Cloud
See the latest white papers on how cloud computing and cloud services have transformed the IT industry, from data center services to virtualization, software-as-a-service, infrastructure-as-a-service, platform-as-a service and more.
-
Leveraging Microsoft's System Center 2012 Suite in the Private Cloud
Ultimately, all large organizations will require the added flexibility and efficiency of the cloud. Initially, the private cloud will be the most obvious choice for enterprises that will not or cannot have their proprietary data in the public cloud. The System Center 2012 suite has come at the right time,...
Sponsored By Global Knowledge
-
10 Critical Requirements for Cloud Applications
Growing interest in cloud computing has prompted almost every enterprise software vendor to claim it's "in the cloud." However, in the industry's rush to fulfill demand, some vendors may skip requirements that are critical to delivering the true benefits of cloud applications.
Sponsored By Workday
-
EMC Customer Profile: Safe Systems
Learn why Safe Systems chose EMC VNX and VNXe unified storage for efficiency, simplicity and performance in 100% virtualized private cloud infrastructure.
Sponsored By EMC
-
Aligning CFO and CIO Priorities
Forward-thinking organizations are viewing cloud computing as an investment in business transformation, not just a way to cut costs for IT. Thanks to the cloud, CFOs and CIOs are moving beyond the “either/or” discussions that once forced themto make tradeoffs between IT cost cutting and the creation of new business...
Sponsored By VMware
-
Cloud Security Myths and Strategies Uncovered
Forward-thinking CSOs are embracing the right security strategy and exercising appropriate caution without dampening cloud optimism. By overcoming the number one perceived challenge—security—CIOs can move beyond their fears to pursue their IT transformation to cloud computing.
Sponsored By VMware
-
Cloud Computing: What It Is and What It Can Do for You
The definition of cloud computing depends largely on whether you are a consumer or producer. The public cloud is geared more for the individual consumer or small company, while the private cloud is geared more for a medium-to-large company. In addition, the private cloud is branching out to incorporate the...
Sponsored By Global Knowledge
-
10 Security Concerns for Cloud Computing
The flexibility, reduced cost, and mobility of cloud computing have made the concept a hot topic. Before implementing this method of computing, however, it is important to consider the security of the "cloud." In this white paper, you will learn some of the risks and benefits of cloud computing to...
Sponsored By Global Knowledge
-
Video: Editors' Q&A on Infrastructure as a Service
Cloud computing encompasses a lot of different technologies but the two biggest categories are Software as a Service (apps) and Infrastructure as a Service (servers). The IaaS providers make a very convincing argument for businesses to stop running their own data centers and simply purchase server capacity on-demand and scale...
Provided By ZDNet
-
Orchestration For Modern IT: Helping IT Accelerate Business
Orchestration makes complex procedures easy to repeat while reducing the possibility of human errors. IT organizations that take advantage of orchestration are able to improve efficiency and service quality while reducing operational costs. Modern IT requires an evolved approach - one that erases the barriers between people, process and technology....
Provided By ServiceNow
-
Executive's guide to infrastructure as a service (IaaS)
Develop the right cloud strategy for your organization with the help of the advice and insights collected in this latest guide from ZDNet and TechRepublic.
Provided By TechRepublic
-
On-demand Webcast - Conquer new markets: how the cloud takes you where you need to be
New markets mean new challenges and new rules. Customer requirements are different, purchasing cycles are different, and there may even be cultural and language differences, especially when you expand globally. To compete to win, you must identify new opportunities, develop an attack plan, create the logistics and infrastructure necessary to...
Provided By TechRepublic
-
Security Issues on Cloud Computing
The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure. In order for this to become reality, however, there are still some challenges to be...
Provided By Cornell University
-
Estimation of Performance and Availability of Cloud Application Servers Through External Clients
This paper investigates two aspects of the QoS offered by some cloud providers on the Internet, the availability and the dedicated capacity in terms of how well a user process is isolated from other users of the same application server instance. By using standard components and software utilities, a small...
Provided By IARIA
-
A Systematic Mapping Study on Cloud Computing
Cloud Computing emerges from the global economic crisis as an option to use computing resources from a more rational point of view. In other words, a cheaper way to have IT resources. However, issues as security and privacy, SLA (Service Layer Agreement), resource sharing, and billing has left open questions...
