Sabita Kundu. Keywords: R&D libraries, Cloud Computing, Operational Expenditure, SaaS, IaaS, PaaS.
|
|
|
- Franklin Dorsey
- 10 years ago
- Views:
Transcription
1 Impact of cloud computing and Cost effectiveness in R&D libraries Sabita Kundu Batanagar Institute of Engineering, Management and Science Batanagar, Kolkata Abstract: Cloud Computing (CC) is a new technique of computing that is extensively used in today s industry as well as society or by Academic Scholar. After promotion in IT computing from traditional library, operational expenditure is a major concern. Started systems modeling, clustering, and virtualization with Cloud Computing reduces computing cost significantly for both small users and large enterprises. Due to a subscription-based service Cloud Computing can obtain networked storage space and computer resources. Cloud Computing enables operators a great advantage since it can extends service to external customers using Internet Technologies. Cloud services can be Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). The vision of using cloud computing in R&D libraries is to deliver library resources, services and expertise at the point of need, within user workflows. It can also create a powerful, unified presence for research libraries on the web and give user an indigenous facility, assembly group and comprehensive reach. This paper describes the current status of user models in R&D libraries through Cloud Computing. Keywords: R&D libraries, Cloud Computing, Operational Expenditure, SaaS, IaaS, PaaS. 1. Introduction: Use of modern technology in library has great relevance in the context of fourth law of Library Science. Save the time of the Reader/user, in which the internal efficiency of the Library develops. IT facilitates in every steps in library that means collection, storage, organization, processing analysis, presentation, and detonation availability of information in machine readable form and multi use of machine readable records by users for any number of time and users can access information irrespective of time and location of the information source. After promotion in IT computing from traditional library, have to face operational expenditure. It was started systems modeling, clustering, and virtualization with Cloud Computing. It has reduced computing cost significantly for both small users and large enterprises. Due to a subscription-based service it can obtain networked storage space and computer resources. This is a new technique of computing that is extensively used in today s industry as well as society or by academic scholar. It is a contemporary model of ICT and networking. The basic principle of cloud computing entails the reduction of in-house data centre s and the delegation of a portion or all of the information Technology infrastructure capability to others. The paper describes the current status of user models in R&D libraries. Then it proposed to improve current user service model with cloud computing. Cloud computing also explores some of the security issues surrounding data location, mobomility and availability and also explores the application of cloud computing in special libraries.
2 The notion of cloud computing obtain attention in 2006, when Amazon launched their new business. From the beginning of 2010 there was a recognizable upward trend in search queries for cloud computing. There are two types of clouds available. The data centre- hardware and software is what we will call a Cloud. When a cloud is made accessible in a pay-as-you-go manner to the general public, we call it a public Cloud; the service being sold is Utility Computing. We use term Private Cloud to refer to internet data centre of a business or other organization, not made available to the general public. Cloud Computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the data centers that provide those services 2. Cloud Computing technologies for libraries: Institute of higher learning such as colleges universities are the core of innovation throughout their advanced research and development. Subsequently, higher institutions may benefit greatly by harnessing the power of cloud computing. Cloud computing has large potential for libraries. Libraries may put more and more content into the cloud. This paper explores an overview of cloud computing, types and development models of cloud computing. It also discusses the application of cloud computing in libraries and some of the cloud computing initiatives taken over the globe. The establishment of shared public cloud can save manpower and material resources greatly among academic libraries. (T, 2012) However, by understanding the type of service offered by Cloud Computing, one begins to understand what this new approach is all about. There are following three main types of services that can be offered by the Cloud.
