Sunteți pe pagina 1din 10

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.

ORG

126

Measurement and collation overriding traits of computer networks and ascertainment consequential exclusivities of cloud computing by the means of Bucy filtering
Pariya Shahbazi1, Mehdi Darbandi2, Saeed Setayesh3*, Mohsen Kariman Khorasani4
1

Department of Information and Communication Technology at University of Agder (UiA); Grimstad, Norway 2 Iran University of Science and Technology (IUST); Tehran, Iran 3 International Branch of Ferdowsi University of Mashhad , Iran 4 Department of Communication Engineering, Islamic Azad University, Gonabad Branch, Gonabad, Iran (*corresponding author: Saeed Setayesh)
I. INTRODUCTION The term Cloud has become commonplace in discussions on IT provision but what is actually meant by the Cloud? In crude terms it can be taken to mean any computing provision provided by an external supplier over a network this could be simple external hosting of an application, could be use of external services for a particular task, or it could be something rather more complicated, which allows an organization to grow and contract the resources it uses according to business needs. Cloud computing is an emerging commercial infrastructure paradigm that promises to eliminate the need for maintaining expensive computing facilities by companies and institutes alike. Through the use of virtualization and resource time sharing, clouds serve with a single set of physical resources a large user base with different needs. Thus, clouds have the potential to provide to their owners the benefits of an economy of scale and, at the same time, become an alternative for scientists to clusters, grids, and parallel production environments. However, the current commercial clouds have been built to support web and small database workloads, which are very different from typical scientific computing workloads. Moreover, the use of virtualization and resource time sharing may introduce significant performance penalties for the demanding scientific computing workloads. Currently, the cloud computing is hot research both in scholars and enterprise, because of its good features such as low investment, easy maintenance, Flexibility and fast deployment, reliable service. But to truly implement cloud computing, we need to gradually improve it in academic, legal and institutional. Especially, the issue of trust is one of the biggest obstacles for the development of cloud computing. Cloud Computing holds tremendous potential for missions across the National Aeronautics and Space Administration. Several flight missions are already benefiting from an investment in cloud computing for mission critical pipelines and services through faster processing time, higher availability, and drastically lower costs available on cloud systems. However,

AbstractCloud computing has become one of the key


considerations both in academia and industry. Cheap, seemingly unlimited computing resources that can be allocated almost instantaneously and pay-as-you-go pricing schemes are some of the reasons for the success of Cloud computing. The Cloud computing landscape, however, is plagued by many issues hindering adoption. One such issue is vendor lock-in, forcing the Cloud users to adhere to one service provider in terms of data and application logic. Semantic Web has been an important research area that has seen significant attention from both academic and industrial researchers. One key property of Semantic Web is the notion of interoperability and portability through high level models. Significant work has been done in the areas of data modeling, matching, and transformations. The issues the Cloud computing community is facing now with respect to portability of data and application logic are exactly the same issue the Semantic Web community has been trying to address for some time. With the increasing demand and benefits of cloud computing infrastructure, real time computing can be performed on cloud infrastructure. A real time system can take advantage of intensive computing capabilities and scalable virtualized environment of cloud computing to execute real time tasks. In most of the real time cloud applications, processing is done on remote cloud computing nodes. So there are more chances of errors, due to the undetermined latency and lose control over computing node. On the other side, most of the real time systems are also safety critical and should be highly reliable. So there is an increased requirement for fault tolerance to achieve reliability for the real time computing on cloud infrastructure. In this

paper, at first we consider significant influences of this technology on some of the biggest companies and organizations all over the world, after that we present simple definitions of Kalman-Bucy filter, after simple definition we present its principle mathematical relations and finally we demonstrate our idea by enough mathematic proofs. With use of this filter we are able to estimate an predict the presence of hackers or spyware actions, and also were able to estimate and predict which part of cloud resources were used more than others or even estimate the peak hour of such networks or estimate and predict the next profile or page that the user may used in the next time step; so that by knowing such information were able to implement and construct our databases more precisely.

Keywords-

Cloud revolution, technology, intensification of security.