Provided By Federal University of Pernambuco
-
Participatory Networking: An API for Application Control of SDNs
The authors present the design, implementation, and evaluation of an API for applications to control a Software-Defined Network (SDN). Their API is implemented by an OpenFlow controller that delegates read and write authority from the network's administrators to end users, or applications and devices acting on their behalf. Their API...
Provided By Brown University
-
A faster, more effective way to manage authentication deployments
Gartner predicts that, by 2017, more than 50% of enterprises will choose cloud-based services as the delivery option for new or refreshed user authentication implementation, up from less than 10% today. This executive summary has been prepared for security or compliance leaders to assess the affordability of cloud-based authentication and...
Provided By SafeNet, Inc.
-
The real cost of strong authentication
Choosing your authentication solution based on the solution cost alone is a misleading indicator for its Total Cost of Operation. When you carry out a real on-premise vs. cloud comparison you must take into account the overall management and implementation costs. Read on to see why cloud-based solution is more...
Provided By SafeNet, Inc.
-
Using Parametric Models to Represent Private Cloud Workloads
Cloud computing has become a popular metaphor for dynamic and secure self-service access to computational and storage capabilities. In this paper, the authors analyze and model workloads gathered from enterprise-operated commercial private clouds that implement \"Infrastructure as a Service.\" Their results show that 3-phase hyper-exponential distributions fit using the Estimation...
Provided By California State University
-
Cloud for Dummies, IBM Midsize Company Limited Edition
This book gives mid-sized companies insights on what it means to create flexible pools of computing resources that break down silos in your company so you can perform in a smarter and more proactive manner.
Intel, the Intel logo, Xeon, and Xeon...Provided By IBM and Intel
-
Deploying Cloud with IBM System x
As a small or medium-sized business, knowing which infrastructure investments you need to make to improve your business is easy. The struggle is being able to apply your finite resources for long-term benefits when the day-to-day demands of your business keep your IT assets more than busy. A private cloud...
Provided By IBM and Intel
-
Mini Review on Cloud Computing
Cloud computing is an extension of this paradigm wherein the capabilities of business applications are exposed as sophisticated services that can be accessed over a network. Cloud service providers incentivized by the profits to make by charging consumers for accessing these services. Consumers, such as enterprises, attracted by the opportunity...
Provided By Journal of Environmental science, computer science and engineering & technology (JECET)
-
Judicial Frameworks and Privacy Issues of Cloud Computing
Cloud Computing a leading and getting widely adopted technology in industry, unveils some unprecedented challenges to security of company's resources such as capital and knowledge based assets. Hither to know much attention has been paid by the governments and there is neither any universal standard adopted, nor any breakthrough to...
Provided By International Journal of Science and Research (IJSR)
-
Integrating Red Hat Enterprise Linux with Microsoft Windows in the Datacenter
In today’s challenging economic environment, IT planners are continuously seeking innovative ways to enhance service levels and contain costs. Forward-looking organizations are revamping IT infrastructure and deploying virtualization solutions and private cloud services to improve business agility and reduce equipment and operating expenses.
Provided By Red Hat
-
Private Clouds Will Use Hybrid Infrastructure- The Role Of Mainframes In Cloud: To Meet The Full Range Of Reliability And Security Needs
This paper looks at the requirements of the next generation of applications moving to the cloud. The paper discusses cloud customers' desire for a greater infrastructure choice and openness to hybrid infrastructures. The paper concluded shtt hybrid cloud infrastructures are inevitable — particularly for private environments. Hybrid clouds deliver higher...
Provided By IBM
-
Towards Securing APIs in Cloud Computing
Every organization today wants to adopt cloud computing paradigm and leverage its various advantages. Today everyone is aware of its characteristics which have made it so popular and how it can help the organizations focus on their core activities leaving all IT services development and maintenance to the cloud service...
Provided By Birla Institute of Technology
-
Best Practices for Messaging, Collaboration, Security, Archiving and Encryption in the Cloud
Since email, malware and spam filtering, archiving, encryption and more can be delivered via the cloud, many companies are considering a cloud alternative for one – or all – of these capabilities. But which cloud provider is the best for your company?
In this Osterman Research white paper sponsored...Provided By Dell Software
-
From Fear to Fortune: Lessons from Leveraging the Cloud
Tom Kelly, Managing Director of T > Edward, Inc. has more than 26 years of strategic and tactical business experience. As a CFO and CIO, he was a pioneer in using cloud technologies beginning in the late 1990s and has helped spearhead cloud implementations at more than 25 companies from...
