Professional Documents
Culture Documents
Cloud Computing: January 2020
Cloud Computing: January 2020
net/publication/338411743
Cloud Computing
CITATIONS READS
0 2,694
1 author:
Amer Elameer
UNIVERSITY OF INFORMATION TECHNOLOGY & COMMUNICATIONS
99 PUBLICATIONS 44 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Amer Elameer on 06 January 2020.
Virtualization Architecture:
3. SaaS (Software-as-a-Service) is a software distribution
• A Virtual machine (VM) is an isolated
model in which a third-party provider hosts applications
runtime environment (guest OS and
and makes them available to customers over the Internet.
applications)
alongside infrastructure as a service (IaaS) and platform
• Multiple virtual systems (VMs) can
as a service (PaaS). Access to the application, litter or no
run on a single physical system.
control over the delivery for example (Gmail or
Salesforce.com).
Front end vs. back end:
The front end is the side the computer user, or client.
The back end is the cloud section of the system. The front Types of virtualization:
end includes the client's computer (or computer network)
• Hardware/Server Virtualization.
• Network Virtualization.
• Storage Virtualization. - Security and privacy
• Memory Virtualization. - Bandwidth costs
• Software Virtualization.
• Data Virtualization.
• Desktop virtualization.
Types of virtualization in cloud computing:
In cloud computing the virtualization can be done in two
ways either by storage virtualization or by software
virtualization. Key requirements for MCC:
1. Storage virtualization: The storage available is - Simple APIs Offering transparent
virtualized to get large virtual storage access and it is access to mobile services, and
further used for allocating memory to the cloud clients. requiring no specific knowledge of
2. Software virtualization: software built by the company underlying network technologies.
v
can be used by a large number of systems at the same - Web interface
time with the help of virtualization. - Internet access to remotely stored
application in the cloud.
5. Amazon Company
Windows Azure Feature:
Amazon Elastic Compute Cloud (Amazon
- Move Faster
EC2) is a web service that provides
- Save Money resizable compute capacity in the cloud.
It is designed to make web-scale
- Hybrid Consistency
computing easier for developers.
Amazon EC2's simple web service
interface allows you to obtain and
v
configure capacity with minimal
friction. It provides you with complete
control of your computing resources
and lets you run on Amazon's proven
computing environment. Amazon EC2
reduces the time required to obtain and
Website: https://azure.microsoft.com/ boot new server instances to minutes,
allowing you to quickly scale capacity,
4. Google Company:
both up and down, as your computing
Google Cloud ConnectforMicrosoft Office brings requirements change. Amazon EC2
changes the economics of computing b y
collaborative multi-person editingtothe familiar
allowing you to pay only for capacity
Microsoft Office experience. You can share, backup and that you actually use. Amazon EC2
s imultaneous ly editMicrosoft Word,PowerPoint,and Excel provides developers the tools to build
failure resilient applications and
documents with coworkers.
isolate themselves from common
Google Apps Key feature s are: failure scenarios.
Website: https://aws.amazon.com/ec2/
6. Rackspace Company: 2. Naas (Network as a Service):
Is a business model for delivering
enterprise-wide area network services
The cloud can quickly scale to thousands of servers to
make resources available asthey're needed. Rackspace virtually on a subscription basis. Small or
Cloud hosting customers never need to worry abo ut midsize businesses are the
buying new hardware to meet increasing traff ic classic NaaS buyers, especially those with
dema nds or huge traffic spikes. no existing investment in a WAN.
Website: https://www.rackspace.com/
v
1. https://www.cse.unr.edu/~mgunes/cp
e401/cpe401sp12/lect15_cloud.ppt
2. https://www.slideshare.net/Agarwalja
y/cloud-computing-simple-ppt-
41561620
3. https://www.slideshare.net/AkhilRaj16
/virtualization-cloud-computing-
47824409
For Industrial Internet, analysts expect the industry to reach $ 151 billion The technology can analyze video
by 2020, indicating its importance and rapid adoption of the technology recordings of up to an hour in one minute,
in the industry. Examples of this are Schindler's elevators for the Internet and assemble important parts into one
of Things technology, so sensors send data on more than a million brief presentation of specialized security
elevators to cloud servers to simulate elevator work, anticipate elevator forces, increasing security and protection
problems, report possible closures to other lifts around the world, To for all.
increase passenger safety levels and significantly reduce operating In addition to many functions, for example,
costs.The open cloud computing platform includes FusionCloud, if a person wants to attend a meeting, the
FusionStorage6 and FusionStage Paas, which provides 31 services in car will be equipped with a storage system
computing, warehousing, data transfer, security, data and database contains all the dates of meetings and
analysis, software development, testing, launch and management, and
places of their presence, the car will pass the shortcut to access in time 3. that span a multi-cloud world. Whether the
and in the event of delay due to congestion will send a report to the cloud is private, public or hybrid, or any
management of the meeting on the occurrence of delay with the A combination of these types, customers can
picture of the location and nature of the congestion. All this is done by adopt multiple cloud architectures by
supporting artificial intelligence for the cloud computing system. simplifying how customers communicate
and protect their cloud. With the help of
- Advanced techniques to support the evolution towards digital automated learning, users unite across
transformation: cloud structures - including one policy and
one security check - by learning user
preferences and performing applications
across public and private cloud platforms
for seamless interoperability.
4. Data visualization from the network
focuses on providing data and ideas to
support usage
Due to the high pressure on the networks, Cisco has unveiled the latest 5. models ranging from infrastructure
v improvement to security threat
technology in the public and private sectors under the slogan "a safe and
investigation, giving customers the ability
smart platform for digital business" at GITEX 2018. And almost the value
to extract value from the data that
of the artificial intelligence market will reach about 5.05 billion US dollars
passes through their network in the
by 2020. From data centers to the block chain, "Block Qin" and artificial
timeframe that delivers the most value.
intelligence and the Internet of things and large data, the world is
6. Empowering employee and customer
witnessing a quantum leap towards digitization, enhanced by ICT
experience: It has the ability to connect
solutions that include computing Cloud . people, teams, and customers together,
At GITEX, Cisco is accompanying the customer through a converged and artificial intelligence is an implicit
journey based on its secure and intelligent platform for digital work, component of our technology to share
reviving digital innovations through five key pillars, including: and experience employees and
customers through simplicity,
1. Reinventing the network: The potential of automated learning gives automation, and improved experience.
us the ability to analyze large amounts of network data - from 7. Integrate security into network fabric:
telemetry to traffic patterns, transforming the motion itself and have a more rapid detection capability
self-healing from internal shocks such as hardware failures and than anything abnormal and investigate
external shocks such as electronic attacks. the matter, isolating faulty devices,
2. Enable a multi-cloud world: Networking, security, analytics and devices or devices.
management capabilities are assembled to provide cloud solutions
8. The Gartner Foundation highlighted the most important strategic will be delivered to the nearest point of these
directions in technology as part of ContinuousNEXT. The future terminals by routing terminals using
strategy is in the form of automated objects and enhanced intelligence. Internet objects technology, which will
For example, artificial intelligence is used in conjunction with Internet develop complementary models based on a
technologies, Provide high-IQ areas and integration. This impact is cloud-managed package of central services,
combined to create new opportunities, and to leapfrog the quality of At the central server level, but within
the top 10 strategic trends in technology that the Gartner Foundation servers deployed to work environments, and
highlights in 2019, such as self-control objects including aircraft, on the terminals themselves.
robots and machines. For example, a plane scans a field and results
Quantitative Computing (Future)
show that it is ready Harvesting with intelligence will direct a
reference to a self-controlled harvester to do its job, and other
examples
v
Is one of the non-classical types of
computing that works on the quantum
state of subatomic particles (eg, electrons
and ions), which represent information as
elements in the form of quantum bits.
Reference & Links that Extracted from the content the seminar.
All content following this page was uploaded by Abdelrahman Osman on
22 March 2018.
(**)https://www.wamda.com/ar/memakersge/2017/08/
(*)www.menaherald.com/tech/information-technology
*https://www.menaherald.com/tech/information-technology/10
(1) Arab British Academy for Higher Education and Definition
(2) of cloud computing
Abstract. Particularly for commercial web
applications. The on-demand, pay-as-you-
The Cloud computing providers are unable to predict geographic
go model creates a flexible and cost-
distribution of users consuming their services, hence the load
effective means to access compute
coordination must happen automatically, and distribution of services
resources. For these reasons, the
must change in response to changes in the load. To counter this problem,
scientific computing community has shown
we advocate creation of federated Cloud computing environment
increasing interest in exploring cloud
(InterCloud) that facilitates just-in-time, opportunistic, and scalable
computing. However, the underlying
provisioning of application services, consistently achieving QoS targets
implementation and performance of clouds
under variable workload, resource and network conditions. The overall
are very different from those at traditional
goal is to create a computing environment that supports dynamic
supercomputing centers. It is therefore
expansion or contraction of capabilities (VMs, services, storage, and
critical to evaluate the performance of
database) for handling sudden variations in service demands, The
HPC applications in today’s cloud
proposed InterCloud environment supports scaling of applications
environments to understand the tradeoffs
across multiple vendor clouds. We have validated our approach by
inherent in migrating to the cloud. This
conducting a set of rigorous performance evaluation study using the
work represents the most comprehensive
CloudSim toolkit. v
evaluation to date comparing conventional
1-1 Introduction HPC platforms to Amazon EC2, using real
applications representative of the
Today the use of cloud computing applications is mushrooming at an
workload at a typical supercomputing
ever increasing rate . But what exactly in cloud computing ? " cloud
computing is a technology that allows the users to access software center. Overall results indicate that EC2 is
applications ,hardware , six times slower than a typical mid-range
storage , computing processes directly from the web , these device Linux cluster, and twenty times slower than
have direct , Fast and cheap links to the internet which make it easier a modern HPC system. The interconnect on
to upload and download programs and applications such the internet and
the EC2 cloud platform severely limits
online network storage services, Cloud computing has seen tremendous
growth, performance and causes significant
variability work together. This model. relies
on remote servers
Conclusion
Cloud computing has seen tremendous growth, particularly for
commercial web applications. The on-demand, pay-as-you-go model
creates a flexible and cost-effective means to access compute
resources.
cloud computing is a technology that allows the users to access
software applications ,hardware , storage , computing processes
directly from the web , these device have direct , fast and cheap links
to the internet which make it easier to upload and download programs
and applications such the internet and online network storage services
We predict cloud computing will grow, so developers should take it into
account.
v
Abstract
Cloud computing supplies on demand services over the Internet with the 1- CLOUD COMPUTING BUILDING BLOCKS
help of a large amount of virtual storage. The main features of cloud There are typically three major types of
computing is that the user does not have any setup of expensive cloud computing services. The three are
computing infrastructure and the cost of its services is less. Which Software as a Service (SaaS), Platform as
means handing data to the third party. Despite the numerous benefits a Service (PaaS), and Infrastructure as a
of cloud computing. But the idea of moving from local computing to Service (IaaS). In most cases, the ‘layers’
remote computing it could be risky by many of security issues and of cloud computing are represented as a
challenges for both consumer and provider. Because the cloud pyramid with IaaS at the bottom, PaaS at
computing services deliver to the users by third party which turn up a the middle and SaaS sits at the top.
new security issues Describing and differentiating the three is
key to gaining a better understanding of
1- Introduction Cloud computing.
