keyboard_arrow_up
Top 10 read research articles in the field of Cloud Computing: Services and Architecture @ 2024

Experimental Study To Maintain Stability In The Case Of Industrial Cloudlets Networkabel

    Amel Ben Lazreg, Sousse University, Sousse, Tunisia

    ABSTRACT

    Cloud usage has increased rapidly, except when it comes to the notable integration of IOT with Industry 4.0.This study seeks to challenge the limits of Cloud uses. As a result, the integration of Cloudlet (middleware) in some critical applications is growing rapidly with the expansion of Cloud applications. The Cloudlet is being deployed as a necessary component in the industrial network to ensure data synchronization, security, and stability. Based on our recent studies, this work will focus on how to maintain stability in a Cloudlets network. In other words, the goal is to ensure that all nodes remain stable, meaning that all the Cloudlets are connected to the Cloud and able to transmit data independently, regardless of the constraints imposed by the industrial environment. The first part of this work is to define the problem, discuss how Cloudlet can resolve some Cloud limits. Then, we define the stability and its models. In effect, the experiments in a real industrial environment are presented. Finally, the results are analysed.

    KEYWORDS

    Cloudlets Network, Cloud Computing, Stability, Industrial, Applications, Websockets.


    For More Details :
    https://aircconline.com/ijccsa/V13N4/13423ijccsa01.pdf


    Volume Link :
    https://airccse.org/journal/ijccsa/current2023.html




Users’ Perception Towards Cloud Computing: A Case Of Department Statistic South Africa

    Mosima Naphtaline Phasha1 and Alfred Thaga Kgopa2, 1Tshwane University of Technology, South Africa, 2Tshwane University of Technology, South Africa

    ABSTRACT

    This study was initiated as a result of the researcher’s concerns regarding computing infrastructure at the Department of statistic South Africa (Stats-SA). The concerns arise from issues observed on the physical infrastructure platform currently deployed within the organisation. It is therefore proposed to investigate the attitude and perceptions of users working in Stats-SA on cloud computing and their willingness to migrate from physical infrastructure to cloud. The issue of user behavior during the transition from traditional IT services to cloud services has been addressed in a lot of studies, but the perceptions of employees at Stats-SA have never been investigated. The study expounds on the technology acceptance model by incorporating factors such as availability, accessibility, security and reliability by investigating the perception of end-users. The investigation took the mixed research approach. A questionnaire was developed using three technology acceptance instruments: perceived ease of use, usefulness and attitude to measure the end-user’s intention to move to the cloud.

    KEYWORDS

    Cloud computing, cloud storage, infrastructure, network security


    For More Details :
    https://aircconline.com/ijccsa/V13N2/13223ijccsa01.pdf


    Volume Link :
    https://airccse.org/journal/ijccsa/current2023.html




Achieving Seamless Migration To Privatecloud Infrastructure For Multi-Campus Universities

    Niki Kyriakou1 , Zoi Lachana2 , Dimitrios N. Skoutas3, Charalampos Skianis4 and Yannis Charalabidis5, University of the Aegean, Greece

    ABSTRACT

    Maintaining IT infrastructure is a major challenge for multi-campus universities. The difficulties they face include inflexibility, inefficiency, outdated technology, and redundant resources, all of which negatively impact the quality of services provided to students, faculty, and researchers. Consequently, there is a growing need for a more agile, efficient, and costeffective solution that can cater to the everchanging IT service demands of these institutions.
    Universities can boost their agility, scalability, and cost-effectiveness while enhancing service quality by utilizing cloud services. Cloud computing enables universities to quickly and easily access computing resources that can be scaled up or down as per their IT requirements, providing them with the necessary flexibility to meet dynamic demands. Private cloud migration further offers universities complete control over their internal security and SLA obligations, allowing them to guarantee a high level of service delivery. This paper contends that private cloud migration is an effective solution that can help multi-campus universities surmount their IT infrastructure challenges and enhance their IT service delivery capabilities. This paper presents a case study analysis of the University of the Aegean's migration to a private cloud and offers insights into the factors that influence successful private cloud migration in multi-campus universities. The paper argues that private cloud migration and cloud computing are effective solutions for resolving IT infrastructure issues and improving service delivery in higher education institutions. The paper provides recommendations for universities considering private cloud migration, offering a roadmap for successful migration. Additionally, the study identifies critical success factors that can help universities achieve a successful migration.
    In future work, this study could be expanded to include more universities and explore the challenges and benefits of private cloud migration in a broader context. Furthermore, it would be interesting to investigate the impact of private cloud migration on student outcomes, faculty satisfaction, and institutional performance.

