unabridged collation about multifarious computing methods and outreaching cloud computing based on...
TRANSCRIPT
-
7/31/2019 Unabridged collation about multifarious computing methods and outreaching cloud computing based on innovativ
1/10
Unabridged collation about multifarious computing methods and
outreaching cloud computing based on innovative procedure
Mehdi Darbandi1, Mohammad Abedi
1, Meysam Panahi
2, Ali Hamzenejad
2, Mohsen
Kariman Khorasani3
1
Department of Electrical Engineering and Computer Science at Iran University of Science and Technology(IUST), Tehran, Iran2Department of Management System and Productivity, Faculty of Industrial Engineering, Tehran South Branch,
Islamic Azad University (IAU), Tehran, Iran3Department of Communication Engineering, Islamic Azad University, Gonabad Branch, Gonabad, Iran
Abstract Cloud computing is one of today's mostexciting technologies due to its ability to reduce costs associated
with computing while increasing flexibility and scalability for
computer processes. During the past few years, cloud
computing has grown from being a promising business idea to
one of the fastest growing parts of the IT industry. IT
organizations have expresses concern about critical issues(such as security) that exist with the widespread
implementation of cloud computing. These types of concerns
originate from the fact that data is stored remotely from the
customer's location; in fact, it can be stored at any location.
Security, in particular, is one of the most argued-about issues
in the cloud computing field; several enterprises look at cloud
computing warily due to projected security risks. The risks of
compromised security and privacy may be lower overall,
however, with cloud computing than they would be if the data
were to be stored on individual machines instead of in a so -
called "cloud" (the network of computers used for remote
storage and maintenance). Comparison of the benefits and
risks of cloud computing with those of the status quo are
necessary for a full evaluation of the viability of cloud
computing. Consequently, some issues arise that clients need to
consider as they contemplate moving to cloud computing for
their businesses. Cloud computing is emerging as a prominent
computing model. It provides a low-cost, highly accessible
alternative to other traditional high-performance computing
platforms. It also has many other benefits such as high
availability, scalability, elasticity, and free of maintenance.
Given these attractive features, it is very desirable if automated
planning can exploit the large, affordable computational power
of cloud computing. However, the latency in inter-process
communication in cloud computing makes most existing
parallel planning algorithms unsuitable for cloud computing.
In this paper, at first we review different aspects of cloud
computing and tell about all features and advantages and
disadvantages of such network and after that we try to finddynamical system model for cloud computing based on
Kalman Filtering and demonstrate basic fundamental
equations of these model. This model can be used for modeling
and making decision about all aspects of cloud computing, for
example we can use this model for making decision about
security of such network by making a model for cloud
platforms and estimate and update information about the
presence of hackers and malicious actions. Also we can use
such dynamical modeling for calculating crowd on different
sections of cloud computing resources.
Keywords- Control model, Kalman estimator,estimation and prediction.
I. INTRODUCTIONCloud Computing is evolving as a key technology for
sharing resources. Grid Computing, distributed
computing, parallel computing and virtualization
technologies define the shape of a new era. Traditional
distance learning systems lack reusability, portabilityand interoperability. Network-based cloud computing
is rapidly expanding as an alternative to conventional
office-based computing. As cloud computing becomes
more widespread, the energy consumption of the
network and computing resources that underpin the
cloud will grow. This is happening at a time when
there is increasing attention being paid to the need to
manage energy consumption across the entire
information and communications technology (ICT)
sector. While data center energy use has received
much attention recently, there has been less attention
paid to the energy consumption of the transmissionand switching networks that are key to connecting
users to the cloud. With the advent internet in the
1990s to the present day facilities of ubiquitous
computing, the internet has changed the computing
world in a drastic way. It has traveled from the concept
of parallel computing to distributed computing to grid
computing and recently to cloud computing. Although
the idea of cloud computing has been around for quite
some time, it is an emerging field of computer science.
Cloud computing can be defined as a computing
environment where computing needs by one party can
be outsourced to another party and when need be arise
to use the computing power or resources like database
or emails, they can access them via internet. Cloud
computing is a recent trend in IT that moves
computing and data away from desktop and portable
PCs into large data centers. The main advantage of
cloud computing is that customers do not have to pay
for infrastructure, its installation, required man power
to handle such infrastructure and maintenance. In
recent years, State Grid Corporation of China has been
vigorously promoting smart grid construction, and
cloud computing is developing rapidly. Trend of theelectric power enterprise informatization construction
will be the private cloud computing, which will
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 26
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/31/2019 Unabridged collation about multifarious computing methods and outreaching cloud computing based on innovativ
2/10
become the comprehensive platform of smart grid.
Mobile Cloud Computing (MCC) which combines
mobile computing and cloud computing, has become
one of the industry buzz words and a major discussion
thread in the IT world since 2009. As MCC is still at
the early stage of development, it is necessary to grasp
a thorough understanding of the technology in order to
point out the direction of future research.With the development of parallel computing,
distributed computing, grid computing, a new
computing model appeared. The concept of computing
comes from grid, public computing and SaaS. It is a
new method that shares basic framework. The basic
principles of cloud computing is to make the
computing be assigned in a great number of distributed
computers, rather than local computer or remoter
server. The running of the enterprise's data center is
just like Internet. This makes the enterprise use the
resource in the application that is needed, and access
computer and storage system according to therequirement.