Computing as a service has seen a unusual growth in recent years. The
SaaS is the cloud computing layer most
primary motivation for this growth has been the promise of reduced
people have interacted with and are likely
capital and operating expenses, and the ease of dynamically scaling and
to use in their day to day lives. Software as
deploying new services without maintaining a dedicated compute v
a service is where computing applications
infrastructure. Hence, cloud computing has begun to rapidly transform
are accessed through the internet; this
the way organizations view their IT resources. From a scenario of a
eliminates the need to download, install and
single system consisting of single operating system and single run applications on local computers. In
application, organizations have been moving into cloud computing,
most cases, these applications are
where resources are available in abundance and the user has a wide
managed by a third party vendor. The user
range to choose from. Cloud computing is a model for enabling
has to log into an account in order to gain
convenient, on-demand network access to a shared pool of configurable access to the applications interface.
computing resources that can be rapidly provisioned and released with
service provider interaction or minimal management effort. Here, the PaaS A platform is a software
end-users need not to know the details of a specific technology while environment used to develop and run
hosting their application, as the service is completely managed by the applications. So Platform as a Service
Cloud Service Provider (CSP). Users can consume services at a rate (PaaS) can be defined as a computing
that is set by their particular needs. This on-demand service can be platform that enables the creation, testing
provided any time. CSP would take care of all the necessary complex and implementation of software easily and
operations on behalf of the user. It would provide the complete system quickly without the complexities of buying
which allocates the required resources for execution of user and maintaining the infrastructure and
applications and management of the entire system flow. additional software. Unlike SaaS which is
software delivered via the internet, PaaS
provides a platform for creation of applications over the internet. private cloud services, although each of
Another difference between PaaS and SaaS is the aspect of them has its own separate and different
management. In PaaS, the vendors manage networking, storage, entity. The choice of public and private
servers, virtualization, OS, middleware and runtime, but the end users cloud services depends on several factors,
are the ones who manage the data and applications. including security, cost and flexibility.
IaaS delivers Cloud Computing infrastructure to organizations, 1- Cloud Computing Risk Issues
including things such as servers, network, operating
The CIAsystems,
Triad and
storage, through virtualization technology. These cloud servers are Confidentiality: Confidentiality is
typically provided to the client through a dashboard or an API, and IaaS the prevention of the intentional or
clients have complete control over the entire infrastructure. IaaS unintentional unauthorized disclosure of
provides the same technologies and capabilities as a traditional data contents. Loss of confidentiality can occur
center without having to physically maintain or manage all of it. IaaS in many ways. For example, loss of
clients can still access their servers and storage directly, but it is all confidentiality can occur through the
outsourced through a “virtual data center” in the cloud. Also cloud intentional release of private company
computing consists of four deployment models; Private cloud, Public information or through a misapplication of
cloud, Hybrid cloud and network rights. Some of the elements of
v
telecommunications used to ensure
Community cloud. Details about the models are given below.
confidentiality are as follows: Network
Public Clouds Public clouds are owned and operated by third parties; security protocols
they deliver superior economies of scale to customers, as the Network authentication services
infrastructure costs are spread among a mix of users, giving each Data encryption services
individual client an attractive low-cost, “Pay-as-you-go” model. All a- Integrity: Integrity is the
customers share the same infrastructure pool with limited guarantee that the message sent is the
configuration, security protections, and availability variances. These are message received and that the message is
managed and supported by the cloud provider. One of the advantages of not intentionally or unintentionally altered.
a Public cloud is that they may be larger than an enterprises cloud, thus Loss of integrity can occur through an
providing the ability to scale seamlessly, on demand. intentional attack to change information
Private Clouds cloud infrastructure is provisioned for exclusive use by (for example, a website defacement) or,
a single organization comprising multiple consumers. It may be owned, more commonly, unintentionally (data is
managed, and operated by the organization, a third party, or some accidentally altered by an operator).
combination of them, and it may exist on or off premises. Integrity also contains the concept of
nonrepudiation of a message source, which
Hybrid Clouds The hybrid cloud is a type of cloud computing, a we will describe later. Some of the
combination private cloud, and public cloud. The hybrid cloud brings
together the services and benefits that can be provided by public and
b- elements used to ensure integrity include the following: Additional factors that directly affect cloud
Firewall services software assurance include authentication,
Communications security management authorization, auditing, and accountability
Intrusion detection services
3- Authentication is the testing or
c- Availability: This concept refers to the elements that create
reconciliation of evidence of a user’s
reliability and stability in networks and systems. It ensures that
identity. It establishes the user’s identity
connectivity is accessible when needed, allowing authorized users to
and ensures that users are who they claim
access the network or systems. Also included in that assurance is the
to be. For example, a user presents an
guarantee that security services for the security practitioner are
identity (user ID) to a computer login
usable when they are needed. The concept of availability also tends to
screen and then has to provide a password.
include areas in an information system (IS) that are traditionally not
The computer system authenticates the
thought of as pure security (such as guarantee of service, performance,
user by verifying that the password
and up time), yet are obviously affected by breaches such as a denial-
corresponds to the individual presenting
of-service (DoS) attack. Some of the elements that are used to ensure
the ID.
availability are as follows:
- Fault tolerance for data availability, such as backups and redundant
v 4- Authorization refers to rights and
disk systems privileges granted to an individual or
- Acceptable logins and operating process performance process that enable access to computer
- Reliable and interoperable security processes and network security resources and information assets. Once a
mechanisms user’s identity and authentication are
established, authorization levels determine
2- Cloud Computing Security Challenges the extent of system rights a user can hold.
Cloud services present many challenges to an organization. When an
organization migrates to consuming cloud services, and especially 5- Auditing to maintain operational
public cloud services, much of the computing system infrastructure assurance, organizations use two basic
will now be under the control of a third-party Cloud Services methods: system audits and monitoring.
Provider (CSP). Many of these challenges can and should be These methods can be employed by the
addressed through management initiatives. Some general cloud customer, the cloud provider, or both,
management processes will be required regardless of the nature of depending on asset architecture and
the organization’s business. These include the following: deployment.
- Security policy implementation
- Computer intrusion detection and response A system audit is a one-time or
- Virtualization security management periodic event to evaluate security.
3- Cloud Security Services
Monitoring refers to an ongoing activity that examines either the adequate protection against both damage
system or the users, such as intrusion detection. by the elements, e.g. caused by storms and
flooding, and against unauthorized entry. If
6- Accountability a customer requires a particularly high
is the ability to determine the actions and behaviors of a single level of availability for their services, the
CSP should also reserve capacities in
individual within a cloud system and to identify that particular individual.
backup or redundant data centers which
Audit trails and logs support accountability and can be used to conduct can compensate for another data center
postmortem studies in order to analyze historical events and the failing. The data centers should be located
individuals or processes associated with those events. Accountability far enough away from each other
is related to the concept of nonrepudiation, wherein an individual geographically so that a controllable
cannot successfully deny the performance of an action. damage event
v
Abstract resources and computer systems
available on demand that can provide a
In the age of the Internet, the age of information technology, the amount
number of integrated computer services
of data and information available on the Internet is enormous and
without being restricted to local resources
accumulate files in public computers and private, and requires a large
in order to facilitate user access. These
sector of the community to access this information in a system that
resources include data storage, backup,
allows them to access them and individuals see them at any time, starting
and self-synchronization, and include
From seeking information to institutions including educational
software processing and scheduling
institutions, schools, institutes, universities, etc.). As storage costs
capabilities. When connected, the user can
continue to rise, organizations are faced with the challenges of data
control these resources through a simple
recovery and backup, demonstrating the importance of cloud computing,
software interface that simplifies and
which aims to protect and manage data more efficiently, efficiently and
ignores internal details and processes.
easily. Cloud computing is the new solution for managing and storing data
Paul et al. (2010) also see cloud computing:
and information, Students access applications from anywhere, anytime
network services that offer cheap, secure,
and from any connected device . on-demand platforms that can be
v
accessed and used in easy ways. The
Introduction National Center for Standards and
The meaning of cloud computing is shifting from the use of electronic Technology defines the cloud as: On-
applications to computers or connecting to the internal network to be demand at any time and from any place to
through the Internet browser and anywhere in the world and only need the resources on the Internet and can be
to connect to the Internet, and to illustrate the technology of cloud deployed and deployed with minimal effort
computing will be presented concept and concepts associated with it: or interaction with the service provider
Such resources include the API, servers,
Cloud computing (core concepts): cloud computing has been widely
stores, applications, blogs, presentations,
seen and reflected on its concept, Hussam and Akron (2013, Hosam, F, et
and mail messages Documents,
al.) Have stated that cloud computing is a technology that relies on the
conversations, software, and networks.
