Cloud computing concepts have evolved since the 1950s with early concepts like remote job entry (RJE). The cloud symbol emerged in the 1970s to represent computing networks. In the 1990s, virtual private networks provided cloud-like services at lower costs. The term "cloud computing" arose in the late 1990s and cloud services became popular in the mid-2000s with Amazon's EC2 launch. Major tech companies like Microsoft, IBM, and Oracle now offer cloud computing platforms and services.
Cloud computing is a general term for network-based computing that takes place over the Internet. It provides on-demand access to shared pools of configurable computing resources like networks, servers, storage, applications, and services. Key characteristics include pay-as-you-go pricing, ubiquitous network access, resource pooling, rapid elasticity, and measured service. Common cloud service models are SaaS, PaaS, and IaaS. While cloud computing provides opportunities to reduce costs and access services from anywhere, challenges relate to security, control, and dependence on third parties.
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
This proposal recommends implementing cloud computing for a newspaper company's management information system using Microsoft Azure's infrastructure as a service (IaaS) public cloud model. It analyzes cloud computing and virtualization concepts. The strategy is to move backup storage to the cloud, virtualize staff/management PCs for improved security, and implement the Azure cloud to cut costs by 50% compared to current on-premise infrastructure expenses. Virtualizing access through the cloud will strengthen security while taking advantage of Azure's competitive pricing and 30-day free trial.
Cloud computing allows users to access computing resources like data and applications over the Internet. It provides scalable resources that can be accessed from any device with an Internet connection. Linux is an open-source operating system that runs on many hardware platforms and provides features like multi-user support and a graphical user interface. Cloud computing models include Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Popular cloud providers like Amazon Web Services offer computing resources, storage, databases, and other functionality over the Internet.
Cloud computing is a general term for network-based computing that takes place over the Internet. It provides on-demand access to shared pools of configurable computing resources like networks, servers, storage, applications, and services. Key characteristics include elasticity, ubiquitous network access, and pay-per-use pricing. Some advantages include lower costs, universal access, automatic updates, and unlimited storage. However, it also requires a constant Internet connection and raises security and data loss concerns.
Lecture #6 - ET-3010
Cloud Computing - Overview and Examples
Connected Services and Cloud Computing
School of Electrical Engineering and Informatics SEEI / STEI
Institut Teknologi Bandung ITB
Update April 2017
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Common cloud computing service models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).
Cloud computing provides on-demand access to shared computing resources like servers, storage, databases, networking, software, analytics and more over the Internet. It delivers these resources as standardized services in three main forms: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud computing evolved from grid computing and combines technologies like virtualization, utility computing, and automatic computing. It offers advantages like lower costs, flexibility, scalability and mobility compared to traditional computing but also has disadvantages around internet dependence and vendor lock-in.
Cloud computing is a general term for internet-based computing where shared servers provide resources, software, and data to computers and other devices on demand. It provides hardware, software, storage, and networking services via the internet. Users can access cloud-based applications rather than installing them locally. Key advantages include lower costs, flexibility and scalability, universal access, collaboration capabilities, and automatic software updates. However, cloud computing also requires a constant internet connection and poses security, control and performance risks for users.
Cloud computing is a general term for internet-based computing that takes place over the internet. It involves delivering hosted services like storage, databases, software, analytics and more via third-party data centers. Key characteristics include pay-as-you-go pricing, ubiquitous network access, resource pooling and rapid elasticity. The main advantages are lower costs, improved performance, unlimited storage and easier collaboration. However, it requires a constant internet connection and stored data may not be fully secure.
Cloud computing refers to storing and accessing data and programs over the Internet instead of a local computer's hard drive. It offers on-demand access to a shared pool of configurable computing resources like networks, servers, storage, applications and services. Users can scale resources up or down depending on their needs. Some key benefits include lower costs, mobility, scalability and redundancy of data. However, issues around security, control and reliability need to be addressed for widespread adoption of cloud computing.
