WorldWideScience

Sample records for chelonia storage cloud

  1. Performance and Stability of the Chelonia Storage Cloud

    CERN Document Server

    Nilsen, Jon K; Nagy, Zsombor; Mohn, Bjarte; Read, Alex L

    2010-01-01

    In this paper we present the Chelonia storage cloud middleware. It was designed to fill the requirements gap between those of large, sophisticated scientific collaborations which have adopted the grid paradigm for their distributed storage needs, and of corporate business communities which are gravitating towards the cloud paradigm. The similarities to and differences between Chelonia and several well-known grid- and cloud-based storage solutions are commented. The design of Chelonia has been chosen to optimize high reliability and scalability of an integrated system of heterogeneous, geographically dispersed storage sites and the ability to easily expand the system dynamically. The architecture and implementation in term of web-services running inside the Advanced Resource Connector Hosting Environment Dameon (ARC HED) are described. We present results of tests in both local-area and wide-area networks that demonstrate the fault-tolerance, stability and scalability of Chelonia.

  2. Chelonia: A self-healing, replicated storage system

    International Nuclear Information System (INIS)

    Chelonia is a novel grid storage system designed to fill the requirements gap between those of large, sophisticated scientific collaborations which have adopted the grid paradigm for their distributed storage needs, and of corporate business communities gravitating towards the cloud paradigm. Chelonia is an integrated system of heterogeneous, geographically dispersed storage sites which is easily and dynamically expandable and optimized for high availability and scalability. The architecture and implementation in term of web-services running inside the Advanced Resource Connector Hosting Environment Dameon (ARC HED) are described and results of tests in both local -area and wide-area networks that demonstrate the fault tolerance, stability and scalability of Chelonia will be presented. In addition, example setups for production deployments for small and medium-sized VO's are described.

  3. Cloud storage for dummies

    CERN Document Server

    Xu, Linda; Loughlin, Tanya

    2010-01-01

    Understand cloud computing and save your organization time and money! Cloud computing is taking IT by storm, but what is it and what are the benefits to your organization? Hitachi Data Systems' Cloud Storage For Dummies provides all the answers, With this book, you discover a clear explanation of cloud storage, and tips for how to choose the right type of cloud storage for your organization's needs. You also find out how cloud storage can free up valuable IT resources, saving time and money. Cloud Storage For Dummies presents useful information on setting up a

  4. Entangled Cloud Storage

    DEFF Research Database (Denmark)

    Ateniese, Giuseppe; Dagdelen, Özgür; Damgård, Ivan Bjerre;

    2012-01-01

    Entangled cloud storage enables a set of clients {P_i} to “entangle” their files {f_i} into a single clew c to be stored by a (potentially malicious) cloud provider S. The entanglement makes it impossible to modify or delete significant part of the clew without affecting all files in c. A clew...... keeps the files in it private but still lets each client P_i recover his own data by interacting with S; no cooperation from other clients is needed. At the same time, the cloud provider is discouraged from altering or overwriting any significant part of c as this will imply that none of the clients can...... recover their files. We provide theoretical foundations for entangled cloud storage, introducing the notion of an entangled encoding scheme that guarantees strong security requirements capturing the properties above. We also give a concrete construction based on privacy-preserving polynomial interpolation...

  5. Benchmarking personal cloud storage

    NARCIS (Netherlands)

    Drago, Idilio; Bocchi, Enrico; Mellia, Marco; Slatman, Herman; Pras, Aiko

    2013-01-01

    Personal cloud storage services are data-intensive applications already producing a significant share of Internet traffic. Several solutions offered by different companies attract more and more people. However, little is known about each service capabilities, architecture and - most of all - perform

  6. Towards a community cloud storage

    OpenAIRE

    Liu, Ying; Vlassov, Vladimir; Navarro Moldes, Leandro

    2014-01-01

    Community Clouds, usually built upon community networks, operate in a more disperse environment compared to a data center Cloud, with lower capacity and less reliable servers separated by a more heterogeneous and less predictable network interconnection. These differences raise challenges when deploying Cloud applications in a community Cloud. Open Stack Swift is an open source distributed storage system, which provides stand alone highly available and scalable storage from Open Stack Cloud c...

  7. A cloud storage overlay to aggregate heterogeneous cloud services

    OpenAIRE

    Machado, Guilherme Sperb; Bocek, Thomas; Ammann, Michael; Stiller, Burkhard

    2013-01-01

    Many Cloud services provide generic (e.g., Amazon S3 or Dropbox) or data-specific Cloud storage (e.g., Google Picasa or SoundCloud). Although both Cloud storage service types have the data storage in common, they present heterogeneous characteristics: different interfaces, accounting and charging schemes, privacy and security levels, functionality and, among the data-specific Cloud storage services, different data type restrictions. This paper proposes PiCsMu (Platform-independent Cloud Stora...

  8. Security for cloud storage systems

    CERN Document Server

    Yang, Kan

    2014-01-01

    Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers

  9. Cloud Storage Vault

    OpenAIRE

    Haver, Eirik; Melvold, Eivind; Ruud, Pål

    2011-01-01

    Today, major IT-companies, such as Microsoft, Amazon and Google, are offering online storage services to their customers. This is a favourable solution -- as opposed to regular storage -- in terms of low costs, reliability, scalability and capacity. However, important security features such as data privacy and integrity are often absent.To address these issues, a cryptographic architecture is proposed that ensures the confidentiality and integrity of the data stored by users, independent of t...

  10. Syncing Mobile Applications with Cloud Storage Services

    OpenAIRE

    Paul POCATILU; Catalin BOJA; Cristian CIUREA

    2013-01-01

    Cloud data storage is an option available almost on any mobile platform. Nowadays, there are multiple solutions for syncing data in mobile applications. The aim of the paper is to analyze mobile application developers’ possibilities for syncing content using major free cloud storage providers. The paper describes the cloud computing in mobile context and highlights cloud providers APIs. Experimental results are analyzed in order to identify the best cloud storage solution for syncing mobile...

  11. Cloud Storage Client Application Analysis

    Directory of Open Access Journals (Sweden)

    Rakesh Malik

    2015-06-01

    Full Text Available The research proposed in this paper focuses on gathering evidence from devices with UNIX/Linux systems (in particular on Ubuntu 14.04 and Android OS, and Windows 8.1, in order to find artifacts left by cloud storage applications that suggests their use even after the deletion of the applications. The work performed aims to expand upon the prior work done by other researches in the field of cloud forensics and to show an example of analysis. We show where and what type of data remnants can be found using our analysis and how this information can be used as evidence in a digital forensic investigation.

  12. Inside Dropbox: Understanding Personal Cloud Storage Services

    NARCIS (Netherlands)

    Drago, Idilio; Mellia, Marco; Munafò, Maurizio M.; Sperotto, Anna; Sadre, Ramin; Pras, Aiko

    2012-01-01

    Personal cloud storage services are gaining popularity. With a rush of providers to enter the market and an increasing offer of cheap storage space, it is to be expected that cloud storage will soon generate a high amount of Internet traffic. Very little is known about the architecture and the perfo

  13. Syncing Mobile Applications with Cloud Storage Services

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2013-01-01

    Full Text Available Cloud data storage is an option available almost on any mobile platform. Nowadays, there are multiple solutions for syncing data in mobile applications. The aim of the paper is to analyze mobile application developers’ possibilities for syncing content using major free cloud storage providers. The paper describes the cloud computing in mobile context and highlights cloud providers APIs. Experimental results are analyzed in order to identify the best cloud storage solution for syncing mobile applications, depending on the operating system on which they are implemented.

  14. Towards Data Interoperability of Cloud Infrastructures Using Cloud Storage Services

    OpenAIRE

    Pflanzner, Tamás; Kertész, Attila

    2014-01-01

    Cloud Computing is becoming more and more popular, and various cloud services have appeared to make our lives easier. Mobile devices can also bene t from Cloud services: the huge data users produce with these devices are continuously posted to online services, which may require the modi cation of these data. Using cloud storage services together with computation-intensive infrastructure services can provide a suitable solution for these needs. In this paper we address the open issue of data i...

  15. Cloud Storage and its Secure Overlay Techniques

    Directory of Open Access Journals (Sweden)

    Susheel Kumar

    2014-04-01

    Full Text Available In this paper we have tried to explain in detail about cloud storage its need, importance and how much useful it is for the upcoming future. As we know that it provides us flexibility to store and use data to anywhere and from anywhere so it is cost effective and beneficial at all places. The storage of data however has some kind of security issues in accessing the authorized data. Some of the data in the cloud should be deleted for certain reasons to maintain confidentiality. And many other issues are to be overcome by the cloud. There are certain techniques discussed in this paper to address the problems in the cloud communication. We get an idea of the available methods in which the data can be secured. Anyway each architecture has its own shortcomings. But without these techniques, it is difficult to maintain a good client-server storage mechanism in the cloud computing.

  16. Sheltered Data Storage Services in Cloud Computing

    Directory of Open Access Journals (Sweden)

    B. Jenifer Milkkal

    2013-05-01

    Full Text Available Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the holomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks

  17. Dynamic Storage Assurance on Cloud Computing

    Directory of Open Access Journals (Sweden)

    P. Dhanalakshmi

    2013-02-01

    Full Text Available Cloud computing investigate the problem of data security in cloud data storage, which is essentially a distributed storage system. Distributed storage integrity auditing mechanism, utilizes the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server and recover the corrupted data. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the pro-posed scheme is highly efficient and resilient against Byzan-tine failure, malicious data modification attack, and even server colluding attacks. With the advent of data storage and new technology trends that result in new failure modes for storage, interesting challenges arise in ensuring data integrity and security. In this paper, we discuss the cause of integrity violations and implementation issues to perform efficient integrity assurance. The main aim of this paper is to prevent the file from integrity violations and recovering the corrupted file with low cost overhead.

  18. SECURITY FOR DATA STORAGE IN CLOUD COMPUTING

    OpenAIRE

    Prof. S.A.Gade; Mukesh P.Patil

    2015-01-01

    Cloud computing is nothing but a specific style of computing where everything from computing power to business apps are provided facility. This application moves the various data to the large data centers through computing where security provided fully trustworthy. The data stored in the cloud may be frequently updated by the users (registered user) including actions like insertion, deletion, modification etc. To ensure that data storage in cl oud this web applicatio...

  19. New mechanism for Cloud Computing Storage Security

    Directory of Open Access Journals (Sweden)

    Almokhtar Ait El Mrabti

    2016-07-01

    Full Text Available Cloud computing, often referred to as simply the cloud, appears as an emerging computing paradigm which promises to radically change the way computer applications and services are constructed, delivered, managed and finally guaranteed as dynamic computing environments for end users. The cloud is the delivery of on-demand computing resources - everything from applications to data centers - over the Internet on a pay-for-use basis. The revolution of cloud computing has provided opportunities for research in all aspects of cloud computing. Despite the big progress in cloud computing technologies, funding concerns in cloud, security may limit a broader adoption. This paper presents a technique to tolerate both accidental and intentional faults, which is fragmentation-redundancy-scattering (FRS. The possibility to use the FRS technique as an intrusion tolerance one is investigated for providing secure and dependable storage in the cloud environment. Also a cloud computing security (CCS based on the FRS technique is proposed to explore how this proposal can then be used via several scenarios. To demonstrate the robustness of the proposal, we formalize our design and we carry out a security as well as performance evaluations of the approach and we compare it with the classical model. The paper concludes by strongly suggesting future research proposals for the CCS framework.

  20. Cloud-Based Data Storage

    Science.gov (United States)

    Waters, John K.

    2011-01-01

    The vulnerability and inefficiency of backing up data on-site is prompting school districts to switch to more secure, less troublesome cloud-based options. District auditors are pushing for a better way to back up their data than the on-site, tape-based system that had been used for years. About three years ago, Hendrick School District in…

  1. The dCache scientific storage cloud

    CERN Document Server

    CERN. Geneva

    2014-01-01

    For over a decade, the dCache team has provided software for handling big data for a diverse community of scientists. The team has also amassed a wealth of operational experience from using this software in production. With this experience, the team have refined dCache with the goal of providing a "scientific cloud": a storage solution that satisfies all requirements of a user community by exposing different facets of dCache with which users interact. Recent development, as part of this "scientific cloud" vision, has introduced a new facet: a sync-and-share service, often referred to as "dropbox-like storage". This work has been strongly focused on local requirements, but will be made available in future releases of dCache allowing others to adopt dCache solutions. In this presentation we will outline the current status of the work: both the successes and limitations, and the direction and time-scale of future work.

  2. Cloud-Based Storage Applications for Smart Phones: Forensic Investigation of Cloud Storage Applications

    OpenAIRE

    Ochrymowicz, Radoslaw

    2014-01-01

    The proliferation of smart phones across the globe, development of 4G network standards and its progressing implementation along with shift towards cloud computing bring risks to smart phone users who avail of these service. Security of cloud storage mobile applications should be essential to smart phone users. Enterprises’ move to huge data centres and availing of their infrastructure, platform and service is an advantage but poses a risk. Users use corporate resources managed and administer...

  3. Compute and Storage Clouds Using Wide Area High Performance Networks

    CERN Document Server

    Grossman, Robert L; Sabala, Michael; Zhang, Wanzhi

    2008-01-01

    We describe a cloud based infrastructure that we have developed that is optimized for wide area, high performance networks and designed to support data mining applications. The infrastructure consists of a storage cloud called Sector and a compute cloud called Sphere. We describe two applications that we have built using the cloud and some experimental studies.

  4. To Provide Security for Storage Services in Cloud Computing

    OpenAIRE

    D.Shravani1 , Dr. S. Zahoor Ul Huq

    2013-01-01

    Cloud computing is the delivery of computing and storage capacity as a service to a community of end-recipients. Cloud computing entrusts services with a user's data, software and computation over a network. It is an emerging computing model in which resources of the computing communications are provided as services over the internet. Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and softwa...

  5. Cloud and virtual data storage networking

    CERN Document Server

    Schulz, Greg

    2011-01-01

    The amount of data being generated, processed, and stored has reached unprecedented levels. Even during the recent economic crisis, there has been no slow down or information recession. Instead, the need to process, move, and store data has only increased. Consequently, IT organizations are looking to do more with what they have while supporting growth along with new services without compromising on cost and service delivery. Cloud and Virtual Data Storage Networking, by savvy IT industry veteran Greg Schulz, looks at converging IT resources and management technologies for facilitating efficie

  6. On the Feasibility of a Network Coded Mobile Storage Cloud

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2015-01-01

    Conventional cloud storage services offer relatively good reliability and performance in a cost-effective manner. However, they are typically structured in a centralized and highly controlled fashion. In more dynamic storage scenarios, these centralized approaches are unfeasible and developing...... decentralized storage approaches becomes critical. The novelty of this paper is the introduction of the highly dynamic distributed mobile cloud, which uses free resources on user devices to move storage to the edges of the network. At the core of our approach, lies the use of random linear network coding...... to simulate the processes governing user behavior to show feasibility of mobile storage clouds in real scenarios....

  7. An Approach for Storage Security in Cloud Computing- A Survey

    Directory of Open Access Journals (Sweden)

    W. Sharon Inbarani, G. Shenbaga Moorthy, C. Kumar Charlie Paul

    2013-01-01

    Full Text Available The many advantages of cloud computing areincreasingly attracting individuals and organizations tooutsource their data from local to remote cloud servers. Inaddition to cloud infrastructure and platform providers, such asAmazon, Google, and Microsoft, more and more cloudapplication providers are emerging which are dedicated tooffering more accessible and user friendly data storage servicesto cloud customers. Storing data in a third party’s cloud systemcauses serious concern over data confidentiality. Generalencryption schemes protect data confidentiality, but also limitthe functionality of the storage system. We propose a thresholdproxy re-encryption scheme and integrate it with decentralizederasure code such that a secure distributed storage system isformulated. The distributed storage system not only supportssecure and robust data storage and retrieval, but also lets a userforward his data in the storage servers to another user withoutretrieving the data back.