    KEYWORDS

    Private-cloud infrastructure, multi-campus universities, University of the Aegean, datacenter, Cloud computing


    For More Details :
    https://aircconline.com/ijccsa/V13N2/13223ijccsa02.pdf


    Volume Link :
    https://airccse.org/journal/ijccsa/current2023.html




Security And Privacy Aware Programming Model For Iot Applications In Cloud Environment

    Subba Reddy Borra1 , Smitha Khond1 and D .Srivalli2, 1Malla Reddy Engineering College for Women (Autonomous), India, 2Malla Reddy Engineering College for Women (Autonomous), India

    ABSTRACT

    The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns among consumers, network service providers, device manufacturers, and other parties involved. This paper gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems as well as current privacy-preserving technologies. The following elements were investigated during these three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3) Techniques for distributing and storing data. Real-world systems frequently have multiple phases and incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development, and operation, having a thorough understanding of all phases and their technologies can be beneficial. In this Study introduced two independent methodologies namely generic differential privacy (GenDP) and Cluster-Based Differential privacy ( Clusterbased DP) algorithms for handling metadata as intents and intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more and more important to improve data privacy and security through appropriate data acquisition. The proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) , Random Forest (RF) .

    KEYWORDS

    Cloud Computing, IoT Applications, Security, Privecy, IoT Systems, Generic Diffential Privecy(GenDP), Cluster Based Diffential Privacy(Cluster-based).


    For More Details :
    https://aircconline.com/ijccsa/V13N1/13123ijccsa01.pdf


    Volume Link :
    https://airccse.org/journal/ijccsa/current2023.html




Analysis Of The Comparison Of Selective Cloud Vendors Services

    Rehnuma Tasnim, Afrin Akter Mim, Salman Hasan Mim, Md. Ismail Jabiullah, Daffodil International University, Bangladesh

    ABSTRACT

    Cloud computing refers to a location that allows us to preserve our precious data and use computing and networking services on a pay-as-you-go basis without the need for a physical infrastructure. Cloud computing now provides us with powerful data processing and storage, exceptional availability and security, rapid accessibility and adaption, ensured flexibility and interoperability, and time and cost efficiency. Cloud computing offers three platforms (IaaS, PaaS, and SaaS) with unique capabilities that promise to make it easier for a customer, organization, or trade to establish any type of IT business. We compared a variety of cloud service characteristics in this article, following the comparing, it's straightforward to pick a specific cloud service from the possible options by comparison with three chosen cloud providers such as Amazon, Microsoft Azure, and Digital Ocean. By using findings of this study to not only identify similarities and contrasts across various aspects of cloud computing, as well as to suggest some areas for further study.

    KEYWORDS

    Cloud Computing, Trending Cloud Providers, cloud Service feature.


    For More Details :
    https://aircconline.com/ijccsa/V12N6/12622ijccsa01.pdf


    Volume Link :
    https://airccse.org/journal/ijccsa/current2022.html




Selecting Trustworthy Clients In The Cloud

    Imen Bouabdallah1 and Hakima Mellah, 1 USTHB, Bab ezzouar, Algeria, 2CERIST, Ben Aknoun, Algeria

    ABSTRACT

    With the recent increase demand for cloud services, handling clients’ needs is getting increasingly challenging. Responding to all requesting clients with no exception could lead to security breaches, and since it is the provider’s responsibility to secure not only the offered cloud services but also the data, it is important to ensure clients reliability. Although filtering clients in the cloud is not so common, it is required to assure cloud safety. In this paper, we made use of multi agent system interaction mechanisms to handle the cloud interactions for the providers’ side, and of Particle Swarm Optimization to select the and determine the accurate trust weight and therefore to filtrate the clients by determining malicious and untrustworthy clients. The selection depends on previous knowledge and overall rating of trusted peers. The conducted experiments proves that the combination between MAS, PSO and trust outputs relevant results with different number of peers, the solution is able to converge to the best result after small number of iterations. To explore more space and scenarios, synthetic data was generated to improve the model’s precision.

    KEYWORDS

    Cloud, Multi agent system, trust, interaction, Particle Swarm Optimization


    For More Details :
    https://aircconline.com/ijccsa/V12N1/12122ijccsa01.pdf


    Volume Link :
    https://airccse.org/journal/ijccsa/current2022.html




Blockchain Based Data Security As A Service In Cloud Platform Security

    SMagesh Kasthuri, Wipro Limited, Bengaluru, India

    ABSTRACT

    Blockchain is widely used for money related transaction and still there are many proven usecases across different industries like Retail in stock checks and order management, Manufacturing in good movement processing, Health care in patient database management to name a few. With this in mind, it is always important to understand the merits and demerits of both Public and Private Blockchain to understand their capabilities and limitations to decide which one is more suitable for an industry specific usecase implementation. In a Cloud based platform, data security plays a crucial role to cater to data protection and regulatory requirements and Blockchain can play an important role in this for accelerated workflow by providing ‘data security’ as a service capability.