Virtual machine (VM) is a key component of cloud
computing technology. Therefore developing an
optimal scheduling mechanism for balancing VM
operations at cloud computing framework is an
intriguing issue for cloud computing service
performance.
The industry-driven evolution of cloud computing
tends to obfuscate the common underlying
architectural concepts of cloud offerings and their
implications on hosted applications. Patterns are one
way to document such architectural principles and to
make good solutions to reoccurring (architectural)
cloud challenges reusable. To capture cloud computing
best practice from existing cloud applications and
provider-specific documentation, we propose to use an
elaborated pattern format enabling abstraction of
concepts and reusability of knowledge in various use
cases.
Cloud computing paradigm allows subscription-based
access to computing and storages services over the
Internet. Since with advances of Cloud technology,
operations such as discovery, scaling, and monitoringare accomplished automatically, negotiation between
Cloud service requesters and providers can be a
bottleneck if it is carried out by humans. Therefore,
our objective is to offer a state-of-the-art solution to
automate the negotiation process in Cloud
environments. In previous works in the SLA
negotiation area, requesters trust whatever QoS criteria
values providers offer in the process of negotiation.
Development of Internet technology and social
network has greatly changed the traditional software
engineering based on single Turing machine. Software
development will be cooperated and completed on thenetwork with collective intelligence. The interaction
among human-machine and machine-machine
becomes the kernel of Internet computing, while
Turing model studied on Entscheidungs problem based
on an automatic computer theoretical model without
interaction with people. Clusters or virtual clusters
become the basic platform of cloud computing centers.
And SaaS (Software as a Service), PaaS (Platform as a
Service), IaaS (Infrastructure as a Service) become thecommon knowledge for software engineers.
Furthermore, the research of network science has
discovered lots of physical law about the distribution
of information resources, such as the power law
distribution of Web services.
As more and more IT services are provided via cloud
computing technologies, businesses are worried about
acceptable levels of availability and performance of
applications hosted in the cloud. Since services in
cloud are interdependent. An infrastructure failure may
cause a number of service interruptions and result in
great business losses. In a word, incident managementis critical in cloud environments. Traditional incident
management concerns only IT performance but
overlooks business performance.
Extensive computing power has been used to tackle
issues such as climate changes, fusion energy, and
other pressing scientific challenges. These
computations produce a tremendous amount of data;
however, many of the data analysis programs currently
only run a single processor.
Cloud computing has elevated IT to newer limits by
offering the market environment data storage and
capacity with flexible scalable computing processing
power to match elastic demand and supply, whilst
reducing capital expenditure. However the opportunity
cost of the successful implementation of Cloud
computing is to effectively manage the security in the
cloud applications. Security consciousness and
concerns arise as soon as one begins to run
applications beyond the designated firewall and move
closer towards the public domain.
Recently, a number of cloud computing paradigms
have been proposed. The new term of cloud computing
is not a new concept, is a long-held dream ofcomputing as a utility [1]. From the view of
datacenters, the common understanding of the cloud
computing concept is Software as a Service (SaaS),
utility computing and application virtualization. In the
domain of Rich Internet Application (RIA) domain,
the view is different.
Cloud computing provides a multitenant feature that
enables an IT asset to host multiple tenants, improving
its utilization rate. The feature provides economic
benefits to both users and service providers since it
reduces the management cost and thus lowers the
subscription price. Many users are, however, reluctantto subscribe to cloud computing services due to
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 27
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/31/2019 Unabridged collation about multifarious computing methods and outreaching cloud computing based on innovativ
3/10
security concerns. To advance deployment of cloud
computing, techniques enabling secure multitenancy,
especially resource isolation techniques, need to be
advanced further. Difficulty lies in the fact that the
techniques range and cross various technical domains,
and it is difficult to get the big picture.
In the recent era, cloud computing has evolved as a net
centric, service oriented computing model. Consumerspurchase computing resources as on-demand basis and
get worry free with the underlying technologies used.
Cloud computing model is composed of three service
models Software as a Service (SaaS), Platform as a
Service (PaaS) and Infrastructure as a Service (IaaS)
and four deployment models Public, Private,
Community and Hybrid. A third party service
provider, stores & maintains data, application or
infrastructure of Cloud user. Relinquishing the control
over data and application poses challenges of security,
performance, availability and privacy. Security issues
in Cloud computing are most significant among allothers. Information Technology (IT) auditing
mechanisms and framework in cloud can play an
important role in compliance of Cloud IT security
policies.
Cloud computing is a way to increase the capacity or
add capabilities dynamically without investing in new
infrastructure, training new personnel, or licensing
new software. In the last few years, cloud computing
has grown from being a promising business concept to
one of the fast growing segments of the IT industry.
Cloud computing has been considered as the 5th utility
as computing resources including computing power,
storage, development platform and applications will be
available as services and consumers will pay only for
what consumed. This is in contrast to the current
practice of outright purchase or leasing of computing
resources. When the cloud computing becomes
popular, there will be multiple vendor offering
different services at different Quality of Services and
at different prices. The customers will need a scheme
to select the right service provider based on their
requirements. A trust management system will match
the service providers and the customers based on therequirements and offerings.
