WorldWideScience

Sample records for chelonia storage cloud

  1. Performance and Stability of the Chelonia Storage Cloud

    CERN Document Server

    Nilsen, Jon K; Nagy, Zsombor; Mohn, Bjarte; Read, Alex L

    2010-01-01

    In this paper we present the Chelonia storage cloud middleware. It was designed to fill the requirements gap between those of large, sophisticated scientific collaborations which have adopted the grid paradigm for their distributed storage needs, and of corporate business communities which are gravitating towards the cloud paradigm. The similarities to and differences between Chelonia and several well-known grid- and cloud-based storage solutions are commented. The design of Chelonia has been chosen to optimize high reliability and scalability of an integrated system of heterogeneous, geographically dispersed storage sites and the ability to easily expand the system dynamically. The architecture and implementation in term of web-services running inside the Advanced Resource Connector Hosting Environment Dameon (ARC HED) are described. We present results of tests in both local-area and wide-area networks that demonstrate the fault-tolerance, stability and scalability of Chelonia.

  2. Chelonia: A self-healing, replicated storage system

    International Nuclear Information System (INIS)

    Chelonia is a novel grid storage system designed to fill the requirements gap between those of large, sophisticated scientific collaborations which have adopted the grid paradigm for their distributed storage needs, and of corporate business communities gravitating towards the cloud paradigm. Chelonia is an integrated system of heterogeneous, geographically dispersed storage sites which is easily and dynamically expandable and optimized for high availability and scalability. The architecture and implementation in term of web-services running inside the Advanced Resource Connector Hosting Environment Dameon (ARC HED) are described and results of tests in both local -area and wide-area networks that demonstrate the fault tolerance, stability and scalability of Chelonia will be presented. In addition, example setups for production deployments for small and medium-sized VO's are described.

  3. Cloud storage for dummies

    CERN Document Server

    Xu, Linda; Loughlin, Tanya

    2010-01-01

    Understand cloud computing and save your organization time and money! Cloud computing is taking IT by storm, but what is it and what are the benefits to your organization? Hitachi Data Systems' Cloud Storage For Dummies provides all the answers, With this book, you discover a clear explanation of cloud storage, and tips for how to choose the right type of cloud storage for your organization's needs. You also find out how cloud storage can free up valuable IT resources, saving time and money. Cloud Storage For Dummies presents useful information on setting up a

  4. Entangled Cloud Storage

    DEFF Research Database (Denmark)

    Ateniese, Giuseppe; Dagdelen, Özgür; Damgård, Ivan Bjerre;

    2012-01-01

    Entangled cloud storage enables a set of clients {P_i} to “entangle” their files {f_i} into a single clew c to be stored by a (potentially malicious) cloud provider S. The entanglement makes it impossible to modify or delete significant part of the clew without affecting all files in c. A clew...... keeps the files in it private but still lets each client P_i recover his own data by interacting with S; no cooperation from other clients is needed. At the same time, the cloud provider is discouraged from altering or overwriting any significant part of c as this will imply that none of the clients can...... recover their files. We provide theoretical foundations for entangled cloud storage, introducing the notion of an entangled encoding scheme that guarantees strong security requirements capturing the properties above. We also give a concrete construction based on privacy-preserving polynomial interpolation...

  5. Benchmarking personal cloud storage

    NARCIS (Netherlands)

    Drago, Idilio; Bocchi, Enrico; Mellia, Marco; Slatman, Herman; Pras, Aiko

    2013-01-01

    Personal cloud storage services are data-intensive applications already producing a significant share of Internet traffic. Several solutions offered by different companies attract more and more people. However, little is known about each service capabilities, architecture and - most of all - perform

  6. A cloud storage overlay to aggregate heterogeneous cloud services

    OpenAIRE

    Machado, Guilherme Sperb; Bocek, Thomas; Ammann, Michael; Stiller, Burkhard

    2013-01-01

    Many Cloud services provide generic (e.g., Amazon S3 or Dropbox) or data-specific Cloud storage (e.g., Google Picasa or SoundCloud). Although both Cloud storage service types have the data storage in common, they present heterogeneous characteristics: different interfaces, accounting and charging schemes, privacy and security levels, functionality and, among the data-specific Cloud storage services, different data type restrictions. This paper proposes PiCsMu (Platform-independent Cloud Stora...

  7. Security for cloud storage systems

    CERN Document Server

    Yang, Kan

    2014-01-01

    Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers

  8. Cloud Storage Client Application Analysis

    Directory of Open Access Journals (Sweden)

    Rakesh Malik

    2015-06-01

    Full Text Available The research proposed in this paper focuses on gathering evidence from devices with UNIX/Linux systems (in particular on Ubuntu 14.04 and Android OS, and Windows 8.1, in order to find artifacts left by cloud storage applications that suggests their use even after the deletion of the applications. The work performed aims to expand upon the prior work done by other researches in the field of cloud forensics and to show an example of analysis. We show where and what type of data remnants can be found using our analysis and how this information can be used as evidence in a digital forensic investigation.

  9. Inside Dropbox: Understanding Personal Cloud Storage Services

    NARCIS (Netherlands)

    Drago, Idilio; Mellia, Marco; Munafò, Maurizio M.; Sperotto, Anna; Sadre, Ramin; Pras, Aiko

    2012-01-01

    Personal cloud storage services are gaining popularity. With a rush of providers to enter the market and an increasing offer of cheap storage space, it is to be expected that cloud storage will soon generate a high amount of Internet traffic. Very little is known about the architecture and the perfo

  10. Search content via Cloud Storage System

    Directory of Open Access Journals (Sweden)

    Haytham Al-Feel

    2011-11-01

    Full Text Available With cloud computing growing in IT Enterprise. the importance of storing and searching files on the cloud increase. cloud storage is defined as a set of scalable data servers or chunk servers that provide computing and storage services to clients. Our research concern with searching in the file content throw cloud storage system Our research using ontology approach that can be store and retrieve files in the cloud based on its content to resolves the weaknesses that existed in Google File System that depends on metadata and searching only using file name Our new architecture was tested on Cloud Storage Simulator and the result shows that the new architecture has better scalability, fault tolerance and performance for searching for file content in cloud storage system.

  11. PC-Cluster based Storage System Architecture for Cloud Storage

    CERN Document Server

    Yee, Tin Tin

    2011-01-01

    Design and architecture of cloud storage system plays a vital role in cloud computing infrastructure in order to improve the storage capacity as well as cost effectiveness. Usually cloud storage system provides users to efficient storage space with elasticity feature. One of the challenges of cloud storage system is difficult to balance the providing huge elastic capacity of storage and investment of expensive cost for it. In order to solve this issue in the cloud storage infrastructure, low cost PC cluster based storage server is configured to be activated for large amount of data to provide cloud users. Moreover, one of the contributions of this system is proposed an analytical model using M/M/1 queuing network model, which is modeled on intended architecture to provide better response time, utilization of storage as well as pending time when the system is running. According to the analytical result on experimental testing, the storage can be utilized more than 90% of storage space. In this paper, two parts...

  12. Scientific Data Storage for Cloud Computing

    Science.gov (United States)

    Readey, J.

    2014-12-01

    Traditionally data storage used for geophysical software systems has centered on file-based systems and libraries such as NetCDF and HDF5. In contrast cloud based infrastructure providers such as Amazon AWS, Microsoft Azure, and the Google Cloud Platform generally provide storage technologies based on an object based storage service (for large binary objects) complemented by a database service (for small objects that can be represented as key-value pairs). These systems have been shown to be highly scalable, reliable, and cost effective. We will discuss a proposed system that leverages these cloud-based storage technologies to provide an API-compatible library for traditional NetCDF and HDF5 applications. This system will enable cloud storage suitable for geophysical applications that can scale up to petabytes of data and thousands of users. We'll also cover other advantages of this system such as enhanced metadata search.

  13. Cloud Storage and its Secure Overlay Techniques

    Directory of Open Access Journals (Sweden)

    Susheel Kumar

    2014-04-01

    Full Text Available In this paper we have tried to explain in detail about cloud storage its need, importance and how much useful it is for the upcoming future. As we know that it provides us flexibility to store and use data to anywhere and from anywhere so it is cost effective and beneficial at all places. The storage of data however has some kind of security issues in accessing the authorized data. Some of the data in the cloud should be deleted for certain reasons to maintain confidentiality. And many other issues are to be overcome by the cloud. There are certain techniques discussed in this paper to address the problems in the cloud communication. We get an idea of the available methods in which the data can be secured. Anyway each architecture has its own shortcomings. But without these techniques, it is difficult to maintain a good client-server storage mechanism in the cloud computing.

  14. Sheltered Data Storage Services in Cloud Computing

    Directory of Open Access Journals (Sweden)

    B. Jenifer Milkkal

    2013-05-01

    Full Text Available Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the holomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks

  15. Dynamic Storage Assurance on Cloud Computing

    Directory of Open Access Journals (Sweden)

    P. Dhanalakshmi

    2013-02-01

    Full Text Available Cloud computing investigate the problem of data security in cloud data storage, which is essentially a distributed storage system. Distributed storage integrity auditing mechanism, utilizes the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server and recover the corrupted data. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the pro-posed scheme is highly efficient and resilient against Byzan-tine failure, malicious data modification attack, and even server colluding attacks. With the advent of data storage and new technology trends that result in new failure modes for storage, interesting challenges arise in ensuring data integrity and security. In this paper, we discuss the cause of integrity violations and implementation issues to perform efficient integrity assurance. The main aim of this paper is to prevent the file from integrity violations and recovering the corrupted file with low cost overhead.

  16. Cloud Epoch: Storage as a Service

    Directory of Open Access Journals (Sweden)

    Gurpreet Singh

    2012-08-01

    Full Text Available At that time Cloud computing is the edge of new technology. Cloud computing play an important role in every field of technology. Various services supported by Cloud like Infrastructure as a service (IAAS, Platform as a service (PAAS, Storage as a service(SAAS, Bandwidth as a service, Collaboration as a service, Software as a service and many more. But now these days Storage as a service are starting to crop up everywhere. Using Storage as a services we can able to move backup and restore services offsite, to save money, and to provide flexibility, but this is nothing like tape backup system. In this paper we study about the various SAAS cloud providers & compare the features provided by them.

  17. SECURITY FOR DATA STORAGE IN CLOUD COMPUTING

    OpenAIRE

    Prof. S.A.Gade; Mukesh P.Patil

    2015-01-01

    Cloud computing is nothing but a specific style of computing where everything from computing power to business apps are provided facility. This application moves the various data to the large data centers through computing where security provided fully trustworthy. The data stored in the cloud may be frequently updated by the users (registered user) including actions like insertion, deletion, modification etc. To ensure that data storage in cl oud this web applicatio...

  18. New mechanism for Cloud Computing Storage Security

    Directory of Open Access Journals (Sweden)

    Almokhtar Ait El Mrabti

    2016-07-01

    Full Text Available Cloud computing, often referred to as simply the cloud, appears as an emerging computing paradigm which promises to radically change the way computer applications and services are constructed, delivered, managed and finally guaranteed as dynamic computing environments for end users. The cloud is the delivery of on-demand computing resources - everything from applications to data centers - over the Internet on a pay-for-use basis. The revolution of cloud computing has provided opportunities for research in all aspects of cloud computing. Despite the big progress in cloud computing technologies, funding concerns in cloud, security may limit a broader adoption. This paper presents a technique to tolerate both accidental and intentional faults, which is fragmentation-redundancy-scattering (FRS. The possibility to use the FRS technique as an intrusion tolerance one is investigated for providing secure and dependable storage in the cloud environment. Also a cloud computing security (CCS based on the FRS technique is proposed to explore how this proposal can then be used via several scenarios. To demonstrate the robustness of the proposal, we formalize our design and we carry out a security as well as performance evaluations of the approach and we compare it with the classical model. The paper concludes by strongly suggesting future research proposals for the CCS framework.

  19. Cloud-Based Data Storage

    Science.gov (United States)

    Waters, John K.

    2011-01-01

    The vulnerability and inefficiency of backing up data on-site is prompting school districts to switch to more secure, less troublesome cloud-based options. District auditors are pushing for a better way to back up their data than the on-site, tape-based system that had been used for years. About three years ago, Hendrick School District in…

  20. Zero Data Remnance Proof in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Mithun Paul

    2010-10-01

    Full Text Available In a cloud environment where Storage is offered as a service, a client stores his data with a provider andpays as per the usage. Once the contract ends, the client, as the data owner, may like to see, due to privacyreasons and otherwise that the data is properly shredded in the provider storage. In this paper we proposea scheme for Zero Data Remnance Proof (ZDRP – a comprehensive proof given by the cloud data storageprovider as regards to zero data remnance post the SLA period. In absence of such shredding the providercan consume the data to his benefit without coming in legal framework. The proof of data destruction canbe achieved together by clauses in the SLA and a comprehensive destruction-verifier algorithm. Theimplementation of this can be achieved by appropriate modification of the data updation mechanismsprovided by open source cloud providers.

  1. Cloud-Based Storage Applications for Smart Phones: Forensic Investigation of Cloud Storage Applications

    OpenAIRE

    Ochrymowicz, Radoslaw

    2014-01-01

    The proliferation of smart phones across the globe, development of 4G network standards and its progressing implementation along with shift towards cloud computing bring risks to smart phone users who avail of these service. Security of cloud storage mobile applications should be essential to smart phone users. Enterprises’ move to huge data centres and availing of their infrastructure, platform and service is an advantage but poses a risk. Users use corporate resources managed and administer...

  2. Compute and Storage Clouds Using Wide Area High Performance Networks

    CERN Document Server

    Grossman, Robert L; Sabala, Michael; Zhang, Wanzhi

    2008-01-01

    We describe a cloud based infrastructure that we have developed that is optimized for wide area, high performance networks and designed to support data mining applications. The infrastructure consists of a storage cloud called Sector and a compute cloud called Sphere. We describe two applications that we have built using the cloud and some experimental studies.

  3. Cloud and virtual data storage networking

    CERN Document Server

    Schulz, Greg

    2011-01-01

    The amount of data being generated, processed, and stored has reached unprecedented levels. Even during the recent economic crisis, there has been no slow down or information recession. Instead, the need to process, move, and store data has only increased. Consequently, IT organizations are looking to do more with what they have while supporting growth along with new services without compromising on cost and service delivery. Cloud and Virtual Data Storage Networking, by savvy IT industry veteran Greg Schulz, looks at converging IT resources and management technologies for facilitating efficie

  4. Dynamic federation of grid and cloud storage

    Science.gov (United States)

    Furano, Fabrizio; Keeble, Oliver; Field, Laurence

    2016-09-01

    The Dynamic Federations project ("Dynafed") enables the deployment of scalable, distributed storage systems composed of independent storage endpoints. While the Uniform Generic Redirector at the heart of the project is protocol-agnostic, we have focused our effort on HTTP-based protocols, including S3 and WebDAV. The system has been deployed on testbeds covering the majority of the ATLAS and LHCb data, and supports geography-aware replica selection. The work done exploits the federation potential of HTTP to build systems that offer uniform, scalable, catalogue-less access to the storage and metadata ensemble and the possibility of seamless integration of other compatible resources such as those from cloud providers. Dynafed can exploit the potential of the S3 delegation scheme, effectively federating on the fly any number of S3 buckets from different providers and applying a uniform authorization to them. This feature has been used to deploy in production the BOINC Data Bridge, which uses the Uniform Generic Redirector with S3 buckets to harmonize the BOINC authorization scheme with the Grid/X509. The Data Bridge has been deployed in production with good results. We believe that the features of a loosely coupled federation of open-protocolbased storage elements open many possibilities of smoothly evolving the current computing models and of supporting new scientific computing projects that rely on massive distribution of data and that would appreciate systems that can more easily be interfaced with commercial providers and can work natively with Web browsers and clients.

  5. On the Feasibility of (Practical Commercial Anonymous Cloud Storage

    Directory of Open Access Journals (Sweden)

    Tobias Pulls

    2015-08-01

    Full Text Available Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commercial cloud storage services, in this paper, we investigate the feasibility of so called anonymous cloud storage services which require user payment (which we call commercial anonymous cloud storage. Anonymity in this context can be seen as the absence of information to uniquely identify a provider's client that is storing and manipulating data at the provider while at the same time still allowing fair billing, for both, the clients and the cloud provider. Although encrypting data prior to outsourcing helps to protect data privacy and can be achieved without the cloud provider's consent, the issues we are interested in, do not seem to be achievable that easily. However, while various measures for the latter issue, i.e., realizing access privacy, have been studied in the past, the role of privacy in context of billing and payment for cloud storage has, until now, remained unexplored. We therefore introduce an abstract model for commercial cloud storage services to define various types of anonymous cloud storage, study several payment and billing models for cloud storage services and their impact on the anonymity of the service's clients. Moreover, we discuss several solutions to provide anonymity within the different models. Our findings highlight the importance of anonymous payment for the practical deployment of commercial privacy-friendly cloud storage services. Furthermore, we provide directions for future work in some settings, i.e., when anonymous payment is not available, as interesting open challenges.

  6. On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

    OpenAIRE

    Tobias Pulls; Daniel Slamanig

    2015-01-01

    Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commercial cloud storage services, in this paper, we investigate the feasibility of so called anonymous clo...

  7. A Survey on Data Storage and Security in Cloud Computing

    OpenAIRE

    V. Spoorthy; M. Mamatha; B. Santhosh Kumar

    2014-01-01

    cloud computing has been envisioned as the next generation architecture of IT enterprise. Cloud computing moves the application software and data bases to the large data centers, where the management of the data and services may not be fully trustworthy. This poses many new security challenges which have not been fully implemented. In this paper, we mainly focus on aspects for providing security for data storage in cloud, also architecture for data storage that are implemented by ...

  8. A New Model of Data Protection on Cloud Storage

    Directory of Open Access Journals (Sweden)

    Jing Peng

    2014-03-01

    Full Text Available This paper focuses on studying cloud storage data protection model and implementing encrypted storage of user data in double-key form. User data are encrypted with symmetric encryption algorithm and this secret key is encrypted with asymmetric encryption algorithm. The private key is managed and controlled by users. In this way, users guarantee the security of their own data with the sole private key. Providing effective protection for uploading and downloading of user data and good data storage and transmission support for cloud storage application through the data protection mechanism deployed at client, thus solving the biggest obstacle, i.e. security of cloud data in the application of cloud storage enterprises currently to a certain extent.

  9. Keyword-based Ciphertext Search Algorithm under Cloud Storage

    Directory of Open Access Journals (Sweden)

    Ren Xunyi

    2016-01-01

    Full Text Available With the development of network storage services, cloud storage have the advantage of high scalability , inexpensive, without access limit and easy to manage. These advantages make more and more small or medium enterprises choose to outsource large quantities of data to a third party. This way can make lots of small and medium enterprises get rid of costs of construction and maintenance, so it has broad market prospects. But now lots of cloud storage service providers can not protect data security.This result leakage of user data, so many users have to use traditional storage method.This has become one of the important factors that hinder the development of cloud storage. In this article, establishing keyword index by extracting keywords from ciphertext data. After that, encrypted data and the encrypted index upload cloud server together.User get related ciphertext by searching encrypted index, so it can response data leakage problem.

  10. SECURE DATA STORAGE IN MULTI CLOUD ENVIRONMENT USING APACHE HADOOP

    OpenAIRE

    Lalitha Singh*, Prof. Jyoti Malhotra, Prof. Sayalee Narkhede

    2016-01-01

    Cloud computing and Hadoop has become a new distributed storage model for most of the organizations, Industries etc. It provides a pay per use model in which customer has to only pay for the data he is storing on the cloud. However, relying on a single cloud storage provider has resulted in problems like vendor lock in. Therefore multi cloud environment is used to address the security and the data availability problems. In this paper, we proposed a system that uses Hadoop computing platform i...

  11. Towards Efficient Scientific Data Management Using Cloud Storage

    Science.gov (United States)

    He, Qiming

    2013-01-01

    A software prototype allows users to backup and restore data to/from both public and private cloud storage such as Amazon's S3 and NASA's Nebula. Unlike other off-the-shelf tools, this software ensures user data security in the cloud (through encryption), and minimizes users operating costs by using space- and bandwidth-efficient compression and incremental backup. Parallel data processing utilities have also been developed by using massively scalable cloud computing in conjunction with cloud storage. One of the innovations in this software is using modified open source components to work with a private cloud like NASA Nebula. Another innovation is porting the complex backup to- cloud software to embedded Linux, running on the home networking devices, in order to benefit more users.

  12. Research of Video Data Management Based on Cloud Storage

    Directory of Open Access Journals (Sweden)

    Silian Xie

    2013-06-01

    Full Text Available This study introductions situation of video storage and the methods of video data management, then proposes a Scheduling Strategy algorithm based on Offset Cache (SSOC. According to the statistical information of data block buffer offset, through building a cloud environment and studying the storage layer’s video data storage of the cloud storage, the algorithm schedules on mastering the supply and demand of data block comprehensively and accurately and solves the system's launch delay and the continuity of streaming media player. The method has applied in school's teaching resources.

  13. Analysis of Different Privacy Preserving Cloud Storage Frameworks

    CERN Document Server

    Bedi, Rajeev; Singh, Tajinder; Singh, Harwinder; Singh, Amritpal

    2012-01-01

    Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user's access right and dynamic operations of data, and the interaction between participants. It also design an interactive protocol and an extirpation-based key derivation algorithm, which are combined with lazy revocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficient framework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloud storage framework in which he designed an interaction protocol among participants, use key derivation algorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide the sensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this framework i...

  14. Evolution of Cloud Storage as Cloud Computing Infrastructure Service

    OpenAIRE

    Rajan, Arokia Paul; Shanmugapriyaa

    2013-01-01

    Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are consumable on demand, elastic to scale up and down as needed, and follow a pay-for-usage model. Out of the three common types of cloud computing service models, Infrastructure as a Service (IaaS) is a service model that provides servers, computing power, network bandwidth and S...

  15. Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2011-01-01

    The Cloud Computing is the next generation architecture of IT Enterprise. It moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Here, focus is on cloud data storage security, an important aspect...... of quality of service. To ensure the correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features. By utilizing the homomorphic token with distributed verification of erasure-coded data, the scheme achieves the integration of storage correctness...

  16. Design and Implementation of Agro-technical Extension Information System Based on Cloud Storage

    OpenAIRE

    Guo, Leifeng; Wang, Wensheng; Yang, Yong; Sun,Zhiguo

    2013-01-01

    International audience In order to solve the problems of low efficiency and backward methods in the agro-technical extension activities, this paper designed an agro-technical extension information system based on cloud storage technology. This paper studied the key technologies, such as cloud storage service engine, cloud storage management node and cloud storage data node and designed the overall architecture of the agro-technical extension information system based on cloud storage techno...

  17. Secure Cloud StorageForPrivacy-Preserving Public Audit

    Directory of Open Access Journals (Sweden)

    ShekhAhamadhusen D.

    2014-04-01

    Full Text Available In Cloud Environment, using cloud storage service, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA to check the integrity of outsourced data and be worry free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities toward user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.

  18. Pricing of insurance policies against cloud storage price rises

    OpenAIRE

    Mastroeni, Loretta; Naldi, Maurizio

    2012-01-01

    When a company migrates to cloud storage, the way back is neither easy nor cheap. The company is then locked up in the storage contract and exposed to upward market prices, which reduce the company's profit and may even bring it below zero. We propose a protection means based on an insurance contract, by which the cloud purchaser is indemnified when the current storage price exceeds a pre-defined threshold. By applying the financial options theory, we provide a formula for the insurance price...

  19. Dynamic Data Storage and Public Auditability for Cloud Storage Security

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2012-01-01

    IT has moved into next generation with cloud computing being realized. The way application software and databases are stored has been changed. Now they are stored in cloud data centers in which security is a concern from client point of view. The new phenomenon which is used to store and manage...... data without capital investment has brought many security challenges which are not thoroughly understood. This paper focuses on the security and integrity of data stored in cloud data servers. The data integrity verification is done by using a third party auditor who is authorized to check integrity...

  20. Notes on a storage manager for the Clouds kernel

    Science.gov (United States)

    Pitts, David V.; Spafford, Eugene H.

    1986-01-01

    The Clouds project is research directed towards producing a reliable distributed computing system. The initial goal is to produce a kernel which provides a reliable environment with which a distributed operating system can be built. The Clouds kernal consists of a set of replicated subkernels, each of which runs on a machine in the Clouds system. Each subkernel is responsible for the management of resources on its machine; the subkernal components communicate to provide the cooperation necessary to meld the various machines into one kernel. The implementation of a kernel-level storage manager that supports reliability is documented. The storage manager is a part of each subkernel and maintains the secondary storage residing at each machine in the distributed system. In addition to providing the usual data transfer services, the storage manager ensures that data being stored survives machine and system crashes, and that the secondary storage of a failed machine is recovered (made consistent) automatically when the machine is restarted. Since the storage manager is part of the Clouds kernel, efficiency of operation is also a concern.

  1. Cloud Storage Vendors Wide Support and Security Key Features for Shifting Towards Business Perspective

    Directory of Open Access Journals (Sweden)

    T Prasath

    2014-02-01

    Full Text Available The emerging trends that suits well with the shifting terminologies of computational environment. The cloud computing plays the vital role in today’s business activities. The essential fact of computing rapid technological shift towards cloud.  The storage medium of cloud provides common public spacing, privatized infrastructure, and other platform supports are facilitated. Here in this paper a brief scrutiny  under gone on various cloud storage vendors. The various cloud storage vendors provides data storage, space availability, scaling, sharing, secure transmission between cloud storage medium. Here different vendors wide data storage mediums are discussed with their security features and data access managing capabilities are rendered.

  2. Emittance growth induced by electron cloud in proton storage rings

    CERN Document Server

    Benedetto, Elena; Coppa, G

    2006-01-01

    In proton and positron storage rings with many closely spaced bunches, a large number of electrons can accumulate in the beam pipe due to various mechanisms (photoemission, residual gas ionization, beam-induced multipacting). The so-formed electron cloud interacts with the positively charged bunches, giving rise to instabilities, emittance growth and losses. This phenomenon has been observed in several existing machines such as the CERN Super Proton Synchrotron (SPS), whose operation has been constrained by the electron-cloud problem, and it is a concern for the Large Hadron Collider (LHC), under construction at CERN. The interaction between the beam and the electron cloud has features which cannot be fully taken into account by the conventional and known theories from accelerators and plasma physics. Computer simulations are indispensable for a proper prediction and understanding of the instability dynamics. The main feature which renders the beam-cloud interactions so peculiar is that the the electron cloud...

  3. Guaranteeing Data Storage Security in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Viswanath Aiyer

    2015-05-01

    Full Text Available Cloud Computing has been imagined as the next generation structural engineering of IT Enterprise. .By using the homomorphic token with dispersed verification of eradication coded information, our plan attains to the combination of capacity rightness protection and information blunder limitation, i.e., the identification of getting rowdy server(s

  4. On the Feasibility of a Network Coded Mobile Storage Cloud

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2015-01-01

    Conventional cloud storage services offer relatively good reliability and performance in a cost-effective manner. However, they are typically structured in a centralized and highly controlled fashion. In more dynamic storage scenarios, these centralized approaches are unfeasible and developing...... decentralized storage approaches becomes critical. The novelty of this paper is the introduction of the highly dynamic distributed mobile cloud, which uses free resources on user devices to move storage to the edges of the network. At the core of our approach, lies the use of random linear network coding...... data availability. We have found that as little as 75% redundancy is enough to offer 99.28% availability for the examined period and essentially 100% availability is achieved when using 50% redundancy along with high-availability nodes. We have leveraged traces from a popular P2P mobile application...

  5. Public Data Integrity Verification for Secure Cloud Storage

    Directory of Open Access Journals (Sweden)

    Hongwei Liu

    2013-02-01

    Full Text Available Cloud storage can provide a flexible on-demand data storage service to users anywhere and anytime. However, users’ data is owned by cloud service providers physically, and the physical boundary between two users’ data is fuzzy. In this environment not controlled by users, a method to ensure users’ data integrity must be provided. In order to avoid retrieving enormous storage data and users themselves checking, a public auditing protocol was proposed based on the BLS short signature scheme and the homomorphic hash function. The user computed the signatures of the blocks, and moved them to cloud servers to store. Cloud service providers computed the aggregation of the blocks, and the aggregation of signatures. Third party auditor verified whether the aggregate data was consistent with the aggregate signature. If consistent, users’ data integrity was verified. Based on the computational Diffie-Hellman assumption, the presented protocol is secure against the lost attack and tamper attack from cloud service providers. Based on the stream encryption, the proposed protocol is secure against the curious attack from third party auditor. As the independence among blocks and block signatures, this protocol supports blocks’ update, including insertion, modification and deletion. So, the protocol is secure and efficient, and supports for public verification, dynamic update and privacy preserving.

  6. A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

    OpenAIRE

    Ohmin Kwon; Dongyoung Koo; Yongjoo Shin; Hyunsoo Yoon

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an...

  7. A SPIC-AND-SPAN GATEWAY FOR SECURE DATA STORAGE IN CLOUD COMPUTING ENVIRONMENT

    OpenAIRE

    R.STEFFY CROWN; J.KOKILA

    2013-01-01

    Cloud computing is a light weight methodology. The cloud based applications are accessed by the end user through the use of web browser or a light weight desktop. In recent year, cloud computing is a one of the great powerful luminous star in the universal IT industry. Spotlight of this paper is constructing a cloud storage system for robustness, confidentiality, and functionality. A cloud storage system is otherwise called tremendous distributed storage system, it is a collection of numerous...

  8. Application of Cloud Storage on BIM Life-cycle Management

    Directory of Open Access Journals (Sweden)

    Lieyun Ding

    2014-08-01

    Full Text Available Because of its high information intensity, strong consistency and convenient visualization features, building information modelling (BIM has received widespread attention in the fields of construction and project management. However, due to large amounts of information, high integration, the need for resource sharing between various departments, the long time-span of the BIM application, challenges relating to data interoperability, security and cost all slow down the adoption of BIM. This paper constructs a BIM cloud storage concept system using cloud storage, an advanced computer technology, to solve the problem of mass data processing, information security, and cost problems in the existing application of BIM to full life-cycle management. This system takes full advantage of the cloud storage technique. Achievements are reached in four areas of BIM information management, involving security and licensing management, file management, work process management and collaborative management. The system expands the time and space scales, improves the level of participation, and reduces the cost of BIM. The construction of the BIM cloud storage system is one of the most important directions of the development of BIM, which benefits the promotion and further development of BIM to better serve construction and engineering project management.

  9. Move It or Lose It: Cloud-Based Data Storage

    Science.gov (United States)

    Waters, John K.

    2010-01-01

    There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…

  10. Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Vasu Raju

    2011-09-01

    Full Text Available The Cloud Computing is the next generation architecture of IT Enterprise. It moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Here, focus is on cloud data storage security, an important aspect of quality of service. To ensure the correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features. By utilizing the homomorphic token with distributed verification of erasure-coded data, the scheme achieves the integration of storage correctness and data error localization. The new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is efficient and resilient against Byzantine failure, malicious data modification attack, and server colluding attacks.

  11. Security in Cloud Computing : A Security Assessment of Cloud Computing Providers for an Online Receipt Storage

    OpenAIRE

    Blakstad, Kåre Marius; Andreassen, Mats

    2010-01-01

    Considerations with regards to security issues and demands must be addressed before migrating an application into a cloud computing environment. Different vendors, Microsoft Azure, Amazon Web Services and Google AppEngine, provide different capabilities and solutions to the individual areas of concern presented by each application. Through a case study of an online receipt storage application from the company dSafe, a basis is formed for the evaluation. The three cloud computing vendors are a...

  12. Cloud Data Storage Federation for Scientific Applications

    NARCIS (Netherlands)

    S. Koulouzis; D. Vasyunin; R. Cushing; A. Belloum; M. Bubak

    2013-01-01

    Nowadays, data-intensive scientific research needs storage capabilities that enable efficient data sharing. This is of great importance for many scientific domains such as the Virtual Physiological Human. In this paper, we introduce a solution that federates a variety of systems ranging from file se

  13. Applying a cloud computing approach to storage architectures for spacecraft

    Science.gov (United States)

    Baldor, Sue A.; Quiroz, Carlos; Wood, Paul

    As sensor technologies, processor speeds, and memory densities increase, spacecraft command, control, processing, and data storage systems have grown in complexity to take advantage of these improvements and expand the possible missions of spacecraft. Spacecraft systems engineers are increasingly looking for novel ways to address this growth in complexity and mitigate associated risks. Looking to conventional computing, many solutions have been executed to solve both the problem of complexity and heterogeneity in systems. In particular, the cloud-based paradigm provides a solution for distributing applications and storage capabilities across multiple platforms. In this paper, we propose utilizing a cloud-like architecture to provide a scalable mechanism for providing mass storage in spacecraft networks that can be reused on multiple spacecraft systems. By presenting a consistent interface to applications and devices that request data to be stored, complex systems designed by multiple organizations may be more readily integrated. Behind the abstraction, the cloud storage capability would manage wear-leveling, power consumption, and other attributes related to the physical memory devices, critical components in any mass storage solution for spacecraft. Our approach employs SpaceWire networks and SpaceWire-capable devices, although the concept could easily be extended to non-heterogeneous networks consisting of multiple spacecraft and potentially the ground segment.

  14. First cloud-based service for analyzing storage tank data

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    Most commercial storage tanks are unmonitored and require manual processes to verify conditions, remediate issues or request servicing. New Boundary Technologies has developed an off-the-shelf solution that eliminates several manual processes. Its TankVista Internet service was launched as the first cloud-based service for continuously monitoring and analyzing the conditions and storage levels of commercial storage tanks, bins, silos and other containers. TankVista takes data from storage tank sensors and translates it into graphics and maps that industry can use to drive new efficiencies in storage tank management. A bulk oil distributor can leverage TankVista to remotely and continuously monitor its own storage tanks as well as those of its clients. TankVista monitors tank level, temperature, pressure, humidity and other storage criteria in order to know exactly when and where to replenish supplies. Rather than re-filling tanks at about 50 per cent capacity, a bulk oil distributor can wait until usage levels dictate more efficient re-filling. The monitoring takes place without manual intervention. TankVista complements the iDigi Tank, which has the unique ability to wirelessly connect dispersed and remote tank assets, and get this information through drop-in wireless mesh technology to the cloud without requiring onsite Internet access. 1 fig.

  15. ANALYSIS OF DIFFERENT PRIVACY PRESERVING CLOUD STORAGE FRAMEWORKS

    Directory of Open Access Journals (Sweden)

    Rajeev Bedi

    2012-01-01

    Full Text Available Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologiesare used to preserve data security in cloud storage. [1] Proposes a framework which includes the designof data organization structure, the generation and management of keys, the treatment of change of user’saccess right and dynamic operations of data, and the interaction between participants. It also design aninteractive protocol and an extirpation-based key derivation algorithm, which are combined with lazyrevocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficientframework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloudstorage framework in which he designed an interaction protocol among participants, use key derivationalgorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide thesensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this frameworkis realized. This paper analyzes both the frameworks in terms of the feasibility of the frameworks,running overhead of the system and the privacy security of the frameworks.

  16. Dynamic Data Possession Checking for Secure Cloud Storage Service

    Directory of Open Access Journals (Sweden)

    Wenzhe Jiao

    2013-12-01

    Full Text Available Using cloud storage service, data owners can access their data anywhere at any time and enjoy the on-demand high quality applications and services, without the burden of local data storage and maintenance. Meanwhile, the risk of losing data stored with any untrustworthy service provider is the key barrier to widely adopt cloud storage service. To verify the integrity of data stored in cloud and relieve the security concerns of customers, a privacy-preserving data possession checking (DPC scheme is presented. This scheme uses Merkle Hash Tree to support fully dynamic data operations. To achieve robustness, forward error-correcting codes can be combined with the proposed DPC scheme, which can recover the data when a small amount of file has been corrupted. The scheme allows unlimited times verification without the need for the verifier to compare against the original data, which reduces the communication and computation complexity dramatically and preserves the privacy of the data. Extensive security analysis and simulation show that the proposed scheme is highly provably secure.

  17. Clone-based Data Index in Cloud Storage Systems

    Directory of Open Access Journals (Sweden)

    He Jing

    2016-01-01

    Full Text Available The storage systems have been challenged by the development of cloud computing. The traditional data index cannot satisfy the requirements of cloud computing because of the huge index volumes and quick response time. Meanwhile, because of the increasing size of data index and its dynamic characteristics, the previous ways, which rebuilding the index or fully backup the index before the data has changed, cannot satisfy the need of today’s big data index. To solve these problems, we propose a double-layer index structure that overcomes the throughput limitation of single point server. Then, a clone based B+ tree structure is proposed to achieve high performance and adapt dynamic environment. The experimental results show that our clone-based solution has high efficiency.

  18. Implementing cloud storage with OpenStack Swift

    CERN Document Server

    Rajana, Kris; Varma, Sreedhar

    2014-01-01

    This tutorial-based book has a step-by-step approach for each topic, ensuring it is thoroughly covered and easy to follow. If you are an IT administrator who wants to enter the world of cloud storage using OpenStack Swift, then this book is ideal for you. Whether your job is to build, manage, or use OpenStack Swift, this book is an ideal way to move your career ahead. Only basic Linux and server technology skills are expected, to take advantage of this book.

  19. Electron cloud instabilities in the Proton Storage Ring and Spallation Neutron Source

    OpenAIRE

    Blaskiewicz, M.; Furman, M.A.; Pivi, M.; Macek, R.J.

    2002-01-01

    Electron cloud instabilities in the Los Alamos Proton Storage Ring (PSR) and those foreseen for the Oak Ridge Spallation Neutron Source (SNS) are examined theoretically, numerically, and experimentally.

  20. Partial storage optimization and load control strategy of cloud data centers.

    Science.gov (United States)

    Al Nuaimi, Klaithem; Mohamed, Nader; Al Nuaimi, Mariam; Al-Jaroodi, Jameela

    2015-01-01

    We present a novel approach to solve the cloud storage issues and provide a fast load balancing algorithm. Our approach is based on partitioning and concurrent dual direction download of the files from multiple cloud nodes. Partitions of the files are saved on the cloud rather than the full files, which provide a good optimization to the cloud storage usage. Only partial replication is used in this algorithm to ensure the reliability and availability of the data. Our focus is to improve the performance and optimize the storage usage by providing the DaaS on the cloud. This algorithm solves the problem of having to fully replicate large data sets, which uses up a lot of precious space on the cloud nodes. Reducing the space needed will help in reducing the cost of providing such space. Moreover, performance is also increased since multiple cloud servers will collaborate to provide the data to the cloud clients in a faster manner. PMID:25973444

  1. Evaluation of the Huawei UDS cloud storage system for CERN specific data

    Science.gov (United States)

    Zotes Resines, M.; Heikkila, S. S.; Duellmann, D.; Adde, G.; Toebbicke, R.; Hughes, J.; Wang, L.

    2014-06-01

    Cloud storage is an emerging architecture aiming to provide increased scalability and access performance, compared to more traditional solutions. CERN is evaluating this promise using Huawei UDS and OpenStack SWIFT storage deployments, focusing on the needs of high-energy physics. Both deployed setups implement S3, one of the protocols that are emerging as a standard in the cloud storage market. A set of client machines is used to generate I/O load patterns to evaluate the storage system performance. The presented read and write test results indicate scalability both in metadata and data perspectives. Futher the Huawei UDS cloud storage is shown to be able to recover from a major failure of losing 16 disks. Both cloud storages are finally demonstrated to function as back-end storage systems to a filesystem, which is used to deliver high energy physics software.

  2. Factors Influencing the Adoption of Cloud Storage by Information Technology Decision Makers

    Science.gov (United States)

    Wheelock, Michael D.

    2013-01-01

    This dissertation uses a survey methodology to determine the factors behind the decision to adopt cloud storage. The dependent variable in the study is the intent to adopt cloud storage. Four independent variables are utilized including need, security, cost-effectiveness and reliability. The survey includes a pilot test, field test and statistical…

  3. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    Science.gov (United States)

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630

  4. The cloud storage service bwSync&Share at KIT

    CERN Document Server

    CERN. Geneva

    2014-01-01

    The Karlsruhe Institute of Technology introduced the bwSync&Share collaboration service in January 2014. The service is an on-premise alternative to existing public cloud storage solutions for students and scientists in the German state of Baden-Württemberg, which allows the synchronization and sharing of documents between multiple devices and users. The service is based on the commercial software PowerFolder and is deployed on a virtual environment to support high reliability and scalability for potential 450,000 users. The integration of the state-wide federated identity management system (bwIDM) and a centralized helpdesk portal allows the service to be used by all academic institutions in the state of Baden-Württemberg. Since starting, approximately 15 organizations and 8,000 users joined the service. The talk gives an overview of related challenges, technical and organizational requirements, current architecture and future development plans.

  5. Buffering PV output during cloud transients with energy storage

    Science.gov (United States)

    Moumouni, Yacouba

    Consideration of the use of the major types of energy storage is attempted in this thesis in order to mitigate the effects of power output transients associated with grid-tied CPV systems due to fast-moving cloud coverage. The approach presented here is to buffer intermittency of CPV output power with an energy storage device (used batteries) purchased cheaply from EV owners or battery leasers. When the CPV is connected to the grid with the proper energy storage, the main goal is to smooth out the intermittent solar power and fluctuant load of the grid with a convenient control strategy. This thesis provides a detailed analysis with appropriate Matlab codes to put onto the grid during the day time a constant amount of power on one hand and on the other, shift the less valuable off-peak electricity to the on-peak time, i.e. between 1pm to 7pm, where the electricity price is much better. In this study, a range of base constant power levels were assumed including 15kW, 20kW, 21kW, 22kW, 23kW, 24kW and 25kW. The hypothesis based on an iterative solution was that the capacity of the battery was increased by steps of 5 while the base supply was decreased by the same step size until satisfactorily results were achieved. Hence, it turned out with the chosen battery capacity of 54kWh coupled to the data from the Amonix CPV 7700 unit for Las Vegas for a 3-month period, it was found that 20kW was the largest constant load the system can supply uninterruptedly to the utility company. Simulated results are presented to show the feasibility of the proposed scheme.

  6. Bio-Cryptography Based Secured Data Replication Management in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Elango Pitchai

    2016-07-01

    Full Text Available Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less secure because data remain under a single data mart. This can lead to data loss due to different causes like hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption, replication and storage of data

  7. 云存储安全技术综述%Survey of Secure Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    傅饶; 罗宇; 岳淼

    2014-01-01

    云存储是未来信息存储的一种理想方式,它提供方便易用的存储空间,但数据安全问题是云存储普及最大的障碍,因此云存储安全一直是云存储研究的重点。文章介绍了云存储的安全需求及研究现状,最后探讨了安全云存储系统未来的研究方向。%Cloud storage is a future ideal way of information storage, it provides user-friendly storage space, but the data security has been the biggest obstacle to the popularization of cloud storage, so cloud storage security has always been emphasis in cloud storage. This paper introduces the security demand and the current status of cloud storage, at last we discuss the future research di-rections of secure cloud storage system.

  8. Integration of cloud-based storage in BES III computing environment

    International Nuclear Information System (INIS)

    We present an on-going work that aims to evaluate the suitability of cloud-based storage as a supplement to the Lustre file system for storing experimental data for the BES III physics experiment and as a backend for storing files belonging to individual members of the collaboration. In particular, we discuss our findings regarding the support of cloud-based storage in the software stack of the experiment. We report on our development work that improves the support of CERN' s ROOT data analysis framework and allows efficient remote access to data through several cloud storage protocols. We also present our efforts providing the experiment with efficient command line tools for navigating and interacting with cloud storage-based data repositories both from interactive sessions and grid jobs.

  9. Mobile Storage and Search Engine of Information Oriented to Food Cloud

    OpenAIRE

    Lifeng Wei; Bingmei Zhao

    2013-01-01

    The aim of this study is to establish food cloud information search architecture. Food information search engine based on cloud computing architecture can not only achieve more personalized and intelligent search, but also can solve problems of data processing and storage centralization caused by mass of food and custom information. According to design idea of mobile search engine based on cloud computing architecture, the Map/Reduce algorithm and HDFS were thoroughly analyzed and researched....

  10. Updating an Android Cloud Storage Solutionfrom an Existing iOS Application

    OpenAIRE

    Zimmermann, Jay

    2012-01-01

    Android and iOS are two of the leading smart phone and mobile device operating systems on the present market. Both of these platforms support third party application development. Cloud storage involves storing and accessing data online. The goal of this project involved helping a cloud storage company, with an existing iOS application and a less developed Android application, to update the Android application and simultaneously develop both applications. In addition to producing functionality...

  11. A SPIC-AND-SPAN GATEWAY FOR SECURE DATA STORAGE IN CLOUD COMPUTING ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    R.STEFFY CROWN

    2013-06-01

    Full Text Available Cloud computing is a light weight methodology. The cloud based applications are accessed by the end user through the use of web browser or a light weight desktop. In recent year, cloud computing is a one of the great powerful luminous star in the universal IT industry. Spotlight of this paper is constructing a cloud storage system for robustness, confidentiality, and functionality. A cloud storage system is otherwise called tremendous distributed storage system, it is a collection of numerous storage systems. Now a days the most important issue of cloud computing is surety and confidentiality. Then the cloud computing domain is an open source domain in which several resources are shared. So the sharing of data and the storing of data to be tricky. To overcome this problem in this paper, we proposed a new technique called Trusted Platform Module this conscious grand design to establish a data confidentiality and security prosperity including authentication, and integrity to the cloud computing environment.

  12. A Comparison of Redundancy Techniques for Private and Hybrid Cloud Storage

    Directory of Open Access Journals (Sweden)

    E.M. Hernandez-Ramirez

    2012-11-01

    Full Text Available File redundancy techniques have been very useful mechanisms for offering fault tolerance and data availability in anykind of storage. Cloud storage is not the exception. This paper presents an evaluation of classical file redundancytechniques implemented in two cloud-storage deployment models, private and hybrid. A small prototype of a privateand hybrid cloud storage was implemented for this evaluation. The performance impact when file redundancy is onlyapplied in a private cloud versus when redundancy is also distributed in a public cloud (the hybrid model is analyzed.Additional to classical file redundancy techniques, an innovative method was evaluated for file redundancy based onan information dispersal algorithm (IDA. The usage of IDA represents a good option for managing sensitive data inhybrid cloud storage. In this technique, only parts of a file need to be sent to the public cloud, avoiding the completefile to be read from outside of the private zone. In this context, there is a trade-off between performance (forreconstructing the original file, it is first necessary to obtain all of its fragments and the security level that coulddetermine the viability of using IDA.

  13. A Cloud Storage Platform in the Defense Context : Mobile Data Management With Unreliable Network Conditions

    NARCIS (Netherlands)

    Veen, J.S. van der; Bastiaans, M.; Jonge, M. de; Strijkers, R.J.

    2012-01-01

    This paper discusses a cloud storage platform in the defense context. The mobile and dismounted domains of defense organizations typically use devices that are light in storage, processing and communication capabilities. This means that it is difficult to store a lot of information on these devices

  14. An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment

    Directory of Open Access Journals (Sweden)

    Darapaneni Chandra Sekhar

    2014-10-01

    Full Text Available Today’s image capturing technologies are producing High Definitional-scale images which are also heavier on memory, which has prompted many users into cloud storage, cloud computing is an service based technology and one of the cloud service is Data Storage as a Service (DSaaS, two parties are involved in this service the Cloud Service Provider and The User, user stores his vital data onto the cloud via internet example: Dropbox. but a bigger question is on trustiness over the CSP by user as user data is stored remote devices which user has no clue about, in such situation CSP has to create a trust worthiness to the costumer or user, in these paper we addressed the mention insecurity issue with a well defined trusted image Storing and retrieval framework (TISR using compress sensing methodology.

  15. Securing the Data Storage and Processing in Cloud Computing Environment

    Science.gov (United States)

    Owens, Rodney

    2013-01-01

    Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…

  16. Electron cloud development in the Proton Storage Ring and in the Spallation Neutron Source

    OpenAIRE

    Pivi, M.T.F.; Furman, M.A.

    2002-01-01

    We have applied our simulation code "POSINST" to evaluate the contribution to the growth rate of the electron-cloud instability in proton storage rings. Recent simulation results for the main features of the electron cloud in the storage ring of the Spallation Neutron Source (SNS) at Oak Ridge, and updated results for the Proton Storage Ring (PSR) at Los Alamos are presented in this paper. A key ingredient in our model is a detailed description of the secondary emitted-electron energy sp...

  17. Information Storage and Management Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

    CERN Document Server

    Services, EMC Education

    2012-01-01

    The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies. Features a separate section on emerging area of cloud computi

  18. SSAP: Augmentation based Secure Storage Authentication and Privacy System in Cloud Environment

    Directory of Open Access Journals (Sweden)

    T Prasath

    2013-05-01

    Full Text Available In a cloud storage system storing of data in a third party cloud system that causes serious concern about data confidentiality and in protecting the data via encryption schemes though it provides protection mechanism the functionality of storage system are limited and supports some malicious operations over encrypted data. Developing a cloud based business solution suite for an organization that well equipped with resourceful environment. This suite follows Trusted user verification server that checks for the user authentication to grab the data from the persistence server and some improved schemes such as ISID is facilitated. In this paper we enhance a SSAP (Secure storage authentication and privacy system that proposes a re-encryption scheme that formulates the secure distributed storage system which is named as erasure code-based cloud storage system. The main contribution is the proxy re-encryption scheme which encodes the messages and forwarding operation over encrypted data. There are certain parameters for a number of copies of a message dispatched to storage servers queried by key servers. By using SUV (Straight unsigned verification scheme the improved secrecy ID (ISID scheme is addressed at the receiving end. These parameters allow more flexible adjustment between the storage servers and authentication between the two mediators which an ISID scheme that provides efficiency and provable secure system.

  19. Cloud Data Storage and Management%云数据存储与管理

    Institute of Scientific and Technical Information of China (English)

    刘琨; 董龙江

    2011-01-01

    Cloud computing as a new business model is developed very fast. Data storage and management is a very important and valuable research field in cloud computing. This paper introduces the concept of cloud storage as well as the advantage and architecture of cloud storage. Then it analyzes the cloud data storage technology-- GFS(Google File System)/HDFS(Hadoop Distributed File System) and the cloud data management system-BigTable/HBase based on the specific cases of enterprises.%云计算作为一种新兴的商业模式发展异常迅猛,数据存储与管理是云计算中非常重要也极具价值的研究领域.介绍了云存储的概念、云存储的优势及云存储的架构:结合企业的具体实例,从多层次多方位深度剖析了云数据存储技术GFS(Google File System)/HDFS(Hadoop Distributed File System)及云数据管理系统BigTable/HBase,并对它们进行了分析比较.

  20. Secured Data Consistency and Storage Way in Untrusted Cloud using Server Management Algorithm

    CERN Document Server

    Dinesh, C

    2011-01-01

    It is very challenging part to keep safely all required data that are needed in many applications for user in cloud. Storing our data in cloud may not be fully trustworthy. Since client doesn't have copy of all stored data, he has to depend on Cloud Service Provider. But dynamic data operations, Read-Solomon and verification token construction methods don't tell us about total storage capacity of server allocated space before and after the data addition in cloud. So we have to introduce a new proposed system of efficient storage measurement and space comparison algorithm with time management for measuring the total allocated storage area before and after the data insertion in cloud. So by using our proposed scheme, the value or weight of stored data before and after is measured by client with specified time in cloud storage area with accuracy. And here we also have proposed the multi-server restore point in server failure condition. If there occurs any server failure, by using this scheme the data can be reco...

  1. Towards Efficient Scientific Data Management using Cloud Storage Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Building more in-house datacenters to backup explosively growing scientific datasets is neither cost-effective nor in line with government green initiative. Cloud...

  2. A Security Integrated Data Storage Model for Cloud Environment

    OpenAIRE

    Sonia Rani; Neetu Sharma

    2014-01-01

    Security is one of the basic aspects required in any network model. But when the access is on some shared system such as Cloud, the security criticality is increased. This kind of system is defined along with service and resource sharing services as well as to perform the data management effectively. These services are integrated with public as well as private environment. Cloud System, increases the criticality because of available limited resources in mobile devices. In this pre...

  3. Properties of the electron cloud in a high-energy positron and electron storage ring

    International Nuclear Information System (INIS)

    Low-energy, background electrons are ubiquitous in high-energy particle accelerators. Under certain conditions, interactions between this electron cloud and the high-energy beam can give rise to numerous effects that can seriously degrade the accelerator performance. These effects range from vacuum degradation to collective beam instabilities and emittance blowup. Although electron-cloud effects were first observed two decades ago in a few proton storage rings, they have in recent years been widely observed and intensely studied in positron and proton rings. Electron-cloud diagnostics developed at the Advanced Photon Source enabled for the first time detailed, direct characterization of the electron-cloud properties in a positron and electron storage ring. From in situ measurements of the electron flux and energy distribution at the vacuum chamber wall, electron-cloud production mechanisms and details of the beam-cloud interaction can be inferred. A significant longitudinal variation of the electron cloud is also observed, due primarily to geometrical details of the vacuum chamber. Such experimental data can be used to provide realistic limits on key input parameters in modeling efforts, leading ultimately to greater confidence in predicting electron-cloud effects in future accelerators.

