide the highest level of insurance for each data and
E-learning environment can be defined
protect against theft or any risks that could threaten the security of your
in the light of cloud computing, the Web.
data.
as a learning environment through which
8- The user can access the files and applications through this cloud learning objects and learning services are
without the need to provide the application in the user Nineteenth accessed by learners and communication
Scientific Conference on Information Systems and Computer Technology, and interactions between learners from
2012). anywhere and at any time using Web
E-learning Evidence in the Light of the Integration of Cloud services 200 in a widespread, interactive
Computing and Web Services .: E-Learning Environment: The e- space where learners interact with
learning environment has changed to more interactive learning learning objects and with the teacher and
environments with an advanced level of interaction as a result of the their peers in a context A real environment
development of Web services. Personal information sharing and the
based on cloud computing models whether it's on PCs, tablets, or II. mobile phone can synchronize with
laptops. The main applications of cloud computing and Web 2.0 services its personal account on those servers and
that can be used and deployed within the proposed e-learning take back-up copies of the phone book or
environment will be presented as follows: addresses in the phone, but also the ability
to control, close or track the phone
Cloud computing applications, and Web services that can be employed
through the use of that service and also the
within the e-learning environment:
I Cloud service. File and sharing
I. Cloud computing applications Software as a service: There are applications: File - sharing and
many companies that offer cloud computing technology whether collaboration in real - time This service
it is web applications or storage space or even some complex connects many users at the same time and
operations, The most important applications of cloud computing offers presentations designed with
technology provided by companies are: Google Docs and Google programs such as PowerPoint, which
Docs is a cloud computing application. Through this service, makes communication between
users can use a suite of programs similar to Office programs researchers faster and easier. The most
without The service allows you to save files after you finish them famous providers of this service site http:
on your personal account and share and edit those files with / / drop. Io:
v
other people. Google provides three applications: Google
Applications of cloud computing in libraries
Documents, a text editor similar to Microsoft's Word program.
as part of the learning environment: The
With Google Spreadsheets, it is an Excel-like program that works
most important new applications that
as a presentation for presentations such as PowerPoint. Google
emerged after the spread of the concept of
Drive is a cloud storage and file synchronization service. There
cloud computing, which can benefit the
are many companies that have relied on providing more
libraries: - Dura 7 "DuraCloud: is a hosting
services such as Zoho, which offers many user applications
service focused mainly on providing
such as software Editing texts, chat programs and other useful
libraries services Provision of local
applications that can be used directly through the site.
services to libraries shared by the service
Microsoft Office 365 also provided a fee for each package with
These libraries provide maintenance costs
the Office 2010 capabilities, and Lync Which allows the user to
for their own devices. This service focuses
send messages, hold video conferencing, and direct telephone
on the provision and access not only of
calls are considered the most important cloud tools. Mobile
digital group preservation services, but
phones service: Mobile operators have also benefited both
also enables the participation of important
mobile and service providers, such as Apple and T mobile, from
historical, humanitarian and scientific
cloud computing applications. Many mobile service providers
collections with other libraries. Dura in
have provided services that allow users of certain types of
support, digital archiving, saving
phones to operate their own accounts On their servers. The
repositories, and converting a very large collection of digital images 1. Visually: The site offers customizable
Google Chrome OS: Google Chrome OS: Built to be installed in a few tools and templates to express what you
minutes on a large number of operating systems It allows the user to want if you are not an expert in graphics
use an equivalent operating interface To a large extent with the software.
browser Google Chrome is based on the concept of cloud computing
2. PiktoChart: A very easy-to-use site
only as the system is only a browser window allows the user to use all
offering almost 6 free and editable models
the applications available on the Internet and existing on the Google
in which creativity. 03 Easelly: The site
Web Store, which offers applications and programs covering all the
provides tools from icons and images to
functions you do on operating systems Regular start from writing
create a successful infographic and also
reminders and even movie production. Pixler Photo Editor: Pixlr Editor
contains free templates are adjustable.
is a professional image editor that works with high-definition design
and online image editing without installing, downloading, buying or 3. Infogram: An easy-to-use site that also
subscribing it is completely free and available to all users on all provides 6 free templates different from
browsers and operating systems and only needs Flash Flash Player those provided by other websites d.
filled in order to work on your browser. It can be used to edit images 4. Creately: This site contains a lot of tools
stored locally or from an external link and a user can register v
an such as frames, indicators and icons that
account and store his image on his account to be able to edit it at any help to create a successful infographic.
time. The possibilities of the program are comparable in strength to
Conclusions
Adobe Photoshop but for free and from anywhere.
And Recommendations:
Video Editor Jay Cut: Jay Cut is a program that enables users to create
videos without downloading and bothers. It works on the Internet and E-learning evidence faces some
does not need special specifications to work. It requires only a browser challenges, especially in the light of
and Flash player. Flash Player is loaded with many functions in the increased user setup, rapid development
production and editing of movies, including recording from the web of services and applications available over
camera Export movies directly to YouTube and is available in many the Internet, and the task of updating
languages for ease of use. software, hardware and storage space.
The best solution is to use new technology
Infographics: is an innovative art of converting textual information and
(integration between cloud computing and
graphics into images and graphics, making it easier for you to
web services 2)) to meet these challenges
understand and understand them. It has appeared in the Infographic
and access to a highly interactive and
with its various designs in an attempt to create a new visual form for
accessible learning environments well as
assembling and presenting information or conveying data in an
the development and ease of use and
attractive form to the reader. Sites offered include:
affordability. This is what cloud computing
technology provides. It provides the infrastructure for this
environment (storage space and devices), also allows development
platforms and the operation of applications that are hosted on the
infrastructure of the provider, as well as the use of software as a
service through computing applications Clouds that are integrated
with web services. Therefore, the following recommendations can be
proposed: - Developing e-learning environments in the light of modern
services and applications that require registration only, which achieve
an advanced level of interaction within the learning environment. .
Develop mechanisms to preserve the privacy and confidentiality of
data and files of the learning environment and learners. - Setting
standards for the design of cloud learning and its environments.

v
Abstract The Data Mining techniques are used
to realize the hidden and unknown
Cloud Computing is resourceful in which computing resources are made information from the database.
available on- demand to the user as required. Data processing may be a Data Mining could be a key step
process of discovering interesting patterns from an oversized quantity of in knowledge discovery.
data. The difficulty is in assembling these data and carrying out computations
to get the significant information. Data processing techniques and It's the utilization of specific algorithms to
applications are often effectively employed in cloud computing setting. extract patterns and knowledge from the
Data mining and also the cloud computing are thought of as major data. The goal of data mining is to convert
technologies. The data mining in cloud computing permits organizations the massive volume of data into useful
to centralize the management of software and data storage. The information and knowledge.
information in this paper provides a review of assorted data processing 1.2. Cloud Computing
techniques and different types of algorithms in cloud computing which
might be used for resource sharing. Cloud computing allows end users, tiny and
medium-sized users to gain
1. INTRODUCTION resources that are computational in nature.
v Besides, it permits the users to use
1.1. Data Mining
resources within the cloud and satisfy
Data Mining may be a logical method that is used to search through a large their requirements. Cloud user will access
amount of information so as to seek out helpful data by using the following this data anytime anyplace within the world
techniques. They are: Clustering, Classification, Association, Regression, without any loss because of system failure.
Attribute Importance, Anomaly Detection and Future extraction. The cloud services are a platform as
Data Mining is a part of the larger framework, referred as information services (PaaS), Infrastructure as service
discovery within the database that covers a complicated method from data (IaaS), and software as service (SaaS).
preparation to knowledge modeling. Infrastructure as a Service: IaaS is
a service that is provided to the consumer
Components of Data Mining:
for storage, processing, networks and also
Association – looking for patterns wherever the events are associated with the computing resources where the
another event. Sequence analysis – looking for a pattern wherever one patron will be ready to deploy and run
event leads to another event. the software which includes OS (operating
Classification – looking for a replacement pattern. Clustering – looking system) and application.
out a bunch of patterns that don't seem to be antecedently known. Platform as a Service: PaaS could be
Forecasting – Finding patterns of data which will result in predict the a service that is provided to the consumer
future. wherever he will produce an application
using programming languages, services, and tools that are supported by implausible issue to be concerned by
the supplier. information mining. The Microsoft suite of
Software as a Service: SaaS could be a service that is provided to the cloud based administrations presents
consumer who will use the application type the cloud infrastructure. another specialized sneak peak of Data
The consumer doesn't have any worry regarding the way to manage or Mining within the "Cloud" as "DMCloud".
control the cloud infrastructure. DMCloud permits you to perform
The Cloud is Virtualized data center which may manage or control itself. some basic data mining
Cloud is virtual computing resources that the cloud users will access it at assignments investment a cloud-based
any time from anyplace. Analysis Services association. The
The features of cloud computing: info (data) mining tasks include:

Analyze Key Influencers


1. It has a really massive scale. Google cloud computing already has more
than a hundred million servers, Amazon, IBM, Microsoft, Yahoo Detect Categories
and different "cloud" all has hundreds and thousands of servers.
Fill From Example
2. The virtualization. The cloud computing permits users from any
Forecast
location, employing a kind of terminal acquisition applications. Resources
v
requested from the "cloud", instead of permanent tangible entity. Highlight Exceptions

3. High reliability. The multiple copies of data are maintained in cloud to Scenario Analysis
avoid the loss of data and to extend the reliability. The cloud computing Prediction Calculator
is more reliable than using the local computer.
The Data mining is used within completely
4. The flexibility (versatility). Cloud computing isn't for a different requisitions , for instance,
selected application, in the "cloud" can be constructed the support of the medicinal services, personnel
ever changing applications, with a "cloud" will support completely administration, math, science, in a
different applications running at the same time. different web site. Through cloud
5. The high scalability: "Cloud" size is dynamically scalable to registering data mining decreases the
meet the requirements of applications and user scale growth. jumps that keep very little organizations
from profiting off the information mining
2. DATA MINING IN THE CLOUD instruments. We investigate how the
Information mining systems and requisitions are sincerely information mining instruments like SaaS,
needed within the distributed computing ideal model. As PaaS, and IaaS are used within distributed
distributed computing is accessing into all the more in all degrees of computing to concentrate the data. This
business and experimental process, it transforms into an characteristic is utilized by individuals to
manufacture data posting and obtain knowledge hidden data structures. There is no
obtain data regarding distinctive themes via seeking provision of
in discussions and then forth. This administration is utilized by the providing correct characterization of
organizations to determine what style of data is gliding on the planet- unobserved samples that are generated
wide for their items or administrations and take activities dependent from by same potential distribution.
upon the information displayed. The data recovery commonsensible Broadly clustering has two areas based on
model through the multi-executor framework with information which it is categorized as follows:
mining during a distributed computing atmosphere has been proposed. It  Hard (clustering) clump:
is prescribed that clients would possibly furthermore guarantee that In hard clustering same
the solicitation created to the IaaS is within the extent of combined object will belong to one cluster.
information warehouse and is obvious and easy. The work for the multi-  Soft (clustering) clump: during
executor framework gets to be less demanding through the provision this clustering same
of the information mining calculations to recover serious data from the object will belong to completely
information warehouse. different clusters.
3. DATA MINING ALGORITHMS
v
Various Data Mining algorithms and techniques are used for discovering 3.3 Regression
the knowledge from the databases. Regression technique is used for
3.1 Classification prediction. Regression analysis is used
to relate the independent variables and
Classification is that the data processing technique that is most ordinarily dependent variables. Attributes are
used, that employs a group of pre-classified examples to develop a independent variables that are
model which will classify the population of records at large . The data already best-known and response
classification method involves learning and classification. In Learning variables are what we are going to predict.
the training data are analyzed by the classification rule. In Unfortunately, several real-world issues
classification, take a look at data are used to estimate the accuracy of the aren't merely a prediction. For example, it's
classification rules. If the accuracy is appropriate the principles then that terribly tough to predict if it depends
may be applied to the new data tuples. on complicated interactions of multiple
3.2 Clustering predictor variables. Therefore, to forecast
to further values more complicated
The unsupervised classification that's known as clustering or it's
techniques techniques (e.g., logistic
also referred to as exploratory data analysis in which there's no provision
regression, decision trees, or neural
of labelled data. The main aim of clustering technique is to separate
networks) are used. Neural networks may
the untagged data set into a finite and distinct set of natural and
be accustomed each classification and regression models. 2. C representative points are stored to
calculate the distance between a pair of the
3.4. Association Rule
cluster.
Association and correlation are used
3. These are determined
to establish the frequently used items from the big data set.
by initial choosing C well-scattered
This type of technique helps businesses to form certain points inside the cluster and
decisions, like catalog style, cross marketing, and client shopping behavior then diminishing them towards the
analysis. The main purpose is to find rules joined with regularly co- center of the cluster by a fraction α.
occurring items, used for market basket analysis, root-cause analysis
and cross-sell. The rationale is to provide the valuable info that describes 4. Representative points of the cluster
links between data items from an outsized volume of data. are used to calculate its distance
from different clusters.
3.5. Neural networks
The neural network could be a set of connected input/output units and
3.7. BIRCH (Balanced Iterative
every connection contains a weight present with it. At learning phase, it is Reducing and Clustering using
ready to predict the right category labels of the input tuples by adjusting Hierarchies)
v
weights. Neural networks are used to derive BIRCH algorithm could be a kind of
the meaning from sophisticated data and it can be used to extract hierarchical of clustering algorithm. It
patterns. These are well matched for continuous-valued inputs and is essentially used for significantly very
outputs. One of the best data processing techniques are Neural networks large databases as a result of it
that are used for characterizing patterns or trends in large set of data reduces the quantity of input/output
and it's very appropriate for prediction or prognostication desires. operations. Clustering could be a one
3.6. CURE Algorithm among the data mining algorithm that is
employed to cluster the similar objects in
Cure is an agglomerative kind hierarchical clustering algorithm uses order that the data will be known simply.
portioning of the data set. A mixture of partitioning and random Therefore, a set of objects that are
sampling is employed to handle an outsized database. In this coherent internally is a
algorithm, every partition is partly clustered that is 1st partitioned off from cluster, however clearly dissimilar to the
the drawn sample of datasets. Partial clusters objects belonging to alternative clusters.
are nonetheless clustered to get desired clusters.
3.8. K- means Clustering
Algorithm
Algorithm It is one amongst the
1. Start considering each of the inputs as a separate cluster and simplest unsupervised learning algorithms
every ordered step mix the closest pair of clusters.
that are quite efficient in solving complex clustering issues. The
procedure employs a simple and easy way to categorize a given data set
into a specific variety of clusters. K-means clustering algorithmic
program is used to cluster the varied observations that are associated
with one another without having any idea concerning the relationships
existing among them. Some feature vectors in an n dimensional space
may be used to represent the objects, where n suggests that the
whole range of the features that are being used for the description of the
clusters. Once it's done, K-points can be selected by the algorithm within
the vector space. These k-points become initial centers of the cluster.
Then all objects are going to be allotted to the middle points that are at a
minimum distance from them. This method is going to be repeated
until the converging of the process.