Cloud computing is the new paradigm that has
changed traditional computer business schemes: static,
close, centralized, and proprietary methods cannot
cope with the new requirements that have emerged.
Still, this new scenario poses a number of
opportunities to use and novel problems to be faced.
Specifically, we focus on the accounting of cloud
computing services. These may include relations
between different service providers, user connections
to different simultaneous services, and the need for
new services to be incorporated into the accountingsystems to enable emerging business models, and so
on. Classic solutions fail to provide a proper answer as
they were not specifically design for cloud computing.
Against this background, we put forward a flexible
accounting model that allows the deployment of cloud
computing services to accomplish all the service
providers' requirements.
We live in space time dimensions and all physical and
social sciences are based on the dimensions. Therepresentation and digitization of scientific phenomena
into data and computation of the digitized data greatly
depends on the spatiotemporal principles that govern
the relationships of phenomena. The latest
advancement of cloud computing is not an exception.
Conducting cloud computing in a spatiotemporal
fashion will help use spatiotemporal principles, which
exist in all physical and social sciences, to optimize
cloud computing and science discoveries.
Many current users of cloud computing document-
sharing services such as Google Docs (i.e., those who
primarily access client-only mind map features)require a fast and simple mechanism for accessing
mind map files in clouds.
MapReduce has been widely used as a powerful
parallel data processing model and is adopted by most
cloud providers to build cloud computing framework.
However, in open cloud systems, security of
computation becomes a great challenge. Moreover,
MapReduce data-processing services are long-running,
which increases the possibility that an adversary
launches an attack on the workers and make them
behave maliciously and then tamper with the
computation integrity of user tasks where their
executions are generally performed in different
administration domains out of the user control. Thus,
the results of the computation might be erroneous and
dishonest.
The rapid deployment of cloud computing promises
network users with elastic, abundant, and on-demand
cloud services. The pay-as-you-go model allows users
to be charged only for services they use. Current
purchasing designs, however, are still primitive with
significant constraints. Spot Instance, the first
deployed auction-style pricing model of Amazon EC2,fails to enforce fair competition among users in facing
of resource scarcity and may thus lead to untruthful
bidding and unfair resource allocation. Dishonest users
are able to abuse the system and obtain (at least) short-
term advantages by deliberately setting large
maximum price bids while being charged only at lower
Spot Prices. Meanwhile, this may also prevent the
demands of honest users from being satisfied due to
resource scarcity. Furthermore, Spot Instance is
inefficient and may not adequately meet users' overall
demands because it limits users to bid for each
computing instance individually instead of multipledifferent instances at a time.
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 28
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/31/2019 Unabridged collation about multifarious computing methods and outreaching cloud computing based on innovativ
4/10
Data Disclosure due to laptop loss, especially in travel,
is a top threat to businesses, governments, and non-
profit organizations. An effective protection against
this threat should guarantee the data confidentiality,
even if the adversary has physically possessed the
laptop. Current technology does not satisfy this
requirement.
Cloud computing is an emerging computing paradigmwhich allows sharing of massive, heterogeneous,
elastic resources among users. Despite of all the hype
surrounding the cloud, users are still reluctant to adopt
cloud computing because public cloud services process
users' data on machines that users do not own hence
there is a fear of leakage of users' commercially
sensitive data. Due to these reasons, it is very
necessary that cloud users' be vigilant while selecting
the service providers present in the cloud.
Cloud computing has become another buzzword after
Web 2.0. However, there are dozens of different
definitions for cloud computing and there seems to beno consensus on what a cloud is. On the other hand,
cloud computing is not a completely new concept; it
has intricate connection to the relatively new but
thirteen-year established grid computing paradigm,
and other relevant technologies such as utility
computing, cluster computing, and distributed systems
in general.
Cloud computing is a promising technology, where the
infrastructure, developing platform, software and
storage are delivered as a service. With the
development of cloud computing, more and more
cloud service providers emerge. However, there are no
metrics can be referred to compare these providers, so
it is difficult for cloud consumers to select the most
reliable providers or resources.
Cloud computing discusses about sharing any
imaginable entity such as process units, storage
devices or software. The provided service is utterly
economical and expandable. Cloud computing
attractive benefits entice huge interest of both business
owners and cyber thefts. Consequently, the computer
forensic investigation step into the play to find
evidences against criminals. As a result of the newtechnology and methods used in cloud computing, the
forensic investigation techniques face different types
of issues while inspecting the case. The most profound
challenges are difficulties to deal with different rulings
obliged on variety of data saved in different locations,
limited access to obtain evidences from cloud and even
the issue of seizing the physical evidence for the sake
of integrity validation or evidence presentation.
Cloud computing bring a tremendous complexity to
information security. Many researchers have been
done to establish and maintain the trust relationship in
cloud. Remote attestation is one of the most importantfeatures of trusted computing. But conventional ways
of remote attestation can only attest to the presence of
a particular binary. They cannot measure program
behavior. Existing dynamic remote attestation
technologies can solve some of these problems. But
they are not suitable for cloud computing when users
lose their control over their critical data and business
processes.