  8. On the Feasibility of (Practical Commercial Anonymous Cloud Storage

    Directory of Open Access Journals (Sweden)

    Tobias Pulls

    2015-08-01

    Full Text Available Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commercial cloud storage services, in this paper, we investigate the feasibility of so called anonymous cloud storage services which require user payment (which we call commercial anonymous cloud storage. Anonymity in this context can be seen as the absence of information to uniquely identify a provider's client that is storing and manipulating data at the provider while at the same time still allowing fair billing, for both, the clients and the cloud provider. Although encrypting data prior to outsourcing helps to protect data privacy and can be achieved without the cloud provider's consent, the issues we are interested in, do not seem to be achievable that easily. However, while various measures for the latter issue, i.e., realizing access privacy, have been studied in the past, the role of privacy in context of billing and payment for cloud storage has, until now, remained unexplored. We therefore introduce an abstract model for commercial cloud storage services to define various types of anonymous cloud storage, study several payment and billing models for cloud storage services and their impact on the anonymity of the service's clients. Moreover, we discuss several solutions to provide anonymity within the different models. Our findings highlight the importance of anonymous payment for the practical deployment of commercial privacy-friendly cloud storage services. Furthermore, we provide directions for future work in some settings, i.e., when anonymous payment is not available, as interesting open challenges.

  9. On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

    OpenAIRE

    Tobias Pulls; Daniel Slamanig

    2015-01-01

    Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commercial cloud storage services, in this paper, we investigate the feasibility of so called anonymous clo...

  10. A Survey on Data Storage and Security in Cloud Computing

    OpenAIRE

    V. Spoorthy; M. Mamatha; B. Santhosh Kumar

    2014-01-01

    cloud computing has been envisioned as the next generation architecture of IT enterprise. Cloud computing moves the application software and data bases to the large data centers, where the management of the data and services may not be fully trustworthy. This poses many new security challenges which have not been fully implemented. In this paper, we mainly focus on aspects for providing security for data storage in cloud, also architecture for data storage that are implemented by ...

  11. Experiences of Cloud Storage Service Monitoring: Performance Assessment and Comparison

    OpenAIRE

    Mellia, Marco; Drago, Idilio; Bocchi, Enrico

    2016-01-01

    Personal cloud storage services offer a large amount of space and the ease to synchronize devices with great simplicity. They help in sharing content and in backing up data by relying on the cloud to seamlessly store users' files. Despite the high public interest in such services, little information is available about design, implementation choices and, most of all, actual performance implications. In this work, we design a methodology to run benchmarks of cloud storage services. We unveil ho...

  12. A New Model of Data Protection on Cloud Storage

    Directory of Open Access Journals (Sweden)

    Jing Peng

    2014-03-01

    Full Text Available This paper focuses on studying cloud storage data protection model and implementing encrypted storage of user data in double-key form. User data are encrypted with symmetric encryption algorithm and this secret key is encrypted with asymmetric encryption algorithm. The private key is managed and controlled by users. In this way, users guarantee the security of their own data with the sole private key. Providing effective protection for uploading and downloading of user data and good data storage and transmission support for cloud storage application through the data protection mechanism deployed at client, thus solving the biggest obstacle, i.e. security of cloud data in the application of cloud storage enterprises currently to a certain extent.

  13. Keyword-based Ciphertext Search Algorithm under Cloud Storage

    Directory of Open Access Journals (Sweden)

    Ren Xunyi

    2016-01-01

    Full Text Available With the development of network storage services, cloud storage have the advantage of high scalability , inexpensive, without access limit and easy to manage. These advantages make more and more small or medium enterprises choose to outsource large quantities of data to a third party. This way can make lots of small and medium enterprises get rid of costs of construction and maintenance, so it has broad market prospects. But now lots of cloud storage service providers can not protect data security.This result leakage of user data, so many users have to use traditional storage method.This has become one of the important factors that hinder the development of cloud storage. In this article, establishing keyword index by extracting keywords from ciphertext data. After that, encrypted data and the encrypted index upload cloud server together.User get related ciphertext by searching encrypted index, so it can response data leakage problem.

  14. SECURE DATA STORAGE IN MULTI CLOUD ENVIRONMENT USING APACHE HADOOP

    OpenAIRE

    Lalitha Singh*, Prof. Jyoti Malhotra, Prof. Sayalee Narkhede

    2016-01-01

    Cloud computing and Hadoop has become a new distributed storage model for most of the organizations, Industries etc. It provides a pay per use model in which customer has to only pay for the data he is storing on the cloud. However, relying on a single cloud storage provider has resulted in problems like vendor lock in. Therefore multi cloud environment is used to address the security and the data availability problems. In this paper, we proposed a system that uses Hadoop computing platform i...

  15. Protecting data in personal cloud storage with security classifications

    OpenAIRE

    Yahya, Fara; Walters, Robert J.; Wills, Gary B.

    2015-01-01

    More and more data is stored in personal cloud storage and it is expected to grow further. As cloud storage is becoming an option for user in keeping their data online, it comes with the security threats and the challenges of protecting their data from unauthorised access. Many security controls have been implemented by cloud storage providers (CSPs) as a security measure but although encryption is known as one of the solution, it cannot be fully implemented due to the need of a robust and co...

  16. Towards Efficient Scientific Data Management Using Cloud Storage

    Science.gov (United States)

    He, Qiming

    2013-01-01

    A software prototype allows users to backup and restore data to/from both public and private cloud storage such as Amazon's S3 and NASA's Nebula. Unlike other off-the-shelf tools, this software ensures user data security in the cloud (through encryption), and minimizes users operating costs by using space- and bandwidth-efficient compression and incremental backup. Parallel data processing utilities have also been developed by using massively scalable cloud computing in conjunction with cloud storage. One of the innovations in this software is using modified open source components to work with a private cloud like NASA Nebula. Another innovation is porting the complex backup to- cloud software to embedded Linux, running on the home networking devices, in order to benefit more users.

  17. Research of Video Data Management Based on Cloud Storage

    Directory of Open Access Journals (Sweden)

    Silian Xie

    2013-06-01

    Full Text Available This study introductions situation of video storage and the methods of video data management, then proposes a Scheduling Strategy algorithm based on Offset Cache (SSOC. According to the statistical information of data block buffer offset, through building a cloud environment and studying the storage layer’s video data storage of the cloud storage, the algorithm schedules on mastering the supply and demand of data block comprehensively and accurately and solves the system's launch delay and the continuity of streaming media player. The method has applied in school's teaching resources.

  18. Evolution of Cloud Storage as Cloud Computing Infrastructure Service

    OpenAIRE

    Rajan, Arokia Paul; Shanmugapriyaa

    2013-01-01

    Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are consumable on demand, elastic to scale up and down as needed, and follow a pay-for-usage model. Out of the three common types of cloud computing service models, Infrastructure as a Service (IaaS) is a service model that provides servers, computing power, network bandwidth and S...

  19. CEDIMS: cloud ethical DICOM image Mojette storage

    Science.gov (United States)

    Guédon, Jeanpierre; Evenou, Pierre; Tervé, Pierre; David, Sylvain; Béranger, Jérome

    2012-02-01

    Dicom images of patients will necessarily been stored in Clouds. However, ethical constraints must apply. In this paper, a method which provides the two following conditions is presented: 1) the medical information is not readable by the cloud owner since it is distributed along several clouds 2) the medical information can be retrieved from any sufficient subset of clouds In order to obtain this result in a real time processing, the Mojette transform is used. This paper reviews the interesting features of the Mojette transform in terms of information theory. Since only portions of the original Dicom files are stored into each cloud, their contents are not reachable. For instance, we use 4 different public clouds to save 4 different projections of each file, with the additional condition that any 3 over 4 projections are enough to reconstruct the original file. Thus, even if a cloud is unavailable when the user wants to load a Dicom file, the other 3 are giving enough information for real time reconstruction. The paper presents an implementation on 3 actual clouds. For ethical reasons, we use a Dicom image spreaded over 3 public clouds to show the obtained confidentiality and possible real time recovery.

  20. Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2011-01-01

    The Cloud Computing is the next generation architecture of IT Enterprise. It moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Here, focus is on cloud data storage security, an important aspect...... of quality of service. To ensure the correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features. By utilizing the homomorphic token with distributed verification of erasure-coded data, the scheme achieves the integration of storage correctness...

  1. Design and Implementation of Agro-technical Extension Information System Based on Cloud Storage

    OpenAIRE

    Guo, Leifeng; Wang, Wensheng; Yang, Yong; Sun,Zhiguo

    2013-01-01

    International audience In order to solve the problems of low efficiency and backward methods in the agro-technical extension activities, this paper designed an agro-technical extension information system based on cloud storage technology. This paper studied the key technologies, such as cloud storage service engine, cloud storage management node and cloud storage data node and designed the overall architecture of the agro-technical extension information system based on cloud storage techno...

  2. Dynamic Data Storage and Public Auditability for Cloud Storage Security

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2012-01-01

    IT has moved into next generation with cloud computing being realized. The way application software and databases are stored has been changed. Now they are stored in cloud data centers in which security is a concern from client point of view. The new phenomenon which is used to store and manage...... data without capital investment has brought many security challenges which are not thoroughly understood. This paper focuses on the security and integrity of data stored in cloud data servers. The data integrity verification is done by using a third party auditor who is authorized to check integrity of...

  3. Notes on a storage manager for the Clouds kernel

    Science.gov (United States)

    Pitts, David V.; Spafford, Eugene H.

    1986-01-01

    The Clouds project is research directed towards producing a reliable distributed computing system. The initial goal is to produce a kernel which provides a reliable environment with which a distributed operating system can be built. The Clouds kernal consists of a set of replicated subkernels, each of which runs on a machine in the Clouds system. Each subkernel is responsible for the management of resources on its machine; the subkernal components communicate to provide the cooperation necessary to meld the various machines into one kernel. The implementation of a kernel-level storage manager that supports reliability is documented. The storage manager is a part of each subkernel and maintains the secondary storage residing at each machine in the distributed system. In addition to providing the usual data transfer services, the storage manager ensures that data being stored survives machine and system crashes, and that the secondary storage of a failed machine is recovered (made consistent) automatically when the machine is restarted. Since the storage manager is part of the Clouds kernel, efficiency of operation is also a concern.

  4. Better cloud storage usability through name space virtualization

    OpenAIRE

    Artiaga Amouroux, Ernest; Marti Fraiz, Jonathan; Cortés Rosselló, Antonio

    2013-01-01

    Cloud-based storage synchronization and backup services are widely available. Nevertheless, their usability is often rigid and coarse-grained: for example, most services synchronize specific whole directories, but are not able to synchronize a single file in arbitrary locations of the file system hierarchy. One of the reasons is that these services focus on the challenges of data transfer between the local system and the cloud; consequently, they try to simplify the interactions with the loca...

  5. Cloud Storage Vendors Wide Support and Security Key Features for Shifting Towards Business Perspective

    Directory of Open Access Journals (Sweden)

    T Prasath

    2014-02-01

    Full Text Available The emerging trends that suits well with the shifting terminologies of computational environment. The cloud computing plays the vital role in today’s business activities. The essential fact of computing rapid technological shift towards cloud.  The storage medium of cloud provides common public spacing, privatized infrastructure, and other platform supports are facilitated. Here in this paper a brief scrutiny  under gone on various cloud storage vendors. The various cloud storage vendors provides data storage, space availability, scaling, sharing, secure transmission between cloud storage medium. Here different vendors wide data storage mediums are discussed with their security features and data access managing capabilities are rendered.

  6. A protect solution for data security in mobile cloud storage

    Science.gov (United States)

    Yu, Xiaojun; Wen, Qiaoyan

    2013-03-01

    It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.

  7. Guaranteeing Data Storage Security in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Viswanath Aiyer

    2015-05-01

    Full Text Available Cloud Computing has been imagined as the next generation structural engineering of IT Enterprise. .By using the homomorphic token with dispersed verification of eradication coded information, our plan attains to the combination of capacity rightness protection and information blunder limitation, i.e., the identification of getting rowdy server(s

  8. Public Data Integrity Verification for Secure Cloud Storage

    Directory of Open Access Journals (Sweden)

    Hongwei Liu

    2013-02-01

    Full Text Available Cloud storage can provide a flexible on-demand data storage service to users anywhere and anytime. However, users’ data is owned by cloud service providers physically, and the physical boundary between two users’ data is fuzzy. In this environment not controlled by users, a method to ensure users’ data integrity must be provided. In order to avoid retrieving enormous storage data and users themselves checking, a public auditing protocol was proposed based on the BLS short signature scheme and the homomorphic hash function. The user computed the signatures of the blocks, and moved them to cloud servers to store. Cloud service providers computed the aggregation of the blocks, and the aggregation of signatures. Third party auditor verified whether the aggregate data was consistent with the aggregate signature. If consistent, users’ data integrity was verified. Based on the computational Diffie-Hellman assumption, the presented protocol is secure against the lost attack and tamper attack from cloud service providers. Based on the stream encryption, the proposed protocol is secure against the curious attack from third party auditor. As the independence among blocks and block signatures, this protocol supports blocks’ update, including insertion, modification and deletion. So, the protocol is secure and efficient, and supports for public verification, dynamic update and privacy preserving.

  9. Application of Cloud Storage on BIM Life-cycle Management

    Directory of Open Access Journals (Sweden)

    Lieyun Ding

    2014-08-01

    Full Text Available Because of its high information intensity, strong consistency and convenient visualization features, building information modelling (BIM has received widespread attention in the fields of construction and project management. However, due to large amounts of information, high integration, the need for resource sharing between various departments, the long time-span of the BIM application, challenges relating to data interoperability, security and cost all slow down the adoption of BIM. This paper constructs a BIM cloud storage concept system using cloud storage, an advanced computer technology, to solve the problem of mass data processing, information security, and cost problems in the existing application of BIM to full life-cycle management. This system takes full advantage of the cloud storage technique. Achievements are reached in four areas of BIM information management, involving security and licensing management, file management, work process management and collaborative management. The system expands the time and space scales, improves the level of participation, and reduces the cost of BIM. The construction of the BIM cloud storage system is one of the most important directions of the development of BIM, which benefits the promotion and further development of BIM to better serve construction and engineering project management.

  10. Move It or Lose It: Cloud-Based Data Storage

    Science.gov (United States)

    Waters, John K.

    2010-01-01

    There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…

  11. Security in Cloud Computing : A Security Assessment of Cloud Computing Providers for an Online Receipt Storage

    OpenAIRE

    Blakstad, Kåre Marius; Andreassen, Mats

    2010-01-01

    Considerations with regards to security issues and demands must be addressed before migrating an application into a cloud computing environment. Different vendors, Microsoft Azure, Amazon Web Services and Google AppEngine, provide different capabilities and solutions to the individual areas of concern presented by each application. Through a case study of an online receipt storage application from the company dSafe, a basis is formed for the evaluation. The three cloud computing vendors are a...

  12. Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Vasu Raju

    2011-09-01

    Full Text Available The Cloud Computing is the next generation architecture of IT Enterprise. It moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Here, focus is on cloud data storage security, an important aspect of quality of service. To ensure the correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features. By utilizing the homomorphic token with distributed verification of erasure-coded data, the scheme achieves the integration of storage correctness and data error localization. The new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is efficient and resilient against Byzantine failure, malicious data modification attack, and server colluding attacks.

  13. A SPIC-AND-SPAN GATEWAY FOR SECURE DATA STORAGE IN CLOUD COMPUTING ENVIRONMENT

    OpenAIRE

    R.STEFFY CROWN; J.KOKILA

    2013-01-01

    Cloud computing is a light weight methodology. The cloud based applications are accessed by the end user through the use of web browser or a light weight desktop. In recent year, cloud computing is a one of the great powerful luminous star in the universal IT industry. Spotlight of this paper is constructing a cloud storage system for robustness, confidentiality, and functionality. A cloud storage system is otherwise called tremendous distributed storage system, it is a collection of numerous...

  14. A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

    OpenAIRE

    Ohmin Kwon; Dongyoung Koo; Yongjoo Shin; Hyunsoo Yoon

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an...

  15. IMPROVED SECURE STORAGE AS SERVICE IN CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Mutharasi N

    2015-10-01

    Full Text Available Cloud is the vast area where multiple accesses to the storage has been emerging. Data sharing is the important thing which was accessible around the world by multiple entities. In my proposed work, data has been stored and accessed from cloud in an efficient manner by encrypting with asymmetric algorithm and generating the hash value for the encrypted data. To ensure high security we are splitting the encrypted data into ‘n’ number of parts and storing it in different cloud servers. During the retrieval process integrate the different parts of the encrypted data and decrypt the file in clients place. Thus providing high security to the data stored in the cloud space. Our proposed scheme is highly efficient even if server crashes.