4. CONCLUSION
The users are permitted to retrieve information virtually by v Cloud
Computing at any time from anyplace. The data mining in cloud
computing permits the organization to centralize with the
assurance of efficient, reliable and secure services for their users.
Searching for frequent patterns within the database is one among the
foremost vital data processing problems. Here we explore how data
processing algorithms and techniques are utilized in cloud computing to
extract the information. The main issue with data processing technology
is that the space needed for the item set and their operations
are very large. If we combine the data mining techniques with cloud
computing atmosphere, then we are able to rent the area from the
cloud suppliers on demand.
ABSTRACT (for example, stockpiling) and programming, since time-sharing
Cloud computing alludes to high adaptable registering applications, utilities imagined in 1960s, arrange PCs in 1990s and business
stockpiles and stages as a support of organizations, people and lattice registering to cloud computing in later years. Cloud Today
governments. In this manner, SMB (Small and Medium Business) cloud administrations give membership or pay-per-utilize based
associations are adjusting cloud computing administrations step by administration; the administrations give over the Internet
step to spare expense and to build effectiveness in their business progressively, in which expands fundamental IT abilities into
condition. While cloud benefit advantages and power are vigorous territory. The SMB organizations are understanding that
fathomable, however now more worry about security in cloud essentially by taking advantage of cloud condition they can
computing "What amount secure is cloud computing condition?". increase quick access to best business applications offices and
Noticed that security is one of the fundamental boundary for drastically support their asset foundation at extremely least cost.
proceeding with development of cloud computing. For some real Cloud administrations are mostly center to diminish by and large
security dangers and issues undertakings and people are reluctant customer side prerequisites (equipment and programming) and
to convey their information and applications in cloud condition. In multifaceted nature.
this paper, the fundamental goal is to distinguished significant 2. SECURITY RISKS IN CLOUD SERVICES
security dangers and issues those are have to consider amid
By and large cloud computing gives powerful advantages in IT
sending and advancement of administrations in cloud and the path
world as respect of their gainful qualities and administration
how to alleviate those security dangers and issues. In any case, it v
models. In any case, it isn't totally anchor and hazard free as far
is critical to realize that, cloud computing isn't uncertain
as information security challenges as like some other
principally, it simply should be overseen and gotten to safely.
correspondence models or administrations. Cloud execution is
1. INTRODUCTION: influenced because of security issues. Thusly, specialist
IT (Information Technology) enterprises are driving innovation to organizations are in charge of good consideration of security in
another field every now and then. The Internet is a standout frameworks and information. Administration administrations and
amongst the most mainstream innovation now-a-days by its class. administrations are authorized a few arrangements and
Presently it is on the edge of upset, where assets are all inclusive strategies to defeat such issues, for instance: virtualization,
interconnected. Subsequently, assets can be effectively shared and verification components and cryptography systems, yet those
overseen from anyplace and whenever. advancements and techniques have a few vulnerabilities in the
condition of craftsmanship executions. To examination and
Cloud computing is the principle component of this standard that distinguish fitting security dangers are indispensable, expect
gives a substantial stockpiling region where assets are accessible execution scope for observing and evaluating in cloud condition.
from wherever to everybody as an administration as opposed to as To comprehend and relieve security dangers and issues are vital
an item. All through in the historical backdrop of software advance forward for anchoring cloud computing. Whenever
engineering different endeavors have been made to discharge information, web applications and administrations are being
clients from the necessities of PC equipment, facilitated in cloud condition by specialist organizations,
control of these are no longer in their grasp to oversee; here activity administration, change administration and outsider
additionally emerge a few issues about free of control to anchor administration are being appraised to some degree vital to
information.
relieve dangers as indicated by 58.3%, 50.0% and 50.0%.
What’s more, other. Cloud administrations are shared foundation to Cloud computing and virtualization are basic hazard territory
build potential vulnerabilities as far as unapproved information get recorded in "Table1.
to, which worry about information protection, character Table 1. Cloud Computing Risks
administration, verification, consistence, privacy, uprightness,
accessibility, encryption, web convention (IP) vulnerabilities (a large
portion of the cases IP is un-believed which permits man in the
center assault), organize security and physical security. Some
different issues are likewise need to trouble separated from
security, for example, SLA (benefit contract between specialist
organization and buyer) and outsider administration, execution,
virtualization dangers, absence of gauges and inspecting techniques
and consistence laws and directions. There are some significant
dangers identified with cloud security appeared in 'Fig 1'. The 3. SECURITY ISSUES IN CLOUD SERVICES
numbers speak to need as indicated by their events shape 1 to 10. Cloud
v computing administration models are SaaS, PaaS and

A meeting report dependent on particular security dangers territory IaaS, which gives programming as an administration, stage as
demonstrated that information and data security is the real hazard an administrations and foundation as a support of end clients
region in cloud computing condition as indicated by 91.7% of the or clients. These three administration models are based over
respondents. About 66.7% respondents recognized that calamity one another, as appeared in "Fig. 4"; thus their abilities are
recuperation is the second most astounding basic hazard zone in acquired and in addition security issues and dangers.
cloud. Be that as it may,

Fig 1: Cloud computing risks


Along these lines, specialist organizations are not have the capacity To sniff arrange parcels a gatecrasher can make utilization of
to take care just piece of it, as opposed to all in all to give secure information bundle to break down shortcoming in system
condition. In this piece of this paper unmistakably show significant security setup. Aggressors can get entrance applications and
security issues dependent on these administration models and what information through hacking, for example, some sort of remote
should be tended to by actualizing fitting countermeasures. access system and infusion (SQL and some awful order)
I. Security issues in SaaS: In term of SaaS, a purchaser needs to vulnerabilities. DoS (Denial of Service), DDoS (Cloud DoS), man
rely upon the specialist organizations for information security and in the center assaults, long range interpersonal communication
specialist co-ops must be in charge of giving legitimate security assaults and some unapproved assaults makes grind security
system to ensure information and applications. In this model issues in cloud.
information is being put away in cloud alongside others organizations o Data Confidentiality: Privacy and secrecy issues are take set
or people information. The cloud specialist organizations may when information shares between different clients, gadgets
duplicate information in different spots for information accessibility and applications. Here multi-tenure and performing various
and effectiveness. Therefore, there are some security issues tasks (asset sharing and sharing handling assets: CPU-Central
emerge, for example, how is being information put away and where, Processing Unit) shows various privacy dangers and dangers.
what kinds of security is being accommodated information control Information privacy in cloud condition identified with client
and capacity. There are some key security fundamentals should be validation.
considered amid SaaS organization and improvement. There are: v
II. Security issues in PaaS: The main purpose of this model is
Data Security: When endeavor touchy information are put away in to protect data. In this model, service provider gives possible
cloud, sellers ought to give physical and sensible security, secure command of control such as: OS (Operating System) platform,
program development tools and storage area, to build
access approaches and some extra security checks because of
application or program on top of service platform by using
security vulnerabilities in applications and worry about noxious resources. Even though some controls are given to the clients,
workers, who can abuse shortcoming in information security but still need to consider and control some security issues
demonstrate. Information authority over cloud administrations make below the application levels such as: network and host
hard to ensure and uphold data fraud and digital wrongdoing security. intrusion. The service providers have to assure against
possible use of outage and data remain inaccessible between
Sharing assets over numerous spaces and disappointments of
different applications. Another aspect of security issue needs
information reinforcement additionally emerge a few information to consider that load balancing across on platforms. The
spillage. vulnerabilities in the cloud computing environment are not only
related to web related applications but also machine to machine
Network Security: In cloud condition information are being service oriented architecture applications (SOA). It is noted
exchanged over the Internet, hence information stream security is that, SOA applications are progressively more deployed in
an imperative issue to maintain a strategic distance from spillage of cloud.
data. III. Security issues in IaaS: Cloud computing combines
virtualization technologies are creative way to provide better
IT services to consumers. Due to rising
Virtualization technology poses some security issues for Data moving to any authorized place you need it, in a form that
control over the owner of data regardless of physical location. any authorized application can use it, by any authorized user,
Various security issues are arise to deploy models in IaaS. on any authorized device. Data integrity requires that only
Private cloud environment creates fewer security risks authorized users can change the data and Confidentiality
compared to public cloud. The cloud concept implemented just means that only authorized users can read data. Cloud
over the Internet, so whatever security issues and threats are computing should provide strong user access control to
facing in the Internet, strengthen the licensing, certification, quarantine and other
for cloud services need to consider as well. Infrastructure is aspects of data management. In the cloud computing, the cloud
not only appropriate for hardware resources, where data is provider system has many users in a dynamic response to
being reside or processed, but also the way data are being changing service needs. The users do not know what position
transmitted over the media from source to destination over the data and do not know which servers are processing the
the open network. There are some possibilities that data can data. The user do not know what network are transmitting the
be routed through intruder’s network or infrastructure. data because the flexibility and scalability of cloud system. The
4. CLOUD SECURITY PROBLEM user can’t make sure data privacy operated by the cloud in a
The cloud system is running in the internet and the security confidential way. The cloud system can deploy the cloud center
problems in the internet also can be found in the cloud system. in different area and the data can be stored in different cloud
The cloud system is not different the traditional system in the node. The different area has different law so the security
PC and it can meet other special and new security problems. management can meet the law risk. Cloud computing service
the biggest concerns about cloud computing are security and must
v
be improved in legal protection.
privacy. The traditional security problems such as security
vulnerabilities, virus and hack attack can also make threats to CONCLUSION
the cloud system and can lead more serious results because This paper illustrates cloud concepts and demonstrates the
of property of cloud computing. Hackers and malicious cloud capabilities such as scalability, elasticity, platform
intruder may hack into cloud accounts and steal sensitive data independent, low-cost and reliability. The security problems in
stored in cloud systems. The data and business application are the cloud system are discussed. Cloud computing has a very
stored in the cloud center and the cloud system must protect fast pace of development and shows good prospects and great
the resource carefully. Cloud computing is a technology potential. The cloud computing is related to many areas of
evolution of the widespread adoption of virtualization, service information management and services. The data privacy issue
oriented architecture and utility computing. over the Internet becomes more prominent than the traditional network
and it includes the applications, platform and services. If the because the data in the cloud computing environment is
systems meet the failure, fast recovery of the resource also is greatly dependent on the network and server. There are many
a problem. The cloud systems hide the details of service customers who mistrust the security and privacy of cloud
implementation technology and the management. The user computing customers and they do not want to move the data
can’t control the progress of deal with the data and the user into the cloud platform from the company or private system.
can’t make sure the data security by themselves. The data These problems have hindered the development of cloud
resource storage and operation and network transform also computing and the security issue is the core problem. The
deals with the cloud system. The key data resource and privacy cloud computing provider must make variety of measures to
data are very import for the user. The cloud must provide data protect the security in order to effectively solve these
control system for the user. The data security audit also can problem.
be deployed in the cloud system.
v
Abstract :Cloud is the online stockpiling administrations with solid their information accurately. Numerous
information access far and wide. The cloud framework is kept up by the systems managing the honesty of
outsider stockpiling framework. Anyway the capacity of information at redistributed information without a
the outsider server won't fulfill the trust-commendable information neighborhood duplicate have been
stockpiling. To beaten this, Trusted Party Auditor (TPA) is permitted to proposed under various framework and
pursue an approaches and system to check the trustworthiness of the security models up to now. The most
dynamic information stockpiling in the cloud. In this paper, the capacity noteworthy work among these
process is expanded by a novel open examining system. Also, investigations is the PDP (provable
actualizing the examining system give the multi-client confirmation information ownership) model and POR
process, where TPA play out various examining process at the same (verification of hopelessness) show, which
time. This gives an enhanced memory use and gives confided in were initially proposed for the single-
evaluating procedure to the clients. Watchwords: Public examining, server situation. Taking into account that
confided in gathering reviewer, cloud, Confirmation. records are generally striped and
repetitively put away crosswise over multi
Keywords: Public auditing, trusted party auditor, cloud, Verification
servers or then again multi-mists,
v
investigate trustworthiness check setting
Presentation: Distributed storage is currently acquiring notoriety with various repetition plans, for example,
since it offers an adaptable on-request information redistributing
replication, deletion codes, and, all the
administration with giving advantages: alleviation of the heap costs for
capacity administration, all-inclusive information access with area more as of late, recovering codes. In this
autonomy, and evasion of capital use on equipment, programming, and paper, we center around the uprightness
individual systems for upkeeps, and so on. Nonetheless, this new check issue in recovering code-based
worldview of information facilitating administration moreover brings distributed storage, particularly with the
new security dangers toward client's information, subsequently
useful fix technique. Comparative
making people or on the other hand enterpriser still feel reluctant. It
is noticed that information proprietors lose extreme authority over the investigations have been performed
destiny of their redistributed information; in this way, the rightness, independently also, freely. Expanded the
accessibility what's more, uprightness of the information are being put single-server CPOR scheme(private form
in danger. On the one hand, the cloud benefit is normally looked with a in to the recovering code scenario
wide scope of interior/outside enemies, who might noxiously erase or
structured and actualized a Data Integrity
degenerate clients' information; on the other hand, the cloud specialist
co-ops may act deceptively, endeavoring to shroud information Protection(DIP) conspire for FMSR based
misfortune or defilement and asserting that the records are still distributed storage what's more, the plan
effectively put away in the cloud for notoriety or money related is adjusted to the thin-cloud setting. Be
reasons. Along these lines it bodes well for clients to execute a that as it may, them two are intended for
productive convention to perform periodical check of their re-
private review, just the information
appropriated information to guarantee that the cloud in fact keeps up
proprietor is permitted to confirm the uprightness and fix the defective 4. Fault tolerance is not provided.
servers. Considering the substantial size of the redistributed
information and the client's compelled asset ability, the assignments of 5. Only single copy of data is stored
examining and reparation in the cloud can be imposing and costly. The 3. Proposed Work
overhead of utilizing distributed storage ought to be limited as much as Here we are providing better security in
conceivable with the end goal that a client does not have to perform as owner’s upload side as well as on the
well numerous tasks to their re-appropriated information (in extra to download side. For better security client
splitting that single file into different
recovering it). Specifically, clients might not have any desire to go blocks and providing a unique identification
through the multifaceted nature in checking and reparation. The number for each block. Client: An entity,
reviewing plans in suggest the issue that clients need to continuously which has large data files to be stored in
remain on the web, which may obstruct its appropriation in conceivable the cloud and relies on the cloud for data
with the end goal that a client does not have to perform as well maintenance and computation, can be
either individual consumers or
numerous tasks to their redistributed information (in extra to
organizations. Cloud Storage Server (CSS):
recovering it). Specifically, clients might not have any desire to go An entity which is managed by Cloud
through the intricacy in confirming and reparation. The examining plans Service Provider (CSP), has significant
in infer the issue that clients need to continuously remain on thev web, storage space and computation
which may hinder its selection in conceivable with the end goal that a resourceto maintain the clients’ data.
Trusted Party Auditor (TPA): An entity,
client does not have to perform as well numerous tasks to their which has expertise and capabilities that
redistributed information (in extra to recovering it). Specifically, clients clients do not have, is trusted to assess
might not have any desire to go through the intricacy in confirming and and expose risk of cloud storage services
reparation. The examining plans in infer the issue that clients need to on behalf of the clients upon request. Proxy
continuously remain on the web, which may hinder its selection in for agent: semi-trusted and acts on behalf of
the data owner to regenerate
recovering codes. Plus, we "encode" the coefficients to ensure authenticators and data blocks on the
information security against the reviewer, which is more lightweight failed server during the repair procedure.
than applying the confirmation dazzle strategy and information daze 3.1 Benefits
technique. A few difficulties dangers immediately emerge in our new We motivate the public auditing system of
framework display with an intermediary, and security examination data storage security in Cloud Computing,
and propose a protocol supporting for
demonstrates that our plan functions admirably with these issues.
fully dynamic data operations, especially
Drawbacks to support block insertion, which is
missing in most existing schemes. We
1. Especially to support block insertion, which is missing in most
extend our scheme to support scalable
existing schemes.
and efficient public auditing in Cloud
2. Authentication was provided only at the time of upload not at the
Computing
time of download.
3. Data integrity is not maintained. 3.2 System Design
This system contains the following entity: Potentially brought by the periodic
auditing
Data
andowner
accidental repairing, the
data ownersCloudresort to the TPA for
Third Party Auditor(TPA) integrity verification and delegate the
reparation
Proxytoagent
the proxy
Algorithm and description
The user can also encrypt data before
outsourcing it into the cloud server
with encryption techniques. As a
significant research area for system
protection, data access control has
been evolving in the past thirty years
and various techniques have been
developed to effectively implement
v
fine-grained access control, which
Fig. 1. System design that contains cloud, owner, proxy with auditing allows flexibility in specifying
functionality. The data owner owns large amounts of data files differential access rights of individual
to be stored in the cloud. And the cloud which is managed by users. Traditional access control
the cloud service provider, provide storage service and architectures usually assume the
have significant computational resources The third party
data owner and the servers storing
auditor who has expertise capabilities to conduct public
audits on the coded data in the, the TPA is trusted and its the data are in the same trusted
audit result is unbiased for both data owners and cloud domain, where the servers are fully
servers. A proxy agent who is semi trusted and acts on behalf entrusted as an omniscient reference
of the data owner to regenerate authenticators and data monitor responsible for defining and
blocks on the failed servers during the repair procedure. The
enforcing access control policies This
data owner is restricted in computational and storage
resources compared to other entities and may become offline assumption however no longer holds
even after the upload procedure. The TPA and proxy are much in cloud computing since the data
more powerful than the data owner but less than the cloud owner and cloud servers are very
servers in terms of computation and memory capacity. To likely to be in two different domains.
save resources as well as the online burden
With the character of low maintenance, cloud computing enable a user to sign a message so
provides an economical and efficient solution for sharing that a ring of possible signers (of
group resource among cloud users. Unfortunately, sharing which the user is a member) is
data in a multi-owner manner while preserving data and identified, without revealing exactly
identity privacy from an untrusted cloud is still a challenging which member of that ring actually
issue, due to the frequent change of the membership. In this generated the signature . In contrast
paper, we propose a secure multi-owner data sharing scheme, to group signatures, ring signatures
named Mona, for dynamic groups in the cloud. By leveraging are completely ad-hoc and do not
group signature and dynamic broadcast encryption require any central authority or
techniques, any cloud user can anonymously share data with coordination among the various
others. Meanwhile, the storage overhead and encryption users (indeed, users do not even
computation cost of our scheme are independent with the need to be aware of each other)
number of revoked users. In addition, we analyze the security furthermore, ring signature schemes
of our scheme with rigorous proofs, and demonstratev the grant users ne-grained control over
efficiency of our scheme in experiments. the level of anonymity associated
with any particular signature. This
3.4 Ring signature
paper has two main areas of focus.
Holomorphic Authenticators Ring Signatures Rijndael First, we examine previous definitions
Managed Suppose that a group of entities each have of security for ring signature
public/private key pairs (PK1, SK1), (PK2, SK2),...,(PKn, SKn). schemes and suggest that most of
Party i can compute a ring signature σ on a message m, on these prior definitions are too weak,
input (m, SKi, PK1,..., PKn). Anyone can check the validity of a in the sense that they do not take into
ring signature given σ, m, and the public keys involved, PK1, ... , account certain realistic attacks. We
PKn. If a ring signature is properly computed, it should pass propose new definitions anonymity
the check. On the other hand, it should be hard for anyone to and un-forget ability which address
create a valid ring signature on any message for any group these threats, and give separation
without knowing any of the secret keys for that group. Ring results proving that our new notions
signatures, first introduced by Rivest, Shamir, and Tauman, are strictly stronger than previous
ones. Second, we show the first
constructions of ring signature schemes in the standard corresponding data file in the
model. One scheme is based on generic assumptions and server storage system’s the secret
satisfies our strongest definitions of security. Two additional key conversion using the Share Key
schemes are more recent, but achieve weaker security Gen (SKA, t, m). This algorithm shares
guarantees and more limited functionality. the secret key SKA of a user to a set
4. Implementation Methodology of key servers, this key was
User registration generated and sent to the registered
Mail alert process client’s mail id as per the notifications
Block insertion or block tag which I have received from your end