A secure, reliable and economic power supply isclosely linked to a fast, efficient and dependable
communications infrastructure. The appliance of the
cloud computing model meets the requirements of data
and computing intensive smart grid applications.
Using internal network improves the calculation,
storage capacity, data security of the overall system,
reducing the system expansion investment, thus
providing ideas and strong technical support in smart
grid and large scale computing can be achieved over
existing network.
Cloud computing systems promise to offer
subscription-oriented, enterprise-quality computingservices to users worldwide. With the increased
demand for delivering services to a large number of
users, they need to offer differentiated services to users
and meet their quality expectations. Existing resource
management systems in data centers are yet to support
Service Level Agreement (SLA)-oriented resource
allocation, and thus need to be enhanced to realize
cloud computing and utility computing. In addition, no
work has been done to collectively incorporate
customer-driven service management, computational
risk management, and autonomic resource
management into a market-based resource
management system to target the rapidly changing
enterprise requirements of Cloud computing.
Over the recent years, Cloud Computing has evolved
as a new computing paradigm which aims at providing
high-quality, customized and dynamic computing
services. Despite initial positive results, it is
challenging in theory and practice to find an
appropriate provider matching the individual
requirements. For doing this, the customer has to be
clear about his individual targets that should be
achieved with cloud computing. That is quitchallenging because there are a lot more dimensions to
consider than costs and flexibility. Moreover, the
selection process is complicated by a number of new
entrants as well as offers of non-transparent services,
which sometimes differ significantly.
In universities, teaching and research require a large
number of scientific computing, and scientific
computing need to invest huge funds to purchase
hardware resources. As hardware replacement cycle is
very short, and the university departments often repeat
purchase of equipment, that resulting in low utilization
of resources and low sharing rate.
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 29
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/31/2019 Unabridged collation about multifarious computing methods and outreaching cloud computing based on innovativ
5/10
Cloud computing is an evolving term these days. It
describes the advance of many existing IT
technologies and separates application and information
resources from the underlying infrastructure. Personal
Cloud is the hybrid deployment model that is
combined private cloud and public cloud. By and
large, cloud orchestration does not exist today. Current
cloud service is provided by web browser or hostinstalled application directly. According to the ITU-T
draft, we might consider cloud orchestration
environment in collaboration with other cloud
providers.
For many organizations, one attractive use of cloud
resources can be through what is referred to as cloud
bursting or the hybrid cloud. These refer to scenarios
where an organization acquires and manages in-house
resources to meet its base need, but can use additional
resources from a cloud provider to maintain an
acceptable response time during workload peaks.
Cloud bursting has so far been discussed in the contextof using additional computing resources from a cloud
provider. However, as next generation applications are
expected to see orders of magnitude increase in data
set sizes, cloud resources can be used to store
additional data after local resources are exhausted.
In recent years, as the rapid development of the
technology about Peer-to-Peer (P2P) networks and the
cloud computing technology, various applications of
P2P technology become very widespread in most
cloud computing distributed network applications. P2P
cloud computing networks are unstructured and are an
important component to implement next generation
internet. How to quickly and efficiently search the
resources in P2P networks has become one of the most
critical issues, and it is one of the greatest concerns to
users.
Cloud computing paradigm contains many shared
resources, such as infrastructures, data storage, various
platforms and software. Resource monitoring involves
collecting information of system resources to facilitate
decision making by other components in Cloud
environment. It is the foundation of many major Cloud
computing operations.Cloud computing is a trend which facilitates the
development of the distributed applications and
reduces the cost of the deployments, and it has
impacted the IT industry a lot. Cloud computing
depends a lot on the characteristics of the network, as
the remote processing and large data center are vital
for cloud computing. And the evolution of the
networks will play an important role for the evolution
of cloud computing. As many problems are emerging
in cloud computing, such as data security, data
availability and so on.
Cloud computing has emerged as one of the mostinfluential paradigms in the IT industry in recent years.
Since this new computing technology requires users to
entrust their valuable data to cloud providers, there
have been increasing security and privacy concerns on
outsourced data. Several schemes employing attribute-
based encryption (ABE) have been proposed for
access control of outsourced data in cloud computing;
however, most of them suffer from inflexibility in
implementing complex access control policies.In spite of the dramatic growth in the number of
smartphones in recent years, the challenge of limited
energy capacity of these devices has not been solved
satisfactorily. However, in the era of cloud computing,
the limitation on energy capacity can be eased off in an
efficient way by offloading heavy tasks to the cloud. It
is important for smartphone and cloud computing
developers to have insights into the energy cost of
smartphone applications before implementing the
offloading techniques.
Security issues are delaying fast adoption of cloud
computing and security mechanisms to ensure itssecure adoption has become a crucial immediate need.
On the other hand, cloud computing can help enable
security controls to be delivered in new ways by
service providers. To this end, we need frameworks for
efficient delivery of cloud-based security services and
for provisioning desirable solutions to customers based
on their requirements.
Cloud computing represents a paradigm shift, a
transition from computing-as-a-product to computing-
as-a-service. Instead of buying hardware and software
products, which require installation, configuration, and
maintenance, cloud computing lets you use
applications and computing infrastructures in the cloud
as a service, so you pay only for resources used.