transfer of processing and storage space to the so-called cloud G server
Beneficiaries can be granted security
is accessed through the Internet, thus turning IT programs from
access to such resources by utilizing self-
products to services. Thus, this technology contributes to the removal of service and cloud-based cloud
the problems of maintenance and development of information technology
technologies on demand through
programs on the companies used for them, and therefore the focus of smartphones, tablets, laptops, and
the efforts of the beneficiaries on the use of these services only. Al-
computers (Mell, P, Grance, T, 2009). This
Zoube, M) emphasized that cloud computing is a term that refers to online
definition of the concept of computing is more comprehensive and creation of new services across the web in
illustrative. the light of cloud computing. Cloud
computing enables learners to connect
Cloud computing features :
from anywhere to access and share
Cloud computing technology has enabled many of its features, including: resources through the interactive
1 - Hosting data on an external system. interface and environment. Learning is a
flexible learning environment that
2 - Many services have a pay structure where they only need to pay when
transcends time and space where learners
the service is used 3. Development is feasible so that companies can
sit in front of computers in their schools,
make changes to the storage base according to the requirements.
homes, or anywhere else studying
4 - Reduce spending: compared to traditional data storage. programmed courses on the computer or
through websites, interacting and
5- Ease of access: Cloud computing systems enable you to access your
communicating with their peers and
organization's data from anywhere and at any time, from computers of
teachers simultaneously or
all kinds, mobile phones and smartphones.
asynchronously to access sources,
6- Continuity of service: One of the most important characteristics to information, etc. . According to Mohamed
v
be searched when choosing between cloud computing systems, Abdel Hamid (2008), the e-learning
companies providing this service periodically back up their customer environment is the environment that
data and important files, and updates to drivers, to ensure that data is transcends geographical and temporal
not lost due to interruption Power supply or any malfunctions in the boundaries to provide and benefit from the
drivers. 7- Security and protection: The mission of the cloud service educational service.
provider is to provide the highest level of insurance for each data and
E-learning environment can be defined
protect against theft or any risks that could threaten the security of your
in the light of cloud computing, the Web.
data.
as a learning environment through which
8- The user can access the files and applications through this cloud learning objects and learning services are
without the need to provide the application in the user Nineteenth accessed by learners and communication
Scientific Conference on Information Systems and Computer Technology, and interactions between learners from
2012). anywhere and at any time using Web
E-learning Evidence in the Light of the Integration of Cloud services 200 in a widespread, interactive
Computing and Web Services .: E-Learning Environment: The e- space where learners interact with
learning environment has changed to more interactive learning learning objects and with the teacher and
environments with an advanced level of interaction as a result of the their peers in a context A real environment
development of Web services. Personal information sharing and the
based on cloud computing models whether it's on PCs, tablets, or II. mobile phone can synchronize with
laptops. The main applications of cloud computing and Web 2.0 services its personal account on those servers and
that can be used and deployed within the proposed e-learning take back-up copies of the phone book or
environment will be presented as follows: addresses in the phone, but also the ability
to control, close or track the phone
Cloud computing applications, and Web services that can be employed
through the use of that service and also the
within the e-learning environment:
I Cloud service. File and sharing
I. Cloud computing applications Software as a service: There are applications: File - sharing and
many companies that offer cloud computing technology whether collaboration in real - time This service
it is web applications or storage space or even some complex connects many users at the same time and
operations, The most important applications of cloud computing offers presentations designed with
technology provided by companies are: Google Docs and Google programs such as PowerPoint, which
Docs is a cloud computing application. Through this service, makes communication between
users can use a suite of programs similar to Office programs researchers faster and easier. The most
without The service allows you to save files after you finish them famous providers of this service site http:
on your personal account and share and edit those files with / / drop. Io:
v
other people. Google provides three applications: Google
Applications of cloud computing in libraries
Documents, a text editor similar to Microsoft's Word program.
as part of the learning environment: The
With Google Spreadsheets, it is an Excel-like program that works
most important new applications that
as a presentation for presentations such as PowerPoint. Google
emerged after the spread of the concept of
Drive is a cloud storage and file synchronization service. There
cloud computing, which can benefit the
are many companies that have relied on providing more
libraries: - Dura 7 "DuraCloud: is a hosting
services such as Zoho, which offers many user applications
service focused mainly on providing
such as software Editing texts, chat programs and other useful
libraries services Provision of local
applications that can be used directly through the site.
services to libraries shared by the service
Microsoft Office 365 also provided a fee for each package with
These libraries provide maintenance costs
the Office 2010 capabilities, and Lync Which allows the user to
for their own devices. This service focuses
send messages, hold video conferencing, and direct telephone
on the provision and access not only of
calls are considered the most important cloud tools. Mobile
digital group preservation services, but
phones service: Mobile operators have also benefited both
also enables the participation of important
mobile and service providers, such as Apple and T mobile, from
historical, humanitarian and scientific
cloud computing applications. Many mobile service providers
collections with other libraries. Dura in
have provided services that allow users of certain types of
support, digital archiving, saving
phones to operate their own accounts On their servers. The
repositories, and converting a very large collection of digital images 1. Visually: The site offers customizable
Google Chrome OS: Google Chrome OS: Built to be installed in a few tools and templates to express what you
minutes on a large number of operating systems It allows the user to want if you are not an expert in graphics
use an equivalent operating interface To a large extent with the software.
browser Google Chrome is based on the concept of cloud computing
2. PiktoChart: A very easy-to-use site
only as the system is only a browser window allows the user to use all
offering almost 6 free and editable models
the applications available on the Internet and existing on the Google
in which creativity. 03 Easelly: The site
Web Store, which offers applications and programs covering all the
provides tools from icons and images to
functions you do on operating systems Regular start from writing
create a successful infographic and also
reminders and even movie production. Pixler Photo Editor: Pixlr Editor
contains free templates are adjustable.
is a professional image editor that works with high-definition design
and online image editing without installing, downloading, buying or 3. Infogram: An easy-to-use site that also
subscribing it is completely free and available to all users on all provides 6 free templates different from
browsers and operating systems and only needs Flash Flash Player those provided by other websites d.
filled in order to work on your browser. It can be used to edit images 4. Creately: This site contains a lot of tools
stored locally or from an external link and a user can register v
an such as frames, indicators and icons that
account and store his image on his account to be able to edit it at any help to create a successful infographic.
time. The possibilities of the program are comparable in strength to
Conclusions
Adobe Photoshop but for free and from anywhere.
And Recommendations:
Video Editor Jay Cut: Jay Cut is a program that enables users to create
videos without downloading and bothers. It works on the Internet and E-learning evidence faces some
does not need special specifications to work. It requires only a browser challenges, especially in the light of
and Flash player. Flash Player is loaded with many functions in the increased user setup, rapid development
production and editing of movies, including recording from the web of services and applications available over
camera Export movies directly to YouTube and is available in many the Internet, and the task of updating
languages for ease of use. software, hardware and storage space.
The best solution is to use new technology
Infographics: is an innovative art of converting textual information and
(integration between cloud computing and
graphics into images and graphics, making it easier for you to
web services 2)) to meet these challenges
understand and understand them. It has appeared in the Infographic
and access to a highly interactive and
with its various designs in an attempt to create a new visual form for
accessible learning environments well as
assembling and presenting information or conveying data in an
the development and ease of use and
attractive form to the reader. Sites offered include:
affordability. This is what cloud computing
technology provides. It provides the infrastructure for this
environment (storage space and devices), also allows development
platforms and the operation of applications that are hosted on the
infrastructure of the provider, as well as the use of software as a
service through computing applications Clouds that are integrated
with web services. Therefore, the following recommendations can be
proposed: - Developing e-learning environments in the light of modern
services and applications that require registration only, which achieve
an advanced level of interaction within the learning environment. .
Develop mechanisms to preserve the privacy and confidentiality of
data and files of the learning environment and learners. - Setting
standards for the design of cloud learning and its environments.
v
Abstract The Data Mining techniques are used
to realize the hidden and unknown
Cloud Computing is resourceful in which computing resources are made information from the database.
available on- demand to the user as required. Data processing may be a Data Mining could be a key step
process of discovering interesting patterns from an oversized quantity of in knowledge discovery.
data. The difficulty is in assembling these data and carrying out computations
to get the significant information. Data processing techniques and It's the utilization of specific algorithms to
applications are often effectively employed in cloud computing setting. extract patterns and knowledge from the
Data mining and also the cloud computing are thought of as major data. The goal of data mining is to convert
technologies. The data mining in cloud computing permits organizations the massive volume of data into useful
to centralize the management of software and data storage. The information and knowledge.
information in this paper provides a review of assorted data processing 1.2. Cloud Computing
techniques and different types of algorithms in cloud computing which
might be used for resource sharing. Cloud computing allows end users, tiny and
medium-sized users to gain
1. INTRODUCTION resources that are computational in nature.
v Besides, it permits the users to use
1.1. Data Mining
resources within the cloud and satisfy
Data Mining may be a logical method that is used to search through a large their requirements. Cloud user will access
amount of information so as to seek out helpful data by using the following this data anytime anyplace within the world
techniques. They are: Clustering, Classification, Association, Regression, without any loss because of system failure.
Attribute Importance, Anomaly Detection and Future extraction. The cloud services are a platform as
Data Mining is a part of the larger framework, referred as information services (PaaS), Infrastructure as service
discovery within the database that covers a complicated method from data (IaaS), and software as service (SaaS).
preparation to knowledge modeling. Infrastructure as a Service: IaaS is
a service that is provided to the consumer
Components of Data Mining:
for storage, processing, networks and also
Association – looking for patterns wherever the events are associated with the computing resources where the
another event. Sequence analysis – looking for a pattern wherever one patron will be ready to deploy and run
event leads to another event. the software which includes OS (operating
Classification – looking for a replacement pattern. Clustering – looking system) and application.
out a bunch of patterns that don't seem to be antecedently known. Platform as a Service: PaaS could be
Forecasting – Finding patterns of data which will result in predict the a service that is provided to the consumer
future. wherever he will produce an application
using programming languages, services, and tools that are supported by implausible issue to be concerned by
the supplier. information mining. The Microsoft suite of
Software as a Service: SaaS could be a service that is provided to the cloud based administrations presents
consumer who will use the application type the cloud infrastructure. another specialized sneak peak of Data
The consumer doesn't have any worry regarding the way to manage or Mining within the "Cloud" as "DMCloud".
control the cloud infrastructure. DMCloud permits you to perform
The Cloud is Virtualized data center which may manage or control itself. some basic data mining
Cloud is virtual computing resources that the cloud users will access it at assignments investment a cloud-based
any time from anyplace. Analysis Services association. The
The features of cloud computing: info (data) mining tasks include:
3. High reliability. The multiple copies of data are maintained in cloud to Scenario Analysis
avoid the loss of data and to extend the reliability. The cloud computing Prediction Calculator
is more reliable than using the local computer.