Cloud computing refers to storing and accessing data and programs over the Internet instead of a local computer's hard drive. It offers on-demand access to a shared pool of configurable computing resources like networks, servers, storage, applications and services. Users can scale resources up or down depending on their needs. Cloud services provide easy access from anywhere via a web browser while automatically handling maintenance and updates behind the scenes. While cloud computing offers opportunities to reduce costs and improve access through economies of scale, it also raises security, control and reliability concerns that need to be addressed.
Cloud computing refers to storing and accessing data and programs over the Internet instead of a local computer's hard drive. It offers on-demand access to a shared pool of configurable computing resources like networks, servers, storage, applications and services. Key benefits include lower upfront costs, flexibility, scalability and ubiquitous access. However, challenges relate to security, control over data and dependence on third party providers.
Cloud computing is a model for delivering computing capabilities as services over the network on an as-needed basis. It involves centrally hosted resources that are accessible via the internet. There are various deployment models including public, private, community and hybrid clouds. Resources are delivered through common models of software as a service, platform as a service, and infrastructure as a service. Key attributes include massive infrastructure, utility computing, pay-per-usage, elasticity, and accessibility via the internet.
Cloud computing allows users to access applications, data storage, and other computing resources over the internet. It offers various services like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). There are different types of cloud models including public, private, hybrid, and community clouds that are deployed based on an organization's needs and security requirements. Cloud computing provides benefits like scalability, cost savings, and mobility by reducing the need for organizations to maintain their own on-site IT infrastructure.
The document provides an overview of cloud architecture, services, and storage. It defines cloud architecture as the components and relationships between databases, software, applications, and other resources leveraged to solve business problems. The main components are on-premise resources, cloud resources, software/services, and middleware. Three common cloud service models are also defined - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Amazon Simple Storage Service (S3) is discussed as a cloud storage service that stores unlimited data in buckets with fine-grained access controls and analytics capabilities.
This document provides an overview of cloud computing, including:
- Cloud computing uses central remote servers and the internet to maintain data and applications, allowing users to access files and applications from any device.
- The main advantages of cloud computing are more efficient computing through centralized resources, lower costs, flexibility, and scalability.
- The types of cloud include public, private, and hybrid clouds, with the main difference being who can access the services.
- Cloud computing delivers applications, platforms, and infrastructure as on-demand services through software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) models.
- The author
Access security on cloud computing implemented in hadoop systemJoão Gabriel Lima
This document summarizes a research paper on implementing access security on a Hadoop cloud computing system using fingerprint identification and face recognition. The researchers built a Hadoop cloud computing system connected to mobile and thin client devices over wired and wireless networks. They used fingerprint and face recognition for rapid user identification and verification on the cloud system within 2.2 seconds. The goal was to evaluate the effectiveness and efficiency of access security on the Hadoop cloud computing platform.
Cloud computing provides on-demand access to scalable IT resources and applications via the internet. It delivers compute power, storage, databases, networking, software, analytics and more as services. There are three main types of cloud services - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides virtualized servers and storage, PaaS provides development tools and environments, and SaaS provides software applications delivered via the internet. Cloud computing offers advantages like lower costs, improved performance, reduced software costs, automatic updates, and unlimited storage.
Cloud computing provides on-demand access to shared computing resources like servers, storage, databases, networking, software and analytics over the internet. It delivers these resources as scalable services in three main categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Cloud computing offers advantages like lower costs, improved performance, unlimited storage and collaboration capabilities compared to traditional computing but requires a constant internet connection to access resources.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services available over the internet. It has its origins in the 1960s and the term "cloud" was used to depict the demarcation point between the service provider's responsibility and the user's responsibility. There are various cloud service models like SaaS, PaaS and IaaS. Major players investing heavily in cloud computing include Amazon, Microsoft, Google, IBM, Apple etc. Cloud computing has huge potential in India given its large population and rapid urbanization. However, concerns around security and reliability need to be addressed for it to be widely adopted.