Information

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

127

these processes do not currently extend to general scientific algorithms relevant to earth science missions. The members of the Airborne Cloud Computing Environment task at the Jet Propulsion Laboratory have worked closely with the Carbon in Arctic Reservoirs Vulnerability Experiment (CARVE) mission to integrate cloud computing into their science data processing pipeline. In the cloud computing, due to users directly use and operate the software and OS, and even basic programming environment and network infrastructure which provided by the cloud services providers, so the impact and destruction for the software and hardware cloud resources in cloud computing are worse than the current Internet users who use it to share resources. Therefore, that whether user behavior is trusted, how to evaluate user behavior trust is an important research content in cloud computing. mainly discusses evaluation importance of user behavior trust and evaluation strategy, in the cloud computing, including trust object analysis, principle on evaluating user behavior trust, basic idea of evaluating user behavior trust, evaluation strategy of behavior trust for each access, and long access, which laid the theoretical foundation about trust for the practical cloud computing application. Media content has become the major traffic of Internet and will keep on increasing rapidly. Various innovative media applications, services, devices have emerged and people tend to consume more media contents. We are meeting a media revolution. But media processing requires great capacity and capability of computing resources. Meanwhile cloud computing has emerged as a prosperous technology and the cloud computing platform has become a fundamental facility providing various services, great computing power, massive storage and bandwidth with modest cost. The advances in technologies of cloud computing and mobile computing enable the newly emerging mobile cloud computing paradigm. Three approaches have been proposed for mobile cloud applications: 1) extending the access to cloud services to mobile devices; 2) enabling mobile devices to work collaboratively as cloud resource providers; 3) augmenting the execution of mobile applications on portable devices using cloud resources. Cloud computing is the biggest buzz in the computer world these days -- maybe too big of a buzz. Cloud computing means different things to different people. Cloud computing is not a small, undeveloped branch of IT. Research firm IDC thinks that cloud computing will reach $42 billion in 2012. You can do everything on cloud from running applications to storing data offsite. You can run entire operating systems on the cloud.

Computing is being transformed to a model consisting of services that are commoditized and delivered in a manner similar to utilities such as water, electricity, gas, and telephony. In such a model, users access services based on their requirements without regard to where the services are hosted. Several computing paradigms have promised to deliver this utility computing vision and they include Grid computing, P2P computing, and more recently Cloud computing. The latter term denotes the infrastructure as a Cloud in which businesses and users are able to access applications from anywhere in the world on demand. Cloud computing delivers infrastructure, platform, and software (application) as services, which are made available as subscription-based services in a pay-asyou-go model to consumers. These services in industry are respectively referred to as Infrastructure as a Service (Iaas), Platform as a Service (PaaS), and Software as a Service (SaaS). To realize Cloud computing potential, vendors such as Amazon, Google, Microsoft, and IBM are starting to create and deploy Clouds in various locations around the world. In addition, companies with global operations require faster response time, and thus save time by distributing workload requests to multiple Clouds in various locations at the same time. This creates the need for establishing a computing atmosphere for dynamically interconnecting and provisioning Clouds from multiple domains within and across enterprises. There are many challenges involved in creating such Clouds and Cloud interconnections. Cloud computing is the next stage in evolution of the internet, which provides large amount of computing and storage to customers provisioned as a service over the internet. However, cloud computing facing so many security challenges due to the possible compromise or byzantine failures. Cloud Computing is an emerging computing paradigm. It shares massively scalable, elastic resources (e.g., data, calculations, and services) transparently among the users over a massive network. The Cloud market is growing rapidly and bringing up numerous research challenges. Cloud computing has gained significant attention of industry and academic sectors which are interested in adopting or experimenting with this technology. An increasing number of companies are expected to migrate their systems to cloud enabled infrastructures. However, there has not been much attention paid to provide sufficient process support. Since migration projects are likely to encounter several kinds of challenges, it is important to identify and share the process and logistical requirements of migration projects in order to build a body of knowledge of appropriate process, methods, and tools.

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

128

In recent years, cloud computing has gradually become the mainstream of Internet services. When cloud computing environments become more perfect, the business and user will be an enormous amount of data stored in the remote cloud storage devices, hoping to achieve random access, data collection, reduce costs, and facilitate the sharing of other services. However, when the data is stored in the cloud storage device, a long time, enterprises and users inevitably will have security concerns, fearing that the information is actually stored in the cloud is still in the storage device or too long without access to, has long been the cloud server removed or destroyed, resulting in businesses and users in the future can't access or restore the data files. Semantic Computing extends Semantic Web both in breadth and depth. It bridges, and integrates, technologies such as software engineering, user interface, natural language processing, artificial intelligence, programming language, grid computing and pervasive computing, among others, into a complete and unified theme. Cloud Computing, the dream of computing as a utility, shifts user programs and data from personal computers to the clouds, providing all kinds of resources over the Internet as services to customers and letting customers pay for them in a way much like they pay for traditional utilities such as electricity. Cloud computing is a fast growing field which is arguably a new computing paradigm. In cloud computing, computing resources are provided as services over the Internet and users can access resources on based on their payments. Cloud Computing offers application developers an abstract view of computational resources that can be provisioned on demand over a computer network. This model allows organizations to concentrate on the applications needed to support their core business, instead of having to manage the infrastructure required to run those applications. Yet, even though this approach promises very compelling benefits, there is still a lack of programming models capable of bringing the power of parallel programming into the hands of ordinary programmers. Cloud computing systems (or hosting datacenters) have attracted a lot of attention in recent years. Utility computing, reliable data storage, and infrastructureindependent computing are example applications of such systems. Electrical energy cost of a cloud computing system is a strong function of the consolidation and migration techniques used to assign incoming clients to existing servers. Moreover, each client typically has a service level agreement (SLA), which specifies constraints on performance and/or quality of service that it receives from the system. These constraints result in a basic trade-off between