The Data mining is used within completely
4. The flexibility (versatility). Cloud computing isn't for a different requisitions , for instance,
selected application, in the "cloud" can be constructed the support of the medicinal services, personnel
ever changing applications, with a "cloud" will support completely administration, math, science, in a
different applications running at the same time. different web site. Through cloud
5. The high scalability: "Cloud" size is dynamically scalable to registering data mining decreases the
meet the requirements of applications and user scale growth. jumps that keep very little organizations
from profiting off the information mining
2. DATA MINING IN THE CLOUD instruments. We investigate how the
Information mining systems and requisitions are sincerely information mining instruments like SaaS,
needed within the distributed computing ideal model. As PaaS, and IaaS are used within distributed
distributed computing is accessing into all the more in all degrees of computing to concentrate the data. This
business and experimental process, it transforms into an characteristic is utilized by individuals to
manufacture data posting and obtain knowledge hidden data structures. There is no
obtain data regarding distinctive themes via seeking provision of
in discussions and then forth. This administration is utilized by the providing correct characterization of
organizations to determine what style of data is gliding on the planet- unobserved samples that are generated
wide for their items or administrations and take activities dependent from by same potential distribution.
upon the information displayed. The data recovery commonsensible Broadly clustering has two areas based on
model through the multi-executor framework with information which it is categorized as follows:
mining during a distributed computing atmosphere has been proposed. It Hard (clustering) clump:
is prescribed that clients would possibly furthermore guarantee that In hard clustering same
the solicitation created to the IaaS is within the extent of combined object will belong to one cluster.
information warehouse and is obvious and easy. The work for the multi- Soft (clustering) clump: during
executor framework gets to be less demanding through the provision this clustering same
of the information mining calculations to recover serious data from the object will belong to completely
information warehouse. different clusters.
3. DATA MINING ALGORITHMS
v
Various Data Mining algorithms and techniques are used for discovering 3.3 Regression
the knowledge from the databases. Regression technique is used for
3.1 Classification prediction. Regression analysis is used
to relate the independent variables and
Classification is that the data processing technique that is most ordinarily dependent variables. Attributes are
used, that employs a group of pre-classified examples to develop a independent variables that are
model which will classify the population of records at large . The data already best-known and response
classification method involves learning and classification. In Learning variables are what we are going to predict.
the training data are analyzed by the classification rule. In Unfortunately, several real-world issues
classification, take a look at data are used to estimate the accuracy of the aren't merely a prediction. For example, it's
classification rules. If the accuracy is appropriate the principles then that terribly tough to predict if it depends
may be applied to the new data tuples. on complicated interactions of multiple
3.2 Clustering predictor variables. Therefore, to forecast
to further values more complicated
The unsupervised classification that's known as clustering or it's
techniques techniques (e.g., logistic
also referred to as exploratory data analysis in which there's no provision
regression, decision trees, or neural
of labelled data. The main aim of clustering technique is to separate
networks) are used. Neural networks may
the untagged data set into a finite and distinct set of natural and
be accustomed each classification and regression models. 2. C representative points are stored to
calculate the distance between a pair of the
3.4. Association Rule
cluster.
Association and correlation are used
3. These are determined
to establish the frequently used items from the big data set.
by initial choosing C well-scattered
This type of technique helps businesses to form certain points inside the cluster and
decisions, like catalog style, cross marketing, and client shopping behavior then diminishing them towards the
analysis. The main purpose is to find rules joined with regularly co- center of the cluster by a fraction α.
occurring items, used for market basket analysis, root-cause analysis
and cross-sell. The rationale is to provide the valuable info that describes 4. Representative points of the cluster
links between data items from an outsized volume of data. are used to calculate its distance
from different clusters.
3.5. Neural networks
The neural network could be a set of connected input/output units and
3.7. BIRCH (Balanced Iterative
every connection contains a weight present with it. At learning phase, it is Reducing and Clustering using
ready to predict the right category labels of the input tuples by adjusting Hierarchies)
v
weights. Neural networks are used to derive BIRCH algorithm could be a kind of
the meaning from sophisticated data and it can be used to extract hierarchical of clustering algorithm. It
patterns. These are well matched for continuous-valued inputs and is essentially used for significantly very
outputs. One of the best data processing techniques are Neural networks large databases as a result of it
that are used for characterizing patterns or trends in large set of data reduces the quantity of input/output
and it's very appropriate for prediction or prognostication desires. operations. Clustering could be a one
3.6. CURE Algorithm among the data mining algorithm that is
employed to cluster the similar objects in
Cure is an agglomerative kind hierarchical clustering algorithm uses order that the data will be known simply.
portioning of the data set. A mixture of partitioning and random Therefore, a set of objects that are
sampling is employed to handle an outsized database. In this coherent internally is a
algorithm, every partition is partly clustered that is 1st partitioned off from cluster, however clearly dissimilar to the
the drawn sample of datasets. Partial clusters objects belonging to alternative clusters.
are nonetheless clustered to get desired clusters.
3.8. K- means Clustering
Algorithm
Algorithm It is one amongst the
1. Start considering each of the inputs as a separate cluster and simplest unsupervised learning algorithms
every ordered step mix the closest pair of clusters.
that are quite efficient in solving complex clustering issues. The
procedure employs a simple and easy way to categorize a given data set
into a specific variety of clusters. K-means clustering algorithmic
program is used to cluster the varied observations that are associated
with one another without having any idea concerning the relationships
existing among them. Some feature vectors in an n dimensional space
may be used to represent the objects, where n suggests that the
whole range of the features that are being used for the description of the
clusters. Once it's done, K-points can be selected by the algorithm within
the vector space. These k-points become initial centers of the cluster.
Then all objects are going to be allotted to the middle points that are at a
minimum distance from them. This method is going to be repeated
until the converging of the process.
4. CONCLUSION
The users are permitted to retrieve information virtually by v Cloud
Computing at any time from anyplace. The data mining in cloud
computing permits the organization to centralize with the
assurance of efficient, reliable and secure services for their users.
Searching for frequent patterns within the database is one among the
foremost vital data processing problems. Here we explore how data
processing algorithms and techniques are utilized in cloud computing to
extract the information. The main issue with data processing technology
is that the space needed for the item set and their operations
are very large. If we combine the data mining techniques with cloud
computing atmosphere, then we are able to rent the area from the
cloud suppliers on demand.
ABSTRACT (for example, stockpiling) and programming, since time-sharing
Cloud computing alludes to high adaptable registering applications, utilities imagined in 1960s, arrange PCs in 1990s and business
stockpiles and stages as a support of organizations, people and lattice registering to cloud computing in later years. Cloud Today
governments. In this manner, SMB (Small and Medium Business) cloud administrations give membership or pay-per-utilize based
associations are adjusting cloud computing administrations step by administration; the administrations give over the Internet
step to spare expense and to build effectiveness in their business progressively, in which expands fundamental IT abilities into
condition. While cloud benefit advantages and power are vigorous territory. The SMB organizations are understanding that
fathomable, however now more worry about security in cloud essentially by taking advantage of cloud condition they can
computing "What amount secure is cloud computing condition?". increase quick access to best business applications offices and
Noticed that security is one of the fundamental boundary for drastically support their asset foundation at extremely least cost.
proceeding with development of cloud computing. For some real Cloud administrations are mostly center to diminish by and large
security dangers and issues undertakings and people are reluctant customer side prerequisites (equipment and programming) and
to convey their information and applications in cloud condition. In multifaceted nature.
this paper, the fundamental goal is to distinguished significant 2. SECURITY RISKS IN CLOUD SERVICES
security dangers and issues those are have to consider amid
By and large cloud computing gives powerful advantages in IT
sending and advancement of administrations in cloud and the path
world as respect of their gainful qualities and administration
how to alleviate those security dangers and issues. In any case, it v
models. In any case, it isn't totally anchor and hazard free as far
is critical to realize that, cloud computing isn't uncertain
as information security challenges as like some other
principally, it simply should be overseen and gotten to safely.
correspondence models or administrations. Cloud execution is
1. INTRODUCTION: influenced because of security issues. Thusly, specialist
IT (Information Technology) enterprises are driving innovation to organizations are in charge of good consideration of security in
another field every now and then. The Internet is a standout frameworks and information. Administration administrations and
amongst the most mainstream innovation now-a-days by its class. administrations are authorized a few arrangements and
Presently it is on the edge of upset, where assets are all inclusive strategies to defeat such issues, for instance: virtualization,
interconnected. Subsequently, assets can be effectively shared and verification components and cryptography systems, yet those
overseen from anyplace and whenever. advancements and techniques have a few vulnerabilities in the
condition of craftsmanship executions. To examination and
Cloud computing is the principle component of this standard that distinguish fitting security dangers are indispensable, expect
gives a substantial stockpiling region where assets are accessible execution scope for observing and evaluating in cloud condition.
from wherever to everybody as an administration as opposed to as To comprehend and relieve security dangers and issues are vital
an item. All through in the historical backdrop of software advance forward for anchoring cloud computing. Whenever
engineering different endeavors have been made to discharge information, web applications and administrations are being
clients from the necessities of PC equipment, facilitated in cloud condition by specialist organizations,
control of these are no longer in their grasp to oversee; here activity administration, change administration and outsider
additionally emerge a few issues about free of control to anchor administration are being appraised to some degree vital to
information.
relieve dangers as indicated by 58.3%, 50.0% and 50.0%.