In tube drawing process, a tube is pulled out through a die and a plug to reduce its diameter and thickness as per the requirement. Dimensional accuracy of cold drawn tubes plays a vital role in the further quality of end products and controlling rejection in manufacturing processes of these end products. Springback phenomenon is the elastic strain recovery after removal of forming loads, causes geometrical inaccuracies in drawn tubes. Further, this leads to difficulty in achieving close dimensional tolerances. In the present work springback of EN 8 D tube material is studied for various cold drawing parameters. The process parameters in this work include die semi-angle, land width and drawing speed. The experimentation is done using Taguchi’s L36 orthogonal array, and then optimization is done in data analysis software Minitab 17. The results of ANOVA shows that 15 degrees die semi-angle,5 mm land width and 6 m/min drawing speed yields least springback. Furthermore, optimization algorithms named Particle Swarm Optimization (PSO), Simulated Annealing (SA) and Genetic Algorithm (GA) are applied which shows that 15 degrees die semi-angle, 10 mm land width and 8 m/min drawing speed results in minimal springback with almost 10.5 % improvement. Finally, the results of experimentation are validated with Finite Element Analysis technique using ANSYS.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Common cloud computing service models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).
Cloud computing provides on-demand access to shared computing resources like servers, storage, databases, networking, software, analytics and more over the Internet. It delivers these resources as standardized services in three main forms: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud computing evolved from grid computing and combines technologies like virtualization, utility computing, and automatic computing. It offers advantages like lower costs, flexibility, scalability and mobility compared to traditional computing but also has disadvantages around internet dependence and vendor lock-in.
Cloud computing is a general term for internet-based computing where shared servers provide resources, software, and data to computers and other devices on demand. It provides hardware, software, storage, and networking services via the internet. Users can access cloud-based applications rather than installing them locally. Key advantages include lower costs, flexibility and scalability, universal access, collaboration capabilities, and automatic software updates. However, cloud computing also requires a constant internet connection and poses security, control and performance risks for users.
Cloud computing is a general term for internet-based computing that takes place over the internet. It involves delivering hosted services like storage, databases, software, analytics and more via third-party data centers. Key characteristics include pay-as-you-go pricing, ubiquitous network access, resource pooling and rapid elasticity. The main advantages are lower costs, improved performance, unlimited storage and easier collaboration. However, it requires a constant internet connection and stored data may not be fully secure.
Cloud computing refers to storing and accessing data and programs over the Internet instead of a local computer's hard drive. It offers on-demand access to a shared pool of configurable computing resources like networks, servers, storage, applications and services. Users can scale resources up or down depending on their needs. Some key benefits include lower costs, mobility, scalability and redundancy of data. However, issues around security, control and reliability need to be addressed for widespread adoption of cloud computing.
Cloud computing refers to storing and accessing data and programs over the Internet instead of a local computer's hard drive. It offers on-demand access to a shared pool of configurable computing resources like networks, servers, storage, applications and services. Users can scale resources up or down depending on their needs. Cloud services provide easy access from anywhere via a web browser while automatically handling maintenance and updates behind the scenes. While cloud computing offers opportunities to reduce costs and improve access through economies of scale, it also raises security, control and reliability concerns that need to be addressed.
Cloud computing refers to storing and accessing data and programs over the Internet instead of a local computer's hard drive. It offers on-demand access to a shared pool of configurable computing resources like networks, servers, storage, applications and services. Key benefits include lower upfront costs, flexibility, scalability and ubiquitous access. However, challenges relate to security, control over data and dependence on third party providers.
Cloud computing is a model for delivering computing capabilities as services over the network on an as-needed basis. It involves centrally hosted resources that are accessible via the internet. There are various deployment models including public, private, community and hybrid clouds. Resources are delivered through common models of software as a service, platform as a service, and infrastructure as a service. Key attributes include massive infrastructure, utility computing, pay-per-usage, elasticity, and accessibility via the internet.
Cloud computing allows users to access applications, data storage, and other computing resources over the internet. It offers various services like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). There are different types of cloud models including public, private, hybrid, and community clouds that are deployed based on an organization's needs and security requirements. Cloud computing provides benefits like scalability, cost savings, and mobility by reducing the need for organizations to maintain their own on-site IT infrastructure.
The document provides an overview of cloud architecture, services, and storage. It defines cloud architecture as the components and relationships between databases, software, applications, and other resources leveraged to solve business problems. The main components are on-premise resources, cloud resources, software/services, and middleware. Three common cloud service models are also defined - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Amazon Simple Storage Service (S3) is discussed as a cloud storage service that stores unlimited data in buckets with fine-grained access controls and analytics capabilities.
