• Title/Summary/Keyword: Science Cloud

Search Result 1,597, Processing Time 0.023 seconds

Task Scheduling on Cloudlet in Mobile Cloud Computing with Load Balancing

  • Poonam;Suman Sangwan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.73-80
    • /
    • 2023
  • The recent growth in the use of mobile devices has contributed to increased computing and storage requirements. Cloud computing has been used over the past decade to cater to computational and storage needs over the internet. However, the use of various mobile applications like Augmented Reality (AR), M2M Communications, V2X Communications, and the Internet of Things (IoT) led to the emergence of mobile cloud computing (MCC). All data from mobile devices is offloaded and computed on the cloud, removing all limitations incorporated with mobile devices. However, delays induced by the location of data centers led to the birth of edge computing technologies. In this paper, we discuss one of the edge computing technologies, i.e., cloudlet. Cloudlet brings the cloud close to the end-user leading to reduced delay and response time. An algorithm is proposed for scheduling tasks on cloudlet by considering VM's load. Simulation results indicate that the proposed algorithm provides 12% and 29% improvement over EMACS and QRR while balancing the load.

A Progressive Rendering Method to Enhance the Resolution of Point Cloud Contents (포인트 클라우드 콘텐츠 해상도 향상을 위한 점진적 렌더링 방법)

  • Lee, Heejea;Yun, Junyoung;Kim, Jongwook;Kim, Chanhee;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.26 no.3
    • /
    • pp.258-268
    • /
    • 2021
  • Point cloud content is immersive content that represents real-world objects with three-dimensional (3D) points. In the process of acquiring point cloud data or encoding and decoding point cloud data, the resolution of point cloud content could be degraded. In this paper, we propose a method of progressively enhancing the resolution of sequential point cloud contents through inter-frame registration. To register a point cloud, the iterative closest point (ICP) algorithm is commonly used. Existing ICP algorithms can transform rigid bodies, but there is a disadvantage that transformation is not possible for non-rigid bodies having motion vectors in different directions locally, such as point cloud content. We overcome the limitations of the existing ICP-based method by registering regions with motion vectors in different directions locally between the point cloud content of the current frame and the previous frame. In this manner, the resolution of the point cloud content with geometric movement is enhanced through the process of registering points between frames. We provide four different point cloud content that has been enhanced with our method in the experiment.

An Exhaustive Review on Security Issues in Cloud Computing

  • Fatima, Shahin;Ahmad, Shish
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3219-3237
    • /
    • 2019
  • The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get. Various "Cloud Service Provider" such as Microsoft Azure, Google Web Services etc. enables the users to access the cloud in cost effective manner. However, security, privacy and integrity of data is a major concern. In this paper various security challenges have been identified and the survey briefs the comprehensive overview of various security issues in cloud computing. The classification of security issues in cloud computing have been studied. In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.

AKARI OBSERVATIONS OF MASSIVE STAR-FORMING REGIONS INDICATIVE OF LARGE-SCALE CLOUD-CLOUD COLLISIONS

  • Hattori, Yasuki;Kaneda, Hidehiro;Ishihara, Daisuke;Yamagishi, Mitsuyoshi;Kondo, Toru;Sano, Hidetoshi
    • Publications of The Korean Astronomical Society
    • /
    • v.32 no.1
    • /
    • pp.123-125
    • /
    • 2017
  • We present our AKARI study of massive star forming regions where a large-scale cloud-cloud collision possibly contributes to massive star formation. Our targets are Spitzer bubbles, which consist of two types of bubbles, closed and broken ones; the latter is a candidate of the objects created by cloud-cloud collisions. We performed mid- and far-infrared surface photometry toward Spitzer bubbles to obtain the relationship between the total infrared luminosity, $L_{IR}$, and the bubble radius, R. As a result, we find that $L_{IR}$ is roughly proportional to $R^{\beta}$ where ${\beta}=2.1{\pm}0.4$. Broken bubbles tend to have larger radii than closed bubbles for the same $L_{IR}$.