4.1 User registration Users 4.3 Block insertion or Block tag


Splitting the source content into 9
Can use them from anywhere at any time. For example, the different blocks and have to give a tag
email service is probably the most popular one. Cloud for that all blocks for client
computing is a concept that treats the resources on the identification, here that user defined
v
Internet as a unified entity, a cloud .Users just use services tags are going to convert in to a
binary value that’s via ASCII table
without being concerned about how computation is done and
using Horner method. Dividing of
storage is managed. In this paper, we focus on designing a these blocks makes difficult for
cloud storage system for robustness, confidentiality, and attacker to predict the combinations
functionality. A cloud storage system is considered user also and the generated ASCII value
interface entry level creation in this module. A user should acts as a metadata key value and
each block is send along with the
register their details first such as their name, email id, metadata key
mobile no, and an id for that particular client this is used to 5. Conclusion
avoid the duplication of entries in this application. From this the providing preserving
public auditing for regenerating code
4.2 Mail Alert Process
based cloud storage has been
The Uploading process of the user is first get the secret key implemented. Where the data owners
in the corresponding user email id and then apply the secret are privileged to delegate TPA for
checking entitled their data validity.
key to encrypted data to send the server storage and To protect the original data privacy
decrypts it by using his secret key to download the against the TPA, we randomize the
coefficients in the beginning rather than applying the blind
technique during the auditing process. Determining that the
data owner cannot always stay online in practice, in order to
keep the storage available and verifiable after a malicious
corruption, we introduce a semi-trusted proxy into the
system model and provide a privilege for the proxy to handle
the reparation of the coded blocks and authenticators. To
better exact for the regenerating-code-scenario, we design
our authenticator based on the BLS signature. This
authenticator can be efficiently generated by the data owner
simultaneously with the encoding procedure. Additional
analysis shows that our scheme is provable secure, and the
performance evaluation shows that our scheme is highly
effective t and can be feasibly integrated into a regenerating-
code-based cloud storage system.

v
Content eyeOS lets you upload your files and work
with them no matter where you are. It
 INTRODUCTION
contains applications like Word Processor,
 Examples of cloud operating systems
Address Book, PDF reader, and many more
 Eyeos
developed by the community eyeOS is all
 The Goals for eyeOS
about centering work and amusement in a
 Architecture of eyeos single place. eyeOS is about removing
compatibility issues between applications
 How to installing eyeos and operating systems everywhere. eyeOS
is available in 30 translations. And is used
REFERENCES
privatively and professionally through out
INTRODUCTION the world. rather it is used for public
A cloud operating system is a kind of operating system prepared to environments, schools, small and large
operate within cloud computing and virtualization environments. A cloud companies alike or a way to share data
operating system manages the operation, execution and processes of with your family. eyeOS has a use in our the
virtual machines, virtual servers and virtual infrastructure, as well as the
digital life
back end hardware and software resources. Acloud operating system v
may also be called a virtual operating system. The Goals for eyeOS:

Examples of cloud operating systems  . Being able to work from


everywhere, regardless of
 EyeOS whether or not you are using a full
 Joli OS featured, modern computer, or a
 Easy Peasy completely obsolete PC.
 Google Chrome OS  Sharing resources easily between
different work centers at company,
 Osw3
or working from different places
 Own cloud and countries on the same
projects.
Eyeos  Always use the same applications
with the same open formats, and
eyeOS is an open source web desktop depend on the cloud computing forgetting the usual compatibility
concept. It is written in PHP, XML, and Javascript. It work as a problems between office suites
platform for web applications written .using the eyeOS Tools. It and traditional operating systems.
includes a Desktop environment with 67 applications and system  Being able to continue working if
you have to leave your local
utilities. It is accessible by portable devices via its mobile front end.
computer or if it justcrashes,
without loosing data or time: Just log in to your eyeOS from another Extract eyeos zip file in htdocs folder
place and continue working.

Architecture of eyeOS structure is divided into 4 parts:


Kernel: unify the system services..
Sevices:functions of the lower level.
Library:do not handle low level tasks (such as files, users or
processes), instead they
make the development of applications easier.
Applications:able to call a function of the any part.

Architecture of eyeos
Step 4

Open xampp control panel application

How to installing eyeos


step 1
Step 5
Download xampp from
Start apache and mysql server
https://www.filehorse.com/download-xampp/10214/ and install it
Step 2
Download eyeos from
https://sourceforge.net/projects/eyeos25opensour/
Step 3
Step 9
Step 6 Finaly

Open following link in browser localhost/eyeos/installer

REFERENCE
Step 7
Logging in https://en.wikipedia.org/wiki/EyeOS

 eyeoscloudoperatingsystem-
phpapp02 (1).pdf
 Developer manual.pdf
 Ieee Computer society webos
article.pdf

Step 8
If you creat a new count
Outline  The New York stock exchange
generates about 4 terabyte of data
• Growth of big datasets per day
• YouTube had around 80 petabytes of
• Introduction to Apache Hadoop and Spark for developing applications storage in 2012

• Components of Hadoop, HDFS, MapReduce and HBase • Internet Archive stores around 19
petabytes of data
• Capabilities of Spark and the differences from a typical MapReduce
solution Cloud and Distributed Computing

• The second trend is


• Some Spark use cases for data analysis
pervasiveness of cloud based
storage and Computational
Growth of Big Datasets resources
• Internet/Online Data
– Clicks - For processing of these big
– Searches datasets
– Server requests
– Web logs v • Cloud characteristics
– Cell phone logs
– Provide a scalable
– Mobile GPS locations
standard environment
– User generated content
– Entertainment (YouTube, Netflix, Spotify, …) – On-demand computing
• Healthcare and Scientific Computations
– Genomics, medical images, healthcare data, billing data – Pay as you need
• Graph data
– Telecommunications network – Dynamically scalable
– Social networks (Facebook, Twitter, LinkedIn, …) – Cheaper
– Computer networks
• Internet of Things Data Processing and Machine learning
– RFID Methods
– Sensors
Data • Data processing (third trend)
• The Large Hadron Collider produces about 30 petabytes of data per
yearFacebook’s data is Data Processing ETL
(extract, transform,
• growing at 8 petabytes per month
load)
– Traditional ETL (extract, transform, load) • Shared Environment

– Data Stores (HBase, ……..) • Provides Value

– Tools for processing of streaming, multimedia & batch data • Cost

– Data processing (third trend) Apache Hadoop Basic Modules

– Machine Learning (fourth trend) * Hadoop Common


– Classification * Hadoop Distributed File System
(HDFS)
– Regression
* Hadoop YARN

Working at the Intersection of * Hadoop MapReduce


these four trends is very
exciting and challenging and
require new ways to store and v
process Big Data

– Clustering
Hadoop HDFS
– Collaborative
• Hadoop distributed File System
– Filtering (based on Google File System
(GFS) paper, 2004)
Hadoop Ecosystem
– Serves as the distributed
file system for most tools
in the Hadoop ecosystem
• Enable Scalability
– Scalability for large data
– on commodity hardware sets
• Handle Fault Tolerance – Reliability to cope with
• Can Handle a Variety of Data type hardware failures

– Text, Graph, Streaming Data, Images,… • HDFS good for:


– Large files • computing/systems concepts

– Streaming data – examples: multithreads,


synchronization
• Not good for: mechanisms (locks,
semaphores, and
– Lots of small files
monitors )
– Random access to files
– incorrect use: can crash
– Low latency access your program, get
incorrect results, or
HDFS severely impact
performance
• HDFS files are divided into blocks
– Usually not fault tolerant
– It’s the basic unit of read/write to hardware failure
– Default size is 64MB, could be larger (128MB) • The MapReduce programming
model greatly simplifies running
– Hence makes HDFS good for storing larger files
code in parallel
v
• HDFS blocks are replicated multiple times
– you don't have to deal
– One block stored at multiple location, also at different racks with any of above issues
(usually 3 times)
– only need to create, map
– This makes HDFS storage fault tolerant and faster to read and reduce functions

HBase, not to use for Map Reduce Paradigm

• Not good as a traditional RDBMs (Relational Database Model) • Map and Reduce are based on
functional programming
– Transactional applications

– Data Analytics

• Not efficient for text searching and processing

MapReduce: Simple Programming for Big Data

* MapReduce is simple programming paradigm for the Hadoop


ecosystem One Solution is Apache Spark
• A new general framework, which solves many of the short
• Traditional parallel programming requires expertise of different
comings of MapReduce
• It capable of leveraging the Hadoop ecosystem, e.g. HDFS, YARN, Hybrid Clouds
HBase, S3, … Cloud Exchange
• Has many other workflows, i.e. join, filter, flatMapdistinct,
groupByKey, reduceByKey, sortByKey, collect, count, first… Application Portability
– (around 30 efficient distributed operations) Private-Public
• In-memory caching of data (for iterative, graph, and machine Public-Public
learning algorithms, etc.)
• Native Scala, Java, Python, and R support
• Supports interactive shells for exploratory data analysis Spark’s Main Use Cases
• Spark API is extremely simple to use
• Streaming Data
• Developed at AMPLab UC Berkeley, now by Databricks.com
• Machine Learning
• Interactive Analysis
Directed Acyclic Graphs (DAG) • Data Warehousing
• Batch Processing
• Exploratory Data Analysis
Input Map Reduce Output • Graph Data Analysis
• Spatial (GIS) Data Analysis
• And many more
DAGs track dependencies (also known as Line age) v Usage Model
 nodes are RDDs All users sharecluster
 arrows are Transformations

Actions
• What is an action
– The final stage of the workflow
– Triggers the execution of the DAG
– Returns the results to the driver
– Or writes the data to HDFS or to a file
Industry Standard Servers

Clusterscreatedasneededfor apps/users
– for streaming, interactive, iterative and
machine learning tasks
• Changing the World
– Made data processing cheaper and more
efficient and scalable
– Is the foundation of many other tools and
software

Resources

My Spark Use Cases -Cloudera Director:


• Fingerprint Matching
– Developed a Spark based fingerprint minutia detection and
finger print matching code
• Twitter Sentiment Analysis
– Developed a Spark based Sentiment Analysis code for a Twitter v
Data set

PC and Big Data Convergence


• Clouds and supercomputers are collections of computers networked
together in a datacenter
• Clouds have different networking, I/O, CPU and cost trade-offs than
supercomputers
• Cloud workloads are data oriented vs. computation oriented and are
less Closely coupled than supercomputers
• Principles of parallel computing same on both
• Apache Hadoop and Spark vs. Open MPI

Conclusion
• Hadoop (HDFS, MapReduce)
– Provides an easy solution for processing of Big Data
– Brings a paradigm shift in programming distributed system
• Spark
– Has extended MapReduce for in memory computations

Introduction
In the late 1990s, Salesforce offered one of the
Technologies are sprawling with additions to them every day. The cloud first commercially successful
computing and IoT have become two very closely affiliated future implementations of enterprise SaaS. This was
internet technologies with one providing the other a platform for followed closely by the arrival of AWS in 2002,
offering a range of services, including storage
success. The internet includes things ( IoT ) or as the Internet refers to
and computation -- and now embracing
everything ( Internet of Everything (IoE) is a system of a the beginning databases, machine learning and other
we must know what the cloud are computing and iot then talking about services. Today, Microsoft Azure, Google Cloud
their integration. Platform and other providers have joined AWS
in providing cloud-based services to
individuals, small businesses and global
1_ Definition of cloud competing enterprises.
Cloud computing is the use of various services such as, software
development platforms, servers, storage and software over the internet 2. The definition of IOT:
often referred to the cloud. The internet of things, or IoT, is a system of
interrelated computing devices,
In general, there are many benefits and characteristics of the cloud mechanical and digital machines, objects,
computing, three of them are listed below: animals or people that are provided with
A_ The backend of the application (especially hardware) is completely
v
unique identifiers (UIDs) and the ability to
managed by cloud computing.
B_ A user only pays for services used (memory, processing time and
bandwidth).
C_ Services are scalable.
1_2 A brief history of cloud computing

Cloud computing its origin back to the 1960s, when the computer industry
recognized the potential benefits of delivering computing as a service or
a utility. However, early computing lacked the connectivity and bandwidth transfer data over a network without
needed to implement computing as a utility. It wasn't until the broad requiring human-to-human or human-to-
availability of internet bandwidth in the late 1990s that computing as a computer interacti.
service became practical. 2.1The benefits of IOT:
Benefits of IoT
The internet of things offers a number of benefits
to organizations, enabling them to:
A_monitor their overall business processes.
B_improve the customer experience.
C_save time and money.
D_enhance employee productivity.
E_integrate and adapt business models.
F_make better business decisions. CloudIoT applications in literature, with a
J_generate more revenue. focus on their specific research
challenges. These challenges are then
2_2 How the IOT works analyzed in
details to show where the main body of
An IoT ecosystem consists of web-enabled smart devices that use research is currently heading. We also
embedded processors, sensors and communication hardware to discuss what is already available in terms
collect, send and act on data they acquire from their environments. IoT of platforms–both proprietary and open
devices share the sensor data they collect by connecting to an IoT source–and projects implementing the
gateway or other edge device where data is either sent to the cloud to Cloud IoT paradigm. Finally, we identify
be analyzed or analyzed locally. Sometimes, these devices communicate open issues and future directions in this
with other related devices and act on the information they get from one field, which we expect to play a leading role
another. The devices do most of the work without human intervention, in the landscape of the Future Internet.
although people can interact with the devices -- for instance, to set
them up, give them instructions or access the data. 3_1 The benefits of integration between
The connectivity, networking and communication protocols used with Cloud computing and IOT (internet of
these web-enabled devices largely depend on the specific IoT things).
applications deployed. There are many benefits from their
v
integration which are listed below:
3 _The integration of Cloud computing and IOT (internet of
things): 1. Communication
Application and data sharing are two
Cloud computing and Internet of Things (IoT) are two very different significant features of the Cloud-based IoT
technologies that are both already part of our life. Their adoption and paradigm. Ubiquitous applications can be
use are expected to be more and more pervasive, making them transmitted through the IoT, whilst
important components of the Future Internet. A novel paradigm where automation can be utilised to facilitate low-
Cloud and IoT are merged together is foreseen as disruptive and as an cost data distribution and collection. The
enabler of a large number of application scenarios. In this paper, we Cloud is an effective and economical solution
focus our attention on the integration of Cloud and IoT, which is what we which can be used to connect, manage, and
call the CloudIoT paradigm. Many works in literature have surveyed track anything by using built-in apps and
Cloud and IoT separately and, more precisely, their main properties, customised portals.
features, underlying technologies, and open issues. However, to the best
of our knowledge, these works lack a detailed analysis of the new 2.Storage
CloudIoT paradigm, which involves completely new applications, As the IoT can be used on billions of devices,
challenges, and research issues. To bridge this gap, in this paper we it comprises a huge number of information
provide a literature survey on the integration of Cloud and IoT. Starting sources, which generate an enormous
by analyzing the basics of both IoT and Cloud Computing, we discuss their amount of semi-structured or non-
complementarity, detailing what is currently driving to their integration. structured data.The Cloud is considered to be
Thanks to the adoption of the CloudIoT paradigm a number of one of the most cost-effective and suitable
applications are gaining momentum: we provide an up-to-date picture of solutions when it comes to dealing with the
enormous amount of data created by the IoT. Moreover, it produces new C_SAaaS (Sensing and Actuation as a Service)
chances for data integration, aggregation, and sharing with third parties. - provides control logics automatically.
E_IPMaaS (Identity and Policy Management
3. Processing capabilities as a Service) - provides access to policy
IoT devices are characterised by limited processing capabilities which and identity management.
prevent on-site and complex data processing. Instead, gathered data is
transferred to nodes that have high capabilities; indeed, it is here that D_DBaaS (Database as a Service) - provides
aggregation and processing are accomplished. Тhe Cloud provides ubiquitous database management.
unlimited virtual processing capabilities and an on-demand usage mode. F_SenaaS (Sensor as a Service) -
Predictive algorithms and data-driven decisions making can be provides management for remote
integrated into the IoT in order to increase revenue and reduce risks at sensors.
a lower cost. J_DaaS (Data as a Service) - provides
ubiquitous access to any type of data.
4.New abilities
The IoT is characterised by the heterogeneity of its devices, protocols, SPECILY IN ROADS AND WHERE AND
and technologies. Hence, reliability, scalability, interoperability, WHEN When USE CARS SHOW THAT IN
security, availability and efficiency can be very hard to achieve. THIS:-
Integrating IoT into the Cloud resolves most of these issues. It provides Is expected to offer promising solutions to
other features such as ease of-use and ease-of-access, with v
low transform transportation systems and
deployment costs automobile services (i.e. Intelligent
Transportation Systems, ITS). The integration
5.New Models of Cloud with IoT technologies (such as WSNs
Cloud-based IoT integration empowers new scenarios for smart objects, and RFID) represents a promising opportunity
applications, and services Some of the new models are as follows: ACTUALLY, a new generation of vehicular
A_SaaS (Sensing as a Service) - allows access to sensor data. data-mining Cloud service can be developed
B_EaaS (Ethernet as a Service) - provides ubiquitous connectivity to and deployed FOR GET ALOT OF business ,
control remote devices. EXAMPLE OF THIS increasing road safety,
reducing road congestion, managing traffic
and parking, performing warranty analysis
and recommending car maintenance or fixing
.. Numerous vehicles possess powerful
sensing, networking, communication, and data
processing capabilities, and ALSO
INTERCHANGE information with each other
(Vehicle to Vehicle, V2V) or INTERCHANGE
information with the roadside infrastructure
such as camera and street lights (Vehicle to
Infrastructure, V2I) over various protocols,
including HTTP, SMTP, TCP/IP, WAP, and Next
Generation Telematics Protocol (NGTP) . In
this context, Ethernet and IP-based routing (being less expensive and more vehicles. Several challenges have been
flexible than related technologies) are claimed to be very important identified in literature related to this
technologies for future communication networks in electric vehicles, application scenario. The huge number of
enabling the link between the vehicle electronics and the Internet. Indeed
vehicles and their dynamically changing
they integrate vehicles into a typical IoT, and meet the demand for
number make system scalability difficult to
powerful communication with Cloud services The literature proposes
administer. Vehicles moving at different
several examples of multi-layered, Cloud-based vehicular data
speeds frequently because intermittent
platforms that merge Cloud computing and IoT technologies to tackle
communication impacting performance,
the main current challenges. These platforms aim at providing real-
reliability, the lack of an established
time, cheap, secure, and on demand services to customers, from
infrastructure makes it very complex to
different types of Clouds, This type include temporary vehicular Clouds
implement effective authentication and
(i.e. formed by the vehicles representing the Cloud data centers
authorization mechanisms, with impacts on
designed to extend the conventional Clouds in order to increase on-
security and privacy provision. Several
demand ,processing, and storage capabilities,make that if we use
challenges have been identified in literature
under-utilized facilities of
related to this application scenario. The huge
v
number of vehicles and their dynamically
changing number make system scalability
difficult to adminastor . Vehicles moving at
different speeds frequently because
intermittent communication impacting
performance, reliability, the lack of an
established infrastructure makes it very
complex to implement effective authentication
and authorization mechanisms , with impacts
on security and privacy provision.