  16. Applying a cloud computing approach to storage architectures for spacecraft

    Science.gov (United States)

    Baldor, Sue A.; Quiroz, Carlos; Wood, Paul

    As sensor technologies, processor speeds, and memory densities increase, spacecraft command, control, processing, and data storage systems have grown in complexity to take advantage of these improvements and expand the possible missions of spacecraft. Spacecraft systems engineers are increasingly looking for novel ways to address this growth in complexity and mitigate associated risks. Looking to conventional computing, many solutions have been executed to solve both the problem of complexity and heterogeneity in systems. In particular, the cloud-based paradigm provides a solution for distributing applications and storage capabilities across multiple platforms. In this paper, we propose utilizing a cloud-like architecture to provide a scalable mechanism for providing mass storage in spacecraft networks that can be reused on multiple spacecraft systems. By presenting a consistent interface to applications and devices that request data to be stored, complex systems designed by multiple organizations may be more readily integrated. Behind the abstraction, the cloud storage capability would manage wear-leveling, power consumption, and other attributes related to the physical memory devices, critical components in any mass storage solution for spacecraft. Our approach employs SpaceWire networks and SpaceWire-capable devices, although the concept could easily be extended to non-heterogeneous networks consisting of multiple spacecraft and potentially the ground segment.

  17. A Survey on Enabling Privacy for Secure Cloud Storage by Batch Auditing

    OpenAIRE

    Alluri Uday Kumar*1; Rajeev Bilagi2

    2014-01-01

    The Cloud computing is a newest technology which Provides various services through internet. Where users can remotely store their data into the cloud, User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mecha...

  18. ANALYSIS OF DIFFERENT PRIVACY PRESERVING CLOUD STORAGE FRAMEWORKS

    Directory of Open Access Journals (Sweden)

    Rajeev Bedi

    2012-01-01

    Full Text Available Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologiesare used to preserve data security in cloud storage. [1] Proposes a framework which includes the designof data organization structure, the generation and management of keys, the treatment of change of user’saccess right and dynamic operations of data, and the interaction between participants. It also design aninteractive protocol and an extirpation-based key derivation algorithm, which are combined with lazyrevocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficientframework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloudstorage framework in which he designed an interaction protocol among participants, use key derivationalgorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide thesensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this frameworkis realized. This paper analyzes both the frameworks in terms of the feasibility of the frameworks,running overhead of the system and the privacy security of the frameworks.

  19. Dynamic Data Possession Checking for Secure Cloud Storage Service

    Directory of Open Access Journals (Sweden)

    Wenzhe Jiao

    2013-12-01

    Full Text Available Using cloud storage service, data owners can access their data anywhere at any time and enjoy the on-demand high quality applications and services, without the burden of local data storage and maintenance. Meanwhile, the risk of losing data stored with any untrustworthy service provider is the key barrier to widely adopt cloud storage service. To verify the integrity of data stored in cloud and relieve the security concerns of customers, a privacy-preserving data possession checking (DPC scheme is presented. This scheme uses Merkle Hash Tree to support fully dynamic data operations. To achieve robustness, forward error-correcting codes can be combined with the proposed DPC scheme, which can recover the data when a small amount of file has been corrupted. The scheme allows unlimited times verification without the need for the verifier to compare against the original data, which reduces the communication and computation complexity dramatically and preserves the privacy of the data. Extensive security analysis and simulation show that the proposed scheme is highly provably secure.

  20. Implementing cloud storage with OpenStack Swift

    CERN Document Server

    Rajana, Kris; Varma, Sreedhar

    2014-01-01

    This tutorial-based book has a step-by-step approach for each topic, ensuring it is thoroughly covered and easy to follow. If you are an IT administrator who wants to enter the world of cloud storage using OpenStack Swift, then this book is ideal for you. Whether your job is to build, manage, or use OpenStack Swift, this book is an ideal way to move your career ahead. Only basic Linux and server technology skills are expected, to take advantage of this book.

  1. Electron cloud instabilities in the Proton Storage Ring and Spallation Neutron Source

    OpenAIRE

    Blaskiewicz, M.; Furman, M.A.; Pivi, M.; Macek, R.J.

    2002-01-01

    Electron cloud instabilities in the Los Alamos Proton Storage Ring (PSR) and those foreseen for the Oak Ridge Spallation Neutron Source (SNS) are examined theoretically, numerically, and experimentally.

  2. Simple Regenerating Codes: Network Coding for Cloud Storage

    CERN Document Server

    Papailiopoulos, Dimitris S; Dimakis, Alexandros G; Huang, Cheng; Li, Jin

    2011-01-01

    Network codes designed specifically for distributed storage systems have the potential to provide dramatically higher storage efficiency for the same availability. One main challenge in the design of such codes is the exact repair problem: if a node storing encoded information fails, in order to maintain the same level of reliability we need to create encoded information at a new node. One of the main open problems in this emerging area has been the design of simple coding schemes that allow exact and low cost repair of failed nodes and have high data rates. In particular, all prior known explicit constructions have data rates bounded by 1/2. In this paper we introduce the first family of distributed storage codes that have simple look-up repair and can achieve arbitrarily high rates. Our constructions are very simple to implement and perform exact repair by simple XORing of packets. We experimentally evaluate the proposed codes in a realistic cloud storage simulator and show significant benefits in both perf...

  3. Partial storage optimization and load control strategy of cloud data centers.

    Science.gov (United States)

    Al Nuaimi, Klaithem; Mohamed, Nader; Al Nuaimi, Mariam; Al-Jaroodi, Jameela

    2015-01-01

    We present a novel approach to solve the cloud storage issues and provide a fast load balancing algorithm. Our approach is based on partitioning and concurrent dual direction download of the files from multiple cloud nodes. Partitions of the files are saved on the cloud rather than the full files, which provide a good optimization to the cloud storage usage. Only partial replication is used in this algorithm to ensure the reliability and availability of the data. Our focus is to improve the performance and optimize the storage usage by providing the DaaS on the cloud. This algorithm solves the problem of having to fully replicate large data sets, which uses up a lot of precious space on the cloud nodes. Reducing the space needed will help in reducing the cost of providing such space. Moreover, performance is also increased since multiple cloud servers will collaborate to provide the data to the cloud clients in a faster manner. PMID:25973444

  4. Implementation and Performance Evaluation of Distributed Cloud Storage Solutions using Random Linear Network Coding

    DEFF Research Database (Denmark)

    Fitzek, Frank; Toth, Tamas; Szabados, Áron;

    2014-01-01

    This paper advocates the use of random linear network coding for storage in distributed clouds in order to reduce storage and traffic costs in dynamic settings, i.e. when adding and removing numerous storage devices/clouds on-the-fly and when the number of reachable clouds is limited. We introduce...... various network coding approaches that trade-off reliability, storage and traffic costs, and system complexity relying on probabilistic recoding for cloud regeneration. We compare these approaches with other approaches based on data replication and Reed-Solomon codes. A simulator has been developed...... to carry out a thorough performance evaluation of the various approaches when relying on different system settings, e.g., finite fields, and network/storage conditions, e.g., storage space used per cloud, limited network use, and limited recoding capabilities. In contrast to standard coding approaches, our...

  5. Evaluation of the Huawei UDS cloud storage system for CERN specific data

    Science.gov (United States)

    Zotes Resines, M.; Heikkila, S. S.; Duellmann, D.; Adde, G.; Toebbicke, R.; Hughes, J.; Wang, L.

    2014-06-01

    Cloud storage is an emerging architecture aiming to provide increased scalability and access performance, compared to more traditional solutions. CERN is evaluating this promise using Huawei UDS and OpenStack SWIFT storage deployments, focusing on the needs of high-energy physics. Both deployed setups implement S3, one of the protocols that are emerging as a standard in the cloud storage market. A set of client machines is used to generate I/O load patterns to evaluate the storage system performance. The presented read and write test results indicate scalability both in metadata and data perspectives. Futher the Huawei UDS cloud storage is shown to be able to recover from a major failure of losing 16 disks. Both cloud storages are finally demonstrated to function as back-end storage systems to a filesystem, which is used to deliver high energy physics software.

  6. Evaluation of the Huawei UDS cloud storage system for CERN specific data

    International Nuclear Information System (INIS)

    Cloud storage is an emerging architecture aiming to provide increased scalability and access performance, compared to more traditional solutions. CERN is evaluating this promise using Huawei UDS and OpenStack SWIFT storage deployments, focusing on the needs of high-energy physics. Both deployed setups implement S3, one of the protocols that are emerging as a standard in the cloud storage market. A set of client machines is used to generate I/O load patterns to evaluate the storage system performance. The presented read and write test results indicate scalability both in metadata and data perspectives. Futher the Huawei UDS cloud storage is shown to be able to recover from a major failure of losing 16 disks. Both cloud storages are finally demonstrated to function as back-end storage systems to a filesystem, which is used to deliver high energy physics software.

  7. Factors Influencing the Adoption of Cloud Storage by Information Technology Decision Makers

    Science.gov (United States)

    Wheelock, Michael D.

    2013-01-01

    This dissertation uses a survey methodology to determine the factors behind the decision to adopt cloud storage. The dependent variable in the study is the intent to adopt cloud storage. Four independent variables are utilized including need, security, cost-effectiveness and reliability. The survey includes a pilot test, field test and statistical…

  8. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    Science.gov (United States)

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630

  9. Mobile Storage and Search Engine of Information Oriented to Food Cloud

    Directory of Open Access Journals (Sweden)

    Lifeng Wei

    2013-10-01

    Full Text Available The aim of this study is to establish food cloud information search architecture. Food information search engine based on cloud computing architecture can not only achieve more personalized and intelligent search, but also can solve problems of data processing and storage centralization caused by mass of food and custom information. According to design idea of mobile search engine based on cloud computing architecture, the Map/Reduce algorithm and HDFS were thoroughly analyzed and researched. The cloud parallel storage technology under cloud computing architecture was introduced into mobile search engine for design and implementation mobile search engine under open-source Hadoop framework based on cloud computing architecture. The system achieves parallel storage of mass information and mass data to overcome unbalance problem of data centralization and overhead in storage server load caused by mass food data in traditional search engine, thus achieving high efficient mobile device search result and good user satisfaction.

  10. NAFFS: network attached flash file system for cloud storage on portable consumer electronics

    Science.gov (United States)

    Han, Lin; Huang, Hao; Xie, Changsheng

    Cloud storage technology has become a research hotspot in recent years, while the existing cloud storage services are mainly designed for data storage needs with stable high speed Internet connection. Mobile Internet connections are often unstable and the speed is relatively low. These native features of mobile Internet limit the use of cloud storage in portable consumer electronics. The Network Attached Flash File System (NAFFS) presented the idea of taking the portable device built-in NAND flash memory as the front-end cache of virtualized cloud storage device. Modern portable devices with Internet connection have built-in more than 1GB NAND Flash, which is quite enough for daily data storage. The data transfer rate of NAND flash device is much higher than mobile Internet connections[1], and its non-volatile feature makes it very suitable as the cache device of Internet cloud storage on portable device, which often have unstable power supply and intermittent Internet connection. In the present work, NAFFS is evaluated with several benchmarks, and its performance is compared with traditional network attached file systems, such as NFS. Our evaluation results indicate that the NAFFS achieves an average accessing speed of 3.38MB/s, which is about 3 times faster than directly accessing cloud storage by mobile Internet connection, and offers a more stable interface than that of directly using cloud storage API. Unstable Internet connection and sudden power off condition are tolerable, and no data in cache will be lost in such situation.

  11. The cloud storage service bwSync&Share at KIT

    CERN Document Server

    CERN. Geneva

    2014-01-01

    The Karlsruhe Institute of Technology introduced the bwSync&Share collaboration service in January 2014. The service is an on-premise alternative to existing public cloud storage solutions for students and scientists in the German state of Baden-Württemberg, which allows the synchronization and sharing of documents between multiple devices and users. The service is based on the commercial software PowerFolder and is deployed on a virtual environment to support high reliability and scalability for potential 450,000 users. The integration of the state-wide federated identity management system (bwIDM) and a centralized helpdesk portal allows the service to be used by all academic institutions in the state of Baden-Württemberg. Since starting, approximately 15 organizations and 8,000 users joined the service. The talk gives an overview of related challenges, technical and organizational requirements, current architecture and future development plans.

  12. Incoherent Effects of Electron Clouds in Proton Storage Rings

    International Nuclear Information System (INIS)

    Electron clouds in the beam pipe of high-energy proton or positron storage rings can give rise to significant incoherent emittance growth, at densities far below the coherent-instability threshold. We identify two responsible mechanisms: namely (1) a beam particle periodically crosses a resonance and (2) a beam particle periodically crosses a region of the bunch where its motion is linearly unstable. Formation of halo or beam-core blow up, respectively, are the result. Key ingredients for both processes are synchrotron motion and electron-induced tune shift. The mechanisms considered provide a possible explanation for reduced beam lifetime and emittance growth observed at several operating accelerators. Similar phenomena are likely to occur in other two-stream systems

  13. Buffering PV output during cloud transients with energy storage

    Science.gov (United States)

    Moumouni, Yacouba

    Consideration of the use of the major types of energy storage is attempted in this thesis in order to mitigate the effects of power output transients associated with grid-tied CPV systems due to fast-moving cloud coverage. The approach presented here is to buffer intermittency of CPV output power with an energy storage device (used batteries) purchased cheaply from EV owners or battery leasers. When the CPV is connected to the grid with the proper energy storage, the main goal is to smooth out the intermittent solar power and fluctuant load of the grid with a convenient control strategy. This thesis provides a detailed analysis with appropriate Matlab codes to put onto the grid during the day time a constant amount of power on one hand and on the other, shift the less valuable off-peak electricity to the on-peak time, i.e. between 1pm to 7pm, where the electricity price is much better. In this study, a range of base constant power levels were assumed including 15kW, 20kW, 21kW, 22kW, 23kW, 24kW and 25kW. The hypothesis based on an iterative solution was that the capacity of the battery was increased by steps of 5 while the base supply was decreased by the same step size until satisfactorily results were achieved. Hence, it turned out with the chosen battery capacity of 54kWh coupled to the data from the Amonix CPV 7700 unit for Las Vegas for a 3-month period, it was found that 20kW was the largest constant load the system can supply uninterruptedly to the utility company. Simulated results are presented to show the feasibility of the proposed scheme.

  14. Bio-Cryptography Based Secured Data Replication Management in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Elango Pitchai

    2016-07-01

    Full Text Available Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less secure because data remain under a single data mart. This can lead to data loss due to different causes like hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption, replication and storage of data

  15. 云存储安全技术综述%Survey of Secure Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    傅饶; 罗宇; 岳淼

    2014-01-01

    云存储是未来信息存储的一种理想方式,它提供方便易用的存储空间,但数据安全问题是云存储普及最大的障碍,因此云存储安全一直是云存储研究的重点。文章介绍了云存储的安全需求及研究现状,最后探讨了安全云存储系统未来的研究方向。%Cloud storage is a future ideal way of information storage, it provides user-friendly storage space, but the data security has been the biggest obstacle to the popularization of cloud storage, so cloud storage security has always been emphasis in cloud storage. This paper introduces the security demand and the current status of cloud storage, at last we discuss the future research di-rections of secure cloud storage system.

  16. Integration of cloud-based storage in BES III computing environment

    International Nuclear Information System (INIS)

    We present an on-going work that aims to evaluate the suitability of cloud-based storage as a supplement to the Lustre file system for storing experimental data for the BES III physics experiment and as a backend for storing files belonging to individual members of the collaboration. In particular, we discuss our findings regarding the support of cloud-based storage in the software stack of the experiment. We report on our development work that improves the support of CERN' s ROOT data analysis framework and allows efficient remote access to data through several cloud storage protocols. We also present our efforts providing the experiment with efficient command line tools for navigating and interacting with cloud storage-based data repositories both from interactive sessions and grid jobs.

  17. Mobile Storage and Search Engine of Information Oriented to Food Cloud

    OpenAIRE

    Lifeng Wei; Bingmei Zhao

    2013-01-01

    The aim of this study is to establish food cloud information search architecture. Food information search engine based on cloud computing architecture can not only achieve more personalized and intelligent search, but also can solve problems of data processing and storage centralization caused by mass of food and custom information. According to design idea of mobile search engine based on cloud computing architecture, the Map/Reduce algorithm and HDFS were thoroughly analyzed and researched....

  18. Updating an Android Cloud Storage Solutionfrom an Existing iOS Application

    OpenAIRE

    Zimmermann, Jay

    2012-01-01

    Android and iOS are two of the leading smart phone and mobile device operating systems on the present market. Both of these platforms support third party application development. Cloud storage involves storing and accessing data online. The goal of this project involved helping a cloud storage company, with an existing iOS application and a less developed Android application, to update the Android application and simultaneously develop both applications. In addition to producing functionality...