3 3. Cloud computing: an ICT innovation: In ICT domain, things change fast as the researchers all over world are constantly working on making life easier and more exciting making it most cost effective for users. The technological development is a constant process, a whole new breed of technologies are coming up to reform the ICT industry and other user. The flexibility of IT operations, tools and management would immensely expand the services naturally adapted for cloud environments. Hence, the next generation data centers are being designed differently. They are integrated, flexible and much more exposed to new technologies as it becomes available. The cloud has plenty of benefits for users apart from creativities. The basic idea is to assess cloud service for the library and also to present an overview on cloud computing models and its application for library services. Parallel Application Sequential Application Parallel Programming Environment Cluster Middleware (Single System Image and Availability Infrastructure) PC/Workstation PC/Workstation PC/Workstation PC/Workstation Communications Software Communications Software Communications Software Communications Software Network Interface Hardware Network Interface Hardware Network Interface Hardware Network Interface Hardware Cluster Interconnection Network/switch 4. A Basic Cluster Architecture: drawing architecture The basic architecture of a computer cluster over PCs has been posturized. Workstations are a simple cluster of computers built with commodity components and fully supported with desired SSI features and HA capability. The processing nodes are commodity workstations, PCs, or servers. These commodity nodes are easy to replace or upgrade with new generations of hardware. The node operating systems should be designed for multiuser, multitasking, and multithreaded applications. The nodes are interconnected by one or more fast commodity networks. These networks use standard communication protocols and operate at a speed that
4 should be two orders of magnitude faster than that of the current TCP/IP speed over Ethernet. (H. 2012) The network interface card is connected to the node s standard I/O bus (e.g., PCI). When the processor or the operating system is changed, only the driver software needs to change. We desire to have a platform-independent cluster operating system, sitting on top of the node platforms. But such a cluster OS is not commercially available. Instead, we can deploy some cluster middleware to glue together all node platforms at the user space. An availability middleware offers HA service. An SSI layer provides a single entry point, a single file hierarchy, a single point of control, and a single job management system. Single memory may be realized with the help of the compiler or a runtime library. A single process space is not necessarily supported. An idealized cluster for supports: In general, an idealized cluster is supported by three subsystems. First, conventional databases and OLTP monitors offer users a desktop environment in which to use the cluster. In addition to running sequential user programs, the cluster supports parallel programming based on standard languages and communication libraries using PVM, MPL, or Open MP. The programming based environment also includes tools for debugging, profiling, monitoring, and so forth. A user interface subsystem in needed to combine the advantage of the web interface and the Windows GUI. It should also provide user-friendly links to various programming environments, job management tools, hypertext, and search support so that users can easily get help in programming the computer cluster. (CUDA, 2014) Cloud providers will create their own APIs (application programming interfaces) so that software developers can use them to create client applications in order to access that functionality. Currently, some of those API are proprietary; an issue which will be revisited later when examining some of the limitations of cloud computing. 5. Cloud computing in R&D Library: For application of cloud technology, librarians need to know the use of cloud infrastructure, cloud applications and developing and deploying applications into a cloud environment. Application of CC for libraries will increase the efficiency and opportunity for collaboration, decrease in-house technical expertise, cost reduction, data security, privacy, and ownership, long term stability. Libraries have been adopting cloud based solutions for different services including storage or data back-up services, electronic journal access management, library bibliographic database, institutional repositories and digital libraries, knowledge management, mobile applications, E-learning, statistics tracking, Integrated Library System (LIS) hosting and cloud - based sharing applications. 6. Cloud services are modular: Cloud services are modular; library can pick and choose one or two cloud services for less perceptive computing needs and keeps the rest in-house until they are more contented with the prospect. With could-based computing, work done in one place and amenities are available to all
5 from anywhere. When library resources are stored in the cloud it offers several benefits. Universal data can be easily shared surrounded by library users. The need for local storage, maintenance and backups is eliminated. And the end libraries can achieve web scale when they extremely aggregate data and users, something a cloud environment makes possible. Another great benefit of resources stored in the cloud is the opportunity for collaboration and cooperative intelligence. Library can agree to share pools of data for cooperative collection building, cooperative cataloguing, cooperative preservation or digitization, cooperative sharing of materials etc. 6.1 Infrastructure as a Service (IaaS): Product offered via this mode includes the remote delivery (through the Internet) of a full computer infrastructure (e.g., virtual computers, service, storage device, etc.) IaaS in R&D Library: libraries have started jumping on board with new style of computing and have been adopting laas to host their websites and store their data, to alleviate IT departments, and increase efficiency. IaaS environments allow users to provision servers, storage space, and networking components to meet their computing needs in an IaaS environment, the organization is responsible for starting and sizing a server & managing its network access. (P,2012.) 