SOCIAL PRIVATE CLOUD COMPUTING FOR HIGHER SECURE VIRTUAL PROCESSING

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "SOCIAL PRIVATE CLOUD COMPUTING FOR HIGHER SECURE VIRTUAL PROCESSING"

Transcription

1 SOCIAL PRIVATE CLOUD COMPUTING FOR HIGHER SECURE VIRTUAL PROCESSING 1 RAYAN JAHA, 2 NAVRATI SAXENA, 3 JAMILAH JAHA 1,2,3 Collage of Information and Communication Engineering, Sungkyunkwan University, Suwon, Korea Abstract- There are many users in the universities who need more computational power than they own, on the other hand there are some other users who use less computational power than they own, also there are some wasted computer resources not being used at all such as idle computers in libraries, labs, classrooms, etc. By interconnecting all these computers to a network manager, we can create one large scale computing resource (private cloud) used for virtual processing with a high throughput computing. However, the only thing that stops the users to share them computational resources is trust. In this paper we propose a system that prevent the user from these security overheads, by creating social private cloud computing. Index Terms- Cloud computing, Network Security, Social networks, Virtual processing. I. INTRODUCTION High throughput computing on large groups of distributed owned computing resources has existed for a long time. Only few users allow a stranger (random professor or a student) to use their computational power. Even if data encrypted, there is always a way. Basically, users who want to process data virtually they have no guarantee of data protection, which means that they have to trust them in order to process them data. Therefore, the important factor here is the trust. We are looking for a way to deduce a level of trust between users here for instance, a friendship. Trust is a very important factor in cloud computing but the question is how can users trust each others? to answer this question we need to understand how to build up a trust. Trust is usually built up during real life relationships. For example a known student or a friend, or even professors. By taking all these relationships to the digital level we created digital social networks, similar to Facebook, Google plus, etc. They are digital relationships websites, some of these relations started from the beginning, in a digital world; it could be from online gamming, forums, etc. However, most of these relations based on a real life relations. Commonly in these examples, the users create an account then add people; he/she may know from his/her real life to the friends list. We took the leverage of these digital social networks to improve the security overheads regarding virtual processing. By building the trust between users, will make them use our system, because users are more likely to trust his/her friend or a professor, which eventually leads to high throughout private cloud computing. In particular, this paper we propose a private cloud computing system for a university based on Trust. By using the web application that the university provides, to invite other users based on real relationship and process the data virtually. Specific contributions of our work are summarized below: We design a new private cloud computing based on real life relationships to increase the number of users which will eventually lead to higher throughput computing. Our system allows the user to describe the job he/she wants to get it done. Then the network manager matches the best resources that match the job. The system we designed is taking the advantage of the idle computers, which are wasting computational resources. The rest of the paper is organized as follows: Section 2 states the structure of our system. In Section 3, system scenarios will be discussed. Finally, section 4 concludes the paper remarks. II. SYSTEM DESIGN Creating the system is very simple; briefly, we divide it into two parts. First part is creating the private cloud, by sharing all the available computational resources in the university to build one large-scale computational resource. Then, for the second part we create social networks between the users. We combine them together to get social private cloud computing. Basically, the university provides virtual processing and social networking web application that accomplishes these tasks. In between, it also creates and schedules jobs as well. A. Creating private Cloud 1) Cloud Architecture To create the cloud we should link all the computers in the university to a network manager, which will create a large environment of heterogeneous resources. Fig. 1 shows the basic architecture and every computer where it can come from. 105