What’s more, other. Cloud administrations are shared foundation to Cloud computing and virtualization are basic hazard territory
build potential vulnerabilities as far as unapproved information get recorded in "Table1.
to, which worry about information protection, character Table 1. Cloud Computing Risks
administration, verification, consistence, privacy, uprightness,
accessibility, encryption, web convention (IP) vulnerabilities (a large
portion of the cases IP is un-believed which permits man in the
center assault), organize security and physical security. Some
different issues are likewise need to trouble separated from
security, for example, SLA (benefit contract between specialist
organization and buyer) and outsider administration, execution,
virtualization dangers, absence of gauges and inspecting techniques
and consistence laws and directions. There are some significant
dangers identified with cloud security appeared in 'Fig 1'. The 3. SECURITY ISSUES IN CLOUD SERVICES
numbers speak to need as indicated by their events shape 1 to 10. Cloud
v computing administration models are SaaS, PaaS and
A meeting report dependent on particular security dangers territory IaaS, which gives programming as an administration, stage as
demonstrated that information and data security is the real hazard an administrations and foundation as a support of end clients
region in cloud computing condition as indicated by 91.7% of the or clients. These three administration models are based over
respondents. About 66.7% respondents recognized that calamity one another, as appeared in "Fig. 4"; thus their abilities are
recuperation is the second most astounding basic hazard zone in acquired and in addition security issues and dangers.
cloud. Be that as it may,
v
Content eyeOS lets you upload your files and work
with them no matter where you are. It
INTRODUCTION
contains applications like Word Processor,
Examples of cloud operating systems
Address Book, PDF reader, and many more
Eyeos
developed by the community eyeOS is all
The Goals for eyeOS
about centering work and amusement in a
Architecture of eyeos single place. eyeOS is about removing
compatibility issues between applications
How to installing eyeos and operating systems everywhere. eyeOS
is available in 30 translations. And is used
REFERENCES
privatively and professionally through out
INTRODUCTION the world. rather it is used for public
A cloud operating system is a kind of operating system prepared to environments, schools, small and large
operate within cloud computing and virtualization environments. A cloud companies alike or a way to share data
operating system manages the operation, execution and processes of with your family. eyeOS has a use in our the
virtual machines, virtual servers and virtual infrastructure, as well as the
digital life
back end hardware and software resources. Acloud operating system v
may also be called a virtual operating system. The Goals for eyeOS:
Architecture of eyeos
Step 4
REFERENCE
Step 7
Logging in https://en.wikipedia.org/wiki/EyeOS
eyeoscloudoperatingsystem-
phpapp02 (1).pdf
Developer manual.pdf
Ieee Computer society webos
article.pdf
Step 8
If you creat a new count
Outline The New York stock exchange
generates about 4 terabyte of data
• Growth of big datasets per day
• YouTube had around 80 petabytes of
• Introduction to Apache Hadoop and Spark for developing applications storage in 2012
• Components of Hadoop, HDFS, MapReduce and HBase • Internet Archive stores around 19
petabytes of data
• Capabilities of Spark and the differences from a typical MapReduce
solution Cloud and Distributed Computing
– Clustering
Hadoop HDFS
– Collaborative
• Hadoop distributed File System
– Filtering (based on Google File System
(GFS) paper, 2004)
Hadoop Ecosystem
– Serves as the distributed
file system for most tools
in the Hadoop ecosystem
• Enable Scalability
– Scalability for large data
– on commodity hardware sets
• Handle Fault Tolerance – Reliability to cope with
• Can Handle a Variety of Data type hardware failures
• Not good as a traditional RDBMs (Relational Database Model) • Map and Reduce are based on
functional programming
– Transactional applications
– Data Analytics
Actions
• What is an action
– The final stage of the workflow
– Triggers the execution of the DAG
– Returns the results to the driver
– Or writes the data to HDFS or to a file
Industry Standard Servers
Clusterscreatedasneededfor apps/users
– for streaming, interactive, iterative and
machine learning tasks
• Changing the World
– Made data processing cheaper and more
efficient and scalable
– Is the foundation of many other tools and
software
Resources
Conclusion
• Hadoop (HDFS, MapReduce)
– Provides an easy solution for processing of Big Data
– Brings a paradigm shift in programming distributed system
• Spark
– Has extended MapReduce for in memory computations
–
Introduction
In the late 1990s, Salesforce offered one of the
Technologies are sprawling with additions to them every day. The cloud first commercially successful
computing and IoT have become two very closely affiliated future implementations of enterprise SaaS. This was
internet technologies with one providing the other a platform for followed closely by the arrival of AWS in 2002,
offering a range of services, including storage
success. The internet includes things ( IoT ) or as the Internet refers to
and computation -- and now embracing
everything ( Internet of Everything (IoE) is a system of a the beginning databases, machine learning and other
we must know what the cloud are computing and iot then talking about services. Today, Microsoft Azure, Google Cloud
their integration. Platform and other providers have joined AWS
in providing cloud-based services to
individuals, small businesses and global
1_ Definition of cloud competing enterprises.
Cloud computing is the use of various services such as, software
development platforms, servers, storage and software over the internet 2. The definition of IOT:
often referred to the cloud. The internet of things, or IoT, is a system of
interrelated computing devices,
In general, there are many benefits and characteristics of the cloud mechanical and digital machines, objects,
computing, three of them are listed below: animals or people that are provided with
A_ The backend of the application (especially hardware) is completely
v
unique identifiers (UIDs) and the ability to
managed by cloud computing.
B_ A user only pays for services used (memory, processing time and
bandwidth).
C_ Services are scalable.
1_2 A brief history of cloud computing
Cloud computing its origin back to the 1960s, when the computer industry
recognized the potential benefits of delivering computing as a service or
a utility. However, early computing lacked the connectivity and bandwidth transfer data over a network without
needed to implement computing as a utility. It wasn't until the broad requiring human-to-human or human-to-
availability of internet bandwidth in the late 1990s that computing as a computer interacti.
service became practical. 2.1The benefits of IOT:
Benefits of IoT
The internet of things offers a number of benefits
to organizations, enabling them to:
A_monitor their overall business processes.
B_improve the customer experience.
C_save time and money.
D_enhance employee productivity.
E_integrate and adapt business models.
F_make better business decisions. CloudIoT applications in literature, with a
J_generate more revenue. focus on their specific research
challenges. These challenges are then
2_2 How the IOT works analyzed in
details to show where the main body of
An IoT ecosystem consists of web-enabled smart devices that use research is currently heading. We also
embedded processors, sensors and communication hardware to discuss what is already available in terms
collect, send and act on data they acquire from their environments. IoT of platforms–both proprietary and open
devices share the sensor data they collect by connecting to an IoT source–and projects implementing the
gateway or other edge device where data is either sent to the cloud to Cloud IoT paradigm. Finally, we identify
be analyzed or analyzed locally. Sometimes, these devices communicate open issues and future directions in this
with other related devices and act on the information they get from one field, which we expect to play a leading role
another. The devices do most of the work without human intervention, in the landscape of the Future Internet.
although people can interact with the devices -- for instance, to set
them up, give them instructions or access the data. 3_1 The benefits of integration between
The connectivity, networking and communication protocols used with Cloud computing and IOT (internet of
these web-enabled devices largely depend on the specific IoT things).
applications deployed. There are many benefits from their
v
integration which are listed below:
3 _The integration of Cloud computing and IOT (internet of
things): 1. Communication
Application and data sharing are two
Cloud computing and Internet of Things (IoT) are two very different significant features of the Cloud-based IoT
technologies that are both already part of our life. Their adoption and paradigm. Ubiquitous applications can be
use are expected to be more and more pervasive, making them transmitted through the IoT, whilst
important components of the Future Internet. A novel paradigm where automation can be utilised to facilitate low-
Cloud and IoT are merged together is foreseen as disruptive and as an cost data distribution and collection. The
enabler of a large number of application scenarios. In this paper, we Cloud is an effective and economical solution
focus our attention on the integration of Cloud and IoT, which is what we which can be used to connect, manage, and
call the CloudIoT paradigm. Many works in literature have surveyed track anything by using built-in apps and
Cloud and IoT separately and, more precisely, their main properties, customised portals.
features, underlying technologies, and open issues. However, to the best
of our knowledge, these works lack a detailed analysis of the new 2.Storage
CloudIoT paradigm, which involves completely new applications, As the IoT can be used on billions of devices,
challenges, and research issues. To bridge this gap, in this paper we it comprises a huge number of information
provide a literature survey on the integration of Cloud and IoT. Starting sources, which generate an enormous
by analyzing the basics of both IoT and Cloud Computing, we discuss their amount of semi-structured or non-
complementarity, detailing what is currently driving to their integration. structured data.The Cloud is considered to be
Thanks to the adoption of the CloudIoT paradigm a number of one of the most cost-effective and suitable
applications are gaining momentum: we provide an up-to-date picture of solutions when it comes to dealing with the
enormous amount of data created by the IoT. Moreover, it produces new C_SAaaS (Sensing and Actuation as a Service)
chances for data integration, aggregation, and sharing with third parties. - provides control logics automatically.
E_IPMaaS (Identity and Policy Management
3. Processing capabilities as a Service) - provides access to policy
IoT devices are characterised by limited processing capabilities which and identity management.
prevent on-site and complex data processing. Instead, gathered data is
transferred to nodes that have high capabilities; indeed, it is here that D_DBaaS (Database as a Service) - provides
aggregation and processing are accomplished. Тhe Cloud provides ubiquitous database management.
unlimited virtual processing capabilities and an on-demand usage mode. F_SenaaS (Sensor as a Service) -
Predictive algorithms and data-driven decisions making can be provides management for remote
integrated into the IoT in order to increase revenue and reduce risks at sensors.
a lower cost. J_DaaS (Data as a Service) - provides
ubiquitous access to any type of data.