6.2 Platform as a Service (PaaS): To understand Cloud Computing layer one needs to remember the traditional computing model where each application managed locally required hardware, an operating system, a database middleware, web servers, and other software. One also needs to remember the team of network, database, and system management experts that are needed to keep everything up and running. With cloud computing, these services are now provided remotely by cloud providers under this layer PaaS in R&D Library: Libraries are beginning to develop using the services to easily create their own Webbased and mobile applications without having to create the infrastructure for a development environment within their libraries. PaaS solutions focus on providing a hosted platform on which a specific application can be deployed. This platform is often some provisioned space and computing resources from a hosting company running a pre-configured set of tools. Organizations can deploy a locally developed or managed application on the platform but do not manage the underlying server infrastructure. (P,2012.) 6.3. Software as a Service (SaaS): Under this layer, applications are delivered through the medium of the internet as a service. Instead of installing and maintaining software, we simply access it via Internet, freeing ourselves from complex software and hardware management. This type of cloud server offers a complete application functionality that ranges from productivity (e.g. office-type) applications to programs such as those for Customer Relationship management (CMR) SaaS in R&D Library: Libraries are making use of both user and business grade cloud applications to provide new services to patrons, market the library, save money as cost effective by replacing traditional
6 software products, collaborate with staff, much more. In a SaaS environment, organizations use an application via a hosted service. They do not have access to the underlying infrastructure, and are not responsible for managing the underlying software. A common R&R library example is electronic journal subscription systems. (P, 2012.) 7. Reduce Cost than traditional IT Computing: In traditional IT computing, users must acquire their own computer and peripheral equipment as capital expenses. In addition, they have to face operational expenditures in operating and maintaining the computer systems, including personnel and service cost. Figure 1 shows the addition of variable operational cost on top of fixed capital investments in traditional IT. Where the fixed cost is the main cost, and that could be reduced slightly as the number of users increases. However, the operational cost may increase sharply with a larger number of users. Therefore, the total cost escalates quickly with massive number of users. On the other hand, cloud computing applies a pay-per-use business model, in which user jobs are outsourced to data centers. (C. 2010) Figure: 1 Overall, cloud computing will reduce computing costs significantly for both small users and large enterprises. Computing economics does show a big gap between traditional IT users and cloud users. The savings in acquiring expensive computers up front releases a lot of burden for startup libraries. The fact that cloud users only pay for operational expenses and do not have to invest in permanent equipment is especially attractive to massive numbers of small users. This is a major driving force for cloud computing to become appealing to most enterprises and heavy computer users. In fact, any IT users whose capital expenses are under more pressure thn their operational expenses should consider sending their overflow work to utility computing or cloud service providers. (C. 2010).
7 8. Basic Cloud Security: Three basic cloud security enforcements are expected. First, facility security in data in data centers demands on-site security year round. Biometric readers, CCTV (close-circuit TV), motion detection, and man traps are often deployed. Also, network security demands faulttolerant external firewalls, intrusion detection systems (IDSes), and third -party vulnerability assessment. Finally, platform security demands SSL and data decryption, strict password policies, and system trust certification. In the mapping of cloud models, a special security measures are deployed at various cloud operating levels. Servers in the cloud can be physical machines or VMs. User interface are applied to request services. The provisioning tool carves out the systems from the cloud to satisfy the requested service. A security-aware cloud architecture demands security enforcement. Malwarebased attacks such as network worms, viruses, and DDoS attacks exploit system vulnerabilities. These attacks compromise system functionality or provide intruders unauthorized access to critical information. (H, 2010) Thus, security defense are needed to protect all cluster servers and data centers. Here are some cloud components that demands special security protection: a) Protection of servers from malicious software attacks such as worms, viruses, and malware. b) Protection of hypervisors or VM monitors from software-based attacks and vulnerabilities. c) Protection of VMs and monitors from service disruption and DoS attacks. d) Protection of data and information from theft, corruption, and natural disasters. e) Providing authenticated and authorized access to critical data and service. 9. The new workflows for LIS create by cloud computing: Cloud Computing offers the opportunity for a cooperative platform for libraries to build on. They are four key principles of a cooperative platform:- Directness, means the services and data are made available to support greater inters operability, not only cloud services, but also with within and between library developed and third party applications; Extensibility means the platform can easily accommodate the addition of new services and applications, developed either by the service provider or by member of the community; Data prosperity, means library can interact with and expose a wide variety of information about purchased, licensed, and digital content through this platform; and Teamwork, means libraries can harness the collective power of the community of libraries to innovate and share solutions 10. Advantage of Cloud Computing in R&D Library: Cloud Computing is very helpful in resource sharing in between libraries.
