ArticlePDF Available

CLOUD COMPUTING BASICS

Authors:

Abstract and Figures

Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with.
Content may be subject to copyright.
ISSN : 2278 1021
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 1, Issue 5, July 2012
Copy right IJARCCE www.ijarcce.com 343
CLOUD COMPUTING BASICS
J.SRINIVAS1, K.VENKATA SUBBA REDDY2, Dr.A.MOIZ QYSER3
Assistant Professor, Dept. of CSE, M. J College of Engg & Tech, Hyderabad, India
Assistant Professor, Dept. of CSE, M. J College of Engg & Tech, Hyderabad, India
Professor, Dept. of IT, M. J College of Engg & Tech, Hyderabad, India
Jagirdar.srinivas1@ gmail.com, kvsreddy20122@ gmail.com,aamoiz3@gmail.com
ABSTRACT Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud
computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud
deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM)
applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different
concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service
aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology
must succeed. Finally, we discuss some of the issues that this area should deal with.
Keywords Cloud Computing, SaaS, Paas, IaaS.
I. INTRODUCTION
This section gives an introduction to Cloud computing.
"Cloud computing is a model for enabling convenient, on-
demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned and
released with minimal management effort or service provider
interaction [1].
Cloud computing has emerged as a popular solution to
provide cheap and easy access to externalized IT (Information
Technology) resources. An increasing number of
organizations (e.g., research centres, enterprises) benefit from
Cloud computing to host their applications. Through
virtualization, Cloud computing is able to address with the
same physical infrastructure a large client base with different
computational needs [2][5]. In contrast to previous
paradigms (Clusters and Grid computing), Cloud computing is
not application-oriented but service-oriented; it offers on-
demand virtualized resources as measurable and billable
utilities [6], [7]. Fig. 1 shows a basic cloud computing
environment. The remainder of this paper deals with
characteristics, opportunities, issues and challenges of cloud
Computing. At the end we discuss about the future scope of
Cloud.
II. ESSENTIAL CHARACTERISTICS
In this section we describe the essential characteristics that
a cloud must possess. Any cloud is expected to have these five
characteristics that are being described below.
A. On-demand self-service
A consumer can unilaterally provision computing
capabilities, such as server time and network storage, as
needed automatically without requiring human interaction
with each service’s provider.
Fig. 1 A Cloud Computing Environment
B. Broad network access
Capabilities are available over the network and accessed
through standard mechanisms that promote use by
heterogeneous thin or thick client platforms (e.g., mobile
phones, laptops, and personal digital assistants (PDAs)).
C. Resource pooling
The provider’s computing resources are pooled to serve
multiple consumers using a multi-tenant model, with different
physical and virtual resources dynamically assigned and
ISSN : 2278
1021
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 1, Issue 5, July 2012
Copy right IJARCCE www.ijarcce.com 344
reassigned according to consumer demand. There is a sense of
location independence in that the subscriber generally has no
control or knowledge over the exact location of the provided
resources but may be able to specify location at a higher level
of abstraction (e.g., country, state, or data centre). Examples
of resources include storage, processing, memory, network
bandwidth, and virtual machines.
D. Rapid elasticity
Capabilities can be rapidly and elastically provisioned, in
some cases automatically, to quickly scale out and rapidly
released to quickly scale in. To the consumer, the capabilities
available for provisioning often appear to be unlimited and
can be purchased in any quantity at any time.
E. Measured Service
Cloud systems automatically control and optimize resource
use by leveraging a metering capability at some level of
abstraction appropriate to the type of service (e.g., storage,
processing, bandwidth, and active user accounts). Resource
usage can be monitored, controlled, and reported providing
transparency for both the provider and consumer of the
utilized service.
III. CLOUD DEPLOYMENT STRATEGIES
This section explains the basic cloud deployment strategies.
A cloud can be deployed using any of the below mentioned
strategies
A. Public Cloud
In simple terms, public cloud services are characterized as
being available to clients from a third party service provider
via the Internet. The term “public” does not always mean free,
even though it can be free or fairly inexpensive to use. A
public cloud does not mean that a user’s data is publicly
visible; public cloud vendors typically provide an access
control mechanism for their users. Public clouds provide an
elastic, cost effective means to deploy solutions.
B. Private Cloud
.A private cloud offers many of the benefits of a public
cloud computing environment, such as being elastic and
service based. The difference between a private cloud and a
public cloud is that in a private cloud-based service, data and
processes are managed within the organization without the
restrictions of network bandwidth, security exposures and
legal requirements that using public cloud services might
entail. In addition, private cloud services offer the provider
and the user greater control of the cloud infrastructure,
improving security and resiliency because user access and the
networks used are restricted and designated.