the total energy cost and client satisfaction in the system. Cloud computing has its root deep into ground and in the market. The evolution of cloud computing is one of the major advances in the computing area as well as in economics of using computing. There are three major technologies which represent cloud computing: Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (Iaas). Cloud computing is getting popular and IT giants such as Google, Amazon, Microsoft, IBM have started their cloud computing infrastructure. However, current cloud implementations are often isolated from other cloud implementations. Cloud computing is a way of computing, via the Internet, that broadly shares computer resources instead of using software or storage on a local PC. Cloud computing is an outgrowth of the ease-of-access to remote computing sites provided by the Internet. Instead of installing a suite of software for each computer, we'd only have to load one application. That application would allow workers to log into a Webbased service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to complex data analysis programs. It's called cloud computing, and it could change the entire computer industry. In a cloud computing system, there's a significant workload shift. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Hardware and software demands on the user's side decrease. The only thing the user's computer needs to be able to run is the cloud computing systems interface software, which can be as simple as a Web browser, and the cloud's network takes care of the rest. Casemix system is a disease classification system which is developed as a tool to enhance quality and efficiency of healthcare services. The system utilized routinely available information in healthcare settings as the minimum dataset. The UNU-IIGH has devised the UNU Casemix Grouper that is currently being used as the casemix grouping engine in a number of developing countries. In the next stage of development, UNU-IIGH plans to deploy the system using the cloud computing platform. The term cloud computing denotes the use of Internet-based computers for a variety of computing application services known as Software as a Service (SaaS). As definitions evolve and refine, cloud computing now implies the move away from centralized computing applications into remote applications running in a cloud of computers. Users of cloud computing are not concerned with the inner workings of the remote

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

129

application and only see and use the services being requested, without control of the technology infrastructure to make it happen. It is envisaged that through cloud computing, the users of the UNU Casemix Grouper will not be overburdened with the initial capital cost for the infrastructure development required for using the casemix grouper. With cloud architecture, the UNU grouper would be able to support the implementation of casemix system to a wider audience especially in developing countries with limited local IT infrastructure. This will ensure that developing countries with limited development budget and basic IT infrastructure has access to much-needed tools like casemix grouper; as well as introduce much needed financial efficiency and clinical quality to their healthcare system. Conventional power system computing platforms in computation, storage, information integration and analysis, and then puts forward a deficiency based on cloud computing power system computing platforms. Firstly summarizes computing clouds of the basic concepts and main characteristics, and compared the cloud computing and another large-scale distributed computing model - Grid Computing. From a physical composition, system structure, software technology power system is discussed in detail the realization of cloud computing platforms. Later, and looks forward to the computing clouds in the power system security analysis, tide and optimization calculation, the system restore, trend monitoring, dispatching, reliability analysis and other areas of application prospect. Finally, the power system cloud computing research is discussed in several important problems to be solved. Cloud Computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing systems can be easily threatened by various cyber attacks, because most of Cloud Computing systems provide services to so many people who are not proven to be trustworthy. Therefore, a Cloud Computing system needs to contain some Intrusion Detection Systems (IDSs) for protecting each Virtual Machine (VM) against threats. In this case, there exists a tradeoff between the security level of the IDS and the system performance. If the IDS provide stronger security service using more rules or patterns, then it needs much more computing resources in proportion to the strength of security. So the amount of resources allocating for customers decreases. Another problem in Cloud Computing is that, huge amount of logs makes system administrators hard to analyze them. With the development of 3G network and internet technology, the rapid upgrading of internet users. It is a trend that IPv6 supersedes IPv4 and the optical network becomes more widely. Integrating a number of hotspot advanced technologies; the wireless