8 10.1 Space Sharing: A Common Scheme is to assign higher priorities to short, interactive job in daytime and during evening hours using tiling. In this space-sharing mode, multiple jobs can run on disjointed partitions (groups) of nodes simultaneously. At most, one process is assigned to a node at a time. Although a partition of nodes is dedicated to job, and the I/O subsystem may be shared by all jobs. Space Sharing must solve the tilling problem and the large-job problem. (H, 2012) 10.2 Time Sharing: In the dedicated or space-sharing model, only one user process is allocated to a node. However, the system processes or daemons are still running on the same node. In the timesharing mode, multiple user processes are assigned to the node. Time sharing introduces the following parallel scheduling policies. (H, 2012) Load Sharing Facility (LSF) for Cluster Computing: LSF is a commercial workload management system from Platform Computing. LSF emphasizes job management and load sharing on both parallel and sequential jobs. In addition, it supports cheek pointing, availability, load migration, SSI. LSF is highly scalable and can support a cluster of thousands of nodes. LSF has been implemented for various UNIX and Windows/NT platforms. Currently, LSF is being used not only in clusters but also in grids and clouds. (H, 2012) 11. Challenge 2 Data Privacy and Security Concerns: Current cloud offerings are essentially public (rather than private) networks, exposing the system to more attacks. Many obstacles can be overcome immediately with well-understood technologies such as encrypted storage, virtual LANs, and network middle boxes (e.g., firewalls, packet filters). For example you could encrypt your data before placing it in a cloud. Many nations have laws requiring SaaS providers to keep customer data and copyrighted material within national boundaries. Traditional network attacks include buffer overflows, DoS attacks, spyware, malware, rootkits, Trojan horses, and worms. In a cloud environment, newer attacks may result from hypervisor malware, guest hopping and hijacking, or VM rootkits. Another type of attack is the man-in-the-middle attack for VM migrations. In general, passive attacks steal sensitive data or passwords. Active attacks may manipulate kernel data structures which will cause major damage to cloud servers. We will study all of these security and privacy problems on clouds. (T, 2009) 12. Conclusion: India already has over 200 million internet users and every month add 4 million new ones. By the end of 2015, India will have more internet user than the United States. It is promising market for Indian R&D Libraries. The internet is making it cheaper than ever to efficiently market to new customers, both within India and abroad. And increase the user of libraries means R&D
9 Libraries. The cloud / grid systems provide latest developments; explain how to create highperformance cluster, scalable networks, automated data centers and high-throughput. References: 1. Distributed and Cloud Computing: from parallel processing to the internet of thing by Kai Hwang; Geoffrey C. Fox; Jack J. Dongarra of London: Elsvier, Understanding the Cloud Computing by Sunil Tyagi in the Proceeding Innovative Challenges in Information Services National Seminar conducted by Dept. of Library of University of Jammu held on March Using cloud computing in Libraries by O.S.S. in the Proceeding Innovative Challenges in Information Services National Seminar conducted by Dept. of Library of University of Jammu held on March T. Chou, Introduction to Cloud Computing: Business and Technology, Active Book Press, T. Mather, et al., Cloud Security and Privacy: An Enterprise Perspective on Risk and Compliance, O Reilly Media, Inc., K.Hwang, & D. Li, Trusted cloud computing with secure resources and data coloring, IEEE Internet Comput. (2010) 7. IBM, 8. wikipedia. access 15/07/14
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Distributed and Cloud Computing
Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 3: Virtual Machines and Virtualization of Clusters and datacenters Adapted from Kai Hwang University of Southern California March