C. Community cloud
A community cloud is controlled and used by a group of
Organizations that have shared interests, such as specific
security requirements or a common mission. The members of
the community share access to the data and applications in the
cloud.
D. Hybrid Cloud:
A hybrid cloud is a combination of a public and private cloud
that interoperates. In this model users typically outsource non
business-critical information and processing to the public
cloud, while keeping business-critical services and data in
their control.
IV. CLOUD DELIVERY MODELS
This section of the paper describes the various cloud delivery
models. Cloud can be delivered in 3 models namely SaaS,
PaaS, and IaaS.
A. Software-as-a-Service (SaaS):
In a cloud-computing environment. SaaS is software that is
owned, delivered and managed remotely by one or more
providers and that is offered in a pay-per-use manner [8].
SaaS in simple terms can be defined as “Software deployed as
a hosted service and accessed over the Internet.” [9] .SaaS
clouds provide scalability and also shifts significant burdens
from subscribers to providers, resulting in a number of
opportunities for greater efficiency and, in some cases,
performance. The typical user of a SaaS offering usually has
neither knowledge nor control about the underlying
infrastructure [10]
B. PLATFORM-AS-A-SERVICE (PAAS):
This kind of cloud computing provides development
environment as a service. The consumer can use the
middleman’s equipment to develop his own program and
deliver it to the users through Internet and servers. The
consumer controls the applications that run in the
environment, but does not control the operating system,
hardware or network infrastructure on which they are running.
The platform is typically an application framework. 4.3.
ISSN : 2278
1021
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 1, Issue 5, July 2012
Copy right IJARCCE www.ijarcce.com 345
Infrastructure-as-a-Service (IaaS): Infrastructure as a service
delivers a platform virtualization outsourced service. The
consumer can control the environment as a service. Rather
than purchasing servers, software, data center space or
network equipment, consumers instead buy those resources as
a fully operating system, storage, deployed applications and
possibly networking components such as firewalls and load
balancers, but not the cloud infrastructure beneath them.
V. OPPORTUNITIES:
In this section we explain the vast opportunities the cloud
computing field offers to IT industry. Cloud Computing is
concerned with the delivery of IT capabilities as a service on
three levels: infrastructure (IaaS), platforms (PaaS), and
software (SaaS). By providing interfaces on all three levels,
Clouds address different types of customers [11]:
A. End consumers
These consumers mainly use the services of the SaaS layer
over a Web browser and basic offerings of the IaaS layer as
for example storage for data resulting from the usage of the
SaaS layer.
B. Business customers
These consumers access all three layers - the IaaS layer in
order to enhance the own infrastructure with additional
resources on demand, the PaaS layer in order to be able to run
own applications in a Cloud and eventually the SaaS layer in
order to take advantage of available applications offered as a
service.
C. Developers and Independent Software Vendors
Independent Software Vendors that develop applications
that are supposed to be offered over the SaaS layer of a Cloud.
Typically, they directly access the PaaS layer, and through the
PaaS layer indirectly access the IaaS layer, and are present on
the SaaS layer with their application. In general, for all
different kinds of Cloud customers, a Cloud offers the major
opportunities known for X-as-a-Service offerings. From the
perspective of the user, the utility-based payment model is
considered as one of the main benefits of Cloud Computing.
There is no need for up-front infrastructure investment:
investment in software licenses and no risk of unused but paid
software Thus, capital expenditure is turned licenses, and
investment in hardware infrastructure and related maintenance
and staff. into operational expenditure. Users of a Cloud
service only use the volume of IT resources they actually
need, and only pay for the volume of IT resources they
actually use. At the same time, they take advantage of the
scalability and flexibility of a Cloud. Cloud computing
enables easy and fast scaling of required demand computing
resources on demand.
VI. CHALLENGES & ISSUES
In this section we explain the challenges & issues cloud
computing has to face. As a lot of economics is tied to this
field it will be better that these issues are resolved as early as
possible. Fig. 2 depicts the summary of the survey conducted
by us on the basic issues of the cloud computing. The client’s
primary concern is taken in to account. Hence only the
percentage of 4, 5 is being shown. The following are the
issues that a cloud computing environment has to still resolve:
A. Security
When using cloud-based services, one is entrusting their
data to a third-party for storage and security. Can one assume
that a cloud-based company will protect and secure ones data
(Cloud computing presents specific challenges to privacy and
security. back it up, check for data errors, defend against
security breaches) if one is using their services at a very low
cost? Or often for free? Once data is entrusted to a cloud
based service, which third-parties do they share the
information with? Cloud-sourcing involves the use of many
services, and many cloud based services provide services to
each other, and thus cloud-based products may have to share
your information with third parties if they are involved in
processing or transferring of your information. They may
share your information with advertisers as well. Security
presents a real threat to the cloud.