This document provides an overview of cloud computing, including:
- Cloud computing uses central remote servers and the internet to maintain data and applications, allowing users to access files and applications from any device.
- The main advantages of cloud computing are more efficient computing through centralized resources, lower costs, flexibility, and scalability.
- The types of cloud include public, private, and hybrid clouds, with the main difference being who can access the services.
- Cloud computing delivers applications, platforms, and infrastructure as on-demand services through software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) models.
- The author
Access security on cloud computing implemented in hadoop systemJoão Gabriel Lima
This document summarizes a research paper on implementing access security on a Hadoop cloud computing system using fingerprint identification and face recognition. The researchers built a Hadoop cloud computing system connected to mobile and thin client devices over wired and wireless networks. They used fingerprint and face recognition for rapid user identification and verification on the cloud system within 2.2 seconds. The goal was to evaluate the effectiveness and efficiency of access security on the Hadoop cloud computing platform.
Cloud computing provides on-demand access to scalable IT resources and applications via the internet. It delivers compute power, storage, databases, networking, software, analytics and more as services. There are three main types of cloud services - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides virtualized servers and storage, PaaS provides development tools and environments, and SaaS provides software applications delivered via the internet. Cloud computing offers advantages like lower costs, improved performance, reduced software costs, automatic updates, and unlimited storage.
Cloud computing provides on-demand access to shared computing resources like servers, storage, databases, networking, software and analytics over the internet. It delivers these resources as scalable services in three main categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Cloud computing offers advantages like lower costs, improved performance, unlimited storage and collaboration capabilities compared to traditional computing but requires a constant internet connection to access resources.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services available over the internet. It has its origins in the 1960s and the term "cloud" was used to depict the demarcation point between the service provider's responsibility and the user's responsibility. There are various cloud service models like SaaS, PaaS and IaaS. Major players investing heavily in cloud computing include Amazon, Microsoft, Google, IBM, Apple etc. Cloud computing has huge potential in India given its large population and rapid urbanization. However, concerns around security and reliability need to be addressed for it to be widely adopted.
In tube drawing process, a tube is pulled out through a die and a plug to reduce its diameter and thickness as per the requirement. Dimensional accuracy of cold drawn tubes plays a vital role in the further quality of end products and controlling rejection in manufacturing processes of these end products. Springback phenomenon is the elastic strain recovery after removal of forming loads, causes geometrical inaccuracies in drawn tubes. Further, this leads to difficulty in achieving close dimensional tolerances. In the present work springback of EN 8 D tube material is studied for various cold drawing parameters. The process parameters in this work include die semi-angle, land width and drawing speed. The experimentation is done using Taguchi’s L36 orthogonal array, and then optimization is done in data analysis software Minitab 17. The results of ANOVA shows that 15 degrees die semi-angle,5 mm land width and 6 m/min drawing speed yields least springback. Furthermore, optimization algorithms named Particle Swarm Optimization (PSO), Simulated Annealing (SA) and Genetic Algorithm (GA) are applied which shows that 15 degrees die semi-angle, 10 mm land width and 8 m/min drawing speed results in minimal springback with almost 10.5 % improvement. Finally, the results of experimentation are validated with Finite Element Analysis technique using ANSYS.
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...Infopitaara
A Boiler Feed Pump (BFP) is a critical component in thermal power plants. It supplies high-pressure water (feedwater) to the boiler, ensuring continuous steam generation.
⚙️ How a Boiler Feed Pump Works
Water Collection:
Feedwater is collected from the deaerator or feedwater tank.
Pressurization:
The pump increases water pressure using multiple impellers/stages in centrifugal types.
Discharge to Boiler:
Pressurized water is then supplied to the boiler drum or economizer section, depending on design.
🌀 Types of Boiler Feed Pumps
Centrifugal Pumps (most common):
Multistage for higher pressure.
Used in large thermal power stations.
Positive Displacement Pumps (less common):
For smaller or specific applications.
Precise flow control but less efficient for large volumes.
🛠️ Key Operations and Controls
Recirculation Line: Protects the pump from overheating at low flow.