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise
Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise Introducing Unisys All in One software based weather platform designed to reduce server space, streamline operations, consolidate
Introduction to grid technologies, parallel and cloud computing. Alaa Osama Allam Saida Saad Mohamed Mohamed Ibrahim Gaber
Introduction to grid technologies, parallel and cloud computing Alaa Osama Allam Saida Saad Mohamed Mohamed Ibrahim Gaber OUTLINES Grid Computing Parallel programming technologies (MPI- Open MP-Cuda )
Data Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
Cloud Computing Services In Libraries: An Overview
9 th Convention PLANNER 2014 Cloud Computing Services In Libraries... Cloud Computing Services In Libraries: An Overview Shekar HP Muttayya Konganurmath Abstract The purpose of this paper is to provide
Ch. 4 - Topics of Discussion
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 6 Cloud Platform Architecture over Virtualized Data Centers Part -4 Cloud Security and Trust Management Text Book: Distributed
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Distributed RAID Architectures for Cluster I/O Computing. Kai Hwang
Distributed RAID Architectures for Cluster I/O Computing Kai Hwang Internet and Cluster Computing Lab. University of Southern California 1 Presentation Outline : Scalable Cluster I/O The RAID-x Architecture
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity
. White Paper The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity The cloud computing phenomenon is generating a lot of interest worldwide because of its potential to offer services
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
CLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
Chapter 1: Operating System Models 1 2 Operating System Models 2.1 Introduction Over the past several years, a number of trends affecting operating system design are witnessed and foremost among them is
Security Analyzing in UNIX for Cloud Computing Environment
Security Analyzing in UNIX for Cloud Computing Environment Yashwant Singh Chouhan 1, Makhan Kumbhkar 2 1 Professor, Dept. of Comp Science & Elex, Devi Ahilya Vishwavidyalaya, Indore, MP, India 2 Assistant
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
Cluster, Grid, Cloud Concepts
Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Virtual Machines. www.viplavkambli.com
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
Securing Cloud using Third Party Threaded IDS
Securing Cloud using Third Party Threaded IDS Madagani Rajeswari, Madhu babu Janjanam 1 Student, Dept. of CSE, Vasireddy Venkatadri Institute of Technology, Guntur, AP 2 Assistant Professor, Dept. of CSE,
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
Cloud Computing and Business Intelligence
Database Systems Journal vol. V, no. 4/2014 49 Cloud Computing and Business Intelligence Alexandru Adrian TOLE Romanian American University, Bucharest, Romania [email protected] The complexity of data
CLOUD COMPUTING. When It's smarter to rent than to buy
CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
SERVER 101 COMPUTE MEMORY DISK NETWORK
Cloud Computing ก ก ก SERVER 101 COMPUTE MEMORY DISK NETWORK SERVER 101 1 GHz = 1,000.000.000 Cycle/Second 1 CPU CYCLE VIRTUALIZATION 101 VIRTUALIZATION 101 VIRTUALIZATION 101 HISTORY YEAR 1800 YEARS LATER
Expert Reference Series of White Papers. Understanding Data Centers and Cloud Computing
Expert Reference Series of White Papers Understanding Data Centers and Cloud Computing 1-800-COURSES www.globalknowledge.com Understanding Data Centers and Cloud Computing Paul Stryer, Global Knowledge
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
Cloud Computing Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered
Secure your Virtual World with Cyberoam
White paper Secure your Virtual World with Cyberoam www.cyberoam.com Virtualization The Why and the What... Rising Data Center costs... Ever-increasing demand for data storage... Under-utilized processors...