4.New abilities
The IoT is characterised by the heterogeneity of its devices, protocols, SPECILY IN ROADS AND WHERE AND
and technologies. Hence, reliability, scalability, interoperability, WHEN When USE CARS SHOW THAT IN
security, availability and efficiency can be very hard to achieve. THIS:-
Integrating IoT into the Cloud resolves most of these issues. It provides Is expected to offer promising solutions to
other features such as ease of-use and ease-of-access, with v
low transform transportation systems and
deployment costs automobile services (i.e. Intelligent
Transportation Systems, ITS). The integration
5.New Models of Cloud with IoT technologies (such as WSNs
Cloud-based IoT integration empowers new scenarios for smart objects, and RFID) represents a promising opportunity
applications, and services Some of the new models are as follows: ACTUALLY, a new generation of vehicular
A_SaaS (Sensing as a Service) - allows access to sensor data. data-mining Cloud service can be developed
B_EaaS (Ethernet as a Service) - provides ubiquitous connectivity to and deployed FOR GET ALOT OF business ,
control remote devices. EXAMPLE OF THIS increasing road safety,
reducing road congestion, managing traffic
and parking, performing warranty analysis
and recommending car maintenance or fixing
.. Numerous vehicles possess powerful
sensing, networking, communication, and data
processing capabilities, and ALSO
INTERCHANGE information with each other
(Vehicle to Vehicle, V2V) or INTERCHANGE
information with the roadside infrastructure
such as camera and street lights (Vehicle to
Infrastructure, V2I) over various protocols,
including HTTP, SMTP, TCP/IP, WAP, and Next
Generation Telematics Protocol (NGTP) . In
this context, Ethernet and IP-based routing (being less expensive and more vehicles. Several challenges have been
flexible than related technologies) are claimed to be very important identified in literature related to this
technologies for future communication networks in electric vehicles, application scenario. The huge number of
enabling the link between the vehicle electronics and the Internet. Indeed
vehicles and their dynamically changing
they integrate vehicles into a typical IoT, and meet the demand for
number make system scalability difficult to
powerful communication with Cloud services The literature proposes
administer. Vehicles moving at different
several examples of multi-layered, Cloud-based vehicular data
speeds frequently because intermittent
platforms that merge Cloud computing and IoT technologies to tackle
communication impacting performance,
the main current challenges. These platforms aim at providing real-
reliability, the lack of an established
time, cheap, secure, and on demand services to customers, from
infrastructure makes it very complex to
different types of Clouds, This type include temporary vehicular Clouds
implement effective authentication and
(i.e. formed by the vehicles representing the Cloud data centers
authorization mechanisms, with impacts on
designed to extend the conventional Clouds in order to increase on-
security and privacy provision. Several
demand ,processing, and storage capabilities,make that if we use
challenges have been identified in literature
under-utilized facilities of
related to this application scenario. The huge
v
number of vehicles and their dynamically
changing number make system scalability
difficult to adminastor . Vehicles moving at
different speeds frequently because
intermittent communication impacting
performance, reliability, the lack of an
established infrastructure makes it very
complex to implement effective authentication
and authorization mechanisms , with impacts
on security and privacy provision.
v
provider interaction. It enables organizations to focus on their core
businesses rather than expending resources on computer infrastructure
and maintenance [1]. When you think about cloud computing you can
Table of Contents
1- INTRODUCTION consider your experience with email. Your
email client, if it is Gmail, Yahoo, Hotmail,
2- CLOUD COMPUTING65 and so on, it takes care of housing all of
3- VIRTUALIZATION65 the hardware and software to support
4- TYPES OF VIRTUALIZATION66 your personal account. When you want to
get to your email, you just open your web
4.1 DATA VIRTUALIZATION
browser, go to the email client and sign in.
4.2 APPLICATION VIRTUALIZATION
what you need is just having internet
4.3 NETWORK VIRTUALIZATION
access. Your email is not housed on your
4.4 SERVER VIRTUALIZATION
personal computer, you can access it
4.5 OPERATING SYSTEM VIRTUALIZATION
through an internet connection and you
5- HYPERVISOR can access it from anywhere you are such
5.1 TYPE-1 HYPERVISOR as: work, on a trip, or down the street
v
5.2 TYPE 2 HYPERVISOR getting coffee. You can access it from
6- BENEFITS OF VIRTUALIZATION TECHNOLOGY anywhere in case you have internet
access. Your email is different from
7- CONCLUSION
any program you have installed on
8- REFERENCES your personal computer or saving a
document on it. An email client is
1- INTRODUCTION similar to how cloud computing works,
except that instead of just accessing
Cloud computing is a way to use online services with reducing of various your email, you can choose to work
software and hardware maintenances for individual level and during the with any information or application
time many ideas have been created to support and develop using cloud within the cloud [2].
computing and one of them is virtualization. 3- Virtualization
2- CLOUD COMPUTING In computing, virtualization is a way to
abstract computing resources so as
Cloud computing is a way to access and share pool of configurable multiple applications can share a
computing resources over internet such as: networks, servers, storage, single physical hardware and it refers
applications, and services with minimal management effort or service to the creation of a virtual, rather
than actual, version4.4of aServer Virtualization
resource.
Virtualization has a major
It is therole
ideainofthe
hiding server's resources from server's users. The point
cloud computing technology.
of usingNormally
server virtualization is to free the client to understand and
users in the cloud computing
accomplish share
difficult details about resources of server when sharing and
the data exist in the clouds like application etc., but with usage of resource increased. Storage
virtualization they share infrastructures. Cloud providers provide virtualization is sharing of storage from
the applications with standard version to their users and in case of
multiple network storage devices into a
released new version they have to provide the latest version [3]. single storage device and using a central
4- TYPES OF VIRTUALIZATION console to handle it. In general, storage
area networks use storage virtualization
4.1 Data Virtualization [4].
In this type the user can access to the same data from different
physical positions. The data is moved to a server, mapped to its actual
location, and allow the users to access it and this makes it feasible
to scroll by the data as if reading a webpage without move it to the
user's personal computer or any other servers [4]. v
8- REFERENCES:
that include the use of cloud computing primarily on economic
institutions.
Abstract
Cloud computing is a new paradigm of computing infrastructure, a (Marston et al., 2011) "While much research
vision of computer facilities. In this search, we present an overview of is currently underway in the same
economics and cloud computing. There are a lot of studies on cloud technology, there is an equally urgent need
computing, not just clouds around the world, but their adoption is more to understand relevant work issues
pronounced in major economic organizations and institutions. surrounding cloud computing"(Marston et
However, there are significant potential impacts on IT departments in al.,2011).
these economic organizations. Cloud computing has the potential to However, like any other technology, the
fundamentally change IT and economic business organizations. application of the draw may lead to the
Therefore, the aim of this research is to ensure that the adoption of conversion of many companies and
computerized clouds and their impact on business and economy.
economic institutions to the optimum level.
At the same time, however, harmful
1- Introduction problems that may lead to insecurity for
Despite the social and economic significance of cloud computing, very
many companies, organizations and
little was been written in the economics literature that is directly on topic.
Most searches seem to appear in various parts of the computer science business outcomes lead to a low adoption
v
and to a lesser extent, the formal and informal business literature. Our rate. These problems are clearly impeding
purpose with this search is discussing its economic implications. And to the integration of IT with the cloud and
survey cloud computing literature as it relates to economic questions. adversely affect its business. We need to
Cloud computing (CC) provides flexible, viable and scalable computational address harmful issues, and more
opportunities to an organization. It aims to reduce the financial burden for
discussions will provide a more informed
many startup companies (Boss et al., 2007; Armbrust et al., 2010; Sultan,
2011; Hayes, 2008(. option for CC to deploy IT resources and
The purpose of this research is to study the effects of using cloud outsource the cloud (Nair et al., 2010).
computing in the economy and the factors that stimulate economic
companies to adopt them.
1-2- Research Objectives
The aim of this research is to highlight the
1-1- Research problem
The European report (Watch, 2008; Sondergaard Laugesen et. al., 2012) reasons and barriers to the adoption of
confirms that organizations are maximized using ICT systems in cloud computing in general and to discuss
business management. However, economic companies are struggling to economic impacts. As well as to survey
build an appropriate communication channel with suppliers and cloud computing studies as they relate to
customers, which not only leads to lack of competition with a larger
economic issues.
organization but also the loss of communications and jobs; in the worst
case, adoption of IT as part of business integration does not depend on In addition, investigate risk assessment
forcing them to Closing work (Dai, 2010). Research focused on issues factors such as security, privacy, legal
issues and compliance.
beneficiaries
How these
of therisk
impact of cloud empowerment, as they have improved
factors can affect the
newcontinued
revenue opportunities.
adoption In addition, the number of new businesses and
of cloud businesses and enterprises as ICT tools for their business businesses is increasing, new jobs are
operations. So the research question will be: What are the factors and being derived from this necessity, and
implications of cloud computing adoption in the economy (companies, more jobs are being created, resulting in
organizations,enterprises, businesses)? double benefits and growth of the
community economy and social surplus
(Filiopoulou et al., 2014).