Provided By Netsuite AU
-
Big Data Research Continues to Indicate that Cloud Competitiveness and Productivity have Spiked in Interest among America's CIO's
According to 49% of CIO's, the top goal over the next 5 years is to improve the productivity of systems within their respective companies. Following productivity, 31% stated that the ability to enable improved security and protection of data was a corporate initiative. This has led to a creation of...
Provided By Fastblue Networks
-
Sun Behind Clouds - On Automatic Cloud Security Audits and a Cloud Audit Policy Language
Studies show that when it comes to an integration of Cloud computing into enterprises, chief information officers and management still see some dark Clouds on the horizon. The biggest one is the lack of security, which results in distrust and skepticism against the technology, mainly originating from an intransparency of...
Provided By IARIA
-
Provenance Framework for the Cloud Infrastructure: Why and How?
Provenance is an important aspect in the verification, audit trails, reproducibility, privacy and security, trust, and reliability in distributed computing, in-silico experiment and generally in e-science. On the other hand, Cloud computing is the business model of distributed computing and is considered the next generation of computing and storage platforms....
Provided By IARIA
-
High-Reliable Dispatching Mechanisms for Tasks in Cloud Computing
Cloud computing is a popular and attractive issue in recent years, because it can provide a lot of services to users via Internet. The cloud computing consists of a huge number of heterogeneous servers, memories, and various applied services. The development of cloud computing has expressed a high degree of...
Provided By Chaoyang University of Technology
-
The Key Factors Affecting Business Model for Enterprises Adopting Cloud Computing Technology
Now-a-days the mobile devices, social communities and cloud computing provide the impetus of driving forces in the market of Information Technology (IT) industry. The technology of cloud computing brings huge business opportunities and potentials; however, most of the research of cloud computing focus merely on the theoretical concepts and technologies...
Provided By Feng Chia University
-
Countering Wrapping Attack on XML Signature in SOAP Message for Cloud Computing
It is known that the exchange of information between web applications is done by means of the SOAP protocol. Securing this protocol is obviously a vital issue for any computer network. However, when it comes to cloud computing systems, the sensitivity of this issue rises, as the clients of system,...
Provided By Eastern Mediterranean University
-
Lightweight Proofs of Retrievability for Electronic Evidence in Cloud
Proofs of Retrievability (PoR) is one of the basic functions of electronic evidence preservation center in cloud. This paper proposes two PoR schemes to execute the workflow of evidence preservation center, which are named Finer Grained-Proofs of Retrievability (FG-PoR) and More Lightweight-Proofs of Retrievability (ML-PoR). The two PoR schemes do...
Provided By Yangtze Normal University
-
Scientific Applications in Cloud Computing
Scientific applications over the years have been executed on traditional High Performance Computing (HPC) systems like supercomputers or clusters and High Throughput Computing (HTC) systems like Grids. With large amounts of computing resources traditional HPC has been used by many organizations to help resolve a variety of problems. Although these...
Provided By University of Richmond
-
Identification of Effective Public Cloud on User Query
One of the major requirements over the web is about the selection of best service and service provider over the web. When the people talk about cloud service the work is more specific and the parametric. As the cloud computing is becoming prevalent, a huge amount of information is centralized...
Provided By Creative Commons
-
A Sophisticated Approach for Job Scheduling in Cloud Server
Cloud computing is a latest new computing paradigm where applications, data and IT services are provided over the Internet. In cloud computing, load balancing is required to distribute the dynamic local workload evenly across all the nodes. It helps to achieve a high user satisfaction and resource utilization ratio by...
Provided By Creative Commons
-
A Survey on Energy Aware Offloading Techniques for Mobile Cloud Computing
Mobile Cloud computing is a new transdisciplinary research area based on traditional mobile computing and Cloud computing. MCC has inherited the high mobility, scalability, and become a hot research topic. The authors hope this paper will help interested researchers to get a better understanding of MCC definitions and architecture. It...
Provided By Creative Commons
-
Enhancing Security in Cloud Storage Using ECC Algorithm
Security in cloud computing is an evolving area in today's world. It is subject of concern for Cloud Technology Services. One of the measures which customers can take care of is to encrypt their data before it is stored on the cloud. This paper is intended towards providing security service...