AND THE END WE CAN SAY THIS ABSTRACT


ABOUT USE CLOUD AND IOF:

Smart energy and smart grid. IoT and Cloud


can be effectively integrate to provide
intelligent management of energy distribution
and hardship in both local- and wide-area heterogeneous environments.
The IoT nodes typically involved in this kind of processes have sensing,
processing, and networking capabilities, but limited resources. Hence,
computing tasks can be properly demanded to the Cloud, where more
complex and comprehensive decisions possibility. Cloud adoption leads to
increase the reliability by find self-healing echanisms and enables mutual
operation and participation of the users, to achieve distributed generation,
electricity quality, and demand response. Cloud computing it is possible to
analyze and process vast amounts of data and information coming from
different sources distributed along wide area networks, for the purpose of
implementation of intelligent control to objects.

v
provider interaction. It enables organizations to focus on their core
businesses rather than expending resources on computer infrastructure
and maintenance [1]. When you think about cloud computing you can
Table of Contents
1- INTRODUCTION consider your experience with email. Your
email client, if it is Gmail, Yahoo, Hotmail,
2- CLOUD COMPUTING65 and so on, it takes care of housing all of
3- VIRTUALIZATION65 the hardware and software to support
4- TYPES OF VIRTUALIZATION66 your personal account. When you want to
get to your email, you just open your web
4.1 DATA VIRTUALIZATION
browser, go to the email client and sign in.
4.2 APPLICATION VIRTUALIZATION
what you need is just having internet
4.3 NETWORK VIRTUALIZATION
access. Your email is not housed on your
4.4 SERVER VIRTUALIZATION
personal computer, you can access it
4.5 OPERATING SYSTEM VIRTUALIZATION
through an internet connection and you
5- HYPERVISOR can access it from anywhere you are such
5.1 TYPE-1 HYPERVISOR as: work, on a trip, or down the street
v
5.2 TYPE 2 HYPERVISOR getting coffee. You can access it from
6- BENEFITS OF VIRTUALIZATION TECHNOLOGY anywhere in case you have internet
access. Your email is different from
7- CONCLUSION
any program you have installed on
8- REFERENCES your personal computer or saving a
document on it. An email client is
1- INTRODUCTION similar to how cloud computing works,
except that instead of just accessing
Cloud computing is a way to use online services with reducing of various your email, you can choose to work
software and hardware maintenances for individual level and during the with any information or application
time many ideas have been created to support and develop using cloud within the cloud [2].
computing and one of them is virtualization. 3- Virtualization
2- CLOUD COMPUTING In computing, virtualization is a way to
abstract computing resources so as
Cloud computing is a way to access and share pool of configurable multiple applications can share a
computing resources over internet such as: networks, servers, storage, single physical hardware and it refers
applications, and services with minimal management effort or service to the creation of a virtual, rather
than actual, version4.4of aServer Virtualization
resource.
Virtualization has a major
It is therole
ideainofthe
hiding server's resources from server's users. The point
cloud computing technology.
of usingNormally
server virtualization is to free the client to understand and
users in the cloud computing
accomplish share
difficult details about resources of server when sharing and
the data exist in the clouds like application etc., but with usage of resource increased. Storage
virtualization they share infrastructures. Cloud providers provide virtualization is sharing of storage from
the applications with standard version to their users and in case of
multiple network storage devices into a
released new version they have to provide the latest version [3]. single storage device and using a central
4- TYPES OF VIRTUALIZATION console to handle it. In general, storage
area networks use storage virtualization
4.1 Data Virtualization [4].
In this type the user can access to the same data from different
physical positions. The data is moved to a server, mapped to its actual
location, and allow the users to access it and this makes it feasible
to scroll by the data as if reading a webpage without move it to the
user's personal computer or any other servers [4]. v

4.2 Application Virtualization


It is the ability to differentiate the operating system and the 4.5 Operating System Virtualization
application and that means that the server execute the application on It also called container-based
or any other system rather than the system which using it. The virtualization. That means same
advantage of application virtualization is a user can run unsuited operating system is used on a server
application in parallel form. Those applications can also be run which but hacks it up into components. It
are not made for the same platform that the user suing in his / her has its particular set of rules and
personal computer. access but there
4.3 Network Virtualization is one exception that it all must have
It means combines useable resources by dividing availed channel’s compatibility with the same
bandwidth in the network. Channels do not depend on each other. operating system. Open VPN is one
Also, it is feasible to redistribute each of them to a particular device or example of OS virtualization [4].
server in actual time. The idea is virtualization masking the complexity 5- HYPERVISOR
of the system by dividing the complex system into accomplishable parts,
similar to hard drive partitioning which make easy to store files [4]. It is a low-level program that allows
multiple operating systems to share a
single hardware host and it provide
system resource access [1] "What Cloud Computing?" . Amazon Web Services. 2013-03-19.
to theisvirtual
machines. HypervisorRetrieved
can be divided into .
2013-03-20
Type 1 and Type 2 hypervisor based on
[2] Alexa Huth and James Cebula. The Basics of Cloud Computing.
the different level of implementation [5].
National Institute of Standards and Technology,2011.
5.1 Type-1 hypervisor
[3] Krishna Koganti, & J.N.
It runs directly on host hardware to manage guest Operating
Chaitanya.Virtualization Technology
system and does not depend upon the operating system. It is also
in Cloud Computing Environment.
named as native or bare metal [5].
International Journal of Emerging
5.2 Type 2 hypervisor
Technology and Advanced
This type of hypervisor sits on top of an operating system. It does
Engineering, 2008.
not run unless the operating system is already running. In this type
of hypervisor, the Software virtualization is carried out because it [4] Kumar, Rakesh, and Shilpi Charu.
depends upon operating system. All end users are affected in case " AN OVERVIEW OF VIRTUALIZATION &
of operating system fails [5]. CLOUD COMPUTING" International
6- Benefits of Virtualization Technology: Journal of Modern Computer Science
v
and Applications 3(1): 42-47.
a. cost-saving, hardware-reducing and energy-saving technique. [5] Mohd Saleem , Cloud Computing
b. It makes cloud computing more efficient and ecofriendly. Virtualization, International Journal
c. New technology making life easier and better. of Computer Applications Technology
d. Isolation. and Research, 2017.
e. Sharing resources. [6] Malhotra L, Agarwal D1 and
f. Aggregation of resources. Jaiswal A2 Virtualization in Cloud
g. Dynamical resource [6]. Computing, Journal of Information
Technology & Software Engineering,
2014.
7- CONCLUSION

This research discussed the technology of cloud computing and


how utilize the idea of virtualization. Types of virtualization have
been explained and classified. The benefits of using virtualization
are listed at the end of the research and hypervisor's types included
too.

8- REFERENCES:
that include the use of cloud computing primarily on economic
institutions.
Abstract
Cloud computing is a new paradigm of computing infrastructure, a (Marston et al., 2011) "While much research
vision of computer facilities. In this search, we present an overview of is currently underway in the same
economics and cloud computing. There are a lot of studies on cloud technology, there is an equally urgent need
computing, not just clouds around the world, but their adoption is more to understand relevant work issues
pronounced in major economic organizations and institutions. surrounding cloud computing"(Marston et
However, there are significant potential impacts on IT departments in al.,2011).
these economic organizations. Cloud computing has the potential to However, like any other technology, the
fundamentally change IT and economic business organizations. application of the draw may lead to the
Therefore, the aim of this research is to ensure that the adoption of conversion of many companies and
computerized clouds and their impact on business and economy.
economic institutions to the optimum level.
At the same time, however, harmful
1- Introduction problems that may lead to insecurity for
Despite the social and economic significance of cloud computing, very
many companies, organizations and
little was been written in the economics literature that is directly on topic.
Most searches seem to appear in various parts of the computer science business outcomes lead to a low adoption
v
and to a lesser extent, the formal and informal business literature. Our rate. These problems are clearly impeding
purpose with this search is discussing its economic implications. And to the integration of IT with the cloud and
survey cloud computing literature as it relates to economic questions. adversely affect its business. We need to
Cloud computing (CC) provides flexible, viable and scalable computational address harmful issues, and more
opportunities to an organization. It aims to reduce the financial burden for
discussions will provide a more informed
many startup companies (Boss et al., 2007; Armbrust et al., 2010; Sultan,
2011; Hayes, 2008(. option for CC to deploy IT resources and
The purpose of this research is to study the effects of using cloud outsource the cloud (Nair et al., 2010).
computing in the economy and the factors that stimulate economic
companies to adopt them.
1-2- Research Objectives
The aim of this research is to highlight the
1-1- Research problem
The European report (Watch, 2008; Sondergaard Laugesen et. al., 2012) reasons and barriers to the adoption of
confirms that organizations are maximized using ICT systems in cloud computing in general and to discuss
business management. However, economic companies are struggling to economic impacts. As well as to survey
build an appropriate communication channel with suppliers and cloud computing studies as they relate to
customers, which not only leads to lack of competition with a larger
economic issues.
organization but also the loss of communications and jobs; in the worst
case, adoption of IT as part of business integration does not depend on In addition, investigate risk assessment
forcing them to Closing work (Dai, 2010). Research focused on issues factors such as security, privacy, legal
issues and compliance.
beneficiaries
How these
of therisk
impact of cloud empowerment, as they have improved
factors can affect the
newcontinued
revenue opportunities.
adoption In addition, the number of new businesses and
of cloud businesses and enterprises as ICT tools for their business businesses is increasing, new jobs are
operations. So the research question will be: What are the factors and being derived from this necessity, and
implications of cloud computing adoption in the economy (companies, more jobs are being created, resulting in
organizations,enterprises, businesses)? double benefits and growth of the
community economy and social surplus
(Filiopoulou et al., 2014).
1-3-research importance
Today, the cloud has become a powerful computing tool for businesses
and businesses around the world. Sharing computing resources, offering 1-4- Keywords:
many different services, storing and accessing applications are only some Cloud computing, Adoption, Migration,
clicks. Cloud computing is an indispensable business model as well. It can SaaS, PaaS, IaaS
help companies to develop themselves, achieve cost savings, and create List of Acronyms
a competitive environment at the same time with more jobs worldwide IT Information Technology
(Etro, 2009). The emergence of a cloud computing model is not the CC Cloud computing
business world, and it is more global than ever before, providing a cost
v
SaaS Software As a Service
reduction not only for consumers in ICT, but also for businesses and PaaS Platform As a Service
businesses. An institution that migrates information technology and the SaaS Security as a Service
data system to the cloud can use the resources required when needed, SLA Service Level Agreement
IDC International Data Corporation
rather than using proprietary infrastructure, reducing storage costs, SME Small & Medium size Enterprises
software maintenance costs, network expenses, energy and costs ERP Enterprise Resource Planning
associated with disaster recovery (Center et al.). , 2010, Center, et al., CRM Customer Relationship Management
2011). Cloud computing is usually "pay when you use", which gives users SoA Software Oriented Architecture
ATSE Australian Academy of Technological Science
the option of paying for what they use (Filiopoulou, et. al., 2014). As a result,
ICT Information & Communication Technology
adoption of cloud computing provides slow operating costs for economic
firms that want to gain a dominant market share in ICTs and create an
environment for innovation and rapid development for companies that
2- View literature (previous
need to work faster and cheaper than revenue required from voters, studies)
As rapid advances in information
Different costs from traditional models (Filiopoulou, et al., 2014). Thus, the
technology (such as cloud computing, large
economic advantage of cloud computing is to create new opportunities for data, social media, and mobile computing),
development and employment, thereby contributing to the economic the contribution of IT to the competitive
growth of a country (Etro, 2009). Cloud computing services provide advantage of an organization has been the
enormous potential for small entrepreneurs and are among the biggest subject of research for more than 50
years (Macada et al.,and2012).
gain Oha competitive
and Pinson advantage. SMEs can perform more innovative
neault (2007) dividebusiness
the literature
processes
on the
rather than thinking about technical complexity.
strategic value of information technology Outsourcing IT resources to cloud vendors
into two theoretical perspectives: "resource-focused" and "emergency- reduces corporate capital expenditure and
based". Defenders of the company's competitive advantage in the volume small business. Have limited IT budgets
of IT investment (Barney, 1991), or the quality of IT investment instead of purchasing and preparing
(Brynjolfsson and Hitt, 1996). server farms at home that require human
There is acceptable support between views. Supporting the "resource- skills and large capital investment that can
centered" view (the 1998 Wye and Broadbent Review) of "75 companies in rely on third-party cloud service providers
9 countries in 3 separate studies over 8 years" led them to conclude that for IT operations.
information technology should be considered an "investment portfolio" In addition to cloud adoption, it reduces IT
and treated as a strategic capacity. Or, in other words, IT should not be costs that lead to the elimination and
viewed as a cost center that only works to support business functions. It licensing of your devices and devices, and
should be considered a strategic resource in itself, with the potential to faster software upgrades (Armbrust et al.,
achieve a competitive advantage for the organization. 2010; Buyya et al., 2008).
Nevertheless, the literature study
describes the problem of variable,
3. Methodology uncontrollable and erasable costs, such as
The purpose of this research is to study the factors of adoption ofv cloud the absence of an appropriate migration
computing and how these factors can affect companies, institutions, and risk assessment scheme, and the
businesses and economic organizations in dealing with the cloud. Here we absence of suitable service or platform
discuss in the literature provided by the theoretical background above to models for candidate applications.
understand the cloud computing services affected as an integral part of
our IT operations on a daily basis and investigate the factors that
stimulate the corporate economy to embrace the clouds The literary study 3-2-2- Flexibility
reveals that cost is one of the most important factors for businesses And The study of literature shows that the
institutions. Cloud services conducted a survey conducted by KPMG and option of cloud clarity makes business
Gartner. This research shows that cost is the key factor behind the cloud workers more resilient. They can run
approach. In addition to cost effectiveness, there are other factors that businesses inside or outside the workplace.
stimulate companies and institutions. Through a web browser that can be
accessed for example a laptop, laptop or
3-2 factors that stimulate companies and mobile device is able to process the data
and then share it with the other STA for
institutions: internal or external collaboration (Sahandi
3-2- 1- Cost et al., 2012; Blaisdell, 2012). Our survey also
Cloud computing not only saves a lot of cost, it also helps increase suggests that corporate economic
business continuity and agility. Many projects need to adopt this innovative executives prefer the option of cloud
technology because of current economic constraints (Mell and Grance, computing that helps increase work
2009; Aljabre, 2012, Sultan, 2011). To adopt cloud computing that provides efficiency (Iyoobet al.,2013). They are
the latest technology and provides the tools to compete with competitors transforming IT from traditional IT as an IT
product into a service. This provides
tremendous space for resource 3-2-6- Service models
management and makes scalability and ease of use of information
Cloud service models offer significant
technology (Boss et al., 2007).
potential benefits to economic institutions,
so it is necessary to understand models
3-2- 3- Rapid deployment that are best suited to business
A reference to the Cloud Enterprise study, which provides rapid
requirements (Jelleaty and Monzer, 2012;
dissemination of its IT resources, such as applications and data that can
be web hosting, data backup, or software testing (Varia, 2008; Ahronovitz Saleem, 2011; Singh and Seehan, 2012;
et al., 2011). Economic companies do not need to wait a month or a week Babar and Chauhan, 2011). We conclude that
for installment. The main advantage that businesses and small businesses SaaS is the most appropriate service
can achieve is the elimination of incremental costs (Mell and Grance, model.
2009). In addition, rapid deployment reduces the infrastructure used and
builds a private data center infrastructure and eliminates the need to Economic institutions show the interest
manage and maintain IT operations at home. they can use, for example in Google Docs,
Sheets, or GMail. Economic institutions
may need to integrate their business with
3-2- 4- Scalability SaaS, PaaS or IaaS, or a combination of
According to the literature, we found that one of the major featuresvof the these models (Singh and Seehan, 2012;
cloud is its scalable capacity where resources can be increased or Wyld, 2010).
reduced according to business requirements (Mell and Grance, 2009; Economic institutions need to verify the
Grossman, 2009). Business demand is changing rapidly and the structure of vendors in place (Ahronovitz
forecasting of resource allocation becomes very valid for advance et al., 2011). Finally, we found that Web
verification. The scalability allows companies and economic institutions to hosting, backups, e-mail services, and data
take advantage of resources, as on demand, paying only for the resources testing and application are highly suitable
used. Innovative technology and scalable options offer economic firms the candidate applications for outsourcing
ability to compete with their competitors and remain stable in business (Kimet al., 2009; Marston et al., 2011;
(Dai, 2010; Sndergaard Laugesen et al., 2012). Ahronovitz et al., 2011). Previous studies
also show the same trend from the
perspective of companies and projects
3-2- 5- Performance that it can be of great benefit by deploying
In order to have the full potential of small cloud companies, you need to this kind of IT resources for withdrawal,
establish a high bandwidth connection that provides faster data saving money and competition.
processing and increased offerings (Kim et al., 2009; Ahronovitz et al.,
2011). Clouds can automate IT resources and there will be no need for
human intervention to manipulate data (Mell and Grance, 2009). Economic 3-2- 7- Deployment models
institutions prefer to work on mobile phones. The cloud provides access The study of previous literature reveals
to the dialup service so that the employee can access data and that final distribution models need to be
applications anytime, anywhere, anywhere (Sahandi et al., 2012). understood in order to make full use of
Increases work efficiency and improves productivity.
cloud services (Jlelaty
strong
andbackup
Monzer, and2012;
recovery process (Ahronovitz et al., 2011). Economic
Saleem, 2011; Marston
companies
et al., 2011).
mean Thethat there is no knowledge of the data stored by vendors.
lowest level of public cloud deployment from the perspective of economic Cloud computing runs the application
institutions indicates that IT resources associated with migration to this because virtual servers are often
model pose risks to a particular type of application and data. It is not wise migrated to virtual machines and if new
to expose sensitive data in this platform. The cloud provides intensive, software or software updates are
demanding computing functions that can be derived from this type of installed, it may be worrying about the
platform (Varia, 2008). The private cloud is safe but you need to manage unauthorized person who can access the
and maintain and require IT equipment that can be very expensive. Social data and tamper with the end or may leak
cloud adoption shows great interest among businesses and businesses data (Kim et al, 2009). Consumers often do
that use hardware to reduce cost, and all members of this community not get the information where the
have a common interest such as risk, commitment, etc. A hybrid cloud is geographic part of the data is placed but
suitable for companies that can publish sensitive data to a private cloud may change the decision of vendors.
and have non-important applications in tasks such as a general cloud for
non-users. (Kim et al., 2009; Marston et al., 2011). 3-2- 3- Availability
Such as the issue of security, the
3-2 Major barriers to cloud use Although availability of data shows a clear concern
The study of literature suggests that security, privacy, vendor security, from the literature study and it is
data availability, reliability, data loss, lack of infrastructure control,
v and necessary to rely on the cloud provider
data integration are a common concern for migrating IT resources to the which can guarantee the best services and
cloud system. This concern is one of the reasons that will affect the compensation also in the result of
potential approach of the cloud and the resistance of economic interruptions that occur (Ahronovitz et al.,
institutions to embrace cloud computing services: 2011). It also shows that economic
companies need to understand the
outcome that can trigger this interruption.
3-2-1 Security
Such as security.
Based on the study of literature, it indicates that security is the most
important issue for cloud adoption (Reed et al., 2011; Kim et al., 2009; Economic companies have expressed
Benlian and Hess, 2011). It also indicates that the privacy of data, and / or concern about the power cut. The concern
loss and / or lack of data control and cloud infrastructure is very is about the impact of the enterprise and
important to consider the cloud approach. Data access to the cloud may negatively affect, for example, the
outside the company must continue through the web browser and this ongoing project (Aim et al., 2009; Armbert
makes the data vulnerable to attack (Sahandi et al., 2012). Safety options et al., 2010; Karkry et al., 2013; Jialali and
should be handled carefully by the seller as our survey shows that Manzer, 2012). However, the security and
economic companies have a clear concern about the irresponsibility that reliability of data and services across the
a service provider can provide. cloud is safe and secure compared to the
enterprise data center claimed by Gartner,
a leading search engine and Google
3-2-2 Cloud services executives (Ahronovitz et al., 2011; Business
Cloud service providers need to improve network infrastructure, ensure
access by providing keys, authentication mechanisms, and maintain a
Journal, 2009). A future
they lack
study
theisskill
therefore
they face in their own organization and require further
needed to investigate
research
more, which
that helps
will helpto reduce the issue of knowledge, increase the
dependency rate and provide powerful tools for the enterprise and
economic companies ease concerns about these issues. institutions that are capable of To compete
in the market (KWO Fei, 2013; Arendt, 2008).
3-2-4- Interoperability
A reference to literature says that this factor plays a vital role in adapting 3-2- 7- Technical issues
to the cloud (Schobert and Jae et al., 2012; Kim et al., 2009; Marston et al., Cloud computing is a relatively new
2011; It also shows that interoperability, data portability and application is concept based on the literature we have
a major concern for the problems of withdrawals from economic projects. found that technical innovation lies in cloud
It is important that the application and corporate data gradually become adoption (Morgan and Conboy, 2013), which
a cloud. They also consider interoperability issues supported by suppliers includes improvements in hardware and
rather than those they can use through the platform that supports software engineering. Reducing the
internal programs and thus reduces costs. ERP and CRM are some of the number of companies and economic
candidate applications that combine small businesses and organizations institutions reduces initial costs and
close to customers who expand and manufacture their business fit. eliminates hardware purchases (Armbrust
et al., 2010; Marston et al., 2011) and
provides incentives to understand the
3-2- 5- Migration v
basic technical concept that makes the
Migration to the cloud requires an appropriate strategic plan service model that companies and
according to the design and design process. Cloud service may work with economic institutions care about bonds
legacy programs that home businesses have to manage the business. The that are not Recognize them uniformly.
correct implementation of business data brings commercial benefits and
the use of cloud infrastructure. This is a reference to the literature in
Khajeh-Hosseini et al. (2011; Shimba, 2010), which worked on decision 3-2-8- Compliance issue
support and the migration roadmap for cloud adoption. But this study is Based on literature, laws and governance
not enough to understand the migration process such as complexities, on citizen protection policy data in the
guidelines, tools and supportive strategies. cloud will not do that. This emerges as a
Further research should be devoted to this area because economic result of suppliers of violence from
companies are concerned about the complexities of migration from their corporate data and their applications to
legacy software to integrate with cloud services. Moving to the cloud is a small and medium-sized enterprises. This
systematic and strategic decision as business needs and growth depend study shows that companies and economic
on how organizations can be logical and willing to integrate their IT institutions are interested in this issue
resources, including applications and business data from the site (at (Ahronovitz et al., 2011; Schubert and G et
home) with cloud services (Cisco Systems, 2010). al., Reha, 2012).