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014
An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology [email protected] Abstract. Cloud computing promises to increase the velocity
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
Solutions as a Service N.Konstantinidis Technical Director - MNG
Med Nautilus Greece Connected World April 10, 2014 Solutions as a Service N.Konstantinidis Technical Director - MNG MedNautilus Greece Solutions as a Service 2014 SINCE 2002 Data Center Physical Colocation
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Open-E Data Storage Software and Intel Modular Server a certified virtualization solution
Open-E Data Storage Software and Intel Modular Server a certified virtualization solution Contents 1. New challenges for SME IT environments 2. Open-E DSS V6 and Intel Modular Server: the ideal virtualization
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
Optimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
How To Understand Cloud Computing
Cloud Computing Today David Hirsch April 2013 Outline What is the Cloud? Types of Cloud Computing Why the interest in Cloud computing today? Business Uses for the Cloud Consumer Uses for the Cloud PCs
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Sistemi Operativi e Reti. Cloud Computing
1 Sistemi Operativi e Reti Cloud Computing Facoltà di Scienze Matematiche Fisiche e Naturali Corso di Laurea Magistrale in Informatica Osvaldo Gervasi [email protected] 2 Introduction Technologies
Demystifying Cloud Computing Graham McLean
Whitepaper Demystifying Cloud Computing Graham McLean Link-Connect Services Ltd Frensham House Farnham Business Park Weydon Lane, Farnham Surrey, GU9 8QT Page 1 LC-CC White Paper (V1.3) April 2014 Page
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Analysis of Cloud Computing Vulnerabilities
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 308-312 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
How to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist
Private Cloud Database Consolidation with Exadata Nitin Vengurlekar Technical Director/Cloud Evangelist Agenda Private Cloud vs. Public Cloud Business Drivers for Private Cloud Database Architectures for
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Survey on Security Attacks and Solutions in Cloud Infrastructure
Survey on Security Attacks and Solutions in Cloud Infrastructure Shilpa D 1, Nagashree C 2, Divya C 3, Spurthi G S 4 Assistant Professor, Department of Computer Science and Engineering, SVIT, Bangalore,
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
, pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.
CLOUD COMPUTING INTRODUCTION HISTORY
1 CLOUD COMPUTING INTRODUCTION 1. Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from
DISTRIBUTED SYSTEMS AND CLOUD COMPUTING. A Comparative Study
DISTRIBUTED SYSTEMS AND CLOUD COMPUTING A Comparative Study Geographically distributed resources, such as storage devices, data sources, and computing power, are interconnected as a single, unified resource
E-LEARNING DEVELOPMENT AS PUBLIC INFRASTRUCTURE OF CLOUD COMPUTING
E-LEARNING DEVELOPMENT AS PUBLIC INFRASTRUCTURE OF CLOUD COMPUTING 1 DANNY MANONGGA, 2 WIRANTO HERRY UTOMO, 3 HENDRY 1 Information System Department, Satya Wacana Christian University 2 Information System
COM 444 Cloud Computing
COM 444 Cloud Computing Lec 3: Virtual Machines and Virtualization of Clusters and Datacenters Prof. Dr. Halûk Gümüşkaya [email protected] [email protected] http://www.gumuskaya.com Virtual
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything
Efficient Cloud Management for Parallel Data Processing In Private Cloud
2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Efficient Cloud Management for Parallel Data Processing In Private
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud
Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud 1 S.Karthika, 2 T.Lavanya, 3 G.Gokila, 4 A.Arunraja 5 S.Sarumathi, 6 S.Saravanakumar, 7 A.Gokilavani 1,2,3,4 Student, Department
New Security Perspective for Virtualized Platforms
, July 3-5, 2013, London, U.K. New Security Perspective for Virtualized Platforms Abdelmajid Lakbabi, Said El hajji, Ghizlane Orhanou, Kaouthar Chetioui Abstract Recently, an important transition in IT
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
