Most of the information available on cloud computing is either highly technical, with details that are irrelevant to non-technologists, or pure marketing hype, in which the cloud is simply a selling ...point. This book, however, explains the cloud from the user's viewpoint -- the business user's in particular. Nayan Ruparelia explains what the cloud is, when to use it (and when not to), how to select a cloud service, how to integrate it with other technologies, and what the best practices are for using cloud computing. Cutting through the hype, Ruparelia cites the simple and basic definition of cloud computing from the National Institute of Science and Technology: a model enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. Thus with cloud computing, businesses can harness information technology resources usually available only to large enterprises. And this, Ruparelia demonstrates, represents a paradigm shift for business. It will ease funding for startups, alter business plans, and allow big businesses greater agility. Ruparelia discusses the key issues for any organization considering cloud computing: service level agreements, business service delivery and consumption, finance, legal jurisdiction, security, and social responsibility. He introduces novel concepts made possible by cloud computing: cloud cells, or specialist clouds for specific uses; the personal cloud; the cloud of things; and cloud service exchanges. He examines use case patterns in terms of infrastructure and platform, software information, and business process; and he explains how to transition to a cloud service. Current and future users will find this book an indispensable guide to the cloud.
For various reasons, the cloud computing paradigm is unable to meet certain requirements (e.g. low latency and jitter, context awareness, mobility support) that are crucial for several applications ...(e.g. vehicular networks, augmented reality). To fulfill these requirements, various paradigms, such as fog computing, mobile edge computing, and mobile cloud computing, have emerged in recent years. While these edge paradigms share several features, most of the existing research is compartmentalized; no synergies have been explored. This is especially true in the field of security, where most analyses focus only on one edge paradigm, while ignoring the others. The main goal of this study is to holistically analyze the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration. In our results, we will show that all edge paradigms should consider the advances in other paradigms.
•Features and problems that are common to all edge paradigms are identified.•Security threats and challenges that affect edge paradigms are analyzed.•Potential synergies in the development of security mechanisms are shown.•Issues to be studied and evaluated in the near future are discussed.
Towards the Decentralised Cloud Ferrer, Ana Juan; Marquès, Joan Manuel; Jorba, Josep
ACM computing surveys,
11/2019, Volume:
51, Issue:
6
Journal Article
Peer reviewed
Cloud computing emerged as a centralised paradigm that made “infinite” computing resources available on demand. Nevertheless, the ever-increasing computing capacities present on smart connected ...things and devices calls for the decentralisation of Cloud computing to avoid unnecessary latencies and fully exploit accessible computing capacities at the edges of the network. Whilst these decentralised Cloud models represent a significant breakthrough from a Cloud perspective, they are rooted in existing research areas such as Mobile Cloud Computing, Mobile Ad hoc Computing, and Edge computing. This article analyses the pre-existing works to determine their role in Decentralised Cloud and future computing development.
The Biometric authentication has become progressively more desired in current years. With this expansion of cloud computing, database holders be influenced to expand this extensive volume of ...biometric information & detection operations to CLOUD for eradicate of this high-priced storage and result overheads, is still conveys possible dangers to users' seclusion. In this document, we recommend an well-organized, well planned and confidentiality-protecting biometric classification strategy. Particularly, biometric information was encrypted & farmed out for Cloud database. For complete a biometric confirmation, server holder encrypts the inquiry information and proposes that to cloud. The Cloud implements recognition tasks on the encrypted server and sends this conclusion to the server holder. The systematic protection assessment specifies the recommended system is protected still if attackers can fake detection appeals and conspire through the cloud. Evaluated with previous protocols, investigational and new outcomes prove the recommended strategy accomplishes enhanced performance in both preparation and discovery measures.
Secure integration of IoT and Cloud Computing Stergiou, Christos; Psannis, Kostas E.; Kim, Byung-Gyu ...
Future generation computer systems,
January 2018, 2018-01-00, Volume:
78
Journal Article
Peer reviewed
Mobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile device. Another recent technology is Internet of ...Things. Internet of Things is a new technology which is growing rapidly in the field of telecommunications. More specifically, IoT related with wireless telecommunications. The main goal of the interaction and cooperation between things and objects which sent through the wireless networks is to fulfill the objective set to them as a combined entity. In addition, there is a rapid development of both technologies, Cloud Computing and Internet of Things, regard the field of wireless communications. In this paper, we present a survey of IoT and Cloud Computing with a focus on the security issues of both technologies. Specifically, we combine the two aforementioned technologies (i.e Cloud Computing and IoT) in order to examine the common features, and in order to discover the benefits of their integration. Concluding, we present the contribution of Cloud Computing to the IoT technology. Thus, it shows how the Cloud Computing technology improves the function of the IoT. Finally, we survey the security challenges of the integration of IoT and Cloud Computing.
•Presentation of IoT and Cloud technologies which focus on security issues.•Integration benefits of Internet of Things and Cloud Computing technologies.•Part of AES presented for improvement of security issue, resulting from integration.•Contribution of AES and RSA algorithms in the integration of IoT and Cloud technologies.
•Propose the criteria of cost with technology, organization and environment.•The approach takes both quantitative and qualitative attributes into account.•Decision-making process considers both the ...weights of attributes and experts.•Integrate objective and subjective method to weighting for attributes and experts.
Cloud computing technology has become increasingly popular and can deliver a host of benefits. However, there are various kinds of cloud providers in the market and firms need scientific decision tools to judge which cloud computing vendor should be chosen. Studies in how a firm should select an appropriate cloud vendor have just started. However, existing studies are mainly from the technology and cost perspective, and neglect other influence factors, such as competitive pressure and managerial skills, etc. Hence, this paper proposes a multi-attribute group decision-making (MAGDM) based scientific decision tool to help firms to judge which cloud computing vendor is more suitable for their need by considering more comprehensive influencefactors. It is argued that objective attributes, i.e., cost, as well as subjective attributes, such as TOE factors (Technology, Organization, and Environment) should be considered for the decision making in cloud computing services, and presents a new subjective/objective integrated MAGDM approach for solving decision problems. The proposed approach integrates statistical variance (SV), improved techniques for order preference by similarity to an ideal solution (TOPSIS), simple additive weighting (SAW), and Delphi–AHP to determine the integrated weights of the attributes and decision-makers (DMs). The method considers both the objective weights of the attributes and DMs, as well as the subjective preferences of the DMs and their identity differences, thereby making the decision results more accurate and theoretically reasonable. A numerical example is given to illustrate the practicability and usefulness of the approach and its suitability as a decision-making tool for a firm using of cloud computing services. This paper enriches the theory and methodology of the selection problem of cloud computing vendoring and MAGDM analysis.