broadband application system for IPV6 optical network cloud computing is a novel system with practical research importance. The cloud computing platform using IPV6 based optical fiber, building wireless broadband local area network using wireless AP, 3G wireless wide area network, connection between wireless broadband network and optical network cloud computing platform to form the IPV6based optical network cloud computing wireless broadband system; based on this system, the mobile application system for cloud computing can be developed using Android platform. Using distributed storage technology to design corresponding system storage algorithm to store data in the cloud computing system; construction of corresponding data query algorithms to query the system results via parallel processing technology. Security is considered to be one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of information stored in the cloud and also because the management of the data might not be fully trustworthy. The risk of malicious insiders in the cloud and the failing of cloud services have received a strong attention by companies. Security brings in concerns for data confidentiality, in addition to integrity and availability. Security has the characteristics of a complement to reliability. The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shifts individual computing "from being device-centric to information-centric", which create a bridge between operating system-based computing and the more service-oriented approach to IT. Also, the mobile thin-client has brought mobility to cloud computing. The main difference between cloud computing and traditional enterprise internal IT services is that the owner and the user of cloud IT infrastructures are separated in cloud. This change requires a security duty separation in cloud computing. Cloud service providers (CSP) should secure the services they offer and cannot exceed the customers' authorities. Currently, no traditional information security products can meet this requirement. A multi-tenancy trusted computing environment model (MTCEM) is designed for IaaS delivery model, and its purpose is to assure a trusted cloud infrastructure to customers. MTCEM presents a dual level transitive trust mechanism and supports a security duty separation function simultaneously. With MTCEM, CSP and customers can cooperate to build and maintain a trusted cloud computing environment. MTCEM can be used to improve customers' confidence on cloud computing. The prototype of MTCEM shows that it has low

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

130

impact on system performance and it is technically and practically feasible. Mobile software, helped by the astonishing success from Apple iPhone's debut to Google Android's follow-up, has become a new and hot growth area in the software computing industry. From a software engineering point of view, cloud computing with Service Oriented Architecture (SOA) is a potential paradigm shift following the major paradigm shift from mainframe based computing to client-server computing in the early 1980s. The attention the IT community has given cloud computing recently rivals that given to American Idol judges by the public. This magazine alone dedicated its March/April 2009 issue and significant other space throughout the year to the topic. Cloud computings potential lies not only in the evolution of technology but also in a sourcing strategy that uses resources shared by increasingly larger volumes of users. Further potential lies in the commoditization of cloud computing services - that is, a market in which price primarily differentiates cloud computing services. Although the entire IT community will need to address significant challenges, the result will be decreased prices, increased numbers of services, and improved performance not only in the near term but also the longer term. The result should be a decade or more in which cloud computing providers and users all benefit from future technology advancements, cloud efficiencies, and market competition. In response to the as to whether cloud computing is just the same old IT packaged in a new bottle, or is it really new wine? The authors believe that not only is it new wine, but one of a vintage that will improve with maturity. Today, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. In this new world of computing, users are universally required to accept the underlying premise of trust. Within the cloud computing world, the virtual environment lets users access computing power that exceeds that contained within their own physical worlds. Typically, users will know neither the exact location of their data nor the other sources of the data collectively stored with theirs. The data you can find in a cloud ranges from public source, which has minimal security concerns, to private data containing highly sensitive information (such as social security numbers, medical records, or shipping manifests for hazardous material). Does using a cloud environment alleviate the business entities of their responsibility to ensure that proper security measures are in place for both their data and applications, or do they share joint responsibility with service providers? The answers to this and other questions lie within the realm of yet-tobe-written law. As with most technological advances,

regulators are typically in a "catch-up" mode to identify policy, governance, and law. Cloud computing presents an extension of problems heretofore experienced with the Internet. To ensure that such decisions are informed and appropriate for the cloud computing environment, the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods. The competitive market drives Telecom Operators to reduce the CAPEX (CAPital EXpenditure) and OPEX (Operational EXpenditure). The emerging Cloud Computing provides cheaper, easier to deploy and pay as you use model by using commodity computers. It provides the possibility to take over the workload on expensive dedicated hardware. But some of Telecom Network workload is latency sensitive of which current geographical distributed Cloud is incapable. Cloud computing is a disruptive technology with profound implications not only for Internet services but also for the IT sector as a whole. Its emergence promises to streamline the on-demand provisioning of software, hardware, and data as a service, achieving economies of scale in IT solutions' deployment and operation. This issue's articles tackle topics including architecture and management of cloud computing infrastructures, SaaS and IaaS applications, discovery of services and data in cloud computing infrastructures, and cross-platform interoperability. Still, several outstanding issues exist, particularly related to SLAs, security and privacy, and power efficiency. Other open issues include ownership, data transfer bottlenecks, performance unpredictability, reliability, and software licensing issues. Finally, hosted applications' business models must show a clear pathway to monetizing cloud computing. Several companies have already built Internet consumer services such as search, social networking, Web email, and online commerce that use cloud computing infrastructure. Above all, cloud computing's still unknown "killer application" will determine many of the challenges and the solutions we must develop to make this technology work in practice. In recent years, the rapid advancement of the Internet and the growing number of people using social networking services (SNSs) has facilitated the sharing of multimedia data. However, multimedia data processing techniques such as transcoding and transmoding impose a considerable burden on the computing infrastructure as the amount of data increases. Cloud computing has been build upon the development of distributed computing, grid computing and virtualization. Since cost of each task in cloud resources is different with one another, scheduling of user tasks in cloud is not the same as in traditional scheduling methods.