Clouds thus offer businesses and individual access to
advanced IT infrastructures and applications that might
otherwise be out of their reach. Emerging markets
have been quick to recognize this and other benefits of
cloud computing.
The analysis and research of power system
necessitates the current computing. However, the
bottleneck of current computing lies in the limited
computing capacity in power system. Cloudcomputing's service-oriented characteristics advance a
new way of service provisioning called utility based
computing, which could provide powerful computing
capability for current computing. However, toward the
deployment of practical current computing Cloud, we
encounter one challenge that the existing job
scheduling algorithms under utility based computing
do not take hardware/software failure and recovery in
the Cloud into account.
Cloud Computing has emerged as a major information
and communications technology trend and has been
proved as a key technology for market developmentand analysis for the users of several field. The practice
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 30
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/31/2019 Unabridged collation about multifarious computing methods and outreaching cloud computing based on innovativ
6/10
of computing across two or more data centers
separated by the Internet is growing in popularity due
to an explosion in scalable computing demands.
However, one of the major challenges that faces the
cloud computing is how to secure and protect the data
and processes the data of the user. The security of the
cloud computing environment is a new research area
requiring further development by both the academicand industrial research associations. While cloud-
bursting is addressing this process of scaling up and
down across data centers. To provide secure and
reliable services in cloud computing environment is an
important issue. One of the security issues is how to
reduce the impact of denial-of-service (DoS) attack or
distributed denial-of-service (DDoS) in this
environment.
The systems of Autonomic computing are the first to
be mixed up with cloud computing. This form of
computing differs in the way it works. The goal of
autonomic computing is to provide systems that workautonomous (White 2004). This means that they have
to be able to do self-managing. They must configure
and fix failures themselves. It is similar to cloud
computing because it also consists of large computer
systems that have a high-level guidance from humans.
The difference between cloud computing and grid
computing is more refined, but it is easy to explain.
Grid computing focuses on large scale whereas cloud
computing provides services for both smaller and
larger scale. Grid computing usually provides high
performance constantly, and (the major advantage of)
cloud computing provides the performance when
necessary (Buyya 2003). Another comparison is drawn
with mainframes; the difference might be clear with a
mainframe, but there also similarities. A mainframe
could be seen as a cloud. Though it is clear that a
mainframe provides access to employees in large
organization and the mainframe is completely
centralized. That is what differs with cloud computing,
as also is the performance. Mainframes provide
continuously high performance and cloud computing
only whenever necessary (Armbrust et al 2009). The
comparison also has been drawn with peer-to-peersystems. This is because there is a whole cloud of
users which are both client and servers (Stoica2002). This is also the difference. In cloud computing
clients themselves do not act as providers of any
service. The last comparison that is discussed is the
comparison with service oriented computing. Off
course cloud computing is service oriented. But
service oriented computing focuses more on
techniques that run in the SaaS. Cloud computing, as
mentioned several times before, focuses on providing
computing services rather than the techniques.
Dealing with "single cloud" providers is predicted tobecome less popular with customers due to risks of
service availability failure and the possibility of
malicious insiders in the single cloud. A movement
towards "multi-clouds", or in other words, "inter-
clouds" or "cloud-of-clouds" has emerged recently.Cloud computing is the development of parallel
computing, distributed computing and grid computing.
It has been one of the most hot research topics. Now
many corporations have involved in the cloudcomputing related techniques and many cloud
computing platforms have been put forward. This is a
favorable situation to study and application of cloud
computing related techniques. Though interesting,
there are also some problems for so many platforms.
For to a novice or user with little knowledge about
cloud computing, it is still very hard to make a
reasonable choice. What differences are there for
different cloud computing platforms and what
characteristics and advantages each has? To answer
these problems, the characteristics, architectures and
applications of several popular cloud computingplatforms are analyzed and discussed in detail. From
the comparison of these platforms, users can better
understand the different cloud platforms and more
reasonability choose what they want.
Cloud computing is a new way of delivering
computing resources and is not a new technology. It is
an internet based service delivery model which
provides internet based services, computing and
storage for users in all markets including financial
health care and government. This new economic
model for computing has found fertile ground and is
attracting massive global investment. Although the
benefits of cloud computing are clear, so is the need to
develop proper security for cloud implementations.
Cloud security is becoming a key differentiator and
competitive edge between cloud providers.
The cloud is a next generation platform that provides
dynamic resource pools, virtualization, and high
availability. Today, we have the ability to utilize
scalable, distributed computing environments within
the confines of the Internet, a practice known as cloud
computing. Cloud computing is the Concept
Implemented to decipher the Daily ComputingProblems, likes of Hardware Software and Resource
Availability unhurried by Computer users. The cloud
Computing provides an undemanding and Non
ineffectual Solution for Daily Computing. The
prevalent Problem Associated with Cloud Computing
is the Cloud security and the appropriate
Implementation of Cloud over the Network.