2 Social Private Cloud Computing for Higher Secure Virtual Processing allocate worker computer with higher priority to trusted group first which is intended to his friends. Fig. 1. Network Architecture a) Network Manager Network manager is the central computer; from which all computers are connected to manage them. Network manager, is responsible for job queuing and job assigning to the worker computers whether it is idle or not. It is also responsible to keep tracking the status of these jobs after assigning them. Network manager has the ability to match the job based on the description that user makes. For example, if the user wants to execute the job on matlab, then the user must describe that, and then the network manager will match the worker computer that has matlab. b) Worker Computers Worker computers are those, which provide the computational power for the system, the more we have the more computational power we get. There are two types of worker computer: (1) Public Worker Computer These types of computers do not have an owner, such as the computers in the libraries, classrooms, printer computers and browsing computers. These computers are turned on almost all the time; also, they remain idle most of the time. Public worker computers are configured only to receive jobs from the network manager; which means that it will always accept the job once it receives it. Since these computers are public, which means, anyone can use it, therefore leading to higher risk to process the data virtually on it. However, using these computers, it requires the university identification number, which is provided by the university itself to every student and professor just make sure the system knows who is using the computers. If it is still risky to use, make some policies. Assign non-important jobs only when the worker machine is in idle state. For example, if there is a student who need to execute non-important code. While the student submitting the job and describe it, as a non-important job, then the network manager based on the job description, will allocate the worker computer. Which in this case primarily, it will try to find private worker computer and if it did not find any then it will look for a public worker that stated as an idle. Fig. 2 shows how the network manager will Fig. 2. Non-important Jobs (2) Private Worker Computer Private worker computer mean that every computer has an owner either a student or a professor. They also have to log in with the university identification number for more authentication concerns. Private worker computers has the ability to place jobs in the network manager s queue, after that network manager will allocate the matched worker computer and get them execute, and they also has the ability to receive jobs from the network manager that needed to be execute on their computer in return. Which is mean everyone has to share their resources unless they need it. The user can only assign jobs to the network manager if more resources needed than the user has. B. Build social networks The platform of social networks is provided by the web application, which the university provides. In the traditional social networks cannot guarantee a specific profile is linked to the real person, taking for example, Facebook is not able to guarantee this profile it linked to the real person who is pretending to be. To guarantee profiles are linked to real persons, we proposed login with the university identification, which is usually issued after submitting some official documents. 106

3 The web application has the ability to invite a friend. When someone adds a friend, the user has some knowledge of the friend who has added and this kind of relation starts from a real life. For an instance, they could classmates or the user could be a professor of another user. However, the invitation does not describe the level of trust between these users whether the user is a student or a professor. Therefore, the web application provides the ability to create groups for the individual to describe the level of trust based on the relation in a real life. For example, the user just invited a very close friend whom they know each other for a long time and they also trust each other, then the user adds the friend to close friend group. In the other hand, a user just invites someone whom he meets in the class, and then the user adds the friend to a group that has a sharing limitation. Different sharing policies depends on the group, for instance a user from close friends group is more likely to share resources openly, however might not be true for a friend who just met. In Fig.3 the spotted student has three students and two professors who can trust, however the student also got one student who just met and not fully trusted. Social Private Cloud Computing for Higher Secure Virtual Processing students. Let us assume Mr. A s work research require less computational power than he has. On the other hand, Mr. B s work needs more computational power than he has. This is what our system for. We have trusted users who need virtual processing. In willing to use the system they both have to log in to the university web application with student identification number, Mr. A or Mr. B sends a friend request and the other accepts it. Now they have digital friendship, they make a group and add him to that group; for example, he creates a group to add people who he really trusts. We finished with the first step, which is creating social network. The next part, is borrowing a resource from a friend for virtual processing. Since Mr. A doesn t need his full resources, he can configure his account to receive jobs. The status of Mr. A will be sent to the network manager. In the other side there is Mr. B who needs more resource, he creates the file and sends it to the network manager. Network manager will receive the job and put it in the queue. In case the queue is empty, the network manager will update its worker computers status and relations and as soon network manager finds a worker computer (in this case is Mr. A s computer) it will assign the job to Mr. A s computer and keep tracking job s status and return it when it is done. III. SCENARIOS Figure 3 Social Networks There are different scenarios depending on the situations and the ability we are talking about. We will start with the basic one, which will include the goal of the paper. C. Basic Scenario In order to make the system work, two users must have a relationship in real life, any kind of a relationship whether a student with another student or a student with a professor or even a professor with a professor. Let us assume Mr. A and Mr. B are friends from high school, and they trust each other. Mr. A and Mr. B are both a master degree D. Job Description Job description is the ability to improve the performance of the system. In case the user wants to execute a file that requires a specific program, then the user must mention it in the description and after sending the job to the network manager, the allocator will match it with a worker computer regarding to the description. For example, a user want to execute an X-code file then the user must mention that, in the description. After that the user sends the file to the network manager, then the allocator will match the information he gave with a worker computer s that have X-code installed. In Fig. 4 the above example has been explained, where four of his friends are ready to share them resources. However, some of them have different operation systems, Xcode only work in Mac environment, there are two friends who are using Mac operation system, but only one of them have the Xcode installed. Which is the one that network manager has been allocated. Job description also could be use to choose a specific group only to search for a worker computer. E. Idle Computers Idle computers is a good idea, because there are lot of idle computers all over the university and beside wasting these computational resources, it is advisable to use them. Since there are more worker computers, we will have more free resources that we can use. In public worker computers, we only use them when they are idle, we also could use private idle computers as 107