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

131

Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources, reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. Cloud computing has been a topic of keen interest in recent years, having been referred to as "the emerging paradigm for the last five years", "the most promising computational platform" and "the prevailing technique for next ten years". There has been a lot of discussion as to what new opportunities it can bring to markets, what benefits it can offer, and what system development possibilities it enables for software development. Cloud Computing has been envisioned as the nextgeneration architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses low-power hosts to achieve high usability. The cloud computing refers to a class of systems and applications that employ distributed resources to perform a function in a decentralized manner. Cloud computing is to utilize the computing resources (service nodes) on the network to facilitate the execution of complicated tasks that require largescale computation. Thus, the selecting nodes for executing a task in the cloud computing must be considered. Cloud computing technology has been looked upon as the next-generation architecture of IT solution. It enables the users to move their data and application software to the network which is different from traditional solutions. Due to this IT services are not under logical, physical and users' controls, it brings many new different security challenges. Ensuring data storage security is one more urgent of them. The representative network architecture for cloud data storage includes a third party auditor which affords trustful authentication for user to operate their data security in cloud. The integration of cloud computing and media processing is therefore a natural choice for both of them, and hence comes forth the media cloud. Recently, technology of cloud computing has been rapidly developed, and it is expected to apply for various network services. Virtual technology is a part of significant technology which has been contributed

for the development of cloud computing. Various virtual technologies such as virtual OS and VDE become very important for server and network management in these days. Furthermore, such a virtual technology becomes possible to provide efficient resource management or QoS with virtual network configuration. Thus, it will be important for network construction to provide hardware and software service in near future. Autonomous network configuration in virtual layer is one of such a service. Not only network configuration is constructed in physical layer, but also it should be constructed in virtual layer for providing optimal resource and QoS management. Cloud Computing becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique feature, however, raises many new security challenges which have not been well understood. In cloud computing, both data and software are fully not contained on the user's computer; Data Security concerns arising because both user data and program are residing in Provider Premises. Clouds typically have single security architecture but have many customers with different demands. Every cloud provider solves this problem by encrypting the data by using encryption algorithms. Increasing amount of data and demand to process and analyze them induces enterprises to employ alternative computing paradigms to overcome computing capacity shortages. Cloud Computing is a new emerged computing approach that promises scalability of resources, on-demand availability and pay-as-you-go economic model instead of heavy investment on IT resources. However, to decide on choosing Cloud as computing platform, all aspects such as cost and performance trade-offs should be considered. The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to create such services, many new security questions that are particular to these solutions also arise, including those related to how the services are organized and which kind of service/data can be placed in the cloud. Despite the abundant academic discussion of the characteristics of cloud computing and its associated adoption to challenge current IT outsourcing industry, there is still uncertainty for executives to make the sound strategic decision in

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

132

prioritizing cloud computing as an appropriate model for next generation IT outsourcing solution. EDUCAUSE, UCISAs sister organization in the US, gives a useful definition: Cloud computing is the delivery of scalable IT resources over the Internet, as opposed to hosting and operating those resources locally, such as on a college or university network. Those resources can include applications and services, as well as the infrastructure on which they operate. Therefore, external hosting of your virtual learning environment is a cloud provision where the application is delivered over the Internet, using an application such as salesforce.com would be an example of a service, and use of Amazon's service for computing resources an example of infrastructure. There are various categories and terms used regarding cloud computing; many companies that are considering adopting cloud computing raise concerns over the security of data being stored and accessed via the internet. What a lot of people dont realize is that good vendors adhere to strict privacy policies and sophisticated security measures, with data encryption being one example of this. Companies can choose to encrypt data before even storing it on a third-party providers servers. As a result, many cloud-computing vendors offer greater data security and confidentiality than companies that choose to store their data inhouse. However, not all vendors will offer the same level of security. It is recommended that anyone with concerns over security and access should research vendors' policies before using their services. In Cloud service composition, collaboration between brokers and service providers is essential to promptly satisfy incoming Cloud consumer requirements. These requirements should be mapped to Cloud resources, which are accessed via web services, in an automated manner. However, distributed and constantly changing Cloud-computing environments pose new challenges to automated service composition such as: (i) dynamically contracting service providers, which set service fees on a supply-and-demand basis, and (ii) dealing with incomplete information regarding Cloud resources (e.g., location and providers). These are just part of the great performance of new technology, known as Cloud computing that is named also as "the next big thing" [1-9].
II.