Provided By International Journal of Science and Research (IJSR)
-
Software as a Service: Cost Effective Strategic Model to Manage Cloud Services
Cloud Computing technology has redefined the utility of modern web-based software. It has amazingly improved data accessibility and has also effectively reduced web-based software development cost. These flaws are evident in the strategies on which they have been designed, developed and deployed. Cloud computing supports a web infrastructure where computing...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Planning a Move to the Cloud - Tips, Tricks and Pitfalls
Cloud computing can bring many benefits to an organization, with these benefits falling into several distinct categories:
- Virtualization – The ability to increase computing efficiency
- Democratization of Computing – Bringing enterprise scale infrastructure to small and medium businesses
- Scalability and fast provisioning – Bringing web scale IT...Sponsored By Rackspace
-
How does IBM deliver cloud security?
Cloud computing offers new possibilities and new security challenges. These challenges range from governance, through to securing application and infrastructure. Fundamentally it is important to be able to assure the security of these new models in order to build trust and confidence. Some of the growing cloud security concerns include:...
Sponsored By IBM
-
EXA Corporation Creates a Secure and Resilient Private Cloud.
EXA Corporation (EXA) is a joint venture company created by JFE Steel Corporation. EXA faced the challenges of how to best secure and manage servers in multiple offices. It also wanted to create a secure hybrid cloud environment that combines external data centers and public cloud services. EXA Corporation chose...
Sponsored By IBM
-
Whitepaper: Private Cloud - It's More Than Just Virtualization
This white paper from Forrester Consulting reviews the core functionality required to maximize private cloud benefits and provides some best practices for enterprise cloud deployments.
Sponsored By NetApp
-
The Insider's Guide to Evaluating Private Cloud Storage Array
This informative guide represents months of rigorous research that your organization can leverage to kick start its evaluation process. Read on to learn which private cloud array will qualify as best-in-class for your company .
Sponsored By NetApp
-
Best of Breed Private Cloud with NetApp and Windows Server 2012
Check out this white paper to learn the benefits of a private cloud and discover how deploying one private cloud solution can provide: consolidated resources, flexible services, easy provisioning of new environments and more.
Sponsored By NetApp
-
EMC VSPEX for Rapid ROI
Many organizations are struggling to embrace new innovative solutions that provide strategic value to the business. These challenges are exacerbated for small and midsized businesses (SMBs) with fewer resources than their midmarket and enterprise counterparts. This analytical report looks into how organizations are looking into new technologies to see greater...
Sponsored By EMC
-
CIO Playbook: How Mobility Can Transform Your Business
Mobility is more than just smartphones and tablets. IT professionals need to get their arms around on four key elements of the mobile ecosystem as the rise of mobile devices in the enterprise offer untapped opportunities for businesses. However, they also present significant challenges for IT around cost and security....
Provided By SAP
-
Additional Authentication and Authorization Using Registered Email-ID for Cloud Computing
Cloud computing is a new computing paradigm that changes the way of information technology is provided and used. But achieving acceptable level of information security issues are an important aspect and a key factor in the cloud. This paper firstly lists some of the different security issues of the cloud...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Fault Tolerance- Challenges, Techniques and Implementation in Cloud Computing
Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and proactively handled. Fault tolerance techniques are used to predict these failures and take an...
Provided By International Journal of Computer Science Issues
-
A Survey of Data Management System for Cloud Computing: Models and Searching Methods
Cloud computing, as a new computing pattern having the capacity of sharing computing and storage, has been developed steadily and rapidly during recent years. It is selected by the famous scientific journal Technology Review published by MIT as one of the ten newly developed technologies which have changed the world....
Provided By ISSN
-
Developing Cloud Business Models: A Case Study on Cloud Gaming
Cloud computing lets small firms compete in markets traditionally dominated by multinational corporations. Over a 10-year period, one such firm developed a successful cloud gaming business model. Ever since the software industry diverged from the computer manufacturing industry, software firms' business models have been in flux. Over the last decade,...
Provided By Institute of Electrical and Electronics Engineers
-
On-demand Webcast - Conquer new markets: how the cloud takes you where you need to be
New markets mean new challenges and new rules. Customer requirements are different, purchasing cycles are different, and there may even be cultural and language differences, especially when you expand globally. To compete to win, you must identify new opportunities, develop an attack plan, create the logistics and infrastructure necessary to...
Provided By TechRepublic
-
Cloud Database Management System Architecture
One of the major challenges for the IT companies today is how to manage large growing volumes of data and how to produce a quality driven software product ensuring optimal utilization of resources with minimum cost. The database management system is a software system i.e. a set of programs that...
