The layered model of cloud computing 

The layered model of cloud computing 

Source publication
Article
Full-text available
Cloud Computing has received much attention by theIT-Business world. As compared to the common computing platforms, cloud computing is more flexible in supporting real-time computation and is considered a more powerful model for hosting and delivering services over the Internet. However, since cloud computing is still at its infancy, it faces many...

Contexts in source publication

Context 1
... architecture of a cloud computing environment can be divided into 4 layers; namely, hardware layer, infrastructure layer, platform layer and application layer, as shown in Fig. 1. The Hardware Layer includes the physical resource of the cloud, such as routers, switches, servers, power and cooling systems. Some issues associated to the hardware layer are hardware configurations, fault-tolerance, traffic management, power and cooling resource management. The Infrastructure Layer is also known as the ...
Context 2
... computing employs a service-driven business model, where hardware and platform-level resources are provided as services on an on-demand basis. A layer of the architecture described in Figure 1 can be implemented as a service to the layer above and may be viewed as a customer of the layer below. Practically, clouds offer services that can be grouped into three categories; namely, software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) [8] [10]. ...

Citations

... To demonstrate the applicability of their method, they used a validation process on Amazon EC2 and Microsoft Azure, considering two different Cloud service models, i.e., IaaS and PaaS. Others focused on the challenges faced by the Cloud computing growth and conducted comparison studies between popular Cloud service providers, e.g., [10] compared Amazon EC2 and Microsoft Azure regarding how they deal with the challenges of availability, resource scaling, data deletion, data lockin, and data security. Tajadod et al., [11] compared the same platforms looking at the security of architecture and the application levels. ...
Preprint
Full-text available
Authoring access control policies is challenging and prone to misconfigurations. Access control policies must be conflict-free. Hence, administrators should identify discrepancies between policy specifications and their intended function to avoid violating security principles. This paper aims to demonstrate how to formally verify access control policies. Model checking is used to verify access control properties against policies supported by an access control model. The authors consider Google's Cloud Identity and Access Management (IAM) as a case study and follow NIST's guidelines to verify access control policies automatically. Automated verification using model checking can serve as a valuable tool and assist administrators in assessing the correctness of access control policies. This enables checking violations against security principles and performing security assessments of policies for compliance purposes. The authors demonstrate how to define Google's IAM underlying role-based access control (RBAC) model, specify its supported policies, and formally verify a set of properties through three examples.
... In particular, this approach (proposed in this paper) has the advantage that there is no need to embed all the pattern's bits into the original image. This, in turns, allows us to protect digital images while at the same time minimizing the chances of having low-quality marked digital images [21] [22]. Sleit and Abusitta [19] propose a visual cryptography based digital image copyright protection. ...
Article
Full-text available
This paper introduces an NGram-based approach for digital images copyright protection. The advantage of the proposed approach compared to the existing works, is that it does not always require the whole elements (e.g., bits) of the watermark pattern to be embedded into the original digital image. This, in turn, allows us to protect the digital images while at the same time minimizing the chances of having low quality marked digital images. The best case occurs when no element of the pattern is embedded into the original digital image. In contrast, the worst case, which rarely happens, occurs when all elements are embedded into the digital image. Moreover, the use of an NGram approach allows us to efficiently and easily reach any part of the image using the corresponding level numbers and addresses. This makes it more efficient especially for complex and high-dimensional data (e.g., images and videos). Experimental results show the effectiveness of the proposed approach in terms of the ability to recover the watermark pattern from the marked digital image even if major changes are applied to the original digital image.
... On the top of the layers, the applications hosted in the cloud environment are accessed by the user through the browser runs on PC or desktop and mobile devices. Cloud services and applications used by the cloud user that form the next two important layers [1]. These services and applications run on software platforms such as Oracle, SAP, .NET, etc. IoT collects and shares data directly from patients and enables them to quickly and accurately record and analyse novel data flows [2]. ...