CONSIDERING HIGH IMPACTS OF CLOUD COMPUTING ON DIFFERENT INDUSTRIES ASE OF USE

In two past sections of the paper, we define some of the basic and fundamental principles of cloud and also we tell about some of its advantageous. Now we want imply into, the major applications of this technology. After that when we understand the importance of this

technology, we tell about some techniques and algorithms which can be uses for improving the security aspect of such network; for example, we can used Kalman Filter for prediction and estimation the amount of users that can be allowed to logging into special organization account. There have been changes lately in the IT of this company. A few years ago they had a server standing in the building where they are operating. They had an area reserved which contained the servers for running the applications in their office, and servers for hosting their websites. These servers where very noisy and they decided to move their IT. They currently their servers placed at a server provider. One server is dedicated to host all their data and software for daily routines. Other servers at another server provider are dedicated for their websites. Their office server hosts windows. Through an internet connection the server is able to connect with their office. In their office they use WLAN to connect their client laptops and desktop computers. An important development is that they want to change from using analog telephone lines to VOIP. It is difficult to go realize this because VOIP usually requires several lines and a least amount of usage to really be more profitable than traditional lines. Therefore they tend to move to mobile phone connections. These mobile devices could then also connect to the network of their company. In doing their daily routine, they use several software packages; both open sourced as paid services. They use PHP in combination with the application Eclipse to develop their websites. Besides this they use the standard office package which contains Word, Excel, PowerPoint, and Microsoft Publisher etc. Important not to forget is of course the use of their windows based server. Their websites are often custom coded, because freely available coding applications do not provide a certain standard of security. They are freeing available to anyone. People with bad intentions could easily create codes based on this freeware and then hack into precoded websites. They also use virus scan and firewall software, but this is inevitable for any thick desktop pc or laptop. They try to maintain these up to date trough service contracts. TWB sees potential benefits in flexibility of adding new soft or hardware. Maybe even the whole infrastructure. They do not expect any cost advantages from Cloud computing. They think implementation and maybe training for employees will raise costs. Betabit was founded in the year 2002 by two brothers. This was during one of the first IT crisis. They managed to keep the organization alive and are now running an innovative company. Their software and IT try to help other organizations in their performance. Betabit has three offices and has a wide reach for

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

133

clients and contacts. Being innovative means in their opinion to be up to date with latest technologies. They currently are one of the first to join Microsoft in their latest platforms of cloud computing where they develop and build with the help of the azure platform. Rackspace organization operates worldwide and has several offices all over the world, the main office is in Sant Antonio and they have over 3000 employees. In essence they are a cloud service provider, providing the three main services Saas PaaS and IaaS. The company began with building applications for endusers, but later on they shifted to a more service oriented company. They noticed the opportunities in hosting. In 1998 the organization started as host for other organizations. Later on in their journey of expanding and developing they shifted to cloud computing. Cloud computing is a fairly new technology. Traditional IT systems show to be inefficient compared with cloud computing. Centralized mainframe systems, or small distributed systems are currently handling the IT in most organizations. In most cases they can handle this just fine, but worldwide growing use of data is pressuring on the performance of these traditional systems. It requires investments in IT in order to keep up with the growing demand. The problem lies though in the usage of these systems. The systems have unused space reserved for peak usage. This means that these systems usually make about 15-20% use of their total processing power. Only in peak usage some outliers of 90% usage or so are noted. However this happens rarely. In essence there are a lot of high investments made for only incidental use of this IT. And what happens when the total processing power is not able to cope with a certain peak? Here comes Cloud computing as a solution. The pay as you go system solves the inflexibility of traditional systems. Whenever an organisation needs additional IT services they can demand this from the Cloud provider. They only need to pay what they use, and when they use it. Furthermore the processing capacity of a cloud is theoretically speaking endless. The cloud is able to assign more processing power whenever necessary. This is because of the distributed network character. There is no single mainframe anymore, but there is a huge cloud with a lot of servers connected to each other. Another point is the costs, compared to traditional IT cloud computing is cheaper. Most IT organizations which have not yet adapted to cloud computing are using mainframes, distributed networks or remote servers. In the first two cases the IT is In-house. Maintenance, upgrades (sabotage) can all be done at the physical location of the organization. Serious downtime of In-house IT will cause direct inoperability of the organisation. The latter, remote