Provided By Jamia Millia Islamia
-
Cloud for Dummies, IBM Midsize Company Limited Edition
This book gives mid-sized companies insights on what it means to create flexible pools of computing resources that break down silos in your company so you can perform in a smarter and more proactive manner.
Intel, the Intel logo, Xeon, and Xeon...Provided By IBM and Intel
-
Review of Information Authentication in Mobile Cloud Over SaaS & PaaS Layers
The revolution has begun; time has come when users no more have to worry about the size, format & storage of data at a single place. Cloud computing is a revolution which has made world of Internet more like a place of dynamic storage & facilitator of new methodology, which...
Provided By ACCENTS
-
Data Storage Security Using Partially Homomorphic Encryption in a Cloud
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network. Traditionally organizations stored and maintained data in their own data centers, over which they had complete control....
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Remote Sensing Data as a Service in Hybrid Clouds: Security Challenges and Trusted Third Party Auditing Mechanisms
Cloud computing is the next generation platform to provide resources as the services to the end users. In this paper, the authors present a service for trusted Third Party Auditing (TPA) mechanisms. Hybrid cloud connects the private and public clouds, and it is useful when the resource expansion is needed...
Provided By International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
-
From Fear to Fortune: Lessons from Leveraging the Cloud
Tom Kelly, Managing Director of T > Edward, Inc. has more than 26 years of strategic and tactical business experience. As a CFO and CIO, he was a pioneer in using cloud technologies beginning in the late 1990s and has helped spearhead cloud implementations at more than 25 companies from...
Provided By Netsuite AU
-
Threshold Proxy Re-Encryption Scheme and Decentralized Erasure Code in Cloud Storage with Secure Data Forwarding
A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party's cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes...
Provided By IOSR Journal of Engineering
-
Enhancing Data Storage Integrity in Cloud Environment by mitigating Repudiation using CS-MPNR
Cloud computing is envisioned as the next generation architecture of IT organization. It makes the users need of their data to be available wherever they are. Although recent emerging technology Cloud has many striking features, it also has some security dreads. So the users find it difficult to trust the...
Provided By International Journal of Advanced Research in Computer Engineering & Technology
-
Private Clouds Will Use Hybrid Infrastructure- The Role Of Mainframes In Cloud: To Meet The Full Range Of Reliability And Security Needs
This paper looks at the requirements of the next generation of applications moving to the cloud. The paper discusses cloud customers' desire for a greater infrastructure choice and openness to hybrid infrastructures. The paper concluded shtt hybrid cloud infrastructures are inevitable — particularly for private environments. Hybrid clouds deliver higher...
Provided By IBM
-
A Cloud based P Systems Algorithm
A P system is a computability model which is biochemically inspired, it is a general distributed model, highly parallel, nondeterministic, based on the notion of a membrane structure. Till this moment, there is no exact idea about the real implementation of P systems. P systems are used in solving NP-complete...
Provided By Cairo University
-
Agent Based Cloud Storage System
Cloud computing technology is envisioned as the next generation architecture of IT Enterprise. It is defined as a set of scalable data servers or chunk servers that provide computing and storage services to clients. The cloud storage is a relatively basic and widely applied service which can provide users with...
Provided By Cairo University
-
Developing the Environment of Information Technology Education Using Cloud Computing Infrastructure
The environment of IT education based on the infrastructure of cloud computing had been proposed and constructed for students who can login anywhere by using browsers in this study. The experiment results show that there exists significant difference for students' learning achievement of computer in elementary school between after using...
Provided By Science Publications
-
Gravity Assist and Scattering Off AGB Stars Off Molecular Clouds
The scattering of stellar orbits by galactic molecular clouds is studied in hope of explaining isotopic peculiarities of presolar grains from Asymptotic Giant Branch (AGB) stars. Silicon isotopic anomalies found in the mainstream Silicon Carbide (SiC) grains are observed to have heavy isotopes enriched. To explain the isotopic heaviness the...
Provided By Science Publications
-
Phenomenology Tools on Cloud Infrastructures Using OpenStack
The authors present a new environment for computations in particle physics phenomenology employing recent developments in cloud computing. On this environment users can create and manage "Virtual" machines on which the phenomenology codes/tools can be deployed easily in an automated way. They analyze the performance of this environment based on...
Provided By University of Zagreb
-
ARM Cortex-A9 Leads Green "EuroCloud"
Cloud computing is an emerging computing paradigm that has the potential to radically change the way information technology is used and provided. It is the conglomeration of the applications delivered as services over the Internet on-demand, and the hardware/software in the data centers providing these services. Cloud computing is having...