  4. Study of cloud storage technology and its application%云存储技术及其应用研究

    Institute of Scientific and Technical Information of China (English)

    陈一明

    2014-01-01

    Cloud computing is a new network application model,cloud storage is a data storage and management as the core of cloud computing systems.Describes cloud computing and cloud storage principles and application characteristics,design of a university-based teaching and learning environment of wisdom cloud storage - cloud teaching platform,the platform analysis principles,characteristics and so on.%云计算是一种新的网络应用模式,云存储是一个以数据存储和管理为核心的云计算系统。阐述云计算与云存储的原理及应用特点,设计一种基于云存储的高校智慧教学环境--云教学平台,分析该平台的原理、特点等。

  5. Electron cloud development in the Proton Storage Ring and in the Spallation Neutron Source

    International Nuclear Information System (INIS)

    We have applied our simulation code ''POSINST'' to evaluate the contribution to the growth rate of the electron-cloud instability in proton storage rings. Recent simulation results for the main features of the electron cloud in the storage ring of the Spallation Neutron Source(SNS) at Oak Ridge, and updated results for the Proton Storage Ring (PSR) at Los Alamos are presented in this paper. A key ingredient in our model is a detailed description of the secondary emitted-electron energy spectrum. A refined model for the secondary emission process including the so-called true secondary, rediffused and backscattered electrons has recently been included in the electron-cloud code

  6. Optimizing Cloud Based Image Storage, Dissemination and Processing Through Use of Mrf and Lerc

    Science.gov (United States)

    Becker, Peter; Plesea, Lucian; Maurer, Thomas

    2016-06-01

    The volume and numbers of geospatial images being collected continue to increase exponentially with the ever increasing number of airborne and satellite imaging platforms, and the increasing rate of data collection. As a result, the cost of fast storage required to provide access to the imagery is a major cost factor in enterprise image management solutions to handle, process and disseminate the imagery and information extracted from the imagery. Cloud based object storage offers to provide significantly lower cost and elastic storage for this imagery, but also adds some disadvantages in terms of greater latency for data access and lack of traditional file access. Although traditional file formats geoTIF, JPEG2000 and NITF can be downloaded from such object storage, their structure and available compression are not optimum and access performance is curtailed. This paper provides details on a solution by utilizing a new open image formats for storage and access to geospatial imagery optimized for cloud storage and processing. MRF (Meta Raster Format) is optimized for large collections of scenes such as those acquired from optical sensors. The format enables optimized data access from cloud storage, along with the use of new compression options which cannot easily be added to existing formats. The paper also provides an overview of LERC a new image compression that can be used with MRF that provides very good lossless and controlled lossy compression.

  7. Cloud Storage Technology and Development%云存储技术及其发展

    Institute of Scientific and Technical Information of China (English)

    孙小雁

    2014-01-01

    Along with the rapid development of cloud computing, researchers are getting more and more interested in this area. Since there is abundant of cloud data in cloud and a large number of users, cloud storage technology is becoming a key technology in cloud computing. The mainstream cloud platform and cloud storage technology are introduced in detail in this study. And the challenges under new situation and requirements are also discussed.%云计算的迅速发展吸引了研究人员的深入研究与普通民众的广泛关注,随着云端数据越来丰富、用户数量越来越庞大,云存储技术的发展越来越受到重视。对当前主流的云存储平台及平台中采用的云存储技术进行了详细的介绍,并剖析了新形势、新需求下云存储技术中存在的若干问题。

  8. Building a Parallel Cloud Storage System using OpenStack’s Swift Object Store and Transformative Parallel I/O

    Energy Technology Data Exchange (ETDEWEB)

    Burns, Andrew J. [Los Alamos National Laboratory; Lora, Kaleb D. [Los Alamos National Laboratory; Martinez, Esteban [Los Alamos National Laboratory; Shorter, Martel L. [Los Alamos National Laboratory

    2012-07-30

    Our project consists of bleeding-edge research into replacing the traditional storage archives with a parallel, cloud-based storage solution. It used OpenStack's Swift Object Store cloud software. It's Benchmarked Swift for write speed and scalability. Our project is unique because Swift is typically used for reads and we are mostly concerned with write speeds. Cloud Storage is a viable archive solution because: (1) Container management for larger parallel archives might ease the migration workload; (2) Many tools that are written for cloud storage could be utilized for local archive; and (3) Current large cloud storage practices in industry could be utilized to manage a scalable archive solution.

  9. Organizational principles of cloud storage to support collaborative biomedical research.

    Science.gov (United States)

    Kanbar, Lara J; Shalish, Wissam; Robles-Rubio, Carlos A; Precup, Doina; Brown, Karen; Sant'Anna, Guilherme M; Kearney, Robert E

    2015-08-01

    This paper describes organizational guidelines and an anonymization protocol for the management of sensitive information in interdisciplinary, multi-institutional studies with multiple collaborators. This protocol is flexible, automated, and suitable for use in cloud-based projects as well as for publication of supplementary information in journal papers. A sample implementation of the anonymization protocol is illustrated for an ongoing study dealing with Automated Prediction of EXtubation readiness (APEX). PMID:26736489

  10. Implementation and Performance Evaluation of Distributed Cloud Storage Solutions using Random Linear Network Coding

    DEFF Research Database (Denmark)

    Fitzek, Frank; Toth, Tamas; Szabados, Áron;

    2014-01-01

    various network coding approaches that trade-off reliability, storage and traffic costs, and system complexity relying on probabilistic recoding for cloud regeneration. We compare these approaches with other approaches based on data replication and Reed-Solomon codes. A simulator has been developed...

  11. Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Nithiavathy.R, Suresh.J

    2013-03-01

    Full Text Available Cloud computing hasbeen thegenuinesolution tothe rising storage costs of IT Enterprises.The costofdatastorage devices is too high rate at which datais being generated, where the enterprises orindividual users to frequently update theirhardwareor software. The data outsourced tothecloudwould help inreducing themaintenance.Theuser’s dataare moved from cloudto large datacenters, which are located remotely which does nothave control over it. Hence there is a securitybreech which has to beresolved. To address thisissue, we proposeaneffectivemethodtoachievesecureand dependable cloud storageby usingdistributed storage integrityauditingmechanism,which incorporatehomomorphic token anddistributed erasure-coded data for dynamicallystoring data.The proposed design allows the userwith lightweight communication and computationcost. To maintainreliablecloud storage correctness,and to locatethemisbehaving serverinwhich thedata arefrequently changingincloud. It isanefficient method for dynamic operation whichinclude erase, append, and block modification and itvery effective in fighting against server colludingattacks, byzantinefailure, maliciousdata blockmodifications.

  12. Two-Level Verification of Data Integrity for Data Storage in Cloud Computing

    Science.gov (United States)

    Xu, Guangwei; Chen, Chunlin; Wang, Hongya; Zang, Zhuping; Pang, Mugen; Jiang, Ping

    Data storage in cloud computing can save capital expenditure and relive burden of storage management for users. As the lose or corruption of files stored may happen, many researchers focus on the verification of data integrity. However, massive users often bring large numbers of verifying tasks for the auditor. Moreover, users also need to pay extra fee for these verifying tasks beyond storage fee. Therefore, we propose a two-level verification of data integrity to alleviate these problems. The key idea is to routinely verify the data integrity by users and arbitrate the challenge between the user and cloud provider by the auditor according to the MACs and ϕ values. The extensive performance simulations show that the proposed scheme obviously decreases auditor's verifying tasks and the ratio of wrong arbitration.

  13. Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing

    Directory of Open Access Journals (Sweden)

    J. Noorul Ameen

    2014-06-01

    Full Text Available Cloud computing, where the data has been stored on cloud servers and retrieved by users (data consumers the data from cloud servers. However, there are some security challenges which are in need of independent auditing services to verify the data integrity and safety in the cloud. Until now a numerous methods has been developed for remote integrity checking whichever only serve for static archive data and cannot be implemented to the auditing service if the data in the cloud is being dynamically updated. Therefore, it is expected to design an efficient and secure dynamic auditing protocol to convince the data owners for t he security and integrity of their data. In this paper, we intent to construct an auditing framework for cloud storage systems for efficient privacy-preserving auditing service. Then, our auditing protocol is extended to support the data dynamic operations for secure auditing in the random oracle model. In addition, our auditing protocol is improved to support batch auditing for both multiple owners and multiple clouds without any trusted organizer. Our proposed auditing protocols will be proved for their secure and efficient computation with reduced cost for the auditing.

  14. Investigation of Storage Options for Scientific Computing on Grid and Cloud Facilities

    International Nuclear Information System (INIS)

    In recent years, several new storage technologies, such as Lustre, Hadoop, OrangeFS, and BlueArc, have emerged. While several groups have run benchmarks to characterize them under a variety of configurations, more work is needed to evaluate these technologies for the use cases of scientific computing on Grid clusters and Cloud facilities. This paper discusses our evaluation of the technologies as deployed on a test bed at FermiCloud, one of the Fermilab infrastructure-as-a-service Cloud facilities. The test bed consists of 4 server-class nodes with 40 TB of disk space and up to 50 virtual machine clients, some running on the storage server nodes themselves. With this configuration, the evaluation compares the performance of some of these technologies when deployed on virtual machines and on “bare metal” nodes. In addition to running standard benchmarks such as IOZone to check the sanity of our installation, we have run I/O intensive tests using physics-analysis applications. This paper presents how the storage solutions perform in a variety of realistic use cases of scientific computing. One interesting difference among the storage systems tested is found in a decrease in total read throughput with increasing number of client processes, which occurs in some implementations but not others.

  15. Cloud data storage technology%云数据安全存储技术探讨

    Institute of Scientific and Technical Information of China (English)

    谭昕

    2015-01-01

    云数据计算因为其计算速度快、方便快捷、造价低廉等优势逐渐成为备受关注和欢迎的计算存储模式,但是随之而来的信息存储安全问题却困扰着众多的云数据用户,更使得众多的计算机用户望而却步。本文着重介绍了密文访问、加密存储、数据销毁三个方面对云数据安全存储技术进行了分析。%Cloud data because of its calculation speed is fast, convenient and quick, low cost and other advantages gradually become attention and welcome to the calculation of the storage mode, but the resulting information storage security problem has plagued many of cloud data users, more make many computer users. This paper introduces the ciphertext access, encryption storage, data destruction of three aspects of cloud data storage technology are analyzed.

  16. OpenStack Swift as Multi-Region Eventual Consistency Storage for ownCloud Primary Storage

    CERN Document Server

    CERN. Geneva

    2014-01-01

    As more users adopt AARNet’s CloudStor Plus offering within Australia, interim solutions deployed to overcome failures of various distributed replicated storage technologies haven’t kept pace with the growth in data volume. AARNet’s original design goal of user proximal data storage, combined with national and even international data replication for redundancy reasons continues to be a key driver for design choices. AARNet’s national network is over 90ms from end to end, and accommodating this has been a key issue with numerous software solutions, hindering attempts to provide both original design goals in a reliable real-time manner. With the addition of features to the ownCloud software allowing primary data storage on OpenStack Swift, AARNet has chosen to deploy Swift in a nation spanning multi-region ring to take advantage of Swift’s eventual consistency capabilities and the local region quorum functionality for fast writes. The scaling capability of Swift resolves the twin problems of geogr...

  17. Distributed storage and cloud computing: a test case

    Science.gov (United States)

    Piano, S.; Delia Ricca, G.

    2014-06-01

    Since 2003 the computing farm hosted by the INFN Tier3 facility in Trieste supports the activities of many scientific communities. Hundreds of jobs from 45 different VOs, including those of the LHC experiments, are processed simultaneously. Given that normally the requirements of the different computational communities are not synchronized, the probability that at any given time the resources owned by one of the participants are not fully utilized is quite high. A balanced compensation should in principle allocate the free resources to other users, but there are limits to this mechanism. In fact, the Trieste site may not hold the amount of data needed to attract enough analysis jobs, and even in that case there could be a lack of bandwidth for their access. The Trieste ALICE and CMS computing groups, in collaboration with other Italian groups, aim to overcome the limitations of existing solutions using two approaches: sharing the data among all the participants taking full advantage of GARR-X wide area networks (10 GB/s) and integrating the resources dedicated to batch analysis with the ones reserved for dynamic interactive analysis, through modern solutions as cloud computing.

  18. Distributed storage and cloud computing: a test case

    International Nuclear Information System (INIS)

    Since 2003 the computing farm hosted by the INFN Tier3 facility in Trieste supports the activities of many scientific communities. Hundreds of jobs from 45 different VOs, including those of the LHC experiments, are processed simultaneously. Given that normally the requirements of the different computational communities are not synchronized, the probability that at any given time the resources owned by one of the participants are not fully utilized is quite high. A balanced compensation should in principle allocate the free resources to other users, but there are limits to this mechanism. In fact, the Trieste site may not hold the amount of data needed to attract enough analysis jobs, and even in that case there could be a lack of bandwidth for their access. The Trieste ALICE and CMS computing groups, in collaboration with other Italian groups, aim to overcome the limitations of existing solutions using two approaches: sharing the data among all the participants taking full advantage of GARR-X wide area networks (10 GB/s) and integrating the resources dedicated to batch analysis with the ones reserved for dynamic interactive analysis, through modern solutions as cloud computing.

  19. 一种基于Hadoop的Scool云存储平台%A Scool Cloud Storage Platform Based on the Hadoop

    Institute of Scientific and Technical Information of China (English)

    崔朝国; 刘志明; 李婧; 陈晓凡

    2013-01-01

    针对海量数据的指数级增长,现有的文件存储系统很难满足现有系统需求,提出基于Hadoop的Scool云存储平台,系统通过采用Linux集群技术、分布式文件系统和云计算框架等技术,来实现海量数据存储和高速数据处理.通过比较云存储和传统存储模式的区别,分析了云存储技术优势和可行性,介绍了云存储架构模型,设计了基于Hadoop的Scool云存储文件管理系统,为今后深入研究云计算和云存储提供了一定的基础.%Based on mass data of exponential growth, the existing file storage facilities already cannot satisfy the existing system re?quirements, based on the Hadoop building Scool cloud storage platform, through the use of Linux cluster technology, distributed file system and cloud computing framework technology, to realize the mass data storage and high speed data processing. Com?pared the cloud storage and traditional storage mode difference, analyzes the cloud storage technology advantages and feasibility and characteristics, this paper introduces the cloud storage architecture model, based on the design of the Hadoop Scool cloud storage file management system. For future in-depth research cloud computing and cloud storage laid a foundation.

  20. A Metadata Based Storage Model for Securing Data in Cloud Environment

    OpenAIRE

    S. Subashini; Kavitha, V.

    2012-01-01

    Problem statement: Enterprises are migrating to the cloud environment at a faster pace. Security of information that is being processed by the applications and ultimately getting stored in the data centers are of big concerns of this newly evolving environment. The security of the data is a concern not only during transferring of data through the wires but also during its storage phase where data stays most of the time. Approach: In order to keep the data secure during its storage phase, a pr...

  1. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    Science.gov (United States)

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature. PMID:25634700

  2. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  3. Cloud Storage in Digital Libraries%云存储在数字图书馆中的应用

    Institute of Scientific and Technical Information of China (English)

    董屹; 王昆鹏

    2013-01-01

    Representative of a trend in the development of computer information storage cloud storage, it is a new kind of data storage in the future, and cloud storage is bound in the library in large-scale applications. This paper introduced the concept of cloud storage, the characteristics of the status quo based on a preliminary exploration of cloud storage resources in the library stor?age and retrieval applications and libraries cloud storage prospects.%云存储代表计算机信息存储发展的一个趋势,它是一种新的数据存储、处理方式,在不久的将来,云存储必将在图书馆中大规模地应用.该文在介绍云存储概念、特点、现状的基础上,对云存储在图书馆中的资源存储和检索方面的应用进行了初步的探索,并分析了图书馆中云存储的应用前景.

  4. Status of experimental studies of electron cloud effects at the Los Alamos proton storage ring

    International Nuclear Information System (INIS)

    Various electron cloud effects (ECE) including the two-stream (e-p) instability at the Los Alamos Proton Storage Ring (PSR) have been studied extensively for the past five years with the goal of understanding the phenomena, mitigating the instability and ultimately increasing beam intensity. The specialized diagnostics used in the studies are two types of electron detectors, the retarding field analyzer and the electron sweepmg detector - which have been employed to measure characteristics of the electron cloud as functions of time, location in the ring and various influential beam parameters - plus a short stripline beam position monitor used to measure high frequency motion of the beam centroid. Highlights of this research program are summarized along with more detail on recent results obtained since the ECLOUD'02 workshop. Recent work mcludes a number of parametric studies of the various factors that affect the electron cloud signals, studies of the sources of initial or 'seed' electrons, additional observations of electron cloud dissipation after the beam pulse is extracted, studies of the 'first pulse instability' issue, more data on electron suppression as a cure for the instability, and observations of the effect of a one-turn weak kick on intense beams in the presence of a significant electron cloud.

  5. Revised cloud storage structure for light-weight data archiving in LHD

    Energy Technology Data Exchange (ETDEWEB)

    Nakanishi, Hideya, E-mail: nakanisi@nifs.ac.jp [National Institute for Fusion Science, 322-6 Oroshi-cho, Toki, Gifu 509-5292 (Japan); Masaki, Ohsuna; Mamoru, Kojima; Setsuo, Imazu; Miki, Nonomura; Masahiko, Emoto; Takashi, Yamamoto; Yoshio, Nagayama [National Institute for Fusion Science, 322-6 Oroshi-cho, Toki, Gifu 509-5292 (Japan); Takahisa, Ozeki [Japan Atomic Energy Agency, 801-1 Mukoyama, Naka, Ibaraki 311-0193 (Japan); Noriyoshi, Nakajima; Katsumi, Ida; Osamu, Kaneko [National Institute for Fusion Science, 322-6 Oroshi-cho, Toki, Gifu 509-5292 (Japan)

    2014-05-15

    Highlights: • GlusterFS is adopted to replace IznaStor cloud storage in LHD. • GlusterFS and OpenStack/Swift are compared. • SSD-based GlusterFS distributed replicated volume is separated from normal RAID storage. • LABCOM system changes the storage technology every 4 years for cost efficiency. - Abstract: The LHD data archiving system has newly selected GlusterFS distributed filesystem for the replacement of the present cloud storage software named “IznaStor/dSS”. Even though the prior software provided many favorable functionalities of hot plug and play node insertion, internal auto-replication of data files, and symmetric load balancing between all member nodes, it revealed a poor feature in recovering from an accidental malfunction of a storage node. Once a failure happened, the recovering process usually took at least several days or sometimes more than a week with a heavy cpu load. In some cases they fell into the so-called “split-brain” or “amnesia” condition, not to get recovered from it. Since the recovery time tightly depends on the capacity size of the fault node, individual HDD management is more desirable than large volumes of HDD arrays. In addition, the dynamic mutual awareness of data location information may be removed if some other static data distribution method can be applied. In this study, the candidate middleware of “OpenStack/Swift” and “GlusterFS” has been tested by using the real mass of LHD data for more than half a year, and finally GlusterFS has been selected to replace the present IznaStor. It has implemented very limited functionalities of cloud storage but a simplified RAID10-like structure, which may consequently provide lighter-weight read/write ability. Since the LABCOM data system is implemented to be independent of the storage structure, it is easy to plug off the IznaStor and on the new GlusterFS. The effective I/O speed is also confirmed to be on the same level as the estimated one from raw

  6. Secured Resource Sharing in Cloud Storage using Policy based Access Control

    Directory of Open Access Journals (Sweden)

    S. Imavathy

    2015-11-01

    Full Text Available Cloud computing is a general term anything that involves delivering hosted services, Anything as a Service (AaaS, over the web on demand basis. It uses the web and central remote servers to maintain data and applications. The lack of confidence in trusting information flow(users data are usually processes remotely in unknown machines that do not owned or operated by user in cloud has become common, as users fears of losing control of their own data (like personal, professional, financial, Health. In this approach, a secured cloud storage system that achieves policy-based access control is proposed with an information accountability cloud framework to keep track of the actual usage of the clients data.The access policy generated for the file controls the file accesses and policy revocation makes the file permanently inaccessible. The system is built upon a set of cryptographic key operations that are self- maintained by a set of key managers and adds security features. The access details of the data are logged and auditing also performed.

  7. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider. PMID:27571421

  8. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.

  9. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider. PMID:27571421

  10. Final critical habitat for the green sea turtle (Chelonia mydas)

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — To provide the user with a general idea of areas where final critical habitat for green sea turtle (Chelonia mydas) based on the description provided in the Federal...

  11. Resource Storage Management Model For Ensuring Quality Of Service In The Cloud Archive Systems

    Directory of Open Access Journals (Sweden)

    Mariusz Kapanowski

    2014-01-01

    Full Text Available Nowadays, service providers offer a lot of IT services in the public or private cloud. The client can buy various kinds of services like SaaS, PaaS, etc. Recently there was introduced Backup as a Service (BaaS as a variety of SaaS. At the moment there are available several different BaaSes for archiving the data in the cloud, but they provide only a basic level of service quality. In the paper we propose a model which ensures QoS for BaaS and some  methods for management of storage resources aimed at achieving the required SLA. This model introduces a set of parameters responsible for SLA level which can be offered on the basic or higher level of quality. The storage systems (typically HSM, which are distributed between several Data Centres,  are built based on disk arrays, VTLs, and tape libraries. The RSMM model does not assume bandwidth reservation or control, but is rather focused on the management of storage resources.

  12. A Metadata Based Storage Model for Securing Data in Cloud Environment

    Directory of Open Access Journals (Sweden)

    S. Subashini

    2012-01-01

    Full Text Available Problem statement: Enterprises are migrating to the cloud environment at a faster pace. Security of information that is being processed by the applications and ultimately getting stored in the data centers are of big concerns of this newly evolving environment. The security of the data is a concern not only during transferring of data through the wires but also during its storage phase where data stays most of the time. Approach: In order to keep the data secure during its storage phase, a preventive, robust security model is required. Instead of developing a robust security module to prevent hackers from intruding into data centers, a model which will prevent intruders from getting the required information even at the event of intrusion, will be of utmost use. Conventional security models secure data by encryption or by fragmentation. A security model developed using a fragmentation technique that is based on the sensitivity, criticality and value of the data provides better security by means of disintegration of value of the data and also a good technique for prevention of information leaks. The proposed method also provides solutions to access the fragmented data. Results: The proposed model provides a efficient security solution for data stored in cloud. When compared to conventional methods, the speed of data queries are less for small databases, but prove to be very efficient for huge databases. Conclusion: This model provides an efficient solution for data storage security in cloud environment. This technique coupled with standard encryption techniques will make this model more robust.

  13. Optimizing the Use of Storage Systems Provided by Cloud Computing Environments

    Science.gov (United States)

    Gallagher, J. H.; Potter, N.; Byrne, D. A.; Ogata, J.; Relph, J.

    2013-12-01

    Cloud computing systems present a set of features that include familiar computing resources (albeit augmented to support dynamic scaling of processing power) bundled with a mix of conventional and unconventional storage systems. The linux base on which many Cloud environments (e.g., Amazon) are based make it tempting to assume that any Unix software will run efficiently in this environment efficiently without change. OPeNDAP and NODC collaborated on a short project to explore how the S3 and Glacier storage systems provided by the Amazon Cloud Computing infrastructure could be used with a data server developed primarily to access data stored in a traditional Unix file system. Our work used the Amazon cloud system, but we strived for designs that could be adapted easily to other systems like OpenStack. Lastly, we evaluated different architectures from a computer security perspective. We found that there are considerable issues associated with treating S3 as if it is a traditional file system, even though doing so is conceptually simple. These issues include performance penalties because using a software tool that emulates a traditional file system to store data in S3 performs poorly when compared to a storing data directly in S3. We also found there are important benefits beyond performance to ensuring that data written to S3 can directly accessed without relying on a specific software tool. To provide a hierarchical organization to the data stored in S3, we wrote 'catalog' files, using XML. These catalog files map discrete files to S3 access keys. Like a traditional file system's directories, the catalogs can also contain references to other catalogs, providing a simple but effective hierarchy overlaid on top of S3's flat storage space. An added benefit to these catalogs is that they can be viewed in a web browser; our storage scheme provides both efficient access for the data server and access via a web browser. We also looked at the Glacier storage system and

  14. 云数据安全存储技术分析%Analysis on Cloud Data Storage Technology Related to Security

    Institute of Scientific and Technical Information of China (English)

    朱斌

    2015-01-01

    文章对云数据存储模式进行分析,对云数据安全存储存在的问题进行研究,对云数据安全存储技术进行了探讨。%The paper analyzed cloud data storage mode,cloud data storage problems of security research,security of cloud data storage technologies were discussed.

  15. 云存储数据缩减技术研究%Research on cloud storage data reduction technology

    Institute of Scientific and Technical Information of China (English)

    胡新海

    2012-01-01

    基于云计算应用中的云存储技术,使数据存储变得安全可靠和易管理。在云存储技术数据存储的过程中,不仅考虑数据读写的速度,还得处理数据存储效率,以便满足当前海量信息存储的需求。云存储中的数据缩减技术可以缩减数据信息量,提高存储的效率,满足数据存储急剧的要求。通过对几种数据缩减技术进行比较研究分析,探讨了对数据处理后存储的效率以及每项技术发展状况,为用户选择云存储数据缩减技术提供有力的参考。%Based on cloud storage technology applied in cloud computing applications, data storage has become more safer, reliable and manageable. During the process of cloud data storage,we not only consider the speed of data read and write,but also deal with the efficiency of data storage,in order to meet the needs of the vast amounts of information storage. Cloud storage data reduction technology can reduce the data amount of information to improve the efficiency of the storage to meet drastic re- quirements of data storage. Through a comparative study of several pairs of data reduction technology carried out, the author discuss and analyze the efficiency of the stored after the data processing and the technological development status to provide strong reference for the user to select the cloud storage data reduction technology.

  16. A Bit String Content Aware Chunking Strategy for Reduced CPU Energy on Cloud Storage

    Directory of Open Access Journals (Sweden)

    Bin Zhou

    2015-01-01

    Full Text Available In order to achieve energy saving and reduce the total cost of ownership, green storage has become the first priority for data center. Detecting and deleting the redundant data are the key factors to the reduction of the energy consumption of CPU, while high performance stable chunking strategy provides the groundwork for detecting redundant data. The existing chunking algorithm greatly reduces the system performance when confronted with big data and it wastes a lot of energy. Factors affecting the chunking performance are analyzed and discussed in the paper and a new fingerprint signature calculation is implemented. Furthermore, a Bit String Content Aware Chunking Strategy (BCCS is put forward. This strategy reduces the cost of signature computation in chunking process to improve the system performance and cuts down the energy consumption of the cloud storage data center. On the basis of relevant test scenarios and test data of this paper, the advantages of the chunking strategy are verified.

  17. Tests of Cloud Computing and Storage System features for use in H1 Collaboration Data Preservation model

    International Nuclear Information System (INIS)

    Based on the currently developing strategy for data preservation and long-term analysis in HEP tests of possible future Cloud Computing based on the Eucalyptus Private Cloud platform and the petabyte scale storage open source system CEPH were performed for the H1 Collaboration. Improvements in computing power and strong development of storage systems suggests that a single Cloud Computing resource supported on a given site will be sufficient for analysis requirements beyond the end-date of experiments. This work describes our test-bed architecture which could be applied to fulfill the requirements of the physics program of H1 after the end date of the Collaboration. We discuss the reasons why we choose the Eucalyptus platform and CEPH storage infrastructure as well as our experience with installations and support of these infrastructures. Using our first test results we will examine performance characteristics, noticed failure states, deficiencies, bottlenecks and scaling boundaries.

  18. Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE

    Directory of Open Access Journals (Sweden)

    Mrs. S. Ramya

    2013-07-01

    Full Text Available Cloud computing techniques are used to share resources. It transfers the application software and databases to the centralized large data centers. Storing important data with cloud storage providers comes with serious security risks. The cloud can leak confidential data, modify the data, or return inconsistent data to different users. So, the cloud data security requires authentication and integrity analysis for the storage data values. An erasure code provides redundancy by breaking objects up into smaller fragments and storing the fragments in different places. The key is that you can recover the data from any combination of a smaller number of those fragments. With threshold proxy re-encryption scheme (PRE , a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval. It meets the requirements that storage servers independently perform encoding and re-encryption and key servers independently perform partial decryption. The system user forwards his data in the storage servers to another user without retrieving the data back. A major feature of the cloud services is that user’s data are usually processed remotely in unknown machines that users do not own or operate. Conditional Proxy Re-Encryption (C-PRE is proposed, whereby user has a fine-grained control over the delegation. As a result, user can flexibly assign her delegate, and decryption capability based on the conditions attached to the messages, using a proxy with no higher trust than in existing PRE schemes

  19. Research on Key Technologies of Cloud Storage%云存储关键技术研究

    Institute of Scientific and Technical Information of China (English)

    许志龙; 张飞飞

    2012-01-01

    Since the advent of mass storage system and the development of the parallel file system and distributed file systems, cloud storage system which is based on cloud computing technology, will become an important storage in future with the characteristics of low cost and scalability. Intro- duces the technology and implementation related to cloud storage and the application of cloud storage in some fields.%随着海量存储系统的出现与并行文件系统、分布式文件系统的发展.云存储系统建立在云计算技术前提之上,以其成本低、可扩展的特点,将成为未来的主要存储方式。介绍云存储相关的技术与实现及云存储在目前几个主要领域的应用。

  20. The Comparative Study for Cloud Storage and Cloud Storage Architecture Structure Model%云存储结构模型及云存储架构的比较研究

    Institute of Scientific and Technical Information of China (English)

    王哈琴

    2013-01-01

    The concept of cloud storage is a new concept, its technology, including the use of cluster computing, distrib-uted file systems, and grid computing technologies. These heterogeneous storage systems through mutual coordination, cooperation, constitute a virtual, huge storage system as a whole provides a common external data storage and business access function. This article describes the structure of cloud storage model, and several typical cloud storage architec-ture of a comparative study.%云存储的概念是一个新的概念,它所利用的技术包括集群计算、分布式文件系统以及网格计算技术等。这些异构的存储系统通过彼此的协调、配合,构成一个虚拟的、巨大的存储系统,作为一个整体共同对外提供数据存储和业务访问功能。文章阐述了云存储结构模型,并对几种典型云存储的架构进行了比较研究。

  1. Leveraging Cloud Computing to Improve Storage Durability, Availability, and Cost for MER Maestro

    Science.gov (United States)

    Chang, George W.; Powell, Mark W.; Callas, John L.; Torres, Recaredo J.; Shams, Khawaja S.

    2012-01-01

    The Maestro for MER (Mars Exploration Rover) software is the premiere operation and activity planning software for the Mars rovers, and it is required to deliver all of the processed image products to scientists on demand. These data span multiple storage arrays sized at 2 TB, and a backup scheme ensures data is not lost. In a catastrophe, these data would currently recover at 20 GB/hour, taking several days for a restoration. A seamless solution provides access to highly durable, highly available, scalable, and cost-effective storage capabilities. This approach also employs a novel technique that enables storage of the majority of data on the cloud and some data locally. This feature is used to store the most recent data locally in order to guarantee utmost reliability in case of an outage or disconnect from the Internet. This also obviates any changes to the software that generates the most recent data set as it still has the same interface to the file system as it did before updates

  2. A Low Energy Consumption Storage Method for Cloud Video Surveillance Data Based on SLA Classification

    Directory of Open Access Journals (Sweden)

    Yonghua Xiong

    2016-01-01

    Full Text Available With the continuous expansion of the amount of data with time in mobile video applications such as cloud video surveillance (CVS, the increasing energy consumption in video data centers has drawn widespread attention for the past several years. Addressing the issue of reducing energy consumption, we propose a low energy consumption storage method specially designed for CVS systems based onthe service level agreement (SLA classification. A novel SLA with an extra parameter of access time period is proposed and then utilized as a criterion for dividing virtual machines (VMs and data storage nodes into different classifications. Tasks can be scheduled in real time for running on the homologous VMs and data storage nodes according to their access time periods. Any nodes whose access time periods do not encompass the current time will be placed into the energy saving state while others are in normal state with the capability of undertaking tasks. As a result, overall electric energy consumption in data centers is reduced while the SLA is fulfilled. To evaluate the performance, we compare the method with two related approaches using the Hadoop Distributed File System (HDFS. The results show the superiority and effectiveness of our method.

  3. Using S3 cloud storage with ROOT and CvmFS

    Science.gov (United States)

    Arsuaga-Ríos, María; Heikkilä, Seppo S.; Duellmann, Dirk; Meusel, René; Blomer, Jakob; Couturier, Ben

    2015-12-01

    Amazon S3 is a widely adopted web API for scalable cloud storage that could also fulfill storage requirements of the high-energy physics community. CERN has been evaluating this option using some key HEP applications such as ROOT and the CernVM filesystem (CvmFS) with S3 back-ends. In this contribution we present an evaluation of two versions of the Huawei UDS storage system stressed with a large number of clients executing HEP software applications. The performance of concurrently storing individual objects is presented alongside with more complex data access patterns as produced by the ROOT data analysis framework. Both Huawei UDS generations show a successful scalability by supporting multiple byte-range requests in contrast with Amazon S3 or Ceph which do not support these commonly used HEP operations. We further report the S3 integration with recent CvmFS versions and summarize the experience with CvmFS/S3 for publishing daily releases of the full LHCb experiment software stack.

  4. Analysis on Data Security of Cloud Storage%云存储数据安全性分析

    Institute of Scientific and Technical Information of China (English)

    刘思思

    2015-01-01

    云存储是在云计算概念上延伸和发展出来的一个新的概念,是一个以数据存储和管理为核心的云计算系统。由于云服务系统规模巨大,承载了许多用户的隐私数据,再加上云的开放性和复杂性,使其安全面临着比传统信息系统更为严峻的挑战。文章分析了云存储系统的安全性需求,主要包括数据存储和传输的机密性、数据的完整性、身份认证和访问控制。%Cloud storage is a new concept extended and developed from cloud computing,and it is a cloud computing system whose core is data storage and management. It brings more severe challenges than the traditional information system because of the very large scale of cloud service system and the large amount of privacy data,coupled with the complexity and openness of clouds. This paper analyzed the security requirements including conifdentiality of data storage and transmission,data integrity,identity authentication and access control.

  5. Electron Cloud Generation and Trapping in a Quadrupole Magnet at the Los Alamos Proton Storage Ring

    International Nuclear Information System (INIS)

    Recent beam physics studies on the two-stream e-p instability at the LANL proton storage ring (PSR) have focused on the role of the electron cloud generated in quadrupole magnets where primary electrons, which seed beam-induced multipacting, are expected to be largest due to grazing angle losses from the beam halo. A new diagnostic to measure electron cloud formation and trapping in a quadrupole magnet has been developed, installed, and successfully tested at PSR. Beam studies using this diagnostic show that the 'prompt' electron flux striking the wall in a quadrupole is comparable to the prompt signal in the adjacent drift space. In addition, the 'swept' electron signal, obtained using the sweeping feature of the diagnostic after the beam was extracted from the ring, was larger than expected and decayed slowly with an exponential time constant of 50 to 100 (micro)s. Other measurements include the cumulative energy spectra of prompt electrons and the variation of both prompt and swept electron signals with beam intensity. Experimental results were also obtained which suggest that a good fraction of the electrons observed in the adjacent drift space for the typical beam conditions in the 2006 run cycle were seeded by electrons ejected from the quadrupole

  6. 基于网络的云存储模式的分析探讨%Discussion of the Cloud Storage Model Based on the Network

    Institute of Scientific and Technical Information of China (English)

    刘思得

    2012-01-01

    云存储模式是在云计算概念上延伸和发展出来的新概念,是基于网络的数据存储技术,主要提供数据存储和访问服务.本文首先分析了云存储产生的背景、基本概念及其与特点,然后介绍了云存储模式的基本结构,对基本结构中的4层进行分析,并结合Google的云存储系统GFS进行说明,最后就云存储的应用现状进行总结归纳,并分析了云存储的发展方向.%Cloud storage is a new extension and developed on the base of the cloud computing, it is a network梑ased data storage technology, with the main provider of data storage and access service. This paper first analyzed the background of cloud storage, basic concepts and characteristics, and then the basic structure of the cloud storage was presented. Combined with Google's cloud storage system-GFS, the four layers in the basic structure were analyzed. Finally, paper summarized the cloud storage application status and the development direction of the cloud storage was analyzed.

  7. Isolation and Characterization of Chelonia mydas Myoglobin

    Directory of Open Access Journals (Sweden)

    MOHAMAD SADIKIN

    2012-06-01

    Full Text Available Green sea turtle – Chelonia mydas is a lung respiration animal that is able to dive and stay uder sea water for hours without needing to surface for oxygen. As oxygen supply in muscles is assured by myoglobin, we propose to study some characteristic of this muscle protein in green sea turtles. To achieve this objective, pure green sea turtle myoglobin has to be made available. Therefore, our first task is to purify this muscle protein from green sea turtles. Skeletal muscles from 3 green sea turtle hatchlings were studied icroscopically and biochemically. Microscopy observation showed a general structure of striated muscle. Biochemical studies revealed that green sea turtle myoglobin could be more purely isolated to a certain degree by ephadex G-75 gel filtration and purified by immunoaffinity gel chromatography rather than direct purification by DEAE-Sepharose ion exchange chromatography technique. SDS-PAGE analysis showed that green sea turtle myoglobin ran together with horse myoglobin as 17 kDa molecular weight proteins.

  8. Magnetite in Black Sea Turtles (Chelonia agassizi)

    Science.gov (United States)

    Fuentes, A.; Urrutia-Fucugauchi, J.; Garduño, V.; Sanchez, J.; Rizzi, A.

    2004-12-01

    Previous studies have reported experimental evidence for magnetoreception in marine turtles. In order to increase our knowledge about magnetoreception and biogenic mineralization, we have isolated magnetite particles from the brain of specimens of black sea turtles Chelonia agassizi. Our samples come from natural deceased organisms collected the reserve area of Colola Maruata in southern Mexico. The occurrence of magnetite particles in brain tissue of black sea turtles offers the opportunity for further studies to investigate possible function of ferrimagnetic material, its mineralogical composition, grain size, texture and its location and structural arrangement within the host tissue. After sample preparation and microscopic examination, we localized and identified the ultrafine unidimensional particles of magnetite by scanning electron microscope (SEM). Particles present grain sizes between 10.0 to 40.0Mm. Our study provides, for the first time, evidence for biogenic formation of this material in the black sea turtles. The ultrafine particles are apparently superparamagnetic. Preliminary results from rock magnetic measurements are also reported and correlated to the SEM observations. The black turtle story on the Michoacan coast is an example of formerly abundant resource which was utilized as a subsistence level by Nahuatl indigenous group for centuries, but which is collapsing because of intensive illegal commercial exploitation. The most important nesting and breeding grounds for the black sea turtle on any mainland shore are the eastern Pacific coastal areas of Maruata and Colola, in Michoacan. These beaches are characterized by important amounts of magnetic mineral (magnetites and titanomagnetites) mixed in their sediments.

  9. Observation of Electron Cloud Instabilities and Emittance Dilution at the Cornell Electron-Positron Storage Ring Test Accelerator

    International Nuclear Information System (INIS)

    Electron cloud related emittance dilution and instabilities of bunch trains limit the performance of high intensity circular colliders. One of the key goals of the Cornell electron-positron storage ring Test Accelerator (CesrTA) research program is to improve our understanding of how the electron cloud alters the dynamics of bunches within the train. Single bunch beam diagnotics have been developed to measure the beam spectra, vertical beam size, two important dynamical effects of beams interacting with the electron cloud, for bunch trains on a turn-by-turn basis. Experiments have been performed at CesrTA to probe the interaction of the electron cloud with stored positron bunch trains. The purpose of these experiments was to characterize the dependence of beam-electron cloud interactions on the machine parameters such as bunch spacing, vertical chromaticity, and bunch current. The beam dynamics of the stored beam, in the presence of the electron cloud, was quantified using: 1) a gated beam position monitor (BPM) and spectrum analyzer to measure the bunch-by-bunch frequency spectrum of the bunch trains; 2) an x-ray beam size monitor to record the bunch-by-bunch, turn-by-turn vertical size of each bunch within the trains. In this paper we report on the observations from these experiments and analyze the effects of the electron cloud on the stability of bunches in a train under many different operational conditions

  10. Observation of Electron Cloud Instabilities and Emittance Dilution at the Cornell Electron-Positron Storage Ring Test Accelerator

    Science.gov (United States)

    Holtzapple, R. L.; Billing, M. G.; Campbell, R. C.; Dugan, G. F.; Flanagan, J.; McArdle, K. E.; Miller, M. I.; Palmer, M. A.; Ramirez, G. A.; Sonnad, K. G.; Totten, M. M.; Tucker, S. L.; Williams, H. A.

    2016-04-01

    Electron cloud related emittance dilution and instabilities of bunch trains limit the performance of high intensity circular colliders. One of the key goals of the Cornell electron-positron storage ring Test Accelerator (CesrTA) research program is to improve our understanding of how the electron cloud alters the dynamics of bunches within the train. Single bunch beam diagnotics have been developed to measure the beam spectra, vertical beam size, two important dynamical effects of beams interacting with the electron cloud, for bunch trains on a turn-by-turn basis. Experiments have been performed at CesrTA to probe the interaction of the electron cloud with stored positron bunch trains. The purpose of these experiments was to characterize the dependence of beam-electron cloud interactions on the machine parameters such as bunch spacing, vertical chromaticity, and bunch current. The beam dynamics of the stored beam, in the presence of the electron cloud, was quantified using: 1) a gated beam position monitor (BPM) and spectrum analyzer to measure the bunch-by-bunch frequency spectrum of the bunch trains; 2) an x-ray beam size monitor to record the bunch-by-bunch, turn-by-turn vertical size of each bunch within the trains. In this paper we report on the observations from these experiments and analyze the effects of the electron cloud on the stability of bunches in a train under many different operational conditions.

  11. Cloud Storage Application in Public Security Monitoring%云存储在公安监控中的应用

    Institute of Scientific and Technical Information of China (English)

    胡辉毅

    2015-01-01

    通过对原有监控数据CVR存储设备的软硬件升级改造,使其成为视频云存储系统,这样不仅能利用原有的监控数据CVR存储设备,节省存储设备的成本投入,而且提升了数据的存储效率,加强了智能平台的综合应用,并介绍了云存储的优越性及其改造方案和具体步骤。%based on the original monitoring data CVR storage hardware and software upgrades , making it a vid-eo cloud storage system .CVR in this way , not only to the original monitoring data storage devices of old utili-zation and save the cost of storage devices , and improves the data storage efficiency , strengthen the compre-hensive intelligence platform integration application .This paper introduces the advantages of cloud storage , the retrofit scheme and concrete steps .

  12. 浅析云盘技术及存储原理%Analysis of Cloud Disk Storage Technology and the Principle

    Institute of Scientific and Technical Information of China (English)

    王伟

    2015-01-01

    along with the computer technology and modern more advanced, cloud disk technology has penetrated into people's work, this article mainly discusses the principle of cloud storage technology, cloud and cloud disk storage space partition principle.%随着现代的计算机技术越来越先进,云盘的技术已经渗透到很多人的工作中,本篇文章主要来探讨云盘技术、云盘的储存原理以及云盘存储空间划分原理。

  13. Cloud Storage-Oriented Archiving Approach%面向云存储的归档方法

    Institute of Scientific and Technical Information of China (English)

    范中磊

    2011-01-01

    Aiming at the situation that current cloud storage systems mainly focus on file backup, this paper presents a cloud storage-oriented archiving approach. By storing inactive file data in cloud storage systems in archival form and leaving its stub information on clients for the use of read, this approach can not only save storage space on clients and improve the performance, but also implement transparent user access to archived data.%针对目前云存储系统主要提供文件备份的现状,提出了一种面向云存储的归档方法,该方法将不活跃的文件数据以归档的形式存放在云端存储系统,并在客户端保留其存根信息以供读取时使用,从而不仅大大节约了客户端存储空间,改善了客户端性能,而且实现了对用户透明的归档数据访问.

  14. Research on Cloud Storage System Based on Nimbus in Campus Network%基于Nimbus的校园云存储系统研究

    Institute of Scientific and Technical Information of China (English)

    林清滢

    2012-01-01

    Puts forward three-layer architecture of cloud storage system based on Nimbus in campus net- work. The architecture can be divided into three parts: infrastructure layer, cloud storage mid- dleware layer and cloud storage application layer. And then designs and realizes cloud storage system based on Nimbus, among which the main function of cloud storage middleware layer is built on the communication module. Through the communication module, we can make a remote call of the Nimbus components of cloud node, thus achieving the functions of cloud storage.%提出基于Nimbus的三层校园云存储系统的体系结构,分别为基础设施层、云存储中间件层、云存储应用层。并设计与实现基于Nimbus的云存储系统,其中云存储中间件的主要功能是建立在通信模块之上.通过通信模块远程调用云中远程节点的Nimbus组件.从而实现云存储功能。

  15. Cloud Storage Mode of University Library Digital Resources%高校图书馆数字资源的云存储模式探讨

    Institute of Scientific and Technical Information of China (English)

    付晓红; 莫筱梅

    2012-01-01

    分析了传统存储模式下高校图书馆数字资源存储存在的问题,结合云存储的优势,讨论了应用云存储模式存储高校图书馆数字资源,提出并分析了两种具体的高校图书馆数字资源云存储模式。%This paper analyzes the problems of the storage of university libraries digital resources under traditional storage mode,discusses the storage of university libraries digital resources which apply cloud storage mode based on the advantage of cloud storage,proposes and analyzes two specific cloud storage modes of university libraries digital resource.

  16. Mobile Cloud Networking: Mobile network, compute, and storage as one service on-demand

    OpenAIRE

    Jamakovic A.; Bohnert T.M.; Karagiannis G.

    2013-01-01

    The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN) is a EU FP7 Large-scale Integrating Project (IP) funded by the European Commission. MCN project was launched in November 2012 for the period of 36 month. In total top-tier 19 partners from industry and academia commit to jointly establish the vision of Mobile Cloud Networking, to develop a fully cloud-based mobile communication and application platform.

  17. Cloud storage-oriented unstructured data storage%面向云存储的非结构化数据存取

    Institute of Scientific and Technical Information of China (English)

    谢华成; 陈向东

    2012-01-01

    With the explosive growth of unstructured data, the existing storage technology in the aspects of I/O throughput, scalability and manageability needs improving urgently. Based on cloud storage and reliability theory, a model of distributed storage for unstructured data was created, and reliability function was also proposed. Hie distributed Relational Database Management System (RDBMS) was adopted as the bottom storage facilities, so unstructured data could be stored directly in the data table. Separated storage and unified management for unstructured data and metadata was realized, and thus storage system performance was promoted. Relative to the centralized storage, new system has superior availability. The simulation results show that the storage system has higher reliability and it is easy to expand. The distributed storage system can be applied to dynamic open computing environment, and it provides cloud storage service with better performance.%非结构化数据呈爆炸态势增长,现有存储技术在I/O吞吐能力、可扩展性及易管理性等方面亟待改进.存储系统以云存储和可靠性理论为基础,建立了非结构化数据的分布式存储模型,并设计了可靠度函数.采用分布式关系数据库管理系统(RDBMS)作为存储底层,将非结构化数据直接存储于数据表中,实现了非结构化数据和元数据的分离式存储和统一管理,进而提升了存储系统性能.相对于集中式存储,新系统具有较高的可用性.仿真结果显示,存储系统可靠度高且易于扩展.该分布式存储系统可应用于动态开放计算环境,提供效能较高的云存储服务.

  18. Intelligent and Pervasive Archiving Framework to Enhance the Usability of the Zero-Client-Based Cloud Storage System

    Directory of Open Access Journals (Sweden)

    Keedong Yoo

    2014-01-01

    Full Text Available The cloud storage-based zero client technology gains companies’ interest because of its capabilities in secured and economic management of information resources. As the use of personal smart devices such as smart phones and pads in business increases, to cope with insufficient workability caused by limited size and computing capacity most of smart devices have, the necessity to apply the zero-client technology is being highlighted. However, from the viewpoint of usability, users point out a very serious problem in using cloud storage-based zero client system: difficulty in deciding and locating a proper directory to store documents. This paper proposes a method to enhance the usability of a zero-client-based cloud storage system by intelligently and pervasively archiving working documents according to automatically identified topic. Without user’s direct definition of directory to store the document, the proposed ideas enable the documents to be automatically archived into the predefined directories. Based on the proposed ideas, more effective and efficient management of electronic documents can be achieved.

  19. Data Storage Issue Study under Cloud Computing Environment%云计算环境下的数据存储问题研究

    Institute of Scientific and Technical Information of China (English)

    蔡国瑜

    2011-01-01

    With the continuous development of computer technology, cloud computing and cloud storage as a new model,increasingly subject to personal and business concerns.In this paper, a brief description of cloud computing,based on the cloud computing environment for data storage is cloud storage body for analysis and research, demonstrated the great advantage of cloud storage and cloud storage constraints on the further development of a number of issues discussion.%随着计算机技术的不断向前发展,云计算和云存储作为一种崭新的模式,愈发受到个人和企业的关注。本文在对云计算进行简要介绍的基础上,对云计算环境下的数据存储即云存储体进行了分析和研究,展示了云存储的巨大优势,并就制约云存储进一步发展的若干问题进行了讨论。

  20. Cloud Storage Technology and Applications for Big Data%大数据场景下的云存储技术与应用

    Institute of Scientific and Technical Information of China (English)

    陈杰

    2012-01-01

    With the expansion of big data applications, mass cloud storage has become a more important requirement. To meet service demands, cloud storage needs a new framework and new networking and management methods. In this paper, we discuss the various scenarios of cloud storage and discuss the demands and key technology of cloud storage. Big data requirements promote the development of cloud storage, and cloud storage development creates new service applications.%文章认为随着大数据应用规模的扩大,新业务环境和场景对海量云存储需求的迫切,云存储平台需要打破原有的框架,改变组网和管理方式,以满足新的业务需求.文章分析了各种场景,提出了云存储的需求及关键技术等.文章指出大数据需求促进了云存储的发展,而云存储的发展则带动了新的业务应用.

  1. 介绍几款国外在线云存储服务%Several Foreign Online Cloud Storage Service Introduced

    Institute of Scientific and Technical Information of China (English)

    郑学超

    2011-01-01

    云存储对使用者来讲,不是指某一个具体的设备,而是指一个由许许多多个存储设备和服务器所构成的集合体。使用者使用云存储,并不是使用某一个存储设备,而是使用整个云存储系统带来的一种数据访问服务。%Cloud storage for the user is concerned,not referring to a specific device,but rather a many storage devices and servers constitute a collection.Users to use cloud storage,not to use a particular storage device,but the use of the entire cloud storage system in a data access service.

  2. The Application of RS Erasure Codes in the Cloud Storage%RS纠删码在云存储中的应用

    Institute of Scientific and Technical Information of China (English)

    余林琛; 章巍; 林强; 许杰星; 钟贝

    2011-01-01

    Cloud storage as a storage mode which designed to provide users with cheap,efficient,secure,scalable,customizable storage services,have become the trend of storage services.But because of its cloud storage node is not controllable,how to protect data stored in the cloud security issues facing challenges.RS erasure codes by the introduction of cloud storage,by fragmentation polymerization mechanism for cloud storage data security protection provides a new solution.%云存储作为一种旨在为用户提供高效、廉价、安全、可扩展、可定制的存储服务的存储模式,已然成为存储服务的发展趋势.但是因为其云端存储节点的不可控性,云存储在如何保障数据安全性的问题上面临着挑战.通过将RS纠删码引入云存储中,采用分片聚合机制,为云存储的数据安全性保障提供了一种新的解决方案.

  3. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  4. 基于混合云的安全数据存储架构%The Architecture of Secure Data Storage Based on Mixed Cloud

    Institute of Scientific and Technical Information of China (English)

    刘增才; 柳毅

    2011-01-01

    Cloud computing promises a more cost effective enabling technology to data storage and com- putations. Data security is one of the most challenging research work in cloud computing. Based on mixed cloud, presents an architecture of secure data storage. The process of data storage is divided into two parts. Realizes confidentiality, integrity and traceability in private cloud, while data storage and search in public cloud. This architecture can assure data storage secure and low enterprise cost in cloud computing simultaneously.%云计算技术为数据存储与计算提供了一个非常有效的方法,当前研究工作的重点集中在云中的数据安全。基于混合云,提出一个安全数据存储架构,将数据存储过程划分为两部分。数据的机密性、完整性和可追踪性的相关操作在私有云中实现,公共云实现数据的存储与查询。该架构在保障云端数据安全存储的同时,降低企业在保证云数据安全存储方面的成本。

  5. Cloud computing and cloud storage ecosystem research%云计算及云储存生态系统研究

    Institute of Scientific and Technical Information of China (English)

    张瑞

    2013-01-01

    近些年来,我国的服务计算范型得到了不断的开发和发展,网络资源的发布、网络维护、网络资源部署以及网络资源的合理配置等等领域都或多或少的产生了很大变化.不管是从个人角度来看,还是从企业整体的角度来看,用户都已经将过去原有的空间限制、时间限制以及组织限制很好的跨越,并且对其创新能力很好的扩展.作为当前形势下新一代服务计算的模型,云计算对于IT以及与其有关联的产业都产生了十分深远的影响,具有深远的意义.面对当前云计算技术的千变万化,将云计算的生态系统这一概念很好的采取,将云计算系统的构建、运行机制、关键要素以及其关键的算法很好的提出来,并且将云存储作为主要的例子,来将其构建的过程很好的分析,对其可能产生的问题进行探讨,并且明确其解决的措施,本文中,笔者就研究云计算及云储存生态系统.%In recent years, our country service computing paradigm has been constant development, cyber source release, network maintenance, cyber source as well as the deployment of the reasonable configuration of cyber source domain and so on are more or less produced very big change. Whether from the personal point of view, or from the point of view of the whole enterprise, users have the old space limit, time limit and limit the great span, and the innovation ability is very good extension. As the current situation of the new generation service computing model, cloud computing for IT and the related industry produced very far-reaching effect, has the profound significance. In the face of the current cloud computing cloud computing will be the myriads of changes, the ecosystem of this concept is good take, cloud computing system, operation mechanism, key factors and its key algorithm good put up, and a cloud storage as the main example, the process of the construction of a good analysis, the possible problems

  6. Mobile cloud networking: mobile network, compute, and storage as one service on-demand

    NARCIS (Netherlands)

    Jamakovic, Almerima; Bohnert, Thomas Michael; Karagiannis, Georgios; Galis, A.; Gavras, A.