servers, shows some similarities with cloud computing. They have moved their in-house IT to a server provider. They manage and maintain the servers where the organization is operating on. The differences are though that there is no pay-as-you-go system nor the flexibility is as high as with cloud computing. When an organisation wants to expand, there are no difficulties to add additional services. The cloud provider just reallocates the new services. In this way the provider is able to provide certain performance and flexibility. The lower costs are realized because of the Pay-As-You-Go system. You pay what you use. So in peak usage a user pays more, and in low usage times, the user pays less. Expanding your organisation does not require large investments, just a request for more services from the cloud provider. Besides the flexibility and performance, the cloud also provides easy back-ups stored at remote locations. So whenever something goes horrible wrong with the data in an organisation there is easy access to back-ups. The use of cloud computing is growing as for example Rackspace has shown. They get more and more users, and as it is currently growing cloud computing might be the new future. It is inevitable that this technology will grow further and therefore will be improved. This might even result in even better risk handling in the coming years. Taipei, Feb. 12 (CNA) Taiwan has the competitive advantages of geographic location, undersea cable construction and hardware manufacturing capability, which could help further advance the country's cloud computing industry, an expert said Sunday. However, the government should focus more on improving the value of the industry as the country relies heavily on providing ODM server services, which produce low profits, according to Barry Chen, president of global virtualization and cloud infrastructure service at VMware Inc. Instead of considering how to lower electricity costs and facility management, the government and companies should seek new platforms to provide integrated services through cloud computing technology in order to increase the country's competitiveness, Chen said. For example, the stock exchange center in Shanghai has vigorously promoted such technology, with the hope of becoming the world's largest center of its kind within 10 years, Chen said. Air carrier companies have also been adopting cloud computing technology to provide customized services, which can be seen as an indicator for future trends for the logistics and financial sectors, Chen said. Chen said that although Taiwan has a geographical advantage, the government should introduce better policies to lure foreign investors, noting that such investors. Several large Web companies (such as Amazon and Google) are now exploiting the fact that they have data

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

134

storage capacity which can be hired out to others. This approach, known as cloud storage allows data stored remotely to be temporarily cached on desktop computers, mobile phones or other Internet-linked devices. Amazons Elastic Compute Cloud (EC2) and Simple Storage Solution (S3) are well known examples. Cloud Services can also be used to hold structured data. There has been some discussion of this being a potentially useful notion possibly aligned with the Semantic Web [2], though concerns, such as this resulting in data becoming undifferentiated [3], have been raised. Cloud computing works using economies of scale. It lowers the outlay expense for start up companies, as they would no longer need to buy their own software or servers. Cost would be by on-demand pricing. Vendors and Service providers claim costs by establishing an ongoing revenue stream. Use of cloud computing means dependence on others and that could possibly limit flexibility and innovation. The others are likely become the bigger Internet companies like Google and IBM who may monopolise the market. Some argue that this use of supercomputers is a return to the time of mainframe computing that the PC was a reaction against. Many of the activities loosely grouped together under cloud computing have already been happening and centralised computing activity is not a new phenomena: Grid Computing was the last research-led centralised approach. However there are concerns that the mainstream adoption of cloud computing could cause many problems for users. Whether these worries are grounded or not has yet to be seen.
III.

Where the Kalman gain is given by

Note that in this expression for

the covariance

of the observation noise represents at the same time the covariance of the prediction error (or innovation) ; these covariances are equal only in the case of continuous time. The distinction between the prediction and update steps of discrete-time Kalman filtering does not exist in continuous time.
IV.

CONCLUSION

PRESENT NEW FILTER:

Now, after general discussions about different aspects of Cloud Computing, we want to present KalmanBucy filter which can be used for estimation and prediction of the presence of hackers and spyware actions. The KalmanBucy filter (named after Richard Snowden Bucy) is a continuous time version of the Kalman filter. It is based on the state space model

Where the covariances of the noise terms

and

are given by and , respectively. The filter consists of two differential equations, one for the state estimate and one for the covariance:

In this article, we introduce Cloud Computing and perusal about influences of it on the processes of these days. Data center is required for the enterprise, cloud service providers such as Amazon Web Service and Microsoft Azure offer enterprises the ability to store their data remotely on rented hardware per demand. But designing cloud infrastructure in term for securing the data is one of the most concerns that enterprise worries about it. Cost reduction and providing the features as per the demand are the main operation of cloud computing. There are two main components that the cloud systems require; they are scalable infrastructure and scalable data platform. Cloud computing has emerged as an attractive computing model with the features of freely expanding, on-demand resource allocating, and power saving. Infrastructure as a Service (IaaS), a category of Cloud computing services, provides users an environment to run and control entire virtual machine instances deployed across variety physical resources. Portlets are defined as a standard API and provide a model for developing new portal components that can be shared by various portlet containers. Although creating a Cloud Computing architecture that is scalable and is usable for sharing all kind of resources, has so many problem and complexions, but it can be usable for optimization and removing all IT requirements. These days lots of technologies migrate from traditional systems into cloud, and cloud computing has developed and used in so many countries. These countries are using cloud computing in many of industries with different applications and also the range of using cloud computing is increasing in different countries and with different applications. Although, there is some worry about security in cloud computing, but the number of persons that save their personal information in servers of third company for