3-2- 6- Lack of skills 4- Conclusions


Based on the literature that organizations, small businesses and
businesses benefit in well-defined cloud services but are not satisfactory,
Since organizations
5. Likedoanynotother
havenewly
a introduced technology in companies will have a
systematic approach positive
to this,and
thenegative
most impact in both business including internal staff
important implications challenges.
of our research and
proposals are the following.
1- Knowledge of the requirements of e-skills is very important for 6- References
enterprises, organizations, projects and businesses to stay stable in 1- Ahronovitz, M., Amrhein, D., Anderson, P., de
business and gain a competitive advantage over competitors especially Andrade, A., Armstrong, J., Arasan, B,. Bartlett, J.,
large companies. The adoption of information and communication Bruklis, R., Cameron, K. and Carlson
technology (ICT) between economic institutions and organizations will 2- Armbrust, M., Fox, A., Griffith, R., Joseph, A. D.,
provide increased business growth, make them more creative, bring Katz, R., Konwinski, A., Lee, G,. Patterson, D.,
business flexibility and improve customer relationships. Rabkin, A., Stoica, I. et al. (2010), ‘A view of cloud
2. In order to improve the dependence on economic companies, the computing’, Communications of the ACM 53(4),
following factors must be carefully addressed. 50-58.
2-1- The cloud-based software architecture must ensure data privacy; data 3- Barney, J. (1991) 'Firm resources and sustained
security must be handled correctly so that data is not manipulated. Cloud competitive advantage', Journal of Management,
providers should provide the necessary information about their network 17 (1) pp.99-120 Business Source Complete, EBSCO
infrastructure (data center) to provide a data protection security host [Online] .Accessed: 6 April (2013).
v
mechanism such as access control, risk problems, disaster recovery and 4- Boss, G., Malladi, P., Quan, D., Legregni, L. and
Hall, H. (2007), ‘Cloud computing,’ IBM white
backup systems. paper, Version 1.
5- Carcary, M., Doherty, E. and Conway, G. (2013),
2-2- It is also important to address data management and compliance
‘The adoption of cloud computing byirish smesan
issues so that companies and others are informed about where data is
exploratory study’, The Electronic Journal
actually stored and how to securely handle data and divide it into a multi-
Information Systems Evaluation 16(4), 258–269.
tenant virtual environment.
3- A service level agreement should be established between enterprise and 6- Centre for economics and business research
cloud vendors, ensuring the availability or availability of data and ltd THE CLOUD DIVIDEND: Part One. The economic
determining the extent of the incident in the event of events. A service level benefits of cloud computing to business and the
agreement must include a commercial option so that there is no lock for wider EMEA economy-France, Germany, Italy,
the vendor in case it relates to the business continuity perspective of Spain and the UK (December, 2010), 89.
companies and economic institutions with other suppliers if necessary. 7- Centre for economics and business research
Interoperability and portability issues also help to reduce the interest of ltd THE CLOUD DIVIDEND: Part Two The economic
economic institutions in cloud computing. benefits of cloud computing to business and the
4. Integrating Business with Cloud Services It is essential that companies, wider EMEA economy. Comparative analysis of
businesses and projects understand the type of business processes you the impact on aggregated industry sectors, 2011).
want to run, including data types and applications. In addition, you need to 8- Cisco Systems (2010), ‘Planning the Migration
know deployment models and cloud services to deploy IT resources that of Enterprise Applications to the Cloud ’,
can meet their own needs. Through understanding these will reap the http://www.cisco.com/en/US/services/ps2961
benefit of economic companies.
/ps10364/ps10370/ps11104/Migration_of_Enterpr
23- Schubert, L. and Jeffery, K. (2012), ‘Advances in clouds’, Report of the Cloud
ise_Apps_to_Cloud_White_Paper.pdf. [Online;Group. European Commission .
Computing Expert Working
accessed july 23rd, 201424-
]. Singh, H. and Seehan, D. (2012), ‘Current trends in cloud computing a survey of
9- Dai, W. (2010), ‘Thecloudimpact
computing
of emerging
systems’,International journal of Electronics and Computer Science
technologies on small and medium enterprises
Engineering, (Journal Style) .
(smes).’, Journal of Business Systems, Governance & Ethics 4 (4).
, M. (2011), ‘Cloud computing use cases white paper’.
10- Ergin B., John P. C., Simon W.,(2011),' The Economics of Cloud Computing' The 25- Søndergaard Laugesen, N., Lauritzen, J.,
Korean Economic Review, 203-230 Carpenter, G., Ellegaard, C., Bucher, M. andStabe,
11- Etro, F. The economic impact of cloud computing on business creation, M. (2012), ‘Cloud computing, cyber security and
employment and output in Europe. Review of Business and Economics, 54, 2009), green it (the impact on e-skills requirements) final
179-208. report, prepared for European commission.
12- Filiopoulou, E., Mitropoulou, P. and Michalakelis, C. SMEs in the cloud: The impact danish technological institute & fraunhofer, may
of cloud adoption on economic growth and development. In Proceedings of the
2012’
ICEIRD 2014 (Nicosia, Cyprus, 13-6 June, 2014).4- Marston, S., Li, Z., Bandyopadhyay,
S., Zhang, J. and Ghalsasi, A. (2011), ‘Cloud computing the business perspective’, 26- Varia, J. (2008), ‘Cloud architectures’, White
Decision Support Systems 51(1), 176–189. Paper of
14- Hitt, L and Brynjolfsson, E. (1996) 'Productivity, Profit and Consumer Welfare : Amazon,jineshvaria.s3.amazonaws.com/public/cl
Three Different Measures of Information Technology's Value', MIS Quarterly , pp .121- oudarchitectures-varia. pdf p. 16.
142. 27- Watch, E.-b. (2008), ‘The european e-business
v
15- Jlelaty, M. and Monzer, Y. (2012), ‘Factors in cloud computing adoption’, Lund report 2008’, European Commission Enterprise
University . and Industry Directorate General, available at:
www. Ebusiness watch. org/key
16- Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J. and Teregowda, P. (2011), reports/synthesis reports.
Decision support tools for cloud migration in the enterprise, in ‘Cloud Computing 28- Weill, P. and Broadbent, M. (1998) Leveraging
(CLOUD(, ) 2011 IEEE International Conference on’, IEEE, pp. 541–548. the new infrastructure: How market leaders
17- Kim, W., Kim, S. D., Lee, E. and Lee, S. (2009), Adoption issues for cloud computing, capitalize on Information Technology, MA, Harvard
th
in ‘Proceedings of the 7 International Conference on Advances in Mobile Computing Business School.
and Multimedia’, ACM, pp. 2–5.
18- Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J. and Ghalsasi, A. (2011), ‘Cloud
computing the business perspective’, Decision Support Systems 51(1), 176–189.
19- Mell, P. and Grance, T. (2009), ‘The nist definition of cloud computing’, National
Institute of Standards and Technology 53(6), 50.
20- Morgan, L. and Conboy, K. (2013), ‘Factors affecting the adoption of cloud
computing: An exploratory study’.
21- Reed, A., Rezek, C. and Simmonds, P. (2011), ‘Security guidance for critical areas of
focus in cloud computing v3. 0’, Cloud Security Alliance.
22- Sahandi, R., Alkhalil, A. and Opara-Martins, J. (2012), Smes perception of cloud
computing: Potential and security, in ‘Collaborative Networks in the Internet of
Services,’Springer, pp. 186–195.
Platform as a Service (PaaS)

Everyone is talking about “the cloud.” But what


does it mean?
Computer security
More and more, we are seeing technology moving to the cloud. It’s not
just a fad — the shift from traditional software models to the internet The protection of computer systems and

has steadily gained momentum over the last 10 years. Looking ahead, the information from harm, theft, and
next decade of cloud computing promises new ways to collaborate unauthorized use. Computer hardware is
everywhere, through mobile devices. typically protected by the same means
used to protect other valuable or
So what is cloud computing? Essentially, cloud computing is a kind of
v sensitive equipment, namely, serial
outsourcing of computer programs. Using cloud computing, users are
able to access software and applications from wherever they are; the numbers, doors and locks, and alarms.

computer programs are being hosted by an outside party and reside in The protection of information and system

the cloud. This means that users do not have to worry about things such access, on the other hand, is achieved

as storage and power, they can simply enjoy the end result. through other tactics, some of them quite

The three types of cloud computing


Infrastructure as a Service (IaaS)

A third party hosts elements of infrastructure, such as hardware,


software, servers, and storage, also providing backup, security, and
maintenance.