    2013-01-01

    The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN)1 is a EU FP7 Large scale Integrating Project (IP) funded by the European Commission. MCN project was launched in November 2012 for the period of 36 month. In total top-tier 19 partners from industry and ac

  7. Design of the Cloud Storage Model for Video Monitoring%视频监控云存储模型设计

    Institute of Scientific and Technical Information of China (English)

    武文斌

    2012-01-01

    The paper introduces the characteristics and models of cloud storage,designs a topological structure of cloud storage for video monitoring based on the features of video storage,analyzes its major components and functions,and proposes the characteristics and prospects of the cloud storage for video monitoring.%介绍了云存储的特点和模型,并结合视频存储的特点,设计了一种用于视频监控的云存储拓扑机构图,分析了其主要组成部分和主要功能机制,提出了视频监控云存储的特点和未来发展。

  8. Online Distributed Storage System Architecture and Security with Cloud Storage as the Core%以云存储为核心的在线分布式存储系统架构与安全保护

    Institute of Scientific and Technical Information of China (English)

    胡晓文

    2011-01-01

    although cloud storage technology is currently being recognized as a safe and reliable data storage mechanism,but the safety problem is still cloud storage technology is one important problem to solve.In order to effectively improve the cloud storage security, this paper presents a cloud storage as the core of the online distributed storage system security architecture,the architecture makes full use of the data distributed storage management and data automatic recovery technology in data safety storage function,hierarchical data to achieve the cloud storage and data storage safety management.%虽然云存储技术是当前被人们所公认的一种安全可靠的数据存储机制,但安全问题依然是云存储技术所要解决的重要问题之一。为了能有效提高云存储的安全性。本文提出了一种以云存储为核心的在线分布式存储系统安全架构,该架构充分发挥了了数据分散存储管理以及数据自动恢复等技术在数据安全存储方面的功能,分层实现了数据的云存储以及存储数据的安全管理。

  9. A computational- And storage-cloud for integration of biodiversity collections

    Science.gov (United States)

    Matsunaga, A.; Thompson, A.; Figueiredo, R. J.; Germain-Aubrey, C.C; Collins, M.; Beeman, R.S; Macfadden, B.J.; Riccardi, G.; Soltis, P.S; Page, L. M.; Fortes, J.A.B

    2013-01-01

    A core mission of the Integrated Digitized Biocollections (iDigBio) project is the building and deployment of a cloud computing environment customized to support the digitization workflow and integration of data from all U.S. nonfederal biocollections. iDigBio chose to use cloud computing technologies to deliver a cyberinfrastructure that is flexible, agile, resilient, and scalable to meet the needs of the biodiversity community. In this context, this paper describes the integration of open source cloud middleware, applications, and third party services using standard formats, protocols, and services. In addition, this paper demonstrates the value of the digitized information from collections in a broader scenario involving multiple disciplines.

  10. 民间艺术资源的云存储技术研究%Research on cloud storage technology of folk art resources

    Institute of Scientific and Technical Information of China (English)

    李小波; 田中娟; 叶振

    2016-01-01

    The construction and research of Chinese folk art resources platform is an important and urgent task in the culture and art field, and there are many challenges. In the big data era, the use of cloud computing and cloud storage technology is an inevitable trend. This paper introduces the Hadoop cloud computing and cloud storage technology, puts forward the development scheme of folk art resources cloud storage platform based on Hadoop. The construction of folk art resources cloud storage platform based on Hadoop is feasible and effective.%我国民间艺术资源平台的建设和研究是当前文化艺术领域面临的一项重要而紧迫的课题,存在着诸多挑战。在大数据时代背景下,采用云计算和云存储技术是一个必然的趋势。文中介绍了Hadoop云计算与云存储技术,提出了基于Hadoop的民间艺术资源云存储平台建设方案。构建基于Hadoop的民间艺术资源云存储平台具有可行性和有效性。

  11. The research and discussion of digital library on cloud storage performance%数字图书馆的云存储性能研究与研讨

    Institute of Scientific and Technical Information of China (English)

    陈茫

    2014-01-01

    This paper discusses the application of digital libraries in the storage area of the cloud environment. Firstly, we introduce an open source, free, digital library architecture viable cloud storage environments; Secondly, we describe the key cloud storage replication technology, and build a digital library of realistic cloud storage architecture; finally, we detailed test and analyze the performance differences between different cloud storage.%首先,介绍一个开源的、免费的、可行的云环境下的数字图书馆存储构架;接下来,对云存储的关键复制技术逐一叙述,并构建数字图书馆的现实中云存储构架;最后,详细的测试和分析不同云存储之间的性能差异,探讨了数字图书馆在云环境下的存储领域的应用。

  12. Electron cloud dynamics in the Cornell Electron Storage Ring Test Accelerator wiggler

    OpenAIRE

    Celata, C. M.

    2011-01-01

    The interference of stray electrons (also called “electron clouds”) with accelerator beams is important in modern intense-beam accelerators, especially those with beams of positive charge. In magnetic wigglers, used, for instance, for transverse emittance damping, the intense synchrotron radiation produced by the beam can generate an electron cloud of relatively high density. In this paper the complicated dynamics of electron clouds in wigglers is examined using the example of a wiggler in th...

  13. 安全云存储系统与关键技术综述%Survey of Secure Cloud Storage System and Key Technologies

    Institute of Scientific and Technical Information of China (English)

    傅颖勋; 罗圣美; 舒继武

    2013-01-01

    随着云存储的迅猛发展,越来越多的用户选择使用云存储存放自己的资料.云存储的最大特点在于存储即服务,用户可以通过公有API将自己的数据上传到云端保存.但由于用户丧失了对数据的绝对控制权,一些数据安全的隐患也由此产生.为了消除安全隐患,并在保证安全性的同时尽可能地提高系统的服务质量,近年来国内外机构作了大量研究,从而开启了云存储中的一个研究方向——安全云存储系统.首先介绍了云存储系统的安全需求,然后阐述了安全云存储系统的研究现状,并总结了现有安全云存储系统中的一些关键技术的现状与不足之处,其中包括密钥分发与管理、基于属性的加密机制、基于数据密文的搜索机制与删冗机制、数据的持有性证明与恢复以及数据的可信删除等;最后指出了安全云存储系统未来的研究方向.%With the rapid development of cloud storage, more and more people prefer to store their owner data in remote cloud storage to avoid troublesome data management in local storage systems. The most famous feature of cloud storage is the concept that storage as a service, users can store their own data into clouds by public APIs. However, because of losing absolute control of data, users storing their own data in cloud storage will suffer a series of security problems, such as data peeping, data tampering, and so on. In order to solute those security problems and improve the quality of secure cloud system based on enhance its security, researchers have investigated lots about cloud security problem in recent years, which established a research branch of the cloud storage- -secure cloud storage system. This paper introduces the security demand of secure cloud storage system; expounds the current status of cloud storage system; summarizes the key technologies of currently secure cloud storage systems, such as encryption key's distribution and

  14. Cloud Robotics Platforms

    Directory of Open Access Journals (Sweden)

    Busra Koken

    2015-01-01

    Full Text Available Cloud robotics is a rapidly evolving field that allows robots to offload computation-intensive and storage-intensive jobs into the cloud. Robots are limited in terms of computational capacity, memory and storage. Cloud provides unlimited computation power, memory, storage and especially collaboration opportunity. Cloud-enabled robots are divided into two categories as standalone and networked robots. This article surveys cloud robotic platforms, standalone and networked robotic works such as grasping, simultaneous localization and mapping (SLAM and monitoring.

  15. 云存储在高校档案工作中的应用%Application of Cloud Storage in University Archives Task

    Institute of Scientific and Technical Information of China (English)

    郑奇茹

    2012-01-01

      This is an article on cloud computing and cloud storage. After introducing the concept of cloud computing and cloud storage,the article explains what are the influences and opportunities to university archives. From that,the writer seeks to explore a new development trend in university archives base on the new technology and nowadays condition.%  本文简要介绍“云计算”和“云存储”,阐述“云存储”给高校档案工作中带来的影响与机遇。并结合高校实际情况,探究未来高校档案管理的发展趋势。

  16. Design and Implementation of Data Storage Encryption Mechanism in Cloud Storage%云存储服务端数据存储加密机制的设计和实现

    Institute of Scientific and Technical Information of China (English)

    吕从东; 韩臻; 马威

    2014-01-01

    云存储是一种新型的网络存储形式。随着云存储的广泛使用,云存储中的数据安全问题,如数据泄漏、数据篡改,也成了用户广泛关注的问题。云存储可以分为访问层、应用接口层、基础管理层和存储层,云存储安全可以分为访问层安全、应用接口层安全、基础层安全和存储层安全。为保证云存储中服务端数据存储的机密性,文章设计了数据存储加密机制,在基于云桌面的办公系统个人存储的应用环境中,实现了基础管理层和存储层加密机制。基于JAVA、JSP等技术,实现了基础管理层;基于Bash脚本等技术,实现了基础管理层与存储层的接口;基于开源项目TGT实现了存储层数据加密机制,保证服务端存储数据的机密性。%Cloud storage is a new form of network storage. With the widespread use of cloud storage, data security in cloud storage, such as data leakage, data tampering, has become widespread concern. Cloud storage can be divided into the access layer (AL), the application interface layer (APIL), the infrastructure management layer (IML) and the storage layer (SL). Security of cloud storage can be divided into security of the access layer (SAL), security of the application interface layer (SAPIL), security of the infrastructure management layer (SIML) and security of the storage layer (SoSL). A data storage encryption mechanism is designed to deal with the conifdentiality of the data in cloud storage in this paper. The mechanism is implemented in an application environment of the ofifce system based on cloud desktop. The infrastructure management layer is implemented based on JAVA and JSP. The interface between the infrastructure management layer and the storage layer is implemented based on Bash Script. The data encryption on the sever is implemented based on open source projects TGT.

  17. Dual-channel Cloud Data Storage Security Scheme%双通道云数据存储安全方案研究

    Institute of Scientific and Technical Information of China (English)

    熊毅

    2012-01-01

    为了改善解决云计算中热点问题之一—数据存储安全,该文在研究现有经典云数据存储体系架构的基础上,根据云本身的超强计算能力和代价低廉等特性,提出了一种优化的双通道并行云存储架构,配以非对称数据加密手段,在硬件与架构层面直接针对安全问题作出优化部署.在大量的节约成本、提高效率、精简架构的情况下保证了云环境下数据存储安全性的提升.模拟部署表明,双通道并行云架构及非对称数据加密能有效的提高云数据存储的安全性.%In order to improve the resolution of cloud computing in the hot one of the issues-the security of data storage, the author based on the study of existing classic cloud data storage architecture, according to the characteristics of cloud super computing power and cost of low, propose an optimized dual-channel parallel cloud storage architecture,together with the non-symmetric data encryption,optimize the deployment of security issues made in the level of hardware and architecture. The security of data storage in the cloud environment is enhanced with a lot of cost savings, improve efficiency and streamlining. Simulated deployment, dual-channel parallel cloud structure and non-symmetric data encryption can effectively improve the security of the cloud data storage.

  18. Application of Cloud Storage in Hospital Informatization%浅谈云存储在医院信息化中的应用

    Institute of Scientific and Technical Information of China (English)

    张艳玲; 徐海峰

    2012-01-01

    Objective To use cloud storage for scalable storage resources in hospital informatization. Methods By using Hadoop cloud platform software for open source, and Panasas high performance hardware equipment, one solution based on the private cloud storage was proposed. Then the difficulties and challenges of cloud storage in hospital informatization were analyzed. Results Cloud storage could provide sufficient, manageable and extensible resources for hospital informatization. Conclusion With the development of cloud storage, it will have a brilliant future in hospital informatization construction.%目的:探讨云存储在医院信息化建设中,提供可扩展存储资源的应用前景及可能的挑战.方法:使用目前主流的Hadoop开源云平台软件和高性能的Panasas集群硬件设备,提出了一种基于私有云的存储解决方案,并分析云存储在医院信息化中所面临的困难与对策.结果:解决目前医院信息化过程中存储资源不足、管理不便的问题,为日益庞大的医疗数据提供按需扩展的存储空间.结论:随着云存储技术和法规的不断完善,云存储将在医院信息化建设中发挥更加实际的作用.

  19. Storage and Access of Media Files Based on Amazon S3 Compatible Cloud Storage Platform%基于Amazon S3兼容云存储平台的媒体文件存储与访问

    Institute of Scientific and Technical Information of China (English)

    宋顺祥; 姜莹

    2013-01-01

      首先介绍云计算和云存储的基本概念,对兼容Amazon S3的云存储平台的体系架构及其组成进行详细的分析,然后阐述在此平台上如何进行媒体文件的存储与访问,最后给出了系统构建所面临的挑战及其解决方案。%This paper first introduces the basic concepts of cloud computing and cloud storage, and then analyzes the architecture and components of cloud storage platform which is compatible with Amazon S3. The media files storage and access module based on this platform is designed. Final y, we present solutions to the chal enges we confronted with when we construct the system.

  20. Study on Safe Storage Technology of Cloud Computing Service Date%云计算服务数据安全储存技术研究

    Institute of Scientific and Technical Information of China (English)

    于颖

    2016-01-01

    根据当前云计算服务数据的发展趋势,在介绍云计算和云存储概念的基础上,分析云存储数据存在的主要安全问题,提出确保云计算服务数据安全的存储对策,为云计算服务数据在互联网及其他领域的安全储存提供技术方面的借鉴。%According to the development tendency of cloud computing service data at present, based on introducing the concept of cloud computing and cloud storage, this article analyzed the main safety problems existing in cloud storage data, put forward the storage countermeasure to ensure the safety of cloud computing service data, in order to provide technological reference for cloud computing service data stored safely on the internet and other fields.

  1. Storage Gateway for the Cloud Storage%面向云存储的存储网关

    Institute of Scientific and Technical Information of China (English)

    马军; 石辉; 裴文斌; 王福利

    2014-01-01

    With the development of the computer and network technology, the growing demands for the huge data storage and the high-performance data access make the storage systembasedon network becoming a research hotspot, especially the research of I/O subsystem about network server system. The research about distributed file system as a key part in the network server system is meaningful. Currently open source community provides several DFS(distributed file system) projects, such as KFS, moosefs, FastDFS, TFS, GFS. Most of projects support only API or storage gateway on Linux system, but not giving support API or storage gateway on Windows system. This study introduces the designing frameworks and the thinking process aboutstorage gateway on Windows system, and then gives a specific example program based on HDFS—dfsclient.%对大容量数据存储和快速读写的需求与计算机网络技术的发展,使得网络化存储系统成为网络服务器系统中I/O子系统研究的热点,作为网络存储系统的关键部件,对分布式文件系统的研究具有非常重要的意义.目前开源社区提供了KFS、moosefs、FastDFS、TFS、GFS[1]等多款分布式文件系统,其中多数提供了基于Linux操作系统的API或者存储网关,却没有提供Windows版的存储网关.主要对分布式文件系统Windows版存储网关的设计框架和思路进行介绍与分析,并实现了一个基于HDFS的Windows版分布式文件系统的存储网关程序dfsclient.

  2. 云存储在环保领域的应用研究%The Applications of Cloud Storage in the Field of Environmental Protection

    Institute of Scientific and Technical Information of China (English)

    崔洪渊

    2015-01-01

    介绍了太原市环保信息化建设的现状及问题, 提出环保信息系统云存储的建设目标和必要性, 并对云存储在环保领域的应用进行了探索研究.%This paper describes the current situation and problems of Taiyuan environmental information construction,pro-posed building objectives and the need for cloud storage of environmental information system and give the exploration and research in cloud storage applications in the field of environmental protection.

  3. 利用存储网关实现基于网络存储的企业私有云%Construction of enterprise private cloud based on network storage using storage gateway

    Institute of Scientific and Technical Information of China (English)

    孙一晴

    2013-01-01

    为解决企业存储快速增长的需求,避免巨量存储数据的迁移,通过引入存储网关的方式,将存储进行了虚拟化处理,从而在一定条件下简化了企业私有云的构建方式.研究结果表明,基于存储网关的企业私有云解决方案不仅能够满足存储的需求,而且具有部署方便快捷,实现相对简洁的特点,解决了企业在云存储应用和自身存储安全上的矛盾.%In order to solve the enterprise storage and rapid growth of demand, avoid the massive migration of storing data, a storage gateway was introduced, storage virtualization processing was done. The construction enterprise private cloud was simplified under certain conditions. The results show that, the enterprise private cloud solution based on storage gateway can not only meet the storage requirements, but also it has deployed conveniently, achieving relatively simple. It solves the contradiction of cloud storage application and its safe storage enterprises.

  4. Storage Design of Regional PACS Based on Cloud Architecture of Hadoop%基于Hadoop的云架构区域PACS存储方案设计

    Institute of Scientific and Technical Information of China (English)

    唐颖; 刘国庆

    2013-01-01

    Cloud storage offers an effective solution for storage problems of regional PACS (Picture Archiving & Communication System) image file. On the basis of analyzing regional PACS storage needs as well as the storage situation, a Hadoop-based cloud storage architecture was built. To improve degraded performance resulting from large quantity of small ifles storage, this paper designed two sets of storage solutions and developed a set of middleware. A test platform of Hadoop-based cloud storage was built and the results showed that:as DataNode nodes increased, the storage performance increased linearly;storage ifle should not be too large for image reading and displaying as soon as possible, each ifle should be kept within 64MB.%云存储为区域图片存档及通讯系统(PACS)的影像文件存储问题提供了有效的解决方案。本文在分析区域PACS存储需求以及目前存储现状的基础上,构建一个以Hadoop为基础的云存储服务架构。针对区域PACS影像文件类型较为单一的特点,设计了两套存储方案并开发了一套中间件加以测试。测试结果表明,随着DataNode节点增多,存储性能近似线性增加;为了尽快读取并显示影像,存储文件不宜过大,以每个文件不超过64MB为宜。

  5. 云存储模式下图书馆数字资源建设%Library Digital Resources Construction Based on Cloud Storage Mode

    Institute of Scientific and Technical Information of China (English)

    曾祥文

    2011-01-01

    随着图书馆数字资源总量的快速增加,传统的存储方式在面对海量数据存储的需求上,存在着容量和性能的瓶颈。云存储作为一种新型的存储服务模式,为图书馆的海量数字资源建设提供了一种新的选择。在分析图书馆数字资源建设需求、介绍云存储概念的基础上,对基于云存储模式下图书馆数字资源的建设进行了探讨。%With the rapid increase in quantity of the library digital resources,there is capacity and performance of bottleneck when the traditional way of storage in the face of mass storage requirements.As a new storage service mode,cloud storage provides a new choice for the amount of library digital resources construction.Based on the analysis of library digital resources construction demand and the introduction of the concept of cloud storage,this paper discussed the library digital resources construction based on the cloud storage mode.

  6. 基于光盘库的云存储系统架构设计%Cloud Storage Systems Based on Technology of Optical Disk Library

    Institute of Scientific and Technical Information of China (English)

    薛寅颖; 万晓冬

    2013-01-01

    Efficiency, scalability, and low cost of cloud storage trends of storage services, but the uncertainty of the storage nodes and network transmission, making its safety has been questioned. This article erasures codes and CD library into cloud storage to store data in secure storage management and transmission of data in the system, to provide a solution for improving the security of cloud storage system.%云存储的高效、可扩展性、廉价等优点成为存储服务的发展趋势,但是其存储节点的不确定性以及网络传输,使得其安全性受到质疑.本文将纠删码技术和光盘库引入到云存储中,实现存储数据在系统中的安全存储管理和传榆,为提高云存储系统安全性提供一个解决方案.

  7. CubeSat Cloud: A framework for distributed storage, processing and communication of remote sensing data on cubesat clusters

    Science.gov (United States)

    Challa, Obulapathi Nayudu

    CubeSat Cloud is a novel vision for a space based remote sensing network that includes a collection of small satellites (including CubeSats), ground stations, and a server, where a CubeSat is a miniaturized satellite with a volume of a 10x10x10 cm cube and has a weight of approximately 1 kg. The small form factor of CubeSats limits the processing and communication capabilities. Implemented and deployed CubeSats have demonstrated about 1 GHz processing speed and 9.6 kbps communication speed. A CubeSat in its current state can take hours to process a 100 MB image and more than a day to downlink the same, which prohibits remote sensing, considering the limitations in ground station access time for a CubeSat. This dissertation designs an architecture and supporting networking protocols to create CubeSat Cloud, a distributed processing, storage and communication framework that will enable faster execution of remote sensing missions on CubeSat clusters. The core components of CubeSat Cloud are CubeSat Distributed File System, CubeSat MapMerge, and CubeSat Torrent. The CubeSat Distributed File System has been created for distributing of large amounts of data among the satellites in the cluster. Once the data is distributed, CubeSat MapReduce has been created to process the data in parallel, thereby reducing the processing load for each CubeSat. Finally, CubeSat Torrent has been created to downlink the data at each CubeSat to a distributed set of ground stations, enabling faster asynchronous downloads. Ground stations send the downlinked data to the server to reconstruct the original image and store it for later retrieval. Analysis of the proposed CubeSat Cloud architecture was performed using a custom-designed simulator, called CubeNet and an emulation test bed using Raspberry Pi devices. Results show that for cluster sizes ranging from 5 to 25 small satellites, faster download speeds up to 4 to 22 times faster - can be achieved when using CubeSat Cloud, compared to a

  8. Load Scheduling in a Cloud Based Massive Video-Storage Environment

    DEFF Research Database (Denmark)

    Bayyapu, Karunakar Reddy; Fischer, Paul

    2015-01-01

    We propose an architecture for a storage system of surveillance videos. Such systems have to handle massive amounts of incoming video streams and relatively few requests for replay. In such a system load (i.e., Write requests) scheduling is essential to guarantee performance. Large-scale data-sto...

  9. The application of cloud storage in University digital resources construction%云存储在高校数字资源建设中的应用

    Institute of Scientific and Technical Information of China (English)

    潘华; 尹芝

    2013-01-01

    Given the acceleration of University digital resources construction, traditional storage technologies have not been able to meet the requirement for nowadays technologies. Cloud storage technologies, a new generation of service system, provides a method for mass storage. The paper not only introduces cloud computation and stor-age but also studies the application of cloud storage in University digital resources construction.%随着高校数字资源建设步伐的加快,传统的存储技术已不能满足如今资源建设的需求。云存储技术这一新的服务体系,为海量资源存储提供了一个新的方式。本文在介绍了云计算和云存储的基础上,讨论研究了云存储在高校数字资源存储的应用。

  10. 基于递归秘密共享的可靠云存储方案%A Reliable Cloud Storage Scheme Based on Recursive Secret Sharing

    Institute of Scientific and Technical Information of China (English)

    王家玲

    2015-01-01

    The existing cloud storage schemes can't balance redundant storage, data confidentiality and storage costs which troubled many users. In order to overcome the deficiencies of the existing cloud storage scheme, we proposed a reliable cloud storage scheme which suitable for the characteristics of digital library resources. The scheme can realize data redundant storage and can guarantee data confidentiality. In addition, the scheme will not bring a surge in storage space. This paper not only gives a framework of the scheme but also gives a detailed description of the specific scheme. Then, we make an analysis from the confidentiality, redundancy and storage cost etc. of the scheme to improve its reliability and high efficiency.%现有云存储方案无法兼顾冗余存储、数据机密性和存储开销等多方面因素,给诸多用户带来困扰。为克服现有方案的不足,提出一个高效可靠的云存储方案,该方案既能实现数据冗余存储又能保证数据机密性,且不会带来存储空间的剧增。文章给出方案的框架且对方案进行具体的描述,然后从机密性、冗余性和存储开销等方面对方案进行分析,得出本方案可靠性和高效性的优势。

  11. 基于Swiftstack的云存储关键技术研究%Research the Key Techniques of Cloud Storage Based on Swiftstack

    Institute of Scientific and Technical Information of China (English)

    严晔; 王欢; 苏伟; 秦雪; 吴玉宁

    2015-01-01

    With the development of cloud computing, it can provide users a convenient way to access data, but the high concurrency access and data processing and other issues affect the use of cloud storage. In view of the system structure and load balancing problems in the development of cloud computing, cloud storage. This article first on the system structure design,and puts forward the suitable strategy of load balancing for large and medium scale deployment situation. Using consistent hash,accidentally delete restoration and backup between nodes technologies to ensure the in-tegrity of the cloud data. At last,through big and small files of unstructured data write experiment to test the perfor-mance of cloud storage,the experimental results show that Swiftstack cloud storage meet the requirements of the user's need of cloud storage.%云计算的发展虽然使用户可以便捷的访问数据,但系统的高并发性访问和数据处理等问题影响着云存储的使用。文章针对开源云计算、云存储发展中系统架构设计和负载均衡问题提出了改进方案。本文首先对系统架构进行设计,提出了适合大、中规模部署情况下负载均衡的设置策略。采用一致性哈希、误删除恢复及节点间互备等技术保证云数据的完整性。最后通过实验对云存储进行大、小文件非结构化数据的写入性能测试,实验结果表明Swiftstack云存储能够满足用户的对云存储的使用要求。

  12. 基于分离密钥的云存储加密解决方案%A Project Designed by Cloud Storage Encryption Based on Separated Key

    Institute of Scientific and Technical Information of China (English)

    王志中; 周城; 牟宇飞

    2013-01-01

    原有的云存储模式所存在的问题已经困扰行业多年,在静态数据加密存储的过程中,只有实现真正意义上的数据私有化才能保证数据的安全,保障数据拥有者的利益.针对云存储应用中用户数据安全存储需求的提高,以Amazon S3(simple storage service)为例分析当前云存储模式下静态数据安全存在的普遍问题,设计了一套新的云端静态数据加密存储方案——分离密钥存储服务(separated key S3)解决方案,设计了新的密钥管理方法,从技术上实现了云端静态数据的安全,最后对该方案的数据安全性进行了分析.%The problems existing in the original cloud storage model has plagued the industry for many years, to realize the true sense of the data privatization in the static data encrypted storage process is able to ensure data security and protect data owners' interests. Cloud storage applications for the current secure storage of user data is able to improve data security. Taking Amazon S3 as an example, the general problem in static data security was analyzed. A new set of cloud static data encryption and storage solution, separated key S3, was designed, and a new key management method was also designed. The new technology absolutely accomplished the security of static data in the cloud. Additionally the data security analysis and prospect on next research was given.

  13. Research on Cloud Storage Access Control System%面向云存储的访问控制系统的研究

    Institute of Scientific and Technical Information of China (English)

    刘萍萍; 闫琳英

    2015-01-01

    For the purpose of secure cloud storage ,a secure cloud storage access control system scheme is proposed in this paper .In the scheme ,Linux and Hadoop are used to build the cloud platform .T he role-based access control method is employed to test identity and to access nonsensitive data . And the attribute encryption algorithm is applyed to encrypt/decrypt data .Experiment show s that this scheme can effectively ensure the integrity and confidentiality of data in the cloud storage .%为了达到安全云存储的目的,提出一种安全云存储的访问控制系统方案,该方案在Linux下使用Hadoop搭建云平台,并利用基于角色的访问控制方法进行用户身份的验证和非敏感数据的访问,采用属性加密算法对数据进行加解密操作。实验证明此方案能够有效保障云存储中数据的完整性和保密性。

  14. On the Cloud Storage Mode of University Library Digital Resources%高校图书馆数字资源云存储模式探究

    Institute of Scientific and Technical Information of China (English)

    施蓉蓉

    2012-01-01

    With the rapid increase in quantity of library digital resources,the drawbacks of traditional data storage model increasingly appear.As a new storage service mode,cloud storage provides a new choice for the amount of li-brary digital resources construction.This paper introduces some digital storage technologies,and discusses the application of cloud storage in university library digital resources storage.%随着图书馆数字资源总量的快速增加,传统的数据存储方式弊端日益显现。云存储作为一种新型的存储服务模式,为图书馆的海量数字资源建设提供了一种新的选择。在介绍数字存储技术的基础上,重点探讨了云存储在高校图书馆数字资源存储中的应用。

  15. 校园网云存储客户端的设计与实现%Design and Implementation of Campus Cloud Storage Client

    Institute of Scientific and Technical Information of China (English)

    彭英

    2015-01-01

    本文设计一个基于Hadoop的校园网云存储客户端,从系统的体系结构、功能组织和各功能模块方面进行了具体实现,并对其扩展性能进行了测试与分析。用户通过这个客户端管理自己的存储空间和文件,可以将文件上传到云存储服务器中进行存储,并能将云存储服务器中的文件下载并进行处理。%This paper designs a campus cloud storage client based on Hadoop, implements it on system structure, function organization and function module and test and analysis its expand performance. With it, user can manage his own storage space and files, upload local file to cloud storage server and store, download file from cloud storage server and do the relevant process.

  16. 船舶AIS数据云存储系统研究%A Study on the Cloud Storage System of Ship’s AIS Data

    Institute of Scientific and Technical Information of China (English)

    丁振国

    2016-01-01

    This paper makes use of the characteristics of distributed database data model to build up historical AIS data and regional AIS data storage model by analyzing inadequate storage mode of the existing relational database. The new storage model realizes the cloud storage of AIS data and this paper verified its advantage in reading and writing on ship’s AIS data by the experiment.%分析了船舶AIS数据现有关系型数据库存储方式的不足,利用分布式数据库模型的特点建立了历史AIS数据和区域AIS数据存储模型,实现了AIS数据云存储,并通过实验验证了AIS数据云存储系统在读写船舶AIS数据上的优势。

  17. 关于计算机云存储中数据迁移的分析%The Analysis about Data Migration of Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    宿培成

    2012-01-01

    数据迁移问题是企业选择云存储方式最为重要的环节,文章从多个方面分析云存储中如何有效地进行数据迁移并提出一些自己的看法,旨在共同研究数据迁移的实施方案。%Data migration is the most important link when corporate chooses the cloud storage mode. This article analyzed from several aspects of how to effectively carry out cloud storage data migration and put forward some own views, aims to study data transfer scheme.

  18. Analytical treatment of the nonlinear electron cloud effect and the combined effects with beam-beam and space charge nonlinear forces in storage rings

    Institute of Scientific and Technical Information of China (English)

    GAO Jie

    2009-01-01

    In this paper we treat first some nonlinear beam dynamics problems in storage rings, such as beam dynamic apertures due to magnetic multipoles, wiggles, beam-beam effects, nonlinear space charge effect, and then nonlinear electron cloud effect combined with beam-beam and space charge effects, analytically. This analytical treatment is applied to BEPC Ⅱ. The corresponding analytical expressions developed in this paper are useful both in understanding the physics behind these problems and also in making practical quick hand estimations.

  19. Holographic Grid Cloud, a futurable high storage technology for the next generation astronomical facilities

    CERN Document Server

    Gallozzi, Stefano

    2011-01-01

    In the immediate future holographic technology will be available to store a very large amount of data in HVD (Holographic Versatile Disk) devices. This technology make extensive use of the WORM (Write-Once-Read-Many) paradigm: this means that such devices allow for a simultaneous and parallel reading of millions of volumetric pixels (i.e. voxels). This characteristic will make accessible wherever the acquired data from a telescope (or satellite) in a quite-simultaneous way. With the support of this new technology the aim of this paper is to identify the guidelines for the implementation of a distributed RAID system, a sort of "storage block" to distribute astronomical data over different geographical sites acting as a single remote device as an effect of a property of distributed computing, the abstraction of resources. The end user will only have to take care on connecting in a opportune and secure mode (using personal certificates) to the remote device and will have access to all (or part) of this potential...

  20. 基于内部云存储的图书馆数据资源存储研究%Design for Library Data Resources Storage System Based on Internal Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    乔杨

    2012-01-01

    Reliable storage environment is the basis for library digital resources providing efficient services for users. Based on the discussion of library digital resources storage different technologies, cloud storage connotation and applications in library are analyzed in this paper. According to the characteristics of library digital resources, a storage architecture based on internal cloud storage for library digital resources is designed. And the hierarchical structure, the methods of access control, expansion and deployment are detailed.%可靠存储环境是图书馆数字资源为用户提供高效服务的保障。在阐述图书馆数据资源存储技术基础上,分析了云存储内涵及在图书馆中的应用,探讨基于内部云存储的图书馆数字资源数据存储方案,详细分析了其层次架构、访问控制、扩展和部署方法。

  1. 浅析云存储在高校数字化校园中的应用%Application of Cloud Storage in University Digital Campus

    Institute of Scientific and Technical Information of China (English)

    龚利; 史杨

    2014-01-01

    This paper introduces what is cloud storage technology. By analyzing the characteristics of cloud storage technology , I think the cloud storage of good expansibility, high security, low cost and customization service in university digital campus con-struction can get good application. This is the effective measures to integrate the resources, improve the management level and create the efficient digital campus.%该文介绍了什么是云存储技术,通过对云存储技术特点的分析认为,云存储的良好扩展性、较高的安全性、低成本和定制服务在高校数字化校园建设中能得到良好的应用,是整合高校资源,提高高校管理水平,创建高效节约型数字化校园的有效措施。

  2. Crown Word Number cloud storage management system design%冠字号云存储管理系统设计

    Institute of Scientific and Technical Information of China (English)

    徐俊; 汤庸; 赵云龙

    2014-01-01

    The cloud storage banknote number tracking system of the paper provides, banknote circulation information and image data and other large data storage, rapid retrieval, regular data cleaning, establishing big data analysis system, receiving and storing a variety of real-time concurrent production equipment produced record data, forming large data storage warehouse, according to the user needs to perform high-speed query large data analysis tasks. Using HDFS cloud storage file system, providing image and Crown Word Number high-speed parallel data storage in the form of cloud services, as well as all data is cleaned regularly, search services, to achieve massive data-performance, high reliability support and strong online expansion capacity.%文中云存储纸币冠字号码追踪系统提供冠字号、钞票流转信息以及图像数据等大数据的存储、快速检索、定时数据清理,建立接大数据分析系统,实时并发接收和存储多种生产设备产生的记录数据,形成大数据存储仓库,根据用户需要对大数据执行高速查询分析任务。采用HDFS 云存储文件系统,以云服务的形式提供图像的存储、冠字号等数据的高速并行存储,以及所有数据的定时清理、检索服务,实现对海量数据高性能、高可靠性支持和较强的在线扩容能力。

  3. Integrity Verification Algorithm of Cloud Storage System Based on RASL%基于RASL的云存储数据完整性验证算法

    Institute of Scientific and Technical Information of China (English)

    唐明; 张娇蓉

    2015-01-01

    随着信息技术的发展,网络化存储将逐渐成为未来存储领域的热点. 而目前的云存储服务也将是网络存储发展的必然趋势. 因此如何确保云存储环境下用户数据的完整性成为人们关注的问题. 周锐等人提出基于同态哈希的云数据完整性验证算法中的公开审计方案.通过对该方案的分析,发现该方案容易受到已知证据伪造攻击,并给出具体的攻击方法. 为了防止攻击,利用基于等级的认证跳表技术(RASL)对该方案进行改进,并对本文方案做安全性分析及证明.%With the development of information technology,network storage will gradually become a hot storage areas in the future.The current cloud storage service will be the inevitable trend of development of network storage.Therefore,how to ensure the integrity of user data in cloud storage environments has become an issue of concern.Zhou Rui et al proposed public audit scheme for cloud data integrity verification based on the homomorphic hash.Through the analysis of the scheme,the scheme is vulnerable to the known evidence of forgery attack,and gives a specific attack method.In order to prevent attacks, improves the scheme based on RASL,and the proposed scheme is security by formal proofs.

  4. The status, challenges, forecasts, innovations and discussions of cloud storage applications%云存储应用的现状、挑战、展望、创新及探讨

    Institute of Scientific and Technical Information of China (English)

    孔陶茹

    2014-01-01

    云存储是基于网络宽带下的数据存储服务,它将改变个人和企业的数据存储方式。针对云存储应用的现状及挑战,文章对其未来进行了展望和探讨,并对云存储应用进行了归纳,列举了当前知名云存储产品的特点及运营状况。同时根据云存储应用的现状,重点探讨了云存储应用所面临的挑战,对云存储应用的前景进行了展望,然后详述了云存储行业的数据迁移服务Backup Box。最后,重点提出了对云存储行业的四点感悟。%Cloud storage is a kind of data storage service based on broadband, and it has changed the data storage mode for individuals and businesses. Aiming at the status and challenges, the future of the cloud storage applications are prospected and discussed. The application of cloud storage is concluded, and the characteristic and operation condition of the several famous cloud storage products are listed. Meanwhile, according to application status, the challenges of cloud storage service are analyzed. The future trend of Cloud Storage Application is prospected. Then data migration service of Backup Box is elaborated. Finally, the four inspirations on cloud storage industry are highlighted.

  5. Myoglobin Expression in Chelonia mydas Brain, Heart and Liver Tissues

    Directory of Open Access Journals (Sweden)

    RINI PUSPITANINGRUM

    2010-09-01

    Full Text Available An understanding of the underpinning physiology and biochemistry of animals is essential to properly understand the impact of anthropogenic changes and natural catastrophes upon the conservation of endangered species. An observation on the tissue location of the key respiratory protein, myoglobin, now opens up new opportunities for understanding how hypoxia tolerance impacts on diving lifestyle in turtles. The respiratory protein, myoglobin has functions other than oxygen binding which are involved in hypoxia tolerance, including metabolism of reactive oxygen species and of the vascular function by metabolism of nitric oxide. Our work aims to determine whether myoglobin expression in the green turtle exists in multiple non muscle tissues and to confirm the hypothesis that reptiles also have a distributed myoglobin expression which is linked to the hypoxiatolerant trait. This initial work in turtle hatch Chelonia mydas confirms the presence of myoglobin transcriptin brain, heart and liver tissues. Furthermore, it will serve as a tool for completing the sequence and generating an in situ hybridization probe for verifying of cell location in expressing tissues.

  6. Green Turtles (Chelonia mydas) Have Novel Asymmetrical Antibodies.

    Science.gov (United States)

    Work, Thierry M; Dagenais, Julie; Breeden, Renee; Schneemann, Anette; Sung, Joyce; Hew, Brian; Balazs, George H; Berestecky, John M

    2015-12-01

    Igs in vertebrates comprise equally sized H and L chains, with exceptions such as H chain-only Abs in camels or natural Ag receptors in sharks. In Reptilia, Igs are known as IgYs. Using immunoassays with isotype-specific mAbs, in this study we show that green turtles (Chelonia mydas) have a 5.7S 120-kDa IgY comprising two equally sized H/L chains with truncated Fc and a 7S 200-kDa IgY comprised of two differently sized H chains bound to L chains and apparently often noncovalently associated with an antigenically related 90-kDa moiety. Both the 200- and 90-kDa 7S molecules are made in response to specific Ag, although the 90-kDa molecule appears more prominent after chronic Ag stimulation. Despite no molecular evidence of a hinge, electron microscopy reveals marked flexibility of Fab arms of 7S and 5.7S IgY. Both IgY can be captured with protein G or melon gel, but less so with protein A. Thus, turtle IgY share some characteristics with mammalian IgG. However, the asymmetrical structure of some turtle Ig and the discovery of an Ig class indicative of chronic antigenic stimulation represent striking advances in our understanding of immunology.

  7. A reputation mechanism in peer-to-peer cloud storage systems%对等云存储系统信誉机制研究

    Institute of Scientific and Technical Information of China (English)

    吴吉义; 陈德人

    2011-01-01

    As the latest development of the distributed storage technology,cloud storage is a product of the integration of distributed storage and virtualization technologies.Cloud storage allows use to storage facilities available on the internet.Relative to the current Master/Slave computing model cloud storage file systems,including GFS,HDFS,Sector and KFS,an open P2P(peer-to-peer) cloud storage system based on DHT was proposed,and we constructed a prototype system named MingCloud based on the Kademlia algorithm.According to the research-development needs of the system,a reputation mechanism was designed for the system,specifically including the calculation of reputation degree,trust model design,work process of reputation mechanism,and safety analysis.Our simulation results show that the mechanism of this model provides a high degree of effectiveness and robustness.Meanwhile,the reputation model can effectively protect honest nodes,reduce the trust value of malicious nodes,and restrain malicious behaviors.%云存储是分布式存储技术与虚拟化技术结合的产物,是分布式存储技术的最新发展.云存储意味着存储可以作为一种服务,通过互联网提供给用户.相对于当前主从(Master/Slave)结构的GFS(Google File System),HDFS(Hadoop Distributed File System),Sector,KFS(Kosmos File System)等云存储系统,提出了一种基于DHT(Distributed Hash Table)的对等云存储系统MingCloud.重点研究了系统的信誉机制问题,具体包括综合信誉度的计算、信任模型设计、信誉机制的工作过程、安全性分析等方面.仿真实验表明,该机制具有较好的有效性和健壮性,能有效保护系统中的诚实节点,迅速降低恶意节点的信任值,抑制恶意交易行为.引入MingCredit之后,系统不再简单地以节点的物理性能诸如存储空间大小、网络带宽等方面的客观能力,以及在线时间作为评价标准,而是与节点参与到对等存储交

  8. Securing Cloud from Cloud Drain

    Directory of Open Access Journals (Sweden)

    Niva Das

    2014-09-01

    Full Text Available Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role [1]. The underlying concept of cloud computing dates back to the ‘50s but the term entering into widespread usage can be traced to 2006 when Amazon.com announced the Elastic Compute Cloud. In this paper, we will discuss about cloud security approaches. We have used the term “CloudDrain” to define data leakage in case of security compromise.

  9. Research of cloud storage system and technology service platform based on the Microsoft%基于微软云计算存储系统及技术服务平台研究

    Institute of Scientific and Technical Information of China (English)

    李爱国; 殷锋社

    2013-01-01

    云计算技术的兴起和发展,正逐渐改变人们使用服务和资源的方式,同时也成为计算机应用领域的研究热点.云存储可实现云端海量数据的高效存储,是云计算的重要基础云存储可实现云端海量数据的高效存储,是云计算的重要基础.对如何保证云存储系统的服务质量及可靠性,对于保证海量用户的访问效率,维护海量数据存储的可用性及用户技术服务平台的开发有着重大意义.%Cloud computing technology is arisen with development, is gradually changing people using services and resources, but also become the research hotspot in the field of computer application. Cloud storage can realize the efficient storage of massive data cloud, cloud computing is the important basis of cloud storage can realize the efficient storage of massive data cloud, cloud computing is the important foundation of. On how to ensure that the cloud storage service system to ensure the quality and reliability, large numbers of users accessing efficiency, maintain the huge data storage of usability and user technical service platform for the development has the significant significance.

  10. Study of Digital Resource Storage in College Library Based on Cloud Computing%基于云计算的高校图书馆数字资源存储研究

    Institute of Scientific and Technical Information of China (English)

    王煦

    2015-01-01

    This paper described the SAN (Storage Area Network)based on cloud storage, and analyzed the system structure with the SAN characteristic, and finally put forward layered structure of cloud storage system.%对云存储支持下SAN存储区域网络进行了介绍。分析了系统以SAN结构为特点的系统框架,最后提出了云存储系统的分层结构。

  11. Load balancing study in cloud storage based on AHP%基于AHP的云存储负载均衡研究

    Institute of Scientific and Technical Information of China (English)

    陈德军; 高晓军; 王义飞

    2015-01-01

    针对云存储系统节点在数据分布策略和系统响应时间方面的综合负载计算问题,提出了一种云存储系统的负载均衡算法,并对该算法进行了验证。算法基于层次分析法(Analytic Hierarchy Process,AHP),通过建立综合评估指标体系,从可用存储空间、可用CPU、可用内存和访问热度四个方面,计算各个存储节点的综合负载,并据此对数据存取进行均衡调度。验证结果表明,通过调整不同指标的权重,算法能够很好地满足不同的应用需求,同时,该算法能够很好地反应各节点的综合负载,实现云存储系统整机性能的优化,尤其适用于一些高并发的大数据存储。%To the calculation problem to comprehensive load of cloud storage system nodes in the data distribution strategy and system response time, this paper provides a load balancing algorithm to cloud storage system, and validates the algo-rithm. The algorithm based on the Analytic Hierarchy Process(AHP)can calculate the comprehensive load of storage nodes from the available storage space, available CPU, available memory and access frequency and dispatch data access request. The verification results show, by adjusting weight of different indexes, the algorithm can meet the different appli-cation requirements and optimize cloud storage system performance, especially be suitable for high parallel access and big data storage.

  12. An Empirical Analysis on the Patent Activities of Cloud Storage Technology Worldwide%国内外云存储技术专利实证分析

    Institute of Scientific and Technical Information of China (English)

    刘友华; 周素芳

    2014-01-01

    基于国内外云存储技术现有研究,利用“Innography专利信息检索分析平台”和“国家知识产权局专利信息检索平台”,对国内外云存储技术领域的专利进行全面检索,形成专利研究数据库,从年度趋势、申请人、发明人、技术域分布等多个角度,对该技术领域的专利活动进行统计和分析,得出该技术领域的专利现状、发展趋势以及竞争态势等信息,进而为云存储领域的创新活动提供参考。%This paper first summarizes the existing study on cloud storage technology at home and abroad. Then, using the"State Intellec-tual Property Office ( patent information) platform" and the "INNOGRAPHY" to facilitate the formation of Patent Database, the paper makes a comprehensive search for the patents in the area of cloud storage technology domestically and overseas. Moreover, the patent ac-tivities in relation to cloud storage technology are explored and analyzed from a wide perspective ranging from annual trends, patent appli-cant, patent inventor to technical components.

  13. Relocations of sea turtle nests of Lepidochelys olivacea, Dermochelys coriacea and Chelonia mydas in the Galibi Nature Reserve, Suriname

    OpenAIRE

    Schouten, A.D.; Weijerman, M.; Tienen, van, C.; Hoekert, W.E.J.

    1997-01-01

    SCHOUTEN, A.D., WEIJERMAN, M., VAN TIENEN, L.H.G. & W.E.J. HOEKERT, 1997. Relocations of Sea Turtle nests of Lepidochelys olivacea, Dermochelys coriace and Chelonia mydas in the Galibi Nature Reserve, Suriname. Studies Nat. Hist. Caribbean Region 73, Amsterdam, 1997: 63-69. Relocation of nests of the marine turtles Lepidochelys olivacea (ESCHSCHOLTZ 1829), Dermochelys coriace (LINNAEUS 1758) and CHELONIA MYDAS (LINNAEUS 1758) in the Galibi Nature Reserve is performed to protect them from a nu...

  14. The Technology Design Research Based on Massive Data Cloud Storage of Geographical National Conditions%地理国情海量数据云存储技术设计研究

    Institute of Scientific and Technical Information of China (English)

    朱力维; 王志强; 王军

    2014-01-01

    This research has geographic conditions mass data features and the data content .For current data storage problems , this re-search studies cloud storage concept and the related key technologies , and HDFS technology used has cloud environment for geographic conditions mass data organization and resources shared by cloud storage model , through cloud service interface access application by cloud storage service , which can effective settle geographic conditions data resources mass storage and service problems for geographic conditions data management way serving reference to data transformation .%研究了地理国情海量数据特征及数据内容,针对目前数据存储中存在的问题,研究了云存储概念及相关的关键技术,采用HDFS技术提出了云环境下地理国情海量数据组织与资源共享的云存储模型,通过云应用服务接口访问云存储服务,能够有效解决地理国情数据资源海量存储和服务问题,为地理国情数据管理方式的转变提供借鉴。

  15. 云存储中双备份数据的安全访问%Secure Access of Two-Copy Data in Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    李红卫; 叶飞跃; 古春生; 于志敏; 景征骏

    2014-01-01

    Data integrity and privacy become major problems that the customers concern when the data is stored in the cloud storage. The paper proposes a novel oblivious RAM construction that achieves O(1)time complexity of access cloud storage,while consuming O ( cN ) ( 0storage and O ( N ) server-side storage. The paper proposes a technique in which the client data is stored in two servers that each server has a client data copy in order to ensure data integrity. Oblivious RAM allows a client to hide its data access patterns from an untrusted server. The adversary can not obtain useful information from the client access pattern,and the data privacy is guaranteed.%数据的完整性和私密性是客户将数据存储到云存储中时关心的主要问题。提出了一种新的ORAM结构,其访问云存储时间复杂度为O(1)、需要O(cN)(0

  16. Design of Virtual Data Separation Dynamic Cloud Storage Based on Information Fusion%基于信息融合的虚拟数据分离动态云存储设计

    Institute of Scientific and Technical Information of China (English)

    倪时龙; 彭巍; 林振天; 许双成

    2015-01-01

    提出一种基于信息融合的虚拟数据分离动态云存储设计方法.构建了虚拟数据的分离动态云存储调度模型,进行信息特征提取,对提取的云存储信息特征进行信息融合处理,实现虚拟数据分离动态云存储改进设计.仿真结果表明,采用该算法进行云存储设计,能较为准确地反映虚拟数据的细节信息特征,提高数据融合精度,为实现动态分离存储提供优化索引通道,进而提高云存储中数据调度性能.%A new dynamic cloud storage design method based on information fusion for virtual data separation is proposed. To construct the virtual data separation dynamic cloud storage scheduling model and feature information extraction, to ex-tract cloud storage characteristics of information of information fusion and processing, realize the virtual data separation dy-namic cloud storage to improve the design. The simulation results show that the sampling of the algorithm of cloud storage design, more accurately response the details of the virtual data information features, improving the accuracy of data fusion, and provides the optimization index channel to realize the dynamic separation and storage, and to improve the cloud storage data scheduling performance.

  17. Cloud Computing for radiologists.

    Science.gov (United States)

    Kharat, Amit T; Safvi, Amjad; Thind, Ss; Singh, Amarjit

    2012-07-01

    Cloud computing is a concept wherein a computer grid is created using the Internet with the sole purpose of utilizing shared resources such as computer software, hardware, on a pay-per-use model. Using Cloud computing, radiology users can efficiently manage multimodality imaging units by using the latest software and hardware without paying huge upfront costs. Cloud computing systems usually work on public, private, hybrid, or community models. Using the various components of a Cloud, such as applications, client, infrastructure, storage, services, and processing power, Cloud computing can help imaging units rapidly scale and descale operations and avoid huge spending on maintenance of costly applications and storage. Cloud computing allows flexibility in imaging. It sets free radiology from the confines of a hospital and creates a virtual mobile office. The downsides to Cloud computing involve security and privacy issues which need to be addressed to ensure the success of Cloud computing in the future.

  18. Cloud Computing: a Prologue

    OpenAIRE

    Ullah, Sultan; Xuefeng, Zheng

    2013-01-01

    An emerging internet based super computing model is represented by cloud computing. Cloud computing is the convergence and evolution of several concepts from virtualization, distributed storage, grid, and automation management to enable a more flexible approach for deploying and scaling applications. However, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. The concept of cloud c...