Cloud computing is evolving as a key computing
platform for sharing resources that include
infrastructures, software, applications, and business
processes. Virtualization is a core technology for
enabling cloud resource sharing. However, mostexisting cloud computing platforms have not formally
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 31
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/31/2019 Unabridged collation about multifarious computing methods and outreaching cloud computing based on innovativ
7/10
adopted the service-oriented architecture (SOA) that
would make them more flexible, extensible, and
reusable. As an emerging technology and business
paradigm, Cloud Computing has taken commercial
computing by storm. Cloud computing platforms
provide easy access to a company's high-performance
computing and storage infrastructure through web
services. With cloud computing, the aim is to hide thecomplexity of IT infrastructure management from its
users. At the same time, cloud computing platforms
provide massive scalability, 99.999% reliability, high
performance, and specifiable configurability. These
capabilities are provided at relatively low costs
compared to dedicated infrastructures.
In the cloud computing system, the schedule of
computing resources is a critical portion of cloud
computing study. An effective load balancing strategy
is able to markedly improve the task throughput of
cloud computing. Virtual machines are selected as a
fundamental processing unit of cloud computing. Theresources in cloud computing will increase sharply and
vary dynamically due to the utilization of
virtualization technology. Current era of Web 2.0 is
enabling new business models for using the semantic
web. One such business model is leasing out
computing platform of hardware and software over the
internet to the tenants and is dubbed as Cloud
Computing. The anticipated future trend of computing
is believed to be this cloud computing as it promises a
lot of benefits like no capital expenditure, speed of
application deployment, shorter time to market, lower
cost of operation and easier maintenance for the
tenants.
Cloud computing is one of the emerging technologies
that will lead to the next generation of Internet. It
provides optimized and efficient computing through
enhanced collaboration, agility, scalability, and
availability.
Moreover, for instance if you have a company, you
can transfer internal network of your company yourserver database - on Cloud Computing to enjoy more
speed and processing power, and also if you use
server, you will economize in budget and only paypower consumption and maintenance costs.These are just part of the great performance of newtechnology, known as Cloud computing that is namedalso as "the next big thing" [1-9].
II. CONSIDERING HIGH IMPACTS OFCLOUD COMPUTING ON DIFFERENT
INDUSTRIES ASE OF USE
In two past sections of the paper, we define some of
the basic and fundamental principles of cloud and also
we tell about some of its advantageous. Now we wantimply into, the major applications of this technology.
After that when we understand the importance of this
technology, we tell about some techniques and
algorithms which can be uses for improving the
security aspect of such network; for example, we can
used Kalman Filter for prediction and estimation the
amount of users that can be allowed to logging into
special organization account.
On the other side there is indirect denial of service.This then affects other services when an attacker
means to hack a particular service down in the direct
denial of service. These effects depend on the
computing power the hacker has access to. If he tries
to cause downtime for a particular service (which is
hosted on a server) it could cause downtime for other
services too. The servers account all their computing
power to all the requests that are being made for one
specific service, and thus this causes that there is no
rest of computing power to access other applications in
the cloud on that particular server. Though it depends
on the infrastructure of the cloud, how bad the sideeffects are. For example the cloud could export the
service to another server when it notices that a
particular server is not able anymore to cope with all
the requests. This will cause even more downtime on
other services than before. When organizations use
cloud computing they shift the control of their security
partially to their cloud provider. They also have to
obey the rules that the provider makes up. The
unknown factor for cloud users is then that they do not
exactly know who provides the security measures in
the cloud. The cloud provider could easily hire a third
party in order to provide the security for the cloud.
This third party could be a liability for the security. It
means that there is another party that has access to the
information in the cloud and this party may be kept
unknown by the cloud provider. A major advantage
which is easily overlooked but also very important is
scale benefits (Armbrust, 2010; Grossman, 2009). Any
piece of software that gets installed in different places
has lower cost per installation than if this would be a
single one. This means that you have to invest less;
however in return you get the same quality as if you
would purchase something alone. This also providesthe possibility to increase the quality of purchased
software. You are able to spend the same amount of
financial resources as before, and you can get higher
quality. Cloud computing works by this principle, as
the provider purchases software, implements this into
the cloud, and then makes it ready for use for their
clients (Buyya, 2008). A very straight forward
advantage of cloud computing is the pay- as-you go
pricing, something we already mentioned when
defining the cloud. Logically one thinks of the cost
reduction for organizations with high IT expenses.
When you think further as Grossman (2009) describes,you will see that there are more benefits thanks to this
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 32
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/31/2019 Unabridged collation about multifarious computing methods and outreaching cloud computing based on innovativ
8/10
cost model. For starting organizations there is a low
entrance barrier. Not only for purchasing this form of
IT, also for entering the market as a new organization.
They do not need to invest large amounts of money in
advance to get operable. The next advantage of this
pay as you go system is that the IT is easily scalable
and expandable. Another advantage is the bulk of data
that a cloud can handle. Storage of data can be realizedup to several petabytes (Grossman, 2009). This huge
amount of data is not (easy) process able by
conventional IT systems yet, as they are much smaller
and therefore unable to process a lot of data. Last is the
accessibility of the cloud. Traditional IT systems are
usually more bound and limited to a certain physical
area. In cloud computing this is not the case. The cloud
can be accessed by any person that has the rights to
access, and more importantly, it can be accessed from
anywhere (Armbrust, 2009). It does depend on the
security measures you take whether or not it is
accessible from all over the world.From now on, we wants to do a behavioral comparison
of two stage Kalman filtering technique for
surveillance permeating tracking in cloud computing,
with such a technique we can predict and update our
information about the interest of our users in using
different parts of cloud resources so that we able to
predict accidental phenomenas such as hanging ourcrashing of such resources; or even when we detect
hacker existence on such networks we be able to track
and finally wipe out the surveillance actions.