Software as a Service (SaaS)


complex.
Using the cloud, software such as an internet browser or application is
able to become a usable tool.
The security precautionswhenrelated to needed.
computer information3.andAvailability:-
access addressData should be available to users when needed.
4. Authentication:- are you really communicating with whom you think
four major threats:
you are communicating with Cloud computing security or, more
(1) theft of data, suchsimply,
as thatcloud
of military
security refers to a broad set of policies, technologies,
secrets from government and controls deployed
computers; (2) to protect data, applications, and the associated
vandalism, including theinfrastructure
destruction ofof cloud computing. It is a sub-domain of computer
security
data by a computer virus;
computer security , cybersecurity, or IT
(3) fraud, such as employees at a bank channeling funds into their own security is the protection of computer
accounts; systems from theft or damage to their
hardware , software or electronic data, as
(4) invasion of privacy, such as the illegal accessing of protected
well as from
personal financial or medical data from a large database. disruption or misdirection of the services
The most basic means of protecting a computer system against theft, they provide.
vandalism, invasion of privacy and other irresponsible behavioursv is to The field is of growing importance due
to increasing reliance on computer
electronically track and record the
systems, the Internet and wireless
access to, and activities of, the various users of a computer system. networks such as Bluetooth and Wi-Fi, and
This is commonly done by assigning an individual password to each due to the growth of "smart" devices
person who has access to a system. including smartphones televisions and the
various tiny devices that constitute
The computer system itself can then automatically track the use of
the Internet of Things. Due to its complexity,
these passwords, recording such data as which files were accessed
both in terms of politics and technology, it
under particular passwords and so on. Another security measure is to
is also one of the major challenges of the
store a system’s data on a separate device, or medium, such as
contemporary world network : consists of
magnetic tape or disks, that is normally inaccessible through the
the policies and practices adopted to
computer system. Finally, data is often encrypted so that it can be
prevent and monitor unauthorized access,
deciphered only by holders of a singular encryption key.
misuse, modification, or denial of a
Security is concerned with four main areas: computer network-accessible resources.
1. Confidentiality:- Only authorized users can access the data resources Network security involves or other
and information. authenticating the authorization of access
2. Integrity:- Only authorized users should be able to modify the data to data in a network, which is controlled by
Cloud security
the network administrator. controls
Users choose
or are assigned an ID and password
* Deterrent controls: These controls are intended to reduce attacks
information that allows them access to
on a cloud
information and programs system.
within theirMuch like a warning sign on a fence or a property,
authority Network deterrent controls atypically reduce the threat level by informing
security covers
variety of computer networks, both publicthat there will be adverse consequences for them if
potential attackers
and private, that are used in everyday jobs;
they proceed
conducting transactions and
communications among businesses, government agencies and * Preventive controls: Preventive
individuals. Networks can be private, such as within a company, and controls strengthen the system against
others which might be open to public access and, more broadly
incidents, generally by reducing if not
information security.
actually eliminating vulnerabilities
Information security, sometimes shortened to InfoSec, is the
practice of preventing unauthorized access, use, disclosure, disruption, * Detective controls: Detective controls
modification, inspection, recording or destruction of information. The are intended to detect and react
v
information or data may take any form, e.g. electronic or physical appropriately to any incidents that occur.
Information security's primary focus is the balanced protection of the In the event of an attack, a detective
confidentiality, integrity and availability of data (also known as the CIA control will signal the preventative or
triad) while maintaining a focus on efficient policy implementation, all corrective controls to address the issue *
without hampering organization productivity This is largely achieved Corrective controls: corrective controls
through a multi-step risk management process that identifies assets, reduce the consequences of an incident,
threat sources, vulnerabilities, potential impacts, and possible controls, normally by limiting the damage. They
followed by assessment of the effectiveness of the risk management come into effect during or after an incident.
plan. Restoring system backups in order to
rebuild a compromised system is an
example of a corrective control

Authorization is the function of specifying


access rights/privileges to resources
related to information
security and computerCloud encryption
security in generalis the transformation of a cloud service customer's
and to access controldata into ciphertext.
in particular. [1]
MoreCloud encryption is almost identical to in-house
encryption with one important difference -- the cloud customer must
formally, "to authorize" is to define an
take time to learn about the provider's policies and procedures for
encryption and encryption key
management. The cloud encryption
access policy. For example, human resources staff are normally
capabilities of the service provider need
authorized to access employee records and this policy is usually
to match the level of sensitivity of the
formalized as access control rules in a computer system. During data being hosted.
operation, the system uses the access control rules to decide whether
access requests from (authentication) shall be approved (granted) or
disapproved (rejected) Resources include individual files or an
item's data, computer programs, computer devices and functionality
provided by computer applications. Examples of consumers are
v
computer users, computer Software and other hardware on the
computer.
The Sensor-Cloud Infrastructure
virtualizes a physical sensor as a virtual
sensor on the cloud computing Dynamic
grouped virtual sensors on cloud
computing can be automatic provisioned
when the users need them. The approach
to enable the sensor management
Consumer side vulnerabilities capability on cloud computing.

• Encryption Authentication of both users and services


is a significant issue for the trust and
• Physical
security of the cloud computing. SSL
• Authentication Authentication Protocol (SAP), once
applied in cloud computing,. This paper,
• Identity and access management
based on the identity-based hierarchical
• Performance Requirements model for cloud computing (IBHMCC) and
sciences. The support
its corresponding encryption and for data intensive scientific computing is critical to
advance modern
signature schemes, presented a new science as storage system have exposed a widening gap
between their capacity and their bandwidth by more than 10-fold over last
identity-based.
decade. Scientific Computing and enterprise applications are the key to solve
“grand challenges” in many domains and providing
breakthroughs in knowledge, and it comes in many
Abstract
shapes and forms like High Performance
High performance computing (HPS) refers to the practice of aggregating computing Computing
power in a way that delivers much higher performance than one cloud get out of a and Cloud Computing which are heavily focused
typical desktop computer in order to solve large problems in science. on compute- intensive applications and data-
parallel execution.
Cloud computing is a model for enabling convenient ,on-demand network access to
a shared pool of configurable computing resources ( e.g.. networks , servers . 2. HIGH PERFORMANCE COMPUTING
storage . applications and services ) that can be rapidly provisioned and released
HPC is a type of distributed computing, where
with minimal management effort or service provider interaction.
processors and cores in multiple computers
The goal of HPC is to reduce execution time and accommodate larger and more coordinate their actions. High performance
complicated problems .While cloud computing provides scientists with a completely computers of interest to small and medium-sized
new model of utilizing the computing infrastructure , computing resources , storage businesses today are clusters of computers which
resources , as well as applications can be dynamically provisioned on a pay vper use work together as if they are a single system.
basis.
HPC reduces computation time, which adds quality
This paper focuses on enabling and scaling computing system to support the and value of the product. It also reduces product
execution of scientific and business applications. development time and cost. With HPC, we can test
more ideas to help set priorities for work that gets
1. INTRODUCTION
down. HPC helps us to eliminate some testing and
High-performance computing ( HPC ) aims to control supercomputers and
evaluate more alternative. With the use of HPC,
computer clusters to solve scientific computation and enterprise problems. The
design and project run-around is reduced which
original objective of cloud computing and HPC can be manifestly different which
improves design process to produce better
yields different computing paradigms as well as applications. While HPC has
products, innovation ability and reduce cost of
been widely used for scientific tasks and cloud computing was set out for
development.
business applications. But now HPC and cloud computing can be used
collectively for scientific computing and enterprise applications. The users of Typical HPC applications are in the fields of high-
scientific computing are scientists and engineers which include applications end computational science and engineering like
such as oil exploration , problems of biochemistry, automotive design. Scientific weather forecasting and prediction,
computing revolves around mathematical models quantitative analysis and computational chemistry and drug discovery,
numerical techniques to solve scientific and engineering problems. These Computational Fluid Dynamics ( CFD ). Cray Inc is
models often require a huge number of computing resources to perform large the market leader in HPC. IBM, Intel and SGI are
scale experiments or to cut down the computational complexity into a the other major players in this area.
reasonable time frame. Computational and Data-Driven Science are the major
Dana Holding Corporation is an HPC service
pillars of scientific discovery in addition to experimental and theoretical
provider for US department of defense and DARPA
and has identified technologies and partners to
support the HPC infrastructure throughout the
supply chain of the department of defense.

Technical customers usually require the Message Passing Interface (MPI) whereas
enterprise customers require an SQL database. Because a number of MPI and
database implementations have been created with sockets or DPAL, it is

possible for a company to target both classes of customer by delivering a quality


software stack. Unfortunately, many smaller HPC companies often target technical
customers in the hopes of becoming famous, and in the process neglect
enterprise customers who would make them rich. Enterprise is a much bigger
market than technical simply because storage is required more than processing.
However progress towards HPC is threatened by two related factors:

i. Based on current technology, systems with Exascale performance will


use excessive amounts of energy.
ii. The performance of processing elements can no longer be assumed to
follow Moore’s Law and double every 18 months to 2 years due to
in the cloud’ . Cloud computing is changing the landscape of many applications.
physical constraints.
The HPC should
v
move towards exploiting the opportunities associated with the
cloud computing.
HPC architectures have remained relatively unchanged. Massive investment
will be desired to migrate or re-implement these applications to utilize future
3. THE RISE OF THE CLOUDS
HPC architectures. Many HPC applications are so-called legacy codes that
have been developed over many years following a model of HPC which has HPCs can also contribute towards building
been stable during that period, but which may not persist for much longer. components for the ‘Cloud’ as also be part of large
Most of these legacy applications cannot be changed quickly, easily or cheaply. data centers and server farms which host cloud-
Robust, real-time or even faster than real-time and reliable HPC is required based services. HPC
for applications which deal with constant operation and monitoring of
in the cloud is fast catching up as an effective
infrastructure such as electricity generation and distribution, transport
method to manage big data and analytics.
control, industrial processes and decision support in crisis situations. The
effective use of HPC is often complex because of the diverse skills and Cloud computing is a form of utility computing,
expertise that are required to solve specific problems. This complexity has where hardware, software, storage and platform
led to slow adoption of the technology by many companies. The use of HPC is is made available as per need and subscription
complex and particularly when a user is new to the domain, may require basis. In this model, clients can access the
significant help and support in order to realize its benefits. HPC users can application through an internet browser. The data
better quantify the benefits of moving to a cloud and identify which can be resident at a remote place also.
applications are better candidates for the transition from in-hose to cloud. Complementing the cloud is the usage of server
Cloud providers can optimize the allocation of applications to their farms and data centers where all applications and
infrastructure to maximize utilization, while offering best-in-class cost and data can be sorted, shared and accessed on
quality of service. There can be three usage modes as shown in Figure ‘HPC demand using virtualization. Cloud is an eco-
friendly green technology asit eliminates
Reliabilitythe need if multiple redundant sites are used, which makes well-
is improved
for enterprises to maintain multipledesigned servers,
cloud computing suitable for business continuity and disaster
which takes lots of space andrecovery. infrastructure.
Cloud computing promises reliable services
 Scalability and elasticity via dynamic ( on-
delivered through next-generation data centers that are built on compute and demand) provisioning of resources on a fine-
storages virtualization technologies. Users will be able to access applications and grained, self-service basis near real-time, without
data from a cloud anywhere in the world on demand. In other words, the cloud users having to engineer for peak loads.
appears to be a single point of access for all the computing needs of users. The  Performance is monitored and consistent and
users are assured that the cloud infrastructure is robust and will always be loosely coupled architectures are constructed
available at any time. There are two deployment models for cloud, public and using web services as the system interface.
private cloud. Public cloud services are available to general public. In public cloud,
one access the services using the internet. Amazon and Google have built their Clouds are basically high-end high performance
large public clouds. Private cloud is built by enterprises for their internal company data centers, which use virtualization technology
operations including communications with their division and branches. These cloud creating virtual machines through hypervisors.
be maintained by a third party though. Of late, there is some movement to architect The cloud computing introduces several benefits
for end users, enterprises, service providers,
hybrid clouds which combine features of both private and public clouds. In a hybrid
cloud, a company can maintain its own private cloud and on saturation of these and scientific institutions.
resources, use the public cloud. Cloud computing is generally broken down into 4. HIGH PERFORMANCE COMPUTING
v
three primary service levels. Software-as-a-Service (SaaS): The simplest example
AND CLOUD COMPUTING
to understand is e-mail. Infrastructure-as-a-Service (IaaS): Where we outsource
the hardware. In such cases, it’s not just the computing power that we rent; it also
INTERVENTIONS FOR ENTERPRISE
includes power, cooling, and networking. Furthermore, it’s more than likely that APPLICATIONS
we’ll need storage as well. Generally IaaS is this combination of compute and cloud Efficient enterprise management requires agility,
storage. Platform-as-a-Service (PaaS): The vendor takes care of the underlying collaboration, competitiveness, cost benefit,
infrastructure for us, giving us only a platform with which to (build and) host flexibility, resilience, responsiveness, scalability,
application. PaaS user is a SaaS developer. An IaaS user could very well be a PaaS simplicity, transparency and visibility, among
or SaaS developer. Cloud computing exhibits the following key characteristics: various requirements. With the internet and ICT
 Agility improves with user’s ability to re-provision technological revolution affecting all aspects of an enterprise,
infrastructure resources. enterprise are now exposed to greater
 Application programming interface (API) accessibility to software that competition as a result of liberalization,
enables machines to interface with cloud software in the same way the user privatization, outsourcing and globalization.
interface facilitates interaction between humans and computers. Cloud Information and Communication Technology (ICT)
computing systems typically use REST-based APIs. tools are a great enabler of operations of an
 Cost is claimed to be reduced and in a public cloud delivery model capital enterprise. Its adoption and deployment has
expenditure is converted to operational expenditure. become a determinant of competitive advantage
 Virtualization technology allows servers and storage devices to be shared for many enterprises. Extensive use of
and utilization be increased. Applications can be easily migrated from one technologies like decision support system,
physical server to another. warehouse, software agents, barcodes,
transportation and inventory
Research and
management
development activities are focused on enabling and scaling scientific
systems, have resulted in applications
better visibility,
usingagility,
distributed computing paradigms, such as cluster, grid, and
collaboration and communication
cloud computing.
both within With
and the rapid emergence of virtualized environments for
among enterprises. An enterprises,
accessing supply
software chain
systems and solutions, the volume of users and their data are