  19. Hybrid cloud for dummies

    CERN Document Server

    Hurwitz, Judith; Halper, Fern; Kirsch, Dan

    2012-01-01

    Understand the cloud and implement a cloud strategy for your business Cloud computing enables companies to save money by leasing storage space and accessing technology services through the Internet instead of buying and maintaining equipment and support services. Because it has its own unique set of challenges, cloud computing requires careful explanation. This easy-to-follow guide shows IT managers and support staff just what cloud computing is, how to deliver and manage cloud computing services, how to choose a service provider, and how to go about implementation. It also covers security and

  20. Analysis of cloud storage systems based on metadata node%基于中心节点的云存储系统应用分析

    Institute of Scientific and Technical Information of China (English)

    李淼淼; 梅向东

    2015-01-01

    Due to the improvement of cloud computing, distributed cloud storage systems based on different network topologies and data transmission mechanisms are arising. The different characteristics of systems lead to the different applications. This paper, using GlusterFS with no metadata node and MooseFS with a metadata nodes as representative, shows a comprehensive analysis of the system architectures, working mechanisms, system features, etc., distinguished from whether the system contains a metadata node .Based on the ability test, this paper then gives the solutions of how to choose the most appropriate file system on the basis of existing hardware, which makes the cloud storage system achieve optimal performance.%在云计算的催生下,基于不同网络拓扑结构和数据传输机制的分布式云存储系统应运而生,系统特性不同,应用场合也不尽相同。本文从是否存在元数据中心节点的角度出发,以有元数据节点的MooseFS和无元数据节点的GlusterFS为代表,全面分析两种系统架构、工作机制、系统特点等,并对两种系统进行不同文件类型的读写测试,给出在现有硬件基础上选择适合的文件系统的方法,从而使云存储系统数据处理性能达到最优。

  1. Analysis of cloud storage systems based on metadata node%基于中心节点的云存储系统应用分析

    Institute of Scientific and Technical Information of China (English)

    李淼淼; 梅向东

    2015-01-01

    在云计算的催生下,基于不同网络拓扑结构和数据传输机制的分布式云存储系统应运而生,系统特性不同,应用场合也不尽相同。本文从是否存在元数据中心节点的角度出发,以有元数据节点的MooseFS和无元数据节点的GlusterFS为代表,全面分析两种系统架构、工作机制、系统特点等,并对两种系统进行不同文件类型的读写测试,给出在现有硬件基础上选择适合的文件系统的方法,从而使云存储系统数据处理性能达到最优。%Due to the improvement of cloud computing, distributed cloud storage systems based on different network topologies and data transmission mechanisms are arising. The different characteristics of systems lead to the different applications. This paper, using GlusterFS with no metadata node and MooseFS with a metadata nodes as representative, shows a comprehensive analysis of the system architectures, working mechanisms, system features, etc., distinguished from whether the system contains a metadata node .Based on the ability test, this paper then gives the solutions of how to choose the most appropriate file system on the basis of existing hardware, which makes the cloud storage system achieve optimal performance.

  2. Survey of proofs on data storage security in cloud computing%云计算下的数据存储安全可证明性综述

    Institute of Scientific and Technical Information of China (English)

    梁彪; 曹宇佶; 秦中元; 张群芳

    2012-01-01

    In cloud computing, data service outsourcing relieves the data owners of the burden of local data storage and main-tenance. However, it also eliminates their physical control of the storage dependability and security, which makes the out-sourced data assurances in cloud computing a very challenging and potentially formidable task. Based on the overall study of the recent researches on data storage security, it introduced the architecture of cloud data storage firstly. And studied the state-of-the-art schemes from proofs of retrievahilily and provable data possession. Then, this paper discussed the function design in protocol based on public verification, homomorphic authenticators, data dynamics, data privacy protection, batch auditing and multiple-server environment. Furthermore, made some comparisons of functions and the complexity in different protocols in ta-bles. At last, summarized and discussed the further direction of research.%云计算的数据服务外包可以减少数据所有者本地的存储和维护压力,然而用户会因此失去对数据可靠性和安全的物理控制.于是如何确保云中数据的安全就成为了非常有挑战性的任务和难题.在全面研究云计算数据存储安全现有成果的基础上,介绍了云计算数据存储的基本架构,并从可检索证明和可证明数据拥有两个角度分析了相关研究方案的发展,从公共认证、同态认证、数据动态化、隐私保护、批审计和多服务器环境得方面讨论了协议的功能设计,并且列表进行了功能和开销对比,在此基础上提出了一个比较完备的云计算环境下的协议框架.最后总结并阐述了后续工作.

  3. A support privacy encryption method in the application of the cloud storage%一种支持隐私保护的加密方法在云存储中的应用

    Institute of Scientific and Technical Information of China (English)

    张林

    2016-01-01

    With the rapid development of cloud storage technology, cloud storage data security has become a key problem. En-cryption is an effective method for protection of data. In order to improve the cloud storage environment, the protection of cus-tomer privacy, this article design research a kind of support CESVMC privacy cloud storage encryption method. Based on the matrix and vector add, subtract, multiply, divide, complete the cloud storage data and customer information confidential work. Finally through security analysis and performance evaluation, prove CESVMC encryption technology has high safety perfor-mance, and reasonable operation complexity, meet the needs of the daily work of cloud storage.%随着云存储技术的快速发展,云存储的数据安全性成了一个最为关键的问题。加密是一种对数据进行保护的有效方法。为了提高云存储环境中对客户隐私的保护,本文设计研究了一种支持隐私保护的云存储加密方法CESVMC。通过对矩阵和向量进行加、减、乘、除运算,完成对云存储数据和客户信息的保密工作。最后经过安全分析和对其性能进行评测,证明CESVMC加密技术具有较高的安全性能,以及合理的运算复杂度,满足日常云存储的工作需要。

  4. 基于P2P分布式开放资源管理服务的云存储方案研究%Research on Mass Data Cloud Storage System

    Institute of Scientific and Technical Information of China (English)

    陈敏

    2014-01-01

    Because able to provide users with safety and mass data storage function, cloud storage technology developed very rapidly in recent years. This paper introduces the basic principle of cloud storage technology and analyzes the present situation of the cloud storage technology, introduces the use of existing natural distribution network around the world plenty of free storage service, such as disc, FTP, email and other forms of storage. These services will be held together, so as to provide users with low price and reliable storage systems. This paper introduces the design of a kind of low cost,quick speed,high availability,can be expanded cloud storage topology system. By means of the system to expanding other function,finally achieves the purpose of distributed storage resources sharing.%云存储技术因其能为用户提供了安全、海量、随时随地的数据存储功能而得以快速发展。提出了利用网络上现存的自然分布于世界各地的大量免费存储服务,如网盘、ftp、email以及其他形式等存储空间,将这些服务集中起来,为用户提供价廉、可靠的存储系统。介绍了一种低开销、快速度、高可用、可扩展的云存储拓扑系统,以期在该拓扑架构下实现以文件存储和共享服务为基础,不断扩展其他功能,最终形成P2P分布式存储资源共享的目的。

  5. 云计算环境下的分布存储关键技术%Key Technologies of Distributed Storage for Cloud Computing

    Institute of Scientific and Technical Information of China (English)

    王意洁; 孙伟东; 周松; 裴晓强; 李小勇

    2012-01-01

    云计算作为下一代计算模式,在科学计算和商业计算领域均发挥着重要作用,受到当前学术界和企业界的广泛关注.云计算环境下的分布存储主要研究数据在数据中心上的组织和管理,作为云计算环境的核心基础设施,数据中心通常由百万级以上节点组成,存储其上的数据规模往往达到PB级甚至EB级,导致数据失效成为一种常态行为,极大地限制了云计算的应用和推广,增加了云计算的成本.因此,提高可扩展性和容错性、降低成本,成为云计算环境下分布存储研究的若干关键技术.针对如何提高存储的可扩展性、容错性以及降低存储的能耗等目标,从数据中心网络的设计、数据的存储组织方式等方面对当前分布存储的关键技术进行了综述.首先,介绍并对比了当前典型的数据中心网络结构的优缺点;其次,介绍并对比了当前常用的两种分布存储容错技术,即基于复制的容错技术和基于纠删码的容错技术;第三,介绍了当前典型的分布存储节能技术,并分析了各项技术的优缺点;最后指出了当前技术面临的主要挑战和下一步研究的方向.%Considered as the next generation computing model, cloud computing plays an important role in scientific and commercial computing area and draws great attention from both academia and industry fields. Under cloud computing environment, data center consist of a large amount of computers, usually up to millions, and stores petabyte even exabyte of data, which may easily lead to the failure of the computers or data. The large amount of computers composition not only leads to great challenges to the scalability of the data center and its storage system, but also results in high hardware infrastructure cost and power cost. Therefore, fault-tolerance, scalability, and power consumption of the distributed storage for a data center becomes key part in the technology of cloud

  6. Green turtle (Chelonia mydas) genetic diversity at Paranaguá Estuarine Complex feeding grounds in Brazil

    OpenAIRE

    Juliana Costa Jordão; Ana Cristina Vigliar Bondioli; Flavia Maria Guebert; Benoit de Thoisy; Lurdes Foresti de Almeida Toledo

    2015-01-01

    Sea turtles are marine reptiles that undertake long migrations through their life, with limited information regarding juvenile stages. Feeding grounds (FGs), where they spend most of their lives, are composed by individuals from different natal origins, known as mixed stock populations. The aim of this study was to assess genetic composition, natal origins and demographic history of juvenile green turtles (Chelonia mydas) at the Paranaguá Estuarine Complex (PEC), Brazil, considered a Natural ...

  7. 云存储智能多数据副本放置机制��%Intelligent Multiple Data Replica Placement Scheme for Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    张榜; 王兴伟; 黄敏

    2014-01-01

    The data replica management scheme is a critical component of cloud storage system. In order to improve its scalability and reliability at the same time shorten user access time, the multiple data replica scheme should be adopted and the proper placement for each replica should be determined. Thus, this paper proposes an intelligent multiple data replica placement scheme for cloud storage. This scheme is based on p-center model with minimizing user access cost as its optimization objective. It uses genetic algorithm (GA) to find the optimal data replica placement solution and uses biogeography-based optimization (BBO) algorithm to optimally assign user access request to the specific data replica. The proposed scheme has been implemented based on CloudSim and performance evaluation has been done. The simulation results show that it is both feasible and effective.%数据副本管理机制是云存储系统的重要组成部分。为了提高云存储系统的可伸缩性、可靠性,同时改善用户访问时间,通常采用多数据副本机制,并且需要解决数据副本放置问题。为此,提出了一种用于云存储系统的智能多数据副本放置机制。该机制基于p-中心模型,以最小化访问代价为优化目标,基于遗传算法(genetic algorithm,GA)确定优化的数据副本放置方案,基于生物地理学优化(biogeography-based optimization,BBO)算法确定用户访问请求对数据副本的优化分配。基于CloudSim进行了仿真实现和性能评价,结果表明,云存储智能多数据副本放置机制是可行和有效的。

  8. 从共享到共有:学术图书馆云存储联盟研究%From Sharing to Co-owning:Academic Library Cloud Storage Consortium Research

    Institute of Scientific and Technical Information of China (English)

    刘华; 许新巧

    2014-01-01

    This paper attempts to define the structure and framework of academic library cloud storage consortium.The au-thors analyze the opportunities for academic libraries which cloud-computing is bringing basing on some American cloud storage consortium cases and propose that China academic libraries should accelerate the building of academic library cloud storage consorti-um based on cloud-computing.%探讨学术馆藏云存储联盟的结构和操作框架,并以美国学术图书馆云存储联盟为案例,分析研究云存储联盟给学术图书馆带来的机遇,指出云存储联盟将促进云图书馆的建设,中国学术图书馆应利用云技术,加快建设本国的云存储联盟。

  9. Discussion on the Information Resource Storage Architecture Model in Digital Library Based on Cloud Storage Technology%基于云存储技术的数字图书馆信息资源存储架构模型探讨

    Institute of Scientific and Technical Information of China (English)

    金志敏

    2015-01-01

    Cloud computing is a hotspot of current research and application problems,cloud storage as the bottom lay-er of cloud computing service,provides an important support role to upper layers. With the rapid increase of the digital library information resources,the traditional way of storage in the face of mass data storage requirements,there is the bottleneck of capacity and performance. Cloud storage as a new mode of storage service,for the huge amounts of digital library information resource construction provides a new choice This article introduces the cloud computing and cloud storage,cloud storage technology based on digital library,discusses the model of the digital library information resource storage architecture. Finally the application of digital library ,the advantage of the cloud storage.%云计算是当前研究与应用的热点问题,云存储作为云计算的底层服务,对上层应用提供了重要的支持作用。随着数字图书馆信息资源总量的快速增加,传统的存储方式在面对海量数据存储的需求上,存在着容量和性能的瓶颈。云存储作为一种新型的存储服务模式,为数字图书馆的海量信息资源建设提供了一种新的选择。。本文在介绍云计算与云存储、数字图书馆云存储技术基础上,探讨了数字图书馆信息资源存储架构模型。最后阐述了数字图书馆应用云存储的优势。

  10. The Application of Cloud Storage in the"Wisdom Campus"in Colleges and Universities%云存储在高校"智慧校园"中的应用

    Institute of Scientific and Technical Information of China (English)

    史杨

    2015-01-01

    该文简要的介绍了云存储技术,并且通过分析云存储技术,可以看到在云存储中良好的扩展性、较高的安全性、定制服务和低成本等特点,在高校"智慧校园"网络数字化建设中有良好的应用,可以通过云存储技术来整合高校数字资源,提高高校教科研管理水平,是创建"智慧校园"的有效措施.%This paper briefly introduces the cloud storage technology, and through the analysis of cloud storage technology, We can learn the characteristics of cloud storage, such as good scalability, high security, customized service and low cost, etc."Wisdom campus"in colleges and universities have good application in the construction of network digital. We can integrate the digital re-sources in colleges and universities through the cloud storage technology, so as to improve the level of scientific research manage-ment in colleges and universities, it is the effective measures to create"Wisdom campus".

  11. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  12. 云计算用户数据传输与存储安全研究%Data transmission and storage security of cloud-computing users

    Institute of Scientific and Technical Information of China (English)

    李海涛

    2013-01-01

    With the rapid development of computer network technology and relevant knowledge popularization,under the ef-fect of market economy,the users’data security problem has become one of the important issues of the network data transmis-sion and storage. "Cloud computing" is one of the computer technologies which is widely used in recent years. The users’data security issues in application process have become the focus of attention of people. Therefore,the research has not only theoreti-cal value,but also practical application value. In this paper,the related concepts about cloud computing are introduced,and the impact on the security of cloud computing user data transmission and storage is analyzed. Some advanced measures are intro-duced.%随着计算机网络技术的快速发展以及相关知识的普及,在市场经济的影响下,用户的数据安全问题已经成为当前网络数据传输以及存储的重要问题之一。“云计算”是近年来应用比较广泛的技术之一,其在应用过程的用户数据安全问题也成为了人们关注的热点。因此,对该问题的研究工作既具有理论价值,又具有重要的实际应用价值。首先对云计算的相关概念进行介绍,然后,对影响云计算用户数据传输和存储的安全问题进行分析,最后,介绍目前一些先进的解决措施。

  13. RS纠删码在电子健康档案云存储中的应用%Application of RS erasure code in cloud storage of electronic health records

    Institute of Scientific and Technical Information of China (English)

    杨进; 王亮明; 唐德玉

    2012-01-01

    Cloud storage has become highlight in the electronic health records. Due to the uncontrollable characteristics of cloud storage, security of electronic health records data stored in the cloud storage node could not be ensured. Hence, its further application is limited. In this paper, the technique of RS erasure encoding is introduced to prevent the whole electronic health records being stolen when the data in local cloud storage nodes leaked, through splitting the whole information and storing them in fragments. Meanwhile, the RS erasure code is used to recover the damaged data of electronic health records and provide a new data security protection in cloud storage of electronic health records.%电子健康档案云存储成为研究热点,但云端存储节点的不可控特性使得其存储数据的安全性得不到保障,从而制约了电子健康档案云存储的进一步发展.利用RS纠删码编码将文件信息割裂并分片存储米防止局部存储节点数据块泄露导致的整个文件信息被窃取,利用其纠删能力实现损坏数据的恢复,为电子健康档案云存储数据安全性保障提供了一种新的解决方案.

  14. 基于SWOT分析的高校图书馆数字资源云存储模式探讨%The SWOT Analysis of the Digital Resources of University Library Based on Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    彭文

    2014-01-01

    First elaborated the current situation of library digital resources storage, problems and future resource storage requirements, on this basis, using swot analysis of cloud storage brings to the University Library opportunities and threats, as well as the application of cloud storage library's own advantages and disadvantages, and finally the formation of swot analysis matrix, and puts forward four kinds of strategies of University Library Application cloud development of storage.%本文首先阐述了目前图书馆数字资源存储现状、面临的问题和未来资源存储需求,在此基础上,采用SWOT方法分析云存储给高校图书馆带来的机遇和威胁,以及图书馆自身应用云存储的优势和劣势,最后形成SWOT分析矩阵,并提出高校图书馆应用云存储发展的四种战略对策。

  15. DESIGN AND IMPLEMENTATION OF CLOUD STORAGE SECURITY GATEWAY SYSTEM BASED ON CIFS PROTOCOL%基于CIFS协议的云存储安全网关的设计与实现

    Institute of Scientific and Technical Information of China (English)

    郝斐; 王雷; 荆继武; 王平建

    2013-01-01

    CIFS ( Common Internet File System) , the core protocol of the network storage in application layer, is the communication protocol for data storage applied in NAS (network attached storage). Cloud storage is a novel form of network storage, and both the enterprise and individual users begin to use cloud storage as their network storage media. Along with the widespread use, the security issues of the cloud storage catch the eyes of users, such as data leakage and data tampering. In this paper, based on the cloud storage service of Amazon S3, we design and implement a CIFS-based cloud storage security gateway system (CSSGS). With the CSSGS, users are able to utilise the cloud storage service of Amazon S3 in their habits the same as accessing NAS. It also encrypts/decrypts all the users data before uploading/downloading to/from Amazon S3, hence the information leakage during the process of data communication and storage is prevented effectively. It also offers the integrity checking on files downloaded from S3 to examine the consistency of the contents with the uploaded one for data tempering prevention.%CIFS(Common Internet File System)协议是网络存储在应用层的核心协议,是应用于网络附加存储NAS(Network Attached Storage)进行数据存储的通信协议.云存储是一种新型的网络存储形式,企业和个人用户都开始使用云存储作为其网络存储媒介.随着云存储的广泛使用,云存储中数据的安全问题,如数据泄漏和数据篡改,也成了用户广泛关注的问题.基于Amazon S3的云存储服务,设计并实现一款基于CIFS协议的云存储安全网关系统CSSGS (Cloud Storage Security Gateway System).通过该网关,用户能够以访问NAS的访问习惯,使用Amazon S3云存储服务;该网关还对用户上传至Amazon S3的数据进行加密保护,可以有效防止数据在传输和存储过程中的泄漏;同时该网关还对从S3下载的文件进行完整性校验,检测其内容与上

  16. 云存储环境下文件系统伸缩性研究%Research on Scalability of File System in Cloud Storage Environment

    Institute of Scientific and Technical Information of China (English)

    李晓慧; 李战怀; 张晓; 李兆虎

    2012-01-01

    In the cloud storage environment, servers need to allocate storage space for clients dynamicly. This paper specifically aims at managing the NTFS file system volumes. It highlights the important data structure of the NTFS file system, and designs and implements a tool which expands or shrinks system volume based on needs. The experiments show that the tool can expand or shrink the size of the file system volume without data corruption.%在云存储环境下,为解决存储资源利用率问题,服务器端需动态为用户分配存储空间.本文致力于解决如何伸缩系统卷文件系统可识别大小.具体针对NTFS文件系统卷,重点介绍NTFS文件系统关于容量管理的重要数据结构,设计并实现根据用户申请的磁盘空间大小,自动伸缩系统卷的工具.实验表明:该工具能够在无数据损坏的前提下快速扩展或缩小系统卷文件系统识别的大小.

  17. Access of Data Secure Based on ORAM in Cloud Storage%云存储中基于ORAM的数据安全访问

    Institute of Scientific and Technical Information of China (English)

    李红卫; 古春生; 景征骏; 于志敏

    2014-01-01

    在云存储应用中,可以利用数据加密技术对存储设备上的数据进行保护,但加密技术不能隐藏程序对不信任服务器的访问模式,攻击者可以从访问模式中获取客户的隐私。提出一种新的茫然RA M 结构,利用数据元素位置映射表和存储块位示图实现数据的茫然访问。将每个数据元素备份在两个文件中,当一个文件中的数据元素遭到破坏时,可以从另一个文件中恢复。以非常少的客户存储容量和 O(n)服务器存储容量,使得客户每个数据元素的请求将产生 O(1)读和写服务器操作。%The data encryption can be employed to protect the data in a storage device ,but it cannot be employed to hide the client′s data access patterns from an untrusted server in cloud storage applications .The adversary can get the client privacy from access patterns .The paper proposes a new oblivious RAM construction ,Using the data element position mapping table and bitmap of storage blocks achieve the oblivious access of data .Each data element has two backups that are stored in two files .When a data element in a file is destroyed ,the data element may be recovered from the other file .Each data element request of the client will generate O(1) read and write operations on the server with a small amount of client storage and O(n) server storage .

  18. Cloud Infrastructure Service Management - A Review

    OpenAIRE

    2012-01-01

    The new era of computing called Cloud Computing allows the user to access the cloud services dynamically over the Internet wherever and whenever needed. Cloud consists of data and resources; and the cloud services include the delivery of software, infrastructure, applications, and storage over the Internet based on user demand through Internet. In short, cloud computing is a business and economic model allowing the users to utilize high-end computing and storage virtually with minimal infrast...

  19. Research on Security Protection Technology of Distributed Storage Based on Cloud Computing%基于云计算的分布式存储安全保护技术研究

    Institute of Scientific and Technical Information of China (English)

    陈克明

    2016-01-01

    In this paper,through cloud computing environment safety threat and the cloud computing distributed storage security protection technology research status analysis,research on Design of cloud computing in distributed data storage security protection technology of three security protocols,in cloud computing distributed storage security protection technology research and design continue to improve and make a contribution.%文章通过对云计算环境下安全隐患的威胁和云计算分布式存储安全保护技术研究现状进行分析,进行对云计算中分布式存储数据安全保护技术的3个安全协议方案的设计研究,以期在云计算下分布式存储安全保护技术的设计研究中不断进行完善并做出贡献。

  20. Blood Gasses Contents of Green Turtle (Chelonia mydas) Hatch Treated by Different Temperatures

    OpenAIRE

    RINI PUSPITANINGRUM; SEPTELIA INAWATI WANANDI; RONDANG ROEMIATI SOEGIANTO; MOHAMAD SADIKIN

    2011-01-01

    The aim of this research was to gain the profile of blood gasses of green turtle (Chelonia mydas) hatch. Blood gas of the green turtle was analysed after exposuring them at 28 oC and 50% of humidity for 24 hours in a pvc tube and at 34 oC under sunlight exposured with 47% of humidity for 30 minutes. The result showed the different values of blood gas contents. This result showed indication of metabolism activities and poikilothermic adaptation of green turtle hatch. This information can be u...

  1. Immunological evaluation of captive green sea turtle (Chelonia mydas) with ulcerative dermatitis

    Science.gov (United States)

    Muñoz, Fernando Alberto; Estrada-Para; Sergio; Romero-Rojas, Andrés; Gonzalez-Ballesteros, Erik; Work, Thierry; Villaseñor-Gaona, Hector; Estrada-Garcia, Iris

    2013-01-01

    Ulcerative dermatitis (UD) is common in captive sea turtles and manifests as skin erosions and ulcers associated with gram-negative bacteria. This study compared clinically healthy and UD-affected captive turtles by evaluating hematology, histopathology, immunoglobulin levels, and delayed-type hypersensitivity assay. Turtles with UD had significantly lower weight, reduced delayed-type hypersensitivity (DTH) responses, and higher heterophil:lymphocyte ratios. This study is the first to assay DTH in green turtles (Chelonia mydas) and suggests that UD is associated with immunosuppression.

  2. Inorganic elements in green sea turtles (Chelonia mydas): relationships among external and internal tissues.

    Science.gov (United States)

    Faust, Derek R; Hooper, Michael J; Cobb, George P; Barnes, Melanie; Shaver, Donna; Ertolacci, Shauna; Smith, Philip N

    2014-09-01

    Inorganic elements from anthropogenic sources have entered marine environments worldwide and are detectable in marine organisms, including sea turtles. Threatened and endangered classifications of sea turtles have heretofore made assessments of contaminant concentrations difficult because of regulatory restrictions on obtaining samples using nonlethal techniques. In the present study, claw and skin biopsy samples were examined as potential indicators of internal tissue burdens in green sea turtles (Chelonia mydas). Significant relationships were observed between claw and liver, and claw and muscle concentrations of mercury, nickel, arsenic, and selenium (p turtles.

  3. Provenance for the Cloud

    OpenAIRE

    Muniswamy-Reddy, Kiran-Kumar; MACKO Peter; Seltzer, Margo I.

    2010-01-01

    The cloud is poised to become the next computing environment for both data storage and computation due to its pay-as-you-go and provision-as-you-go models. Cloud storage is already being used to back up desktop user data, host shared scientific data, store web application data, and to serve web pages. Today’s cloud stores, however, are missing an important ingredient: provenance. Provenance is metadata that describes the history of an object. We make the case that provenance is crucial for da...

  4. [Cystic Fibrosis Cloud database: An information system for storage and management of clinical and microbiological data of cystic fibrosis patients].

    Science.gov (United States)

    Prieto, Claudia I; Palau, María J; Martina, Pablo; Achiary, Carlos; Achiary, Andrés; Bettiol, Marisa; Montanaro, Patricia; Cazzola, María L; Leguizamón, Mariana; Massillo, Cintia; Figoli, Cecilia; Valeiras, Brenda; Perez, Silvia; Rentería, Fernando; Diez, Graciela; Yantorno, Osvaldo M; Bosch, Alejandra

    2016-01-01

    The epidemiological and clinical management of cystic fibrosis (CF) patients suffering from acute pulmonary exacerbations or chronic lung infections demands continuous updating of medical and microbiological processes associated with the constant evolution of pathogens during host colonization. In order to monitor the dynamics of these processes, it is essential to have expert systems capable of storing and subsequently extracting the information generated from different studies of the patients and microorganisms isolated from them. In this work we have designed and developed an on-line database based on an information system that allows to store, manage and visualize data from clinical studies and microbiological analysis of bacteria obtained from the respiratory tract of patients suffering from cystic fibrosis. The information system, named Cystic Fibrosis Cloud database is available on the http://servoy.infocomsa.com/cfc_database site and is composed of a main database and a web-based interface, which uses Servoy's product architecture based on Java technology. Although the CFC database system can be implemented as a local program for private use in CF centers, it can also be used, updated and shared by different users who can access the stored information in a systematic, practical and safe manner. The implementation of the CFC database could have a significant impact on the monitoring of respiratory infections, the prevention of exacerbations, the detection of emerging organisms, and the adequacy of control strategies for lung infections in CF patients.

  5. [Cystic Fibrosis Cloud database: An information system for storage and management of clinical and microbiological data of cystic fibrosis patients].

    Science.gov (United States)

    Prieto, Claudia I; Palau, María J; Martina, Pablo; Achiary, Carlos; Achiary, Andrés; Bettiol, Marisa; Montanaro, Patricia; Cazzola, María L; Leguizamón, Mariana; Massillo, Cintia; Figoli, Cecilia; Valeiras, Brenda; Perez, Silvia; Rentería, Fernando; Diez, Graciela; Yantorno, Osvaldo M; Bosch, Alejandra

    2016-01-01

    The epidemiological and clinical management of cystic fibrosis (CF) patients suffering from acute pulmonary exacerbations or chronic lung infections demands continuous updating of medical and microbiological processes associated with the constant evolution of pathogens during host colonization. In order to monitor the dynamics of these processes, it is essential to have expert systems capable of storing and subsequently extracting the information generated from different studies of the patients and microorganisms isolated from them. In this work we have designed and developed an on-line database based on an information system that allows to store, manage and visualize data from clinical studies and microbiological analysis of bacteria obtained from the respiratory tract of patients suffering from cystic fibrosis. The information system, named Cystic Fibrosis Cloud database is available on the http://servoy.infocomsa.com/cfc_database site and is composed of a main database and a web-based interface, which uses Servoy's product architecture based on Java technology. Although the CFC database system can be implemented as a local program for private use in CF centers, it can also be used, updated and shared by different users who can access the stored information in a systematic, practical and safe manner. The implementation of the CFC database could have a significant impact on the monitoring of respiratory infections, the prevention of exacerbations, the detection of emerging organisms, and the adequacy of control strategies for lung infections in CF patients. PMID:26895996

  6. Security Architecture of Cloud Computing

    Directory of Open Access Journals (Sweden)

    V.KRISHNA REDDY

    2011-09-01

    Full Text Available The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages on the data security of service consumers. This paper aims to emphasize the main security issues existing in cloud computing environments. The security issues at various levels of cloud computing environment is identified in this paper and categorized based on cloud computing architecture. This paper focuses on the usage of Cloud services and security issues to build these cross-domain Internet-connected collaborations.

  7. Cloud ERP and Cloud Accounting Software in Romania

    OpenAIRE

    Gianina MIHAI

    2015-01-01

    Nowadays, Cloud Computing becomes a more and more fashionable concept in the IT environment. There is no unanimous opinion on the definition of this concept, as it covers several versions of the newly emerged stage in the IT. But in fact, Cloud Computing should not suggest anything else than simplicity. Thus, in short, simple terms, Cloud Computing can be defined as a solution to use external IT resources (servers, storage media, applications and services), via Internet. Cloud computing is no...

  8. Architecture and Implementation of a Scalable Sensor Data Storage and Analysis System Using Cloud Computing and Big Data Technologies

    Directory of Open Access Journals (Sweden)

    Galip Aydin

    2015-01-01

    Full Text Available Sensors are becoming ubiquitous. From almost any type of industrial applications to intelligent vehicles, smart city applications, and healthcare applications, we see a steady growth of the usage of various types of sensors. The rate of increase in the amount of data produced by these sensors is much more dramatic since sensors usually continuously produce data. It becomes crucial for these data to be stored for future reference and to be analyzed for finding valuable information, such as fault diagnosis information. In this paper we describe a scalable and distributed architecture for sensor data collection, storage, and analysis. The system uses several open source technologies and runs on a cluster of virtual servers. We use GPS sensors as data source and run machine-learning algorithms for data analysis.

  9. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  10. Relocations of sea turtle nests of Lepidochelys olivacea, Dermochelys coriacea and Chelonia mydas in the Galibi Nature Reserve, Suriname

    NARCIS (Netherlands)

    Schouten, A.D.; Weijerman, M.; Tienen, van L.H.G.; Hoekert, W.E.J.

    1997-01-01

    SCHOUTEN, A.D., WEIJERMAN, M., VAN TIENEN, L.H.G. & W.E.J. HOEKERT, 1997. Relocations of Sea Turtle nests of Lepidochelys olivacea, Dermochelys coriace and Chelonia mydas in the Galibi Nature Reserve, Suriname. Studies Nat. Hist. Caribbean Region 73, Amsterdam, 1997: 63-69. Relocation of nests of th

  11. 一种基于蚁群算法的云存储副本动态选择机制研究%Pheromone-based ant colony replica selection mechanism in cloud storage

    Institute of Scientific and Technical Information of China (English)

    左方; 何欣

    2015-01-01

    针对云存储技术中副本选择优化问题,提出一种基于蚁群原理的云存储副本动态选择算法。构建基于蚁群的副本动态选择模型,建立副本选择度量标准(如带宽占用、网络路径时延和平均访问时间等)与蚁群信息素的映射,并对虚拟机实例负载状况和虚拟机集群资源利用状况进行量化评估,感知所监控的云节点的资源度量情况;最后利用副本信息素概率计算式得到一组选择副本资源的最优解,最终达到优化负载均衡的目的。经OpenStack 模式的云平台对新算法仿真实现,实验结果表明新算法成功实现了副本的有效分发和虚拟机集群的负载均衡,与 Round Robin 和 Server Load 算法相比,新算法有更好的负载均衡效果。%This paper designed and analyzed a feasible,distributed,ant colony optimization algorithm based replica selection method on big data transferring in cloud storage,which was called pheromone-based ant colony replica selection algorithm in cloud storage (PARSA).PARSA provided a new,promising direction in cloud storage.This algorithm was different from the previously studied researches in three ways to make it more accurately reflective of cloud environment.It inclined multifactors to affect the efficiency of data accessing and processing in cloud,considered such as bandwidth,file accessing time and average delay as pheromones in PARSA.PARSA avoided a large-scale flat flooding and supports multi-attribute range query,which were accompanied by unstructured or structured P2P replica selection methods.Lastly,simulation results from cloud test bed based on OpenStack show that,compared by Round Robin and Server Load,PARSA can reduce data access latency and band-width consumption,and effectively achieve cloud load balancing between storage nodes and improve the speed of data access.

  12. 基于RIA和云存储的Web2.0 OS设计与实现%Design and implementation of Web2.0 OS based on RIA & cloud-storage

    Institute of Scientific and Technical Information of China (English)

    季志远

    2012-01-01

    This paper introduces a Web2.00S based on Flash & Flex (RIA),which provides the basic functions of entertain- ment,file storage,information updating and customization,so that it can be used as online entertainment platform,online storage p|at- form and online office platform. And introduces two key technologies of data communication between OS and cloud-storage-based Server, and file storage and representation.The server based on cloud-storage makes file uploads and downloads instantly with fluent using experiments.%设计了基于RIA下Flash/Flex联合开发的Web2.0OS,提供影音娱乐、文件存储、实时信息更新、用户自由定制等功能,可作为网上娱乐、存储和办公平台,并给出了OS与云存储端通信机制和文件存储再现机制这两个关键技术。服务器端采用云存储技术使得文件上传下载瞬间完成,给用户流畅的使用体验。

  13. Research and Implementation of Cloud Computing Platform Oriented Online Storage System%面向云计算平台的在线存储系统研究与实现

    Institute of Scientific and Technical Information of China (English)

    耿胜男; 刘川意; 吴旭

    2012-01-01

    This paper designs and implements an important part of the infrastructure cloud - online storage system of the cloud storage system. The system follows the REST architectural pattern, and uses cURL, HSQLDB and other open source components to achieve the creation, upload, download and delete of directories and files and other functions.%研究基础设施云中的重要组成部分——云存储系统中在线存储系统的设计与实现。本系统的设计遵循REST架构模式,使用cURL、HSQLDB等开源组件实现目录与文件的创建、上传、下载、删除等功能。

  14. Location Allocation of Logistics Distribution Centers Based on Concept of Cloud Storage and Logistics%以云仓储物流概念为基础的物流配送中心选址

    Institute of Scientific and Technical Information of China (English)

    张珂宁

    2014-01-01

    In this paper, on the basis of an exposition of the concept of cloud storage and logistics, we analyzed the path for the implementation of cloud storage, then designed correspondingly the location model of the logistics center, next solved it using the genetic algorithm, and at the end, through an empirical example, validated the model and algorithm.%在论述云仓储物流概念的基础上分析了实施云仓储的思路,随后以云仓储的思想设计了物流中心选址的模型,并通过遗传算法对模型进行求解,最后以实例进行模型和算法的验证。

  15. 云存储在web3D内容管理系统中的应用%Application of Cloud Storage in Web3D Content Management System

    Institute of Scientific and Technical Information of China (English)

    陈晓波

    2015-01-01

    Google launched"Google101 program"in 2006. This is when truly specific concept of the"cloud"and related theories appear.Many companies have launched their own cloud platform. Facing the possibility of upcoming massive data of the library, cloud storage can linearly extend inactive data mass. This paper firstly outlines the basic architecture of the cloud platform, and in⁃troduces Hadoop distributed storage technology , then a program for the cloud storage in small files is designed.Finally a summary and recommendations for future improvements are put forward.%谷歌公司在2006年推出“Google101计划”,这才真正的有具体化的“云”的概念和相关理论,不少公司都相继推出了自己的云平台。面临未来素材库可能会到来的海量数据,利用云存储可以线性地扩展海量的非活动数据。该文首简述了云平台的基本架构,并对Hadoop分布式存储技术进行了介绍,然后设计了云存储针对小型文件的存储方案,最后进行总结,并对未来的改进提出了建议。

  16. Mercury in the sea turtle Chelonia mydas (Linnaeus, 1958 from Ceará coast, NE Brazil

    Directory of Open Access Journals (Sweden)

    Moisés F. Bezerra

    2012-03-01

    Full Text Available Mercury concentrations in carapace fragments of the green turtle Chelonia mydas from the Ceará coast in NE Brazil are reported. Concentrations varied from As concentrações de Hg em fragmentos de carapaça de Chelonia mydas no litoral do Ceará, nordeste do Brasil, são reportadas. Concentrações variaram de <0,34 a 856,6 ng.g -1 em peso seco, e foram maiores (média de 154,8 ng.g -1 em peso seco em indivíduos juvenis (n = 22, enquanto que as menores concentrações (média de 2,5 ng.g -1 em peso seco foram observadas em indivíduos adultos/sub-adultos (n = 3. Houve uma correlação negativa significativa entre tamanho do animal e concentração de Hg provavelmente devido a diferença de dieta entre juvenis e sub-adultos/adultos. Fragmentos de carapaça, que constituem substratos não-invasivos e não letais, podem ser importantes para fins de monitoramento ambiental dessas espécies ameaçadas de extinção.

  17. Data Mining Using High Performance Data Clouds: Experimental Studies Using Sector and Sphere

    OpenAIRE

    Grossman, Robert L.; Gu, Yunhong

    2008-01-01

    We describe the design and implementation of a high performance cloud that we have used to archive, analyze and mine large distributed data sets. By a cloud, we mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud provides compute services. We describe the design of the Sector storage cloud and how it provides the storage services required by the Sphere compute cloud. We also describe the programming...

  18. Cloud Robotics Model

    Directory of Open Access Journals (Sweden)

    Gyula Mester

    2015-01-01

    Full Text Available Cloud Robotics was born from the merger of service robotics and cloud technologies. It allows robots to benefit from the powerful computational, storage, and communications resources of modern data centres. Cloud robotics allows robots to take advantage of the rapid increase in data transfer rates to offload tasks without hard real time requirements. Cloud Robotics has rapidly gained momentum with initiatives by companies such as Google, Willow Garage and Gostai as well as more than a dozen active research projects around the world. The presentation summarizes the main idea, the definition, the cloud model composed of essential characteristics, service models and deployment models, planning task execution and beyond. Finally some cloud robotics projects are discussed.

  19. 物联网环境下云数据存储安全及隐私保护策略研究%Cloud Data Storage Security and Privacy Protection Policies under IoT Environment

    Institute of Scientific and Technical Information of China (English)

    何明; 陈国华; 梁文辉; 赖海光; 凌晨

    2012-01-01

    The Internet of Things implements information intelligence relying on the powerful data processing capability of cloud computing. However,it is not worthy of user trust that cloud computing manages data and services. According to cloud data security issues in the environment of the IoT, the cloud data storage security and privacy policies were raised, in order to ensure the accuracy and privacy of user data in the cloud. The experimental results show that the program is effective and flexible,and can resist the Byzantine failure,malicious modification of data,and even server collusion attack.%物联网依托云计算强大的数据处理能力实现信息智能,而目前云计算对数据和服务的管理并不值得用户完全信赖.针对物联网环境下云数据安全性问题,在云计算中为了保证用户数据的准确性和隐私性,提出了一种物联网环境下云数据存储安全及隐私保护策略.实验结果表明该方案有效、灵活,且能抵御Byzantine失效、恶意修改数据甚至是服务器共谋攻击.

  20. Study on the Key-Value Distributed Storage System for Cloud Computing%面向云计算的键值型分布式存储系统研究

    Institute of Scientific and Technical Information of China (English)

    孙勇; 林菲; 王宝军

    2013-01-01

    对于数据密集型的云计算应用,基于磁盘的存储系统很难同时满足它们对性能与可用性的需求.本文提出了一种以内存为主设备、以磁盘为辅助设备的键值型分布式存储系统M-Cloud ,能提供大数据读写、备份及恢复等存储服务功能.M-Cloud通过将数据全部装入服务器集群内存中的方式提高系统整体性能,并设计了分区线性哈希算法以实现负载均衡和高扩展性,设计了相应的数据备份与故障快速恢复策略以保证系统可靠性.仿真实验结果表明, M-Cloud具有较高的性能与可用性,对系统进一步改进和优化后具有应用于实际生产环境中的潜力,可为用户提供高质量的存储服务.%In view of data intensive cloud computing applications ,disk-based storage systems are difficult to meet their de-mand for performance and availability simultaneously .This paper puts forward a key-value distributed storage system named M-Cloud ,which uses memory as main device and disk as auxiliary when providing storage services (read ,write ,backup and recovery ) for big data .M-Cloud improves overall system performance by loading entire data in the memory of the cluster ,and designs PBLH (partition-based linear hashing ) algorithm to achieve load balancing and high scalability .M-Cloud also designs relative backup and fast crash recovery strategy in order to ensure high system reliability .The simulation results show that M-Cloud has high perfor-mance and availability ,with further optimization ,the system has the potential in real production environment usage ,can provide users with high-quality storage services .

  1. Search Cloud

    Science.gov (United States)

    ... this page: https://medlineplus.gov/cloud.html Search Cloud To use the sharing features on this page, ... Top 110 zoster vaccine Share the MedlinePlus search cloud with your users by embedding our search cloud ...

  2. 一种保护云存储平台上用户数据私密性的方法%A Method on Protection of User Data Privacy in Cloud Storage Platform

    Institute of Scientific and Technical Information of China (English)

    侯清铧; 武永卫; 郑纬民; 杨广文

    2011-01-01

    近年来,云存储被研究者和IT厂商广泛关注,许多应用程序都用云存储来存储数据.但是用户和厂商都对于云存储的安全性和私密性问题表示忧虑.云存储安全的核心是分布式文件系统的安全性和私密性.基于SSL安全连接和Daoli安全虚拟监控系统可以充分保护分布式文件系统中用户数据的安全性和私密性.安全虚拟监督系统可以阻止传统攻击及来自云管理员的攻击.针对用户的不同需求和数据存储系统的特点,有2种解决方案,分别针对分布式文件系统中用户文件的每一块进行保护,保障用户文件每一块的私密性及对整个用户文件进行保护,保证用户文件整体私密性.对于用户数据的私密性而言,SSL安全连接和虚拟监控系统引入的性能损失是可以被接受的.%Nowadays, many researchers and IT companies pay close attention to cloud storage. A lot of applications use cloud storage to store data. But many people and companies worry about the security and privacy problem of cloud storage. Cloud storage platform is prone to compromise or abuse from adversaries including the cloud administrators. The security and privacy problem of cloud storage is the security and privacy problem of distributed file system, which is the core of cloud storage. With SSL secure connection and secure virtual machine monitor (Daoli), the security and privacy of the user's data can be protected in the distributed file system, even facing a total compromise of the distributed file system or the operating system. With secure virtual machine monitor, conventional attacks and attacks from cloud administrators can be prevented. Two schemes for different application scenarios are put forward. In one scheme, every chunk of user's file is protected, so the privacy of every chunk is guaranteed. In another method, only the whole file is protected, and the privacy of the whole file is guaranteed not all chunks. The overhead of

  3. Cloud computing

    OpenAIRE

    Kodera, Lukáš

    2014-01-01

    This thesis deals with cloud computing in Czech Republic, specifically providers of cloud services. In theoretical part there will be explained what is cloud computing, different kinds of cloud computing, virtualization necessary for cloud computing, main concerns about cloud security and also, where cloud is physically stored. In practical part author choose the best solution for company from selected cloud providers in the Czech Republic by using mathematical methods, then author compare th...

  4. Guidance Notes for Cloud Research Users

    OpenAIRE

    Bacigalupo, David; Chen, Xiaoyu; Wills, Gary; Gilbert, Lester

    2010-01-01

    There is a rapidly increasing range of research activities which involve the outsourcing of computing and storage resources to public Cloud Service Providers (CSPs), who provide managed and scalable resources virtualised as a single service. For example Amazon Elastic Computing Cloud (EC2) and Simple Storage Service (S3) are two widely adopted open cloud solutions, which aim at providing pooled computing and storage services and charge users according to their weighted resource usage. Other e...

  5. 基于云存储的多用户可搜索加密方案%An Efifcient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    王保民; 何智灵; 罗文俊

    2013-01-01

    Cloud storage services allow the users to outsource their data to the cloud storage servers to reduce management costs. The cloud servers cannot be fully trusted while those data may contain sensitive personal information. We study a problem of storing and retrieving private data encrypted in a cloud. Multi-user searchable encryption is a promising way to keep user’s data conifdential against un-trusted cloud service provider and allow users to share their data in privacy. In this paper we propose an efficient, secure and privacy preserving keyword search scheme which supports multiple users with more lfexible key management and lower computation cost rather than known approaches.%云存储服务允许用户外包数据并以此来降低资源开销。针对云服务器不被完全信任的现状,文章研究如何在云环境下对数据进行安全存储和加密搜索。多用户的可搜索加密方案为用户提供了一种保密机制,使用户可以在不受信任的云存储环境下安全地共享信息。在现有的可搜索加密方案的基础上,文章提出了一种安全有效的带关键字搜索的加密方案,以及更加灵活的密钥管理机制,降低了云端数据处理的开销。

  6. Cloud Auditing With Zero Knowledge Privacy

    Directory of Open Access Journals (Sweden)

    Shilpa Dilip Sapatnekar,

    2015-07-01

    Full Text Available The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.

  7. Cloud Infrastructure Service Management - A Review

    Directory of Open Access Journals (Sweden)

    A. Anasuya Threse Innocent

    2012-03-01

    Full Text Available The new era of computing called Cloud Computing allows the user to access the cloud services dynamically over the Internet wherever and whenever needed. Cloud consists of data and resources; and the cloud services include the delivery of software, infrastructure, applications, and storage over the Internet based on user demand through Internet. In short, cloud computing is a business and economic model allowing the users to utilize high-end computing and storage virtually with minimal infrastructure on their end. Cloud has three service models namely, Cloud Software-as-a-Service (SaaS, Cloud Platform-as-a-Service (PaaS, and Cloud Infrastructure-as-a-Service (IaaS. This paper talks in depth of cloud infrastructure service management.

  8. VIRTUALIZATION IN CLOUD COMPUTING

    OpenAIRE

    LAKSHAY MALHOTRA; DEVYANI AGARWAL; ARUNIMA JAISWAL

    2014-01-01

    Cloud computing technology is one of the biggest milestones in leading us to next generation technology and booming up business and IT field. It helps to overcome the problems of data loss, accessing data whenever needed and data security. This technology is mainly service oriented and focuses on cost reduction, hardware reduction and pay just for service concept. Virtualization in cloud computing is making a virtual image of the storage devices, servers or network resources so that they can ...

  9. Body size distribution demonstrates flexible habitat shift of green turtle (Chelonia mydas

    Directory of Open Access Journals (Sweden)

    Ryota Hayashi

    2015-01-01

    Full Text Available Green turtles (Chelonia mydas, listed as Endangered on the IUCN redlist, have a broad migration area and undergo a habitat shift from the pelagic (hatchling to neritic (growth zones. We studied habitat utilisation of the coastal feeding grounds around Okinawajima Island, Japan, in 103 green turtles. The western and eastern turtle aggregations off Okinawa had homogeneous genetic compositions, but different body size distributions. The western coastal feeding ground supported larger individuals than the eastern coastal feeding ground. Thus, green turtles appear to prefer different feeding grounds during their growth, and have a flexible habitat shift including a secondary habitat shift from east to west around Okinawajima Island after they are recruited to the coastal habitats. This study suggests maintaining coastal habitat diversity is important for green turtle conservation.

  10. Marine debris ingestion by Chelonia mydas (Testudines: Cheloniidae) on the Brazilian coast.

    Science.gov (United States)

    da Silva Mendes, Sarah; de Carvalho, Robson Henrique; de Faria, Adriana Fonseca; de Sousa, Bernadete Maria

    2015-03-15

    Chelonia mydas is distributed in several regions of the world and they are common in coastal regions and around islands. Between August 2008 and July 2009, 20 specimens of C. mydas were found dead on the beaches of Ubatuba, São Paulo, Brazil. The stomachs were removed and anthropogenic wastes were separated according their malleability and color. Of those animals, nine had ingested marine debris. Soft plastic was the most frequent among the samples and the majority of fragments was white or colorless and was between zero and five cm. Many studies have shown a high incidence of eating waste for some species of sea turtles. The record of ingestion of mostly transparent and white anthropogenic wastes in this study strengthens the hypothesis that these animals mistake them for jellyfish. Although the intake of anthropogenic waste causes impact on the lives of sea turtles, such studies are still scarce in Brazil.

  11. Young green turtles, Chelonia mydas, exposed to plastic in a frontal area of the SW Atlantic.

    Science.gov (United States)

    González Carman, Victoria; Acha, E Marcelo; Maxwell, Sara M; Albareda, Diego; Campagna, Claudio; Mianzan, Hermes

    2014-01-15

    Ingestion of anthropogenic debris represents an important threat to marine turtle populations. Information has been limited to inventories of debris ingested and its consequences, but why ingestion occurs and the conditions that enable it are less understood. Here we report on the occurrence of plastic ingestion in young green turtles (Chelonia mydas) inhabiting the Río de la Plata (SW Atlantic). This estuarine area is characterized by a frontal system that accumulates anthropogenic debris. We explored exposure of green turtles to plastic and its ingestion via debris distribution, habitat use and digestive tract examination. Results indicated that there is considerable overlap of frontal accumulated plastic and core foraging areas of the animals. Exposure results in ingestion, as shown by the high frequency of plastic found in the digestive tracts. The Río de la Plata estuarine front is an area of conservation concern for young green turtles.

  12. Food preferences and Hg distribution in Chelonia mydas assessed by stable isotopes.

    Science.gov (United States)

    Bezerra, M F; Lacerda, L D; Rezende, C E; Franco, M A L; Almeida, M G; Macêdo, G R; Pires, T T; Rostán, G; Lopez, G G

    2015-11-01

    Mercury (Hg) is a highly toxic pollutant that poses in risk several marine animals, including green turtles (Chelonia mydas). Green turtles are globally endangered sea turtle species that occurs in Brazilian coastal waters as a number of life stage classes (i.e., foraging juveniles and nesting adults). We assessed total Hg concentrations and isotopic signatures ((13)C and (15)N) in muscle, kidney, liver and scute of juvenile green turtles and their food items from two foraging grounds with different urban and industrial development. We found similar food preferences in specimens from both areas but variable Hg levels in tissues reflecting the influence of local Hg backgrounds in food items. Some juvenile green turtles from the highly industrialized foraging ground presented liver Hg levels among the highest ever reported for this species. Our results suggest that juvenile foraging green turtles are exposed to Hg burdens from locally anthropogenic activities in coastal areas. PMID:26196313

  13. Helminth Parasites of Juvenile Green Turtles Chelonia mydas (Testudines: Cheloniidae) in Brazil.

    Science.gov (United States)

    Werneck, M R; Silva, R J

    2015-12-01

    The present study offers a parasitological analysis of juvenile individuals of the green turtle ( Chelonia mydas ) found on the Brazilian coast between 2004 and 2011. Helminths were found in 90 out of 136 individuals (66.2%, CI = 57.7-74.0). In total, 29,411 helminths were collected, belonging to the families Brachycoeliidae, Cladorchiidae, Microscaphidiidae, Pronocephalidae, Rhytidodidae, and Spirorchiidae. Mean species richness was 4.74 (CI = 4.03-5.46), the mean intensity was 327 (CI = 223-489), and the mean abundance was 216 (CI = 146-339). This study also reports new geographical records for: Angiodictyum longum, Angiodictyum parallelum, Rameshwarotrema uterocrescens, Pyelosomum cochlear, Schizamphistomum scleroporum, Cymatocarpus solearis, and Neospirorchis sp. This is the first analysis of helminth composition in juveniles of green turtles.

  14. ultrastructural study of limb bud development in green turtles chelonia mydas

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    morphological changes during the embryonic development of limbs of the green turtle,chelonia mydas,were studied during the entire period of incubation,using transmission and scanning electron microscopy (tem and sem).limb buds were first observed at stage 2.at that stage,the tip was covered with an apical ectodermal ridge (aer) which began to regress at stage 6.associated with aer was the presence of the mesenchymal cells which,consequently,differentiated into muscles,cartilage and bones.the gross features of the skeletal development appeared as a condensation of the cartilaginous structures in the proximal distal region of the limbs.the primordial digits were gradually enclosed by hard keratinized webbed skin.the increase in rate of ossification and skin pigmentation was correlated with the growth of the limbs.the development of the limbs was closely related to the transitional appearance of mucus secretion from the epidermis.

  15. Health condition of juvenile Chelonia mydas related to fibropapillomatosis in southeast Brazil

    Science.gov (United States)

    Renan de Deus Santos, Marcello; Silva Martins, Agnaldo; Baptistotte, Cecília; Work, Thierry M.

    2015-01-01

    Packed cell volume (PCV), plasma biochemistry, visual body condition (BC), and calculated body condition index (BCI) were evaluated in 170 wild juvenile green sea turtles Chelonia mydas from an aggregation in the effluent canal of a steel mill in Brazil. Occurrence of cutaneous fibropapillomatosis (FP) was observed in 44.1% of the animals examined. BCI alone did not differ significantly between healthy animals and those afflicted with FP. However, all turtles with low BCI were severely afflicted and were uremic, hypoglycemic, and anemic in relation to healthy animals. Severe FP was not always reflected by a poor health condition of the individual. Clinical evaluation and plasma biochemistry indicated that most animals afflicted with FP were in good health condition. Differences in FP manifestations and associated health conditions in different geographic regions must be assessed by long-term health monitoring programs to help define priorities for conservation efforts.

  16. Cloud computing basics

    CERN Document Server

    Srinivasan, S

    2014-01-01

    Cloud Computing Basics covers the main aspects of this fast moving technology so that both practitioners and students will be able to understand cloud computing. The author highlights the key aspects of this technology that a potential user might want to investigate before deciding to adopt this service. This book explains how cloud services can be used to augment existing services such as storage, backup and recovery. Addressing the details on how cloud security works and what the users must be prepared for when they move their data to the cloud. Also this book discusses how businesses could prepare for compliance with the laws as well as industry standards such as the Payment Card Industry.