  19. A SPIC-AND-SPAN GATEWAY FOR SECURE DATA STORAGE IN CLOUD COMPUTING ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    R.STEFFY CROWN

    2013-06-01

    Full Text Available Cloud computing is a light weight methodology. The cloud based applications are accessed by the end user through the use of web browser or a light weight desktop. In recent year, cloud computing is a one of the great powerful luminous star in the universal IT industry. Spotlight of this paper is constructing a cloud storage system for robustness, confidentiality, and functionality. A cloud storage system is otherwise called tremendous distributed storage system, it is a collection of numerous storage systems. Now a days the most important issue of cloud computing is surety and confidentiality. Then the cloud computing domain is an open source domain in which several resources are shared. So the sharing of data and the storing of data to be tricky. To overcome this problem in this paper, we proposed a new technique called Trusted Platform Module this conscious grand design to establish a data confidentiality and security prosperity including authentication, and integrity to the cloud computing environment.

  20. A Cloud Storage Platform in the Defense Context : Mobile Data Management With Unreliable Network Conditions

    NARCIS (Netherlands)

    Veen, J.S. van der; Bastiaans, M.; Jonge, M. de; Strijkers, R.J.

    2012-01-01

    This paper discusses a cloud storage platform in the defense context. The mobile and dismounted domains of defense organizations typically use devices that are light in storage, processing and communication capabilities. This means that it is difficult to store a lot of information on these devices

  1. An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment

    Directory of Open Access Journals (Sweden)

    Darapaneni Chandra Sekhar

    2014-10-01

    Full Text Available Today’s image capturing technologies are producing High Definitional-scale images which are also heavier on memory, which has prompted many users into cloud storage, cloud computing is an service based technology and one of the cloud service is Data Storage as a Service (DSaaS, two parties are involved in this service the Cloud Service Provider and The User, user stores his vital data onto the cloud via internet example: Dropbox. but a bigger question is on trustiness over the CSP by user as user data is stored remote devices which user has no clue about, in such situation CSP has to create a trust worthiness to the costumer or user, in these paper we addressed the mention insecurity issue with a well defined trusted image Storing and retrieval framework (TISR using compress sensing methodology.

  2. Securing the Data Storage and Processing in Cloud Computing Environment

    Science.gov (United States)

    Owens, Rodney

    2013-01-01

    Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…

  3. Final critical habitat for the green sea turtle (Chelonia mydas)

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — To provide the user with a general idea of areas where final critical habitat for green sea turtle (Chelonia mydas) based on the description provided in the Federal...

  4. Information Storage and Management Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

    CERN Document Server

    Services, EMC Education

    2012-01-01

    The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies. Features a separate section on emerging area of cloud computi

  5. Electron cloud development in the Proton Storage Ring and in the Spallation Neutron Source

    OpenAIRE

    Pivi, M.T.F.; Furman, M.A.

    2002-01-01

    We have applied our simulation code "POSINST" to evaluate the contribution to the growth rate of the electron-cloud instability in proton storage rings. Recent simulation results for the main features of the electron cloud in the storage ring of the Spallation Neutron Source (SNS) at Oak Ridge, and updated results for the Proton Storage Ring (PSR) at Los Alamos are presented in this paper. A key ingredient in our model is a detailed description of the secondary emitted-electron energy sp...

  6. SSAP: Augmentation based Secure Storage Authentication and Privacy System in Cloud Environment

    Directory of Open Access Journals (Sweden)

    T Prasath

    2013-05-01

    Full Text Available In a cloud storage system storing of data in a third party cloud system that causes serious concern about data confidentiality and in protecting the data via encryption schemes though it provides protection mechanism the functionality of storage system are limited and supports some malicious operations over encrypted data. Developing a cloud based business solution suite for an organization that well equipped with resourceful environment. This suite follows Trusted user verification server that checks for the user authentication to grab the data from the persistence server and some improved schemes such as ISID is facilitated. In this paper we enhance a SSAP (Secure storage authentication and privacy system that proposes a re-encryption scheme that formulates the secure distributed storage system which is named as erasure code-based cloud storage system. The main contribution is the proxy re-encryption scheme which encodes the messages and forwarding operation over encrypted data. There are certain parameters for a number of copies of a message dispatched to storage servers queried by key servers. By using SUV (Straight unsigned verification scheme the improved secrecy ID (ISID scheme is addressed at the receiving end. These parameters allow more flexible adjustment between the storage servers and authentication between the two mediators which an ISID scheme that provides efficiency and provable secure system.

  7. Secured Data Consistency and Storage Way in Untrusted Cloud using Server Management Algorithm

    CERN Document Server

    Dinesh, C

    2011-01-01

    It is very challenging part to keep safely all required data that are needed in many applications for user in cloud. Storing our data in cloud may not be fully trustworthy. Since client doesn't have copy of all stored data, he has to depend on Cloud Service Provider. But dynamic data operations, Read-Solomon and verification token construction methods don't tell us about total storage capacity of server allocated space before and after the data addition in cloud. So we have to introduce a new proposed system of efficient storage measurement and space comparison algorithm with time management for measuring the total allocated storage area before and after the data insertion in cloud. So by using our proposed scheme, the value or weight of stored data before and after is measured by client with specified time in cloud storage area with accuracy. And here we also have proposed the multi-server restore point in server failure condition. If there occurs any server failure, by using this scheme the data can be reco...

  8. Cloud Data Storage and Management%云数据存储与管理

    Institute of Scientific and Technical Information of China (English)

    刘琨; 董龙江

    2011-01-01

    Cloud computing as a new business model is developed very fast. Data storage and management is a very important and valuable research field in cloud computing. This paper introduces the concept of cloud storage as well as the advantage and architecture of cloud storage. Then it analyzes the cloud data storage technology-- GFS(Google File System)/HDFS(Hadoop Distributed File System) and the cloud data management system-BigTable/HBase based on the specific cases of enterprises.%云计算作为一种新兴的商业模式发展异常迅猛,数据存储与管理是云计算中非常重要也极具价值的研究领域.介绍了云存储的概念、云存储的优势及云存储的架构:结合企业的具体实例,从多层次多方位深度剖析了云数据存储技术GFS(Google File System)/HDFS(Hadoop Distributed File System)及云数据管理系统BigTable/HBase,并对它们进行了分析比较.

  9. A Security Integrated Data Storage Model for Cloud Environment

    Directory of Open Access Journals (Sweden)

    Sonia Rani

    2014-08-01

    Full Text Available Security is one of the basic aspects required in any network model. But when the access is on some shared system such as Cloud, the security criticality is increased. This kind of system is defined along with service and resource sharing services as well as to perform the data management effectively. These services are integrated with public as well as private environment. Cloud System, increases the criticality because of available limited resources in mobile devices. In this present work, a three stage security model is presented for Cloud Environment. The work is applied on secure file management and distribution over the secure Cloud environment. The paper included the exploration to the proposed security model.

  10. Towards Efficient Scientific Data Management using Cloud Storage Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Building more in-house datacenters to backup explosively growing scientific datasets is neither cost-effective nor in line with government green initiative. Cloud...

  11. A Security Integrated Data Storage Model for Cloud Environment

    OpenAIRE

    Sonia Rani; Neetu Sharma

    2014-01-01

    Security is one of the basic aspects required in any network model. But when the access is on some shared system such as Cloud, the security criticality is increased. This kind of system is defined along with service and resource sharing services as well as to perform the data management effectively. These services are integrated with public as well as private environment. Cloud System, increases the criticality because of available limited resources in mobile devices. In this pre...

  12. Properties of the electron cloud in a high-energy positron and electron storage ring

    International Nuclear Information System (INIS)

    Low-energy, background electrons are ubiquitous in high-energy particle accelerators. Under certain conditions, interactions between this electron cloud and the high-energy beam can give rise to numerous effects that can seriously degrade the accelerator performance. These effects range from vacuum degradation to collective beam instabilities and emittance blowup. Although electron-cloud effects were first observed two decades ago in a few proton storage rings, they have in recent years been widely observed and intensely studied in positron and proton rings. Electron-cloud diagnostics developed at the Advanced Photon Source enabled for the first time detailed, direct characterization of the electron-cloud properties in a positron and electron storage ring. From in situ measurements of the electron flux and energy distribution at the vacuum chamber wall, electron-cloud production mechanisms and details of the beam-cloud interaction can be inferred. A significant longitudinal variation of the electron cloud is also observed, due primarily to geometrical details of the vacuum chamber. Such experimental data can be used to provide realistic limits on key input parameters in modeling efforts, leading ultimately to greater confidence in predicting electron-cloud effects in future accelerators.

  13. Study of cloud storage technology and its application%云存储技术及其应用研究

    Institute of Scientific and Technical Information of China (English)

    陈一明

    2014-01-01

    Cloud computing is a new network application model,cloud storage is a data storage and management as the core of cloud computing systems.Describes cloud computing and cloud storage principles and application characteristics,design of a university-based teaching and learning environment of wisdom cloud storage - cloud teaching platform,the platform analysis principles,characteristics and so on.%云计算是一种新的网络应用模式,云存储是一个以数据存储和管理为核心的云计算系统。阐述云计算与云存储的原理及应用特点,设计一种基于云存储的高校智慧教学环境--云教学平台,分析该平台的原理、特点等。

  14. Electron cloud development in the Proton Storage Ring and in the Spallation Neutron Source

    International Nuclear Information System (INIS)

    We have applied our simulation code ''POSINST'' to evaluate the contribution to the growth rate of the electron-cloud instability in proton storage rings. Recent simulation results for the main features of the electron cloud in the storage ring of the Spallation Neutron Source(SNS) at Oak Ridge, and updated results for the Proton Storage Ring (PSR) at Los Alamos are presented in this paper. A key ingredient in our model is a detailed description of the secondary emitted-electron energy spectrum. A refined model for the secondary emission process including the so-called true secondary, rediffused and backscattered electrons has recently been included in the electron-cloud code

  15. A New Improved Storage Model of Wireless Devices using the Cloud

    OpenAIRE

    Boraq Ammourah; Khaled Elleithy; Zyad Nossire

    2013-01-01

    This paper focuses on the development of new storage model by using cloud computing formobile devises. The concept of cloud computing has been applied to mobile devices for improving theexisting model (battery time and data saving) of mobile devices. In the recent eras, different types ofcloud computing techniques have been used for improving the efficiency of mobile devices. The paperhas combined the calibration and current launch amount characteristics with the trial results for drop inbatt...

  16. Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage

    OpenAIRE

    Bansal, Chetan; Bhargavan, Karthikeyan; Delignat-Lavaud, Antoine; Maffeis, Sergio

    2013-01-01

    To protect sensitive user data against server-side attacks, a number of security-conscious web applications have turned to client-side encryption, where only encrypted user data is ever stored in the cloud. We formally investigate the security of a number of such applications, including password managers, cloud storage providers, an e-voting website and a conference management system. We find that their security relies on both their use of cryptography and the way it combines with common web ...

  17. Optimizing Cloud Based Image Storage, Dissemination and Processing Through Use of Mrf and Lerc

    Science.gov (United States)

    Becker, Peter; Plesea, Lucian; Maurer, Thomas

    2016-06-01

    The volume and numbers of geospatial images being collected continue to increase exponentially with the ever increasing number of airborne and satellite imaging platforms, and the increasing rate of data collection. As a result, the cost of fast storage required to provide access to the imagery is a major cost factor in enterprise image management solutions to handle, process and disseminate the imagery and information extracted from the imagery. Cloud based object storage offers to provide significantly lower cost and elastic storage for this imagery, but also adds some disadvantages in terms of greater latency for data access and lack of traditional file access. Although traditional file formats geoTIF, JPEG2000 and NITF can be downloaded from such object storage, their structure and available compression are not optimum and access performance is curtailed. This paper provides details on a solution by utilizing a new open image formats for storage and access to geospatial imagery optimized for cloud storage and processing. MRF (Meta Raster Format) is optimized for large collections of scenes such as those acquired from optical sensors. The format enables optimized data access from cloud storage, along with the use of new compression options which cannot easily be added to existing formats. The paper also provides an overview of LERC a new image compression that can be used with MRF that provides very good lossless and controlled lossy compression.

  18. Cloud Storage Technology and Development%云存储技术及其发展

    Institute of Scientific and Technical Information of China (English)

    孙小雁

    2014-01-01

    Along with the rapid development of cloud computing, researchers are getting more and more interested in this area. Since there is abundant of cloud data in cloud and a large number of users, cloud storage technology is becoming a key technology in cloud computing. The mainstream cloud platform and cloud storage technology are introduced in detail in this study. And the challenges under new situation and requirements are also discussed.%云计算的迅速发展吸引了研究人员的深入研究与普通民众的广泛关注,随着云端数据越来丰富、用户数量越来越庞大,云存储技术的发展越来越受到重视。对当前主流的云存储平台及平台中采用的云存储技术进行了详细的介绍,并剖析了新形势、新需求下云存储技术中存在的若干问题。

  19. Organizational principles of cloud storage to support collaborative biomedical research.

    Science.gov (United States)

    Kanbar, Lara J; Shalish, Wissam; Robles-Rubio, Carlos A; Precup, Doina; Brown, Karen; Sant'Anna, Guilherme M; Kearney, Robert E

    2015-08-01

    This paper describes organizational guidelines and an anonymization protocol for the management of sensitive information in interdisciplinary, multi-institutional studies with multiple collaborators. This protocol is flexible, automated, and suitable for use in cloud-based projects as well as for publication of supplementary information in journal papers. A sample implementation of the anonymization protocol is illustrated for an ongoing study dealing with Automated Prediction of EXtubation readiness (APEX). PMID:26736489

  20. Secure Data Forwarding in Cloud Storage System by using UMIB Proxy

    Directory of Open Access Journals (Sweden)

    P Radha Krishna Reddy

    2013-09-01

    Full Text Available The cloud storage system is a model consists of networked online collection of storage servers that provides long-term storage services over the Internet hosted by the third parties. Storing data in third party’s cloud system creates serious problems over data confidentiality & authorization. The normal encryption schemes may protect data confidentiality from unauthorized users, but these techniques are limited based on their functionality because only few operations are supported over encrypted data.It’s a challenging task to construct secure storage system with multiple functionalities, if the storage system is distributed. In this paper we developed a secure distributed storage system by using (UMIB-PRE Unidirectional and Multiuse Identity based proxy re encryption technique with decentralized erasure code. The main theme of this UMIB proxy re encryption is to support encoding, storing and forwarding operations over encrypted data. Our method full supports encryption, decryption, encoding and forwarding techniques. We also suggest possible parameters for these key servers and storage servers as well. These parameters will give robustness to storage servers.

  1. Two-Level Verification of Data Integrity for Data Storage in Cloud Computing

    Science.gov (United States)

    Xu, Guangwei; Chen, Chunlin; Wang, Hongya; Zang, Zhuping; Pang, Mugen; Jiang, Ping

    Data storage in cloud computing can save capital expenditure and relive burden of storage management for users. As the lose or corruption of files stored may happen, many researchers focus on the verification of data integrity. However, massive users often bring large numbers of verifying tasks for the auditor. Moreover, users also need to pay extra fee for these verifying tasks beyond storage fee. Therefore, we propose a two-level verification of data integrity to alleviate these problems. The key idea is to routinely verify the data integrity by users and arbitrate the challenge between the user and cloud provider by the auditor according to the MACs and ϕ values. The extensive performance simulations show that the proposed scheme obviously decreases auditor's verifying tasks and the ratio of wrong arbitration.

  2. Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing

    Directory of Open Access Journals (Sweden)

    J. Noorul Ameen

    2014-06-01

    Full Text Available Cloud computing, where the data has been stored on cloud servers and retrieved by users (data consumers the data from cloud servers. However, there are some security challenges which are in need of independent auditing services to verify the data integrity and safety in the cloud. Until now a numerous methods has been developed for remote integrity checking whichever only serve for static archive data and cannot be implemented to the auditing service if the data in the cloud is being dynamically updated. Therefore, it is expected to design an efficient and secure dynamic auditing protocol to convince the data owners for t he security and integrity of their data. In this paper, we intent to construct an auditing framework for cloud storage systems for efficient privacy-preserving auditing service. Then, our auditing protocol is extended to support the data dynamic operations for secure auditing in the random oracle model. In addition, our auditing protocol is improved to support batch auditing for both multiple owners and multiple clouds without any trusted organizer. Our proposed auditing protocols will be proved for their secure and efficient computation with reduced cost for the auditing.