1-3-research importance
Today, the cloud has become a powerful computing tool for businesses
and businesses around the world. Sharing computing resources, offering 1-4- Keywords:
many different services, storing and accessing applications are only some Cloud computing, Adoption, Migration,
clicks. Cloud computing is an indispensable business model as well. It can SaaS, PaaS, IaaS
help companies to develop themselves, achieve cost savings, and create List of Acronyms
a competitive environment at the same time with more jobs worldwide IT Information Technology
(Etro, 2009). The emergence of a cloud computing model is not the CC Cloud computing
business world, and it is more global than ever before, providing a cost
v
SaaS Software As a Service
reduction not only for consumers in ICT, but also for businesses and PaaS Platform As a Service
businesses. An institution that migrates information technology and the SaaS Security as a Service
data system to the cloud can use the resources required when needed, SLA Service Level Agreement
IDC International Data Corporation
rather than using proprietary infrastructure, reducing storage costs, SME Small & Medium size Enterprises
software maintenance costs, network expenses, energy and costs ERP Enterprise Resource Planning
associated with disaster recovery (Center et al.). , 2010, Center, et al., CRM Customer Relationship Management
2011). Cloud computing is usually "pay when you use", which gives users SoA Software Oriented Architecture
ATSE Australian Academy of Technological Science
the option of paying for what they use (Filiopoulou, et. al., 2014). As a result,
ICT Information & Communication Technology
adoption of cloud computing provides slow operating costs for economic
firms that want to gain a dominant market share in ICTs and create an
environment for innovation and rapid development for companies that
2- View literature (previous
need to work faster and cheaper than revenue required from voters, studies)
As rapid advances in information
Different costs from traditional models (Filiopoulou, et al., 2014). Thus, the
technology (such as cloud computing, large
economic advantage of cloud computing is to create new opportunities for data, social media, and mobile computing),
development and employment, thereby contributing to the economic the contribution of IT to the competitive
growth of a country (Etro, 2009). Cloud computing services provide advantage of an organization has been the
enormous potential for small entrepreneurs and are among the biggest subject of research for more than 50
years (Macada et al.,and2012).
gain Oha competitive
and Pinson advantage. SMEs can perform more innovative
neault (2007) dividebusiness
the literature
processes
on the
rather than thinking about technical complexity.
strategic value of information technology Outsourcing IT resources to cloud vendors
into two theoretical perspectives: "resource-focused" and "emergency- reduces corporate capital expenditure and
based". Defenders of the company's competitive advantage in the volume small business. Have limited IT budgets
of IT investment (Barney, 1991), or the quality of IT investment instead of purchasing and preparing
(Brynjolfsson and Hitt, 1996). server farms at home that require human
There is acceptable support between views. Supporting the "resource- skills and large capital investment that can
centered" view (the 1998 Wye and Broadbent Review) of "75 companies in rely on third-party cloud service providers
9 countries in 3 separate studies over 8 years" led them to conclude that for IT operations.
information technology should be considered an "investment portfolio" In addition to cloud adoption, it reduces IT
and treated as a strategic capacity. Or, in other words, IT should not be costs that lead to the elimination and
viewed as a cost center that only works to support business functions. It licensing of your devices and devices, and
should be considered a strategic resource in itself, with the potential to faster software upgrades (Armbrust et al.,
achieve a competitive advantage for the organization. 2010; Buyya et al., 2008).
Nevertheless, the literature study
describes the problem of variable,
3. Methodology uncontrollable and erasable costs, such as
The purpose of this research is to study the factors of adoption ofv cloud the absence of an appropriate migration
computing and how these factors can affect companies, institutions, and risk assessment scheme, and the
businesses and economic organizations in dealing with the cloud. Here we absence of suitable service or platform
discuss in the literature provided by the theoretical background above to models for candidate applications.
understand the cloud computing services affected as an integral part of
our IT operations on a daily basis and investigate the factors that
stimulate the corporate economy to embrace the clouds The literary study 3-2-2- Flexibility
reveals that cost is one of the most important factors for businesses And The study of literature shows that the
institutions. Cloud services conducted a survey conducted by KPMG and option of cloud clarity makes business
Gartner. This research shows that cost is the key factor behind the cloud workers more resilient. They can run
approach. In addition to cost effectiveness, there are other factors that businesses inside or outside the workplace.
stimulate companies and institutions. Through a web browser that can be
accessed for example a laptop, laptop or
3-2 factors that stimulate companies and mobile device is able to process the data
and then share it with the other STA for
institutions: internal or external collaboration (Sahandi
3-2- 1- Cost et al., 2012; Blaisdell, 2012). Our survey also
Cloud computing not only saves a lot of cost, it also helps increase suggests that corporate economic
business continuity and agility. Many projects need to adopt this innovative executives prefer the option of cloud
technology because of current economic constraints (Mell and Grance, computing that helps increase work
2009; Aljabre, 2012, Sultan, 2011). To adopt cloud computing that provides efficiency (Iyoobet al.,2013). They are
the latest technology and provides the tools to compete with competitors transforming IT from traditional IT as an IT
product into a service. This provides
tremendous space for resource 3-2-6- Service models
management and makes scalability and ease of use of information
Cloud service models offer significant
technology (Boss et al., 2007).
potential benefits to economic institutions,
so it is necessary to understand models
3-2- 3- Rapid deployment that are best suited to business
A reference to the Cloud Enterprise study, which provides rapid
requirements (Jelleaty and Monzer, 2012;
dissemination of its IT resources, such as applications and data that can
be web hosting, data backup, or software testing (Varia, 2008; Ahronovitz Saleem, 2011; Singh and Seehan, 2012;
et al., 2011). Economic companies do not need to wait a month or a week Babar and Chauhan, 2011). We conclude that
for installment. The main advantage that businesses and small businesses SaaS is the most appropriate service
can achieve is the elimination of incremental costs (Mell and Grance, model.
2009). In addition, rapid deployment reduces the infrastructure used and
builds a private data center infrastructure and eliminates the need to Economic institutions show the interest
manage and maintain IT operations at home. they can use, for example in Google Docs,
Sheets, or GMail. Economic institutions
may need to integrate their business with
3-2- 4- Scalability SaaS, PaaS or IaaS, or a combination of
According to the literature, we found that one of the major featuresvof the these models (Singh and Seehan, 2012;
cloud is its scalable capacity where resources can be increased or Wyld, 2010).
reduced according to business requirements (Mell and Grance, 2009; Economic institutions need to verify the
Grossman, 2009). Business demand is changing rapidly and the structure of vendors in place (Ahronovitz
forecasting of resource allocation becomes very valid for advance et al., 2011). Finally, we found that Web
verification. The scalability allows companies and economic institutions to hosting, backups, e-mail services, and data
take advantage of resources, as on demand, paying only for the resources testing and application are highly suitable
used. Innovative technology and scalable options offer economic firms the candidate applications for outsourcing
ability to compete with their competitors and remain stable in business (Kimet al., 2009; Marston et al., 2011;
(Dai, 2010; Sndergaard Laugesen et al., 2012). Ahronovitz et al., 2011). Previous studies
also show the same trend from the
perspective of companies and projects
3-2- 5- Performance that it can be of great benefit by deploying
In order to have the full potential of small cloud companies, you need to this kind of IT resources for withdrawal,
establish a high bandwidth connection that provides faster data saving money and competition.
processing and increased offerings (Kim et al., 2009; Ahronovitz et al.,
2011). Clouds can automate IT resources and there will be no need for
human intervention to manipulate data (Mell and Grance, 2009). Economic 3-2- 7- Deployment models
institutions prefer to work on mobile phones. The cloud provides access The study of previous literature reveals
to the dialup service so that the employee can access data and that final distribution models need to be
applications anytime, anywhere, anywhere (Sahandi et al., 2012). understood in order to make full use of
Increases work efficiency and improves productivity.
cloud services (Jlelaty
strong
andbackup
Monzer, and2012;
recovery process (Ahronovitz et al., 2011). Economic
Saleem, 2011; Marston
companies
et al., 2011).
mean Thethat there is no knowledge of the data stored by vendors.
lowest level of public cloud deployment from the perspective of economic Cloud computing runs the application
institutions indicates that IT resources associated with migration to this because virtual servers are often
model pose risks to a particular type of application and data. It is not wise migrated to virtual machines and if new
to expose sensitive data in this platform. The cloud provides intensive, software or software updates are
demanding computing functions that can be derived from this type of installed, it may be worrying about the
platform (Varia, 2008). The private cloud is safe but you need to manage unauthorized person who can access the
and maintain and require IT equipment that can be very expensive. Social data and tamper with the end or may leak
cloud adoption shows great interest among businesses and businesses data (Kim et al, 2009). Consumers often do
that use hardware to reduce cost, and all members of this community not get the information where the
have a common interest such as risk, commitment, etc. A hybrid cloud is geographic part of the data is placed but
suitable for companies that can publish sensitive data to a private cloud may change the decision of vendors.
and have non-important applications in tasks such as a general cloud for
non-users. (Kim et al., 2009; Marston et al., 2011). 3-2- 3- Availability
Such as the issue of security, the
3-2 Major barriers to cloud use Although availability of data shows a clear concern
The study of literature suggests that security, privacy, vendor security, from the literature study and it is
data availability, reliability, data loss, lack of infrastructure control,
v and necessary to rely on the cloud provider
data integration are a common concern for migrating IT resources to the which can guarantee the best services and
cloud system. This concern is one of the reasons that will affect the compensation also in the result of
potential approach of the cloud and the resistance of economic interruptions that occur (Ahronovitz et al.,
institutions to embrace cloud computing services: 2011). It also shows that economic
companies need to understand the
outcome that can trigger this interruption.
3-2-1 Security
Such as security.
Based on the study of literature, it indicates that security is the most
important issue for cloud adoption (Reed et al., 2011; Kim et al., 2009; Economic companies have expressed
Benlian and Hess, 2011). It also indicates that the privacy of data, and / or concern about the power cut. The concern
loss and / or lack of data control and cloud infrastructure is very is about the impact of the enterprise and
important to consider the cloud approach. Data access to the cloud may negatively affect, for example, the
outside the company must continue through the web browser and this ongoing project (Aim et al., 2009; Armbert
makes the data vulnerable to attack (Sahandi et al., 2012). Safety options et al., 2010; Karkry et al., 2013; Jialali and
should be handled carefully by the seller as our survey shows that Manzer, 2012). However, the security and
economic companies have a clear concern about the irresponsibility that reliability of data and services across the
a service provider can provide. cloud is safe and secure compared to the
enterprise data center claimed by Gartner,
a leading search engine and Google
3-2-2 Cloud services executives (Ahronovitz et al., 2011; Business
Cloud service providers need to improve network infrastructure, ensure
access by providing keys, authentication mechanisms, and maintain a
Journal, 2009). A future
they lack
study
theisskill
therefore
they face in their own organization and require further
needed to investigate
research
more, which
that helps
will helpto reduce the issue of knowledge, increase the
dependency rate and provide powerful tools for the enterprise and
economic companies ease concerns about these issues. institutions that are capable of To compete
in the market (KWO Fei, 2013; Arendt, 2008).