  17. A Survey on Mobile Cloud Computing with Embedded Security Considerations

    OpenAIRE

    Victor Onomza Waziri; Joshua Abah; Olumide Sunday Adewale; Muhammad Bashir Abdullahi

    2014-01-01

    The emergence of cloud computing hold a promise to computing where software is provided as a services (SaaS) via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth) of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducin...

  18. Research and Application of the Cloud Computation Storage System%云存储系统的分析与应用研究

    Institute of Scientific and Technical Information of China (English)

    唐箭

    2009-01-01

    The article first carried on to the cloud memory introduced that then introduced emphatically the cloud memory system's struc-tural model and realized key technologies, ultimate analysis cloud memory system's several kind of application pattern.%文章首先对云存储进行了介绍,然后着重介绍了云存储系统的结构模型及其实现的关键技术,最后分析了云存储系统的几种应用模式.

  19. Morfologia do tubo digestório da tartaruga verde (Chelonia mydas Morphology of the digestive tube of the green turtle (Chelonia mydas

    Directory of Open Access Journals (Sweden)

    Marcela S. Magalhães

    2010-08-01

    Full Text Available Para avaliar a morfologia do tubo digestório da tartaruga verde (Chelonia mydas 10 animais, 9 juvenis e 1 adulto, foram analisados. A retirada dos órgãos digestórios procedeu-se após abertura do plastrão. A descrição e a medida do comprimento de cada órgão [esôfago, estômago, intestino delgado (ID e intestino grosso (IG] foram realizadas com o tubo digestório aberto. Os resultados mostraram que tanto nos animais juvenis como no adulto, o esôfago foi marcado pela presença de papilas pontiagudas em sua mucosa interna. O estômago apresentou aspecto saculiforme com fundo cego. No ID foi observado pregas reticulares na mucosa duodenal, enquanto o jejuno e do íleo mostrou pregas retilíneas longitudinais. O IG foi marcado pela alternância de regiões abauladas (haustros ou saculações e estreitamentos. A microscopia do tudo digestório em C. mydas revelou esôfago com mucosa pregueada revestida por epitélio estratificado pavimentoso queratinizado. O estômago mostrou-se dividido em regiões: cárdica, fúndica, pilórica, as quais diferiam quanto ao número de glândulas e disposição da camada muscular. O ID apresentou-se marcado por vilosidades, e o IG por mucosa pregueada contendo glândulas na lâmina própria. A morfologia do tubo digestório da tartaruga verde mostrou-se adaptada ao seu hábito alimentar, possuindo especializações e um longo trato digestório que promove o aumento da superfície de absorção, já que seu alimento é de difícil digestão.The morphology of the digestive tube of the green turtle (Chelonia mydas was evaluated. Nine young e 1 adult turtles were analyzed. The digestive organs withdrew occurred after plastron opening. The length's description and measurement from each organ [esophagus, stomach, small intestine (SI and large intestine (LI] were made with digestive tube opened. The results showed that in both the adult and young animals, the esophagus from all species were marked by the presence

  20. Research on the Secure Storage Scheme of Cloud Computing Based on Encryption Mechanism%基于加密机制的云计算数据可靠存储方案研究

    Institute of Scientific and Technical Information of China (English)

    赵莉; 王魁祎

    2014-01-01

    为了克服因收发双方都使用同样钥匙导致的其安全性不高等缺点,引入深度加密机制,与AES ( Advanced Encryption Standard)算法耦合,设计了基于双级加密的云计算数据可靠存储方案。先采用AES对用户数据客户端进行对称加密,到达云资源管理器后,采用分布式重组的方法进行深度加密,构造了“初级-深度”双级加密的云计算数据可靠存储结构,并完成了基于加密的云计算数据安全存储加密和解密操作流程。借助Eclipse与Java语言,建立了云计算安全模块。结果表明:该系统的加密效率高,拥有较高的安全性且界面操作简单。%In order to overcome the defects such as low security resulting by both using the same key for sending and receiving, the depth encryption mechanism was introduced, and taking it coupling the AES algorithm to propose the secure storage system of cloud computation based on the encryption mechanism. Basing on the analysis of previous research on the security of cloud storage, the symmetric encryption for the user data was used in the client, when the data reached the cloud resource management device, the method of distributed restructuring was used to operate depth encryption;and the security storage structure of “initial encryption-depth encryption” was constructed; and then the encryption and decryption process of data safety storage was finished. Based on the eclipse simulation platform, the de-sign and implementation were done for the cloud computing security module. The results showed that the encryption ef-ficiency and security of this system was high and simple interface.

  1. 基于加密机制的云计算数据可靠存储方案研究%Research on the Secure Storage Scheme of Cloud Computing Based on Encryption Mechanism

    Institute of Scientific and Technical Information of China (English)

    赵莉; 王魁祎

    2014-01-01

    为了克服因收发双方都使用同样钥匙导致的其安全性不高等缺点,引入深度加密机制,与AES ( Advanced Encryption Standard)算法耦合,设计了基于双级加密的云计算数据可靠存储方案。先采用AES对用户数据客户端进行对称加密,到达云资源管理器后,采用分布式重组的方法进行深度加密,构造了“初级-深度”双级加密的云计算数据可靠存储结构,并完成了基于加密的云计算数据安全存储加密和解密操作流程。借助Eclipse与Java语言,建立了云计算安全模块。结果表明:该系统的加密效率高,拥有较高的安全性且界面操作简单。%In order to overcome the defects such as low security resulting by both using the same key for sending and receiving, the depth encryption mechanism was introduced, and taking it coupling the AES algorithm to propose the secure storage system of cloud computation based on the encryption mechanism. Basing on the analysis of previous research on the security of cloud storage, the symmetric encryption for the user data was used in the client, when the data reached the cloud resource management device, the method of distributed restructuring was used to operate depth encryption;and the security storage structure of “initial encryption-depth encryption” was constructed; and then the encryption and decryption process of data safety storage was finished. Based on the eclipse simulation platform, the de-sign and implementation were done for the cloud computing security module. The results showed that the encryption ef-ficiency and security of this system was high and simple interface.

  2. 一种基于蚁群算法的云存储副本动态选择机制研究%Pheromone-based ant colony replica selection mechanism in cloud storage

    Institute of Scientific and Technical Information of China (English)

    左方; 何欣

    2015-01-01

    This paper designed and analyzed a feasible,distributed,ant colony optimization algorithm based replica selection method on big data transferring in cloud storage,which was called pheromone-based ant colony replica selection algorithm in cloud storage (PARSA).PARSA provided a new,promising direction in cloud storage.This algorithm was different from the previously studied researches in three ways to make it more accurately reflective of cloud environment.It inclined multifactors to affect the efficiency of data accessing and processing in cloud,considered such as bandwidth,file accessing time and average delay as pheromones in PARSA.PARSA avoided a large-scale flat flooding and supports multi-attribute range query,which were accompanied by unstructured or structured P2P replica selection methods.Lastly,simulation results from cloud test bed based on OpenStack show that,compared by Round Robin and Server Load,PARSA can reduce data access latency and band-width consumption,and effectively achieve cloud load balancing between storage nodes and improve the speed of data access.%针对云存储技术中副本选择优化问题,提出一种基于蚁群原理的云存储副本动态选择算法。构建基于蚁群的副本动态选择模型,建立副本选择度量标准(如带宽占用、网络路径时延和平均访问时间等)与蚁群信息素的映射,并对虚拟机实例负载状况和虚拟机集群资源利用状况进行量化评估,感知所监控的云节点的资源度量情况;最后利用副本信息素概率计算式得到一组选择副本资源的最优解,最终达到优化负载均衡的目的。经OpenStack 模式的云平台对新算法仿真实现,实验结果表明新算法成功实现了副本的有效分发和虚拟机集群的负载均衡,与 Round Robin 和 Server Load 算法相比,新算法有更好的负载均衡效果。

  3. ENHANCEMENTS STRATEGY OF CLOUD STORAGE ACCESS CONTROL APPLIED TO POWER GRID ENTERPRISE%应用于电网企业的云存储访问控制增强策略

    Institute of Scientific and Technical Information of China (English)

    张鸿辉; 刘伟; 李永强

    2014-01-01

    针对电力信息云存储管理应用的安全需求,以降低传统访问控制方案在访问规则上的系统开销为目标,提出一种基于实体属性和安全标记相结合的云存储访问控制增强策略。采用面向实体属性管理权限方法优化访问控制,降低权限管理开销,避免访问权限与用户、存储进程、平台客体间的直接联系;通过多级安全标记,进行权限分配、确保策略在实施后维护上的灵活性。并以某电网企业的电力信息云存储管理系统为例,详细阐述该策略的具体配置过程。经过性能分析表明,所设计访问控制策略在可维护性、存储开销、安全性能等方面表现良好,具有应用可行性。%For the security need of cloud storage applications in power information management,we propose an enhancement strategy of cloud storage access control,which is based on the combination of entity attributes and security tag,and is targeted at reducing the system overhead of conventional access control schemes in regard to access rules. The strategy utilises entity attributes-oriented privileges management method to optimise the access control,reduces privileges management overhead,and prevents the direct contacts between the access privileges and the user,storage process and platform object.Moreover,it also uses multi-level security tag to carry out privileges allocation and to ensure the flexibility of the strategy in maintenance when implemented.A power information cloud storage management system at a certain power grid enterprises is taken for example to elaborate the specific configuration process of the strategy.It is illustrated by the performance analysis that the access control strategy designed in the paper has good performance in maintainability,storage overhead, security and other aspects,and has application feasibility.

  4. AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

    Directory of Open Access Journals (Sweden)

    Dr. L. Arockiam

    2015-02-01

    Full Text Available Cloud dominates the IT enterprises by way of its computing services. One of the services provided by the cloud is data storage. Cloud storage mainly supports Small and Medium scale Enterprises (SMEs by reducing their capital investments and maintenance of storage servers. Most of the SMEs are outsourcing their data to cloud storage. Enterprises’ data that are forwarded to the cloud have to be kept in the public cloud storage. Safety and security are the top most issues in cloud storage. The confidentiality parameter provides data storage security. This paper proposes a security service algorithm named AROcrypt to ensure the security of data stored in cloud storage. It also describes Security as a Service (SEaaS in the cloud environment. Simulation was conducted using a security analysis tool with existing techniques. The proposed technique provides better performance and good security when compared with existing techniques.

  5. Networking for the cloud: challenges and trends

    NARCIS (Netherlands)

    Drago, I.; O. Schmidt, de R.; Hofstede, R.; Sperotto, A.; Karimzadeh, M.; Haverkort, B.R.; Pras, A.; Spaniol, O.

    2013-01-01

    Cloud services have changed the way computing power is delivered to customers, by offering computing and storage capacity in remote data centers on demand over the Internet. The success of the cloud model, however, has not come without challenges. Cloud providers have repeatedly been related to repo

  6. Storage System Design Scheme in Virtualization Construction

    Institute of Scientific and Technical Information of China (English)

    Si Zhen-yu

    2012-01-01

    In order to improve resource utilization, it is necessary to integrate storage and data, and the emergence of cloud computing makes it possible. This paper analyzed the study of virtualization and cloud computing, proposed a new scheme based on virtualization, and established a shared storage platform, which made a good complement and perfected the centralized storage platform.

  7. Cloud Aggregation and Bursting for Object Based Sharable Environment

    Directory of Open Access Journals (Sweden)

    Mr. Pradeep Kumar Tripathi

    2011-09-01

    Full Text Available Cloud computing promises innate scalability and high availability at low cost. So far cloud storage deployments were subject to big companies but an increasing amount of available open-source systems allow also smaller private cloud installations. In this paper we discuss cloud aggregation and cloud bursting with their empirical review. Based on the review we map class and object in the sharable small clouds for making clouds more efficient. We also consider some of the security concern for the cloud computing for authorized data sharing between clouds.

  8. Ciphertext policy attribute based encryption scheme with revocation for cloud storage%一种用于云存储的可撤销的属性加密方案

    Institute of Scientific and Technical Information of China (English)

    PAN Ning; ZHU Zhi-qiang; SUN Lei; ZHAO Zhi-yuan

    2014-01-01

    由于云存储用户数量大,成分复杂,云存储中数据的安全防护问题成为其发展的一大制约,近年来,基于属性加密技术解决云存储中数据安全存储问题成为研究热点,但传统的属性加密方案存在密文长度相对较大且属性撤销复杂等问题。引入代理重加密技术,针对以上问题提出一种可撤销的密文属性基加密方案,在缩短密文长度的同时实现属性撤销操作,并证明该方案在DBDH假设下CPA是安全的。%Because of the large number and complex composition of cloud storage users, the data security issue has become a major constraint to the development of cloud storage. Recently, based on attribute-based encryption(ABE) technology to solve the problem of da

  9. Trust level of Clouds by Scheduling

    Directory of Open Access Journals (Sweden)

    Deva Sinha K.

    2015-11-01

    Full Text Available Cloud computing is a virtual storage which is used to store the data and information in secure manner. This project which gives a trustworthy to the cloud user from Admin without knowing the infrastructure and its properties of cloud. Cloud scheduled safety-critical data processing needs are beginning to push back strongly against using cloud computing, users will find that cloud scheduling will be maintained by the user to store their data on the cloud to create trust them . We have overcome this problem; a trusted cloud computing platform (TCCP proposed design. TCCP guarantees the implementation of the guest virtual machines to provide a closed box execution environment as a Service (IaaS providers such as Amazon EC2 allowing infrastructure. To protect a data in a secured way, while cloud user uploading a data it will get encrypted which means non readable format and when cloud user downloading a data it will get decrypted.

  10. Trust level of Clouds by Scheduling

    Directory of Open Access Journals (Sweden)

    Deva Sinha K

    2014-03-01

    Full Text Available Cloud computing is a virtual storage which is used to store the data and information in secure manner. This project which gives a trustworthy to the cloud user from Admin without knowing the infrastructure and its properties of cloud. Cloud scheduled safety-critical data processing needs are beginning to push back strongly against using cloud computing, users will find that cloud scheduling will be maintained by the user to store their data on the cloud to create trust them . We have overcome this problem; a trusted cloud computing platform (TCCP proposed design. TCCP guarantees the implementation of the guest virtual machines to provide a closed box execution environment as a Service (IaaS providers such as Amazon EC2 allowing infrastructure. To protect a data in a secured way, while cloud user uploading a data it will get encrypted which means non readable format and when cloud user downloading a data it will get decrypted.

  11. Implement Security using smart card on Cloud

    Directory of Open Access Journals (Sweden)

    Amish Kumar Aman

    2013-04-01

    Full Text Available Cloud is a concept of accessing the data from theirown datacenters such that the chances ofeavesdropping have been reduced and storage costis reduced. Here in this paper we are giving a briefsurvey of various cloud based techniqueimplemented so far. Although there are varioustechniques implemented so far for the cloudcomputing but here we are giving a survey of notonly cloud based techniques but also the concept ofsmart cards for the authentication between onecloud to another cloud.

  12. Green turtle (Chelonia mydas genetic diversity at Paranaguá Estuarine Complex feeding grounds in Brazil

    Directory of Open Access Journals (Sweden)

    Juliana Costa Jordão

    2015-09-01

    Full Text Available Sea turtles are marine reptiles that undertake long migrations through their life, with limited information regarding juvenile stages. Feeding grounds (FGs, where they spend most of their lives, are composed by individuals from different natal origins, known as mixed stock populations. The aim of this study was to assess genetic composition, natal origins and demographic history of juvenile green turtles (Chelonia mydas at the Paranaguá Estuarine Complex (PEC, Brazil, considered a Natural World Heritage site. Tissue samples of stranded animals were collected (n = 60, and 700 bp mitochondrial DNA sequences were generated and compared to shorter sequences from previously published studies. Global exact tests of differentiation revealed significant differences among PEC and the other FGs, except those at the South Atlantic Ocean. Green turtles at PEC present genetic signatures similar to those of nesting females from Ascension Island, Guinea Bissau and Aves Island/Surinam. Population expansion was evidenced to have occurred 20–25 kYA, reinforcing the hypothesis of recovery from Southern Atlantic refugia after the last Glacial Maximum. These results contribute to a better understanding of the dynamics of green turtle populations at a protected area by providing knowledge on the dispersion patterns and reinforcing the importance of the interconnectivity between nesting and foraging populations.

  13. Bacteremia in free-ranging Hawaiian green turtles, Chelonia mydas, with fibropapillomatosis

    Science.gov (United States)

    Work, T.M.; Balazs, G.H.; Wolcott, M.; Morris, R.

    2003-01-01

    Past studies of free-ranging green turtles Chelonia mydas with fibropapillomatosis (FP) in Hawaii have shown that animals become immunosuppressed with increasing severity of this disease. Additionally, preliminary clinical examination of moribund turtles with FP revealed that some animals were also bacteraemic. We tested the hypothesis that bacteraemia in sea turtles is associated with the severity of FP. We captured free-ranging green turtles from areas in Hawaii where FP is absent, and areas where FP has been endemic since the late 1950s. Each turtle was given an FP severity score ranging from 0 (no tumours) to 3 (severely affected). A fifth category included turtles that were stranded ashore and moribund with FP. We found that the percentage of turtles with bacteraemia increased with the severity of FP, and that the majority of bacteria cultured were Vibrio spp. Turtles with severe FP were more susceptible to bactaeremia, probably in part due to immunosuppression. The pattern of bacteraemia in relation to severity of disease strengthens the hypothesis that immunosuppression is a sequel to FP.

  14. Histology and Immunohistochemistry of the Cardiac Ventricular Structure in the Green Turtle (Chelonia mydas).

    Science.gov (United States)

    Braz, J K F S; Freitas, M L; Magalhães, M S; Oliveira, M F; Costa, M S M O; Resende, N S; Clebis, N K; Silva, N B; Moura, C E B

    2016-08-01

    This study describes the implications of cardiac ventricular microscopy in Chelonia mydas relating to its ability to dive. For this work, 11 specimens of the marine turtle species C. mydas found dead on the coast of Rio Grande do Norte (Northeast Brazil) were used. After necropsy, fragments of the cardiac ventricular wall were fixed in 10% buffered formaldehyde solution for 24 h and then subjected to routine processing for light and scanning electron microscopy (SEM). The ventricle in this species is formed by the epicardium, myocardium and endocardium. The subepicardial layer consists of highly vascularised connective tissue that emits septa to reinforce the myocardium surface. There is an abundant and diffuse subepicardial nerve plexus shown by immunostaining technique. The thickness of the spongy myocardium and the nature of its trabeculae varied between the heart chambers. The endocardium shows no characteristic elements of the heart conduction system. The valves have a hyaline cartilage skeleton, coated by dense irregular connective tissues characterised by elastic fibres. These findings in the green turtle ventricular microscopy are related to hypoxia resistance during diving. PMID:26268418

  15. Migrations of green turtles (Chelonia mydas between nesting and foraging grounds across the Coral Sea.

    Directory of Open Access Journals (Sweden)

    Tyffen C Read

    Full Text Available Marine megafauna tend to migrate vast distances, often crossing national borders and pose a significant challenge to managers. This challenge is particularly acute in the Pacific, which contains numerous small island nations and thousands of kilometers of continental margins. The green sea turtle, Chelonia mydas, is one such megafauna that is endangered in Pacific waters due to the overexploitation of eggs and adults for human consumption. Data from long-term tagging programs in Queensland (Australia and New Caledonia were analysed to investigate the migrations by C. mydas across the Coral Sea between their nesting site and their feeding grounds. A review of data collected over the last 50 years by different projects identified multiple migrations of C. mydas to and from New Caledonia (n = 97 and indicate that turtles foraging in New Caledonia nest in the Great Barrier Reef (Australia and vice versa. Several explanations exist for turtles exhibiting this energetically costly movement pattern from breeding to distant foraging grounds (1200-2680 km away despite viable foraging habitat being available in the local vicinity. These include hatchling drift, oceanic movements and food abundance predictability. Most of the tag recoveries in New Caledonia belonged to females from the south Great Barrier Reef genetic stock. Some females (n = 2 even showed fidelity to foraging sites located 1200 km away from the nesting site located in New Caledonia. This study also reveals previously unknown migrations pathways of turtles within the Coral Sea.

  16. Morbidity in a juvenile green sea turtle (Chelonia mydas) due to ocean-borne plastic.

    Science.gov (United States)

    Stamper, M Andrew; Spicer, Chad W; Neiffer, Donald L; Mathews, Kristin S; Fleming, Gregory J

    2009-03-01

    An emaciated 2.36-kg juvenile green sea turtle, Chelonia mydas, was found floating off of Melbourne Beach, Florida, USA (28 degrees 2'4"N, 80 degrees 32'32"W). The turtle exhibited signs of cachexia, positive buoyancy, lethargy, and obstipation; was covered with barnacles; and was anorexic at the time of presentation. Dorsal-ventral radiographs with positive contrast confirmed obstruction of the gastrointestinal tract. Serum chemistry abnormalities reflected metabolic/nutritional deficiencies. Gastrointestinal prokinetics and oral/enema mineral oil applications were effective in relieving gastrointestinal obstruction with the turtle defecating a total of 74 foreign objects over a period of a month. After the removal of the foreign material, the turtle quickly regained normal behavior and health. The lack of blood parameters demonstrating infection or inflammation; the failure to respond to antibiotic and antifungal treatment as well as the parallel improvement in behavior and health after incremental evacuation of the plastic is highly suggestive of a cause and effect association.

  17. Green turtle (Chelonia mydas) genetic diversity at Paranaguá Estuarine Complex feeding grounds in Brazil.

    Science.gov (United States)

    Jordão, Juliana Costa; Bondioli, Ana Cristina Vigliar; Guebert, Flavia Maria; de Thoisy, Benoit; Toledo, Lurdes Foresti de Almeida

    2015-01-01

    Sea turtles are marine reptiles that undertake long migrations through their life, with limited information regarding juvenile stages. Feeding grounds (FGs), where they spend most of their lives, are composed by individuals from different natal origins, known as mixed stock populations. The aim of this study was to assess genetic composition, natal origins and demographic history of juvenile green turtles (Chelonia mydas) at the Paranaguá Estuarine Complex (PEC), Brazil, considered a Natural World Heritage site. Tissue samples of stranded animals were collected (n = 60), and 700 bp mitochondrial DNA sequences were generated and compared to shorter sequences from previously published studies. Global exact tests of differentiation revealed significant differences among PEC and the other FGs, except those at the South Atlantic Ocean. Green turtles at PEC present genetic signatures similar to those of nesting females from Ascension Island, Guinea Bissau and Aves Island/Surinam. Population expansion was evidenced to have occurred 20-25 kYA, reinforcing the hypothesis of recovery from Southern Atlantic refugia after the last Glacial Maximum. These results contribute to a better understanding of the dynamics of green turtle populations at a protected area by providing knowledge on the dispersion patterns and reinforcing the importance of the interconnectivity between nesting and foraging populations. PMID:26500439

  18. Structure and Function of the Gastrointestinal Tract of the Green Turtle (Chelonia mydas) Hatchling

    Institute of Scientific and Technical Information of China (English)

    Hualing CHEN; Mingbin YE; Yuyan LU; Jinxia DUAN; Pipeng LI; Hexiang GU

    2015-01-01

    The gastrointestinal tracts of four Chelonia mydas hatchlings were examined at the anatomical, histological and ultrastructural level. Our results show that the gastrointestinal tract (GI) is composed by esophagus, stomach, small intestine (SI) and large intestine (LI), and histologically of mucosa, submucosa, muscularis externa (ME) and serosa. The esophagus is marked by conical papillae lined by keratinized stratified squamous epithelium, whereas the remaining GI by simple columnar epithelium; esophageal diverticulum is absent. The stomach covered with mucous granule cells, contains cardia, fundic regions and pylorus, which are separately characterized by cardiac glands, fundic glands and pyloric glands, and have the thickest submucosa and ME of the GI. The ME of the esophagus mainly consist of one layer of circular smooth muscle whereas the rest of GI of two layers, inner circular muscle and outer longitudinal muscle. The SI is slightly longer than the LI and the GI is approximately 5.11 times of the carapace length. The SI is lined with longitudinal zigzag folds and characterized by absorptive cells with longer and denser microvilli, whereas the LI by transversal folds, goblet cells and lymphoid nodules. Only intestinal glands appear in duodenum. Endocrine cells are observed in all sections of the GI and accounted for the largest proportion in duodenum. The results demonstrate a perfect combination of the structure and function of the GI and reveal that the digestion and absorption primarily occurs in the foregut. C. mydas hatchling may prefer carnivorous diet.

  19. Exertional Myopathy in a Juvenile Green Sea Turtle (Chelonia mydas Entangled in a Large Mesh Gillnet

    Directory of Open Access Journals (Sweden)

    Brianne E. Phillips

    2015-01-01

    Full Text Available A juvenile female green sea turtle (Chelonia mydas was found entangled in a large mesh gillnet in Pamlico Sound, NC, and was weak upon presentation for treatment. Blood gas analysis revealed severe metabolic acidosis and hyperlactatemia. Plasma biochemistry analysis showed elevated aspartate aminotransferase and creatine kinase, marked hypercalcemia, hyperphosphatemia, and hyperkalemia. Death occurred within 24 hours of presentation despite treatment with intravenous and subcutaneous fluids and sodium bicarbonate. Necropsy revealed multifocal to diffuse pallor of the superficial and deep pectoral muscles. Mild, multifocal, and acute myofiber necrosis was identified by histopathological examination. While histological changes in the examined muscle were modest, the acid-base, mineral, and electrolyte abnormalities were sufficiently severe to contribute to this animal’s mortality. Exertional myopathy in reptiles has not been well characterized. Sea turtle mortality resulting from forced submergence has been attributed to blood gas derangements and seawater aspiration; however, exertional myopathy may also be an important contributing factor. If possible, sea turtles subjected to incidental capture and entanglement that exhibit weakness or dull mentation should be clinically evaluated prior to release to minimize the risk of delayed mortality. Treatment with appropriate fluid therapy and supportive care may mitigate the effects of exertional myopathy in some cases.

  20. Evidence for retrovirus infections in green turtles Chelonia mydas from the Hawaiian islands

    Science.gov (United States)

    Casey, R.N.; Quackenbush, S.L.; Work, T.M.; Balazs, G.H.; Bowser, P.R.; Casey, J.W.

    1997-01-01

    Apparently normal Hawaiian green turtles Chelonia mydas and those displaying fibropapillomas were analyzed for infection by retroviruses. Strikingly, all samples were positive for polymerase enhanced reverse transcriptase (PERT) with levels high enough to quantitate by the conventional reverse transcriptase (RT) assay. However, samples of skin, even from asymptomatic turtles, were RT positive, although the levels of enzyme activity in healthy turtles hatched and raised in captivity were much lower than those observed in asymptomatic free-ranging turtles. Turtles with fibropapillomas displayed a broad range of reverse transcriptase activity. Skin and eye fibropapillomas and a heart tumor were further analyzed and shown to have reverse transcriptase activity that banded in a sucrose gradient at 1.17 g ml-1. The reverse transcriptase activity purified from the heart tumor displayed a temperature optimum of 37??C and showed a preference for Mn2+ over Mg2+. Sucrose gradient fractions of this sample displaying elevated reverse transcriptase activity contained primarily retrovitalsized particles with prominent envelope spikes, when negatively stained and examined by electron microscopy. Sodium dodecylsulfate-polyacrylamide gel electrophoresis (SDS-PAGE) analysis of gradient-purified virions revealed a conserved profile among 4 independent tumors and showed 7 prominent proteins having molecular weights of 116, 83, 51, 43, 40, 20 and 14 kDa. The data suggest that retroviral infections are widespread in Hawaiian green turtles and a comprehensive investigation is warranted to address the possibility that these agents cause green turtle fibropapillomatosis (GTFP).

  1. Relating fibropapilloma tumor severity to blood parameters in green turtles Chelonia mydas.

    Science.gov (United States)

    Hirama, Shigetomo; Ehrhart, Llewellyn M; Rea, Lorrie D; Kiltie, Richard A

    2014-08-21

    Fibropapillomatosis is a neoplastic disease that is commonly found in the green turtles Chelonia mydas in tropical and subtropical regions of the world. In the current project, juvenile green turtles were captured with large-mesh tangle nets in the Indian River Lagoon and on nearshore reefs of Indian River County, Florida, USA, in 1998 and 1999. The purpose of the study was to determine the relationship between the severity of the disease and the general health of green turtles as indicated by blood parameters. All turtles were measured and examined, and the overall severity of the disease was rated by the size, number, and location of external fibropapilloma tumors. Hematocrit, total protein, and hemoglobin concentration were measured and compared with tumor scores (tumor severity appraisal). As the tumor score increased, the blood parameters of turtles decreased; for instance, the percentage of decrease in hematocrit for mildly afflicted, moderately afflicted, and severely afflicted groups were 2.6, 18.3, and 45.5%, respectively. Severely afflicted turtles suffered from anemia, while individuals with mild affliction did not.

  2. Establishment and characterization of 13 cell lines from a green turtle (Chelonia mydas) with fibropapillomas

    Science.gov (United States)

    Lu, Y.; Nerurkar, V.R.; Aguirre, A.A.; Work, T.M.; Balazs, G.H.; Yanagihara, R.

    1999-01-01

    Thirteen cell lines were established and characterized from brain, kidney, lung, spleen, heart, liver, gall bladder, urinary bladder, pancreas, testis, skin, and periorbital and tumor tissues of an immature male green turtle (Chelonia mydas) with fibropapillomas. Cell lines were optimally maintained at 30A? C in RPMI 1640 medium supplemented with 10% fetal bovine serum. Propagation of the turtle cell lines was serum dependent, and plating efficiencies ranged from 13 to 37%. The cell lines, which have been subcultivated more than 20 times, had a doubling time of approximately 30 to 36 h. When tested for their sensitivity to several fish viruses, most of the cell lines were susceptible to a rhabdovirus, spring viremia carp virus, but refractory to channel catfish virus (a herpesvirus), infectious pancreatic necrosis virus (a birnavirus), and two other fish rhabdoviruses, infectious hematopoietic necrosis virus and viral hemorrhagic septicemia virus. During in vitro subcultivation, tumor-like cell aggregates appeared in cell lines derived from lungs, testis, and periorbital and tumor tissues, and small, naked intranuclear virus particles were detected by thin-section electron microscopy. These cell lines are currently being used in attempts to isolate the putative etiologic virus of green turtle fibropapilloma.

  3. GEMBus as a service oriented platform for cloud-based composable services

    NARCIS (Netherlands)

    M. Grammatikou; C. Marinos; Y. Demchenko; D.R. Lopez; K. Dombek; J. Jofre

    2011-01-01

    Cloud computing has become a common technology for provisioning infrastructure services on-demand. Modern Cloud platforms can provide cloud-based applications, software, deployment platforms, or general infrastructure services that may include both computational and storage resources. However existi

  4. NeuronDepot: Keeping your colleagues in sync by combining modern cloud storage services, the local file system, and simple web applications

    Directory of Open Access Journals (Sweden)

    Philipp L Rautenberg

    2014-06-01

    Full Text Available Neuroscience today deals with a data deluge derived from the availability of high-throughput sensors of brain structure and brain activity, and increased computational resources for detailed simulations with complex output. We report here (1 a novel approach to data sharing between collaborating scientists that brings together file system tools and cloud technologies, (2 a service implementing this approach, called NeuronDepot, and (3 an example application of the service to a complex use case in the neurosciences. The main drivers for our approach are to facilitate collaborations with a transparent, automated data flow that shields scientists from having to learn new tools or data structuring paradigms. Using NeuronDepot is simple: one-time data assignment from the originator and cloud based syncing – thus making experimental and modeling data available across the collaboration with minimum overhead. Since data sharing is cloud based, our approach opens up the possibility of using new software developments and hardware scalabitliy which are associated with elastic cloud computing. We provide an implementation that relies on existing synchronization services and is usable from all devices via a reactive web interface. We are motivating our solution by solving the practical problems of the GinJang project, a collaboration of three universities across eight time zones with a complex workflow encompassing data from electrophysiological recordings, imaging, morphological reconstructions, and simulations.

  5. Research on the Quality Evaluation Model of Personal Cloud Storage Service Based on American Consumer Satisfaction Index Model%基于ACSI模型的个人云存储服务质量评价模型研究

    Institute of Scientific and Technical Information of China (English)

    占南; 谢笑; 王文韬

    2014-01-01

    With the wide application of Internet and the popularity of mobile devices, the synchronization, integration, backup and sha-ring of personal information stored in different terminals or social network environment become the focus of the public. How to improve the service quality of personal cloud storage and user's satisfaction and meet user's demand is an urgent problem to be solved. This paper main-ly discusses the main factors that influence user's satisfaction of personal cloud storage, constructs the concept model of user's satisfaction based on the American Customer Satisfaction Index theory, collects user's data through questionnaire survey, and processes the data using the structural equation model and related software, which provides guidance and reference to optimize and improve personal cloud storage service.%随着互联网的广泛应用和移动终端设备的普及,存储在不同终端或社会网络环境中的个人信息如何同步、整合、备份和共享等问题成为人们关注的焦点。如何提升个人云存储服务质量,提高用户满意度,从而更好地满足用户需求是亟待解决的问题。主要是探讨影响个人云存储服务用户满意度的主要因素,以美国顾客满意度指数为理论基础构建个人云存储用户满意度概念模型,通过问卷调查法收集用户数据,利用结构方程模型和相关软件对数据进行分析和处理,为优化和提升个人云存储服务提供指导和借鉴。

  6. Exploiting Virtualization and Cloud Computing in ATLAS

    Science.gov (United States)

    Harald Barreiro Megino, Fernando; Benjamin, Doug; De, Kaushik; Gable, Ian; Hendrix, Val; Panitkin, Sergey; Paterson, Michael; De Silva, Asoka; van der Ster, Daniel; Taylor, Ryan; Vitillo, Roberto A.; Walker, Rod

    2012-12-01

    The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R&D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.

  7. Exploiting Virtualization and Cloud Computing in ATLAS

    International Nuclear Information System (INIS)

    The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R and D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.

  8. Using cloud computing infrastructure with CloudBioLinux, CloudMan, and Galaxy.

    Science.gov (United States)

    Afgan, Enis; Chapman, Brad; Jadan, Margita; Franke, Vedran; Taylor, James

    2012-06-01

    Cloud computing has revolutionized availability and access to computing and storage resources, making it possible to provision a large computational infrastructure with only a few clicks in a Web browser. However, those resources are typically provided in the form of low-level infrastructure components that need to be procured and configured before use. In this unit, we demonstrate how to utilize cloud computing resources to perform open-ended bioinformatic analyses, with fully automated management of the underlying cloud infrastructure. By combining three projects, CloudBioLinux, CloudMan, and Galaxy, into a cohesive unit, we have enabled researchers to gain access to more than 100 preconfigured bioinformatics tools and gigabytes of reference genomes on top of the flexible cloud computing infrastructure. The protocol demonstrates how to set up the available infrastructure and how to use the tools via a graphical desktop interface, a parallel command-line interface, and the Web-based Galaxy interface.

  9. Cloud Governance

    DEFF Research Database (Denmark)

    Berthing, Hans Henrik

    Denne præsentation beskriver fordele og værdier ved anvendelse af Cloud Computing. Endvidere inddrager resultater fra en række internationale analyser fra ISACA om Cloud Computing.......Denne præsentation beskriver fordele og værdier ved anvendelse af Cloud Computing. Endvidere inddrager resultater fra en række internationale analyser fra ISACA om Cloud Computing....

  10. SaaS与云存储构建区域图书馆共享域的探讨%Discussion of SaaS and Cloud Storage Applied for the Regional Library Share Domain

    Institute of Scientific and Technical Information of China (English)

    朱林

    2014-01-01

    CALIS在2010年云计算的基础上,构架了一个基于联合编目、联合采访、资源共建、统一门户、借阅优先、联合咨询等方面的共享域。文章通过该共享域与区域图书馆中心的契合,在对SaaS与云存储在区域图书馆共享域的服务和建设及其之间的关系进行分析的基础上,提出构建区域图书馆共享域的设想,并对区域图书馆共享域如何应用SaaS与云存储进行探讨,有助于区域图书馆之间的合作与可持续发展。%Each library has its own advantages of collection, but large integrated systems which are used in the library installed locally, if a reader want to do a special study, he only can use local library resources. hTerefore in 2010, CALIS builds a joint cataloging, joint interview, unify resources, borrow priority, of joint advisory and other aspects share domain. hTis paper analyzes the relationship between SaaS, cloud storage, and the service and the construction of regional library shared domain, then propose the application of cloud storage to the regional library shared domain, this will contribute to the cooperation and sustainable development of the regional libraries.

  11. Blood gases, biochemistry, and hematology of Galapagos green turtles (Chelonia mydas.

    Directory of Open Access Journals (Sweden)

    Gregory A Lewbart

    Full Text Available The green turtle, Chelonia mydas, is an endangered marine chelonian with a circum-global distribution. Reference blood parameter intervals have been published for some chelonian species, but baseline hematology, biochemical, and blood gas values are lacking from the Galapagos sea turtles. Analyses were done on blood samples drawn from 28 green turtles captured in two foraging locations on San Cristóbal Island (14 from each site. Of these turtles, 20 were immature and of unknown sex; the other eight were males (five mature, three immature. A portable blood analyzer (iSTAT was used to obtain near immediate field results for pH, lactate, pO2, pCO2, HCO3-, Hct, Hb, Na, K, iCa, and Glu. Parameter values affected by temperature were corrected in two ways: (1 with standard formulas; and (2 with auto-corrections made by the iSTAT. The two methods yielded clinically equivalent results. Standard laboratory hematology techniques were employed for the red and white blood cell counts and the hematocrit determination, which was also compared to the hematocrit values generated by the iSTAT. Of all blood analytes, only lactate concentrations were positively correlated with body size. All other values showed no significant difference between the two sample locations nor were they correlated with body size or internal temperature. For hematocrit count, the iSTAT blood analyzer yielded results indistinguishable from those obtained with high-speed centrifugation. The values reported in this study provide baseline data that may be useful in comparisons among populations and in detecting changes in health status among Galapagos sea turtles. The findings might also be helpful in future efforts to demonstrate associations between specific biochemical parameters and disease.

  12. Compensatory responses to food restriction in juvenile green turtles (Chelonia mydas).

    Science.gov (United States)

    Roark, Alison M; Bjorndal, Karen A; Bolten, Alan B

    2009-09-01

    The purpose of this study was to assess the compensatory responses to food restriction and subsequent increased food availability in juvenile green turtles (Chelonia mydas). Turtles were fed an ad libitum ration for 12 weeks (AL), a restricted ration for 12 weeks (R), or a restricted ration for 5 weeks and an ad libitum ration for 7 weeks (R-AL). Analysis of covariance was used to test the relationships between (1) growth and body size, (2) intake and body size, and (3) growth and intake for each of the three treatment groups. Body composition of turtles in each group was also evaluated at the beginning of the study and after weeks 5 and 12. After the switch to ad libitum feeding, R-AL turtles consumed comparable amounts of food and grew faster than AL turtles on a size-adjusted basis, but mean body sizes did not converge, although the overlap in their size ranges increased with time. The R-AL turtles also converted food to growth more efficiently and allocated proportionally more nutrients to protein accretion, thereby restoring body composition (except mineral content) to AL levels by the end of the study. Thus, accelerated size-specific growth without hyperphagia restored body condition but not size. These results indicate that (1) intake in juvenile green turtles is maximal when food is readily available and cannot be increased to compensate for a previous period of food limitation, (2) growth rates of ad libitum-fed turtles are only mildly plastic in response to past nutritional history, and (3) priority rules for nutrient allocation favor the attainment of an optimal condition rather than an optimal size. Nutritional setbacks experienced during the vulnerable juvenile stage could therefore have long-lasting consequences for wild turtles in terms of size-specific mortality risk, but these risks may be mitigated by the potential benefits of maintaining sufficient body stores.

  13. Population trends and survival of nesting green sea turtles Chelonia mydas on Aves Island, Venezuela

    Science.gov (United States)

    Garcia-Cruz, Marco A.; Lampo, Margarita; Penaloza, Claudia L.; Kendall, William; Solé, Genaro; Rodriguez-Clark, Kathryn M.

    2015-01-01

    Long-term demographic data are valuable for assessing the effect of anthropogenic impacts on endangered species and evaluating recovery programs. Using a 2-state open robust design model, we analyzed mark-recapture data from green turtles Chelonia mydas sighted between 1979 and 2009 on Aves Island, Venezuela, a rookery heavily impacted by human activities before it was declared a wildlife refuge in 1972. Based on the encounter histories of 7689 nesting females, we estimated the abundance, annual survival, and remigration intervals for this population. Female survival varied from 0.14-0.91, with a mean of 0.79, which is low compared to survival of other populations from the Caribbean (mean = 0.84) and Australia (mean = 0.95), even though we partially corrected for tag loss, which is known to negatively bias survival estimates. This supports prior suggestions that Caribbean populations in general, and the Aves Island population in particular, may be more strongly impacted than populations elsewhere. It is likely that nesters from this rookery are extracted while foraging in remote feeding grounds where hunting still occurs. Despite its relatively low survival, the nesting population at Aves Island increased during the past 30 years from approx. 500 to >1000 nesting females in 2009. Thus, this population, like others in the Caribbean and the Atlantic, seems to be slowly recovering following protective management. Although these findings support the importance of long-term conservation programs aimed at protecting nesting grounds, they also highlight the need to extend management actions to foraging grounds where human activities may still impact green turtle populations.

  14. Nesting phenology of marine turtles: insights from a regional comparative analysis on green turtle (Chelonia mydas.

    Directory of Open Access Journals (Sweden)

    Mayeul Dalleau

    Full Text Available Changes in phenology, the timing of seasonal activities, are among the most frequently observed responses to environmental disturbances and in marine species are known to occur in response to climate changes that directly affects ocean temperature, biogeochemical composition and sea level. We examined nesting seasonality data from long-term studies at 8 green turtle (Chelonia mydas rookeries that include 21 specific nesting sites in the South-West Indian Ocean (SWIO. We demonstrated that temperature drives patterns of nesting seasonality at the regional scale. We found a significant correlation between mean annual Sea Surface Temperature (SST and dates of peak nesting with rookeries exposed to higher SST having a delayed nesting peak. This supports the hypothesis that temperature is the main factor determining peak nesting dates. We also demonstrated a spatial synchrony in nesting activity amongst multiple rookeries in the northern part of the SWIO (Aldabra, Glorieuses, Mohéli, Mayotte but not with the eastern and southern rookeries (Europa, Tromelin, differences which could be attributed to females with sharply different adult foraging conditions. However, we did not detect a temporal trend in the nesting peak date over the study period or an inter-annual relation between nesting peak date and SST. The findings of our study provide a better understanding of the processes that drive marine species phenology. The findings will also help to predict their ability to cope with climate change and other environmental perturbations. Despite demonstrating this spatial shift in nesting phenology, no trend in the alteration of nesting dates over more than 20 years was found.

  15. Factors influencing survivorship of rehabilitating green sea turtles (Chelonia mydas) with fibropapillomatosis.

    Science.gov (United States)

    Page-Karjian, Annie; Norton, Terry M; Krimer, Paula; Groner, Maya; Nelson, Steven E; Gottdenker, Nicole L

    2014-09-01

    Marine turtle fibropapillomatosis (FP) is a debilitating, infectious neoplastic disease that has reached epizootic proportions in several tropical and subtropical populations of green turtles (Chelonia mydas). FP represents an important health concern in sea turtle rehabilitation facilities. The objectives of this study were to describe the observed epidemiology, biology, and survival rates of turtles affected by FP (FP+ turtles) in a rehabilitation environment; to evaluate clinical parameters as predictors of survival in affected rehabilitating turtles; and to provide information about case progression scenarios and potential outcomes for FP+ sea turtle patients. A retrospective case series analysis was performed using the medical records of the Georgia Sea Turtle Center (GSTC), Jekyll Island, Georgia, USA, during 2009-2013. Information evaluated included signalment, morphometrics, presenting complaint, time to FP onset, tumor score (0-3), co-morbid conditions, diagnostic test results, therapeutic interventions, and case outcomes. Overall, FP was present in 27/362 (7.5%) of all sea turtles admitted to the GSTC for rehabilitation, either upon admittance or during their rehabilitation. Of these, 25 were green and 2 were Kemp's ridley turtles. Of 10 turtles that had only plaque-like FP lesions, 60% had natural tumor regression, all were released, and they were significantly more likely to survive than those with classic FP (P = 0.02 [0.27-0.75, 95% CI]). Turtles without ocular FP were eight times more likely to survive than those with ocular FP (odds ratio = 8.75, P = 0.032 [1.21-63.43, 95% CI]). Laser-mediated tumor removal surgery is the treatment of choice for FP+ patients at the GSTC; number of surgeries was not significantly related to case outcome.

  16. Cloud optics

    CERN Document Server

    Kokhanovsky, A

    2006-01-01

    Clouds affect the climate of the Earth, and they are an important factor in the weather. Therefore, their radiative properties must be understood in great detail. This book summarizes current knowledge on cloud optical properties, for example their ability to absorb, transmit, and reflect light, which depends on the clouds' geometrical and microphysical characteristics such as sizes of droplets and crystals, their shapes, and structures. In addition, problems related to the image transfer through clouds and cloud remote sensing are addressed in this book in great detail. This book can be an im

  17. 一种基于海量信息处理的云存储模型研究%A Kind of Cloud Storage Model Research Based on Massive Information Processing

    Institute of Scientific and Technical Information of China (English)

    张桂刚; 李超; 张勇; 邢春晓

    2012-01-01

    提出了一种云环境下海量数据组织与资源共享的存储总模型,该模型包括:结构化、半结构化及其非结构化数据与资源的对应存储方法;能兼顾海量大小数据文件处理的分布式文件系统THDFS;云数据库系统设计模型THCloudDB;云环境下强于MapReduce弱于SQL,以Hadoop++为基础的一种针对互联网海量数据文件处理且具有语义计算效能的计算模型THMapReduce;针对THDFS及其THCloudDB的具有语义效能的智能挖掘分析工具THBI;最后以“清华通”为案例分析了该模型平台的具体应用.%This paper presents a kind of cloud storage model based on massive information processing. The model includes: 1)storage methods of structured, semi-structured and unstructured data and the corresponding resources; 2) THDFS (Tsing Hua Distributed File System) which will take into account all size of the massive data files(big files and small files); 3) a cloud database system design model THCloudDB (Tsing Hua Cloud Database); 4) a internet-base massive data processing computation model THMapReduce (Tsing Hua MapReduce) computation model based on hadoopH-h which is stronger than MapReduce and weaker than SQL, especially it have merged into the semantic computing technology; 5)a intelligent mining tool THBI (Tsing Hua Business Intelligent) based on the THDFS and THCloudDB, and it have the semantic functions. Finally, paperend takes "Tsinghua Tong" as a case and make some analysis about the model's applications.

  18. PSO应用于QoS偏好感知的云存储任务调度%Apply PSO into cloud storage task scheduling with QoS preference awareness

    Institute of Scientific and Technical Information of China (English)

    王娟; 李飞; 张路桥

    2014-01-01

    研究有QoS偏好要求的云存储任务调度。首先,分析云存储与云计算的差异,用存在矩阵避免无效解的产生。其次,归纳云存储的QoS需求为时间、代价与质量3大类,并据此修改PSO算法的适应度函数用权重因子调节QoS偏好。实验发现,在不同优先级任务分布不均的情况下,分布广的任务的偏好会掩盖其他任务的偏好,因而不适宜用PSO进行整体性调度,而必须进行分级调度。实验证明,改进后的分级PSO算法对QoS偏好具有较好的感知能力。%The task scheduling algorithm in cloud storage area with QoS preference awareness was studied. Firstly, the differences between cloud storage and cloud computing were pointed, and exist matrix was used to avoid the creation of useless solutions. Secondly, QoS factors were summarized into three classes:time, cost and quality classes. Based on the three classes, the fitness function of the PSO was improved by using weighted factors to adjust the QoS preference. The simulation results release that PSO is not fit for the overall scheduling when the task distributions of different degrees are unevenness because the QoS demand of wide distribution tasks may cover the QoS demand of other tasks. So a hierar-chical scheduling based on degree is necessary. The simulation results show that the improved hierarchical PSO schedul-ing algorithm can aware the QoS preference relevantly.

  19. Direct User Data Authentication in Cloud

    Directory of Open Access Journals (Sweden)

    P. N. karthikayan

    2012-09-01

    Full Text Available Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data storage and maintenance, it also eliminates their physical control of storage dependability and security, which traditionally has been expected by both enterprises and individuals with high service-level requirements. In order to facilitate rapid deployment of cloud data storage service and regain security assurances with outsourced data dependability, efficient methods that enable ondemand data correctness verification on behalf of cloud data owners have to be designed. In this article we propose that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established. With public audit ability, a trusted entity with expertise and capabilities data owners do not possess can be delegated as an external audit party to assess the risk of outsourced data when needed. Such an auditing service not only helps save data owners computation resources but also provides a transparent yet cost-effective method for data owners to gain trust in the cloud. We describe approaches and system requirements that should be brought into consideration, and outline challenges that need to be resolved for such a publicly auditable secure cloud storage service to become a reality.

  20. Cloud ERP and Cloud Accounting Software in Romania

    Directory of Open Access Journals (Sweden)

    Gianina MIHAI

    2015-05-01

    Full Text Available Nowadays, Cloud Computing becomes a more and more fashionable concept in the IT environment. There is no unanimous opinion on the definition of this concept, as it covers several versions of the newly emerged stage in the IT. But in fact, Cloud Computing should not suggest anything else than simplicity. Thus, in short, simple terms, Cloud Computing can be defined as a solution to use external IT resources (servers, storage media, applications and services, via Internet. Cloud computing is nothing more than the promise of an easy accessible technology. If the promise will eventually turn into something certain yet remains to be seen. In our opinion it is too early to make an assertion. In this article, our purpose is to find out what is the Romanian offer of ERP and Accounting software applications in Cloud and / or as services in SaaS version. Thus, we conducted an extensive study whose results we’ll present in the following.

  1. Is cloud computing finally beginning to mature?

    Directory of Open Access Journals (Sweden)

    Dimitrios Zissis

    2012-10-01

    Full Text Available The buzz term that came into popularity in the beginning of 2006 to describe an innovative IT deployment architecture, originated from the cloud metaphor that was used to represent the Internet in various network diagrams as early as the 1990s. In a short period of time after the term appeared, cloud solutions were being rapidly marketed by many IT companies and various new buzz words came into vogue such as "cloud in a can", "cloud bursting", and we suddenly had “blue clouds”, “green clouds”, “white label cloud services” and many others. We witnessed what is now being labeled as "cloud washing", the attempts of many vendors to strap the cloud term onto their traditional products, which became the source of huge disambiguation, conflicts and misunderstandings. Today, the term “cloud computing” is everywhere. A quick search on Google for the term “cloud computing” will return 267 million search results. Cloud computing is being marketed as the complex-free efficient method of accessing huge amounts of computing and storage as a service. Behind the curtains though, cloud computing has often been called a huge leap of faith and concerns were fuelled when reports started to surface of random failures (e.g. power outages and shortcomings of cloud infrastructures. Small black clouds of uncertainty have appeared in the otherwise clear skies of cloud computing

  2. High energy physics and cloud computing

    International Nuclear Information System (INIS)

    High Energy Physics (HEP) has been a strong promoter of computing technology, for example WWW (World Wide Web) and the grid computing. In the new era of cloud computing, HEP has still a strong demand, and major international high energy physics laboratories have launched a number of projects to research on cloud computing technologies and applications. It describes the current developments in cloud computing and its applications in high energy physics. Some ongoing projects in the institutes of high energy physics, Chinese Academy of Sciences, including cloud storage, virtual computing clusters, and BESⅢ elastic cloud, are also described briefly in the paper. (authors)

  3. Securing Data Transfer in Cloud Environment

    Directory of Open Access Journals (Sweden)

    K. S. Wagh

    2014-05-01

    Full Text Available Data security and access control is one of the most challenging ongoing research work in cloud computing, due to users outsourcing their sensitive data to cloud providers. The various existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. Cloud storage moves the user’s data to large data centers, that are remotely located, on which user does not have any control. This unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved.

  4. Information Leakage Prevention In Cloud Computing

    Directory of Open Access Journals (Sweden)

    Raziqa Masood

    2014-11-01

    Full Text Available The cloud computing is still in it infancy.this is an emerging technology which will bring about innovations in terms of businessmodels and applications.the widespread penetration of smartphones will be a major factor in driving the adoption of cloude computing.however, cloud computing faces challenges related to privacy and security. Due to varied degree of security features and management schemes within the cloud entities security in the cloud is challenging. Security issues ranging from system misconfiguration, lack of proper updates, or unwise user behaviour from remote data storage that can expose user ̳s private data and information to unwanted access can plague a Cloud Computing. The intent of this paper is to investigate the security related issues and challenges in Cloud computing environment . We also proposed a security scheme for protecting services keeping in view the issues and challenges faced by cloud computing.