4 well expressed in Fig 2. In case, the user has non-important job is to be done. The user must send the job to the network manager as a non-important, and supposing that there is none of his/her social network user is sharing at the moment. Public computer will be allocated if and only if it stays an idle. Social Private Cloud Computing for Higher Secure Virtual Processing F. Policies Polices is almost similar to the job description, the different is that the job description managed by the sender, and the policies is managed by the receiver. There are several scenarios, for example the worker which configured to share its resource at the moment could make a policy stating that a job can be received from this group only, or only if the receiver is an idle, or even it can specifies the time to receive jobs, for instance Mr. A leave the lab at 6 p.m. and return next day at 10 a.m. any job received between 6 pm to 8 am is accepted. Fig. 4. Job Description G. Overall Scenario In this scenario, we try to explain the highest priority. In order, network manager allocate a worker computer. The higher priorities have higher security than lower priorities. Always the network manager will allocate highest trusted group as a first step then it will look for idle computers. For example if the user has different groups, the highest trusted group will be chosen. Also, from the highest trusted group, it will try to find idle computers first. Fig 5. Fig. 5. Overall Scenario CONCLUSION In this paper, we have proposed a social private cloud computing system to overcome the security overheads, which is a combination of virtual cloud processing and social networks. In our system, we have used all computers in the university as resources, in order to create one large-scale computational power and taking the leverage of the public computers while it is in idle mode and private computers for more secure data processing. We have taken the leverage of real life relationships and converted it to digital relationship based on trust, and used that trusted relationship to secure virtual processing between worker computers. The more secure computing will lead to more users to share their computational resources, which will lead to more efficient and higher throughput computing. REFERENCES [1] S. Chen, B. Mulgrew, and P. M. Grant, A clustering technique for digital communications channel equalization using radial basis function networks, IEEE Trans. on Neural Networks, vol. 4, pp , July K. Chard, k. Bubendorfer, S. Caton and O. F. Rana, Social Cloud Computing: A Vision for Socially Motivated Resource Sharing, Services Computing IEEE Transactions, vol. 5, no. 4, October-December

5 Social Private Cloud Computing for Higher Secure Virtual Processing [2] Ellison, N. B., Steinfield, C. and Lampe, C. (2007), The Benefits of Facebook Friends: Social Capital and College Students Use of Online Social Network Sites. Journal of Computer-Mediated Communication, 12: doi: /j [3] R. Raman, M. Livny, M. Solomon, Matchmaking: Distributed Resource Management for High Throughput Computing, IEEE International Symposium on High Performance Distributed Computing. [4] S. Taylor, High Performance Computing of Hydrologic Models Using HTCondor, Brigham Young University, April [5] D. Warneke, O. Kao, "Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud, IEEE transactions on Parallel and Distributed Systems, VOL. 22, NO. 6, JUNE

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based

More information

International Journal of Emerging Technology & Research

International Journal of Emerging Technology & Research International Journal of Emerging Technology & Research A Study Based on the Survey of Optimized Dynamic Resource Allocation Techniques in Cloud Computing Sharvari J N 1, Jyothi S 2, Neetha Natesh 3 1,

More information

IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE

IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE Mr. Santhosh S 1, Mr. Hemanth Kumar G 2 1 PG Scholor, 2 Asst. Professor, Dept. Of Computer Science & Engg, NMAMIT, (India) ABSTRACT

More information

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic

More information

Grid Computing Approach for Dynamic Load Balancing

Grid Computing Approach for Dynamic Load Balancing International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-1 E-ISSN: 2347-2693 Grid Computing Approach for Dynamic Load Balancing Kapil B. Morey 1*, Sachin B. Jadhav

More information

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD R.Dhanya 1, Mr. G.R.Anantha Raman 2 1. Department of Computer Science and Engineering, Adhiyamaan college of Engineering(Hosur).