Fig 2. Graph depicting the concerns of clients on cloud computing issues
ISSN : 2278
1021
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 1, Issue 5, July 2012
Copy right IJARCCE www.ijarcce.com 346
TABLE1
ECONOMY IMPACT TABLE DUE TO CLOUD OUTAGES
B. Performance
Cloud computing Suffers from severe performance issues.
The cloud provider must ensure that the performance of the
service being provided remains the same all through. There
may be peak time break downs, internal flaws, and technical
snags arising. Load balancer, data replicators, high end servers
must me installed when needed.
C. Availability
Even though cloud promises to be a 24X7X365 service,
cloud outages occur frequently. Outages can be scheduled or
unscheduled. Table 1 provides details about the downtime in
hours and the economic impact of cloud outages of various
cloud providers from 2007 to 2012.
D. Cost:
Cloud computing can have high costs due to its
requirements for both an always on” connection, as well as
using large amounts of data back in-house.
E. Regulatory requirements
What legislative, judicial, regulatory and policy
environments are cloud-based information subject to? This
question is hard to ascertain due to the decentralized and
global structure of the internet, as well as of cloud computing.
The information stored by cloud services is subject to the
legal, regulatory and policy environments of the country of
domicile of the cloud service, as well as the country in which
the server infrastructure is based. This is complicated by the
fact that some data in transit may also be regulated.
F. Bandwidth, quality of service and data limits
Cloud computing requires “broadband of considerable
speed” Whilst many websites are usable on non-broadband
connections or slow broadband connections; cloud-based
applications are often not usable. Connection speed in
Kilobyte per second (or MB/s and GB/s) is important for use
of cloud computing services. Also important are Quality of
Service (QoS); indicators for which include the amount of
time the connections are dropped, response time (ping), and
the extent of the delays in the processing of network data
(latency) and loss of data (packet loss).
G. Major suppliers
Only handful providers are available in the market which is
still holding back many SME’s to join a cloud.
VII. CONCLUSION
We’ve looked at the basics of cloud. There are interests and
concerns in the cloud. From a technology point of view, there
are interesting technical problems to solve. From a service or
consumer point of view, there are essential usability, stability,
and reliability problems to solve. We are at a crossroads with
cloud technology. On one hand, there are many stories of
problems with clouds, from data loss, to service interruption,
to compromised sensitive data. To stay relevant, to remain
meaningful, to grow in the service space, the cloud providers
must step up their game and produce robust cloud
implementations. On the other hand, the world is poised to
explode with a billion new devices that will be desperate for
the very technology that clouds almost offer today. It is
possible that the wave of users, applications and demand will
just wash over the cloud landscape, regardless of how robust
they are. If the cloud providers are too slow to provide safe,
secure, reliable data storage and application services, they
may miss one of the greatest opportunities of this century.
VIII. FUTURE SCOPE
The issues that are highlighted in this paper will be a hot
spot for researchers in future. Areas like security, Load
balancing , Standardization will be the major research topics.
ISSN : 2278
1021
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 1, Issue 5, July 2012
Copy right IJARCCE www.ijarcce.com 347
REFERENCES
[1] "NIST Cloud Computing Definition", NIST SP 800- 145]
[2] P. Garbacki and V. K. Naik, “Efficient Resource virtualization and
sharing strategies for heterogeneous Grid environments,” inProc.
IFIP/IEEE IMSymp., 2007, pp. 4049.
[3] R. Buyya, C. S. Yeo, and S. Venugopal, “Market oriented Cloud com-
puting: Vision, hype, and reality for delivering IT services as
computing utilities,” inProc. IEEE/ACM Grid Conf., 2008, pp. 50–57.
[4] R. Aoun and M. Gagnaire, Towards a fairer benefit distribution in
Grid environments,” inProc. IEEE/ACS AICCSA Conf., 2009,pp. 21
26.
[5] R. Aoun, E. A. Doumith, and M. Gagnaire, “Resource provisioning for
enriched services in Cloud environment,” in Proc. IEEE CloudCom
Conf., 2010, pp. 296 303.