  5. LINUX BASED CLOUD OPERATING SYSTEM

    Directory of Open Access Journals (Sweden)

    Ravindra Gupta

    2012-02-01

    Full Text Available Cloud computing is a type of computing in which dynamically scalable and virtualized resources are provided as a service. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the cloud that supports them. Furthermore, cloud computing employs a model for enabling available, convenient and on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, services that can be rapidly provisioned and released with minimal management effort or service provider interaction. The services mainly operating systems running on a single virtualized computing environment, middleware layers that attempt to combine physical and virtualized resources from multiple operating systems, and specialized application engines. In this paper, we discuss about the virtual distributed operating system, Cloud Operating System, to provide maximum features of cloud computing. The Cloud Operating System will work on the principle laid out by LINUX. The Cloud OS aims to provide simple programming abstractions to available cloud resources, strong isolation techniques between Cloud processes, and strong integration with network resources.

  6. Mobile Cloud Computing and Applications

    Institute of Scientific and Technical Information of China (English)

    Chengzhong Xu

    2011-01-01

    @@ In 2010, cloud computing gained momentum.Cloud computing is a model for real-time, on-demand, pay-for-use network access to a shared pool of configurable computing and storage resources.It has matured from a promising business concept to a working reality in both the private and public IT sectors.The U.S.government, for example, has requested all its agencies to evaluate cloud computing alternatives as part of their budget submissions for new IT investment.

  7. Increasing Security in Cloud Environment

    OpenAIRE

    Naik, Priyanka; Sanyal, Sugata

    2013-01-01

    The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at a very low cost. But with this new system comes the major concern of security, as the connection to the cloud is through the web and the data and application availability need to be handled for each cl...

  8. CLOUD COMPUTING DAN DAMPAKNYA TERHADAP BISNIS

    Directory of Open Access Journals (Sweden)

    James Tandy

    2013-11-01

    technology information system works at an company. Security and data storage systems have become important factors for the company.Cloud Computing technology provides a great advantage for most enterprises.

  9. Antarctic clouds

    OpenAIRE

    Lachlan-Cope, Tom

    2010-01-01

    Sensitivity studies with global climate models show that, by their influence on the radiation balance, Antarctic clouds play a major role in the climate system, both directly at high southern latitudes and indirectly globally, as the local circulation changes lead to global teleconnections. Unfortunately, observations of cloud distribution in the Antarctic are limited and often of low quality because of the practical difficulty in observing clouds in the harsh Antarctic environment. The best ...

  10. Cloud Computing

    CERN Document Server

    Antonopoulos, Nick

    2010-01-01

    Cloud computing has recently emerged as a subject of substantial industrial and academic interest, though its meaning and scope is hotly debated. For some researchers, clouds are a natural evolution towards the full commercialisation of grid systems, while others dismiss the term as a mere re-branding of existing pay-per-use technologies. From either perspective, 'cloud' is now the label of choice for accountable pay-per-use access to third party applications and computational resources on a massive scale. Clouds support patterns of less predictable resource use for applications and services a

  11. Cloud Computing

    OpenAIRE

    Mirashe, Shivaji P.; Kalyankar, N. V.

    2010-01-01

    Computing as you know it is about to change, your applications and documents are going to move from the desktop into the cloud. I'm talking about cloud computing, where applications and files are hosted on a "cloud" consisting of thousands of computers and servers, all linked together and accessible via the Internet. With cloud computing, everything you do is now web based instead of being desktop based. You can access all your programs and documents from any computer that's connected to the ...

  12. Aspectos de comportamento alimentar e dieta da tartaruga marinha, Chelonia mydas no litoral norte paulista Some aspects on feeding behaviour of the green turtle, Chelonia mydas, in the northern littoral of State of São Paulo

    Directory of Open Access Journals (Sweden)

    Ivan Sazima

    1983-01-01

    Full Text Available Feeding behavior of immature green turtles, Chelonia mydas, has been observed on rocky shores along the northern part of State of São Paulo, southeastern Brazil. This turtle forages on underwater ledges, at depths of 1 to 3 m and grazes on benthic algae. The turtle seems to visually scan the algae during feeding and moves slowly, walking from one patch of vegetation to another. Gut contents of four individuals (331-452 mmCCL consisted mainly of red and brown algae. Comparisons between gut contents and algae growing at the grazing sites, together with scanning behavior suggest selective feeding. Syntopic large herbivorous fishes of the genera Kyphosus, Sparisma, and Acanthurus showed little feeding overlap with the green turtle.

  13. Securing Mobile Cloud Using Finger Print Authentication

    OpenAIRE

    IehabALRassan; HananAlShaher

    2013-01-01

    Mobile cloud computing becomes part of mobile usersdaily life transactions. Mobile devices with Internetcapabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobiledevices, these devices can't install and run applications require heavy CPU processing or extensivememory. Cloud computing allows mobile users to synchronize their data with remote storage and utilizeapplications require heavy CPU processing or extensive memory such as Microsoft Office or ...

  14. 基于NoSQL的海量空间数据云存储与服务方法%Massive Geo-spatial Data Cloud Storage and Services Based on NoSQL Database Technique

    Institute of Scientific and Technical Information of China (English)

    陈崇成; 林剑峰; 吴小竹; 巫建伟; 连惠群

    2013-01-01

    近年来,实现海量空间数据高效地存储管理和在线服务,成为地学信息科学领域日益关注的热点问题。本文根据矢量和栅格空间数据的不同特点,提出并实现了矢量栅格数据一体化的海量空间数据分布式云存储管理与访问服务方案,在海量矢量数据存储和处理中创新性引入分布式图数据库Neo4J和并行图计算框架。在三层式空间数据云存储架构基础上,给出NoSQL数据库技术的栅格和矢量数据云存储的实现策略与方法,并开展了通用数据访问接口的设计。采用分布式文件系统 HDFS 存储栅格数据,并使用列族数据库 HBase 对其建立分布式空间索引,及采用满足ACID约束的分布式图数据库Neo4J来存储矢量数据,并使用R树建立空间索引。在自主研发的地理知识云平台GeoKSCloud框架下,初步实现了核心组件-空间数据聚合中心(GeoDAC)软件,可为各类用户提供空间数据分布式存储管理和访问服务。通过搭建试验床,开展GeoDAC与开源GIS软件PostGIS在矢量数据读写访问性能方面的对比测试。结果表明,虽然GeoDAC没有获得写入性能的加速作用,但其具有PostGIS无法比拟的强大读取性能。GeoDAC将海量数据经过空间分割后分布在集群上,能够并行处理查询请求,极大地提高空间查询速度,具有广阔的应用前景。%In recent years, how to implement a efficient storage management on massive geo-spatial data and ul-teriorly web service for a broad variety of users, has becomes an increasingly hot issue in the field of geographi-cal information science, with the explosive growth of Earth Observation System(EOS) data and the flourish of the new geography paradigm. A cloud storage system to provide distributed cloud-enabled storage management and services for massive geo-spatial data with an integrity of both vector and raster formats is proposed in this paper in

  15. Sector and Sphere: the design and implementation of a high-performance data cloud

    OpenAIRE

    Gu, Yunhong; Grossman, Robert L.

    2009-01-01

    Cloud computing has demonstrated that processing very large datasets over commodity clusters can be done simply, given the right programming model and infrastructure. In this paper, we describe the design and implementation of the Sector storage cloud and the Sphere compute cloud. By contrast with the existing storage and compute clouds, Sector can manage data not only within a data centre, but also across geographically distributed data centres. Similarly, the Sphere compute cloud supports u...

  16. Cloud Computing for Technical and Online Organizations

    Directory of Open Access Journals (Sweden)

    Hagos Tesfahun Gebremichael

    2016-07-01

    Full Text Available Cloud computing is a new computing model which is based on the grid computing, distributed computing, parallel computing and virtualization technologies define the shape of a new technology.It is the core technology of the next generation of network computing platform, especially in the field of education and online.Cloud computing as an exciting development in an educational Institute and online perspective.Cloud computing services are growing necessity for business organizations as well as for technical educational institutions.Students and administrative personnel have the opportunity to quickly and economically access various application platforms and resources through the web pages on-demand.Application of storage technology can significantly reduce the amount of cloud storage servers, thereby reducing system development costs, reduce the system caused by the server a single point of failure. Cloud storage services meet this demand by providing transparent and reliable storage solutions.In this paper shows that the cloud computing plays an important role in the fields of Technical Educational Institutions and Online.The research study shows that the cloud platform is valued for both students and instructors to achieve the course objective and the nature, benefits and cloud computing services, as a platform for Educational environment and online.

  17. An Access Control Policy for Multi-tenancy Cloud Storage Platform%一种面向多租户云存储平台的访问控制策略

    Institute of Scientific and Technical Information of China (English)

    沈晴霓; 杨雅辉; 禹熹; 张力哲; 陈钟

    2011-01-01

    云存储平台是多租户共享环境,能否实现其中不同租户数据之间的有效安全隔离成为了用户最为关心的问题.以RBAC(Role Based Access Control)策略为基础,结合组织标签和多种安全属性的逻辑组合,提出一种灵活的访问控制策略,它一方面保证云端不同企业之间数据的强隔离性,使某企业用户无法越权访问其他企业的用户数据;另一方面保证云存储企业内部数据的适度隔离,即可以根据公司自身的安全需求灵活定制企业内部策略.同时,引入虚拟组织的概念实现企业之间可能的数据共享;引入利益冲突的概念限制竞争企业之间的共享.给出了该策略在基于HDFS (Hadoop Distributed File System)的云存储架构中的原型实现.实验结果表明,该策略能够有效保障云存储平台多租户数据之间的恰当安全隔离.%Cloud Storage is a multi-tenancy shared environment, so achieving data separation between different users effectively in the platform has become one of issues most concerned by users. In this paper, we provide business users a flexible access control policy, which is built on top of RBAC (Role-based Access Control), combined with organization label and a variety of security attributes with logical combinations. First of all, it provides strict inter-enterprise data isolation on cloud storage, ensuring that business users could not access data which doesn't belong to their organization. Moreover, it provides proper separation of organization internal data. Business users could customize the policy flexibly according to their own security requirements, isolating data from different sectors or geographical area. Finally, the policy provides a mechanism for corporations to share data on cloud storage by introducing the concept of " virtual organization" , and guarantee companies with the same conflict set of interest could not be allowed to share data through traditional Chinese Wall Policy

  18. Selected heavy metals and selenium in the blood of black sea turtle (Chelonia mydas agasiizzi) from Sonora, Mexico.

    Science.gov (United States)

    Ley-Quiñónez, C P; Zavala-Norzagaray, A A; Réndon-Maldonado, J G; Espinosa-Carreón, T L; Canizales-Román, A; Escobedo-Urías, D C; Leal-Acosta, M L; Hart, C E; Aguirre, A A

    2013-12-01

    The concentration of heavy metals (Zn, Cd, Ni, Cu, Mn) and selenium (Se) was analyzed in blood collected from 12 black turtles (Chelonia mydas agasiizzi) captured in Canal del Infiernillo, Punta Chueca, Mexico. The most abundant metals were Zn (63.58 μg g(-1)) and Se (7.66 μg g(-1)), and Cd was the lower (0.99 μg g(-1)). The sequential concentrations of trace metals were Zn > Se > Cu > Mn > Ni > Cd. In conclusion, this information is important as a baseline when using blood as tissue analysis of heavy metals; however, these levels could represent recent exposure in foraging grounds of black turtles in the Sea of Cortez.

  19. Research on key technologies of distributed data storage in cloud computing environment%云计算环境中分布式数据存储关键技术研究

    Institute of Scientific and Technical Information of China (English)

    向春枝; 范颖

    2016-01-01

    鉴于云计算存在庞大的节点规模和数据规模,云计算系统在可扩展性、高可用性等方面面临着诸多问题。针对云计算环境下的分布数据存储,构建了一种基于递归的正N边形网络模型,在数据中心网络结构的基础上给出了数据管理模型,并设计了以提高数据可用性、负载平衡为目的的副本分布策略和副本选择策略。在保证数据可用性的前提下,提出一种基于覆盖集的数据迁移算法,利用节点选择策略尽量减少迁移成本,进行数据迁移让更多的机器休眠,降低能耗。通过对实验数据进行比较分析,验证了提出的网络拓扑结构、数据管理模型、数据迁移技术的正确性和有效性。%The cloud computing system is faced with many problems in the aspects of scalability and high availability due to the enormous node scale and data scale of cloud computing. For the distributed data storage in cloud computing environment, an regular N⁃equilateral polygon(RNEP)network model based on recursion was constructed. The data management model is given on the basis of data center network structure. The transcript distribution strategy and selection strategy were designed to improve the data availability and load balancing ability. A data migration algorithm based on covering set is proposed on the premise of ensuring the data availability,in which the node selection strategy is used to minimize the migration cost and conduct data mi⁃gration to rest more machines and reduce energy consumption. The experimental data is compared and analyzed,which proves that the proposed network topology,data management model and data migration technology are valid and effective.

  20. Cloud Cover

    Science.gov (United States)

    Schaffhauser, Dian

    2012-01-01

    This article features a major statewide initiative in North Carolina that is showing how a consortium model can minimize risks for districts and help them exploit the advantages of cloud computing. Edgecombe County Public Schools in Tarboro, North Carolina, intends to exploit a major cloud initiative being refined in the state and involving every…

  1. Cloud Control

    Science.gov (United States)

    Ramaswami, Rama; Raths, David; Schaffhauser, Dian; Skelly, Jennifer

    2011-01-01

    For many IT shops, the cloud offers an opportunity not only to improve operations but also to align themselves more closely with their schools' strategic goals. The cloud is not a plug-and-play proposition, however--it is a complex, evolving landscape that demands one's full attention. Security, privacy, contracts, and contingency planning are all…

  2. Analysis on Issues with Related to the Terms of Service Regarding Web Disk under Cloud Storage Surroundings%云存储环境下网络存储服务条款问题分析

    Institute of Scientific and Technical Information of China (English)

    韩元牧; 吴莉娟

    2013-01-01

    网络技术以及SaaS 行业的发展给网络存储模式注入了新的力量,网盘公司雨后春笋般地发展速度表明云存储大大促进了网盘服务的发展。不过,在行业发展的同时,法律服务也应当与时俱进,成为行业发展的有力保障,否则,混乱的市场竞争环境下,一方面是抢夺客户的需求,一方面是用户无奈地抉择,这将严重阻碍行业的进步。无论对服务提供者而言,还是普通用户而言,合法、清洁、安全、稳定的环境是行业能够稳定发展的基础,法律服务的保障也应当成为行业发展的开路先锋。本文通过对国内外多家网盘服务公司服务条款的汇总、分析、整理,针对“用户上传内容的归属问题以及服务商使用内容的约定”、“关于著作权条款的约定的设置”、“网盘服是否务应当负有高于避风港原则的注意义务”、“云存储下的信息安全问题”的探讨,试图为云存储的服务条款设置提供一定的总结和建议,希望能够为云存储行业积极健康的发展提供一些法律方面的帮助。%The development of internet technology and the industry of Saas have brought new energy to the mode of web storage .The rapid development of va-rious web disk companies has demonstrated that the web disk service has been greatly promoted by the cloud storage .However , it is well worth noting that while the industry is developing greatly , the relevant law issues should also be taken in to account , providing legal guarantee to the industry .Otherwise , under a chaotic market competition environment , both the requirement of struggling for users and the choice without alternation will at last severely hinder the progress of the indus -try.A legitimate, clean, safe and stable environment is the preliminary base for the sustainable development of the industry both from the aspect of the service pro -viders and the aspect of the common

  3. Design of Cloud Storage about Enterprise Human Resources Information Platform based on NoSQL%基于NoSQL的企业人力资源信息云平台存储方案设计

    Institute of Scientific and Technical Information of China (English)

    姚远

    2014-01-01

    全球信息化时代的来临,带动了社交网络与电子商务的快速发展,使企业逐渐进入全球化市场,而人力资源管理已经成为制约企业发展的瓶颈问题。本文分析了企业在招聘人才时所遇到的困难,建议企业建立自己的人才资源数据库,重点分析了云平台的存储海量数据问题,以非关系型数据库HBase配合开源的分布式框架Hadoop来存储管理企业搜集的海量的各种类型的人才信息数据,适应每天剧增的数据资源。%With theglobal information age coming,enterprises gradually join into the global market driven by the rapid development of social networking and e-commerce,while human resources management has become the bottleneck problem restricting the development of enterprises.This paper analyzes difficulties enterprises encountered in the recruitment of personnel,it advise to establish a database resource proposals of their own enterprises,focuses on the analysis of the mass data storage problem of cloud platform,personnel information data of various types of storage management enterprise search to non relational database HBase with Hadoop distributed framework of open source mass to meet everyday data resource.

  4. A Distributed Mass Data Storage Strategy Based on Cloud Computing%一种基于云计算的海量数据分布式存储策略

    Institute of Scientific and Technical Information of China (English)

    左晓静; 王荣

    2015-01-01

    基于云计算的存储系统,大都采用分布式存储。为了保证数据的完整性和一致性,增强数据的可靠性和可用性。通过划分服务区域、各服务区域内实行多层服务器集群的策略使用户无论何时、何地以何种方式都能高效、正确、完整地访问到所需数据。并根据数据需求量解决了数据副本数量的问题。与GFS分布式文件系统相比较,该策略思路清晰、实现简单。经仿真实验测试在数据访问、更新、删除及数据多版本方面有明显优点。%This specification is set for the theses to be published in Computer Applications and Software, including fonts,margins,page size and print area. Storage system based on cloud computing,mostly adopts the distributed storage. In order to ensure the integrity and consistency of data,enhance the reliability and availability of the data. By dividing the service area,service area to implement multi tier server cluster strategy users regardless of when,where and in what way can be efficient,correct and complete access to data. According to the data demand to solve the data copy number problem. Compared with the GFS distributed file system,the strategy of clear thinking, simple realization. There are obvious advantages in the simulation experiment test of data access ,update,delete and multi version data.

  5. Secure Architectures in the Cloud

    NARCIS (Netherlands)

    De Capitani di Vimercati, Sabrina; Pieters, Wolter; Probst, Christian W.

    2011-01-01

    This report documents the outcomes of Dagstuhl Seminar 11492 “Secure Architectures in the Cloud”. In cloud computing, data storage and processing are offered as services, and data are managed by external providers that reside outside the control of the data owner. The use of such services reduces th

  6. Analysis of epibiont data in relation with the Debilitated Turtle Syndrome of sea turtles in Chelonia mydas and Lepidochelys olivacea from Concepción coast, Chile

    OpenAIRE

    Italo Fernández; Marco Antonio Retamal; Miguel Mansilla; Francisco Yáñez; Víctor Campos; Carlos Smith; Guillermo Puentes; Ariel Valenzuela; Hernán González

    2015-01-01

    Epibionts on the surface of the skin and shell of a specimen of Chelonia mydas and three Lepidochelys olivacea found floating on the coast of Concepción, Chile, between June 2010 and December 2012, were analyzed. These epibionts were analyzed during the clinical inspection and the tissue changes related to its settlement, with filamentous algae around, were observed. Subsequently, the epibionts were identified by morphological observation. The knowledge about theses epibionts in Chile is revi...

  7. 一种基于分布式开放资源管理服务的“云存储”(ppStore)方案研究%STUDY ON CLOUD STORAGE SCHEME BASED ON DISTRIBUTED OPEN SOURCE MANAGEMENT SERVICE (ppStore)

    Institute of Scientific and Technical Information of China (English)

    李建国; 袁平鹏

    2011-01-01

    云存储技术因其能为用户提供安全、海量、随时随地的数据存储功能而得以快速发展.提出利用网络上现存的自然分布于世界各地的大量免费存储服务,如网盘、ftp、email以及其他形式等存储空间,将这些服务集中起来,为用户提供价廉、可靠的存储系统.介绍一种低开销、快速度、高可用、可扩展的云存储拓扑系统,以期在该拓扑架构下买现以文件存储和共享服务为基础,不断扩展其他功能,最终形成一个分布式存储资源共享社区的目的.%Cloud storage technology, due to its secure, mass data convenient data storage, function that is provided to customers, has got very rapid development. The thesis suggests to take advantage of the great number of free storage services that are naturally allocated over the network around the world at present, for example, netdisk, ftp, email as well as storage spaces in other forms, then aggregate all of them to provide customers with cheap and reliable storage systems. The thesis introduces a low cost, high speed, high available and expandable cloud storage topological system, so that the purpose can be realized, under such a topological architecture, based on file storage and sharing service, to continuously explore other functions and finally form a distributed storage resources sharing community.

  8. Big Data Services Security and Security challenges in cloud environment

    OpenAIRE

    Alsufyani, Raed; Jama, Khursand; Yao, Yulin; Ramachandran, Muthu; Chang, Victor

    2016-01-01

    This paper explores security issues of storage in the cloud and the methodologies that can be used to improve the security level. This study is concluded with a discussion of current problems and the future direction of cloud computing. Big data analysis can also be classified into memory level analysis, business intelligence (BI) level analysis, and massive level analysis. This research paper is based on cloud computing security and data storage issues that organizations face when they uploa...

  9. Cloud Computing

    CERN Document Server

    Baun, Christian; Nimis, Jens; Tai, Stefan

    2011-01-01

    Cloud computing is a buzz-word in today's information technology (IT) that nobody can escape. But what is really behind it? There are many interpretations of this term, but no standardized or even uniform definition. Instead, as a result of the multi-faceted viewpoints and the diverse interests expressed by the various stakeholders, cloud computing is perceived as a rather fuzzy concept. With this book, the authors deliver an overview of cloud computing architecture, services, and applications. Their aim is to bring readers up to date on this technology and thus to provide a common basis for d

  10. Cloud migration

    CERN Document Server

    Höllwarth, Tobias

    2012-01-01

    This book is designed for managers and entrepreneurs, who are considering improving the economics and flexibility of their IT solutions and infrastructures. The book is also for readers who wish to learn more about the Cloud, but do not want to become specialists.This book discusses the technical, legal, fiscal, economic, organisational and environmental aspects of Cloud services. If you are looking for practical advice on vendor selection and certification, as well as real world Cloud project case studies, this is the book to consult.It is the result of a highly cooper

  11. Electron Cloud: an Analytic View

    CERN Document Server

    Vos, L

    1998-01-01

    Electron cloud activity has been observed in some positron storage rings but not in others. It is a major concern for the LHC. In this paper the electron cloud problematics is treated purely analytica lly. The equilibrium electron cloud density is derived from the standard photon production rate, taking into account the photo-electric yield and the process of secondary emission. A fundamental ingre dient in the derivation is the Kollath{2] energy spectrum of the secondary emission. The phenomenon of space charge is discussed as well. The transverse acceleration of the electrons by the bunches is used to introduce the concept of closely and sparsely bunched beams. There is a fundamental difference between them, especially from the point of view of power deposition. Expressions for an equivalen t transverse impedance and imaginary tune shift are derived. Finally the analysis is confronted with electron cloud observations in existing positron machines (DAPHINE, PF, BEPC) before it is applied to the LHC. It comes...

  12. Auditing for Distributed Storage Systems

    OpenAIRE

    Le, Anh; Markopoulou, Athina; Dimakis, Alexandros G.

    2012-01-01

    Distributed storage codes have recently received a lot of attention in the community. Independently, another body of work has proposed integrity checking schemes for cloud storage, none of which, however, is customized for coding-based storage or can efficiently support repair. In this work, we bridge the gap between these two currently disconnected bodies of work. We propose NC-Audit, a novel cryptography-based remote data integrity checking scheme, designed specifically for network coding-b...

  13. A REVIEW ON SECURED CLOUD COMPUTING ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    M. Hemanth Chakravarthy

    2014-01-01

    Full Text Available Nowadays, the scientific problem becomes very complex; therefore, it requires more computing power and storage space. These requirements are very common in an organization while dealing with current technological data and requirements. Based on these basic requirements, need of higher computational resources is an important issue when dealing with current technological methodology. Hence, cloud computing has become the most important computing paradigm of recent world. The cloud computing is an open source and using Internet as network model. Rapid growth in the field of “cloud computing” also increases severe security concerns, because security has a constant issue. This study reviews security models of cloud computing.

  14. Cloud Computing

    DEFF Research Database (Denmark)

    Krogh, Simon

    2013-01-01

    with technological changes, the paradigmatic pendulum has swung between increased centralization on one side and a focus on distributed computing that pushes IT power out to end users on the other. With the introduction of outsourcing and cloud computing, centralization in large data centers is again dominating...... the IT scene. In line with the views presented by Nicolas Carr in 2003 (Carr, 2003), it is a popular assumption that cloud computing will be the next utility (like water, electricity and gas) (Buyya, Yeo, Venugopal, Broberg, & Brandic, 2009). However, this assumption disregards the fact that most IT production......), for instance, in establishing and maintaining trust between the involved parties (Sabherwal, 1999). So far, research in cloud computing has neglected this perspective and focused entirely on aspects relating to technology, economy, security and legal questions. While the core technologies of cloud computing (e...

  15. Noctilucent clouds

    Science.gov (United States)

    Gadsden, M.

    An assessment of spacecraft, sounding rocket and ground level observational data on the noctilucent clouds which appear during summertime, at high latitudes, near the top of the mesosphere shows that these data are not sufficiently unambiguous and clear to permit conclusions as to the nature of the clouds. Although they seem to be ice particles nucleated at very low temperatures and pressures by either meteoric smoke or atmospheric ions, the very existence of the clouds poses the problem of how so much water vapor could be present at such a great height. An attempt is made to predict the microscopic behavior of the cloud particles through consideration of the relative importance of radiometer effects, radiation balance, Brownian movement, electric polarization, and the influence of Coulomb attraction on the growth of large clustered ions.

  16. Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Katz, Marcos

    A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile...... users in very different ways and for various purposes. The book provides many stimulating examples of resource-sharing applications. Enabling technologies for mobile clouds are also discussed, highlighting the key role of network coding. Mobile clouds have the potential to enhance communications...... performance, improve utilization of resources and create flexible platforms to share resources in very novel ways. Energy efficient aspects of mobile clouds are discussed in detail, showing how being cooperative can bring mobile users significant energy saving. The book presents and discusses multiple...

  17. Cloud Computing

    OpenAIRE

    Bhavana Gupta

    2012-01-01

    Cloud computing is such a type of computing environment, where business owners outsource their computing needs including application software services to a third party and when they need to use the computing power or employees need to use the application resources like database, emails etc., they access the resources via Internet. Cloud computing the use of computing resources (hardware and software) that are delivered as a service over a (typically the Internet).

  18. Telemedicine Based on Mobile Devices and Mobile Cloud Computing

    OpenAIRE

    Lidong Wang; Cheryl Ann Alexander

    2014-01-01

    Mobile devices such as smartphones and tablets support kinds of mobile computing and services. They can access to the cloud or offload the computation-intensive part to the cloud computing resources. Mobile cloud computing (MCC) integrates the cloud computing into the mobile environment, which extends mobile devices’ battery lifetime, improves their data storage capacity and processing power, and improves their reliability and information security. In this paper, the applications of smartphon...

  19. A Swarm Intelligence Based Model for Mobile Cloud Computing

    OpenAIRE

    Salama, Ahmed S.

    2015-01-01

    Mobile Computing (MC) provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC). MCC aims at using cloud computing techniques for storage and processing of data on mobile devices, thereby reducing their limitations. This paper proposes architecture for a Swarm Intelligence Based Mobile Cloud Computing M...

  20. Grids, Clouds and Virtualization

    CERN Document Server

    Cafaro, Massimo

    2011-01-01

    Research into grid computing has been driven by the need to solve large-scale, increasingly complex problems for scientific applications. Yet the applications of grid computing for business and casual users did not begin to emerge until the development of the concept of cloud computing, fueled by advances in virtualization techniques, coupled with the increased availability of ever-greater Internet bandwidth. The appeal of this new paradigm is mainly based on its simplicity, and the affordable price for seamless access to both computational and storage resources. This timely text/reference int

  1. The Evolution of Cloud Computing in ATLAS

    Science.gov (United States)

    Taylor, Ryan P.; Berghaus, Frank; Brasolin, Franco; Domingues Cordeiro, Cristovao Jose; Desmarais, Ron; Field, Laurence; Gable, Ian; Giordano, Domenico; Di Girolamo, Alessandro; Hover, John; LeBlanc, Matthew; Love, Peter; Paterson, Michael; Sobie, Randall; Zaytsev, Alexandr

    2015-12-01

    The ATLAS experiment at the LHC has successfully incorporated cloud computing technology and cloud resources into its primarily grid-based model of distributed computing. Cloud R&D activities continue to mature and transition into stable production systems, while ongoing evolutionary changes are still needed to adapt and refine the approaches used, in response to changes in prevailing cloud technology. In addition, completely new developments are needed to handle emerging requirements. This paper describes the overall evolution of cloud computing in ATLAS. The current status of the virtual machine (VM) management systems used for harnessing Infrastructure as a Service resources are discussed. Monitoring and accounting systems tailored for clouds are needed to complete the integration of cloud resources within ATLAS' distributed computing framework. We are developing and deploying new solutions to address the challenge of operation in a geographically distributed multi-cloud scenario, including a system for managing VM images across multiple clouds, a system for dynamic location-based discovery of caching proxy servers, and the usage of a data federation to unify the worldwide grid of storage elements into a single namespace and access point. The usage of the experiment's high level trigger farm for Monte Carlo production, in a specialized cloud environment, is presented. Finally, we evaluate and compare the performance of commercial clouds using several benchmarks.

  2. Architecting the cloud design decisions for cloud computing service models (SaaS, PaaS, and IaaS)

    CERN Document Server

    Kavis, Michael J

    2014-01-01

    An expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and tec

  3. INTRASPECIFIC VARIATION OF THE GREEN TURTLE, Chelonia mydas (CHELONIIDAE, IN THE FORAGING AREA OF GORGONA NATURAL NATIONAL PARK (COLOMBIAN PACIFIC

    Directory of Open Access Journals (Sweden)

    Laura Sampson

    2014-06-01

    Full Text Available The size distribution and body condition of the two morphotypes of green turtle (Chelonia mydas foraging in Gorgona Natural National Park (GNNP in the Colombian Pacific was assessed from 2003 to 2012. Measurements of straight carapace length (SCL, curved carapace length (CCL, weight, and body condition of 1,023 turtles captured on the GNNP reefs were recorded. More black turtles (n = 747 than yellow turtles (n = 276 were captured, all of them juveniles. Black turtles were significantly larger and heavier than yellow turtles. The size of recruitment to the neritic zone was 40.0-49.9 cm SCL for both morphotypes, but there were more yellow than black turtles in this size class, indicating a difference in the recruitment pattern. The body condition index of yellow turtles was significantly higher than that of black turtles, which could indicate differences in resource use. Based on our results, we suggest that GNNP might function as a recruitment area for yellow turtles, which arrive at smaller sizes and as part of a coastal migratory route for black turtles, which arrive at larger sizes and maintain residence at this location for an unknown period of time.Variación intraespecífica de la tortuga verde Chelonia mydas (Cheloniidae en el área de forrajeo del Parque Nacional Natural Gorgona (Pacífico colombianoSe comparó la distribución de tallas y condición corporal de los dos morfotipos conocidos de tortuga verde (Chelonia mydas en el área de forrajeo del Parque Nacional Natural Gorgona (PNNG en el Pacífico colombiano entre 2003 y 2012. Se tomaron medidas de largo recto de caparazón (LRC, largo curvo de caparazón (LCC, peso y condición corporal de 1.023 tortugas capturadas en los arrecifes del PNG. Se capturaron más tortugas negras (n = 747 que amarillas (n = 276, todas juveniles. Las tortugas negras fueron significativamente más grandes y pesadas que las amarillas. El tamaño de reclutamiento a la zona nerítica fue de 40,0–49,9 cm

  4. AVOCLOUDY: a simulator of volunteer clouds

    DEFF Research Database (Denmark)

    Sebastio, Stefano; Amoretti, Michele; Lluch Lafuente, Alberto

    2015-01-01

    The increasing demand of computational and storage resources is shifting users toward the adoption of cloud technologies. Cloud computing is based on the vision of computing as utility, where users no more need to buy machines but simply access remote resources made available on-demand by cloud...... application, intelligent agents constitute a feasible technology to add autonomic features to cloud operations. Furthermore, the volunteer computing paradigm—one of the Information and Communications Technology (ICT) trends of the last decade—can be pulled alongside traditional cloud approaches......, with the purpose to ‘green’ them. Indeed, the combination of data center and volunteer resources, managed by agents, allows one to obtain a more robust and scalable cloud computing platform. The increased challenges in designing such a complex system can benefit from a simulation-based approach, to test autonomic...

  5. Energy Storage.

    Science.gov (United States)

    Eaton, William W.

    Described are technological considerations affecting storage of energy, particularly electrical energy. The background and present status of energy storage by batteries, water storage, compressed air storage, flywheels, magnetic storage, hydrogen storage, and thermal storage are discussed followed by a review of development trends. Included are…

  6. A Review on Impacts of Cloud Computing on Digital Forensics

    Directory of Open Access Journals (Sweden)

    Farid Daryabar

    2015-05-01

    Full Text Available Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infrastructure provides data storage for organizations and individuals. Due to this large scale, in case an attack occurs in the network of a cloud it would be a big challenge to investigate the cloud. Therefore, digital forensics in cloud computing is a new discipline related to the increasing use of computers, networks and digital storage devices in numerous criminal activities in both traditional and Hi-Tech. This study reviews the literature on some challenges in cloud computing forensic investigation, and it is followed by evaluation and analysis of all types of information on cloud computing and its impacts on computer forensic investigations in publishing alliances with the survey was carried out in the field.

  7. Cloud Computing with Open Source Tool :OpenStack

    Directory of Open Access Journals (Sweden)

    Dr. Urmila R. Pol

    2014-09-01

    Full Text Available OpenStack is a especially scalable open source cloud operating system that is a global alliance of developers and cloud computing technologists producing the ubiquitous open source cloud computing platform for public and private clouds. OpenStack provides series of interrelated projects delivering various components for a cloud infrastructure solution as well as controls large pools of storage, compute and networking resources throughout a datacenter that all managed through a Dashboard(Horizon that gives administrators control while empowering their users to provision resources through a web interface.In this paper, we present a overview of Cloud Computing Platform such as, Openstack, Eucalyptus ,CloudStack and Opennebula which is open source software, cloud computing layered model, components of OpenStack, architecture of OpenStack. The aim of this paper is to show mainly importance of OpenStack as a Cloud provider and its installation.

  8. Virtualization and cloud computing in dentistry.

    Science.gov (United States)

    Chow, Frank; Muftu, Ali; Shorter, Richard

    2014-01-01

    The use of virtualization and cloud computing has changed the way we use computers. Virtualization is a method of placing software called a hypervisor on the hardware of a computer or a host operating system. It allows a guest operating system to run on top of the physical computer with a virtual machine (i.e., virtual computer). Virtualization allows multiple virtual computers to run on top of one physical computer and to share its hardware resources, such as printers, scanners, and modems. This increases the efficient use of the computer by decreasing costs (e.g., hardware, electricity administration, and management) since only one physical computer is needed and running. This virtualization platform is the basis for cloud computing. It has expanded into areas of server and storage virtualization. One of the commonly used dental storage systems is cloud storage. Patient information is encrypted as required by the Health Insurance Portability and Accountability Act (HIPAA) and stored on off-site private cloud services for a monthly service fee. As computer costs continue to increase, so too will the need for more storage and processing power. Virtual and cloud computing will be a method for dentists to minimize costs and maximize computer efficiency in the near future. This article will provide some useful information on current uses of cloud computing.

  9. Research and Implementation of Cipher-text Data Retrieval Method Based on Cloud Storage%基于云存储的密文数据检索方法研究与实现

    Institute of Scientific and Technical Information of China (English)

    刘伯红; 王刚; 王娟娟; 史慧丽

    2014-01-01

    To solve the problem of mass data encryption retrieval in the development of cloud storage service ,a new cipher-text data retrieval method is proposed .In this method ,a new retrieval method is designed which use inverted index as the index structure .Firstly ,user inputs the query words and matches on the cipher-text index precisely and transfer the word into other forms and correct the wrong word to query again .And then repeat the above steps under the circumstance if the returned result is lower than the pre-set threshold .This cipher-text data retrieval method improves the privacy of stored data to make users obtain the results what they expect .Finally ,experimental results show that the scheme is effective .%为解决云存储服务海量加密数据检索问题,提出一个新的云存储密文数据检索方法,新方法采用倒排索引结构,首先用户输入检索词,在密文索引中匹配,然后将词转化成其他形式和纠正错误的词之后进行再次查询,在返回结果低于先前设定的临界值的情况下继续执行以上步骤。这种基于云存储的密文数据检索方法提高了存储数据的隐私性,能够使用户得到他们所期望的结果,实验结果证明新的检索方法是有效的。

  10. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  11. Cloud Optimized Image Format and Compression

    Science.gov (United States)

    Becker, P.; Plesea, L.; Maurer, T.

    2015-04-01

    Cloud based image storage and processing requires revaluation of formats and processing methods. For the true value of the massive volumes of earth observation data to be realized, the image data needs to be accessible from the cloud. Traditional file formats such as TIF and NITF were developed in the hay day of the desktop and assumed fast low latency file access. Other formats such as JPEG2000 provide for streaming protocols for pixel data, but still require a server to have file access. These concepts no longer truly hold in cloud based elastic storage and computation environments. This paper will provide details of a newly evolving image storage format (MRF) and compression that is optimized for cloud environments. Although the cost of storage continues to fall for large data volumes, there is still significant value in compression. For imagery data to be used in analysis and exploit the extended dynamic range of the new sensors, lossless or controlled lossy compression is of high value. Compression decreases the data volumes stored and reduces the data transferred, but the reduced data size must be balanced with the CPU required to decompress. The paper also outlines a new compression algorithm (LERC) for imagery and elevation data that optimizes this balance. Advantages of the compression include its simple to implement algorithm that enables it to be efficiently accessed using JavaScript. Combing this new cloud based image storage format and compression will help resolve some of the challenges of big image data on the internet.

  12. CHPS IN CLOUD COMPUTING ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    K.L.Giridas

    2012-10-01

    Full Text Available Workflow have been utilized to characterize a various form of applications concerning high processing and storage space demands. So, to make the cloud computing environment more eco-friendly,our research project was aiming in reducing E-waste accumulated by computers. In a hybrid cloud, the user has flexibility offered by public cloud resources that can be combined to the private resources pool as required. Our previous work described the process of combining the low range and mid range processors with the high end processor to make the IT environment without e-waste. Then we focused on the allocation of resources in an optimal manner with respect to bandwidth and processors’ ability. In this paper we deal with presenting (CHPS Compatibility of Hybrid processor scheduler in green IT cloud computing environment. CHPS decides which resources should be chartered from the public cloud and combined to the private cloud to offer adequate processing power to perform a workflow inside a specified execution time. We present widespread experimental and simulation results which illustrate that CHPS can decrease costs as attaining the recognized preferred execution time.

  13. On Web Services Based Cloud Interoperability

    Directory of Open Access Journals (Sweden)

    Reeta Sony A.L

    2012-09-01

    Full Text Available Cloud Computing is a paradigm shift in the field of Computing. It is moving at an incredible fast pace and one of the fastest evolving domains of computer science today. It consist set of technology and service models that concentrates on the internet base use and delivery of IT applications, processing capability, storage and memory space. There is a shift from the traditional in-house servers and applications to the next generation of cloud computing applications. With many of the computer giants like Google, Microsoft, etc. entering into the cloud computing arena, there will be thousands of applications running on the cloud. There are several cloud environments available in the market today which support a huge consumer-base. Eventually this will lead to a multitude of standards, technologies and products being provided on the cloud. Consumers will need certain degrees of flexibility to use the cloud application/services of their choice and at the same time will need these applications/services to communicate with each other. This paper emphasizes cloud computing and provides a solution to achieve Interoperability, which is in the form of Web Services. The paper will also provide a Live Case Study where interoperability comes into play - Connecting Google App Engine and Microsoft Windows Azure Platform, two of the leading Cloud Platforms available today. GAE and WAP are two Cloud Frameworks which have very little in common, making interoperability an absolute necessary.

  14. A Survey on Mobile Cloud Computing with Embedded Security Considerations

    Directory of Open Access Journals (Sweden)

    Victor Onomza Waziri

    2014-04-01

    Full Text Available The emergence of cloud computing hold a promise to computing where software is provided as a services (SaaS via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducing cost, increasing storage, improving battery life of mobile devices and providing flexibility and mobility of data and information. However, the realization of some of these benefits is far from reality in mobile applications, as a result, opens new areas of research such as security of privacy and services. To better understand how to facilitate the development of mobile cloud computing, we surveyed existing work in mobile cloud computing in the context and principles of its foundational cloud computing technology. We provided a definition of mobile cloud computing and gave a summary of results from this review, in particular, the models, architecture, applications and challenges of mobile cloud computing. We concluded with recommendations for how this better understanding of mobile cloud computing can assist in the development of better and stronger mobile applications.

  15. Detecting patterns of fertilization and frequency of multiple paternity in Chelonia mydas of Colola (Michoacán, Mexico Detección de patrones de fertilización y frecuencia de paternidad múltiple en Chelonia mydas de Colola (Michoacán, México

    Directory of Open Access Journals (Sweden)

    Libny Ingrid Lara-De La Cruz

    2010-04-01

    Full Text Available We present a microsatellite analysis that allows an indirect determination of the process of fertilization in the genital tract of Chelonia mydas. The strategy was based in that the order of oviposition is related to fertilization order. Once the genotype of the offspring was obtained through microsatellite analyses, it was possible to determine the frequency of multiple paternity and to infer the presence of anatomical structures or physiological mechanisms that allow females to undergo cryptic choice processes, which allowed us to hypothesize the existence of post-copula factors that determine reproductive success in a polyandrous system. This paper does not show the presence of physiological mechanisms that allow control of fertilization order in polyandrous females of Chelonia mydas.Presentamos un análisis con microsatélites para determinar de manera indirecta si existe un mecanismo de control del proceso de fertilización en el tracto genital de Chelonia mydas. La estrategia utilizada se basa en que el orden de oviposición está relacionado con el orden de fertilización. Determinando el genotipo de la progenie, fue posible determinar la frecuencia de paternidad múltiple e inferir la presencia de estructurasanatómicas o mecanismos fisiológicos, que actúen como factores post-copulatorios para regular los eventos reproductivos en un sistema poliándrico. El presente trabajo no muestra la presencia de mecanismos fisiológicos que permitan el control del orden de fertilización en hembras poliándricas de Chelonia mydas.

  16. Concentration of heavy metals in tissues of green turtles (Chelonia mydas sampled in the Cananéia estuary, Brazil

    Directory of Open Access Journals (Sweden)

    Edison Barbieri

    2009-09-01

    Full Text Available Thirty specimens (15 adults and 15 juveniles of Chelonia mydas found in the Cananéia estuary in the state of São Paulo on the southeastern Brazilian coast between January 2005 and September 2006, were analyzed The concentrations of Cd, Cu, Pb, Mn and Ni in liver and kidney samples of adult and juvenile green turtles were determined by Flame Atomic Absorption Spectrophotometry.The average Cd concentration found in adult livers (0.57µg.g-1 was significantly higher than that in juveniles (0.279µg.g-1. Cu concentrations were significantly higher in the liver than in the kidney, and significantly higher in adults (39.9µg.g-1 than in juveniles (20.7µg.g-1 Average Mn concentrations in liver and kidney did not differ between adults (4.32 and 4.17µg.g-1 and juveniles (4.81 and 3.82µg.g-1, whereas Ni concentrations in adults (0.28 and 0.19µg.g-1, respectively were significantly higher than in juveniles (0.13 and 0.089µg.g-1, respectively. Pb concentrations in liver were significantly higher in adults (0.37µg.g-1 than in juveniles (0.06µg.g-1. The concentrations of essential trace elements in Chelonia mydas were generally comparable to values reported in other, similar studies. With respect to non-essential metals (Cd, Pb and Ni, Chelonia mydas presented lower values than those reported for their northern Atlantic counterparts.Analisou-se 30 espécimes (15 adultos e 15 juvenis de Chelonia mydas encontradas no estuário de Cananéia, Estado de São Paulo, região sudeste, durante o período de janeiro de 2005 a setembro de 2006. Foram determinados no fígado e rins de adultos e juvenis de C. mydas os seguintes metais: Cd, Cu, Pb, Mn e Ni, através de Espectrofotometria de Absorção Atômica. Verificou-se que as concentrações médias de Cd no fígado de adultos (0,957µg.g-1 foram significativamente diferentes em relação a dos juvenis (0,279µg.g-1. As concentrações médias de Cu no fígado de C. mydas foram diferentes em relação ao rim

  17. Molecular Characterization of Coccidia Associated with an Epizootic in Green Sea Turtles (Chelonia mydas in South East Queensland, Australia.

    Directory of Open Access Journals (Sweden)

    Phoebe A Chapman

    Full Text Available In the spring of 2014, mass mortalities among wild green sea turtles occurred off the coast of south-east Queensland, Australia. The suspected causative agent was Caryospora cheloniae, an eimeriid coccidian implicated in previous epizootics. Necropsies were undertaken on a subset of 11 dead turtles, with subsequent histopathology and molecular analyses. All turtles returned positive PCR results for coccidial infection in various tissues; these included the brain, gastrointestinal tract, lung, kidney and thyroid. Granulomatous encephalitis was consistently observed, as well as enteritis and, less frequently, thyroiditis and nephritis. Sequencing and phylogenetic analyses indicated the presence of two distinct coccidian genotypes, presumably separate species-one associated with the brain, gastrointestinal tract and lung, and the second with the thyroid and kidney. Maximum likelihood and Bayesian inference analyses placed the first genotype closest to the lankesterellid genus Schellackia, rather than in the Eimeriidae, while the second was paraphyletic to the eimeriids. Presence of coccidial stages in extra-intestinal tissues of the primary host raises questions about the potential presence of intermediate or paratenic hosts within the life cycles, as well as their current placement relative to the genus Caryospora. This study represents the first genetic characterization of this emerging disease agent in green sea turtles, an endangered species, and has relevance for life-cycle elucidation and future development of diagnostics.

  18. Stable isotopes in barnacles as a tool to understand green sea turtle (Chelonia mydas) regional movement patterns

    Science.gov (United States)

    Detjen, M.; Sterling, E.; Gómez, A.

    2015-12-01

    Sea turtles are migratory animals that travel long distances between their feeding and breeding grounds. Traditional methods for researching sea turtle migratory behavior have important disadvantages, and the development of alternatives would enhance our ability to monitor and manage these globally endangered species. Here we report on the isotope signatures in green sea-turtle (Chelonia mydas) barnacles (Platylepas sp.) and discuss their potential relevance as tools with which to study green sea turtle migration and habitat use patterns. We analyzed oxygen (δ18O) and carbon (δ13C) isotope ratios in barnacle calcite layers from specimens collected from green turtles captured at the Palmyra Atoll National Wildlife Refuge (PANWR) in the central Pacific. Carbon isotopes were not informative in this study. However, the oxygen isotope results suggest likely regional movement patterns when mapped onto a predictive oxygen isotope map of the Pacific. Barnacle proxies could therefore complement other methods in understanding regional movement patterns, informing more effective conservation policy that takes into account connectivity between populations.

  19. First record of hybridization between green Chelonia mydas and hawksbill Eretmochelys imbricata sea turtles in the Southeast Pacific.

    Science.gov (United States)

    Kelez, Shaleyla; Velez-Zuazo, Ximena; Pacheco, Aldo S

    2016-01-01

    Hybridization among sea turtle species has been widely reported in the Atlantic Ocean, but their detection in the Pacific Ocean is limited to just two individual hybrid turtles, in the northern hemisphere. Herein, we report, for the first time in the southeast Pacific, the presence of a sea turtle hybrid between the green turtle Chelonia mydas and the hawksbill turtle Eretmochelys imbricata. This juvenile sea turtle was captured in northern Peru (4°13'S; 81°10'W) on the 5(th) of January, 2014. The individual exhibited morphological characteristics of C. mydas such as dark green coloration, single pair of pre-frontal scales, four post-orbital scales, and mandibular median ridge, while the presence of two claws in each frontal flipper, and elongated snout resembled the features of E. imbricata. In addition to morphological evidence, we confirmed the hybrid status of this animal using genetic analysis of the mitochondrial gene cytochrome oxidase I, which revealed that the hybrid individual resulted from the cross between a female E. imbricata and a male C. mydas. Our report extends the geographical range of occurrence of hybrid sea turtles in the Pacific Ocean, and is a significant observation of interspecific breeding between one of the world's most critically endangered populations of sea turtles, the east Pacific E. imbricata, and a relatively healthy population, the east Pacific C. mydas.

  20. Molecular Characterization of Coccidia Associated with an Epizootic in Green Sea Turtles (Chelonia mydas) in South East Queensland, Australia.

    Science.gov (United States)

    Chapman, Phoebe A; Owen, Helen; Flint, Mark; Traub, Rebecca J; Cribb, Thomas H; Mills, Paul C

    2016-01-01

    In the spring of 2014, mass mortalities among wild green sea turtles occurred off the coast of south-east Queensland, Australia. The suspected causative agent was Caryospora cheloniae, an eimeriid coccidian implicated in previous epizootics. Necropsies were undertaken on a subset of 11 dead turtles, with subsequent histopathology and molecular analyses. All turtles returned positive PCR results for coccidial infection in various tissues; these included the brain, gastrointestinal tract, lung, kidney and thyroid. Granulomatous encephalitis was consistently observed, as well as enteritis and, less frequently, thyroiditis and nephritis. Sequencing and phylogenetic analyses indicated the presence of two distinct coccidian genotypes, presumably separate species-one associated with the brain, gastrointestinal tract and lung, and the second with the thyroid and kidney. Maximum likelihood and Bayesian inference analyses placed the first genotype closest to the lankesterellid genus Schellackia, rather than in the Eimeriidae, while the second was paraphyletic to the eimeriids. Presence of coccidial stages in extra-intestinal tissues of the primary host raises questions about the potential presence of intermediate or paratenic hosts within the life cycles, as well as their current placement relative to the genus Caryospora. This study represents the first genetic characterization of this emerging disease agent in green sea turtles, an endangered species, and has relevance for life-cycle elucidation and future development of diagnostics.

  1. Winter diets of immature green turtles (Chelonia mydas) on a northern feeding ground: integrating stomach contents and stable isotope analyses

    Science.gov (United States)

    Williams, Natalie C.; Bjorndal, Karen A.; Lamont, Margaret M.; Carthy, Raymond R.

    2015-01-01

    The foraging ecology and diet of the green turtle, Chelonia mydas, remain understudied, particularly in peripheral areas of its distribution. We assessed the diet of an aggregation of juvenile green turtles at the northern edge of its range during winter months using two approaches. Stomach content analyses provide a single time sample, and stable isotope analyses integrate diet over a several-month period. We evaluated diet consistency in prey choice over time by comparing the results of these two approaches. We examined stomach contents from 43 juvenile green turtles that died during cold stunning events in St. Joseph Bay, Florida, in 2008 and 2011. Stomach contents were evaluated for volume, dry mass, percent frequency of occurrence, and index of relative importance of individual diet items. Juvenile green turtles were omnivorous, feeding primarily on seagrasses and tunicates. Diet characterizations from stomach contents differed from those based on stable isotope analyses, indicating the turtles are not feeding consistently during winter months. Evaluation of diets during warm months is needed.

  2. Cloud Computing

    OpenAIRE

    Bhavana Gupta

    2012-01-01

    Cloud computing is such a type of computing environment, where business owners outsource their computing needs including application software services to a third party and when they need to use the computing power or employees need to use the application resources like database, emails etc., they access the resources via Internet

  3. A REVIEW ON SECURED CLOUD COMPUTING ENVIRONMENT

    OpenAIRE

    M. Hemanth Chakravarthy; E. Kannan

    2014-01-01

    Nowadays, the scientific problem becomes very complex; therefore, it requires more computing power and storage space. These requirements are very common in an organization while dealing with current technological data and requirements. Based on these basic requirements, need of higher computational resources is an important issue when dealing with current technological methodology. Hence, cloud computing has become the most important computing paradigm of recent world. The cloud computing is ...

  4. The Risk and Challenges of Cloud Computing

    OpenAIRE

    Usman Namadi Inuwa

    2015-01-01

    Cloud computing is a computing technology aiming to share storage, computation, and services transparently among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and operated by third party service providers despite it sensitivity (example contact address, mails), the risks of disclosing user confidential data by service...

  5. Commune: Shared Ownership in an Agnostic Cloud

    OpenAIRE

    Soriente, Claudio; Karame, Ghassan; Ritzdorf, Hubert; Marinovic, Srdjan; Capkun, Srdjan

    2013-01-01

    Although cloud storage platforms promise a convenient way for users to share files and engage in collaborations, they require all files to have a single owner who unilaterally makes access control decisions. Existing clouds are, thus, agnostic to shared ownership. This can be a significant limitation in many collaborations because one owner can, for example, delete files and revoke access without consulting the other collaborators. In this paper, we first formally define a notion of shared ow...