Throttle Valve: Regulates flow based on boiler demand.
Control System: Often automated via DCS/PLC for variable load conditions.
Sealing & Cooling Systems: Prevent leakage and maintain pump health.
⚠️ Common BFP Issues
Cavitation due to low NPSH (Net Positive Suction Head).
Seal or bearing failure.
Overheating from improper flow or recirculation.
Concept of Problem Solving, Introduction to Algorithms, Characteristics of Algorithms, Introduction to Data Structure, Data Structure Classification (Linear and Non-linear, Static and Dynamic, Persistent and Ephemeral data structures), Time complexity and Space complexity, Asymptotic Notation - The Big-O, Omega and Theta notation, Algorithmic upper bounds, lower bounds, Best, Worst and Average case analysis of an Algorithm, Abstract Data Types (ADT)
We introduce the Gaussian process (GP) modeling module developed within the UQLab software framework. The novel design of the GP-module aims at providing seamless integration of GP modeling into any uncertainty quantification workflow, as well as a standalone surrogate modeling tool. We first briefly present the key mathematical tools on the basis of GP modeling (a.k.a. Kriging), as well as the associated theoretical and computational framework. We then provide an extensive overview of the available features of the software and demonstrate its flexibility and user-friendliness. Finally, we showcase the usage and the performance of the software on several applications borrowed from different fields of engineering. These include a basic surrogate of a well-known analytical benchmark function; a hierarchical Kriging example applied to wind turbine aero-servo-elastic simulations and a more complex geotechnical example that requires a non-stationary, user-defined correlation function. The GP-module, like the rest of the scientific code that is shipped with UQLab, is open source (BSD license).
Value Stream Mapping Worskshops for Intelligent Continuous SecurityMarc Hornbeek
This presentation provides detailed guidance and tools for conducting Current State and Future State Value Stream Mapping workshops for Intelligent Continuous Security.
its all about Artificial Intelligence(Ai) and Machine Learning and not on advanced level you can study before the exam or can check for some information on Ai for project
This paper proposes a shoulder inverse kinematics (IK) technique. Shoulder complex is comprised of the sternum, clavicle, ribs, scapula, humerus, and four joints.
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfMohamedAbdelkader115
Glad to be one of only 14 members inside Kuwait to hold this credential.
Please check the members inside kuwait from this link:
https://www.rics.org/networking/find-a-member.html?firstname=&lastname=&town=&country=Kuwait&member_grade=(AssocRICS)&expert_witness=&accrediation=&page=1
2. Evolution of Cloud Computing
●Cloud computing is a natural evolution of the widespread adoption of
virtualization, service-oriented architecture, autonomic (self-managing
characteristics of distributed computing resources), and utility computing
●The underlying concept of cloud computing dates back to the 1960s, when
John McCarthy opined that "computation may someday be organized as a
public utility."
●Around 2006, Amazon played a key role in the development of cloud
computing by modernizing their data centers, which, like most
computer networks, were using as little as 10% of their capacity at any one
time, just to leave room for occasional spikes.
●In early 2008, efforts were focused on providing QoS guarantees (as
required by real-time interactive applications) to cloud-based
infrastructures, in the framework of the IRMOS European Commission-
funded project.
3. Layers in Cloud Computing
Client
A cloud client consists of computer hardware and/or computer software that relies on cloud computing
for application delivery and that is in essence useless without it. Examples include some computers,
phones and other devices, operating systems, and browsers
Application
Cloud application services or "Software as a Service (SaaS)" deliver software as a service over the
Internet, eliminating the need to install and run the application on the customer's own computers and
simplifying maintenance and support.
Platform
Cloud platform services, also known as Platform as a service (PaaS), deliver a computing platform
and/or solution stack as a service, often consuming cloud infrastructure and sustaining cloud
applications. It facilitates deployment of applications without the cost and complexity of buying and
managing the underlying hardware and software layers.