[6] R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented Cloud com-
puting: Vision, hype, and reality for delivering IT services as
computing utilities,” inProc. IEEE/ACM Grid Conf., 2008, pp. 50–57.
[7] [R. Aoun and M. Gagnaire, “Towards a fairer benefit distribution in
Grid environments,” inProc. IEEE/ACS AICCSA Conf., 2009,pp. 21–
26
[8] Mertz SA, Eschinger C, Eid T, Pring B (2007) Dataquest Insight: SaaS
Demand Set to Outpace Enterprise Application Software Market
[9] Growth. Gartner RAS Core Research Note, 3 August 2007 Moxie
Marlinspike, "New Tricks for Defeating SSL In Practice," 2009.
[10] Frederick Chong and Gianpaolo Carraro, "Architecture Strategies for
Catching the Long Tail," Microsoft Corporation, April 2006.
http://msdn.microsoft.com/en-us/library/aa479069.aspx.
[11] Eymann T (2008) Cloud computing. Enzyklopädieder
Wirtschaftsinformatik. Accessed: 10 June 2009
[12] Shyam Patidar Dheeraj Rane “A Survey Paper on Cloud Computing”
2012 Second International Conference on Advanced Computing &
Communication Technologies.
[13] http://netseminar.stanford.edu
ACKNOWLEDGMENT
This work is partly supported by the R & D Cell of
Muffakham Jah College of Engineering & Technology,
Hyderabad, India.Hence we would like to thank Principal &
Management of MJCET.
Biography
Mr.J.Srinivas obtained his Bachelor's degree
in computers science & Information
Technology from JNTU, Hyderabad in 2005
and received the Masters Degree in Software
Engineering from JNTUH, in 2010. His
research interests include Cloud Computing
,Software Engineering, Web Technologies, Data mining.
Currently he is working as Assistant Professor in Computer
Science & Engineering Department at Muffakham Jah College
of Engineering & Technology, Banjarahills, Hyderabad.
Mr.K.Venkata Subba Reddy obtained his
Bachelor's degree in Information Technology
from University of Madras in 2002 and
received the Masters Degree in Software
Engineering from Bharath University,
Chennai in 2005, He is currently pursuing
Ph.D.,in Computer Science and Engineering, at Acharya
Nagarjuna University, Guntur, Andhra Pradesh, India. His
research interests include Software Engineering, Web
Technologies, Cloud computing. He is a life member of ISTE
and a member of CSI. Currently he is working as Assistant
Professor in Computer Science & Engineering Department at
Muffakham Jah College of Engineering & Technology,
Banjarahills, Hyderabad.
Dr. Ahmed Abdul Moiz Qyser received his
B.E. (CSE) from Osmania University,
M.Tech. (Software Engineering) from
JNTU, Hyderabad, and Ph.D. from
Osmania University. His research focus is
Software Process Models and Metrics for
SMEs. He is presently working as Professor Head in
Department of Information Technology, Muffakham Jah
College of Engineering and Technology, Hyderabad, India.
He is also a visiting Professor to the industry where he teaches
Software Engineering and itsrelated areas. He is the author of
several research papers in the area of Software Engineering.
He is an active member of ACM, CSI and ISTE
... Srinivas et al. [1] offer an insightful exploration of the fundamental concepts of cloud computing in their study. They critically examine key ideas and present practical examples of cloud computing applications that can be developed to harness the full potential of this transformative technology. ...
Article
Cloud computing uses third-party servers or private clouds to provide online services and on-demand enterprise resource access. Microsoft Azure, Amazon, IBM, and Google Apps allow customers to design and run cloud-based apps from anywhere. These cloud services store and retrieve data from faraway servers, highlighting the importance of security due to internet data transfer. Before using cloud computing, firms must handle security issues. Pay-per-use, self-service, and scalability make the model popular in banking, healthcare, retail, education, manufacturing, and business. Pay-per-use models let users use servers, networks, storage, services, and applications without buying them. Limited data control can result in account service issues, traffic hijacking, insecure APIs, malicious insiders, technology sharing issues, and multi-tenancy data failures. Continuous research and development improve security and user confidence. This paper provides a framework for understanding cloud computing, identifies security dangers and research issues, and emphasizes its relevance in major industries. It also recommends cloud security innovations and assesses worldwide data protection policies to improve data security and reduce risks. Cloud-stored data is vulnerable to programs with security weaknesses, notwithstanding its benefits. If the guest OS’s security is unreliable, virtualization on a hypervisor may expose data to attacks. Additionally, data security vulnerabilities in transit and at rest will be addressed.