  6. Data Acquisition as Industrial Cloud service

    OpenAIRE

    Stankevichus, Ivan

    2016-01-01

    The aim of this thesis was to develop a practical solution for industrial remote monitoring of automation equipment including real-time data acquisition from Siemens automation devices and storage of the obtained data to the SAP HANA Cloud database. Because HANA will be implemented by Siemens as a Cloud service, it was also reasonable to introduce important features and benefits of HANA technology for the industrial sector. The implementation of data acquisition solution was divided into ...

  7. Making a Cloud Provenance-Aware

    OpenAIRE

    Muniswamy-Reddy, Kiran-Kumar; MACKO Peter; Seltzer, Margo I.

    2009-01-01

    The advent of cloud computing provides a cheap and convenient mechanism for scientists to share data. The utility of such data is obviously enhanced when the provenance of the data is also available. The cloud, while convenient for storing data, is not designed for storing and querying provenance. In this paper, we present desirable properties for distributed provenance storage systems and present design alternatives for storing data and provenance on Amazon’s popular Web Services platform (A...

  8. Interaction among Cloud Services on Common Software Application with Service Level Agreement

    OpenAIRE

    C. Saravanakumar C. Arun

    2011-01-01

    Nowadays the cloud computing has plays important role for larger organization, IT Industries, educational industries etc. Cloud computing is the complex infrastructure of software, hardware, processing and storage that are available as a service. It has huge number of advantages and also suffers lot of disadvantages. In the Cloud Service User (CSU) point there is no specific protocol, algorithm. There is no design pattern and interface for accessing a cloud services. The Cloud Service Provide...

  9. Ingestion of solid wastes by juvenile green turtles, Chelonia mydas (L. 1758), in the eastern Rio de Janeiro state coast, Brazil

    OpenAIRE

    Danielle Rodrigues Awabdi; Salvatore Siciliano; Ana Paula Madeira Di Beneditto

    2013-01-01

    This paper analyzed the solid wastes of anthropogenic origin obtained from the stomach contents of juvenile green turtles, Chelonia mydas, on the eastern Rio de Janeiro state coast, southeastern Brazil (22º50’S – 23º00’S). Between June 2009 and May 2010, the stomach contents of 49 specimens stranded on beaches were analyzed. Solid wastes were recorded in 29 stomach contents (59.2%) and more than one category of wastes was found out in 22 samples. Plastic bags, categorized as flexible plastic ...

  10. Anidación de la tortuga verde (Chelonia mydas) y caracterización de las playas en Cayo Largo, Cuba

    OpenAIRE

    Medina Cruz, Y.; Moncada Gavilán, F.; Nodarse Andreu, G.; Blanco López, R.

    2009-01-01

    Quantitative and qualitative relation between beach characteristic and number of observed nests of Green turtle Chelonia mydas at Cayo Largo is shown. The nest quantification was carried out by patrolling and direct count in reproduction season for this species (June-September) in period 2002-2006. A total of 7 beaches were identified with sands strips between 5 and 50 m of wide and between 70 and 4 060 m of length. Annual nesting between 1 114 and 1 866 nests was registered. Maxi...

  11. Research on I/O Resource Scheduling Algorithms for Utility Optimization Towards Cloud Storage%面向云存储的I/O资源效用优化调度算法研究

    Institute of Scientific and Technical Information of China (English)

    王健宗; 谌炎俊; 谢长生

    2013-01-01

    Cloud-based services are emerging as an economical and convenient alternative for clients who don't want to acquire,maintain and operate their own IT equipment.Instead,customers purchase virtual machines (VMs) with certain service level objectives (SLOs) to obtain computational resources.Existing algorithms for memory and CPU allocation are inadequate for I/O allocation,especially in clustered storage infrastructures where storage is distributed across multiple storage nodes.This paper focuses on:1) dynamic SLO decomposition so that VMs receive proper I/O service in each distributed storage node,and 2) efficient and robust local I/O scheduling strategy.To address these issues,we present an adaptive I/O resource scheduling algorithm (called PC) for utility optimization that at runtime adjusts local SLOs.The local SLOs are generated for each VM at each storage node based on access patterns.We also adopt dual clocks to allow automatic switching between two scheduling strategies.When system capacity is sufficient,we interweave requests in an earliest deadline first (EDF) manner.Otherwise resources are allocated proportionately to their normalized revenues.The results of our experiments suggest that the algorithm is adaptive to various access patterns without significant manual pre-settings while maximizing profits.%随着云计算的普及,越来越多的客户选择使用基于云的服务,以避免冗余的设施购买费用和繁杂的系统设计与维护,从而将精力集中在自己的专业领域.通常,云服务的客户从云服务供应商购买虚拟机,并根据双方商定达成的服务水平目标(service level objective,SLO)约束购买到的计算资源.分布式存储中大量的文件分布在不同的存储节点上,现有的CPU、内存以及带宽等资源的分配调度算法并不适用磁盘I/O资源.从云服务提供商的角度来说,高效用的I/O资源调度算法有利于提高其系统的利用率,节约资源开销并增加企业收

  12. Using Cloud Storage for NMR Data Distribution

    Science.gov (United States)

    Soulsby, David

    2012-01-01

    An approach using Google Groups as method for distributing student-acquired NMR data has been implemented. We describe how to configure NMR spectrometer software so that data is uploaded to a laboratory section specific Google Group, thereby removing bottlenecks associated with printing and processing at the spectrometer workstation. Outside of…

  13. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  14. Data Mining Using High Performance Data Clouds: Experimental Studies Using Sector and Sphere

    CERN Document Server

    Grossman, Robert L

    2008-01-01

    We describe the design and implementation of a high performance cloud that we have used to archive, analyze and mine large distributed data sets. By a cloud, we mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud provides compute services. We describe the design of the Sector storage cloud and how it provides the storage services required by the Sphere compute cloud. We also describe the programming paradigm supported by the Sphere compute cloud. Sector and Sphere are designed for analyzing large data sets using computer clusters connected with wide area high performance networks (for example, 10+ Gb/s). We describe a distributed data mining application that we have developed using Sector and Sphere. Finally, we describe some experimental studies comparing Sector/Sphere to Hadoop.

  15. Three-dimensional geospatial information service based on cloud computing

    Science.gov (United States)

    Zhai, Xi; Yue, Peng; Jiang, Liangcun; Wang, Linnan

    2014-01-01

    Cloud computing technologies can support high-performance geospatial services in various domains, such as smart city and agriculture. Apache Hadoop, an open-source software framework, can be used to build a cloud environment on commodity clusters for storage and large-scale processing of data sets. The Open Geospatial Consortium (OGC) Web 3-D Service (W3DS) is a portrayal service for three-dimensional (3-D) geospatial data. Its performance could be improved by cloud computing technologies. This paper investigates how OGC W3DS could be developed in a cloud computing environment. It adopts the Apache Hadoop as the framework to provide a cloud implementation. The design and implementation of the 3-D geospatial information cloud service is presented. The performance evaluation is performed over data retrieval tests running in a cloud platform built by Hadoop clusters. The evaluation results provide a valuable reference on providing high-performance 3-D geospatial information cloud services.

  16. A survey on top security threats in cloud computing

    Directory of Open Access Journals (Sweden)

    Muhammad Kazim

    2015-03-01

    Full Text Available Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.

  17. AstroCloud, a Cyber-Infrastructure for Astronomy Research: Cloud Computing Environments

    Science.gov (United States)

    Li, C.; Wang, J.; Cui, C.; He, B.; Fan, D.; Yang, Y.; Chen, J.; Zhang, H.; Yu, C.; Xiao, J.; Wang, C.; Cao, Z.; Fan, Y.; Hong, Z.; Li, S.; Mi, L.; Wan, W.; Wang, J.; Yin, S.

    2015-09-01

    AstroCloud is a cyber-Infrastructure for Astronomy Research initiated by Chinese Virtual Observatory (China-VO) under funding support from NDRC (National Development and Reform commission) and CAS (Chinese Academy of Sciences). Based on CloudStack, an open source software, we set up the cloud computing environment for AstroCloud Project. It consists of five distributed nodes across the mainland of China. Users can use and analysis data in this cloud computing environment. Based on GlusterFS, we built a scalable cloud storage system. Each user has a private space, which can be shared among different virtual machines and desktop systems. With this environments, astronomer can access to astronomical data collected by different telescopes and data centers easily, and data producers can archive their datasets safely.

  18. Securing Mobile Cloud Using Finger Print Authentication

    Directory of Open Access Journals (Sweden)

    IehabALRassan

    2013-11-01

    Full Text Available Mobile cloud computing becomes part of mobile usersdaily life transactions. Mobile devices with Internetcapabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobiledevices, these devices can't install and run applications require heavy CPU processing or extensivememory. Cloud computing allows mobile users to synchronize their data with remote storage and utilizeapplications require heavy CPU processing or extensive memory such as Microsoft Office or AdobePhotoshop, as they run in a desktop computer.The combination of cloud computing and mobile computing introduces mobile cloud computing, which alsopresent new issues of security threats such as unauthorized access to resources exist in mobile cloud.Protecting mobile cloud computing from illegitimateaccess becomes an important concern to mobile users.This paper proposes and implements a new user authentication mechanism of mobile cloud computingusing fingerprint recognition system. Fingerprint images of mobile users can be captured and processedusing mobile phone camera to access mobile cloud computing . The implementation of the proposedsolution in different mobile operating systems anddevices show security enhancement in mobile cloudcomputing with accepted performance level

  19. Hematological profile of Chelonia mydas (Testudines, Cheloniidae according to the severity of fibropapillomatosis or its absence Perfil hematológico de Chelonia mydas (Testudines, Cheloniidae de acordo com o grau de acometimento pela fibropapilomatose e sua ausência

    Directory of Open Access Journals (Sweden)

    Silmara Rossi

    2009-12-01

    Full Text Available The green turtle Chelonia mydas feeds and nests in the Brazilian coastal area and is considered an endangered species by the World Conservation Union (IUCN 2009 and threatened by the Red List of Brazilian Fauna (Ministério do Meio Ambiente 2009. Fibropapillomatosis is a disease characterized by benign skin tumors (fibropapillomas, and it is one of the main threats to the survival of this species. Studies suggest the involvement of viruses as infectious agents associated with environmental and genetic factors. Blood samples were collected from 45 turtles captured in the coastal area of the state of Sao Paulo, Brazil. From these, 27 were affected by fibropapillomas and 18 were tumor free. Biometrical data on the turtles, size, location and quantity of tumors were recorded. The area occupied by fibropapillomas per animal was calculated and four groups were determined according to severity of the disease or its absence. The objective of the study was to compare hemogram results of the sea turtles classified in these four groups. The lowest hematocrit value was observed in severely affected animals. In the hemoglobin assay, the highest value was observed in the group of tumor free turtles and the lowest, in animals severely affected. Lymphocyte counts and curved carapace length were on the verge of statistical significance.Chelonia mydas, denominada tartaruga verde, é uma tartaruga marinha que frequenta o litoral brasileiro para alimentação e nidificação e é considerada em perigo de extinção pela IUCN (World Conservation Union, 2009 e ameaçada pela Lista Vermelha da Fauna Brasileira (Ministério do Meio Ambiente, 2009. A fibropapilomatose, doença caracterizada por tumores cutâneos benignos (fibropapilomas, é uma das mais importantes ameaças à sobrevivência dessa espécie. Pesquisas sugerem o envolvimento de agentes infecciosos virais em associação com fatores ambientais e genéticos. Foram colhidas amostras sanguíneas de 45

  20. Soft Clouding

    DEFF Research Database (Denmark)

    Søndergaard, Morten; Markussen, Thomas; Wetton, Barnabas;

    2012-01-01

    Soft Clouding is a blended concept, which describes the aim of a collaborative and transdisciplinary project. The concept is a metaphor implying a blend of cognitive, embodied interaction and semantic web. Furthermore, it is a metaphor describing our attempt of curating a new semantics of sound...... brought together in one transdisciplinary process of curating a semantics of sound: Technological, Humanistic /Curatorial, and Design / Action-based practice....

  1. Cloud Computing with iPlant Atmosphere.

    Science.gov (United States)

    McKay, Sheldon J; Skidmore, Edwin J; LaRose, Christopher J; Mercer, Andre W; Noutsos, Christos

    2013-10-15

    Cloud Computing refers to distributed computing platforms that use virtualization software to provide easy access to physical computing infrastructure and data storage, typically administered through a Web interface. Cloud-based computing provides access to powerful servers, with specific software and virtual hardware configurations, while eliminating the initial capital cost of expensive computers and reducing the ongoing operating costs of system administration, maintenance contracts, power consumption, and cooling. This eliminates a significant barrier to entry into bioinformatics and high-performance computing for many researchers. This is especially true of free or modestly priced cloud computing services. The iPlant Collaborative offers a free cloud computing service, Atmosphere, which allows users to easily create and use instances on virtual servers preconfigured for their analytical needs. Atmosphere is a self-service, on-demand platform for scientific computing. This unit demonstrates how to set up, access and use cloud computing in Atmosphere.

  2. User Security in Cloud Using Password Authentication

    Directory of Open Access Journals (Sweden)

    Deepika Singh

    2014-06-01

    Full Text Available Cloud computing technology is an open standard, service-based, Internet-centric, safe, convenient data storage and network computing services [8]. Cloud computing is an internet based model for enabling convenient, on demand network access to a shared pool of configurable computing resources [9]. The software and data that you access for your work doesn‟t exist on your computer instead it‟s on the server. This concept of using services not stored on your system is called Cloud Computing. In this paper, we are implementing a technique to enhance the security of cloud. We create an algorithm based on the selection of username and generate a password to strengthen the security in cloud.

  3. Cloud computing for data-intensive applications

    CERN Document Server

    Li, Xiaolin

    2014-01-01

    This book presents a range of cloud computing platforms for data-intensive scientific applications. It covers systems that deliver infrastructure as a service, including: HPC as a service; virtual networks as a service; scalable and reliable storage; algorithms that manage vast cloud resources and applications runtime; and programming models that enable pragmatic programming and implementation toolkits for eScience applications. Many scientific applications in clouds are also introduced, such as bioinformatics, biology, weather forecasting and social networks. Most chapters include case studie

  4. Cloud Databases: A Paradigm Shift in Databases

    Directory of Open Access Journals (Sweden)

    Indu Arora

    2012-07-01

    Full Text Available Relational databases ruled the Information Technology (IT industry for almost 40 years. But last few years have seen sea changes in the way IT is being used and viewed. Stand alone applications have been replaced with web-based applications, dedicated servers with multiple distributed servers and dedicated storage with network storage. Cloud computing has become a reality due to its lesser cost, scalability and pay-as-you-go model. It is one of the biggest changes in IT after the rise of World Wide Web. Cloud databases such as Big Table, Sherpa and SimpleDB are becoming popular. They address the limitations of existing relational databases related to scalability, ease of use and dynamic provisioning. Cloud databases are mainly used for data-intensive applications such as data warehousing, data mining and business intelligence. These applications are read-intensive, scalable and elastic in nature. Transactional data management applications such as banking, airline reservation, online e-commerce and supply chain management applications are write-intensive. Databases supporting such applications require ACID (Atomicity, Consistency, Isolation and Durability properties, but these databases are difficult to deploy in the cloud. The goal of this paper is to review the state of the art in the cloud databases and various architectures. It further assesses the challenges to develop cloud databases that meet the user requirements and discusses popularly used Cloud databases.

  5. REVIEW PAPER ON MOBILE CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Priyanka d. Raut

    2015-10-01

    Full Text Available Nowadays smart-phones are being capable of supporting a broad range of applications, many of which demand an increasing computational power. This leads to a challenge because smart-phones are resource-constrained devices with finite computation power, memory, storage, and energy. With the development of mobility and cloud computing, mobile cloud computing (MCC has introduced and become a point of research. With the need of extendibility and on-demand self-service, it can provide the good infrastructure, platform and software services in a cloud to mobile clients through the mobile network. Therefore, Cloud computing is anticipated to bring an innovation in mobile computing, where the mobile devices can make use of clouds for data processing, storage and other intensive operations. Despite the surprising advancement achieved by MCC, the clients of MCC are still below expectations due to the related risks in terms of security and confidentiality. The more and more information is placed onto the cloud by individuals and enterprises, the more the security issue begins to grow. This paper presents the various security issues that arise about how secure the mobile cloud computing environment is.

  6. Cloud computing development in Armenia

    Directory of Open Access Journals (Sweden)

    Vazgen Ghazaryan

    2014-10-01

    Full Text Available Purpose – The purpose of the research is to clarify benefits and risks in regards with data protection, cost; business can have by the use of this new technologies for the implementation and management of organization’s information systems.Design/methodology/approach – Qualitative case study of the results obtained via interviews. Three research questions were raised: Q1: How can company benefit from using Cloud Computing compared to other solutions?; Q2: What are possible issues that occur with Cloud Computing?; Q3: How would Cloud Computing change an organizations’ IT infrastructure?Findings – The calculations provided in the interview section prove the financial advantages, even though the precise degree of flexibility and performance has not been assessed. Cloud Computing offers great scalability. Another benefit that Cloud Computing offers, in addition to better performance and flexibility, is reliable and simple backup data storage, physically distributed and so almost invulnerable to damage. Although the advantages of Cloud Computing more than compensate for the difficulties associated with it, the latter must be carefully considered. Since the cloud architecture is relatively new, so far the best guarantee against all risks it entails, from a single company's perspective, is a well-formulated service-level agreement, where the terms of service and the shared responsibility and security roles between the client and the provider are defined.Research limitations/implications – study was carried out on the bases of two companies, which gives deeper view, but for more widely applicable results, a wider analysis is necessary.Practical implications:Originality/Value – novelty of the research depends on the fact that existing approaches on this problem mainly focus on technical side of computing.Research type: case study

  7. Essentials of cloud computing

    CERN Document Server

    Chandrasekaran, K

    2014-01-01

    ForewordPrefaceComputing ParadigmsLearning ObjectivesPreambleHigh-Performance ComputingParallel ComputingDistributed ComputingCluster ComputingGrid ComputingCloud ComputingBiocomputingMobile ComputingQuantum ComputingOptical ComputingNanocomputingNetwork ComputingSummaryReview PointsReview QuestionsFurther ReadingCloud Computing FundamentalsLearning ObjectivesPreambleMotivation for Cloud ComputingThe Need for Cloud ComputingDefining Cloud ComputingNIST Definition of Cloud ComputingCloud Computing Is a ServiceCloud Computing Is a Platform5-4-3 Principles of Cloud computingFive Essential Charact

  8. Impact of different cloud deployments on real-time video applications for mobile video cloud users

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2015-02-01

    The latest trend to access mobile cloud services through wireless network connectivity has amplified globally among both entrepreneurs and home end users. Although existing public cloud service vendors such as Google, Microsoft Azure etc. are providing on-demand cloud services with affordable cost for mobile users, there are still a number of challenges to achieve high-quality mobile cloud based video applications, especially due to the bandwidth-constrained and errorprone mobile network connectivity, which is the communication bottleneck for end-to-end video delivery. In addition, existing accessible clouds networking architectures are different in term of their implementation, services, resources, storage, pricing, support and so on, and these differences have varied impact on the performance of cloud-based real-time video applications. Nevertheless, these challenges and impacts have not been thoroughly investigated in the literature. In our previous work, we have implemented a mobile cloud network model that integrates localized and decentralized cloudlets (mini-clouds) and wireless mesh networks. In this paper, we deploy a real-time framework consisting of various existing Internet cloud networking architectures (Google Cloud, Microsoft Azure and Eucalyptus Cloud) and a cloudlet based on Ubuntu Enterprise Cloud over wireless mesh networking technology for mobile cloud end users. It is noted that the increasing trend to access real-time video streaming over HTTP/HTTPS is gaining popularity among both research and industrial communities to leverage the existing web services and HTTP infrastructure in the Internet. To study the performance under different deployments using different public and private cloud service providers, we employ real-time video streaming over the HTTP/HTTPS standard, and conduct experimental evaluation and in-depth comparative analysis of the impact of different deployments on the quality of service for mobile video cloud users. Empirical

  9. EFFECTS OF "SWIM WITH THE TURTLES" TOURIST ATTRACTIONS ON GREEN SEA TURTLE (CHELONIA MYDAS) HEALTH IN BARBADOS, WEST INDIES.

    Science.gov (United States)

    Stewart, Kimberly; Norton, Terry; Mohammed, Hamish; Browne, Darren; Clements, Kathleen; Thomas, Kirsten; Yaw, Taylor; Horrocks, Julia

    2016-04-01

    Along the West Coast of Barbados a unique relationship has developed between endangered green sea turtles (Chelonia mydas) and humans. Fishermen began inadvertently provisioning these foraging turtles with fish offal discarded from their boats. Although initially an indirect supplementation, this activity became a popular attraction for visitors. Subsequently, demand for this activity increased, and direct supplementation or provisioning with food began. Food items offered included raw whole fish (typically a mixture of false herring [Harengula clupeola] and pilchard [Harengula humeralis]), filleted fish, and lesser amounts of processed food such as hot dogs, chicken, bread, or various other leftovers. Alterations in behavior and growth rates as a result of the provisioning have been documented in this population. The purpose of this study was to determine how tourism-based human interactions are affecting the overall health of this foraging population and to determine what potential health risks these interactions may create for sea turtles. Juvenile green sea turtles (n=29) were captured from four sites off the coast of Barbados, West Indies, and categorized into a group that received supplemental feeding as part of a tour (n=11) or an unsupplemented group (n=18) that consisted of individuals that were captured at sites that did not provide supplemental feeding. Following capture, a general health assessment of each animal was conducted. This included weight and morphometric measurements, a systematic physical examination, determination of body condition score and body condition index, epibiota assessment and quantification, and clinical pathology including hematologic and biochemical testing and nutritional assessments. The supplemented group was found to have changes to body condition, vitamin, mineral, hematologic, and biochemical values. Based on these results, recommendations were made to decrease negative behaviors and health impacts for turtles as a result

  10. The environmental contaminant DDE fails to influence the outcome of sexual differentiation in the marine turtle Chelonia mydas.

    Science.gov (United States)

    Podreka, S; Georges, A; Maher, B; Limpus, C J

    1998-04-01

    In many turtles, the temperature experienced during the middle of egg incubation determines the sex of the offspring. The implication of steroid sex hormones as the proximate trigger for sex determination opens the possibility that endocrine-disrupting contaminants may also influence the outcome of sexual differentiation. In this study we investigate the potential effects of DDE (a common DDT metabolite) on sexual differentiation of Chelonia mydas (green sea turtle). Four clutches of eggs collected from Heron Island, Queensland, Australia, were treated with DDE at the beginning of the thermosensitive period for sexual determination. An incubation temperature of 28 degrees C or less produces male hatchlings in this species, whereas 30 degrees C or more produces female hatchlings. Dosed eggs were consequently incubated at two temperatures (27.6 degrees C and 30.4 degrees C) on the upper and lower boundaries of the sex determination threshold for this species. DDE, ranging from 3.3 to 66.5 microg, was dissolved in 5, 10, and 25 microl ethanol and applied to eggshells above the embryo. Less than 2.5 ng/g DDE was present in eggs prior to dosing. Approximately 34% of the applied DDE was absorbed in the eggs, but only approximately 8% of applied DDE was found in embryos. Thus, treated eggs, corrected for background DDE, had up to 543 ng/g DDE. The sex ratio at these doses did not differ from what would be expected on consideration of temperature alone. Incubation time, hatching success, incidence of body deformities, hatching size, and weight were also within the limits of healthy developed hatchlings. This indicates that the eggs of C. mydas in the wild with concentrations of DDE less than 543 ng/g should produce hatchlings with relatively high hatching success, survival rate, and normally differentiated gonads.

  11. Multinational tagging efforts illustrate regional scale of distribution and threats for east pacific green turtles (Chelonia mydas agassizii.

    Directory of Open Access Journals (Sweden)

    Catherine E Hart

    Full Text Available To further describe movement patterns and distribution of East Pacific green turtles (Chelonia mydas agassizii and to determine threat levels for this species within the Eastern Pacific. In order to do this we combined published data from existing flipper tagging and early satellite tracking studies with data from an additional 12 satellite tracked green turtles (1996-2006. Three of these were tracked from their foraging grounds in the Gulf of California along the east coast of the Baja California peninsula to their breeding grounds in Michoacán (1337-2928 km. In addition, three post-nesting females were satellite tracked from Colola beach, Michoacán to their foraging grounds in southern Mexico and Central America (941.3-3020 km. A further six turtles were tracked in the Gulf of California within their foraging grounds giving insights into the scale of ranging behaviour. Turtles undertaking long-distance migrations showed a tendency to follow the coastline. Turtles tracked within foraging grounds showed that foraging individuals typically ranged up to 691.6 km (maximum from release site location. Additionally, we carried out threat analysis (using the cumulative global human impact in the Eastern Pacific clustering pre-existing satellite tracking studies from Galapagos, Costa Rica, and data obtained from this study; this indicated that turtles foraging and nesting in Central American waters are subject to the highest anthropogenic impact. Considering that turtles from all three rookeries were found to migrate towards Central America, it is highly important to implement conservation plans in Central American coastal areas to ensure the survival of the remaining green turtles in the Eastern Pacific. Finally, by combining satellite tracking data from this and previous studies, and data of tag returns we created the best available distributional patterns for this particular sea turtle species, which emphasized that conservation measures in key

  12. Artisanal Green Turtle, Chelonia mydas, fishery of Caribbean Nicaragua: I. Catch rates and trends, 1991-2011.

    Directory of Open Access Journals (Sweden)

    Cynthia J Lagueux

    Full Text Available This is the first assessment of catch rates for the legal, artisanal green turtle, Chelonia mydas, fishery in Caribbean Nicaragua. Data were collected by community members, monitoring up to 14 landing sites from 1991 to 2011. We examined take levels, and temporal and spatial variability in catch rates for the overall fishery, by region, and community using General Additive Mixed Models (GAMMs. More than 171,556 green turtles were killed during the period, with a mean estimated minimum 8,169±2,182 annually. There was a statistically significant decline in catch rates overall. Catch rates peaked in 1997 and 2002, followed by a downward trend, particularly from mid-2008 to the end of the study period. Similar downward trends were evident in both study regions. Community specific catch rate trends also indicated declines with decreases ranging from 21% to 90%. Decrease in catch rates in Nicaragua is cause for concern even though the principal source rookery at Tortuguero, Costa Rica, shows an increase in nesting activity. Explanations for the apparent discrepancy between the increasing trend at Tortuguero and decreasing catch rate trends in Nicaragua include: i an increase in reproductive output, ii insufficient time has passed to observe the impact of the fishery on the rookery due to a time lag, iii changes in other segments of the population have not been detected since only nesting activity is monitored, iv the expansive northern Nicaragua foraging ground may provide a refuge for a sufficient portion of the Tortuguero rookery, and/or v a larger than expected contribution of non-Tortuguero rookeries occurring in Nicaragua turtle fishing areas. Our results highlight the need for close monitoring of rookeries and in-water aggregations in the Caribbean. Where consumptive use still occurs, nations sharing this resource should implement scientifically based limits on exploitation to ensure sustainability and mitigate impacts to regional population

  13. EFFECTS OF "SWIM WITH THE TURTLES" TOURIST ATTRACTIONS ON GREEN SEA TURTLE (CHELONIA MYDAS) HEALTH IN BARBADOS, WEST INDIES.

    Science.gov (United States)

    Stewart, Kimberly; Norton, Terry; Mohammed, Hamish; Browne, Darren; Clements, Kathleen; Thomas, Kirsten; Yaw, Taylor; Horrocks, Julia

    2016-04-01

    Along the West Coast of Barbados a unique relationship has developed between endangered green sea turtles (Chelonia mydas) and humans. Fishermen began inadvertently provisioning these foraging turtles with fish offal discarded from their boats. Although initially an indirect supplementation, this activity became a popular attraction for visitors. Subsequently, demand for this activity increased, and direct supplementation or provisioning with food began. Food items offered included raw whole fish (typically a mixture of false herring [Harengula clupeola] and pilchard [Harengula humeralis]), filleted fish, and lesser amounts of processed food such as hot dogs, chicken, bread, or various other leftovers. Alterations in behavior and growth rates as a result of the provisioning have been documented in this population. The purpose of this study was to determine how tourism-based human interactions are affecting the overall health of this foraging population and to determine what potential health risks these interactions may create for sea turtles. Juvenile green sea turtles (n=29) were captured from four sites off the coast of Barbados, West Indies, and categorized into a group that received supplemental feeding as part of a tour (n=11) or an unsupplemented group (n=18) that consisted of individuals that were captured at sites that did not provide supplemental feeding. Following capture, a general health assessment of each animal was conducted. This included weight and morphometric measurements, a systematic physical examination, determination of body condition score and body condition index, epibiota assessment and quantification, and clinical pathology including hematologic and biochemical testing and nutritional assessments. The supplemented group was found to have changes to body condition, vitamin, mineral, hematologic, and biochemical values. Based on these results, recommendations were made to decrease negative behaviors and health impacts for turtles as a result

  14. Extension of the Trusted Cloud Domain for the Composite Cloud Process

    Directory of Open Access Journals (Sweden)

    Sameer Rajan

    2012-05-01

    Full Text Available Internet is a "network of networks" that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-opticcables, wireless connections, and other technologies. Cloud computing [1] is a new flavor of computing where our trend of using internet changes. It makes a virtual pool of resources such as storage, CPU,networks and memory to fulfill the user’s resource requirement and provides on demand (pay per use hardware and software services without barriers. It can be named as dynamic computing because itprovides resources, when required. Cloud Computing manages the pool of resources automatically and dynamically through software and hardware. Various businesses form their cloud for the users to providepay per use services. Users are required to access the cloud according to the service. In this way, user can get benefited from the proprietary cloud on cheap prices but it is difficult for the user to find the cloud that can fulfill his demand. It is also not safe for cloud to cloud communication without trust. To resolvesuch difficulties and various other issues, it is required to extend the trusted cloud domain for accessing the compatible services provided by other clouds.

  15. Instrument measures cloud cover

    Science.gov (United States)

    Laue, E. G.

    1981-01-01

    Eight solar sensing cells comprise inexpensive monitoring instrument. Four cells always track Sun while other four face sky and clouds. On overcast day, cloud-irradiance sensors generate as much short-circuit current as Sun sensor cells. As clouds disappear, output of cloud sensors decreases. Ratio of two sensor type outputs determines fractional cloud cover.

  16. Estimating Cloud Cover

    Science.gov (United States)

    Moseley, Christine

    2007-01-01

    The purpose of this activity was to help students understand the percentage of cloud cover and make more accurate cloud cover observations. Students estimated the percentage of cloud cover represented by simulated clouds and assigned a cloud cover classification to those simulations. (Contains 2 notes and 3 tables.)

  17. Utilizing HDF4 File Content Maps for the Cloud

    Science.gov (United States)

    Lee, Hyokyung Joe

    2016-01-01

    We demonstrate a prototype study that HDF4 file content map can be used for efficiently organizing data in cloud object storage system to facilitate cloud computing. This approach can be extended to any binary data formats and to any existing big data analytics solution powered by cloud computing because HDF4 file content map project started as long term preservation of NASA data that doesn't require HDF4 APIs to access data.

  18. A SURVEY ON DE-DUPLICATION IN CLOUD COMPUTING

    OpenAIRE

    Priyadharsini.P; Dhamodran.P; Kavitha.M.S

    2014-01-01

    Cloud computing is an emerging technology for providing infrastructure as a services to cloud users. The infrastructure as a service is based on virtualization where it allocates the virtual machine to user through internet. Virtual machine is a guest machine runs in the environment of host machine. VMI are used to purchase VM instances to run on virtual machine in cloud platforms. The storage of large number of VMI and provisioning remains challenging problem. In this paper, data...

  19. Batch Attribute-Based Encryption for Secure Clouds

    OpenAIRE

    Chen Yang; Yang Sun; Qianhong Wu

    2015-01-01

    Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE) is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only if the associated attributes match the predetermined access policy, which allows one to enforce fin...

  20. A Distributed Approach to Privacy on the Cloud

    OpenAIRE

    Pagano, Francesco

    2015-01-01

    The increasing adoption of Cloud-based data processing and storage poses a number of privacy issues. Users wish to preserve full control over their sensitive data and cannot accept it to be fully accessible to an external storage provider. Previous research in this area was mostly addressed at techniques to protect data stored on untrusted database servers; however, I argue that the Cloud architecture presents a number of specific problems and issues. This dissertation contains a detailed ana...

  1. Building Cloud-based Biometric Services

    OpenAIRE

    Žganec Gros, Jerneja; Bule, Jernej; Štruc, Vitomir; PEER, PETER

    2013-01-01

    Over the next few years the amount of biometric data being at the disposal of various agencies and authentication service providers is expected to grow significantly. Such quantities of data require not only enormous amounts of storage but unprecedented processing power as well. To be able to face this future challenges more and more people are looking towards cloud computing, which can address these challenges quite effectively with its seemingly unlimited storage capacity, ra...

  2. Provenance as First Class Cloud Data

    OpenAIRE

    Muniswamy-Reddy, Kiran-Kumar; Seltzer, Margo I.

    2010-01-01

    Digital provenance is meta-data that describes the ancestry or history of a digital object. Most work on provenance focuses on how provenance increases the value of data to consumers. However, provenance is also valuable to storage providers. For example, provenance can provide hints on access patterns, detect anomalous behavior, and provide enhanced user search capabilities. As the next generation storage providers, cloud vendors are in the unique position to capitalize on this opportunity t...

  3. Growing Cloud Computing Efficiency

    Directory of Open Access Journals (Sweden)

    Dr. Mohamed F. AlAjmi, Dr. Arun Sharma, Shakir Khan

    2012-05-01

    Full Text Available Cloud computing is basically altering the expectation for how and when computing, storage and networking assets should be allocated, managed and devoted. End-users are progressively more sensitive in response time of services they ingest. Service Developers wish for the Service Providers to make sure or give the ability for dynamically assigning and managing resources in respond to alter the demand patterns in real-time. Ultimately, Service Providers are under anxiety to build their infrastructure to facilitate real-time end-to-end visibility and energetic resource management with well grained control to decrease total cost of tenure for improving quickness. What is required to rethink of the underlying operating system and management infrastructure to put up the on-going renovation of data centre from the traditional server-centric architecture model to a cloud or network centric model? This paper projects and describes a indication model for a network centric data centre infrastructure management heap that make use of it and validates key ideas that have enabled dynamism, the quality of being scalable, reliability and security in the telecommunication industry to the computing engineering. Finally, the paper will explain a proof of concept classification that was implemented to show how dynamic resource management can be enforced to enable real-time service guarantee for network centric data centre architecture.

  4. Cloud Computing (4)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ 8 Case Study Cloud computing is still a new phenomenon. Although many IT giants are developing their own cloud computing infrastructures,platforms, software, and services, few have really succeeded in becoming cloud computing providers.

  5. Blue skies for CLOUD

    CERN Multimedia

    2006-01-01

    Through the recently approved CLOUD experiment, CERN will soon be contributing to climate research. Tests are being performed on the first prototype of CLOUD, an experiment designed to assess cosmic radiation influence on cloud formation.

  6. Cloud Computing and Its Applications in GIS

    Science.gov (United States)

    Kang, Cao

    2011-12-01

    of cloud computing. This paper presents a parallel Euclidean distance algorithm that works seamlessly with the distributed nature of cloud computing infrastructures. The mechanism of this algorithm is to subdivide a raster image into sub-images and wrap them with a one pixel deep edge layer of individually computed distance information. Each sub-image is then processed by a separate node, after which the resulting sub-images are reassembled into the final output. It is shown that while any rectangular sub-image shape can be used, those approximating squares are computationally optimal. This study also serves as a demonstration of this subdivide and layer-wrap strategy, which would enable the migration of many truly spatial GIS algorithms to cloud computing infrastructures. However, this research also indicates that certain spatial GIS algorithms such as cost distance cannot be migrated by adopting this mechanism, which presents significant challenges for the development of cloud-based GIS systems. The third article is entitled "A Distributed Storage Schema for Cloud Computing based Raster GIS Systems". This paper proposes a NoSQL Database Management System (NDDBMS) based raster GIS data storage schema. NDDBMS has good scalability and is able to use distributed commodity computers, which make it superior to Relational Database Management Systems (RDBMS) in a cloud computing environment. In order to provide optimized data service performance, the proposed storage schema analyzes the nature of commonly used raster GIS data sets. It discriminates two categories of commonly used data sets, and then designs corresponding data storage models for both categories. As a result, the proposed storage schema is capable of hosting and serving enormous volumes of raster GIS data speedily and efficiently on cloud computing infrastructures. In addition, the scheme also takes advantage of the data compression characteristics of Quadtrees, thus promoting efficient data storage. Through

  7. Cloud Based Educational Systems and Its Challenges and Opportunities and Issues

    Science.gov (United States)

    Paul, Prantosh Kr.; Lata Dangwal, Kiran

    2014-01-01

    Cloud Computing (CC) is actually is a set of hardware, software, networks, storage, services an interface combines to deliver aspects of computing as a service. Cloud Computing (CC) actually uses the central remote servers to maintain data and applications. Practically Cloud Computing (CC) is extension of Grid computing with independency and…

  8. Feasibility Analysis of Critical Factors Affecting Cloud Computing in Nigeria

    Directory of Open Access Journals (Sweden)

    Eustace Manayi Dogo

    2013-10-01

    Full Text Available Cloud computing is an evolving and new way of delivering computing services and resources over the internet which are managed by third parties at remote sites. Cloud computing is based on existing technologies like web services, Service Oriented Architecture (SOA, web3.0, grid computing and virtualization, etc. Computing services includes data storage, processing and software. Cloud computing is enjoying a lot of buzz in Nigeria due to its perceived economic and operational benefits and stakeholders believe that it will transform the IT industry in Nigeria. Despite all its promises there still exist so many challenges before Cloud computing see the light of the day in Nigeria. This paper delivers an overview of Cloud computing together with its advantages and disadvantages. Thereafter, the challenges and drivers affecting the adoption of Cloud computing in Nigeria are outlined. Finally, recommendations for the adoption of Cloud computing is discussed with Nigeria as a case study.

  9. Silicon Photonics Cloud (SiCloud)

    DEFF Research Database (Denmark)

    DeVore, P. T. S.; Jiang, Y.; Lynch, M.;

    2015-01-01

    Silicon Photonics Cloud (SiCloud.org) is the first silicon photonics interactive web tool. Here we report new features of this tool including mode propagation parameters and mode distribution galleries for user specified waveguide dimensions and wavelengths.......Silicon Photonics Cloud (SiCloud.org) is the first silicon photonics interactive web tool. Here we report new features of this tool including mode propagation parameters and mode distribution galleries for user specified waveguide dimensions and wavelengths....

  10. TRUSTED CLOUD COMPUTING FRAMEWORK FOR HEALTHCARE SECTOR

    Directory of Open Access Journals (Sweden)

    Mervat Adib Bamiah

    2014-01-01

    Full Text Available Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness, availability and elasticity. Healthcare organizations and consumers lose control when they outsource their sensitive data and computing resources to a third party Cloud Service Provider (CSP, which may raise security and privacy concerns related to data loss and misuse appealing threats. Lack of consumers’ knowledge about their data storage location may lead to violating rules and regulations of Health Insurance Portability and Accountability Act (HIPAA that can cost them huge penalty. Fear of data breach by internal or external hackers may decrease consumers’ trust in adopting cloud computing and benefiting from its promising features. We designed a Healthcare Trusted Cloud Computing (HTCC framework that maintains security, privacy and considers HIPAA regulations. HTCC framework deploys Trusted Computing Group (TCG technologies such as Trusted Platform Module (TPM, Trusted Software Stack (TSS, virtual Trusted Platform Module (vTPM, Trusted Network Connect (TNC and Self Encrypting Drives (SEDs. We emphasize on using strong multi-factor authentication access control mechanisms and strict security controls, as well as encryption for data at storage, in-transit and while process. We contributed in customizing a cloud Service Level Agreement (SLA by considering healthcare requirements. HTCC was evaluated by comparing with previous researchers’ work and conducting survey from experts. Results were satisfactory and showed acceptance of the framework. We aim that our proposed framework will assist in optimizing trust on cloud computing to be adopted in healthcare sector.

  11. Interoperating Cloud-based Virtual Farms

    Science.gov (United States)

    Bagnasco, S.; Colamaria, F.; Colella, D.; Casula, E.; Elia, D.; Franco, A.; Lusso, S.; Luparello, G.; Masera, M.; Miniello, G.; Mura, D.; Piano, S.; Vallero, S.; Venaruzzo, M.; Vino, G.

    2015-12-01

    The present work aims at optimizing the use of computing resources available at the grid Italian Tier-2 sites of the ALICE experiment at CERN LHC by making them accessible to interactive distributed analysis, thanks to modern solutions based on cloud computing. The scalability and elasticity of the computing resources via dynamic (“on-demand”) provisioning is essentially limited by the size of the computing site, reaching the theoretical optimum only in the asymptotic case of infinite resources. The main challenge of the project is to overcome this limitation by federating different sites through a distributed cloud facility. Storage capacities of the participating sites are seen as a single federated storage area, preventing the need of mirroring data across them: high data access efficiency is guaranteed by location-aware analysis software and storage interfaces, in a transparent way from an end-user perspective. Moreover, the interactive analysis on the federated cloud reduces the execution time with respect to grid batch jobs. The tests of the investigated solutions for both cloud computing and distributed storage on wide area network will be presented.

  12. Where the Cloud Meets the Commons

    Science.gov (United States)

    Ipri, Tom

    2011-01-01

    Changes presented by cloud computing--shared computing services, applications, and storage available to end users via the Internet--have the potential to seriously alter how libraries provide services, not only remotely, but also within the physical library, specifically concerning challenges facing the typical desktop computing experience.…

  13. Automatic Cloud Bursting under FermiCloud

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Hao [Fermilab; Shangping, Ren [IIT; Garzoglio, Gabriele [Fermilab; Timm, Steven [Fermilab; Bernabeu, Gerard [Fermilab; Kim, Hyun Woo; Chadwick, Keith; Jang, Haengjin [KISTI, Daejeon; Noh, Seo-Young [KISTI, Daejeon

    1900-01-01

    Cloud computing is changing the infrastructure upon which scientific computing depends from supercomputers and distributed computing clusters to a more elastic cloud-based structure. The service-oriented focus and elasticity of clouds can not only facilitate technology needs of emerging business but also shorten response time and reduce operational costs of traditional scientific applications. Fermi National Accelerator Laboratory (Fermilab) is currently in the process of building its own private cloud, FermiCloud, which allows the existing grid infrastructure to use dynamically provisioned resources on FermiCloud to accommodate increased but dynamic computation demand from scientists in the domains of High Energy Physics (HEP) and other research areas. Cloud infrastructure also allows to increase a private cloud’s resource capacity through “bursting” by borrowing or renting resources from other community or commercial clouds when needed. This paper introduces a joint project on building a cloud federation to support HEP applications between Fermi National Accelerator Laboratory and Korea Institution of Science and Technology Information, with technical contributions from the Illinois Institute of Technology. In particular, this paper presents two recent accomplishments of the joint project: (a) cloud bursting automation and (b) load balancer. Automatic cloud bursting allows computer resources to be dynamically reconfigured to meet users’ demands. The load balance algorithm which the cloud bursting depends on decides when and where new resources need to be allocated. Our preliminary prototyping and experiments have shown promising success, yet, they also have opened new challenges to be studied

  14. Cloud Based Gateway Clustering of Cloud Data Retrieval with GCD Recovery Scheme

    Directory of Open Access Journals (Sweden)

    Shanthi.P

    2013-10-01

    Full Text Available Different parallelization approaches are available to cluster the computers and to scale the data and resources. With them, parallel clustering mechanism is used to faster the computation time of dataaccess with minimal cost. But, this mechanism is not feasible for efficient data retrieve over cloud environment and is not provided with fault tolerant design. The proposed paper attempts to develop data scalability in a cloud environment by implementing Cloud based Gateway Clustering (CBGC mechanism with fault tolerant design. The Client accesses the data from the cloud using Cloud core storage gateway, which is an API. This paper proposes a core gateway which is divided into multiple sub virtual gateways to improve the data access speed. Also an enhanced Gateway Cut Detection (GCD Algorithm is proposed to detect and recover sub-gateway failures and make sub- gateways to be available throughout the communication. The proposed CBGC mechanism with GCD is highly scalable and reliable to cloudresources.

  15. Electron cloud observations: a retrospective

    International Nuclear Information System (INIS)

    A growing number of observations of electron cloud effects (ECEs) have been reported in positron and proton rings. Low-energy, background electrons ubiquitous in high-intensity particle accelerators. Amplification of electron cloud (EC) can occur under certain operating conditions, potentially giving rise to numerous effects that can seriously degrade accelerator performance. EC observations and diagnostics have contributed to a better understanding of ECEs, in particular, details of beam-induced multipacting and cloud saturation effects. Such experimental results can be used to provide realistic limits on key input parameters for modeling efforts and analytical calculations to improve prediction capability. Electron cloud effects are increasingly important phenomena in high luminosity, high brightness, or high intensity machines - Colliders, Storage rings, Damping rings, Heavy ion beams. EC generation and instability modeling increasingly complex and benchmarked against in situ data: (delta), (delta)0, photon reflectivity, and SE energy distributions important. Surface conditioning and use of solenoidal windings in field-free regions are successful cures: will they be enough? What are new observations and how do they contribute to body of work and understanding physics of EC?

  16. ENHANCING SECURITY OF CLOUD DATA FROM DATA MINING BASED ON FULLY HOMOMORPHIC ENCRYPTION

    OpenAIRE

    Aachal R. Borkar*, Prof. Vijay Bagdi

    2016-01-01

    The advancement in technology, industry, e-commerce and research. A large amount of complex and pervasive digital data is being generated which is increasing at an exponential rate and often termed as Big data. For analyze and handling such big data various tools are available .The cloud computing is resolved for the problems arises in big data storage. Data security is major issues in the cloud can be enhance by fully homomorphic encryption technique. As the cloud, data storage can be manage...

  17. SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Amina AIT OUAHMAN

    2014-10-01

    Full Text Available Today, cloud computing is defined and talked about across the ICT industry under different contexts and with different definitions attached to it. It is a new paradigm in the evolution of Information Technology, as it is one of the biggest revolutions in this field to have taken place in recent times. According to the National Institute for Standards and Technology (NIST, “cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction” [1]. The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. A study by Gartner [2] considered Cloud Computing as the first among the top 10 most important technologies and with a better prospect in successive years by companies and organizations. Clouds bring out tremendous benefits for both individuals and enterprises. Clouds support economic savings, outsourcing mechanisms, resource sharing, any-where any-time accessibility, on-demand scalability, and service flexibility. Clouds minimize the need for user involvement by masking technical details such as software upgrades, licenses, and maintenance from its customers. Clouds could also offer better security advantages over individual server deployments. Since a cloud aggregates resources, cloud providers charter expert security personnel while typical companies could be limited with a network administrator who might not be well versed in cyber security issues. The new concepts introduced by the clouds, such as computation outsourcing, resource sharing, and external data warehousing, increase the security and privacy concerns and create new security challenges. Moreover, the large scale of the clouds, the proliferation of mobile access devices (e

  18. Bioinformatics clouds for big data manipulation

    KAUST Repository

    Dai, Lin

    2012-11-28

    As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS), Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), and present our perspectives on the adoption of cloud computing in bioinformatics.This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor. 2012 Dai et al.; licensee BioMed Central Ltd.

  19. Bioinformatics clouds for big data manipulation

    Directory of Open Access Journals (Sweden)

    Dai Lin

    2012-11-01

    Full Text Available Abstract As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS, Software as a Service (SaaS, Platform as a Service (PaaS, and Infrastructure as a Service (IaaS, and present our perspectives on the adoption of cloud computing in bioinformatics. Reviewers This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor.

  20. Cloud computing and digital media fundamentals, techniques, and applications

    CERN Document Server

    Li, Kuan-Ching; Shih, Timothy K

    2014-01-01

    Cloud Computing and Digital Media: Fundamentals, Techniques, and Applications presents the fundamentals of cloud and media infrastructure, novel technologies that integrate digital media with cloud computing, and real-world applications that exemplify the potential of cloud computing for next-generation digital media. It brings together technologies for media/data communication, elastic media/data storage, security, authentication, cross-network media/data fusion, interdevice media interaction/reaction, data centers, PaaS, SaaS, and more.The book covers resource optimization for multimedia clo

  1. Design Private Cloud of Oil and Gas SCADA System

    Directory of Open Access Journals (Sweden)

    Liu Miao

    2014-05-01

    Full Text Available SCADA (Supervisory Control and Data Acquisition system is computer control system based on supervisory. SCADA system is very important to oil and gas pipeline engineering. Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated, managed and consumed. In order to increase resource utilization, reliability and availability of oil and gas pipeline SCADA system, the SCADA system based on cloud computing is proposed in the paper. This paper introduces the system framework of SCADA system based on cloud computing and the realization details about the private cloud platform of SCADA system.

  2. Cloud security - An approach with modern cryptographic solutions

    OpenAIRE

    KOSTADINOVSKA, IVANA

    2016-01-01

    The term “cloud computing” has been in the spotlights of IT specialists due to its potential of transforming computer industry. Unfortunately, there are still some challenges to be resolved and the security aspects in the cloud based computing environment remain at the core of interest. The goal of our work is to identify the main security issues of cloud computing and to present approaches to secure clouds. Our research also focuses on data and storage security layers. As a result, we f...

  3. Telemedicine Based on Mobile Devices and Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Lidong Wang

    2014-04-01

    Full Text Available Mobile devices such as smartphones and tablets support kinds of mobile computing and services. They can access to the cloud or offload the computation-intensive part to the cloud computing resources. Mobile cloud computing (MCC integrates the cloud computing into the mobile environment, which extends mobile devices’ battery lifetime, improves their data storage capacity and processing power, and improves their reliability and information security. In this paper, the applications of smartphones in telemedicine and MCC-based telemedicine were presented. Issues on the information security of smartphones and tablets, challenges of smartphones in telemedicine and challenges of MCC-based telemedicine were also introduced.

  4. Cloud Computing (2)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ Editor's Desk: Cloud computing is a topic of intense interest in the Internet field. Major IT giants have launched their own cloud computing products. This four-part lecture series discusses cloud computing technology in the following aspects: The first part provided a brief description of the origin and characteristics of cloud computing from the users view of point; the other parts introduce typical applications of cloud computing, technically analyze the specific content within the cloud, its components, architecture and computational paradigm, compare cloud computing to other distributed computing technologies, and discuss its successful cases, commercial models, related technical and economic issues, and development trends.

  5. Cloud Computing (1)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ Editor's Desk: Cloud computing is a topic of intense interest in the Internet field. Major IT giants have launched their own cloud computing products. This four-part lecture series will discuss cloud computing technology in the following aspects: The first part provides a brief description of the origin and characteristics of cloud computing from the users view of point; the other parts introduce typical applications of cloud computing, technically analyze the specific content within the cloud, its components, architecture and computational paradigm, compare cloud computing to other distributed computing technologies, and discuss its successful cases, commercial models, related technical and economic issues, and development trends.

  6. Crushing data silos with ownCloud

    CERN Document Server

    CERN. Geneva

    2013-01-01

    More and more people store their personal files and documents in cloud services like Dropbox, Google Drive, Skydrive or iCloud. The reason is that they provide convenient features to sync your files between devices and share them with others. We are heading full speed into a future where a huge piece of the personal information of the world is stored in very few centralized services. Questions emerge what the impact on user privacy, surveillance, lawfulness of content and storage cost will be in in the long run. I don't think that a world where most of the personal data of the world is stored on servers of a hand full companies is a good one. This talk will discuss the problems of a future with centralized cloud file sync and share services and will present ownCloud as a possible solution. ownCloud is a free software project that offers a decentralized alternative to proprietary cloud services where everybody can run an own cloud service comparable with Dropbox but on own hardware and with full ...

  7. Cloud Computing (3)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ Editor's Desk: In the preceding two parts of this series, several aspects of cloud computing-including definition, classification, characteristics, typical applications, and service levels-were discussed. This part continues with a discussion of Cloud Computing Oopen Architecture and Market-Oriented Cloud. A comparison is made between cloud computing and other distributed computing technologies, and Google's cloud platform is analyzed to determine how distributed computing is implemented in its particular model.

  8. The CLOUD experiment

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The Cosmics Leaving Outdoor Droplets (CLOUD) experiment as shown by Jasper Kirkby (spokesperson). Kirkby shows a sketch to illustrate the possible link between galactic cosmic rays and cloud formations. The CLOUD experiment uses beams from the PS accelerator at CERN to simulate the effect of cosmic rays on cloud formations in the Earth's atmosphere. It is thought that cosmic ray intensity is linked to the amount of low cloud cover due to the formation of aerosols, which induce condensation.

  9. Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach

    OpenAIRE

    Damiani, E; Pagano, F

    2010-01-01

    Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for multiuser databases. Users, however, are very diffident for not having full control over their sensitive data. Untrusted database-as-a-server techniques are neither readily extendable to the cloud environment nor easily understandable by non-tec...

  10. Like Open Source, Cloud Hides in Plain Sight

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ I came across an article in InfoWorld about a survey that TheInfoPro conducted among Fortune 1000 firms regarding their use of public cloud storage offerings.The bottom line: they haven't, they aren't, and they won't.Eightyseven percent of respondents stated they have no plans to use public storage-as-a-service, while only 10% say that they will.Clearly, the survey indicates this market segment has no use for cloud storage.