A New Conceptual Framework for Designing Cloud Computing Business Model (클라우드 컴퓨팅 비즈니스 모델 개발을 위한 프레임워크 설계)

  • Lee, Young-Ho;Park, Ji-Ae
    • Korean Management Science Review
    • /
    • v.28 no.1
    • /
    • pp.11-24
    • /
    • 2011
  • In this paper, we develop a new conceptual framework for finding new business opportunities in the cloud computing environment. We propose a service model framework for cloud computing business. In the service concept of the proposed business model, we categorize customer needs and service offering value, while we analyze customer behavior for developing revenue model. In addition, we analyze cloud computing market drivers for finding an evolution path of the proposed business model. Finally, we develop cloud computing business strategies for Korean IT service industry.

The Impact of Interaction between Cloud and Longwave Radiation on the Asian Monsoon Circulation (구름-장파복사 상호작용이 아시아 몬순에 미치는 영향)

  • Ryu, Geun-Hyeok;Sohn, Byung-Ju
    • Journal of the Korean earth science society
    • /
    • v.30 no.1
    • /
    • pp.58-68
    • /
    • 2009
  • Three-dimensional distributions of longwave radiation flux for the April-September 1998 period are generated from radiative transfer calculations using the GEWEX Asian Monsoon Experiment (GAME) reanalysis temperature and humidity profiles and International Satellite Cloud Climatology Project (ISCCP) cloudiness as inputs to understand the effect of cloud radiative forcing in the monsoon season. By subtracting the heating of the clear atmosphere from the cloudy radiative heating, cloud-induced atmospheric radiative heating has been obtained. Emphasis is placed on the impact of horizontal gradients of the cloud-generated radiative heating on the Asian monsoon. Cloud-induced heating exhibits its maximum heating areas within the Indian Ocean and minimum heating over the Tibetan Plateau, which establishes the north-south oriented differential heating gradient. Considering that the differential heating is a ultimate source generating the atmospheric circulation, the cloud-induced heating gradient established between the Indian Ocean and the Plateau can enhance the strength of the north-south Hadley-type monsoon circulation. Cooling at cloud top and warming at cloud bottom, which are the vertical distributions of cloud-induced heating, can exert on the monsoon circulation by altering the atmospheric stability.

A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing

  • Guo, Liangmin;Luo, Yonglong;He, Xiaokang;Hu, Guiyin;Dong, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.1820-1840
    • /
    • 2017
  • Aiming at the phenomenon of false information issued by service providers in cloud computing environment, a method for service evaluation based on fuzzy theory is put forward in this paper. According to the quality of services provided by cloud service providers and their behavior during interactions, a trust relationship between cloud service providers and cloud service consumers is established, which can be quantified by using fuzzy theory. The quality of services is evaluated by drawing on the trust relationship. In our method, the recommendation credibility of a cloud service consumer is determined through behavior similarity with evaluators and a praise factor. The introduction of the praise factor better suits the phenomenon of a high-quality service getting more repeat customers. The negative impact of dishonest customers is reduced, and the accuracy of trust and cloud service quality evaluation is improved by introducing a confidence factor that can be dynamically adjusted. The experimental results show that our method can effectively and accurately evaluate the trust value and service quality of providers, while weakening the influence of dishonest consumers, and quickly detect dishonest service providers. This is beneficial for consumers trying to find high quality service providers for similar services.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

Cloud-Based Accounting Adoption in Jordanian Financial Sector

  • ELDALABEEH, Abdel Rahman;AL-SHBAIL, Mohannad Obeid;ALMUIET, Mohammad Zayed;BANY BAKER, Mohammad;E'LEIMAT, Dheifallah
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.833-849
    • /
    • 2021
  • Cloud accounting represents a new area of accounting information systems. Past research has often focused on accounting information systems and its antecedents, rather than factors that adopt cloud accounting system. The purpose of this paper is to explain the factors that influence the adoption of cloud accounting in the financial sectors. This paper applied the technology acceptance model (TAM), technology-organization-environment, and the De Lone and Mc Lean model, coupled with proposed factors relevant to cloud accounting. The proposed model was empirically evaluated using survey data from 187 managers (financial managers, IT department managers, audit managers, heads of accounting departments, and head of internal control departments) in Jordanian bank branches. Based on the SEM results, top management support, organizational competency, service quality, system quality, perceived usefulness, and perceived ease of use had a positive relationship with the intention of using cloud accounting. Cloud accounting adoption positively affected cloud accounting usage. This paper contributes to a theoretical understanding of factors that activate the adoption of cloud accounting. For financial firms in general the results enable them to better develop cloud accounting framework. The paper verifies the factors that affect the adoption of cloud accounting and the proposed cloud accounting model.