... The study of art and science used to create encrypted information and secure data exchange is known as cryptography. Converting plaintext into ciphertext is considered an improved strategy for ensuring data secrecy in cloud systems [4]. ...
Article
Full-text available
Cloud computing is one of the most rapidly evolving technologies today; it provides numerous advantages that increase its affordability and dependability for use in the company. This paper goes over the concepts of cloud computing, such as its characteristics, deployment model, and service model, discusses the various benefits of cloud computing, and highlights the most pressing issues and security concerns in cloud storage. As a consequence, that leads to a review of distinctive cryptography algorithms that meet the security requirements (CIA: confidentiality, integrity, and availability) that are used to secure communications in cloud computing situations. It also displays many algorithms depending on the previous studies, such as Blowfish, RSA, DES, AES, MD5, Feistel, SP, HIGHT, LED, Cybpher, PRESENT, RC6, Diamond2, mCrypton, SLIM, Klein, PUFFIN-2, SEA, CLEFIA, LBlock, TWINE, 2, ANU, ANU-II, NLBSIT, Piccolo, BORON, RECTANGLE, LICI, QTL, LOGIC, TRIVIUM, Fruit-v2, Fruit-80, A4, the Enocoro family, and Grain family, to make a comparison among them using many measurements. It found that modern and lightweight algorithms are more suitable for use in this field. Furthermore, the purpose of this paper is to make some suggestions for improving the safety and security of cloud computing technologies.
... Konsumen dapat menggunakan peralatan perantara untuk mengembangkan programnya sendiri dan mengirimkannya ke pengguna melalui Internet dan server. Pengguna mengontrol aplikasi yang berjalan di lingkungan, tetapi tidak mengontrol sistem operasi, perangkat keras atau infrastruktur jaringan di mana mereka berjalan[12]. ...
... Cloud computing has become very popular in the last few years [1], [3]. Size of computation and demand for higher computation is growing very rapidly which is causing an uneven and heavy workload on cloud resources. ...
... In recent years, with the rapid development of high-traffic services such as the Internet of Things [1][2][3][4] and cloud computing [5][6][7][8][9][10], there has been a growing demand for efficient, high-capacity signal transmission and processing. It is foreseeable that the demand for information will continue to expand, posing formidable challenges to existing communication and computing technologies. ...
Article
Full-text available
In the field of information processing, all-optical routers are significant for achieving high-speed, high-capacity signal processing and transmission. In this study, we developed three types of structurally simple and flexible routers using the deep diffractive neural network (D²NN), capable of routing incident light based on wavelength and polarization. First, we implemented a polarization router for routing two orthogonally polarized light beams. The second type is the wavelength router that can route light with wavelengths of 1550, 1300, and 1100 nm, demonstrating outstanding performance with insertion loss as low as 0.013 dB and an extinction ratio of up to 18.96 dB, while also maintaining excellent polarization preservation. The final router is the polarization-wavelength composite router, capable of routing six types of input light formed by pairwise combinations of three wavelengths (1550, 1300, and 1100 nm) and two orthogonal linearly polarized lights, thereby enhancing the information processing capability of the device. These devices feature compact structures, maintaining high contrast while exhibiting low loss and passive characteristics, making them suitable for integration into future optical components. This study introduces new avenues and methodologies to enhance performance and broaden the applications of future optical information processing systems. Graphical Abstract Supplementary Information The online version contains supplementary material available at 10.1007/s12200-024-00126-2.