4. Layers in Cloud Computing
Infrastructure
Cloud infrastructure services, also known as "infrastructure as a service" (IaaS), deliver computer
infrastructure – typically a platform virtualization environment – as a service, along with raw (block)
storage and networking. Rather than purchasing servers, software, data-center space or network
equipment, clients instead buy those resources as a fully outsourced service. Suppliers typically bill such
services on a utility computing basis; the amount of resources consumed (and therefore the cost)
will typically reflect the level of activity.[35]
Server
The servers layer consists of computer hardware and/or computer software products that are specifically
designed for the delivery of cloud services, including multi-core processors, cloud-specific operating
systems and combined offerings.
5. Flavors of Cloud Computing
●Cloud Computing
●SAAS - Service As A Service
●PAAS - Platform As A Service
●IAAS - Infrastructure As A Service
●IAAS - Identity As A Service
●CAAS - Compliance-as-a-Service
●SecAAS - Security As A Service
6. Cloud Computing
●Why is this required?
●Role of Virtualization (Native Hypervisor)
●Evolution from Clusters
●Comparison with Grid Computing, Distributed
Computing, Ubiquitous Computing
7. SaaS Architecture Maturity Model
●Level 0 (Chaos); Every time you add a new customer, you add a new instance of the software.
●Level 1 (Managed Chaos): Every customer runs on the same version of the software and any
customizations are done via configuration.
●Level 2 (Multi-Tenant, Highrise): You've got all customers running on a single version of the
software, and they're all running essentially on one "instance".
●Level 3 (Multi-Tenant, Build-Out): This is when you've got multi-tenant, single version of the
software model. But, you can scale-out (add buildings at will).
●Level 4 (Utopia): This is like Level 3, except you've figured out an efficient way to run different
versions of the software on different "instances".
According to a Gartner Group estimate, SaaS sales in 2010 reached $10B, and are projected to increase
to $12.1B by end of 2011
www.cnergyis.com/ESSV3 is an example of SAAS.
8. Platform As A Service
●Platform as a service (PaaS) is the delivery of a computing platform and solution stack as a service.
●An outgrowth of the SaaS application delivery model.
Types of PAAS:
Add-on development facilities
These facilities allow customization of existing software-as-a-service (SaaS) applications. Often
these require PaaS developers and their users to purchase subscriptions to the co-resident SaaS
application.
Stand alone development environments
Stand-alone PaaS environments do not include technical, licensing or financial dependencies on
specific SaaS applications or web services, and are intended to provide a generalized
development environment.
Application delivery-only environments
Some PaaS offerings lack development, debugging and test capabilities, and provide only
9. IAAS
● Typically a platform virtualization environment
● Provides raw (block) storage and networking
Apache Hadoop is an example of IAAS
●It enables applications to work with thousands of nodes and petabytes of data.
●Hadoop was inspired by Google's MapReduce and Google File System (GFS) papers.
Prominent Users
Yahoo!
On February 19, 2008, Yahoo! Inc. launched what it claimed was the world's largest Hadoop production
application. The Yahoo! Search Webmap is a Hadoop application that runs on more than 10,000 core Linux
cluster and produces data that is now used in every Yahoo! Web search query.
On June 10, 2009, Yahoo! made available the source code to the version of Hadoop it runs in
production. Yahoo! contributes back all work it does on Hadoop to the open-source community
Facebook
In the year 2010 Facebook claimed that they have the largest Hadoop cluster in the world with 21 PB of
storage. On July 27, 2011 they announced the data has grown to 30 PB.
10. Federation
Federation differs from peering, which requires a prior agreement
between parties before a server-to-server (S2S) link can be established
Technically speaking, federation is the ability for two XMPP servers in different
domains to exchange XML stanzas
Permissive federation
Server accepts a connection from a peer network server without verifying its identity using
DNS lookups or certificate checking.
Verified federation
Default service policy on the open XMPP since the release of the open-source
jabberd 1.2 server
Encrypted federation
Peer should supports Transport Layer Security (TLS)
Trusted federation.
Here, a server accepts a connection from a peer only under the stipulation that the peer
supports TLS and the peer can present a digital certificate issued by a root
certification authority (CA) that is trusted by the authenticating server.
11. Federation
●A notable research project being conducted by Microsoft, called the Geneva
Framework, focuses on issues involved in cloud federation.
●Multiple providers to interact seamlessly with others.