  3. Isolation and Characterization of Chelonia mydas Myoglobin

    Directory of Open Access Journals (Sweden)

    MOHAMAD SADIKIN

    2012-06-01

    Full Text Available Green sea turtle – Chelonia mydas is a lung respiration animal that is able to dive and stay uder sea water for hours without needing to surface for oxygen. As oxygen supply in muscles is assured by myoglobin, we propose to study some characteristic of this muscle protein in green sea turtles. To achieve this objective, pure green sea turtle myoglobin has to be made available. Therefore, our first task is to purify this muscle protein from green sea turtles. Skeletal muscles from 3 green sea turtle hatchlings were studied icroscopically and biochemically. Microscopy observation showed a general structure of striated muscle. Biochemical studies revealed that green sea turtle myoglobin could be more purely isolated to a certain degree by ephadex G-75 gel filtration and purified by immunoaffinity gel chromatography rather than direct purification by DEAE-Sepharose ion exchange chromatography technique. SDS-PAGE analysis showed that green sea turtle myoglobin ran together with horse myoglobin as 17 kDa molecular weight proteins.

  4. A New Improved Storage Model of Wireless Devices using the Cloud

    Directory of Open Access Journals (Sweden)

    Boraq Ammourah

    2013-02-01

    Full Text Available This paper focuses on the development of new storage model by using cloud computing formobile devises. The concept of cloud computing has been applied to mobile devices for improving theexisting model (battery time and data saving of mobile devices. In the recent eras, different types ofcloud computing techniques have been used for improving the efficiency of mobile devices. The paperhas combined the calibration and current launch amount characteristics with the trial results for drop inbattery voltage. A mathematical equation has been derived for mote operation scenario. Through thisequation, the power provide by the power supply as well as the average time of battery can be measured.

  5. Resource Storage Management Model For Ensuring Quality Of Service In The Cloud Archive Systems

    OpenAIRE

    Mariusz Kapanowski; Renata Slota; Jacek Kitowski

    2014-01-01

    Nowadays, service providers offer a lot of IT services in the public or private cloud. The client can buy various kinds of services like SaaS, PaaS, etc. Recently there was introduced Backup as a Service (BaaS) as a variety of SaaS. At the moment there are available several different BaaSes for archiving the data in the cloud, but they provide only a basic level of service quality. In the paper we propose a model which ensures QoS for BaaS and some  methods for management of storage resources...

  6. Cloud data storage technology%云数据安全存储技术探讨

    Institute of Scientific and Technical Information of China (English)

    谭昕

    2015-01-01

    云数据计算因为其计算速度快、方便快捷、造价低廉等优势逐渐成为备受关注和欢迎的计算存储模式,但是随之而来的信息存储安全问题却困扰着众多的云数据用户,更使得众多的计算机用户望而却步。本文着重介绍了密文访问、加密存储、数据销毁三个方面对云数据安全存储技术进行了分析。%Cloud data because of its calculation speed is fast, convenient and quick, low cost and other advantages gradually become attention and welcome to the calculation of the storage mode, but the resulting information storage security problem has plagued many of cloud data users, more make many computer users. This paper introduces the ciphertext access, encryption storage, data destruction of three aspects of cloud data storage technology are analyzed.

  7. Investigation of Storage Options for Scientific Computing on Grid and Cloud Facilities

    International Nuclear Information System (INIS)

    In recent years, several new storage technologies, such as Lustre, Hadoop, OrangeFS, and BlueArc, have emerged. While several groups have run benchmarks to characterize them under a variety of configurations, more work is needed to evaluate these technologies for the use cases of scientific computing on Grid clusters and Cloud facilities. This paper discusses our evaluation of the technologies as deployed on a test bed at FermiCloud, one of the Fermilab infrastructure-as-a-service Cloud facilities. The test bed consists of 4 server-class nodes with 40 TB of disk space and up to 50 virtual machine clients, some running on the storage server nodes themselves. With this configuration, the evaluation compares the performance of some of these technologies when deployed on virtual machines and on “bare metal” nodes. In addition to running standard benchmarks such as IOZone to check the sanity of our installation, we have run I/O intensive tests using physics-analysis applications. This paper presents how the storage solutions perform in a variety of realistic use cases of scientific computing. One interesting difference among the storage systems tested is found in a decrease in total read throughput with increasing number of client processes, which occurs in some implementations but not others.

  8. Distributed storage and cloud computing: a test case

    International Nuclear Information System (INIS)

    Since 2003 the computing farm hosted by the INFN Tier3 facility in Trieste supports the activities of many scientific communities. Hundreds of jobs from 45 different VOs, including those of the LHC experiments, are processed simultaneously. Given that normally the requirements of the different computational communities are not synchronized, the probability that at any given time the resources owned by one of the participants are not fully utilized is quite high. A balanced compensation should in principle allocate the free resources to other users, but there are limits to this mechanism. In fact, the Trieste site may not hold the amount of data needed to attract enough analysis jobs, and even in that case there could be a lack of bandwidth for their access. The Trieste ALICE and CMS computing groups, in collaboration with other Italian groups, aim to overcome the limitations of existing solutions using two approaches: sharing the data among all the participants taking full advantage of GARR-X wide area networks (10 GB/s) and integrating the resources dedicated to batch analysis with the ones reserved for dynamic interactive analysis, through modern solutions as cloud computing.

  9. A Virtual Remote Storage and Data Visualization on the Science Cloud

    Science.gov (United States)

    Watanabe, Hidenobu; Murata, Ken T.

    2013-04-01

    Super-computer is now one of the most important tools for scientific research works. Computational power of super-computers is getting higher and higher. Along with the development of its computational power, data size yielded by super-computers is also getting larger. Typical data size by one job is already in TB order. For near future works, we need to prepare PB scale data analysis. Recently, big-data science is paid attention because of such large-scale data is popular. However, since data analysis environment to process such large scale data is not established in any science cloud or academic cloud, big-data science is not successful yet. One of the reasons of this difficulty is techniques to support researchers working on cloud systems, including middle-wares. For example, we save many data files with large-scale on cloud storages. However, reading these files take too long time. Assume that we have 10TB data files on a normal NAS storage. It takes more than 10 days to read all of the data files. This is because of the low speed disk I/O between hard-disk drive and controlling server. We have been developing a technique of a virtual storage system with high speed I/O using parallel storage system named Gfarm (Grid farmware). With combining parallel disk servers and making a virtual storage, we achieved as high as 7Gbps storage. What should be noted is that the 7Gbps is not network speed, but disk I/O speed. Since disk I/O speed of a local SSD storage is about 4Gbps, this suggests that our virtual storage provide us with higher I/O speed than local disks. After saving or reading data files, we next analyze data files. The virtual disk system should be synchronized these data analysis. In the present talk, we are going to present the sequential data processing (visualization) using the virtual high speed storage system.

  10. OpenStack Swift as Multi-Region Eventual Consistency Storage for ownCloud Primary Storage

    CERN Document Server

    CERN. Geneva

    2014-01-01

    As more users adopt AARNet’s CloudStor Plus offering within Australia, interim solutions deployed to overcome failures of various distributed replicated storage technologies haven’t kept pace with the growth in data volume. AARNet’s original design goal of user proximal data storage, combined with national and even international data replication for redundancy reasons continues to be a key driver for design choices. AARNet’s national network is over 90ms from end to end, and accommodating this has been a key issue with numerous software solutions, hindering attempts to provide both original design goals in a reliable real-time manner. With the addition of features to the ownCloud software allowing primary data storage on OpenStack Swift, AARNet has chosen to deploy Swift in a nation spanning multi-region ring to take advantage of Swift’s eventual consistency capabilities and the local region quorum functionality for fast writes. The scaling capability of Swift resolves the twin problems of geogr...

  11. An Empirical Framework To Detect Security Attacks On the Cloud Data Storage System

    Directory of Open Access Journals (Sweden)

    Sowmya R

    2012-07-01

    Full Text Available Providing an adequate security level in Cloud Environments is currently a particularly active analysis space. a lot of specifically, malicious behaviors targeting massive scale Cloud knowledge repositories (e.g. Denial of Service attacks could drastically degrade the general performance of such systems and can't be detected by typical authentication mechanisms. during this paper we have a tendency to propose a generic security management framework permitting suppliers of Cloud knowledge management systems to outline and enforce complicated security policies. This security framework is meant to detect and stop an over sized array of attacks outlined through an expressive policy description language and to be simply interfaced with numerous knowledge management systems. we have a tendency to show that we will efficiently defend storage system by evaluating our security framework on high of the advanced data management platform.

  12. 一种基于Hadoop的Scool云存储平台%A Scool Cloud Storage Platform Based on the Hadoop

    Institute of Scientific and Technical Information of China (English)

    崔朝国; 刘志明; 李婧; 陈晓凡

    2013-01-01

    针对海量数据的指数级增长,现有的文件存储系统很难满足现有系统需求,提出基于Hadoop的Scool云存储平台,系统通过采用Linux集群技术、分布式文件系统和云计算框架等技术,来实现海量数据存储和高速数据处理.通过比较云存储和传统存储模式的区别,分析了云存储技术优势和可行性,介绍了云存储架构模型,设计了基于Hadoop的Scool云存储文件管理系统,为今后深入研究云计算和云存储提供了一定的基础.%Based on mass data of exponential growth, the existing file storage facilities already cannot satisfy the existing system re?quirements, based on the Hadoop building Scool cloud storage platform, through the use of Linux cluster technology, distributed file system and cloud computing framework technology, to realize the mass data storage and high speed data processing. Com?pared the cloud storage and traditional storage mode difference, analyzes the cloud storage technology advantages and feasibility and characteristics, this paper introduces the cloud storage architecture model, based on the design of the Hadoop Scool cloud storage file management system. For future in-depth research cloud computing and cloud storage laid a foundation.

  13. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    Science.gov (United States)

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature. PMID:25634700

  14. A Metadata Based Storage Model for Securing Data in Cloud Environment

    OpenAIRE

    S. Subashini; Kavitha, V.

    2012-01-01

    Problem statement: Enterprises are migrating to the cloud environment at a faster pace. Security of information that is being processed by the applications and ultimately getting stored in the data centers are of big concerns of this newly evolving environment. The security of the data is a concern not only during transferring of data through the wires but also during its storage phase where data stays most of the time. Approach: In order to keep the data secure during its storage phase, a pr...

  15. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  16. Cloud Storage in Digital Libraries%云存储在数字图书馆中的应用

    Institute of Scientific and Technical Information of China (English)

    董屹; 王昆鹏

    2013-01-01

    Representative of a trend in the development of computer information storage cloud storage, it is a new kind of data storage in the future, and cloud storage is bound in the library in large-scale applications. This paper introduced the concept of cloud storage, the characteristics of the status quo based on a preliminary exploration of cloud storage resources in the library stor?age and retrieval applications and libraries cloud storage prospects.%云存储代表计算机信息存储发展的一个趋势,它是一种新的数据存储、处理方式,在不久的将来,云存储必将在图书馆中大规模地应用.该文在介绍云存储概念、特点、现状的基础上,对云存储在图书馆中的资源存储和检索方面的应用进行了初步的探索,并分析了图书馆中云存储的应用前景.

  17. Status of experimental studies of electron cloud effects at the Los Alamos proton storage ring

    International Nuclear Information System (INIS)

    Various electron cloud effects (ECE) including the two-stream (e-p) instability at the Los Alamos Proton Storage Ring (PSR) have been studied extensively for the past five years with the goal of understanding the phenomena, mitigating the instability and ultimately increasing beam intensity. The specialized diagnostics used in the studies are two types of electron detectors, the retarding field analyzer and the electron sweepmg detector - which have been employed to measure characteristics of the electron cloud as functions of time, location in the ring and various influential beam parameters - plus a short stripline beam position monitor used to measure high frequency motion of the beam centroid. Highlights of this research program are summarized along with more detail on recent results obtained since the ECLOUD'02 workshop. Recent work mcludes a number of parametric studies of the various factors that affect the electron cloud signals, studies of the sources of initial or 'seed' electrons, additional observations of electron cloud dissipation after the beam pulse is extracted, studies of the 'first pulse instability' issue, more data on electron suppression as a cure for the instability, and observations of the effect of a one-turn weak kick on intense beams in the presence of a significant electron cloud.

  18. Revised cloud storage structure for light-weight data archiving in LHD

    Energy Technology Data Exchange (ETDEWEB)

    Nakanishi, Hideya, E-mail: nakanisi@nifs.ac.jp [National Institute for Fusion Science, 322-6 Oroshi-cho, Toki, Gifu 509-5292 (Japan); Masaki, Ohsuna; Mamoru, Kojima; Setsuo, Imazu; Miki, Nonomura; Masahiko, Emoto; Takashi, Yamamoto; Yoshio, Nagayama [National Institute for Fusion Science, 322-6 Oroshi-cho, Toki, Gifu 509-5292 (Japan); Takahisa, Ozeki [Japan Atomic Energy Agency, 801-1 Mukoyama, Naka, Ibaraki 311-0193 (Japan); Noriyoshi, Nakajima; Katsumi, Ida; Osamu, Kaneko [National Institute for Fusion Science, 322-6 Oroshi-cho, Toki, Gifu 509-5292 (Japan)

    2014-05-15

    Highlights: • GlusterFS is adopted to replace IznaStor cloud storage in LHD. • GlusterFS and OpenStack/Swift are compared. • SSD-based GlusterFS distributed replicated volume is separated from normal RAID storage. • LABCOM system changes the storage technology every 4 years for cost efficiency. - Abstract: The LHD data archiving system has newly selected GlusterFS distributed filesystem for the replacement of the present cloud storage software named “IznaStor/dSS”. Even though the prior software provided many favorable functionalities of hot plug and play node insertion, internal auto-replication of data files, and symmetric load balancing between all member nodes, it revealed a poor feature in recovering from an accidental malfunction of a storage node. Once a failure happened, the recovering process usually took at least several days or sometimes more than a week with a heavy cpu load. In some cases they fell into the so-called “split-brain” or “amnesia” condition, not to get recovered from it. Since the recovery time tightly depends on the capacity size of the fault node, individual HDD management is more desirable than large volumes of HDD arrays. In addition, the dynamic mutual awareness of data location information may be removed if some other static data distribution method can be applied. In this study, the candidate middleware of “OpenStack/Swift” and “GlusterFS” has been tested by using the real mass of LHD data for more than half a year, and finally GlusterFS has been selected to replace the present IznaStor. It has implemented very limited functionalities of cloud storage but a simplified RAID10-like structure, which may consequently provide lighter-weight read/write ability. Since the LABCOM data system is implemented to be independent of the storage structure, it is easy to plug off the IznaStor and on the new GlusterFS. The effective I/O speed is also confirmed to be on the same level as the estimated one from raw

  19. Revised cloud storage structure for light-weight data archiving in LHD

    International Nuclear Information System (INIS)

    Highlights: • GlusterFS is adopted to replace IznaStor cloud storage in LHD. • GlusterFS and OpenStack/Swift are compared. • SSD-based GlusterFS distributed replicated volume is separated from normal RAID storage. • LABCOM system changes the storage technology every 4 years for cost efficiency. - Abstract: The LHD data archiving system has newly selected GlusterFS distributed filesystem for the replacement of the present cloud storage software named “IznaStor/dSS”. Even though the prior software provided many favorable functionalities of hot plug and play node insertion, internal auto-replication of data files, and symmetric load balancing between all member nodes, it revealed a poor feature in recovering from an accidental malfunction of a storage node. Once a failure happened, the recovering process usually took at least several days or sometimes more than a week with a heavy cpu load. In some cases they fell into the so-called “split-brain” or “amnesia” condition, not to get recovered from it. Since the recovery time tightly depends on the capacity size of the fault node, individual HDD management is more desirable than large volumes of HDD arrays. In addition, the dynamic mutual awareness of data location information may be removed if some other static data distribution method can be applied. In this study, the candidate middleware of “OpenStack/Swift” and “GlusterFS” has been tested by using the real mass of LHD data for more than half a year, and finally GlusterFS has been selected to replace the present IznaStor. It has implemented very limited functionalities of cloud storage but a simplified RAID10-like structure, which may consequently provide lighter-weight read/write ability. Since the LABCOM data system is implemented to be independent of the storage structure, it is easy to plug off the IznaStor and on the new GlusterFS. The effective I/O speed is also confirmed to be on the same level as the estimated one from raw

  20. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider. PMID:27571421

  1. Resource Storage Management Model For Ensuring Quality Of Service In The Cloud Archive Systems

    Directory of Open Access Journals (Sweden)

    Mariusz Kapanowski

    2014-01-01

    Full Text Available Nowadays, service providers offer a lot of IT services in the public or private cloud. The client can buy various kinds of services like SaaS, PaaS, etc. Recently there was introduced Backup as a Service (BaaS as a variety of SaaS. At the moment there are available several different BaaSes for archiving the data in the cloud, but they provide only a basic level of service quality. In the paper we propose a model which ensures QoS for BaaS and some  methods for management of storage resources aimed at achieving the required SLA. This model introduces a set of parameters responsible for SLA level which can be offered on the basic or higher level of quality. The storage systems (typically HSM, which are distributed between several Data Centres,  are built based on disk arrays, VTLs, and tape libraries. The RSMM model does not assume bandwidth reservation or control, but is rather focused on the management of storage resources.