Article
Full-text available
This article discusses data security issues in cloud computing. It is the study of data in the cloud and its associated security issues. This article will introduce data protection procedures and global practices to insure that data are protected as much as possible by reducing risks and threats. Keeping data in the cloud has been beneficial for many applications, but it creates risks by exposing data to applications that are already weakly secured. Similarly, if the reliability of the guest process (which may have a vulnerability) is unknown when running on a hypervisor, using cloud computing virtualization can lead to the exposure of dangerous information. The white paper will also provide insights into security information in transit and at rest. Learn all levels based on SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service)
Article
Full-text available
This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Availability of data in the cloud is beneficial for many applications but it poses risks by exposing data to applications which might already have security loopholes in them. Similarly, use of virtualization for cloud computing might risk data when a guest OS is run over a hypervisor without knowing the reliability of the guest OS which might have a security loophole in it. The paper will also provide an insight on data security aspects for Data-in-Transit and Data-at-Rest. The study is based on all the levels of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service)
Conference Paper
Full-text available
Resource visualization has emerged as a powerful technique for customized resource provisioning in grid and data center environments. In this paper, we describe efficient strategies for policy-based controlling of virtualization of the physical resources. With these strategies, visualization is controlled taking into account workload requirements, available capacities of physical resources, and the governing policies. Realizing this control requires simultaneous handling of three problems: (i) determining the virtual resource configurations, (ii) the mapping of resulting virtual resources to physical resources, and (iii) the mapping of workloads to the virtual resources. We pose this as an optimization problem and solve this problem using a linear programming (LP) based approach. We evaluate this approach by implementing it in the Harmony grid environment consisting of heterogeneous resources and heterogeneous workload. Experimental results indicate that our approach is efficient and effective. We extend this approach further by using a two-phase heuristic that allows the decision making component to scale up to handle large scale grid systems.
Article
Full-text available
This keynote paper: presents a 21st century vision of computing; identifies various computing paradigms promising to deliver the vision of computing utilities; defines Cloud computing and provides the architecture for creating market-oriented Clouds by leveraging technologies such as VMs; provides thoughts on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain SLA-oriented resource allocation; presents some representative Cloud platforms especially those developed in industries along with our current work towards realising market-oriented resource allocation of Clouds by leveraging the 3rd generation Aneka enterprise Grid technology; reveals our early thoughts on interconnecting Clouds for dynamically creating an atmospheric computing environment along with pointers to future community research; and concludes with the need for convergence of competing IT paradigms for delivering our 21st century vision.
Article
Cloud computing is the biggest buzz in the computer world these days -- maybe too big of a buzz. Cloud computing means different things to different people. Cloud computing is not a small, undeveloped branch of IT. Research firm IDC thinks that cloud computing will reach $42 billion in 2012. You can do everything on cloud from running applications to storing data off-site. You can run entire operating systems on the cloud. This paper is for anyone who may have recently heard the term "cloud computing" for the first time and needs to know what it is and how it helps them.
Conference Paper
The emergence of new grid services requires the definition of suited business models taking into account the expectations of both end-users and resource providers. Basically, such business models consider the problem of computing, storage and network resources virtualization. The optimization of resource utilization may be carried out either in discrete time or in continuous time. In previous works, we proposed a discrete time approach enabling a better utilization of both network and computing resources in the context of layer-2 virtual private networks (VPN). In this paper, we extend this analysis by integrating to our model a new grid entity, namely the grid resource broker (GRB) as a middleware entity between end-users and resource providers. We compare the economic gain of both the GRB and resource providers via several criteria for three different pricing strategies. In addition, we define the best adopted pricing strategy to the GRB and study its impact on resource providers.
Conference Paper
Cloud services are based on the provisioning of computing, storage, and networking resources in order to satisfy requests generated by remote end-users. High speed Internet access and multi-core Virtual Machines (VMs) enable today the provisioning of diversified and enriched types of services in Cloud environment. In this paper, we consider several types of basic services and show how their orchestration may lead to the provisioning of more sophisticated services. For this purpose, we define four types of requests that cover the wide spectrum of possible services. We then formulate the resource provisioning problem as a Mixed Integer Linear Program (MILP). We assume that the underlying infrastructure is based on a set of end-to-end connections with guaranteed sustainable bandwidth such as Carrier-Grade Ethernet (CGE) circuits. We investigate the impact of two innovative services on resource allocation carried out by a Cloud Service Provider (CSP). These services correspond to distributed data storage and to multicast data transfer. For the former service, we consider the possibility of splitting a storage request onto different remote storage nodes. The latter service aims to distribute a same data sequence from one server towards multiple remote nodes assuming a limited number of network nodes have multicast capacities. These two innovative services provide a gain of 7% in terms of accepted requests when applied to the 18-node NSFnet backbone network.
Dataquest Insight: SaaS Demand Set to Outpace Enterprise Application Software Market [9] Growth. Gartner RAS Core Research NoteNew Tricks for Defeating SSL In Practice
  • Sa Mertz
  • C Eschinger
  • T Eid
  • B Pring
Mertz SA, Eschinger C, Eid T, Pring B (2007) Dataquest Insight: SaaS Demand Set to Outpace Enterprise Application Software Market [9] Growth. Gartner RAS Core Research Note, 3 August 2007 Moxie Marlinspike, "New Tricks for Defeating SSL In Practice," 2009.