Provided By ARM
-
A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems
Traditionally, the development of computing systems has been focused on performance improvements driven by the demand of applications from consumer, scientific, and business domains. However, the ever-increasing energy consumption of computing systems has started to limit further performance growth due to overwhelming electricity bills and carbon dioxide footprints. Therefore, the...
Provided By Elsevier
-
System Architecture Directions for Tangible Cloud Computing
The field of wireless sensor networks has produced a range of supporting hardware and software technologies that facilitate the creation of sensor network applications. Despite these advances, the implementation of wireless sensor network applications remains a complex task that requires domain experts and a significant investment of time and money....
Provided By Murdoch University
-
Extending Sensor Networks Into the Cloud Using Amazon Web Services
Sensor networks provide a method of collecting environmental data for use in a variety of distributed applications. However, to date, limited support has been provided for the development of integrated environmental monitoring and modeling applications. Specifically, environmental dynamism makes it difficult to provide computational resources that are sufficient to deal...
Provided By Murdoch University
-
DCaaS: Data Consistency as a Service for Managing Data Uncertainty on the Clouds
Ensuring data correctness over partitioned distributed database systems is a classical problem. Classical solutions proposed to solve this problem are mainly adopting locking or blocking techniques. These techniques are not suitable for cloud environments as they produce terrible response times; due to the long latency and faultiness of wide area...
Provided By Middle East Technical University
-
A Fair Multi-Party Non-Repudiation Scheme for Storage Clouds
Data storage is one of the most profitable applications in Clouds. Although a transparent service model is convenient, it may be subject to the loss of data integrity. The authors' study revealed vulnerabilities in some commercial Cloud storage services. They analyzed the repudiation problem in a Cloud environment. In this...
Provided By Binghamton University
-
Mitigating Cloud Computing Security Risks Using a Self-Monitoring Defensive Scheme
Cloud Computing (CC) promises to offer seamless provisioning of on-demand services and data through the network. These services are made discoverable to the user in the form of simple abstractions via virtualized resources. These services offer unprecedented dynamic, primarily hardware dependent, scalability. Although CC promises to make life much easier...
Provided By Binghamton University
-
Netuitive and Enterprise Cloud Computing Infrastructure
Enterprises likely will include both "Private" and "Public" infrastructure in their cloud computing strategies. Most will start by leveraging virtualization technologies to build "Private" cloud infrastructure. As public services become more reliable, secure and compliant, each enterprise will evolve to its own optimal mix of private and public services. The...
Provided By Netuitive
-
A Novel Approach for Handling Security in Cloud Computing Services
The rapid advances in cloud computing has introduced a variety of security issues; each requires certain skills and knowledge. While developing business services requires conducting analysis and design for the business activities that does not include common security functions for these services. Currently there is no framework existing from the...
Provided By Cairo University
-
Your Data, Your Way: The IPlant Foundation API Data Services
This paper introduces the iPlant Foundation API Data Services, a cloud-based, hosted solution for distributed data and metadata management in the iPlant Data Store. The iPlant Data Store is a virtual storage solution for over 7000 users providing seamless access to over 6PB of distributed storage within the iPlant cyber-infrastructure...
Provided By University of Applied Sciences Rapperswil
-
A Hierarchical Intrusion Detection System for Clouds: Design and Evaluation
Security and availability are critical for cloud environments because their massive amount of resources simplifies several attacks to cloud services. This paper introduces a distributed deployment and a centralized one for the authors' Cloud intrusion detection framework, CIDS-VERT. After describing the architectures and the components of the two deployments it...
Provided By University of Applied Sciences Rapperswil
-
Towards Constraint-Based High Performance Cloud System in the Process of Cloud Computing Adoption in an Organization
Cloud computing is penetrating into various domains and environments, from theoretical computer science to economy, from marketing hype to educational curriculum and from R&D lab to enterprise IT infrastructure. Yet, the currently developing state of cloud computing leaves several issues to address and also affects cloud computing adoption by organizations....
Provided By Ajou University
-
Online Optimization of VM Deployment in IaaS Cloud
Infrastructure-as-a-Service (IaaS) clouds provide on-demand Virtual Machines (VMs) to users. How to improve the quality of IaaS cloud services is important for service providers. Currently, the VMs in an IaaS cloud are usually deployed with respect to the maximum utilization of resources. In this paper, the authors propose an online...
Provided By National University of Defense Technology