  2. A Metadata Based Storage Model for Securing Data in Cloud Environment

    Directory of Open Access Journals (Sweden)

    S. Subashini

    2012-01-01

    Full Text Available Problem statement: Enterprises are migrating to the cloud environment at a faster pace. Security of information that is being processed by the applications and ultimately getting stored in the data centers are of big concerns of this newly evolving environment. The security of the data is a concern not only during transferring of data through the wires but also during its storage phase where data stays most of the time. Approach: In order to keep the data secure during its storage phase, a preventive, robust security model is required. Instead of developing a robust security module to prevent hackers from intruding into data centers, a model which will prevent intruders from getting the required information even at the event of intrusion, will be of utmost use. Conventional security models secure data by encryption or by fragmentation. A security model developed using a fragmentation technique that is based on the sensitivity, criticality and value of the data provides better security by means of disintegration of value of the data and also a good technique for prevention of information leaks. The proposed method also provides solutions to access the fragmented data. Results: The proposed model provides a efficient security solution for data stored in cloud. When compared to conventional methods, the speed of data queries are less for small databases, but prove to be very efficient for huge databases. Conclusion: This model provides an efficient solution for data storage security in cloud environment. This technique coupled with standard encryption techniques will make this model more robust.

  3. Optimizing the Use of Storage Systems Provided by Cloud Computing Environments

    Science.gov (United States)

    Gallagher, J. H.; Potter, N.; Byrne, D. A.; Ogata, J.; Relph, J.

    2013-12-01

    Cloud computing systems present a set of features that include familiar computing resources (albeit augmented to support dynamic scaling of processing power) bundled with a mix of conventional and unconventional storage systems. The linux base on which many Cloud environments (e.g., Amazon) are based make it tempting to assume that any Unix software will run efficiently in this environment efficiently without change. OPeNDAP and NODC collaborated on a short project to explore how the S3 and Glacier storage systems provided by the Amazon Cloud Computing infrastructure could be used with a data server developed primarily to access data stored in a traditional Unix file system. Our work used the Amazon cloud system, but we strived for designs that could be adapted easily to other systems like OpenStack. Lastly, we evaluated different architectures from a computer security perspective. We found that there are considerable issues associated with treating S3 as if it is a traditional file system, even though doing so is conceptually simple. These issues include performance penalties because using a software tool that emulates a traditional file system to store data in S3 performs poorly when compared to a storing data directly in S3. We also found there are important benefits beyond performance to ensuring that data written to S3 can directly accessed without relying on a specific software tool. To provide a hierarchical organization to the data stored in S3, we wrote 'catalog' files, using XML. These catalog files map discrete files to S3 access keys. Like a traditional file system's directories, the catalogs can also contain references to other catalogs, providing a simple but effective hierarchy overlaid on top of S3's flat storage space. An added benefit to these catalogs is that they can be viewed in a web browser; our storage scheme provides both efficient access for the data server and access via a web browser. We also looked at the Glacier storage system and

  4. 云数据安全存储技术分析%Analysis on Cloud Data Storage Technology Related to Security

    Institute of Scientific and Technical Information of China (English)

    朱斌

    2015-01-01

    文章对云数据存储模式进行分析,对云数据安全存储存在的问题进行研究,对云数据安全存储技术进行了探讨。%The paper analyzed cloud data storage mode,cloud data storage problems of security research,security of cloud data storage technologies were discussed.

  5. 云存储数据缩减技术研究%Research on cloud storage data reduction technology

    Institute of Scientific and Technical Information of China (English)

    胡新海

    2012-01-01

    基于云计算应用中的云存储技术,使数据存储变得安全可靠和易管理。在云存储技术数据存储的过程中,不仅考虑数据读写的速度,还得处理数据存储效率,以便满足当前海量信息存储的需求。云存储中的数据缩减技术可以缩减数据信息量,提高存储的效率,满足数据存储急剧的要求。通过对几种数据缩减技术进行比较研究分析,探讨了对数据处理后存储的效率以及每项技术发展状况,为用户选择云存储数据缩减技术提供有力的参考。%Based on cloud storage technology applied in cloud computing applications, data storage has become more safer, reliable and manageable. During the process of cloud data storage,we not only consider the speed of data read and write,but also deal with the efficiency of data storage,in order to meet the needs of the vast amounts of information storage. Cloud storage data reduction technology can reduce the data amount of information to improve the efficiency of the storage to meet drastic re- quirements of data storage. Through a comparative study of several pairs of data reduction technology carried out, the author discuss and analyze the efficiency of the stored after the data processing and the technological development status to provide strong reference for the user to select the cloud storage data reduction technology.

  6. Tests of Cloud Computing and Storage System features for use in H1 Collaboration Data Preservation model

    International Nuclear Information System (INIS)

    Based on the currently developing strategy for data preservation and long-term analysis in HEP tests of possible future Cloud Computing based on the Eucalyptus Private Cloud platform and the petabyte scale storage open source system CEPH were performed for the H1 Collaboration. Improvements in computing power and strong development of storage systems suggests that a single Cloud Computing resource supported on a given site will be sufficient for analysis requirements beyond the end-date of experiments. This work describes our test-bed architecture which could be applied to fulfill the requirements of the physics program of H1 after the end date of the Collaboration. We discuss the reasons why we choose the Eucalyptus platform and CEPH storage infrastructure as well as our experience with installations and support of these infrastructures. Using our first test results we will examine performance characteristics, noticed failure states, deficiencies, bottlenecks and scaling boundaries.

  7. Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE

    Directory of Open Access Journals (Sweden)

    Mrs. S. Ramya

    2013-07-01

    Full Text Available Cloud computing techniques are used to share resources. It transfers the application software and databases to the centralized large data centers. Storing important data with cloud storage providers comes with serious security risks. The cloud can leak confidential data, modify the data, or return inconsistent data to different users. So, the cloud data security requires authentication and integrity analysis for the storage data values. An erasure code provides redundancy by breaking objects up into smaller fragments and storing the fragments in different places. The key is that you can recover the data from any combination of a smaller number of those fragments. With threshold proxy re-encryption scheme (PRE , a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval. It meets the requirements that storage servers independently perform encoding and re-encryption and key servers independently perform partial decryption. The system user forwards his data in the storage servers to another user without retrieving the data back. A major feature of the cloud services is that user’s data are usually processed remotely in unknown machines that users do not own or operate. Conditional Proxy Re-Encryption (C-PRE is proposed, whereby user has a fine-grained control over the delegation. As a result, user can flexibly assign her delegate, and decryption capability based on the conditions attached to the messages, using a proxy with no higher trust than in existing PRE schemes

  8. Research on Key Technologies of Cloud Storage%云存储关键技术研究

    Institute of Scientific and Technical Information of China (English)

    许志龙; 张飞飞

    2012-01-01

    Since the advent of mass storage system and the development of the parallel file system and distributed file systems, cloud storage system which is based on cloud computing technology, will become an important storage in future with the characteristics of low cost and scalability. Intro- duces the technology and implementation related to cloud storage and the application of cloud storage in some fields.%随着海量存储系统的出现与并行文件系统、分布式文件系统的发展.云存储系统建立在云计算技术前提之上,以其成本低、可扩展的特点,将成为未来的主要存储方式。介绍云存储相关的技术与实现及云存储在目前几个主要领域的应用。

  9. The Comparative Study for Cloud Storage and Cloud Storage Architecture Structure Model%云存储结构模型及云存储架构的比较研究

    Institute of Scientific and Technical Information of China (English)

    王哈琴

    2013-01-01

    The concept of cloud storage is a new concept, its technology, including the use of cluster computing, distrib-uted file systems, and grid computing technologies. These heterogeneous storage systems through mutual coordination, cooperation, constitute a virtual, huge storage system as a whole provides a common external data storage and business access function. This article describes the structure of cloud storage model, and several typical cloud storage architec-ture of a comparative study.%云存储的概念是一个新的概念,它所利用的技术包括集群计算、分布式文件系统以及网格计算技术等。这些异构的存储系统通过彼此的协调、配合,构成一个虚拟的、巨大的存储系统,作为一个整体共同对外提供数据存储和业务访问功能。文章阐述了云存储结构模型,并对几种典型云存储的架构进行了比较研究。

  10. Using S3 cloud storage with ROOT and CvmFS

    Science.gov (United States)

    Arsuaga-Ríos, María; Heikkilä, Seppo S.; Duellmann, Dirk; Meusel, René; Blomer, Jakob; Couturier, Ben

    2015-12-01

    Amazon S3 is a widely adopted web API for scalable cloud storage that could also fulfill storage requirements of the high-energy physics community. CERN has been evaluating this option using some key HEP applications such as ROOT and the CernVM filesystem (CvmFS) with S3 back-ends. In this contribution we present an evaluation of two versions of the Huawei UDS storage system stressed with a large number of clients executing HEP software applications. The performance of concurrently storing individual objects is presented alongside with more complex data access patterns as produced by the ROOT data analysis framework. Both Huawei UDS generations show a successful scalability by supporting multiple byte-range requests in contrast with Amazon S3 or Ceph which do not support these commonly used HEP operations. We further report the S3 integration with recent CvmFS versions and summarize the experience with CvmFS/S3 for publishing daily releases of the full LHCb experiment software stack.

  11. A Low Energy Consumption Storage Method for Cloud Video Surveillance Data Based on SLA Classification

    Directory of Open Access Journals (Sweden)

    Yonghua Xiong

    2016-01-01

    Full Text Available With the continuous expansion of the amount of data with time in mobile video applications such as cloud video surveillance (CVS, the increasing energy consumption in video data centers has drawn widespread attention for the past several years. Addressing the issue of reducing energy consumption, we propose a low energy consumption storage method specially designed for CVS systems based onthe service level agreement (SLA classification. A novel SLA with an extra parameter of access time period is proposed and then utilized as a criterion for dividing virtual machines (VMs and data storage nodes into different classifications. Tasks can be scheduled in real time for running on the homologous VMs and data storage nodes according to their access time periods. Any nodes whose access time periods do not encompass the current time will be placed into the energy saving state while others are in normal state with the capability of undertaking tasks. As a result, overall electric energy consumption in data centers is reduced while the SLA is fulfilled. To evaluate the performance, we compare the method with two related approaches using the Hadoop Distributed File System (HDFS. The results show the superiority and effectiveness of our method.

  12. Leveraging Cloud Computing to Improve Storage Durability, Availability, and Cost for MER Maestro

    Science.gov (United States)

    Chang, George W.; Powell, Mark W.; Callas, John L.; Torres, Recaredo J.; Shams, Khawaja S.

    2012-01-01

    The Maestro for MER (Mars Exploration Rover) software is the premiere operation and activity planning software for the Mars rovers, and it is required to deliver all of the processed image products to scientists on demand. These data span multiple storage arrays sized at 2 TB, and a backup scheme ensures data is not lost. In a catastrophe, these data would currently recover at 20 GB/hour, taking several days for a restoration. A seamless solution provides access to highly durable, highly available, scalable, and cost-effective storage capabilities. This approach also employs a novel technique that enables storage of the majority of data on the cloud and some data locally. This feature is used to store the most recent data locally in order to guarantee utmost reliability in case of an outage or disconnect from the Internet. This also obviates any changes to the software that generates the most recent data set as it still has the same interface to the file system as it did before updates

  13. Analysis on Data Security of Cloud Storage%云存储数据安全性分析

    Institute of Scientific and Technical Information of China (English)

    刘思思

    2015-01-01

    云存储是在云计算概念上延伸和发展出来的一个新的概念,是一个以数据存储和管理为核心的云计算系统。由于云服务系统规模巨大,承载了许多用户的隐私数据,再加上云的开放性和复杂性,使其安全面临着比传统信息系统更为严峻的挑战。文章分析了云存储系统的安全性需求,主要包括数据存储和传输的机密性、数据的完整性、身份认证和访问控制。%Cloud storage is a new concept extended and developed from cloud computing,and it is a cloud computing system whose core is data storage and management. It brings more severe challenges than the traditional information system because of the very large scale of cloud service system and the large amount of privacy data,coupled with the complexity and openness of clouds. This paper analyzed the security requirements including conifdentiality of data storage and transmission,data integrity,identity authentication and access control.

  14. Electron Cloud Generation and Trapping in a Quadrupole Magnet at the Los Alamos Proton Storage Ring

    International Nuclear Information System (INIS)

    Recent beam physics studies on the two-stream e-p instability at the LANL proton storage ring (PSR) have focused on the role of the electron cloud generated in quadrupole magnets where primary electrons, which seed beam-induced multipacting, are expected to be largest due to grazing angle losses from the beam halo. A new diagnostic to measure electron cloud formation and trapping in a quadrupole magnet has been developed, installed, and successfully tested at PSR. Beam studies using this diagnostic show that the 'prompt' electron flux striking the wall in a quadrupole is comparable to the prompt signal in the adjacent drift space. In addition, the 'swept' electron signal, obtained using the sweeping feature of the diagnostic after the beam was extracted from the ring, was larger than expected and decayed slowly with an exponential time constant of 50 to 100 (micro)s. Other measurements include the cumulative energy spectra of prompt electrons and the variation of both prompt and swept electron signals with beam intensity. Experimental results were also obtained which suggest that a good fraction of the electrons observed in the adjacent drift space for the typical beam conditions in the 2006 run cycle were seeded by electrons ejected from the quadrupole

  15. 基于网络的云存储模式的分析探讨%Discussion of the Cloud Storage Model Based on the Network

    Institute of Scientific and Technical Information of China (English)

    刘思得

    2012-01-01

    云存储模式是在云计算概念上延伸和发展出来的新概念,是基于网络的数据存储技术,主要提供数据存储和访问服务.本文首先分析了云存储产生的背景、基本概念及其与特点,然后介绍了云存储模式的基本结构,对基本结构中的4层进行分析,并结合Google的云存储系统GFS进行说明,最后就云存储的应用现状进行总结归纳,并分析了云存储的发展方向.%Cloud storage is a new extension and developed on the base of the cloud computing, it is a network梑ased data storage technology, with the main provider of data storage and access service. This paper first analyzed the background of cloud storage, basic concepts and characteristics, and then the basic structure of the cloud storage was presented. Combined with Google's cloud storage system-GFS, the four layers in the basic structure were analyzed. Finally, paper summarized the cloud storage application status and the development direction of the cloud storage was analyzed.

  16. Observation of Electron Cloud Instabilities and Emittance Dilution at the Cornell Electron-Positron Storage Ring Test Accelerator

    International Nuclear Information System (INIS)

    Electron cloud related emittance dilution and instabilities of bunch trains limit the performance of high intensity circular colliders. One of the key goals of the Cornell electron-positron storage ring Test Accelerator (CesrTA) research program is to improve our understanding of how the electron cloud alters the dynamics of bunches within the train. Single bunch beam diagnotics have been developed to measure the beam spectra, vertical beam size, two important dynamical effects of beams interacting with the electron cloud, for bunch trains on a turn-by-turn basis. Experiments have been performed at CesrTA to probe the interaction of the electron cloud with stored positron bunch trains. The purpose of these experiments was to characterize the dependence of beam-electron cloud interactions on the machine parameters such as bunch spacing, vertical chromaticity, and bunch current. The beam dynamics of the stored beam, in the presence of the electron cloud, was quantified using: 1) a gated beam position monitor (BPM) and spectrum analyzer to measure the bunch-by-bunch frequency spectrum of the bunch trains; 2) an x-ray beam size monitor to record the bunch-by-bunch, turn-by-turn vertical size of each bunch within the trains. In this paper we report on the observations from these experiments and analyze the effects of the electron cloud on the stability of bunches in a train under many different operational conditions

  17. Observation of Electron Cloud Instabilities and Emittance Dilution at the Cornell Electron-Positron Storage Ring Test Accelerator

    Science.gov (United States)

    Holtzapple, R. L.; Billing, M. G.; Campbell, R. C.; Dugan, G. F.; Flanagan, J.; McArdle, K. E.; Miller, M. I.; Palmer, M. A.; Ramirez, G. A.; Sonnad, K. G.; Totten, M. M.; Tucker, S. L.; Williams, H. A.