  11. The Ozobranchus leech is a candidate mechanical vector for the fibropapilloma-associated turtle herpesvirus found latently infecting skin tumors on Hawaiian green turtles (Chelonia mydas)

    International Nuclear Information System (INIS)

    Fibropapillomatosis (FP) of marine turtles is a neoplastic disease of ecological concern. A fibropapilloma-associated turtle herpesvirus (FPTHV) is consistently present, usually at loads exceeding one virus copy per tumor cell. DNA from an array of parasites of green turtles (Chelonia mydas) was examined with quantitative PCR (qPCR) to determine whether any carried viral loads are sufficient to implicate them as vectors for FPTHV. Marine leeches (Ozobranchus spp.) were found to carry high viral DNA loads; some samples approached 10 million copies per leech. Isopycnic sucrose density gradient/qPCR analysis confirmed that some of these copies were associated with particles of the density of enveloped viruses. The data implicate the marine leech Ozobranchus as a mechanical vector for FPTHV. Quantitative RT-PCR analysis of FPTHV gene expression indicated that most of the FPTHV copies in a fibropapilloma have restricted DNA polymerase expression, suggestive of latent infection

  12. Green turtles (Chelonia mydas) foraging at Arvoredo Island in Southern Brazil: Genetic characterization and mixed stock analysis through mtDNA control region haplotypes.

    Science.gov (United States)

    Proietti, Maíra Carneiro; Lara-Ruiz, Paula; Reisser, Júlia Wiener; da Silva Pinto, Luciano; Dellagostin, Odir Antonio; Marins, Luis Fernando

    2009-07-01

    We analyzed mtDNA control region sequences of green turtles (Chelonia mydas) from Arvoredo Island, a foraging ground in southern Brazil, and identified eight haplotypes. Of these, CM-A8 (64%) and CM-A5 (22%) were dominant, the remainder presenting low frequencies (Rocas/Noronha, in Brazil (p > 0.05). Mixed Stock Analysis, incorporating eleven Atlantic and one Mediterranean rookery as possible sources of individuals, indicated Ascension and Aves islands as the main contributing stocks to the Arvoredo aggregation (68.01% and 22.96%, respectively). These results demonstrate the extensive relationships between Arvoredo Island and other Atlantic foraging and breeding areas. Such an understanding provides a framework for establishing adequate management and conservation strategies for this endangered species. PMID:21637527

  13. Hematological and histopathological evaluation of wildlife green turtles (Chelonia mydas with and without fibropapilloma from the north coast of São Paulo State, Brazil

    Directory of Open Access Journals (Sweden)

    Ticiana Zwarg

    2014-07-01

    Full Text Available Blood profiles were determined in 47 juvenile green turtles, Chelonia mydas, from São Paulo northern coast, Brazil. Twenty-nine were affected by fibropapillomas and 18 were tumor free. Complete gross and histopathologic examinations of the fibropapillo were performed in 21 green turtles. Biometrical data, size, location and amount of tumors were recorded. The papillomas varied in morphology, location, size, color and texture. We found hyperplastic stroma, rich in blood vessels and connective tissue with increase in thickness of the dermis. The tumors w0ere classified as papillomas or fibropapillomas according to their epithelial and/or stromal proliferation. The lowest Mean Corpuscular Hemoglobin (HCM values were observed in affected turtles.

  14. Green turtles (Chelonia mydas foraging at Arvoredo Island in Southern Brazil: genetic characterization and mixed stock analysis through mtDNA control region haplotypes

    Directory of Open Access Journals (Sweden)

    Maíra Carneiro Proietti

    2009-01-01

    Full Text Available We analyzed mtDNA control region sequences of green turtles (Chelonia mydas from Arvoredo Island, a foraging ground in southern Brazil, and identified eight haplotypes. Of these, CM-A8 (64% and CM-A5 (22% were dominant, the remainder presenting low frequencies ( 0.05. Mixed Stock Analysis, incorporating eleven Atlantic and one Mediterranean rookery as possible sources of individuals, indicated Ascension and Aves islands as the main contributing stocks to the Arvoredo aggregation (68.01% and 22.96%, respectively. These results demonstrate the extensive relationships between Arvoredo Island and other Atlantic foraging and breeding areas. Such an understanding provides a framework for establishing adequate management and conservation strategies for this endangered species.

  15. The Ozobranchus leech as a mechanical vector for the fibropapilloma-associated turtle herpes virus found latently infecting skin tumors on Hawaiian green turtles (Chelonia mydas)

    Science.gov (United States)

    Greenblatt, R.J.; Work, T.M.; Balazs, G.; Sutton, C.A.; Casey, R.N.; Casey, J.W.

    2004-01-01

    Fibropapillomatosis (FP) of marine turtles is a neoplastic disease of ecological concern. A fibropapilloma-associated turtle herpesvirus (FPTHV) is consistently present, usually at loads exceeding one virus copy per tumor cell. DNA from an array of parasites of green turtles (Chelonia mydas) was examined with quantitative PCR (qPCR) to determine whether any carried viral loads are sufficient to implicate them as vectors for FPTHV. Marine leeches (Ozobranchus spp.) were found to carry high viral DNA loads; some samples approached 10 million copies per leech. Isopycnic sucrose density gradient/qPCR analysis confirmed that some of these copies were associated with particles of the density of enveloped viruses. The data implicate the marine leech Ozobranchus as a mechanical vector for FPTHV. Quantitative RT-PCR analysis of FPTHV gene expression indicated that most of the FPTHV copies in a fibropapilloma have restricted DNA polymerase expression, suggestive of latent infection.

  16. Data Classification Based on Confidentiality in Virtual Cloud Environment

    Directory of Open Access Journals (Sweden)

    Munwar Ali Zardari

    2014-10-01

    Full Text Available The aim of this study is to provide suitable security to data based on the security needs of data. It is very difficult to decide (in cloud which data need what security and which data do not need security. However it will be easy to decide the security level for data after data classification according to their security level based on the characteristics of the data. In this study, we have proposed a data classification cloud model to solve data confidentiality issue in cloud computing environment. The data are classified into two major classes: sensitive and non-sensitive. The K-Nearest Neighbour (K-NN classifier is used for data classification and the Rivest, Shamir and Adelman (RSA algorithm is used to encrypt sensitive data. After implementing the proposed model, it is found that the confidentiality level of data is increased and this model is proved to be more cost and memory friendly for the users as well as for the cloud services providers. The data storage service is one of the cloud services where data servers are virtualized of all users. In a cloud server, the data are stored in two ways. First encrypt the received data and store on cloud servers. Second store data on the cloud servers without encryption. Both of these data storage methods can face data confidentiality issue, because the data have different values and characteristics that must be identified before sending to cloud severs.

  17. Relationship between cloud radiative forcing, cloud fraction and cloud albedo, and new surface-based approach for determining cloud albedo

    OpenAIRE

    Liu, Y; Wu, W.; Jensen, M. P.; T. Toto

    2011-01-01

    This paper focuses on three interconnected topics: (1) quantitative relationship between surface shortwave cloud radiative forcing, cloud fraction, and cloud albedo; (2) surfaced-based approach for measuring cloud albedo; (3) multiscale (diurnal, annual and inter-annual) variations and covariations of surface shortwave cloud radiative forcing, cloud fraction, and cloud albedo. An analytical expression is first derived to quantify the relationship between cloud radiative forcing, cloud fractio...

  18. Características de la anidación de la tortuga verde Chelonia mydas (Testudinata, Cheloniidae en la playa Caleta de los Piojos, Cuba, a partir de marcaciones externas

    Directory of Open Access Journals (Sweden)

    Ferrer Sánchez, Y.

    2007-12-01

    Full Text Available Nesting characteristics of the Green turtle Chelonia mydas (Testudinata, Cheloniidae at Caleta de los Piojos Beach, Cuba, determined from tagging studies Green turtle (Chelonia mydas females nesting during 2002 and 2003 nesting seasons at Caleta de los Piojos Beach, Cuba, were studied using data from individual tagging. Nesting occurred on average twice per season with a mean interval of 10.9 days. A high number of turtles nested only once per season (39% and 40% respectively. The percentage of failed multiple nesting attempts was high in both seasons. However, the percentage of failed attempts prior to the first nesting was higher in the 2003 season. Vegetation areas seem to be the most suitable sites for nesting and have a significant effect on nest-site selection behaviour. Fidelity to first nest-site was high, 50.3% and 72.9% respectively for 2002 and 2003. Observed mean clutch size (117 eggs was closely related to body dimensions.

  19. A Swarm Intelligence Based Model for Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ahmed S. Salama

    2015-01-01

    Full Text Available Mobile Computing (MC provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC. MCC aims at using cloud computing techniques for storage and processing of data on mobile devices, thereby reducing their limitations. This paper proposes architecture for a Swarm Intelligence Based Mobile Cloud Computing Model (SIBMCCM. A model that uses a proposed Parallel Particle Swarm Optimization (PPSO algorithm to enhance the access time for the mobile cloud computing services which support different E Commerce models and to better secure the communication through the mobile cloud and the mobile commerce transactions.

  20. Automated Grid Monitoring for LHCb through HammerCloud

    CERN Document Server

    CERN. Geneva

    2015-01-01

    The HammerCloud system is used by CERN IT to monitor the status of the Worldwide LHC Computing Grid (WLCG). HammerCloud automatically submits jobs to WLCG computing resources, closely replicating the workflow of Grid users (e.g. physicists analyzing data). This allows computation nodes and storage resources to be monitored, software to be tested (somewhat like continuous integration), and new sites to be stress tested with a heavy job load before commissioning. The HammerCloud system has been in use for ATLAS and CMS experiments for about five years. This summer's work involved porting the HammerCloud suite of tools to the LHCb experiment. The HammerCloud software runs functional tests and provides data visualizations. HammerCloud's LHCb variant is written in Python, using the Django web framework and Ganga/DIRAC for job management.

  1. ABOUT THE SUITABILITY OF CLOUDS IN HIGH-PERFORMANCE COMPUTING

    Directory of Open Access Journals (Sweden)

    Harald Richter

    2016-01-01

    Full Text Available Cloud computing has become the ubiquitous computing and storage paradigm. It is also attractive for scientists, because they do not have to care any more for their own IT infrastructure, but can outsource it to a Cloud Service Provider of their choice. However, for the case of High-Performance Computing (HPC in a cloud, as it is needed in simulations or for Big Data analysis, things are getting more intricate, because HPC codes must stay highly efficient, even when executed by many virtual cores (vCPUs. Older clouds or new standard clouds can fulfil this only under special precautions, which are given in this article. The results can be extrapolated to other cloud OSes than OpenStack and to other codes than OpenFOAM, which were used as examples.

  2. Secure cloud computing

    CERN Document Server

    Jajodia, Sushil; Samarati, Pierangela; Singhal, Anoop; Swarup, Vipin; Wang, Cliff

    2014-01-01

    This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters addres

  3. ownCloud project at CNRS

    CERN Document Server

    CERN. Geneva

    2014-01-01

    CNRS will launch next November an ownCloud based service with the intend to serve CNRS research units. The first step is to deploy this service as a beta solution for 2 months and 2 000 end users, and then to generalize this offer to the whole CNRS users (potentialy 100 000 users). Our platform is based on ownCloud 7 community edition, with VMWare for virtualization, a Galera/MariaDB cluster database and Scality for the distributed storage backend. We will try to present during this workshop our service implementation in detail, and discuss about our choices, our concerns, … our troubles :)

  4. In the clouds

    NARCIS (Netherlands)

    Wassink, J.

    2012-01-01

    Clouds always used to be the least understood element of the weather system, but that is rapidly changing . Computer clouds increasingly correspond with those in the sky, which promises weather forecasts at street level and more accurate climate scenarios.

  5. Study and Analysis of Data Sharing and Communication with Multiple Cloud Environments

    Directory of Open Access Journals (Sweden)

    Ms. Shikha Joshi ,Ms. Pallavi Jain

    2012-12-01

    Full Text Available Cloud storage enables users to access their data anywhere and at any time. It achieves the dream of getting computing, storage and communication resources as easy as to get water and electricity. All resources can be gotten in a plug-andplay way. It has the advantages of high scalability, ease-ofuse, cost-effectiveness and simplifying infrastructure planning etc. However, the emerging use of cloud storage has led to the problem of verifying that storage server indeed store the data. When users store their data in cloud storage, they mostly concern about whether the data is intact. In this paper we propose an efficient approach for making cloud data management and sharing in a secure manner. For this we mainly concentrate on six different security majors which are Confidentiality, Availability, Integrity, Possession, Authenticity and Utility. We implement these phenomena in java. We also present a graph comparison to show the betterment of our result.

  6. Computer animation of clouds

    Energy Technology Data Exchange (ETDEWEB)

    Max, N.

    1994-01-28

    Computer animation of outdoor scenes is enhanced by realistic clouds. I will discuss several different modeling and rendering schemes for clouds, and show how they evolved in my animation work. These include transparency-textured clouds on a 2-D plane, smooth shaded or textured 3-D clouds surfaces, and 3-D volume rendering. For the volume rendering, I will present various illumination schemes, including the density emitter, single scattering, and multiple scattering models.

  7. Cloud computing strategies

    CERN Document Server

    Chorafas, Dimitris N

    2011-01-01

    A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy. Based on extensive research, it examines the opportunities and challenges that loom in the cloud. It explains exactly what cloud computing is, what it has to offer, and calls attention to the important issues management needs to consider before passing the point of no return regarding financial commitments.

  8. Virtualizace a cloud computing

    OpenAIRE

    Davídek, Michal

    2013-01-01

    The aim of this diploma thesis are current computing technologies known as Cloud computing. Main goal is to compare technologies and Cloud services provided by companies nowadays. During this thesis will be proven or not, that usage of Cloud technologies can save company finance due to optimized data management, effective backups, license administration or management of computing resources for single applications/users. Final part will present recommendations for Cloud Service providers or en...

  9. Governmental Cloud - Part of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Cristian IVANUS

    2014-01-01

    Full Text Available Large IT (Information Technology companies propose cloud government's (G-Cloud development model through investment from the private sector, which will facilitate the access of users from public sector to the new generation IT services. Through the G-Cloud private operators that operate governmental cloud infrastructure by adding specific SaaS (Software as a Service functionalities, proposed model by big companies, supports public institutions in optimizing costs and increased operational efficiency, bringing tangible benefits in relation with citizens and thus with the whole society. These optimizations are achieved by moving the initial investment to the private sector, through type subscription model cost by eliminating dependency on human factors (technical and by providing a low cost [1]. This paper aims to bring to the attention of specialists, some aspects of Governmental Cloud from the European Union (EU countries to be understood and implemented in Romania.

  10. Public Auditing and Data Dynamics in Cloud with Performance Assessment on Third Party Auditor

    DEFF Research Database (Denmark)

    P. Sawant, Snehal; Deshmukh, Aaradhana A.; Mihovska, Albena Dimitrova;

    2016-01-01

    Cloud computing allows the user to outsource their computation and storage overhead to a public cloud, managed by cloud service providers. Data stored in the cloud may reside on remotely servers and this raises security issues. This paper addresses the issue of data storage integrity. The scheme...... presented in this paper uses the concept of an external Third Party Auditor (TPA). TPA is an external party who is going to perform integrity verification of the user’s data on behalf of the user. The proposed scheme assures integrity verification with a dynamic data support, to ensure that changes made...

  11. Security in the cloud.

    Science.gov (United States)

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  12. On CLOUD nine

    CERN Multimedia

    2009-01-01

    The team from the CLOUD experiment - the world’s first experiment using a high-energy particle accelerator to study the climate - were on cloud nine after the arrival of their new three-metre diameter cloud chamber. This marks the end of three years’ R&D and design, and the start of preparations for data taking later this year.

  13. Cloud Computing Explained

    Science.gov (United States)

    Metz, Rosalyn

    2010-01-01

    While many talk about the cloud, few actually understand it. Three organizations' definitions come to the forefront when defining the cloud: Gartner, Forrester, and the National Institutes of Standards and Technology (NIST). Although both Gartner and Forrester provide definitions of cloud computing, the NIST definition is concise and uses…

  14. Cloud Oriented Applications

    OpenAIRE

    Razvan DINA

    2009-01-01

    Cloud computing is a paradigm that incorporates the concept of software as a service. The current cloud computing architecture involves the existence of data centers that are able to provide services to the clients located all over the world. The major players in field of the cloud computing are Google, Microsoft, Amazon, Yahoo, and some traditional hardware producers like HP, IBM, Intel.

  15. Introduction to Cloud Computing

    OpenAIRE

    Conway, Gerry

    2011-01-01

    This paper describes cloud computing, its main characteristics and the models that are currently used for both deployment and delivery. It examines the benefits and business issues with using the cloud, and how they can be addressed. It describes some of the early adapters of cloud computing, together with their experiences.

  16. On clocks and clouds

    Directory of Open Access Journals (Sweden)

    M. K. Witte

    2013-09-01

    Full Text Available Cumulus clouds exhibit a life cycle that consists of: (a the growth phase (increasing size, most notably in the vertical direction; (b the mature phase (growth ceases; any precipitation that develops is strongest during this period; and (c the dissipation phase (cloud dissipates because of precipitation and/or entrainment; no more dynamical support. Although radar can track clouds over time and give some sense of the age of a cloud, most aircraft in situ measurements lack temporal context. We use large eddy simulations of trade wind cumulus cloud fields from cases during the Barbados Oceanographic and Meteorological Experiment (BOMEX and Rain In Cumulus over the Ocean (RICO campaigns to demonstrate a potential cumulus cloud "clock". We find that the volume-averaged total water mixing ratio rt is a useful cloud clock for the 12 clouds studied. A cloud's initial rt is set by the subcloud mixed-layer mean rt and decreases monotonically from the initial value due primarily to entrainment. The clock is insensitive to aerosol loading, environmental sounding and extrinsic cloud properties such as lifetime and volume. In some cases (more commonly for larger clouds, multiple pulses of buoyancy occur, which complicate the cumulus clock by replenishing rt. The clock is most effectively used to classify clouds by life phase.

  17. Cloud Service Standard Expectations of Cloud Computing%云计算中的云服务标准期望

    Institute of Scientific and Technical Information of China (English)

    李渊

    2014-01-01

    云计算是能够使用户在互连网上使用应用程序的一种环境,可进行数据的存储和保护。云计算中需要定期备份云存储数据,管理员期望能够在云停机后将数据完整地恢复到云中。这种简单的做法存在潜在的缺陷,数据管理系统可能会被锁死在服务提供商专用的云服务与存储方法中。云服务标准可以解决并纠正基本的数据传输故障。分析了云服务用户对云互操作性的期望,并说明了各个云服务标准组织以及它们提供的解决方案。%Cloud computing is the ability to enable users to interconnect applications online using an environment for data storage and protection, while providing services. Cloud computing cloud storage needs to regularly back up data, administrators expect to shut down after the data in the cloud completely restored to the cloud. This simple approach the has potential defects. Data manage ment in the system administrators of may be locked in the service provider dedicated cloud services and storage methods. Cloud service standards can be addressed and corrected basic data transmission failures. In this paper,the cloud service user expectations of cloud interoperabilit is analyzed, and describes the various standards organizations and their cloud services to provide solutions.

  18. Point Cloud Server (pcs) : Point Clouds In-Base Management and Processing

    Science.gov (United States)

    Cura, R.; Perret, J.; Paparoditis, N.

    2015-08-01

    In addition to the traditional Geographic Information System (GIS) data such as images and vectors, point cloud data has become more available. It is appreciated for its precision and true three-Dimensional (3D) nature. However, managing the point cloud can be difficult due to scaling problems and specificities of this data type. Several methods exist but are usually fairly specialised and solve only one aspect of the management problem. In this work, we propose a complete and efficient point cloud management system based on a database server that works on groups of points rather than individual points. This system is specifically designed to solve all the needs of point cloud users: fast loading, compressed storage, powerful filtering, easy data access and exporting, and integrated processing. Moreover, the system fully integrates metadata (like sensor position) and can conjointly use point clouds with images, vectors, and other point clouds. The system also offers in-base processing for easy prototyping and parallel processing and can scale well. Lastly, the system is built on open source technologies; therefore it can be easily extended and customised. We test the system will several billion points of point clouds from Lidar (aerial and terrestrial ) and stereo-vision. We demonstrate ~ 400 million pts/h loading speed, user-transparent greater than 2 to 4:1 compression ratio, filtering in the approximately 50 ms range, and output of about a million pts/s, along with classical processing, such as object detection.

  19. Energy storage

    CERN Document Server

    Brunet, Yves

    2013-01-01

    Energy storage examines different applications such as electric power generation, transmission and distribution systems, pulsed systems, transportation, buildings and mobile applications. For each of these applications, proper energy storage technologies are foreseen, with their advantages, disadvantages and limits. As electricity cannot be stored cheaply in large quantities, energy has to be stored in another form (chemical, thermal, electromagnetic, mechanical) and then converted back into electric power and/or energy using conversion systems. Most of the storage technologies are examined: b

  20. Diagnostic for Electron Clouds Trapped in Quadrupoles

    CERN Document Server

    Macek, Robert J

    2005-01-01

    Simulations have indicated that electron clouds generated by beam-induced multipactor can be trapped in the mirror-like fields of magnetic quadrupoles and thereby contribute significantly to the electron cloud buildup in high intensity accelerators and storage rings. This could be the most important source of electrons driving the two-stream (e-p) instability at the Los Alamos PSR and may also play a significant role in electron cloud effects at some of the new high intensity accelerator projects. We will describe the physics design and optimization of an electron-sweeping detector designed to measure the trapped electrons at various times after the beam pulse has passed. The instrument can also serve as an electro-magnetically shielded detector providing a signal obtained from electrons striking the wall during the passage of beam bunches.

  1. Building Low Cost Cloud Computing Systems

    Directory of Open Access Journals (Sweden)

    Carlos Antunes

    2013-06-01

    Full Text Available The actual models of cloud computing are based in megalomaniac hardware solutions, being its implementation and maintenance unaffordable to the majority of service providers. The use of jail services is an alternative to current models of cloud computing based on virtualization. Models based in utilization of jail environments instead of the used virtualization systems will provide huge gains in terms of optimization of hardware resources at computation level and in terms of storage and energy consumption. In this paper it will be addressed the practical implementation of jail environments in real scenarios, which allows the visualization of areas where its application will be relevant and will make inevitable the redefinition of the models that are currently defined for cloud computing. In addition it will bring new opportunities in the development of support features for jail environments in the majority of operating systems.

  2. Cloud Databases: A Paradigm Shift in Databases

    OpenAIRE

    Indu Arora; Anu Gupta

    2012-01-01

    Relational databases ruled the Information Technology (IT) industry for almost 40 years. But last few years have seen sea changes in the way IT is being used and viewed. Stand alone applications have been replaced with web-based applications, dedicated servers with multiple distributed servers and dedicated storage with network storage. Cloud computing has become a reality due to its lesser cost, scalability and pay-as-you-go model. It is one of the biggest changes in IT after the rise of Wor...

  3. Corona Discharge in Clouds

    Science.gov (United States)

    Sin'kevich, A. A.; Dovgalyuk, Yu. A.

    2014-04-01

    We present a review of the results of theoretical studies and laboratory modeling of corona discharge initiation in clouds. The influence of corona discharges on the evolution of the cloud microstructure and electrification is analyzed. It is shown that corona discharges are initiated when large-size hydrometeors approach each other, whereas in some cases, corona discharges from crystals, ice pellets, and hailstones can appear. The corona discharges lead to significant air ionization, charging of cloud particles, and separation of charges in clouds and initiate streamers and lightnings. The influence of corona discharges on changes in the phase composition of clouds is analyzed.

  4. Cloud Computing Bible

    CERN Document Server

    Sosinsky, Barrie

    2010-01-01

    The complete reference guide to the hot technology of cloud computingIts potential for lowering IT costs makes cloud computing a major force for both IT vendors and users; it is expected to gain momentum rapidly with the launch of Office Web Apps later this year. Because cloud computing involves various technologies, protocols, platforms, and infrastructure elements, this comprehensive reference is just what you need if you'll be using or implementing cloud computing.Cloud computing offers significant cost savings by eliminating upfront expenses for hardware and software; its growing popularit

  5. The Magellanic clouds

    International Nuclear Information System (INIS)

    As the two galaxies nearest to our own, the Magellanic Clouds hold a special place in studies of the extragalactic distance scale, of stellar evolution and the structure of galaxies. In recent years, results from the South African Astronomical Observatory (SAAO) and elsewhere have shown that it is possible to begin understanding the three dimensional structure of the Clouds. Studies of Magellanic Cloud Cepheids have continued, both to investigate the three-dimensional structure of the Clouds and to learn more about Cepheids and their use as extragalactic distance indicators. Other research undertaken at SAAO includes studies on Nova LMC 1988 no 2 and red variables in the Magellanic Clouds

  6. Cloud Computing Technologies

    Directory of Open Access Journals (Sweden)

    Sean Carlin

    2012-06-01

    Full Text Available This paper outlines the key characteristics that cloud computing technologies possess and illustrates the cloud computing stack containing the three essential services (SaaS, PaaS and IaaS that have come to define the technology and its delivery model. The underlying virtualization technologies that make cloud computing possible are also identified and explained. The various challenges that face cloud computing technologies today are investigated and discussed. The future of cloud computing technologies along with its various applications and trends are also explored, giving a brief outlook of where and how the technology will progress into the future.

  7. Data intensive ATLAS workflows in the Cloud

    CERN Document Server

    Rzehorz, Gerhard Ferdinand; The ATLAS collaboration

    2016-01-01

    This contribution reports on the feasibility of executing data intensive workflows on Cloud infrastructures. In order to assess this, the metric ETC = Events/Time/Cost is formed, which quantifies the different workflow and infrastructure configurations that are tested against each other. In these tests ATLAS reconstruction Jobs are run, examining the effects of overcommitting (more parallel processes running than CPU cores available), scheduling (staggered execution) and scaling (number of cores). The desirability of commissioning storage in the cloud is evaluated, in conjunction with a simple analytical model of the system, and correlated with questions about the network bandwidth, caches and what kind of storage to utilise. In the end a cost/benefit evaluation of different infrastructure configurations and workflows is undertaken, with the goal to find the maximum of the ETC value

  8. An Approach to Secure Resource Sharing Algorithm (SRSA for Multi Cloud Environment

    Directory of Open Access Journals (Sweden)

    Er. Parul Indoria

    2013-12-01

    Full Text Available Cloud computing is an idea intended to deliver computing and storage resources to a community of users. In a cloud computing environment a user can use applications without installing, and accessing personal files of any other user in the network. The cloud computing technology allows efficient computation by centralizing storage, memory and processing. The practice of computing in two or more data centers separated by the Internet in popularity due to an explosion in scalable computing needs grow. However, one of the most important challenges for the cloud as the backup and protection of data and processes information from users. Security of cloud computing environment is a new research area, the further development of both the associations of academic and industrial research. In order to create secure and reliable services in cloud computing environment is major concerning issue. This paper focuses more on the subject related to the securely resource sharing and privacy aspects in cloud computing environment, such as data integrity, data compromise, service availability. It proposes a new approach “An Approach to Secure Resource Sharing Algorithm (SRSA for Multi Cloud Environment”. It is based on multi-cloud service providers and the secret sharing key with object oriented hierarchy. This approach mainly considers three clouds in which bursting and aggregation operation had been performed and includes many object oriented aspects based on some parameter were analyzed. We also used secure sharing mechanism so that the cloud resources are shared among different cloud environment.

  9. Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions

    Directory of Open Access Journals (Sweden)

    Sultan Aldossary

    2016-04-01

    Full Text Available Cloud computing changed the world around us. Now people are moving their data to the cloud since data is getting bigger and needs to be accessible from many devices. Therefore, storing the data on the cloud becomes a norm. However, there are many issues that counter data stored in the cloud starting from virtual machine which is the mean to share resources in cloud and ending on cloud storage itself issues. In this paper, we present those issues that are preventing people from adopting the cloud and give a survey on solutions that have been done to minimize risks of these issues. For example, the data stored in the cloud needs to be confidential, preserving integrity and available. Moreover, sharing the data stored in the cloud among many users is still an issue since the cloud service provider is untrustworthy to manage authentication and authorization. In this paper, we list issues related to data stored in cloud storage and solutions to those issues which differ from other papers which focus on cloud as general.

  10. CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Ştefan IOVAN

    2016-05-01

    Full Text Available Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. In the other case, in wich a cloud is exclusively available for an organization and is not available to the open public, this is consider a private cloud [1]. There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. One of the main challenges of cloud computing are to build the trust and ofer information privacy in every aspect of service offerd by cloud computingle. The variety of existing standards, just like the lack of clarity in sustenability certificationis not a real help in building trust. Also appear some questions marks regarding the efficiency of traditionsecurity means that are applied in the cloud domain. Beside the economic and technology advantages offered by cloud, also are some advantages in security area if the information is migrated to cloud. Shared resources available in cloud includes the survey, use of the "best practices" and technology for advance security level, above all the solutions offered by the majority of medium and small businesses, big companies and even some guvermental organizations [2].

  11. Bioinformatics and Microarray Data Analysis on the Cloud.

    Science.gov (United States)

    Calabrese, Barbara; Cannataro, Mario

    2016-01-01

    High-throughput platforms such as microarray, mass spectrometry, and next-generation sequencing are producing an increasing volume of omics data that needs large data storage and computing power. Cloud computing offers massive scalable computing and storage, data sharing, on-demand anytime and anywhere access to resources and applications, and thus, it may represent the key technology for facing those issues. In fact, in the recent years it has been adopted for the deployment of different bioinformatics solutions and services both in academia and in the industry. Although this, cloud computing presents several issues regarding the security and privacy of data, that are particularly important when analyzing patients data, such as in personalized medicine. This chapter reviews main academic and industrial cloud-based bioinformatics solutions; with a special focus on microarray data analysis solutions and underlines main issues and problems related to the use of such platforms for the storage and analysis of patients data. PMID:25863787

  12. Community Cloud Computing

    CERN Document Server

    Marinos, Alexandros

    2009-01-01

    Cloud Computing is rising fast, with its data centres growing at an unprecedented rate. However, this has come with concerns over privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon and Microsoft. Our response is an alternative model for the Cloud conceptualisation, providing a paradigm for Clouds in the community, utilising networked personal computers for liberation from the centralised vendor model. Community Cloud Computing (C3) offers an alternative architecture, created by combing the Cloud with paradigms from Grid Computing, principles from Digital Ecosystems, and sustainability from Green Computing, while remaining true to the original vision of the Internet. It is more technically challenging than Cloud Computing, having to deal with distributed computing issues, including heterogeneous nodes, varying quality of service, and additional security constraints. However, these are not insurmountable challenge...

  13. Algorithms and Systems for Virtual Machine Scheduling in Cloud Infrastructures

    OpenAIRE

    Li, Wubin

    2014-01-01

    With the emergence of cloud computing, computing resources (i.e., networks, servers, storage, applications, etc.) are provisioned as metered on-demand services over net- works, and can be rapidly allocated and released with minimal management effort. In the cloud computing paradigm, the virtual machine (VM) is one of the most com- monly used resource units in which business services are encapsulated. VM schedul- ing optimization, i.e., finding optimal placement schemes for VMs and reconfigu- ...

  14. Performance Issues of Heterogeneous Hadoop Clusters in Cloud Computing

    OpenAIRE

    Rao, B. Thirumala; Sridevi, N. V.; Reddy, V. Krishna; Reddy, L. S. S.

    2012-01-01

    Nowadays most of the cloud applications process large amount of data to provide the desired results. Data volumes to be processed by cloud applications are growing much faster than computing power. This growth demands new strategies for processing and analyzing information. Dealing with large data volumes requires two things: 1) Inexpensive, reliable storage 2) New tools for analyzing unstructured and structured data. Hadoop is a powerful open source software platform that addresses both of t...

  15. The Impact of Cloud Computing Technologies in E-learning

    OpenAIRE

    Hosam Farouk El-Sofany

    2013-01-01

    Cloud computing is a new computing model which is based on the grid computing, distributed computing, parallel computing and virtualization technologies define the shape of a new technology. It is the core technology of the next generation of network computing platform, especially in the field of education, cloud computing is the basic environment and platform of the future E-learning. It provides secure data storage, convenient internet services and strong computing power. This article mainl...

  16. Mobile Cloud Computing: A Comparison of Application Models

    OpenAIRE

    Kovachev, Dejan; Cao, Yiwei; Klamma, Ralf

    2011-01-01

    Cloud computing is an emerging concept combining many fields of computing. The foundation of cloud computing is the delivery of services, software and processing capacity over the Internet, reducing cost, increasing storage, automating systems, decoupling of service delivery from underlying technology, and providing flexibility and mobility of information. However, the actual realization of these benefits is far from being achieved for mobile applications and open many new research questions....

  17. SECURE DATA SHARING WITH IN GROUPS IN THE CLOUD

    OpenAIRE

    Gouthami Velakanti*, Niranjan Reddy .P, Sravanthi Venishetty

    2016-01-01

    Cloud computing refers to the delivery of computing resources over the Internet. Cloud provides a shared pool of resources, including data storage space, networks, computer processing power, and specialized corporate and user applications. It provides high level of scalability, reliability and efficiency. In this paper we propose a secure data sharing scheme within the groups and how encryption techniques help the groups in sharing the data dynamically. Sharing of data between dynamic groups ...

  18. Biomedical cloud computing with Amazon Web Services.

    Science.gov (United States)

    Fusaro, Vincent A; Patil, Prasad; Gafni, Erik; Wall, Dennis P; Tonellato, Peter J

    2011-08-01

    In this overview to biomedical computing in the cloud, we discussed two primary ways to use the cloud (a single instance or cluster), provided a detailed example using NGS mapping, and highlighted the associated costs. While many users new to the cloud may assume that entry is as straightforward as uploading an application and selecting an instance type and storage options, we illustrated that there is substantial up-front effort required before an application can make full use of the cloud's vast resources. Our intention was to provide a set of best practices and to illustrate how those apply to a typical application pipeline for biomedical informatics, but also general enough for extrapolation to other types of computational problems. Our mapping example was intended to illustrate how to develop a scalable project and not to compare and contrast alignment algorithms for read mapping and genome assembly. Indeed, with a newer aligner such as Bowtie, it is possible to map the entire African genome using one m2.2xlarge instance in 48 hours for a total cost of approximately $48 in computation time. In our example, we were not concerned with data transfer rates, which are heavily influenced by the amount of available bandwidth, connection latency, and network availability. When transferring large amounts of data to the cloud, bandwidth limitations can be a major bottleneck, and in some cases it is more efficient to simply mail a storage device containing the data to AWS (http://aws.amazon.com/importexport/). More information about cloud computing, detailed cost analysis, and security can be found in references.

  19. Biomedical cloud computing with Amazon Web Services.

    Directory of Open Access Journals (Sweden)

    Vincent A Fusaro

    2011-08-01

    Full Text Available In this overview to biomedical computing in the cloud, we discussed two primary ways to use the cloud (a single instance or cluster, provided a detailed example using NGS mapping, and highlighted the associated costs. While many users new to the cloud may assume that entry is as straightforward as uploading an application and selecting an instance type and storage options, we illustrated that there is substantial up-front effort required before an application can make full use of the cloud's vast resources. Our intention was to provide a set of best practices and to illustrate how those apply to a typical application pipeline for biomedical informatics, but also general enough for extrapolation to other types of computational problems. Our mapping example was intended to illustrate how to develop a scalable project and not to compare and contrast alignment algorithms for read mapping and genome assembly. Indeed, with a newer aligner such as Bowtie, it is possible to map the entire African genome using one m2.2xlarge instance in 48 hours for a total cost of approximately $48 in computation time. In our example, we were not concerned with data transfer rates, which are heavily influenced by the amount of available bandwidth, connection latency, and network availability. When transferring large amounts of data to the cloud, bandwidth limitations can be a major bottleneck, and in some cases it is more efficient to simply mail a storage device containing the data to AWS (http://aws.amazon.com/importexport/. More information about cloud computing, detailed cost analysis, and security can be found in references.

  20. Cloud Computing Benefits for Educational Institutions

    OpenAIRE

    Lakshminarayanan, Ramkumar; Kumar, Binod; Raju, M

    2013-01-01

    Education today is becoming completely associated with the Information Technology on the content delivery, communication and collaboration. The need for servers, storage and software are highly demanding in the universities, colleges and schools. Cloud Computing is an Internet based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Currently, IaaS (Infrastructure as a Service), PaaS (Platform as a Service...

  1. Probe Storage

    NARCIS (Netherlands)

    Gemelli, Marcellino; Abelmann, Leon; Engelen, Johan B.C.; Khatib, Mohammed G.; Koelmans, Wabe W.; Zaboronski, Olog; Campardo, Giovanni; Tiziani, Federico; Laculo, Massimo

    2011-01-01

    This chapter gives an overview of probe-based data storage research over the last three decades, encompassing all aspects of a probe recording system. Following the division found in all mechanically addressed storage systems, the different subsystems (media, read/write heads, positioning, data chan

  2. Benefits of cloud computing for PACS and archiving.

    Science.gov (United States)

    Koch, Patrick

    2012-01-01

    The goal of cloud-based services is to provide easy, scalable access to computing resources and IT services. The healthcare industry requires a private cloud that adheres to government mandates designed to ensure privacy and security of patient data while enabling access by authorized users. Cloud-based computing in the imaging market has evolved from a service that provided cost effective disaster recovery for archived data to fully featured PACS and vendor neutral archiving services that can address the needs of healthcare providers of all sizes. Healthcare providers worldwide are now using the cloud to distribute images to remote radiologists while supporting advanced reading tools, deliver radiology reports and imaging studies to referring physicians, and provide redundant data storage. Vendor managed cloud services eliminate large capital investments in equipment and maintenance, as well as staffing for the data center--creating a reduction in total cost of ownership for the healthcare provider.

  3. Cross-Cloud Testing Strategies Over Cloud Computing

    Directory of Open Access Journals (Sweden)

    Mr. Nageswararao,

    2014-06-01

    Full Text Available Cloud computing is the new paradigm to deliver all the hosted services over internet on demand. The ultimate goal of cloud computing paradigm is to realize computing as a utility. The cloud is rapidly maturing towards its goal to support a wide variety of enterprise and consumer services and real-world applications. Recently a movement towards cross cloud also called as multi-clouds or inters clouds or cloud-of-clouds has emerged which take advantage of multiple independent cloud provider offers for cloud resilience and dependability. This cross cloud represents the next logical wave in computing, enabling complex hybrid applications, cost and performance optimization, enhanced reliability, customer flexibility and lock-in avoidance. Providing testing as a service (TaaS in cross clouds become hot topics in industry. Testing heterogeneous e-commerce sites, Software as a Service solutions, and Cloud based applications is extremely challenging.

  4. Electron cloud effects: codes and simulations at KEK

    OpenAIRE

    Ohmi, K.

    2013-01-01

    Electron cloud effects had been studied at KEK-Photon Factory since 1995. e-p instability had been studied in proton rings since 1965 in BINP, ISR and PSR. Study of electron cloud effects with the present style, which was based on numerical simulations, started at 1995 in positron storage rings. The instability observed in KEKPF gave a strong impact to B factories, KEKB and PEPII, which were final stage of their design in those days. History of cure for electron cloud instability overlapped t...

  5. Cryptography for security and privacy in cloud computing

    CERN Document Server

    Rass, Stefan

    2013-01-01

    As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers.This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known

  6. Beam induced electron cloud resonances in dipole magnetic fields

    Science.gov (United States)

    Calvey, J. R.; Hartung, W.; Makita, J.; Venturini, M.

    2016-07-01

    The buildup of low energy electrons in an accelerator, known as electron cloud, can be severely detrimental to machine performance. Under certain beam conditions, the beam can become resonant with the cloud dynamics, accelerating the buildup of electrons. This paper will examine two such effects: multipacting resonances, in which the cloud development time is resonant with the bunch spacing, and cyclotron resonances, in which the cyclotron period of electrons in a magnetic field is a multiple of bunch spacing. Both resonances have been studied directly in dipole fields using retarding field analyzers installed in the Cornell Electron Storage Ring. These measurements are supported by both analytical models and computer simulations.

  7. Cloud Computing Governance Lifecycle

    Directory of Open Access Journals (Sweden)

    Soňa Karkošková

    2016-06-01

    Full Text Available Externally provisioned cloud services enable flexible and on-demand sourcing of IT resources. Cloud computing introduces new challenges such as need of business process redefinition, establishment of specialized governance and management, organizational structures and relationships with external providers and managing new types of risk arising from dependency on external providers. There is a general consensus that cloud computing in addition to challenges brings many benefits but it is unclear how to achieve them. Cloud computing governance helps to create business value through obtain benefits from use of cloud computing services while optimizing investment and risk. Challenge, which organizations are facing in relation to governing of cloud services, is how to design and implement cloud computing governance to gain expected benefits. This paper aims to provide guidance on implementation activities of proposed Cloud computing governance lifecycle from cloud consumer perspective. Proposed model is based on SOA Governance Framework and consists of lifecycle for implementation and continuous improvement of cloud computing governance model.

  8. Secure Cloud Architecture

    Directory of Open Access Journals (Sweden)

    Kashif Munir

    2013-02-01

    Full Text Available Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activitiesfrom illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. In this paper we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know a bout the k ey security threats associated with cloud computing and propose relevant solution directives to strengthen security in the Cloud environment. We also propose secure cloud architecture for organizations to strengthen the security.

  9. Enabling Large-Scale Biomedical Analysis in the Cloud

    Directory of Open Access Journals (Sweden)

    Ying-Chih Lin

    2013-01-01

    Full Text Available Recent progress in high-throughput instrumentations has led to an astonishing growth in both volume and complexity of biomedical data collected from various sources. The planet-size data brings serious challenges to the storage and computing technologies. Cloud computing is an alternative to crack the nut because it gives concurrent consideration to enable storage and high-performance computing on large-scale data. This work briefly introduces the data intensive computing system and summarizes existing cloud-based resources in bioinformatics. These developments and applications would facilitate biomedical research to make the vast amount of diversification data meaningful and usable.

  10. I/O Performance of Virtualized Cloud Environments

    Energy Technology Data Exchange (ETDEWEB)

    Ghoshal, Devarshi; Canon, Shane; Ramakrishnan, Lavanya

    2011-11-03

    The scientific community is exploring the suitability of cloud infrastructure to handle High Performance Computing (HPC) applications. The goal of Magellan, a project funded through DOE ASCR, is to investigate the potential role of cloud computing to address the computing needs of the Department of Energy?s Office of Science, especially for mid-range computing and data-intensive applications which are not served through existing DOE centers today. Prior work has shown that applications with significant communication orI/O tend to perform poorly in virtualized cloud environments. However, there is a limited understanding of the I/O characteristics in virtualized cloud environments. This paper will present our results in benchmarking the I/O performance over different cloud and HPC platforms to identify the major bottlenecks in existing infrastructure. We compare the I/O performance using IOR benchmark on two cloud platforms - Amazon and Magellan. We analyze the performance of different storage options available, different instance types in multiple availability zones. Finally, we perform large-scale tests in order to analyze the variability in the I/O patterns over time and region. Our results highlight the overhead and variability in I/O performance on both public and private cloud solutions. Our results will help applications decide between the different storage options enabling applications to make effective choices.

  11. Designing Virtual Labs Using Cloud Computing

    Directory of Open Access Journals (Sweden)

    Parag Nemade

    2014-10-01

    Full Text Available Cloud computing is the style of computing where massively scaled IT related capabilities are provided as a service across the internet to multiple external customers and are billed by consumption. Google, Microsoft, Yahoo, IBM and Amazon have started providing cloud computing services. Amazon is the pioneer in this field. A customer is the ultimate beneficiary of this technology as they can access, share and send data through an email server without any type of installation or hard disk storage. In this paper, we have addresses the concept of Cloud Computing and its application in the field of Education. In the Engineering courses the students often face the problem that all the software cannot be accessed from a single laboratory. Also college needs to pay more for buying different software for each PC and have to manage their updates. In this paper ,we have discuss how to provide accesses to the required software from a single Lab .We will be setting up a Virtual Private Cloud Server and deploying the required software on that server. Students will get to access all the software from those labs which are connected to this Private Cloud.

  12. DESIGNING VIRTUAL LABS USING CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Parag Nemade

    2015-10-01

    Full Text Available Cloud computing is the style of computing where massively scaled IT related capabilities are provided as a service across the internet to multiple external customers and are billed by consumption. Google, Microsoft, Yahoo, IBM and Amazon have started providing cloud computing services. Amazon is the pioneer in this field. A customer is the ultimate beneficiary of this technology as they can access, share and send data through an email server without any type of installation or hard disk storage. In this paper, we have addresses the concept of Cloud Computing and its application in the field of Education. In the Engineering courses the students often face the problem that all the software cannot be accessed from a single laboratory. Also college needs to pay more for buying different software for each PC and have to manage their updates. In this paper ,we have discuss how to provide accesses to the required software from a single Lab .We will be setting up a Virtual Private Cloud Server and deploying the required software on that server. Students will get to access all the software from those labs which are connected to this Private Cloud.

  13. Pricing Schemes in Cloud Computing: An Overview

    Directory of Open Access Journals (Sweden)

    Artan Mazrekaj

    2016-02-01

    Full Text Available Cloud Computing is one of the technologies with rapid development in recent years where there is increasing interest in industry and academia. This technology enables many services and resources for end users. With the rise of cloud services number of companies that offer various services in cloud infrastructure is increased, thus creating a competition on prices in the global market. Cloud Computing providers offer more services to their clients ranging from infrastructure as a service (IaaS, platform as a service (PaaS, software as a service (SaaS, storage as a service (STaaS, security as a service (SECaaS, test environment as a service (TEaaS. The purpose of providers is to maximize revenue by their price schemes, while the main goal of customers is to have quality of services (QoS for a reasonable price. The purpose of this paper is to compare and discuss several models and pricing schemes from different Cloud Computing providers.

  14. Fog Computing to protect real and sensitivity information in Cloud

    Directory of Open Access Journals (Sweden)

    Thogaricheti Ashwini

    2015-03-01

    Full Text Available Cloud computing can simply be described as computing based on the internet. In the past, people depended on physical computer storage or servers to run their programs. However, with the introduction of cloud computing, people as well as business enterprises can now access their programs through the internet. Due this ease, software companies and other agencies are shifting more towards cloud computing environment. To achieve better operational efficiency in many organizations and small or medium agencies is using Cloud environment for managing their data. It is a combination of a number of computing strategies and concepts such as Service Oriented Architecture (SOA, virtualization and other which rely on the Internet. Cloud Computing provides an easy way for accessing, managing and computation of user data, but it also has some severe security risks. Very common risks now days are data theft attacks. Data theft considered one of the top threats to cloud computing by the Cloud Security Alliance is. To deal with such cases and malicious intruders there are some techniques which are used to secure user data. A new technology called “Fog computing” is gaining attention of the cloud users nowadays. Fog computing improves the Quality of service and also reduces latency. According to Cisco, due to its wide geographical distribution the Fog computing is well suited for real time analytics and big data.Fog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users.

  15. OpenStack Object Storage (Swift) essentials

    CERN Document Server

    Kapadia, Amar; Varma, Sreedhar

    2015-01-01

    If you are an IT administrator and you want to enter the world of cloud storage using OpenStack Swift, then this book is ideal for you. Basic knowledge of Linux and server technology is beneficial to get the most out of the book.

  16. Volunteered Cloud Computing for Disaster Management

    Science.gov (United States)

    Evans, J. D.; Hao, W.; Chettri, S. R.

    2014-12-01

    Disaster management relies increasingly on interpreting earth observations and running numerical models; which require significant computing capacity - usually on short notice and at irregular intervals. Peak computing demand during event detection, hazard assessment, or incident response may exceed agency budgets; however some of it can be met through volunteered computing, which distributes subtasks to participating computers via the Internet. This approach has enabled large projects in mathematics, basic science, and climate research to harness the slack computing capacity of thousands of desktop computers. This capacity is likely to diminish as desktops give way to battery-powered mobile devices (laptops, smartphones, tablets) in the consumer market; but as cloud computing becomes commonplace, it may offer significant slack capacity -- if its users are given an easy, trustworthy mechanism for participating. Such a "volunteered cloud computing" mechanism would also offer several advantages over traditional volunteered computing: tasks distributed within a cloud have fewer bandwidth limitations; granular billing mechanisms allow small slices of "interstitial" computing at no marginal cost; and virtual storage volumes allow in-depth, reversible machine reconfiguration. Volunteered cloud computing is especially suitable for "embarrassingly parallel" tasks, including ones requiring large data volumes: examples in disaster management include near-real-time image interpretation, pattern / trend detection, or large model ensembles. In the context of a major disaster, we estimate that cloud users (if suitably informed) might volunteer hundreds to thousands of CPU cores across a large provider such as Amazon Web Services. To explore this potential, we are building a volunteered cloud computing platform and targeting it to a disaster management context. Using a lightweight, fault-tolerant network protocol, this platform helps cloud users join parallel computing projects

  17. Encyclopedia of cloud computing

    CERN Document Server

    Bojanova, Irena

    2016-01-01

    The Encyclopedia of Cloud Computing provides IT professionals, educators, researchers and students with a compendium of cloud computing knowledge. Authored by a spectrum of subject matter experts in industry and academia, this unique publication, in a single volume, covers a wide range of cloud computing topics, including technological trends and developments, research opportunities, best practices, standards, and cloud adoption. Providing multiple perspectives, it also addresses questions that stakeholders might have in the context of development, operation, management, and use of clouds. Furthermore, it examines cloud computing's impact now and in the future. The encyclopedia presents 56 chapters logically organized into 10 sections. Each chapter covers a major topic/area with cross-references to other chapters and contains tables, illustrations, side-bars as appropriate. Furthermore, each chapter presents its summary at the beginning and backend material, references and additional resources for further i...

  18. BlueSky Cloud Framework: An E-Learning Framework Embracing Cloud Computing

    Science.gov (United States)

    Dong, Bo; Zheng, Qinghua; Qiao, Mu; Shu, Jian; Yang, Jie

    Currently, E-Learning has grown into a widely accepted way of learning. With the huge growth of users, services, education contents and resources, E-Learning systems are facing challenges of optimizing resource allocations, dealing with dynamic concurrency demands, handling rapid storage growth requirements and cost controlling. In this paper, an E-Learning framework based on cloud computing is presented, namely BlueSky cloud framework. Particularly, the architecture and core components of BlueSky cloud framework are introduced. In BlueSky cloud framework, physical machines are virtualized, and allocated on demand for E-Learning systems. Moreover, BlueSky cloud framework combines with traditional middleware functions (such as load balancing and data caching) to serve for E-Learning systems as a general architecture. It delivers reliable, scalable and cost-efficient services to E-Learning systems, and E-Learning organizations can establish systems through these services in a simple way. BlueSky cloud framework solves the challenges faced by E-Learning, and improves the performance, availability and scalability of E-Learning systems.

  19. Growth-related changes in histology and immunolocalization of steroid hormone receptors in gonads of the immature male green turtle (Chelonia mydas).

    Science.gov (United States)

    Otsuka, Saori; Suzuki, Masatsugu; Kamezaki, Naoki; Shima, Tatsuya; Wakatsuki, Motoki; Kon, Yasuhiro; Ohtaishi, Noriyuki

    2008-03-01

    Studies on the population dynamics of sea turtles require histological evaluation of the ontogenetic development and the activity of the gonads for reproduction. To investigate the growth-related changes of gonads in the immature male green turtle (Chelonia mydas), the histological changes of testes and epididymides and the localization of the androgen receptor, estrogen receptor alpha, estrogen receptor beta, and progesterone receptor were examined. The testes were categorized histologically into six developmental stages, and a scarce relationship between straight carapace length and gonadal development was confirmed based on the histological analysis. Several kinds of steroid hormone receptors were examined to show distributions in both testes and epididymides, for which their immunoreactivities were enhanced according to the developmental stage of the testes. These results suggest that straight carapace length is not an adequate indicator of maturity determination, whereas histological and immunohistochemical evaluations are useful in identifying the growth stages of green turtles, owing to the higher sensitivity to steroid hormones that appear during growth.

  20. Analysis of epibiont data in relation with the Debilitated Turtle Syndrome of sea turtles in Chelonia mydas and Lepidochelys olivacea from Concepción coast, Chile

    Directory of Open Access Journals (Sweden)

    Italo Fernández

    2015-11-01

    Full Text Available Epibionts on the surface of the skin and shell of a specimen of Chelonia mydas and three Lepidochelys olivacea found floating on the coast of Concepción, Chile, between June 2010 and December 2012, were analyzed. These epibionts were analyzed during the clinical inspection and the tissue changes related to its settlement, with filamentous algae around, were observed. Subsequently, the epibionts were identified by morphological observation. The knowledge about theses epibionts in Chile is reviewed and the potential occurrence of Debilitated Turtle Syndrome (DTS in these turtles is discussed. The presence of sea turtles in the Chilean coast is considered a casual event, so there is little information on this issue. We propose it is necessary to carry out more studies on the association between turtles and epibionts because their identification, colonizing reptiles’ surface may give relevant information to a better understanding of different diseases, including DTS, that affect these marine reptiles and facilitates the development of strategies intended to recover their populations.