More information

Resource Scalability for Efficient Parallel Processing in Cloud

Resource Scalability for Efficient Parallel Processing in Cloud Resource Scalability for Efficient Parallel Processing in Cloud ABSTRACT Govinda.K #1, Abirami.M #2, Divya Mercy Silva.J #3 #1 SCSE, VIT University #2 SITE, VIT University #3 SITE, VIT University In the

More information

The Improved Job Scheduling Algorithm of Hadoop Platform

The Improved Job Scheduling Algorithm of Hadoop Platform The Improved Job Scheduling Algorithm of Hadoop Platform Yingjie Guo a, Linzhi Wu b, Wei Yu c, Bin Wu d, Xiaotian Wang e a,b,c,d,e University of Chinese Academy of Sciences 100408, China b Email: wulinzhi1001@163.com

More information

Towards Integrating Information of Service Level Agreement and Resources as a Services (RaaS) for Cloud Computing Environment

Towards Integrating Information of Service Level Agreement and Resources as a Services (RaaS) for Cloud Computing Environment Towards Integrating Information of Service Level Agreement and Resources as a Services (RaaS) for Cloud Computing Environment Rusli Abdullah and Amir Mohamed Talib Faculty of Computer Science & IT Information

More information

Task Scheduling in Hadoop

Task Scheduling in Hadoop Task Scheduling in Hadoop Sagar Mamdapure Munira Ginwala Neha Papat SAE,Kondhwa SAE,Kondhwa SAE,Kondhwa Abstract Hadoop is widely used for storing large datasets and processing them efficiently under distributed

More information

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing International Journal of Computational Engineering Research Vol, 03 Issue, 10 XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing Kamlesh Lakhwani 1, Ruchika Saini 1 1 (Dept. of Computer

More information

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Sunghwan Moon, Jaekwon Kim, Taeyoung Kim, Jongsik Lee Department of Computer and Information Engineering,

More information

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in SharePoint cloud

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in SharePoint cloud Project Plan 365 Collaboration with Microsoft Project Files (MPP) in SharePoint cloud White Paper Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Prerequisites... 4 3.

More information

IMPROVED LOAD BALANCING MODEL BASED ON PARTITIONING IN CLOUD COMPUTING

IMPROVED LOAD BALANCING MODEL BASED ON PARTITIONING IN CLOUD COMPUTING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Cloud Computing Backgrounder

Cloud Computing Backgrounder Cloud Computing Backgrounder No surprise: information technology (IT) is huge. Huge costs, huge number of buzz words, huge amount of jargon, and a huge competitive advantage for those who can effectively

More information

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in OneDrive cloud

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in OneDrive cloud Project Plan 365 Collaboration with Microsoft Project Files (MPP) in OneDrive cloud White Paper Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Prerequisites... 4 3. What

More information

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia chaabounitaha@yahoo.fr 2 MIRACL Lab, FSEG, University

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in Dropbox cloud

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in Dropbox cloud Project Plan 365 Collaboration with Microsoft Project Files (MPP) in Dropbox cloud White Paper Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Prerequisites... 4 3. What

More information

AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION

AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION Shanmuga Priya.J 1, Sridevi.A 2 1 PG Scholar, Department of Information Technology, J.J College of Engineering and Technology

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing

More information

DATA SECURITY MODEL FOR CLOUD COMPUTING

DATA SECURITY MODEL FOR CLOUD COMPUTING DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 poojadhawan786@gmail.com ABSTRACT Cloud Computing

More information

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud IEEE TRANSACTIONS ON CLOUD COMPUTING YEAR 2013 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Gaochao Xu, Junjie Pang, and Xiaodong Fu Abstract: Load balancing in the cloud computing