    2016-04-01

    Electron cloud related emittance dilution and instabilities of bunch trains limit the performance of high intensity circular colliders. One of the key goals of the Cornell electron-positron storage ring Test Accelerator (CesrTA) research program is to improve our understanding of how the electron cloud alters the dynamics of bunches within the train. Single bunch beam diagnotics have been developed to measure the beam spectra, vertical beam size, two important dynamical effects of beams interacting with the electron cloud, for bunch trains on a turn-by-turn basis. Experiments have been performed at CesrTA to probe the interaction of the electron cloud with stored positron bunch trains. The purpose of these experiments was to characterize the dependence of beam-electron cloud interactions on the machine parameters such as bunch spacing, vertical chromaticity, and bunch current. The beam dynamics of the stored beam, in the presence of the electron cloud, was quantified using: 1) a gated beam position monitor (BPM) and spectrum analyzer to measure the bunch-by-bunch frequency spectrum of the bunch trains; 2) an x-ray beam size monitor to record the bunch-by-bunch, turn-by-turn vertical size of each bunch within the trains. In this paper we report on the observations from these experiments and analyze the effects of the electron cloud on the stability of bunches in a train under many different operational conditions.

  18. Cloud Storage Application in Public Security Monitoring%云存储在公安监控中的应用

    Institute of Scientific and Technical Information of China (English)

    胡辉毅

    2015-01-01

    通过对原有监控数据CVR存储设备的软硬件升级改造,使其成为视频云存储系统,这样不仅能利用原有的监控数据CVR存储设备,节省存储设备的成本投入,而且提升了数据的存储效率,加强了智能平台的综合应用,并介绍了云存储的优越性及其改造方案和具体步骤。%based on the original monitoring data CVR storage hardware and software upgrades , making it a vid-eo cloud storage system .CVR in this way , not only to the original monitoring data storage devices of old utili-zation and save the cost of storage devices , and improves the data storage efficiency , strengthen the compre-hensive intelligence platform integration application .This paper introduces the advantages of cloud storage , the retrofit scheme and concrete steps .

  19. 浅析云盘技术及存储原理%Analysis of Cloud Disk Storage Technology and the Principle

    Institute of Scientific and Technical Information of China (English)

    王伟

    2015-01-01

    along with the computer technology and modern more advanced, cloud disk technology has penetrated into people's work, this article mainly discusses the principle of cloud storage technology, cloud and cloud disk storage space partition principle.%随着现代的计算机技术越来越先进,云盘的技术已经渗透到很多人的工作中,本篇文章主要来探讨云盘技术、云盘的储存原理以及云盘存储空间划分原理。

  20. Cloud Storage-Oriented Archiving Approach%面向云存储的归档方法

    Institute of Scientific and Technical Information of China (English)

    范中磊

    2011-01-01

    Aiming at the situation that current cloud storage systems mainly focus on file backup, this paper presents a cloud storage-oriented archiving approach. By storing inactive file data in cloud storage systems in archival form and leaving its stub information on clients for the use of read, this approach can not only save storage space on clients and improve the performance, but also implement transparent user access to archived data.%针对目前云存储系统主要提供文件备份的现状,提出了一种面向云存储的归档方法,该方法将不活跃的文件数据以归档的形式存放在云端存储系统,并在客户端保留其存根信息以供读取时使用,从而不仅大大节约了客户端存储空间,改善了客户端性能,而且实现了对用户透明的归档数据访问.

  1. Research on Cloud Storage System Based on Nimbus in Campus Network%基于Nimbus的校园云存储系统研究

    Institute of Scientific and Technical Information of China (English)

    林清滢

    2012-01-01

    Puts forward three-layer architecture of cloud storage system based on Nimbus in campus net- work. The architecture can be divided into three parts: infrastructure layer, cloud storage mid- dleware layer and cloud storage application layer. And then designs and realizes cloud storage system based on Nimbus, among which the main function of cloud storage middleware layer is built on the communication module. Through the communication module, we can make a remote call of the Nimbus components of cloud node, thus achieving the functions of cloud storage.%提出基于Nimbus的三层校园云存储系统的体系结构,分别为基础设施层、云存储中间件层、云存储应用层。并设计与实现基于Nimbus的云存储系统,其中云存储中间件的主要功能是建立在通信模块之上.通过通信模块远程调用云中远程节点的Nimbus组件.从而实现云存储功能。

  2. Cloud Storage Mode of University Library Digital Resources%高校图书馆数字资源的云存储模式探讨

    Institute of Scientific and Technical Information of China (English)

    付晓红; 莫筱梅

    2012-01-01

    分析了传统存储模式下高校图书馆数字资源存储存在的问题,结合云存储的优势,讨论了应用云存储模式存储高校图书馆数字资源,提出并分析了两种具体的高校图书馆数字资源云存储模式。%This paper analyzes the problems of the storage of university libraries digital resources under traditional storage mode,discusses the storage of university libraries digital resources which apply cloud storage mode based on the advantage of cloud storage,proposes and analyzes two specific cloud storage modes of university libraries digital resource.

  3. Mobile Cloud Networking: Mobile network, compute, and storage as one service on-demand

    OpenAIRE

    Jamakovic A.; Bohnert T.M.; Karagiannis G.

    2013-01-01

    The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN) is a EU FP7 Large-scale Integrating Project (IP) funded by the European Commission. MCN project was launched in November 2012 for the period of 36 month. In total top-tier 19 partners from industry and academia commit to jointly establish the vision of Mobile Cloud Networking, to develop a fully cloud-based mobile communication and application platform.

  4. Characterization of electron clouds in the Cornell Electron Storage Ring Test Accelerator using TE-wave transmission

    Energy Technology Data Exchange (ETDEWEB)

    De Santis, S.; Byrd, J. M.; Billing, M.; Palmer, M.; Sikora, J.; Carlson, B.

    2010-01-02

    A relatively new technique for measuring the electron cloud density in storage rings has been developed and successfully demonstrated [S. De Santis, J.M. Byrd, F. Caspers, A. Krasnykh, T. Kroyer, M.T.F. Pivi, and K.G. Sonnad, Phys. Rev. Lett. 100, 094801 (2008).]. We present the experimental results of a systematic application of this technique at the Cornell Electron Storage Ring Test Accelerator. The technique is based on the phase modulation of the TE mode transmitted in a synchrotron beam pipe caused by the periodic variation of the density of electron plasma. Because of the relatively simple hardware requirements, this method has become increasingly popular and has been since successfully implemented in several machines. While the principles of this technique are straightforward, quantitative derivation of the electron cloud density from the measurement requires consideration of several effects, which we address in detail.

  5. Cloud storage-oriented unstructured data storage%面向云存储的非结构化数据存取

    Institute of Scientific and Technical Information of China (English)

    谢华成; 陈向东

    2012-01-01

    With the explosive growth of unstructured data, the existing storage technology in the aspects of I/O throughput, scalability and manageability needs improving urgently. Based on cloud storage and reliability theory, a model of distributed storage for unstructured data was created, and reliability function was also proposed. Hie distributed Relational Database Management System (RDBMS) was adopted as the bottom storage facilities, so unstructured data could be stored directly in the data table. Separated storage and unified management for unstructured data and metadata was realized, and thus storage system performance was promoted. Relative to the centralized storage, new system has superior availability. The simulation results show that the storage system has higher reliability and it is easy to expand. The distributed storage system can be applied to dynamic open computing environment, and it provides cloud storage service with better performance.%非结构化数据呈爆炸态势增长,现有存储技术在I/O吞吐能力、可扩展性及易管理性等方面亟待改进.存储系统以云存储和可靠性理论为基础,建立了非结构化数据的分布式存储模型,并设计了可靠度函数.采用分布式关系数据库管理系统(RDBMS)作为存储底层,将非结构化数据直接存储于数据表中,实现了非结构化数据和元数据的分离式存储和统一管理,进而提升了存储系统性能.相对于集中式存储,新系统具有较高的可用性.仿真结果显示,存储系统可靠度高且易于扩展.该分布式存储系统可应用于动态开放计算环境,提供效能较高的云存储服务.

  6. Intelligent and Pervasive Archiving Framework to Enhance the Usability of the Zero-Client-Based Cloud Storage System

    Directory of Open Access Journals (Sweden)

    Keedong Yoo

    2014-01-01

    Full Text Available The cloud storage-based zero client technology gains companies’ interest because of its capabilities in secured and economic management of information resources. As the use of personal smart devices such as smart phones and pads in business increases, to cope with insufficient workability caused by limited size and computing capacity most of smart devices have, the necessity to apply the zero-client technology is being highlighted. However, from the viewpoint of usability, users point out a very serious problem in using cloud storage-based zero client system: difficulty in deciding and locating a proper directory to store documents. This paper proposes a method to enhance the usability of a zero-client-based cloud storage system by intelligently and pervasively archiving working documents according to automatically identified topic. Without user’s direct definition of directory to store the document, the proposed ideas enable the documents to be automatically archived into the predefined directories. Based on the proposed ideas, more effective and efficient management of electronic documents can be achieved.

  7. Data Storage Issue Study under Cloud Computing Environment%云计算环境下的数据存储问题研究

    Institute of Scientific and Technical Information of China (English)

    蔡国瑜

    2011-01-01

    With the continuous development of computer technology, cloud computing and cloud storage as a new model,increasingly subject to personal and business concerns.In this paper, a brief description of cloud computing,based on the cloud computing environment for data storage is cloud storage body for analysis and research, demonstrated the great advantage of cloud storage and cloud storage constraints on the further development of a number of issues discussion.%随着计算机技术的不断向前发展,云计算和云存储作为一种崭新的模式,愈发受到个人和企业的关注。本文在对云计算进行简要介绍的基础上,对云计算环境下的数据存储即云存储体进行了分析和研究,展示了云存储的巨大优势,并就制约云存储进一步发展的若干问题进行了讨论。

  8. Cloud Storage Technology and Applications for Big Data%大数据场景下的云存储技术与应用

    Institute of Scientific and Technical Information of China (English)

    陈杰

    2012-01-01

    With the expansion of big data applications, mass cloud storage has become a more important requirement. To meet service demands, cloud storage needs a new framework and new networking and management methods. In this paper, we discuss the various scenarios of cloud storage and discuss the demands and key technology of cloud storage. Big data requirements promote the development of cloud storage, and cloud storage development creates new service applications.%文章认为随着大数据应用规模的扩大,新业务环境和场景对海量云存储需求的迫切,云存储平台需要打破原有的框架,改变组网和管理方式,以满足新的业务需求.文章分析了各种场景,提出了云存储的需求及关键技术等.文章指出大数据需求促进了云存储的发展,而云存储的发展则带动了新的业务应用.

  9. 介绍几款国外在线云存储服务%Several Foreign Online Cloud Storage Service Introduced

    Institute of Scientific and Technical Information of China (English)

    郑学超

    2011-01-01

    云存储对使用者来讲,不是指某一个具体的设备,而是指一个由许许多多个存储设备和服务器所构成的集合体。使用者使用云存储,并不是使用某一个存储设备,而是使用整个云存储系统带来的一种数据访问服务。%Cloud storage for the user is concerned,not referring to a specific device,but rather a many storage devices and servers constitute a collection.Users to use cloud storage,not to use a particular storage device,but the use of the entire cloud storage system in a data access service.

  10. The Application of RS Erasure Codes in the Cloud Storage%RS纠删码在云存储中的应用

    Institute of Scientific and Technical Information of China (English)

    余林琛; 章巍; 林强; 许杰星; 钟贝

    2011-01-01

    Cloud storage as a storage mode which designed to provide users with cheap,efficient,secure,scalable,customizable storage services,have become the trend of storage services.But because of its cloud storage node is not controllable,how to protect data stored in the cloud security issues facing challenges.RS erasure codes by the introduction of cloud storage,by fragmentation polymerization mechanism for cloud storage data security protection provides a new solution.%云存储作为一种旨在为用户提供高效、廉价、安全、可扩展、可定制的存储服务的存储模式,已然成为存储服务的发展趋势.但是因为其云端存储节点的不可控性,云存储在如何保障数据安全性的问题上面临着挑战.通过将RS纠删码引入云存储中,采用分片聚合机制,为云存储的数据安全性保障提供了一种新的解决方案.

  11. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  12. 基于混合云的安全数据存储架构%The Architecture of Secure Data Storage Based on Mixed Cloud

    Institute of Scientific and Technical Information of China (English)

    刘增才; 柳毅

    2011-01-01

    Cloud computing promises a more cost effective enabling technology to data storage and com- putations. Data security is one of the most challenging research work in cloud computing. Based on mixed cloud, presents an architecture of secure data storage. The process of data storage is divided into two parts. Realizes confidentiality, integrity and traceability in private cloud, while data storage and search in public cloud. This architecture can assure data storage secure and low enterprise cost in cloud computing simultaneously.%云计算技术为数据存储与计算提供了一个非常有效的方法,当前研究工作的重点集中在云中的数据安全。基于混合云,提出一个安全数据存储架构,将数据存储过程划分为两部分。数据的机密性、完整性和可追踪性的相关操作在私有云中实现,公共云实现数据的存储与查询。该架构在保障云端数据安全存储的同时,降低企业在保证云数据安全存储方面的成本。

  13. Cloud computing and cloud storage ecosystem research%云计算及云储存生态系统研究

    Institute of Scientific and Technical Information of China (English)

    张瑞

    2013-01-01

    近些年来,我国的服务计算范型得到了不断的开发和发展,网络资源的发布、网络维护、网络资源部署以及网络资源的合理配置等等领域都或多或少的产生了很大变化.不管是从个人角度来看,还是从企业整体的角度来看,用户都已经将过去原有的空间限制、时间限制以及组织限制很好的跨越,并且对其创新能力很好的扩展.作为当前形势下新一代服务计算的模型,云计算对于IT以及与其有关联的产业都产生了十分深远的影响,具有深远的意义.面对当前云计算技术的千变万化,将云计算的生态系统这一概念很好的采取,将云计算系统的构建、运行机制、关键要素以及其关键的算法很好的提出来,并且将云存储作为主要的例子,来将其构建的过程很好的分析,对其可能产生的问题进行探讨,并且明确其解决的措施,本文中,笔者就研究云计算及云储存生态系统.%In recent years, our country service computing paradigm has been constant development, cyber source release, network maintenance, cyber source as well as the deployment of the reasonable configuration of cyber source domain and so on are more or less produced very big change. Whether from the personal point of view, or from the point of view of the whole enterprise, users have the old space limit, time limit and limit the great span, and the innovation ability is very good extension. As the current situation of the new generation service computing model, cloud computing for IT and the related industry produced very far-reaching effect, has the profound significance. In the face of the current cloud computing cloud computing will be the myriads of changes, the ecosystem of this concept is good take, cloud computing system, operation mechanism, key factors and its key algorithm good put up, and a cloud storage as the main example, the process of the construction of a good analysis, the possible problems

  14. Mobile cloud networking: mobile network, compute, and storage as one service on-demand

    NARCIS (Netherlands)

    Jamakovic, Almerima; Bohnert, Thomas Michael; Karagiannis, Georgios; Galis, A.; Gavras, A.

    2013-01-01

    The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN)1 is a EU FP7 Large scale Integrating Project (IP) funded by the European Commission. MCN project was launched in November 2012 for the period of 36 month. In total top-tier 19 partners from industry and ac

  15. Design of the Cloud Storage Model for Video Monitoring%视频监控云存储模型设计

    Institute of Scientific and Technical Information of China (English)

    武文斌

    2012-01-01

    The paper introduces the characteristics and models of cloud storage,designs a topological structure of cloud storage for video monitoring based on the features of video storage,analyzes its major components and functions,and proposes the characteristics and prospects of the cloud storage for video monitoring.%介绍了云存储的特点和模型,并结合视频存储的特点,设计了一种用于视频监控的云存储拓扑机构图,分析了其主要组成部分和主要功能机制,提出了视频监控云存储的特点和未来发展。

  16. Green turtles (Chelonia mydas) have novel asymmetrical antibodies

    Science.gov (United States)

    Work, Thierry M.; Dagenais, Julie; Breeden, Renee; Schneemann, Anette; Sung, Joyce; Hew, Brian; Balazs, George H.; Berestecky, John M.