... Salah satu layanan AWS adalah Elastic Computing Services (EC2). Amazon EC2 merupakan layanan yang menyediakan kapasitas komputasi yang dapat diubah ukurannya [13]. Layanan ini menawarkan antarmuka yang sederhana sehingga pengguna dapat melakukan konfigurasi dengan mudah. ...
... Amazon EC2 menawarkan kemudahan dalam melakukan perubahan atas skala kapasitas sumber daya yang digunakan. Sehingga, jika kebutuhan kapasitas suatu sumber daya perlu diubah, dinaikkan ataupun diturunkan, maka pengguna dapat melakukan perubahan dengan cepat [13]. EC2 mengurangi biaya dengan membebankan biaya kepada pengguna berdasarkan kapasitas sumber daya yang digunakan saja [10]. ...
Article
Full-text available
Since December 2019, the world and Indonesia have fought a major disaster, namely the Covid-19 virus pandemic. With the rapid spread or transmission of the virus, the Indonesian government decided to impose social distancing or social restrictions that impacted the education sector. Students and lecturers cannot conduct lectures face-to-face in class or laboratory, but lectures must be conducted online. For that, we need an open-source system developed by the campus in carrying out online courses. This application was developed using cloud technology and JITSI as an open-source video-conferencing application. In this study, testing of the features that exist in video conferencing and resource usage on the server is carried out. The results of feature testing on the application run as expected with several important features used for learning such as chat, share screen, recording features that can run optimally. The result tested the system resources based on the number of participants, 31 participants with an average use of 2.1GB RAM and 78 participants with an average RAM usage of 2.8GB.
... Cloud delivers different types of resources between applications at three various layers offered as services: at the highest layer Service as a Service (SaaS) which refers to providing the services of applications over the web on as needed basis [83]; the middle layer Platform-as-a-Service (PaaS) provides an operational platform allowing customers to manage, develop and execute their applications; and at the bottom layer Infrastructure-as-a-Service (IaaS) where consumers may access to highly automated and scalable resources delivered as a service via the Internet [16]. IaaS offers network, storage, and compute resources. ...
Thesis
Motivated by the need of "optimizing the deployment cost of business processes" organizations outsource some of their operations to cloud computing. Cloud providers offer competitive pricing strategies (e.g., on-demand, reserved, and spot) specified based on temporal constraints to accommodate users' changing and last-minute demands. Besides, the organizations' business processes are time constrained and any violation to these constraints could lead to serious consequences. Therefore, there is a need to formally verify that the cloud resource allocation in a business process is temporally correct. However, due to the lack of a formal definition of cloud pricing strategies, specified in natural language, the temporal correctness of cloud resource allocation in a business process management context can not be verified. Furthermore, the variety of cloud resources, pricing strategies, and activities requirements do not help the business process designer to easily find the optimal business process's deployment cost. In this thesis, our objectives are to: (i) improve the business processes support of temporal constraints on activities and cloud resources, as well as pricing strategies and (ii) minimize the business process deployment cost. To this end, we propose a formal specification for cloud resources, pricing strategies, and activities' temporal constraints. This specification is used to formally verify the temporal correctness of cloud resource allocation in time-aware business processes. Then, we propose two linear program models, binary linear program and mixed integer program, to find the optimal deployment cost of time-aware business processes in cloud resources.
... According to [7], firms worry whether cloud computing solutions have sufficient availability and as such proposes use of multiple cloud providers for redundancy. This however introduces the need for a cross platform tool that can monitor and measure across different cloud platforms for comparison purposes. ...
Article
Full-text available
Cloud service providers have a QoS monitoring capability integrated in their cloud platforms. This is to aid in monitoring the performance of the platform as well as for Service Level Agreement confirmation to the clients. Unfortunately this arrangement serves the interest of the cloud provider more than the cloud client since the service providers gauge their services using their own tools. This paper performs a comparative study on the capabilities of the client based vendor neutral QoS tool, developed from a vendor neutral QoS monitoring model against the cloud provider integrated QoS monitoring tools. The comparison was done on four global SaaS cloud service providers, namely SalesForce, Google, Hubspot and Shopify. From the comparative study, it emerged that the client based vendor neutral tool has more capabilities than the cloud provider integrated tools since it has the capability to monitor three key QoS metrics, namely service response time, service availability and service stability as opposed to the cloud providers’ tools which only have one quantitative capability. Further the vendor neutral model can be used across any cloud platform that is accessible via the web browser. This provides a capability for cross platform performance comparison for the various cloud providers. This can aid in decision making with regards to which cloud service provider to procure based on the desired performance.