More information

A Survey on Load Balancing and Scheduling in Cloud Computing

A Survey on Load Balancing and Scheduling in Cloud Computing IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 A Survey on Load Balancing and Scheduling in Cloud Computing Niraj Patel

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud

Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA v.sridivya91@gmail.com thaniga10.m@gmail.com

More information

The International Journal Of Science & Technoledge (ISSN 2321 919X) www.theijst.com

The International Journal Of Science & Technoledge (ISSN 2321 919X) www.theijst.com THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Efficient Parallel Processing on Public Cloud Servers using Load Balancing Manjunath K. C. M.Tech IV Sem, Department of CSE, SEA College of Engineering

More information

Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment

Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment www.ijcsi.org 99 Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Cloud Environment Er. Navreet Singh 1 1 Asst. Professor, Computer Science Department

More information

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under

More information

Cloud Computing in Medical Diagnosis for improving Health Care Environment

Cloud Computing in Medical Diagnosis for improving Health Care Environment Cloud Computing in Medical Diagnosis for improving Health Care Environment Dr.V.Jeyabalaraja 1,Dr.M.S.Josephine 2 1 Professor, Velammal Engineering College, 2 Professor, Dr.MGR University, jeyabalaraja@gmail.com,

More information

Clearing Away the Clouds: Cloud Computing at Stanford

Clearing Away the Clouds: Cloud Computing at Stanford Clearing Away the Clouds: Cloud Computing at Stanford Tech Briefing Turing Auditorium, 1/29/2010 Phil Reese, IT Services Topics: A walk down memory lane, which leads to the clouds. A chair with four legs.

More information

PARALLELS CLOUD STORAGE

PARALLELS CLOUD STORAGE PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...

More information

Simple. Serverless. Secure. { Secure Cloud Printing for Business }

Simple. Serverless. Secure. { Secure Cloud Printing for Business } Simple. Serverless. Secure. { Secure Cloud Printing for Business } Secure Cloud Printing for Business Cloud services can transform how today's businesses work, optimizing processes while reducing capital

More information

A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING

A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING Yogita gangboir 1, Praveen Shende 2, Tushar Kumar Vaidya 3 1,3 Department of Computer Science and Engineering, CSIT, Durg, (India) 2 Assoistant Professor

More information

The Power Marketing Information System Model Based on Cloud Computing

The Power Marketing Information System Model Based on Cloud Computing 2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.96 The Power Marketing Information

More information

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan

More information

Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led

Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills

More information

Load Balancing in cloud computing

Load Balancing in cloud computing Load Balancing in cloud computing 1 Foram F Kherani, 2 Prof.Jignesh Vania Department of computer engineering, Lok Jagruti Kendra Institute of Technology, India 1 kheraniforam@gmail.com, 2 jigumy@gmail.com

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Performance Gathering and Implementing Portability on Cloud Storage Data

Performance Gathering and Implementing Portability on Cloud Storage Data International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering

More information

SCHEDULING IN CLOUD COMPUTING

SCHEDULING IN CLOUD COMPUTING SCHEDULING IN CLOUD COMPUTING Lipsa Tripathy, Rasmi Ranjan Patra CSA,CPGS,OUAT,Bhubaneswar,Odisha Abstract Cloud computing is an emerging technology. It process huge amount of data so scheduling mechanism

More information

MULTI-DOMAIN CLOUD SOCIAL NETWORK SERVICE PLATFORM SUPPORTING ONLINE COLLABORATIONS ON CAMPUS

MULTI-DOMAIN CLOUD SOCIAL NETWORK SERVICE PLATFORM SUPPORTING ONLINE COLLABORATIONS ON CAMPUS MULTI-DOMAIN CLOUD SOCIAL NETWORK SERVICE PLATFORM SUPPORTING ONLINE COLLABORATIONS ON CAMPUS Zhao Du, Xiaolong Fu, Can Zhao, Ting Liu, Qifeng Liu, Qixin Liu Information Technology Center, Tsinghua University,

More information

Grid vs. Cloud Computing

Grid vs. Cloud Computing Grid vs. Cloud Computing The similarities and differences between Cloud Computing and Extreme-Scale Computation on Demand 2008 Parabon Inc. All rights reserved. 2009 Parabon 1 Computation, Inc. All rights