visibility coupled with quick responsiveness and decision-making will be vital to growing exponentially. Scientific institutions can
gain a competitive advantage. This will entail actionable information about various be more concerned with PaaS and IaaS
stakeholders and processes to be available real-time. Another issue that prevent contributions that allow having complete control
companies struggle to get a cohesive picture of their supply chains is that most of over the infrastructure used for scientific
these information system were designed to operate within a single company, not research and finely customizing their software
across a network of companies. The intrinsic features in High Performance systems according to the specific needs of the
Computing system are of scalability, data integration and interoperability makes it experiments to be performed. Cloud computing
an ideal fit for enterprise applications. Large companies have slowly started also guarantees the desired Quality of Service,
adopting HPC for enterprise applications as they were struggling with the twin which is well-known by means of Service Level
challenges of data management and data analysis. HPC interventions in enterprise Agreements. This aspect comprises of an
applications are limited to some big players. The reasons are primarily the need additional value, which could make scientists
for all suppliers to migrate from legacy systems to HPC systems. Cloud computing prefer computing clouds to traditional grids. For
and associated technologies like Software as a Service (SaaS), Infrastructure as example, different types of analysis can be
a Service (IaaS) and Platform as a Service (PaaS) have been generating a lot of performed at different costs by optimizing the
v
interest as a game changing technology. Cloud computing can integrate shippers, trade-off between the budget and the expected of
service providers, distributors, providers, customers etc in a global enterprise results. By applying cloud technologies and
applications. A social network like community could be created with typical data standards to established scientific computing and
items, placed online on the cloud like information on prices, schedules, service HPC infrastructure, costly, inflexible silos can be
options, contracts etc. Timely information updates from all stakeholders renders eliminated and shared computing resources can
companies to be demand-driven rather than forecast-driven. Major ERP vendors be fully utilized to:
are also working offering cloud-based solutions. Major application areas where
 Enhance productivity and facilitate
cloud-based solutions are available include demand forecasting, demand planning,
collaboration with an easy-to-use, web-
e-procurement, distribution, inventory, warehouse and transportation system.
based portal.
Every major ERP vendor like SAP, BAAN are coming out with a cloud version of their
 Improve data access, resource
large software solutions. This reduces the Total Cost of Ownership for enterprises
availability and security while boosting
and improves both their top and bottom lines. FedEx has a private cloud deployed performance.
in 2011 with cloudX as service-provider with sales processing and CRM as primary  Increase throughput of heterogeneous
activities on the cloud. Intel was able to replace hundreds of their order clerks workloads across diverse resource.
using online ordering applications. Several supply chain activities like planning and  Increase automation and decrease
forecasting, sourcing and procurement, logistics and inventory management were manual effort for improved
migrated to cloud. HPC enterprises which go for the cloud solutions will have to administrator productivity.
face challenges like legacy systems and software applications of various partners.  Improve performance and scalability
with high-performance clustered
5. HIGH PERFORMANCE COMPUTING AND CLOUD COMPUTING
systems – factory integrated, tested,
INTERVENTIONS FOR SCIENTIFIC APPLICATIONS single-point of contact.
 Reduce operatingCONCLUSIONS
costs and total cost
of ownership with a consolidated high-
HPC is a type of distributed computing, where processors and cores in multiple
performance infrastructure.
computers coordinate their actions. HPC is an important technology in which

Cloud computing introduces new challenges and new problems, particularly from further investment is essential if its economic
a legal and security point of view. In the case of public clouds, systems, competitiveness is to be maintained. HPC system
applications, and even personal data are hosted into datacenters owned by third have the advantages of scalability, data
parties. These datacenters are often placed into the more expedient geographic integration and interoperability. Cloud computing
location for reducing maintenance and consumption costs. In addition, privacy and can integrate all partners into an online social
confidentiality of data depends on the location of its storage. Cloud computing network like community with real-time
vendors have included the geographic location of the hosting as a parameter of information on all elements. Cloud interventions in
the service level agreement made with the customer. For example, Amazon the enterprise management space are rapidly
provides the concept of availability zones that identify the location of the increasing with several vendors offering Software
datacenters where applications are hosted. Cloud computing fosters the dynamic as a Service while for scientific computing
discovery of services and a wide variety of runtime environments for applications, Platform as a Service and Infrastructure as a
in practice a limited set of options are available for scientists, and sometimes they Service are being offered. HPC interventions on
could not be elastic enough to cover their needs. the other hand are limited to some big companies.
6. CHALLENGES OF USING HPC WITH THE CLOUD v A challenge can be faced during deployment of
both cloud and HPC systems that can be the legacy
One of the primary challenges is the lack of high-speed interconnects and noise- applications especially of the suppliers. The
free operating systems to enable tightly coupled HPC applications to scale. Other technological challenges must be overcome for
challenges include the costing / pricing model, which is still evolving from the the full potential of HPC and cloud computing to be
traditional supercomputing approach of grants and quotas toward the pay-as-you- realized. There can be numerous opportunities for
go model typical of cloud-based services; the sub mission model, which is evolving using HPC in new applications and the possibilities
from job queuing and reservations toward VM deployment; the bringing of data in are opening up by using HPC with other computing
and out of the cloud, which is costly and results in data lock-in; and security, domains such as embedded systems and mobile
regulatory compliance, and various other utilities like performance, availability, computing.
business continuity, service-level agreements, and so on. There can be the
increase of HPC’s adoption in the cloud with the two prospects. The first prospect
is in optical networking, which will improve hardware manageability and
interconnect performance while also reducing power consumption, and software-
defined networks, which will further improve the manageability of cloud
networking. Furthermore, developments in nonvolatile memory will improve check
pointing performance and, in the long term, address the data deluge and new
programming models leveraging non-volatility. Both technologies will create
disruptive improvements and increase HPC’s adoption in the cloud. As the
scientific community moves toward exascale computing, the evolution of new
asynchronous programming models and an emphasis on redesigning algorithms
can make the cloud even more suitable for HPC.
Introduction
Cloud computing: is a method for
retrieve resources stored through
Abstract the Internet through web-based
applications
In this time cloud computing is used to achieve business goals and tools to deliver
through
enhance the ability of achieve business; There are information technology
several types and services. The
cloudCommunity
classes of cloud computing (Private cloud, Public cloud, hosting provider
cloud, purchases,
Hybrid cloud). Each with advantages and characteristics that make them
suitable for a particular business environment. new model of hybrid
cloud computing architecture based on private cloud, combined with one
or more type public cloud. Iinternal structures of private cloud and public
cloud are the same in hybrid cloud we will discuss through these papers
an introduction to these types and the advantages of using them.
hosts, and maintains the necessary hardware and software in their own
making service users can initiate specific service functions when their
hybrid
needed it Service
v users pay only for the amount of service that they need
cloud
I and
private public limitless scalability when user need. We
cloud cloud have three different type of cloud
computing, where different in service are
being provided for you.

IaaS(Infrastructure as a Service) provides


Index Terms access to open computing resources such
data storage capacity, and networking in
Public Cloud, Private Cloud, Hybrid Cloud, Community Cloud, Cloud Computing, context of a secure data center.
Cloud Security, IaaS, PaaS, IaaS.
SaaS(Software as a Service) providers
offer application level services tailored to
a wide variety of business needs for
example Web-based email and Google
Documents
PaaS(Platform as aserver
Service)
is means
requiredyouto run a high speed database application. that
develop applicationshardware
using can
Web-based
be integrated into a private cloud. in effect, hybridizing the
tools so they run on systems
solution between
software virtual
and servers and dedicated servers. As opposed to
hardware provided public
by another
clouds,company
fully private clouds are not delivered through a utility
web servers, databasemodel or management
pay-as-you-go basis because the hardware is dedicated.
systems,
However, Virtual Private Clouds offer the
Cloude computing services can be provided for applications and data of same pay-as-you-go model as public
all kinds, whether images, information or even databases .This makes clouds. the main drawback people see with
the use of cloud computing important in these days because it provides this model is that all management,
storage space and direct access to various types of data available maintenance and updating of data centers
without the need to connect to the service directly and without the need is the responsibility of the company.
to connect to the Internet network permanently. All of the modern
2_Public cloud
devises (laptops, smart phones, tablets, servers) you can access and use
cloud computing services provided by companies offering storage space. The public cloud model is most
recognizable model of cloud computing to
Models of cloud computing v many consumers provided in a virtualized
1_ Private cloud environment at the internet, Public clouds
provide to multiple clients services by
A private cloud uses to provide services only one customer, this give using shared the same infrastructure.
cloud based environment greater control, security and privacy. It when we talk about the best all boils down
offers many advantages such as sharing resources, storage space and to control. A large company may choose a
direct access.it is Low costs you only payment for the service you use, private cloud, while a small business might
No need for repair the maintenance provider by provides service.Private choose a public cloud. Examples of cloud
cloud services are delivered from a business's data center to internal computing storage services, hosting such
users. the private cloud offers the convenience and versatility of the as website hosting, development
cloud Common private cloud technologies and vendors include OpenStack environments by Cloud based, online
and VMware . when we create private cloud all of your data is protected document and webmail. the services of
behind a firewall. This can be a great option for companies who already public cloud are available wherever is
have expensive data centers. Customizable network performance and located the client . This provides for
Hardware performance and storage performance can be specified and example remote access to online
customized in the private cloud. Customizable network performance and document from multiple locations. No
Hardware performance and storage performance can be specified and Contracts Along with the utility model,
customized in the private cloud. Hybrid Deployments If a dedicated you’re only paying by the hour if you want
to shut down your The server
hybridafter
cloudonly
may2scale up to use the private cloud or to the private
hours of use, there iscloud
no contract
Some requiring
of the most popular hybrid cloud storage providers are
your ongoing use ofAmazon
the server.
Web Services,
Shared Cisco, Dell EMC, Hewlett Packard Enterprise, IBM,
Hardware – BecauseMicrosoft,
the publicRackspace
cloud is byand VMware. one of advantage of the hybrid cloud
definition a multi-tenant environment, your server shares the same
hardware, storage and network devices as the other tenants in the cloud.
Reliability and Flexibility Effective in public model because the many
number of servers and many networks if any physical component fail,
other servers still work unaffected on the other components, that is
make public cloud more reliability. and public cloud appropriate can be
Data storage, Data Archival, Application Hosting Latency intolerant or
mission critical web tiers. When we talk about Flexibility in public cloud
we mention to many services available on the market such as IaaS, PaaS model is it allows data and workloads to
and SaaS. move between public and private cloud in a
3_ Community cloud flexible way as request, and costs change
v
that is giving businesses greater
A community cloud is a model of cloud service that provides cloud flexibility ,more options for data
computing for limited number of organizations or persons which share deployment and use. Hybrid cloud saving
similar limitations, interests, and requirements. that is managed by all costs through avoiding unnecessary
the participating organizations or service provider. the community cloud expenses and increased efficiency because
restricted access only to the group’s participating members. Businesses, services can be easily scaled or reduced
research, applications and organizations that use this model because it when necessary
provide
private cloud vs hybrid cloud
4_ Hybrid cloud
When we comes to choosing between
The hybrid cloud refers to a cloud environment made up of a mix between private cloud or hybrid there are important
private cloud resources combined with public cloud resources and it use differences and benefits must know by
some kind of orchestration between them. Combining the control organizations Hybrid clouds represent
security and of private cloud computing and the efficiencies and very import for business leaders and user
economies and of public cloud computing. The hybrid cloud enables an because it seek to merge the control and
organization to transfer data and applications to the cloud, create a self-service capabilities of private clouds
backup recovery solution to high availability with cost-effective, move with the scalability and extensive service
applications nearer to customers and extend their datacenter capacity. menu of public clouds The resulting hybrid
cloud can enable organizations to deploy
and migrate applications with
conscientious tradeoffs of compliance,
security, resilience, scale, performance
and cost-effectiveness. When the business in private cloud is
responsible for configuring, purchasing, installing and maintaining the
entire hardware and software infrastructure it needs to support the
cloud and its users. Private cloud might also be hosted by a third-party
service provider. In this type of cloud , the provider is responsible for
the infrastructure and the business used simply makes exclusive use of
the desired resources as a virtual private network. Using a secure
private network. Finally A business that needs security and direct
control over a private cloud but that also desires the scalability and rich
services of a public cloud might opt to implement a hybrid cloud. This
way, the business can blend a local or hosted private cloud deployment
with an available public cloud, such as AWS or Google Cloud. v

Hybrid cloud vs public cloud


In the Public Cloud the core computing infrastructure is shared among
several organizations each organization’s data, applications, and
infrastructure are separated and can only be accessed by the authorized
personnel. The Public Cloud offers advantages such as low cost of
ownership, automated deployments, scalability and also reliability. The
hybrid Optimizingcloud placing without compromising on the value
proposition of either public or private cloud technologies. Improving
security on existing cloud solutions such as SaaS offerings that must be
delivered via secure private networks.

View publication stats

You might also like