    KEYWORDS

    Data Security, Blockchain, Cloud platforms, Data protection, Regulatory requirements


    For More Details :
    https://aircconline.com/ijccsa/V11N6/11621ijccsa01.pdf


    Volume Link :
    https://airccse.org/journal/ijccsa/current2021.html




Digital Banking - Architecture Strategies Using Cloud Computing

    Prudhvi Parne, Bank of Hope, 1655 E Redondo Brach Blvd, Gardena, CA, USA

    ABSTRACT

    With recent advances in technology, internet has drastically changed the computing world from the concept of parallel computing to distributed computing to grid computing and now to cloud computing. The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. Unfortunately, many banks are still hesitant to adopt cloud technology. New credit unions wanting to achieve greater business agility, cloud technology enables organizations to respond instantly to changing market conditions, leveraging data and applied analytics to achieve customer experience and operational productivity benefits. As a result, cloud computing comes in to provide a solution to such challenges making banking a reliable and trustworthy service. This paper aims at cloud computing strategy, impact in banking and financial institutions and discusses the significant reliance of cloud computing.

    KEYWORDS

    Cloud Computing, Technology, Finance, Security


    For More Details :
    https://aircconline.com/ijccsa/V11N6/11621ijccsa02.pdf


    Volume Link :
    https://airccse.org/journal/ijccsa/current2021.html




A Novel Optimization Of Cloud Instances With Inventory Theory Applied On Real Time Iot Data Of Stochastic Nature

    Mr. Sayan Guha, Cognizant Technology Solutions, India

    ABSTRACT

    A Horizontal scaling is a Cloud architectural strategy by which the number of nodes or computers increased to meet the demand of continuously increasing workload. The cost of compute instances increases with increased workload & the research is aimed to bring an optimization of the reserved Cloud instances using principles of Inventory theory applied to IoT datasets with variable stochastic nature. With a structured solution architecture laid down for the business problem to understand the checkpoints of compute instances – the range of approximate reserved compute instances have been optimized & pinpointed by analysing the probability distribution curves of the IoT datasets. The Inventory theory applied to the distribution curves of the data provides the optimized number of compute instances required taking the range prescribed from the solution architecture. The solution would help Cloud solution architects & Project sponsors in planning the compute power required in AWS® Cloud platform in any business situation where ingestion & processing data of stochastic nature is a business need. .

    KEYWORDS

    AWS, Amazon Web Services, Inventory Theory, Reserved Instance, On-Demand Instance, Uniform Distribution, Gaussian Distribution, Poisson Distribution.


    For More Details :
    https://aircconline.com/ijccsa/V11N6/11621ijccsa03.pdf


    Volume Link :
    https://airccse.org/journal/ijccsa/current2021.html




Success-Driving Business Model Characteristics Of Iaas Providers – Towards A Quantitative Evaluation

    Sebastian Floerecke, Florian Felix Röck and Franz Lehner, University of Passau, Passau, Germany

    ABSTRACT

    Despite the highly competitive situation within the Infrastructure as a Service (IaaS) market and the resulting pressure and uncertainty for the involved providers, only little knowledge is available about business model characteristics (BMCs) related to success. Merely few qualitative studies are existing that propose hypotheses on success-driving business model characteristics (SDBMCs), however, a general and comparative quantitative evaluation and thus an evidence for their impact on business success is still missing. But this knowledge is essential for IaaS providers as it would allow them to focus their limited resources and efforts on the truly decisive BMCs and, at the same time, save costs by avoiding activities and investments of minor importance. Aiming to reduce this gap, a web-based survey was carried out, in which representatives of IaaS providers of different size rated the level of relevance of the proposed SDBMCs. As this study is still going on, this paper focuses on presenting the study design and an analysis of the data collected so far. As a preliminary result, nearly 80 % of the SDBMCs were rated as extremely important or important, meaning that the existing qualitative research results were confirmed to a high degree. The relevance of the individual SDBMCs varies greatly depending on the IaaS provider’s size.

    KEYWORDS

    Infrastructure as a Service (IaaS), Business Model, Success-Driving Business Model Characteristics (SDBMCs), Web-Based Survey, Quantitative Evaluation, Behavioural-Science Research Paradigm.

    For More Details :
    https://aircconline.com/ijccsa/V10N5/10520ijccsa01.pdf


    Volume Link :
    https://airccse.org/journal/ijccsa/current2020.html








menu
Reach Us

emailijccsajournal@airccse.org


emailijccsa@aircconline.com

close