More information

Efficient Cloud Management for Parallel Data Processing In Private Cloud

Efficient Cloud Management for Parallel Data Processing In Private Cloud 2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Efficient Cloud Management for Parallel Data Processing In Private

More information

Course 20532B: Developing Microsoft Azure Solutions

Course 20532B: Developing Microsoft Azure Solutions Course 20532B: Developing Microsoft Solutions Five Days, Instructor-Led About this Course This course is intended for students who have experience building vertically scaled applications. Students should

More information

ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm

ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm A REVIEW OF THE LOAD BALANCING TECHNIQUES AT CLOUD SERVER Kiran Bala, Sahil Vashist, Rajwinder Singh, Gagandeep Singh Department of Computer Science & Engineering, Chandigarh Engineering College, Landran(Pb),

More information

Elastic Load Balancing in Cloud Storage

Elastic Load Balancing in Cloud Storage Elastic Load Balancing in Cloud Storage Surabhi Jain, Deepak Sharma (Lecturer, Department of Computer Science, Lovely Professional University, Phagwara-144402) (Assistant Professor, Department of Computer

More information

Load Balancing in Distributed Data Base and Distributed Computing System

Load Balancing in Distributed Data Base and Distributed Computing System Load Balancing in Distributed Data Base and Distributed Computing System Lovely Arya Research Scholar Dravidian University KUPPAM, ANDHRA PRADESH Abstract With a distributed system, data can be located

More information

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004

More information

Load Balance Scheduling Algorithm for Serving of Requests in Cloud Networks Using Software Defined Networks

Load Balance Scheduling Algorithm for Serving of Requests in Cloud Networks Using Software Defined Networks Load Balance Scheduling Algorithm for Serving of Requests in Cloud Networks Using Software Defined Networks Dr. Chinthagunta Mukundha Associate Professor, Dept of IT, Sreenidhi Institute of Science & Technology,

More information

Herve Roggero 3/3/2015

Herve Roggero 3/3/2015 BLUE SYNTAX CONSULTING Enzo Cloud Backup Overview Herve Roggero 3/3/2015 Contents General Technical Overview... 3 Operation Modes... 3 Enzo Agent... 4 Running Multiple Enzo Agents... 4 How to deploy...

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

Roulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing

Roulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. VII (Sep Oct. 2014), PP 65-70 Roulette Wheel Selection Model based on Virtual Machine Weight

More information

Logging in to Google Chrome

Logging in to Google Chrome Logging in to Google Chrome By logging in to Google Chrome, you will be able to quickly access any saved applications, bookmarks, and resources from any location. Please remember...if you are using a lab

More information

Course 10978A Introduction to Azure for Developers

Course 10978A Introduction to Azure for Developers Course 10978A Introduction to Azure for Developers Duration: 40 hrs. Overview: About this Course This course offers students the opportunity to take an existing ASP.NET MVC application and expand its functionality

More information

This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 12902

This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 12902 Open Archive TOULOUSE Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited

More information

Approaches for Cloud and Mobile Computing

Approaches for Cloud and Mobile Computing Joint CLEEN and ACROSS Workshop on Cloud Technology and Energy Efficiency in Mobile Communications at EUCNC 15, Paris, France - 29 June, 2015 Interoperable Data Management Approaches for Cloud and Mobile

More information

A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM

A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM Sneha D.Borkar 1, Prof.Chaitali S.Surtakar 2 Student of B.E., Information Technology, J.D.I.E.T, sborkar95@gmail.com Assistant Professor, Information

More information

Creation and Allocation of Virtual Machines for Execution of Cloudlets in Cloud Environment

Creation and Allocation of Virtual Machines for Execution of Cloudlets in Cloud Environment Creation and Allocation of Virtual Machines for Execution of Cloudlets in Cloud Environment Bachelor of Technology In Computer Science & Engineering By Durbar Show 110CS0153 Department of Computer Science

More information

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture , March 12-14, 2014, Hong Kong A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture Abdulsalam Ya u Gital, Abdul Samad Ismail, Min Chen, and Haruna Chiroma, Member,

More information

Project Plan 365 Collaboration with Microsoft Project Files (MPP) Shared on Network Folders

Project Plan 365 Collaboration with Microsoft Project Files (MPP) Shared on Network Folders Project Plan 365 Collaboration with Microsoft Project Files (MPP) Shared on Network Folders White Paper Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Prerequisites...

