The guest editors discuss this special issue on cloud computing, exploring how cloud platforms and abstractions can be effectively used to support real-world science and engineering applications.
The guest editors discuss this special issue on cloud computing, exploring how cloud platforms and abstractions can be effectively used to support real-world science and engineering applications.
cloud computing is a recent trend in information technology and networking that has the potential to change radically the way computer services are constructed, managed, and delivered. The key driving forces behind th...
详细信息
cloud computing is a recent trend in information technology and networking that has the potential to change radically the way computer services are constructed, managed, and delivered. The key driving forces behind the emergence of cloud computing include the overcapacity of today's large corporate data centers, the ubiquity of broadband and wireless networking, the falling cost of storage, and progressive improvements in networking technologies. cloud computing opens new perspectives with profound implications in the area of communication networks, raising new issues in their architecture, design, and implementation. [ABSTRACT FROM PUBLISHER]
cloud computing (Grid or utility computing, computing on-demand) which was the talk of the computing circles at the end of 1990s has become once again a relevant computational topic. cloud computing, also considered a...
详细信息
cloud computing (Grid or utility computing, computing on-demand) which was the talk of the computing circles at the end of 1990s has become once again a relevant computational topic. cloud computing, also considered as a fifth utility after water, electric power, gas, and telephony, is on the basis of the hosting of services on clusters of computers housed in server farms. This article reviews cloud computing fundamentals in general, its operational modeling and quantitative (statistical) risk assessment of its much neglected service quality issues. As an example of a cloud, a set of distributed parallel computers is considered to be working independently or dependently, but additively to serve the cumulative needs of a large number of customers requiring service. Quantitative methods of statistical inference on the quality of service (QoS) or conversely, loss of service (LoS), as commonly used customer satisfaction metrics of system reliability and security performance are reviewed. The goal of those methods is to optimize what must be planned about how to improve the quality of a cloud operation and what countermeasures to take. Also, a discrete event simulation is reviewed to estimate the risk indices in a large cloud computing environment favorably compared to the intractable and lengthy theoretical Markov solutions. (C) 2010 John Wiley & Sons, Inc.
cloud computing is currently being used by a large number of organizations. Many consider it a major development of the decade in computing. In this article we define cloud computing, various services available on the...
详细信息
cloud computing is currently being used by a large number of organizations. Many consider it a major development of the decade in computing. In this article we define cloud computing, various services available on the cloud infrastructure, and the different types of cloud. We then discuss the technological trends which have led to its emergence, its advantages and disadvantages, and the applications which are appropriate to outsource to a cloud computing service.
With the widespread application of cloud computing technology, the secure transmission of image data in cloud environments has become an important issue. Traditional image encryption techniques face challenges in deal...
详细信息
With the widespread application of cloud computing technology, the secure transmission of image data in cloud environments has become an important issue. Traditional image encryption techniques face challenges in dealing with large-scale and dynamic cloud computing environments, such as complex key management and insufficient encryption efficiency. To address these issues, this study proposes an innovative image encryption decryption algorithm that combines pixel sorting classification (PSC) method and block mod256 scrambling encryption (SE) technology, aiming to improve the security of image data transmission in cloud computing. Through empirical experiments, this study found that the newly proposed algorithm exhibited superior performance while maintaining image integrity. In comparison to existing technologies, the new technology has demonstrated an improvement in both peak signal-to-noise ratio (PSNR) and image size. Specifically, at lower data embedding rates, the average PSNR value of this algorithm ranged from 52 dB to 54 dB, and it exhibited high security ratings on different types of images. In addition, the algorithm also demonstrated strong robustness in resisting various attack paradigms in cloud computing systems. Although the algorithm proposed in this study has limitations in real-time processing, it provides a new approach for secure transmission of image data in cloud computing and valuable reference for future research. Future work will focus on optimizing the realtime processing capabilities of algorithms and further validating and expanding them in real-world cloud computing environments.
Educational institutions face inherent uncertainties in student performance, stakeholder priorities, and data analysis. This paper explores how cloud computing, with its data storage, analytics, and collaboration tool...
详细信息
Purpose This study aims to analyze the applicability of the technological, organizational and environmental (TOE) framework features in the decision to adopt cloud computing (CC) in small and medium-sized enterprises ...
详细信息
Purpose This study aims to analyze the applicability of the technological, organizational and environmental (TOE) framework features in the decision to adopt cloud computing (CC) in small and medium-sized enterprises (SMEs) operating in disruptive contexts. Design/methodology/approach A mixed-methods approach was used. Initially, 94 questionnaires were collected in 2021-2022 through a survey based on the TOE framework, with the first section involving six filter questions and the second one including 45 Likert scale questions. Subsequently, a qualitative study was carried out in 2023 based on semistructured interviews held with 10 information technology experts. FindingsThe outcomes of the quantitative study revealed a significant association between CC adoption and technological features, but no association with the organizational and environmental features. The results of the qualitative study pointed to five major barriers to CC adoption, including economic barriers, brain drain, poor technical infrastructure, survival mode of existence and cultural barriers. Originality/valueThis empirical investigation uncovered specific TOE features that influence CC adoption in SMEs operating in disruptive contexts. By integrating qualitative insights, this research unveiled new context-dependent barriers to CC adoption that were previously overlooked by traditional quantitative techniques.
Nowadays, the IT departments face numerous problems which considerably affect their performance. Several factors such as technological obsolescence that shortens the useful life of equipment, amount of data that deman...
详细信息
暂无评论