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 9, SEPTEMBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

135

example Google, is increasing. We presented some solutions for improving its security. With regard to lots of cloud computing advantages, specially, costs reduction of implementation in large scale, investing capital is increasing in this filed. Cloud Computing is advancing with fast rate and also it will be complete with little deficiencies rather than other technologies. It is predict that Cloud computing is the basic platform for IT in next 20 year [16].

[15]

[16]

[17]

the IEEE computer society technical committee on data engineering. Daniel Nurmi, Rich Wolski, Chris Grzegorczyk, Graziano Obertelli, Sunil Soman, Lamia Youseff, Dmitrii Zagorodnov; the eucalyptus open-source cloud computing system. Mehdi Darbandi, Hoda Purhosein; Perusal about influences of Cloud Computing on the processes of these days and presenting new ideas about its security, Int. IEEE Conf. Azerbaijan, Bakku. Mehdi Darbandi; Involving Kalman filter technique for increasing the reliability and efficiency of cloud computing; WORLD COMPETITION 2012; Los Vegas, USA.

[1]

[2]

[3]

[4]

[5]

[6]

[7]

[8]

[9]

[10] [11]

[12] [13]

[14]

David C. Wyld; the cloudy future of government IT: cloud computing and the public sector around the world, IJWesT, Vol. 1, Num. 1, Jan. 2010. Jean-Daniel Cryans, Alain April, Alain Abran; criteria to compare cloud computing with current database technology, R. Dumke et al. (Eds.): IWSM / MetriKon / Mensura 2008, LNCS 5338, pp. 114-126, 2008. Anil Madhavapeddy, Richard Mortier, Jon Crowcroft, Steven Hand; multiscale not multicore: efficient heterogeneous cloud computing, published by the British Informatics Society Ltd. Proceedings of ACM-BCS Visions of Computer Science 2010. Harold C. Lim, Shivnath Babu, Jeffrey S. Chase, Sujay S. Parekh; automated control in cloud computing: challenges and opportunities, ACDC09, June 19, Barcelona, Spain. N. Sainath, S. Muralikrishna, P.V.S. Srinivas; a framework of cloud computing in the real world; Advances in Computational Sciences and Technology, ISSN 0973-6107, Vol. 3, Num. 2, (2010), pp. 175-190. Kyle Chard, Simon Caton, Omer Rana, Kris Bubendorfer; social cloud: cloud computing in social networks G. Bruce Berriman, Eva Deelman, Paul Groth, Gideon Juve; the application of cloud computing to the creation of image mosaics and management of their provenance, Roy Campbell, Indranil Gupta, Michael Heath, Steven Y. Ko, Michael Kozuch, Marcel Kunze, Thomas Kwan, Kevin Lai, Hing Yan Lee, Martha Lyons, Dejan Milojicic, David OHallaron, Yeng Chai Soh; open cirrus TM cloud computing testbed: federated data centers for open source systems and services research Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivona Brandic; cloud computing and Emerging IT platforms: Vision, Hype, and Reality for delivering computing as the 5th utility Lamia Youseff, Maria Butrico, Dilma Da Silva; toward a unified ontology of cloud computing Daniel A. Menasce, Paul Ngo; understanding cloud computing: experimentation and capacity planning; Proc. 2009, Computer Measurement Group Conf. Dallas, TX. Dec. 2009. Won Kim; cloud computing: today and tomorrow; JOT, Vol. 8, No. 1, Jan-Feb 2009. Richard Chow, philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina; controlling data in the cloud: outsourcing computation without outsourcing control; CCSW09, Nov. 13, 2009, Chicago, Illinois, USA. Bo Peng, Bin Cui, Xiaoming Li; implementation issues of a cloud computing platform; Bulletin of

References:

Pariya Shahbazi: received the


M.Sc. degree in Information and Communication Technology from University of Agder, Grimstad, Norway. Her e-mail address is:

Mehdi Darbandi: M.Sc. Student


at Iran University of Science and
Technology (IUST); Tehran, Iran. His email address is:

Saeed Setayesh:

M.Sc. Student at International Branch of Ferdowsi University of Mashhad , Iran. His e-mail address is:

Mohsen Kariman Khorasani:


Assistant Prof. at Department of Communication Engineering, Islamic Azad University, Gonabad Branch, Gonabad, Iran. His e-mail address is:

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

S-ar putea să vă placă și