More information

Context-aware cloud computing for HEP

Context-aware cloud computing for HEP Department of Physics and Astronomy, University of Victoria, Victoria, British Columbia, Canada V8W 2Y2 E-mail: rsobie@uvic.ca The use of cloud computing is increasing in the field of high-energy physics

More information

An Efficient Resource Allocation Strategies in Cloud Computing

An Efficient Resource Allocation Strategies in Cloud Computing An Efficient Resource Allocation Strategies in Cloud Computing B.Rajasekar 1,S.K.Manigandan 2 Final Year MCA Student, VelTech HighTech Engineering College, Chennai, India 1 Assistant Professor, VelTech

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Gladinet Cloud Enterprise

Gladinet Cloud Enterprise GLADINET, INC Gladinet Cloud Enterprise Multi-Site Deployment Guide Gladinet, Inc. 9/27/2013 This document discusses the technologies behind Gladinet Cloud Enterprise Copyright 2013 Gladinet, Inc. Table

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS

MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS Priyesh Kanungo 1 Professor and Senior Systems Engineer (Computer Centre), School of Computer Science and

More information

Dynamic Thread Pool based Service Tracking Manager

Dynamic Thread Pool based Service Tracking Manager Dynamic Thread Pool based Service Tracking Manager D.V.Lavanya, V.K.Govindan Department of Computer Science & Engineering National Institute of Technology Calicut Calicut, India e-mail: lavanya.vijaysri@gmail.com,

More information

A Game Theory Modal Based On Cloud Computing For Public Cloud

A Game Theory Modal Based On Cloud Computing For Public Cloud IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 48-53 A Game Theory Modal Based On Cloud Computing For Public Cloud

More information

SERVICE ORIENTED ARCHITECTURE A REVOLUTION FOR COMPREHENSIVE WEB BASED PROJECT MANAGEMENT SOFTWARE

SERVICE ORIENTED ARCHITECTURE A REVOLUTION FOR COMPREHENSIVE WEB BASED PROJECT MANAGEMENT SOFTWARE SERVICE ORIENTED ARCHITECTURE A REVOLUTION FOR COMPREHENSIVE WEB BASED PROJECT MANAGEMENT SOFTWARE A.R. Khan 1, Rquaiya Khan 2, Trimbak R Sontakke 3, Shraddha R Khonde 4, Revati M Wahul 5, Mahtab alam

More information

Load Balancing Algorithms in Cloud Environment

Load Balancing Algorithms in Cloud Environment International Conference on Systems, Science, Control, Communication, Engineering and Technology 50 International Conference on Systems, Science, Control, Communication, Engineering and Technology 2015

More information

On Cloud Computing Technology in the Construction of Digital Campus

On Cloud Computing Technology in the Construction of Digital Campus 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus

More information

Efficient Data Replication Scheme based on Hadoop Distributed File System

Efficient Data Replication Scheme based on Hadoop Distributed File System , pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,

More information

Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com

Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Energy Constrained Resource Scheduling for Cloud Environment

Energy Constrained Resource Scheduling for Cloud Environment Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering

More information

Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm

Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm www.ijcsi.org 54 Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm Linan Zhu 1, Qingshui Li 2, and Lingna He 3 1 College of Mechanical Engineering, Zhejiang

More information

Fax User Guide 07/31/2014 USER GUIDE

Fax User Guide 07/31/2014 USER GUIDE Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section

More information

Various Schemes of Load Balancing in Distributed Systems- A Review

Various Schemes of Load Balancing in Distributed Systems- A Review 741 Various Schemes of Load Balancing in Distributed Systems- A Review Monika Kushwaha Pranveer Singh Institute of Technology Kanpur, U.P. (208020) U.P.T.U., Lucknow Saurabh Gupta Pranveer Singh Institute

More information

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

A Hybrid Load Balancing Policy underlying Cloud Computing Environment A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349