●Enables developers to incorporate various authentication models that will work with
any corporate identity system, including Active Directory, LDAPv3-based directories
●Internet Engineering Task Force (IETF) standard Extensible Messaging and
Presence Protocol (XMPP) and interdomain federation using the Jabber Extensible
Communications Platform (Jabber XCP)
●Potential Users: The U.S. Marines Corps, The Defense Information Systems Agency
(DISA), The U.S. Joint Forces Command (USJFCOM), and the National Weather
Service.
12. XMPP (also called Jabber)
●SOAP (Simple Object Access Protocol) and a few other
assorted HTTP-based protocols, are all one-way information
exchanges
●XMPP’s profile has been steadily gaining since its inception
as the protocol behind the open source instant messenger
(IM) server jabberd in 1998.
●XMPP is a good fit for cloud computing because it allows for
easy two way communication
●Eliminates the need for polling
●Rich publish - subscribe (pub-sub) functionality built in.
13. Presence in the Cloud
●Presence is an enabling technology for peer-to-peer
interaction
●Implementation of presence follows the software design
pattern known as publish-and-subscribe (pub-sub)
●Digital identity refers to the traits, attributes, and preferences
on which one may receive personalized services
●Consists of : identity, location, and presence
●Identity-as-a-Service (IaaS)
15. Homomorphic Encryption
Partially homomorphic cryptosystems
Unpadded RSA
If the RSA public key is modulus m and exponent e, then the encryption of a message x is
given by . The homomorphic property is then
ElGamal
In the ElGamal cryptosystem, in a group G, if the public key is (G,q,g,h), where h = gx
,
and x is the secret key, then the encryption of a message m is , for some . The
homomorphic property is then
Full homomorphic cryptosystems
A cryptosystem which supports both addition and multiplication is known as fully
homomorphic encryption (FHE) and is far more powerful.
Craig Gentry using lattice-based cryptography showed the first fully homomorphic encryption scheme as
16. Garbled Circuits (GC)
By Andy Yao in 1986 for Secure multiparty computation
Bob creates a "garbled circuit", and sends the circuit to Alice.
Alice evaluates the circuit with her inputs and returns the result to Bob.
The result of the circuit evaluation with Alice's inputs is the output of the function Alice and Bob wish to compute.
17. Secure and Practical Outsourcing of Linear Programming in
Cloud Computing
In this framework, the process on cloud server can be represented by algorithm ProofGen
and the process on customer can be organized into three algorithms (KeyGen, ProbEnc,
ResultDec). These four algorithms are summarized below and will be instantiated later.
• KeyGen(1k) → {K}. This is a randomized key generation algorithm which takes a system
security parameter k, and returns a secret key K that is used later by customer to encrypt
the target LP problem.
• ProbEnc(K,) → {K}. This algorithm encrypts the input tuple into K with the secret key K.
According to problem transformation, the encrypted input K has the same form as , and thus
defines the problem to be solved in the cloud.
• ProofGen(K) → {(y, )}. This algorithm augments a generic solver that solves the problem
K to produce both the output y and a proof . The output y later decrypts to x, and is used
later by the customer to verify the correctness of y or x.
• ResultDec(K,, y, ) → {x,⊥ }. This algorithm may choose to verify either y or x via the
⊥
proof
. In any case, a correct output x is produced by decrypting y using the secret K. The
algorithm outputs when the validation fails, indicating the cloud server was not performing
⊥
the computation faithfully.
18. Twin Clouds: An Architecture for Secure Cloud Computing
●The security-critical operations are performed by the Trusted Cloud in a Setup Phase
●High loads of queries can be processed on-demand by the Commodity Cloud.
●The Trusted Cloud is used mostly in the Setup Phase to encrypt the outsourced
data and programs using Yao's garbled circuits which requires only
symmetric cryptographic operations and only a constant amount of memory
●in the Query Phase, the computations on the encrypted data are performed in
parallel by the fast but untrusted Commodity Cloud, and finally veried by the Trusted
Cloud.
19. Practical Problems of Cloud faced by
Developers
●Mount points for logs to be written.
●Mount points for resources to be read.
●Tracing the server which received the request.
●Deployment configuration required.
●Change Management.