3-2-4- Interoperability
A reference to literature says that this factor plays a vital role in adapting 3-2- 7- Technical issues
to the cloud (Schobert and Jae et al., 2012; Kim et al., 2009; Marston et al., Cloud computing is a relatively new
2011; It also shows that interoperability, data portability and application is concept based on the literature we have
a major concern for the problems of withdrawals from economic projects. found that technical innovation lies in cloud
It is important that the application and corporate data gradually become adoption (Morgan and Conboy, 2013), which
a cloud. They also consider interoperability issues supported by suppliers includes improvements in hardware and
rather than those they can use through the platform that supports software engineering. Reducing the
internal programs and thus reduces costs. ERP and CRM are some of the number of companies and economic
candidate applications that combine small businesses and organizations institutions reduces initial costs and
close to customers who expand and manufacture their business fit. eliminates hardware purchases (Armbrust
et al., 2010; Marston et al., 2011) and
provides incentives to understand the
3-2- 5- Migration v
basic technical concept that makes the
Migration to the cloud requires an appropriate strategic plan service model that companies and
according to the design and design process. Cloud service may work with economic institutions care about bonds
legacy programs that home businesses have to manage the business. The that are not Recognize them uniformly.
correct implementation of business data brings commercial benefits and
the use of cloud infrastructure. This is a reference to the literature in
Khajeh-Hosseini et al. (2011; Shimba, 2010), which worked on decision 3-2-8- Compliance issue
support and the migration roadmap for cloud adoption. But this study is Based on literature, laws and governance
not enough to understand the migration process such as complexities, on citizen protection policy data in the
guidelines, tools and supportive strategies. cloud will not do that. This emerges as a
Further research should be devoted to this area because economic result of suppliers of violence from
companies are concerned about the complexities of migration from their corporate data and their applications to
legacy software to integrate with cloud services. Moving to the cloud is a small and medium-sized enterprises. This
systematic and strategic decision as business needs and growth depend study shows that companies and economic
on how organizations can be logical and willing to integrate their IT institutions are interested in this issue
resources, including applications and business data from the site (at (Ahronovitz et al., 2011; Schubert and G et
home) with cloud services (Cisco Systems, 2010). al., Reha, 2012).
has steadily gained momentum over the last 10 years. Looking ahead, the information from harm, theft, and
next decade of cloud computing promises new ways to collaborate unauthorized use. Computer hardware is
everywhere, through mobile devices. typically protected by the same means
used to protect other valuable or
So what is cloud computing? Essentially, cloud computing is a kind of
v sensitive equipment, namely, serial
outsourcing of computer programs. Using cloud computing, users are
able to access software and applications from wherever they are; the numbers, doors and locks, and alarms.
computer programs are being hosted by an outside party and reside in The protection of information and system
the cloud. This means that users do not have to worry about things such access, on the other hand, is achieved
as storage and power, they can simply enjoy the end result. through other tactics, some of them quite
Technical customers usually require the Message Passing Interface (MPI) whereas
enterprise customers require an SQL database. Because a number of MPI and
database implementations have been created with sockets or DPAL, it is
visibility coupled with quick responsiveness and decision-making will be vital to growing exponentially. Scientific institutions can
gain a competitive advantage. This will entail actionable information about various be more concerned with PaaS and IaaS
stakeholders and processes to be available real-time. Another issue that prevent contributions that allow having complete control
companies struggle to get a cohesive picture of their supply chains is that most of over the infrastructure used for scientific
these information system were designed to operate within a single company, not research and finely customizing their software
across a network of companies. The intrinsic features in High Performance systems according to the specific needs of the
Computing system are of scalability, data integration and interoperability makes it experiments to be performed. Cloud computing
an ideal fit for enterprise applications. Large companies have slowly started also guarantees the desired Quality of Service,
adopting HPC for enterprise applications as they were struggling with the twin which is well-known by means of Service Level
challenges of data management and data analysis. HPC interventions in enterprise Agreements. This aspect comprises of an
applications are limited to some big players. The reasons are primarily the need additional value, which could make scientists
for all suppliers to migrate from legacy systems to HPC systems. Cloud computing prefer computing clouds to traditional grids. For
and associated technologies like Software as a Service (SaaS), Infrastructure as example, different types of analysis can be
a Service (IaaS) and Platform as a Service (PaaS) have been generating a lot of performed at different costs by optimizing the
v
interest as a game changing technology. Cloud computing can integrate shippers, trade-off between the budget and the expected of
service providers, distributors, providers, customers etc in a global enterprise results. By applying cloud technologies and
applications. A social network like community could be created with typical data standards to established scientific computing and
items, placed online on the cloud like information on prices, schedules, service HPC infrastructure, costly, inflexible silos can be
options, contracts etc. Timely information updates from all stakeholders renders eliminated and shared computing resources can
companies to be demand-driven rather than forecast-driven. Major ERP vendors be fully utilized to:
are also working offering cloud-based solutions. Major application areas where
Enhance productivity and facilitate
cloud-based solutions are available include demand forecasting, demand planning,
collaboration with an easy-to-use, web-
e-procurement, distribution, inventory, warehouse and transportation system.
based portal.
Every major ERP vendor like SAP, BAAN are coming out with a cloud version of their
Improve data access, resource
large software solutions. This reduces the Total Cost of Ownership for enterprises
availability and security while boosting
and improves both their top and bottom lines. FedEx has a private cloud deployed performance.
in 2011 with cloudX as service-provider with sales processing and CRM as primary Increase throughput of heterogeneous
activities on the cloud. Intel was able to replace hundreds of their order clerks workloads across diverse resource.
using online ordering applications. Several supply chain activities like planning and Increase automation and decrease
forecasting, sourcing and procurement, logistics and inventory management were manual effort for improved
migrated to cloud. HPC enterprises which go for the cloud solutions will have to administrator productivity.
face challenges like legacy systems and software applications of various partners. Improve performance and scalability
with high-performance clustered
5. HIGH PERFORMANCE COMPUTING AND CLOUD COMPUTING
systems – factory integrated, tested,
INTERVENTIONS FOR SCIENTIFIC APPLICATIONS single-point of contact.
Reduce operatingCONCLUSIONS
costs and total cost
of ownership with a consolidated high-
HPC is a type of distributed computing, where processors and cores in multiple
performance infrastructure.
computers coordinate their actions. HPC is an important technology in which
Cloud computing introduces new challenges and new problems, particularly from further investment is essential if its economic
a legal and security point of view. In the case of public clouds, systems, competitiveness is to be maintained. HPC system
applications, and even personal data are hosted into datacenters owned by third have the advantages of scalability, data
parties. These datacenters are often placed into the more expedient geographic integration and interoperability. Cloud computing
location for reducing maintenance and consumption costs. In addition, privacy and can integrate all partners into an online social
confidentiality of data depends on the location of its storage. Cloud computing network like community with real-time
vendors have included the geographic location of the hosting as a parameter of information on all elements. Cloud interventions in
the service level agreement made with the customer. For example, Amazon the enterprise management space are rapidly
provides the concept of availability zones that identify the location of the increasing with several vendors offering Software
datacenters where applications are hosted. Cloud computing fosters the dynamic as a Service while for scientific computing
discovery of services and a wide variety of runtime environments for applications, Platform as a Service and Infrastructure as a
in practice a limited set of options are available for scientists, and sometimes they Service are being offered. HPC interventions on
could not be elastic enough to cover their needs. the other hand are limited to some big companies.
6. CHALLENGES OF USING HPC WITH THE CLOUD v A challenge can be faced during deployment of
both cloud and HPC systems that can be the legacy
One of the primary challenges is the lack of high-speed interconnects and noise- applications especially of the suppliers. The
free operating systems to enable tightly coupled HPC applications to scale. Other technological challenges must be overcome for
challenges include the costing / pricing model, which is still evolving from the the full potential of HPC and cloud computing to be
traditional supercomputing approach of grants and quotas toward the pay-as-you- realized. There can be numerous opportunities for
go model typical of cloud-based services; the sub mission model, which is evolving using HPC in new applications and the possibilities
from job queuing and reservations toward VM deployment; the bringing of data in are opening up by using HPC with other computing
and out of the cloud, which is costly and results in data lock-in; and security, domains such as embedded systems and mobile
regulatory compliance, and various other utilities like performance, availability, computing.
business continuity, service-level agreements, and so on. There can be the
increase of HPC’s adoption in the cloud with the two prospects. The first prospect
is in optical networking, which will improve hardware manageability and
interconnect performance while also reducing power consumption, and software-
defined networks, which will further improve the manageability of cloud
networking. Furthermore, developments in nonvolatile memory will improve check
pointing performance and, in the long term, address the data deluge and new
programming models leveraging non-volatility. Both technologies will create
disruptive improvements and increase HPC’s adoption in the cloud. As the
scientific community moves toward exascale computing, the evolution of new
asynchronous programming models and an emphasis on redesigning algorithms
can make the cloud even more suitable for HPC.
Introduction
Cloud computing: is a method for
retrieve resources stored through
Abstract the Internet through web-based
applications
In this time cloud computing is used to achieve business goals and tools to deliver
through
enhance the ability of achieve business; There are information technology
several types and services. The
cloudCommunity
classes of cloud computing (Private cloud, Public cloud, hosting provider
cloud, purchases,
Hybrid cloud). Each with advantages and characteristics that make them
suitable for a particular business environment. new model of hybrid
cloud computing architecture based on private cloud, combined with one
or more type public cloud. Iinternal structures of private cloud and public
cloud are the same in hybrid cloud we will discuss through these papers
an introduction to these types and the advantages of using them.
hosts, and maintains the necessary hardware and software in their own
making service users can initiate specific service functions when their
hybrid
needed it Service
v users pay only for the amount of service that they need
cloud
I and
private public limitless scalability when user need. We
cloud cloud have three different type of cloud
computing, where different in service are
being provided for you.