More information

Minimize Response Time Using Distance Based Load Balancer Selection Scheme

Minimize Response Time Using Distance Based Load Balancer Selection Scheme Minimize Response Time Using Distance Based Load Balancer Selection Scheme K. Durga Priyanka M.Tech CSE Dept., Institute of Aeronautical Engineering, HYD-500043, Andhra Pradesh, India. Dr.N. Chandra Sekhar

More information

Dynamic memory management in cloud computing. Harithan Reddy Velagala CSC-557

Dynamic memory management in cloud computing. Harithan Reddy Velagala CSC-557 Dynamic memory management in cloud computing. Harithan Reddy Velagala CSC-557 Contents.. - Introduction to cloud memory. - Importance of memory management. - Memory management techniques. - DRAMS as the

More information

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource

More information

A Dynamic Link Allocation Router

A Dynamic Link Allocation Router A Dynamic Link Allocation Router Wei Song and Doug Edwards School of Computer Science, the University of Manchester Oxford Road, Manchester M13 9PL, UK {songw, doug}@cs.man.ac.uk Abstract The connection

More information

Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control

Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control EP/K006487/1 UK PI: Prof Gareth Taylor (BU) China PI: Prof Yong-Hua Song (THU) Consortium UK Members: Brunel University

More information

AVI Nutrition Application

AVI Nutrition Application AVI Nutrition Application Software Project Management Plan 3WSPMP.doc Final April 17, 2013 Three W 3WSPMP.doc Page i Revisions Version Draft 1.0 Primary Author(s) Gus Delawder, Matt Amabeli Description

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

E- Customer Care Service System for Benin Electricity Distribution Company

E- Customer Care Service System for Benin Electricity Distribution Company E- Customer Care Service System for Benin Electricity Distribution Company Olutayo Boyinbode Department of Computer Science, Federal University of Technology, Akure Olufemi Akinyede Department of Computer

More information

Adaptive Load Balancing Method Enabling Auto-Specifying Threshold of Node Load Status for Apache Flume

Adaptive Load Balancing Method Enabling Auto-Specifying Threshold of Node Load Status for Apache Flume , pp. 201-210 http://dx.doi.org/10.14257/ijseia.2015.9.2.17 Adaptive Load Balancing Method Enabling Auto-Specifying Threshold of Node Load Status for Apache Flume UnGyu Han and Jinho Ahn Dept. of Comp.

More information

Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology

Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology Automating Process for Architecture on the cloud by using Semantic Methodology Bhavana Jayant.Adgaonkar Department of Information Technology Amarutvahini College of Engineering Sangamner, India adgaonkarbhavana@yahoo.in

More information

Computing Support Services at the Hawai`i Institute of Geophysics and Planetology

Computing Support Services at the Hawai`i Institute of Geophysics and Planetology Computing Support Services at the Hawai`i Institute of Geophysics and Planetology Introduction Three tiers of support are available from HIGP Computing Services. Described in detail below, they are summarized

More information

USER GUIDE CLOUDME FOR WD SENTINEL

USER GUIDE CLOUDME FOR WD SENTINEL USER GUIDE CLOUDME FOR WD SENTINEL Document 2013-11-17 Page 2 of 13 TABLE OF CONTENTS INTRODUCTION 2 Safe European Storage 2 How does this really work? 2 GETTING STARTED 3 Setting up an account 3 Setting

More information

Group Based Load Balancing Algorithm in Cloud Computing Virtualization

Group Based Load Balancing Algorithm in Cloud Computing Virtualization Group Based Load Balancing Algorithm in Cloud Computing Virtualization Rishi Bhardwaj, 2 Sangeeta Mittal, Student, 2 Assistant Professor, Department of Computer Science, Jaypee Institute of Information

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

The Load Balancing Strategy to Improve the Efficiency in the Public Cloud Environment

The Load Balancing Strategy to Improve the Efficiency in the Public Cloud Environment The Load Balancing Strategy to Improve the Efficiency in the Public Cloud Environment Majjaru Chandra Babu Assistant Professor, Priyadarsini College of Engineering, Nellore. Abstract: Load balancing in

More information

Designing a Data Solution with Microsoft SQL Server 2014

Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 22 June 2016 Designing a Data Solution with Microsoft SQL Server 2014 Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 5 days Course Description: The focus

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information