III. DYNAMICAL SYSTEM MODEL:Now, after general discussions about different aspects
of Cloud Computing, we want to present dynamical
system model for cloud computing which can be used
for estimation and prediction of the presence of
hackers and spyware actions and/or we can use this
modeling for estimation crowd on different hours. The
Kalman filters are based on linear dynamic systems
discredited in the time domain. They are modeled on a
Markov chain built on linear operators perturbed by
Gaussian noise. The state of the system is representedas a vector of real numbers. At each discrete time
increment, a linear operator is applied to the state to
generate the new state, with some noise mixed in, and
optionally some information from the controls on the
system if they are known. Then, another linear
operator mixed with more noise generates the
observed outputs from the true ("hidden") state. The
Kalman filter may be regarded as analogous to the
hidden Markov model, with the key difference that the
hidden state variables take values in a continuous
space (as opposed to a discrete state space as in the
hidden Markov model). Additionally, the hiddenMarkov model can represent an arbitrary distribution
for the next value of the state variables, in contrast to
the Gaussian noise model that is used for the Kalman
filter. There is a strong duality between the equations
of the Kalman Filter and those of the hidden Markov
model. A review of this and other models is given in
Roweis and Ghahramani (1999) and Hamilton (1994),
Chapter 13.
In order to use the Kalman filter to estimate theinternal state of a process given only a sequence of
noisy observations for example in cloud platform,one must model the process in accordance with the
framework of the Kalman filter. This means specifying
the following matrices: Fk, the state-transition model;
Hk, the observation model; Qk, the covariance of the
process noise; Rk, the covariance of the observation
noise; and sometimes Bk, the control-input model, for
each time-step, k, as described below.
The Kalman filter model assumes the true state at timekis evolved from the state at (k 1) according to
Where:
Fk is the state transition model which isapplied to the previous state xk1;
Bk is the control-input model which is appliedto the control vector uk;
Wk is the process noise which is assumed tobe drawn from a zero mean multivariate
normal distribution with covariance Qk.
At time k an observation (or measurement) zk of the
true state xk is made according to
Where Hk is the observation model which maps the
true state space into the observed space and vk is the
observation noise which is assumed to be zero mean
Gaussian white noise with covariance Rk.
The initial state, and the noise vectors at each step {x0,
w1, ..., wk, v1 ... vk} are all assumed to be mutually
independent.
Many real dynamical systems do not exactly fit this
model. In fact, unmodelled dynamics can seriously
degrade the filter performance, even when it was
supposed to work with unknown stochastic signals as
inputs. The reason for this is that the effect of
unmodelled dynamics depends on the input, and,
therefore, can bring the estimation algorithm to
instability (it diverges). On the other hand,
independent white noise signals will not make the
algorithm diverge. The problem of separating between
measurement noise and unmodelled dynamics is a
difficult one and is treated in control theory under the
framework of robust control.
The state of the filter is represented by two variables:
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 33
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/31/2019 Unabridged collation about multifarious computing methods and outreaching cloud computing based on innovativ
9/10
, the a posteriori state estimate at time kgiven observations up to and including at time
k;
, the a posteriori error covariance matrix(a measure of the estimated accuracy of the
state estimate).
The Kalman filter can be written as a single equation;however it is most often conceptualized as two distinct
phases: "Predict" and "Update". The predict phase uses
the state estimate from the previous time step to
produce an estimate of the state at the current time
step. This predicted state estimate is also known as the
a priori state estimate because, although it is an
estimate of the state at the current time step, it does not
include observation information from the current time
step. In the update phase, the current a priori
prediction is combined with current observation
information to refine the state estimate. This improved
estimate is termed the a posteriori state estimate.Typically, the two phases alternate, with the prediction
advancing the state until the next scheduled
observation, and the update incorporating the
observation. However, this is not necessary; if an
observation is unavailable for some reason, the update
may be skipped and multiple prediction steps
performed. Likewise, if multiple independent
observations are available at the same time, multiple
update steps may be performed (typically with
different observation matrices Hk).
Predict:Predicted (a priori) state estimate:
Predicted (a priori) estimate covariance:
Update:
Innovation or measurement
residual:
Innovation (or residual) covariance
Optimal Kalman gain
Updated (a posteriori) state
Updated (a posteriori) estimate
covariance
The formula for the updated estimate and covariance
above is only valid for the optimal Kalman gain.
Usage of other gain values require a more complex
formula found in the derivations section.