... The testing architecture used in the present study is presented in Fig. 1. For the cloud approach, the selection process considers several options from existing alternatives, but finally Microsoft Azure technology was chosen because it allows using the online portal for the management of all the services that we want to use [18]. The proposed testing architecture implies also the development of a Universal Windows Platform (UWP) testing application capable to work with the database through an API, both in the cloud and on-premises. ...
Article
Full-text available
This paper presents a comparative study between on premises databases and cloud databases regarding the response time of database. It focuses on presenting the advantages of storing data and applications in cloud and, of course, managing it in comparison with managing same data and applications locally on one or more physical machines. A Microsoft Azure account was created to manage the database that is stored in the cloud. To achieve comparative results, a specific testing architecture that uses a Universal Windows Platform app was created and used. The application is running locally on multiple physical machines and works with that database to extract data, operate and upload new data. For local tests, the database was stored locally on a server, with and without replication, and for cloud tests, it was stored into a server in Central US. The study provides a practical approach that could be used for examining the performance of basic database operations when dealing with different number of user situations. As a result of tests carried out, we will highlight the many advantages of cloud data storage, like data accessibility, speed, security, automation or disaster recovery and we will also try to offer an answer to the most common and important question: “Why cloud?”.
... 3. the application of new technologies that lead to demand for novel services (wireless/mobile networking, cloud computing, networking as a service etc.) [14][15][16][17][18][19]. The complexity in several [21,22] virtual network implementations will obviously be increased, resulting in impediments in the assurance of quality of service, on an end-to-end basis, unless some standardization approach is applied. Cisco Systems projects that thirty seven billion intelligent devices (some of peculiar nature, e.g. ...
Article
Full-text available
The virtualization concept along with its underlying technologies has been warmly adopted in many fields of computer science. In this direction, network virtualization research has presented considerable results. In a parallel development, the convergence of two distinct worlds, communications and computing, has increased the use of computing server resources (virtual machines and hypervisors acting as active network elements) in network implementations. As a result, the level of detail and complexity in such architectures has increased and new challenges need to be taken into account for effective network management. Information and data models facilitate infrastructure representation and management and have been used extensively in that direction. In this paper we survey available modelling approaches and discuss how these can be used in the virtual machine (host) based computer network landscape; we present a qualitative analysis of the current state-of-the-art and offer a set of recommendations on adopting any particular method.
Conference Paper
Vehicular traffic has become an important research area because of its specific features and applications as road safety and efficient traffic management. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased geographical monitoring. Hence, several technologies have been deployed to and promote Vehicular traffic management. [1] Recently, various innovative technologies have transformed the connection of the man and map it to an advanced level. And many efforts have made to upgrade Geographic Information Systems (GIS) and their applications in order to improve decision making, deliver better service, and reduce operating costs. [1][2] "Cloud computing" a term which has become popular in recent years, has appeared as technologies by its focus on large-scale asset sharing and reduced cost for large-scale data storage technology to be applied to solve and overcome the challenges in GIS applications for a variety of purposes including flood defense planning, healthcare and especially for the traffic management [3]. In this paper, a brief evaluation of Cloud Computing approach to GIS is presented and architecture for GIS Cloud System for Vehicular traffic management is proposed.