Invariants:
If the model is accurate, and the values for and
accurately reflect the distribution of the initial
state values, then the following invariants are
preserved: (all estimates have a mean error of zero)
Where is the expected value of , and
covariance matrices accurately reflect the covariance
of estimates
IV. CONCLUSIONIn this article, we introduce Cloud Computing and
perusal about influences of it on the processes of these
days. As Cloud Computing begins to move beyond the
pure hype stage and into the beginning of mainstream
adoption, adopting cloud-based services or moving
application services to the cloud brings a number of
new risks, including: Cloud availability, Cloud
security, Erosion of data integrity, and so on.However, for enterprise which require visibility, trust
and control over cloud-based services. To maximize
the value of cloud computing, meanwhile, to avoid the
risk associated with their cloud-based
implementations, enterprises need an approach,
processes, procedures, and technology to manage and
control thousands of data, services and process
elements in the Cloud environment. In a word, Cloud
computing needs governance.
Cloud computing' service-oriented characteristics
advance a new way of service provisioning called
utility based computing. However, toward the practicalapplication of commercialized Cloud, we encounter
two challenges: i) there is no well-defined job
scheduling algorithm for the Cloud that considers the
system state in the future, particularly under
overloading circumstances; ii) the existing job
scheduling algorithms under utility computing
paradigm do not take hardware/software failure and
recovery in the Cloud into account.
Although, there is some worry about security in cloud
computing, but the number of persons that save their
personal information in servers of third company for
example Google, is increasing. We presented some
solutions for improving its security. With regard to lots
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 34
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/31/2019 Unabridged collation about multifarious computing methods and outreaching cloud computing based on innovativ
10/10
of cloud computing advantages, specially, costs
reduction of implementation in large scale, investing
capital is increasing in this filed. Cloud Computing is
advancing with fast rate and also it will be complete
with little deficiencies rather than other technologies.
It is predict that Cloud computing is the basic platform
for IT in next 20 year [16].
REFERENCES:[1] David C. Wyld; the cloudy future ofgovernment
IT: cloud computing and the public sector aroundthe world, IJWesT, Vol. 1, Num. 1, Jan. 2010.
[2] Jean-Daniel Cryans, Alain April, Alain Abran;criteria to compare cloud computing with currentdatabase technology, R. Dumke et al. (Eds.):IWSM / MetriKon / Mensura 2008, LNCS 5338,pp. 114-126, 2008.
[3] Anil Madhavapeddy, Richard Mortier, JonCrowcroft, Steven Hand; multiscale notmulticore: efficient heterogeneous cloud
computing, published by the British InformaticsSociety Ltd. Proceedings of ACM-BCS Visions ofComputer Science 2010.
[4] Harold C. Lim, Shivnath Babu, Jeffrey S. Chase,Sujay S. Parekh; automated control in cloudcomputing: challenges and opportunities,ACDC09, June 19, Barcelona, Spain.
[5] N. Sainath, S. Muralikrishna, P.V.S. Srinivas; aframework of cloud computing in the real world;Advances in Computational Sciences andTechnology, ISSN 0973-6107, Vol. 3, Num. 2,(2010), pp. 175-190.
[6] Kyle Chard, Simon Caton, Omer Rana, KrisBubendorfer; social cloud: cloud computing insocial networks
[7] G. Bruce Berriman, Eva Deelman, Paul Groth,Gideon Juve; the application of cloud computingto the creation of image mosaics and managementof their provenance,
[8] Roy Campbell, Indranil Gupta, Michael Heath,Steven Y. Ko, Michael Kozuch, Marcel Kunze,Thomas Kwan, Kevin Lai, Hing Yan Lee, MarthaLyons, Dejan Milojicic, David OHallaron, YengChai Soh; open cirrus TM cloud computingtestbed: federated data centers for open sourcesystems and services research
[9] Rajkumar Buyya, Chee Shin Yeo, SrikumarVenugopal, James Broberg, Ivona Brandic; cloudcomputing and Emerging IT platforms: Vision,Hype, and Reality for delivering computing as the5th utility
[10]Lamia Youseff, Maria Butrico, Dilma Da Silva;toward a unified ontology of cloud computing
[11] Daniel A. Menasce, Paul Ngo; understandingcloud computing: experimentation and capacityplanning; Proc. 2009, Computer MeasurementGroup Conf. Dallas, TX. Dec. 2009.
[12] Won Kim; cloud computing: today andtomorrow; JOT, Vol. 8, No. 1, Jan-Feb 2009.
[13] Richard Chow, philippe Golle, Markus Jakobsson,Elaine Shi, Jessica Staddon, Ryusuke Masuoka,Jesus Molina; controlling data in the cloud:outsourcing computation without outsourcingcontrol; CCSW09, Nov. 13, 2009, Chicago,Illinois, USA.
[14] Bo Peng, Bin Cui, Xiaoming Li; implementationissues of a cloud computing platform; Bulletin ofthe IEEE computer society technical committee ondata engineering.
[15] Daniel Nurmi, Rich Wolski, Chris Grzegorczyk,Graziano Obertelli, Sunil Soman, Lamia Youseff,Dmitrii Zagorodnov; the eucalyptus open-sourcecloud computing system.
[16] Mehdi Darbandi, Hoda Purhosein; Perusal aboutinfluences of Cloud Computing on the processesof these days and presenting new ideas about itssecurity, Int. IEEE Conf. Azerbaijan, Bakku.
Mehdi Darbandi Mohammad
Abedi
Mohsen Panahi Ali Hamzenejad
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 35
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617