    2015-01-01

    Igs in vertebrates comprise equally sized H and L chains, with exceptions such as H chain–only Abs in camels or natural Ag receptors in sharks. In Reptilia, Igs are known as IgYs. Using immunoassays with isotype-specific mAbs, in this study we show that green turtles (Chelonia mydas) have a 5.7S 120-kDa IgY comprising two equally sized H/L chains with truncated Fc and a 7S 200-kDa IgY comprised of two differently sized H chains bound to L chains and apparently often noncovalently associated with an antigenically related 90-kDa moiety. Both the 200- and 90-kDa 7S molecules are made in response to specific Ag, although the 90-kDa molecule appears more prominent after chronic Ag stimulation. Despite no molecular evidence of a hinge, electron microscopy reveals marked flexibility of Fab arms of 7S and 5.7S IgY. Both IgY can be captured with protein G or melon gel, but less so with protein A. Thus, turtle IgY share some characteristics with mammalian IgG. However, the asymmetrical structure of some turtle Ig and the discovery of an Ig class indicative of chronic antigenic stimulation represent striking advances in our understanding of immunology.

  17. Green Turtles (Chelonia mydas) Have Novel Asymmetrical Antibodies.

    Science.gov (United States)

    Work, Thierry M; Dagenais, Julie; Breeden, Renee; Schneemann, Anette; Sung, Joyce; Hew, Brian; Balazs, George H; Berestecky, John M

    2015-12-01

    Igs in vertebrates comprise equally sized H and L chains, with exceptions such as H chain-only Abs in camels or natural Ag receptors in sharks. In Reptilia, Igs are known as IgYs. Using immunoassays with isotype-specific mAbs, in this study we show that green turtles (Chelonia mydas) have a 5.7S 120-kDa IgY comprising two equally sized H/L chains with truncated Fc and a 7S 200-kDa IgY comprised of two differently sized H chains bound to L chains and apparently often noncovalently associated with an antigenically related 90-kDa moiety. Both the 200- and 90-kDa 7S molecules are made in response to specific Ag, although the 90-kDa molecule appears more prominent after chronic Ag stimulation. Despite no molecular evidence of a hinge, electron microscopy reveals marked flexibility of Fab arms of 7S and 5.7S IgY. Both IgY can be captured with protein G or melon gel, but less so with protein A. Thus, turtle IgY share some characteristics with mammalian IgG. However, the asymmetrical structure of some turtle Ig and the discovery of an Ig class indicative of chronic antigenic stimulation represent striking advances in our understanding of immunology. PMID:26500346

  18. A computational- And storage-cloud for integration of biodiversity collections

    Science.gov (United States)

    Matsunaga, A.; Thompson, A.; Figueiredo, R. J.; Germain-Aubrey, C.C; Collins, M.; Beeman, R.S; Macfadden, B.J.; Riccardi, G.; Soltis, P.S; Page, L. M.; Fortes, J.A.B

    2013-01-01

    A core mission of the Integrated Digitized Biocollections (iDigBio) project is the building and deployment of a cloud computing environment customized to support the digitization workflow and integration of data from all U.S. nonfederal biocollections. iDigBio chose to use cloud computing technologies to deliver a cyberinfrastructure that is flexible, agile, resilient, and scalable to meet the needs of the biodiversity community. In this context, this paper describes the integration of open source cloud middleware, applications, and third party services using standard formats, protocols, and services. In addition, this paper demonstrates the value of the digitized information from collections in a broader scenario involving multiple disciplines.

  19. Online Distributed Storage System Architecture and Security with Cloud Storage as the Core%以云存储为核心的在线分布式存储系统架构与安全保护

    Institute of Scientific and Technical Information of China (English)

    胡晓文

    2011-01-01

    although cloud storage technology is currently being recognized as a safe and reliable data storage mechanism,but the safety problem is still cloud storage technology is one important problem to solve.In order to effectively improve the cloud storage security, this paper presents a cloud storage as the core of the online distributed storage system security architecture,the architecture makes full use of the data distributed storage management and data automatic recovery technology in data safety storage function,hierarchical data to achieve the cloud storage and data storage safety management.%虽然云存储技术是当前被人们所公认的一种安全可靠的数据存储机制,但安全问题依然是云存储技术所要解决的重要问题之一。为了能有效提高云存储的安全性。本文提出了一种以云存储为核心的在线分布式存储系统安全架构,该架构充分发挥了了数据分散存储管理以及数据自动恢复等技术在数据安全存储方面的功能,分层实现了数据的云存储以及存储数据的安全管理。

  20. 民间艺术资源的云存储技术研究%Research on cloud storage technology of folk art resources

    Institute of Scientific and Technical Information of China (English)

    李小波; 田中娟; 叶振

    2016-01-01

    The construction and research of Chinese folk art resources platform is an important and urgent task in the culture and art field, and there are many challenges. In the big data era, the use of cloud computing and cloud storage technology is an inevitable trend. This paper introduces the Hadoop cloud computing and cloud storage technology, puts forward the development scheme of folk art resources cloud storage platform based on Hadoop. The construction of folk art resources cloud storage platform based on Hadoop is feasible and effective.%我国民间艺术资源平台的建设和研究是当前文化艺术领域面临的一项重要而紧迫的课题,存在着诸多挑战。在大数据时代背景下,采用云计算和云存储技术是一个必然的趋势。文中介绍了Hadoop云计算与云存储技术,提出了基于Hadoop的民间艺术资源云存储平台建设方案。构建基于Hadoop的民间艺术资源云存储平台具有可行性和有效性。

  1. Electron cloud dynamics in the Cornell Electron Storage Ring Test Accelerator wiggler

    OpenAIRE

    Celata, C. M.

    2011-01-01

    The interference of stray electrons (also called “electron clouds”) with accelerator beams is important in modern intense-beam accelerators, especially those with beams of positive charge. In magnetic wigglers, used, for instance, for transverse emittance damping, the intense synchrotron radiation produced by the beam can generate an electron cloud of relatively high density. In this paper the complicated dynamics of electron clouds in wigglers is examined using the example of a wiggler in th...

  2. The research and discussion of digital library on cloud storage performance%数字图书馆的云存储性能研究与研讨

    Institute of Scientific and Technical Information of China (English)

    陈茫

    2014-01-01

    This paper discusses the application of digital libraries in the storage area of the cloud environment. Firstly, we introduce an open source, free, digital library architecture viable cloud storage environments; Secondly, we describe the key cloud storage replication technology, and build a digital library of realistic cloud storage architecture; finally, we detailed test and analyze the performance differences between different cloud storage.%首先,介绍一个开源的、免费的、可行的云环境下的数字图书馆存储构架;接下来,对云存储的关键复制技术逐一叙述,并构建数字图书馆的现实中云存储构架;最后,详细的测试和分析不同云存储之间的性能差异,探讨了数字图书馆在云环境下的存储领域的应用。

  3. Cloud Robotics Platforms

    OpenAIRE

    Busra Koken

    2015-01-01

    Cloud robotics is a rapidly evolving field that allows robots to offload computation-intensive and storage-intensive jobs into the cloud. Robots are limited in terms of computational capacity, memory and storage. Cloud provides unlimited computation power, memory, storage and especially collaboration opportunity. Cloud-enabled robots are divided into two categories as standalone and networked robots. This article surveys cloud robotic platforms, standalone and networked robotic works such as ...

  4. Cloud Robotics Platforms

    Directory of Open Access Journals (Sweden)

    Busra Koken

    2015-01-01

    Full Text Available Cloud robotics is a rapidly evolving field that allows robots to offload computation-intensive and storage-intensive jobs into the cloud. Robots are limited in terms of computational capacity, memory and storage. Cloud provides unlimited computation power, memory, storage and especially collaboration opportunity. Cloud-enabled robots are divided into two categories as standalone and networked robots. This article surveys cloud robotic platforms, standalone and networked robotic works such as grasping, simultaneous localization and mapping (SLAM and monitoring.

  5. 安全云存储系统与关键技术综述%Survey of Secure Cloud Storage System and Key Technologies

    Institute of Scientific and Technical Information of China (English)

    傅颖勋; 罗圣美; 舒继武

    2013-01-01

    随着云存储的迅猛发展,越来越多的用户选择使用云存储存放自己的资料.云存储的最大特点在于存储即服务,用户可以通过公有API将自己的数据上传到云端保存.但由于用户丧失了对数据的绝对控制权,一些数据安全的隐患也由此产生.为了消除安全隐患,并在保证安全性的同时尽可能地提高系统的服务质量,近年来国内外机构作了大量研究,从而开启了云存储中的一个研究方向——安全云存储系统.首先介绍了云存储系统的安全需求,然后阐述了安全云存储系统的研究现状,并总结了现有安全云存储系统中的一些关键技术的现状与不足之处,其中包括密钥分发与管理、基于属性的加密机制、基于数据密文的搜索机制与删冗机制、数据的持有性证明与恢复以及数据的可信删除等;最后指出了安全云存储系统未来的研究方向.%With the rapid development of cloud storage, more and more people prefer to store their owner data in remote cloud storage to avoid troublesome data management in local storage systems. The most famous feature of cloud storage is the concept that storage as a service, users can store their own data into clouds by public APIs. However, because of losing absolute control of data, users storing their own data in cloud storage will suffer a series of security problems, such as data peeping, data tampering, and so on. In order to solute those security problems and improve the quality of secure cloud system based on enhance its security, researchers have investigated lots about cloud security problem in recent years, which established a research branch of the cloud storage- -secure cloud storage system. This paper introduces the security demand of secure cloud storage system; expounds the current status of cloud storage system; summarizes the key technologies of currently secure cloud storage systems, such as encryption key's distribution and

  6. Load Scheduling in a Cloud Based Massive Video-Storage Environment

    DEFF Research Database (Denmark)

    Bayyapu, Karunakar Reddy; Fischer, Paul

    2015-01-01

    We propose an architecture for a storage system of surveillance videos. Such systems have to handle massive amounts of incoming video streams and relatively few requests for replay. In such a system load (i.e., Write requests) scheduling is essential to guarantee performance. Large-scale data-storage...... system (LSDSS) is an emerging hosting facility for video-storage, which has a very high number of writes while most of the videos are never or rarely watched. We discuss the design and implementation of LSDSS and load scheduling in autonomous storage environments called datacenters in LSDSS. A datacenter...

  7. 云存储在高校档案工作中的应用%Application of Cloud Storage in University Archives Task

    Institute of Scientific and Technical Information of China (English)

    郑奇茹

    2012-01-01

      This is an article on cloud computing and cloud storage. After introducing the concept of cloud computing and cloud storage,the article explains what are the influences and opportunities to university archives. From that,the writer seeks to explore a new development trend in university archives base on the new technology and nowadays condition.%  本文简要介绍“云计算”和“云存储”,阐述“云存储”给高校档案工作中带来的影响与机遇。并结合高校实际情况,探究未来高校档案管理的发展趋势。

  8. Design and Implementation of Data Storage Encryption Mechanism in Cloud Storage%云存储服务端数据存储加密机制的设计和实现

    Institute of Scientific and Technical Information of China (English)

    吕从东; 韩臻; 马威

    2014-01-01

    云存储是一种新型的网络存储形式。随着云存储的广泛使用,云存储中的数据安全问题,如数据泄漏、数据篡改,也成了用户广泛关注的问题。云存储可以分为访问层、应用接口层、基础管理层和存储层,云存储安全可以分为访问层安全、应用接口层安全、基础层安全和存储层安全。为保证云存储中服务端数据存储的机密性,文章设计了数据存储加密机制,在基于云桌面的办公系统个人存储的应用环境中,实现了基础管理层和存储层加密机制。基于JAVA、JSP等技术,实现了基础管理层;基于Bash脚本等技术,实现了基础管理层与存储层的接口;基于开源项目TGT实现了存储层数据加密机制,保证服务端存储数据的机密性。%Cloud storage is a new form of network storage. With the widespread use of cloud storage, data security in cloud storage, such as data leakage, data tampering, has become widespread concern. Cloud storage can be divided into the access layer (AL), the application interface layer (APIL), the infrastructure management layer (IML) and the storage layer (SL). Security of cloud storage can be divided into security of the access layer (SAL), security of the application interface layer (SAPIL), security of the infrastructure management layer (SIML) and security of the storage layer (SoSL). A data storage encryption mechanism is designed to deal with the conifdentiality of the data in cloud storage in this paper. The mechanism is implemented in an application environment of the ofifce system based on cloud desktop. The infrastructure management layer is implemented based on JAVA and JSP. The interface between the infrastructure management layer and the storage layer is implemented based on Bash Script. The data encryption on the sever is implemented based on open source projects TGT.

  9. Dual-channel Cloud Data Storage Security Scheme%双通道云数据存储安全方案研究

    Institute of Scientific and Technical Information of China (English)

    熊毅

    2012-01-01

    为了改善解决云计算中热点问题之一—数据存储安全,该文在研究现有经典云数据存储体系架构的基础上,根据云本身的超强计算能力和代价低廉等特性,提出了一种优化的双通道并行云存储架构,配以非对称数据加密手段,在硬件与架构层面直接针对安全问题作出优化部署.在大量的节约成本、提高效率、精简架构的情况下保证了云环境下数据存储安全性的提升.模拟部署表明,双通道并行云架构及非对称数据加密能有效的提高云数据存储的安全性.%In order to improve the resolution of cloud computing in the hot one of the issues-the security of data storage, the author based on the study of existing classic cloud data storage architecture, according to the characteristics of cloud super computing power and cost of low, propose an optimized dual-channel parallel cloud storage architecture,together with the non-symmetric data encryption,optimize the deployment of security issues made in the level of hardware and architecture. The security of data storage in the cloud environment is enhanced with a lot of cost savings, improve efficiency and streamlining. Simulated deployment, dual-channel parallel cloud structure and non-symmetric data encryption can effectively improve the security of the cloud data storage.

  10. Application of Cloud Storage in Hospital Informatization%浅谈云存储在医院信息化中的应用

    Institute of Scientific and Technical Information of China (English)

    张艳玲; 徐海峰

    2012-01-01

    Objective To use cloud storage for scalable storage resources in hospital informatization. Methods By using Hadoop cloud platform software for open source, and Panasas high performance hardware equipment, one solution based on the private cloud storage was proposed. Then the difficulties and challenges of cloud storage in hospital informatization were analyzed. Results Cloud storage could provide sufficient, manageable and extensible resources for hospital informatization. Conclusion With the development of cloud storage, it will have a brilliant future in hospital informatization construction.%目的:探讨云存储在医院信息化建设中,提供可扩展存储资源的应用前景及可能的挑战.方法:使用目前主流的Hadoop开源云平台软件和高性能的Panasas集群硬件设备,提出了一种基于私有云的存储解决方案,并分析云存储在医院信息化中所面临的困难与对策.结果:解决目前医院信息化过程中存储资源不足、管理不便的问题,为日益庞大的医疗数据提供按需扩展的存储空间.结论:随着云存储技术和法规的不断完善,云存储将在医院信息化建设中发挥更加实际的作用.

  11. Study on Safe Storage Technology of Cloud Computing Service Date%云计算服务数据安全储存技术研究

    Institute of Scientific and Technical Information of China (English)

    于颖

    2016-01-01

    根据当前云计算服务数据的发展趋势,在介绍云计算和云存储概念的基础上,分析云存储数据存在的主要安全问题,提出确保云计算服务数据安全的存储对策,为云计算服务数据在互联网及其他领域的安全储存提供技术方面的借鉴。%According to the development tendency of cloud computing service data at present, based on introducing the concept of cloud computing and cloud storage, this article analyzed the main safety problems existing in cloud storage data, put forward the storage countermeasure to ensure the safety of cloud computing service data, in order to provide technological reference for cloud computing service data stored safely on the internet and other fields.

  12. Storage and Access of Media Files Based on Amazon S3 Compatible Cloud Storage Platform%基于Amazon S3兼容云存储平台的媒体文件存储与访问

    Institute of Scientific and Technical Information of China (English)

    宋顺祥; 姜莹

    2013-01-01

      首先介绍云计算和云存储的基本概念,对兼容Amazon S3的云存储平台的体系架构及其组成进行详细的分析,然后阐述在此平台上如何进行媒体文件的存储与访问,最后给出了系统构建所面临的挑战及其解决方案。%This paper first introduces the basic concepts of cloud computing and cloud storage, and then analyzes the architecture and components of cloud storage platform which is compatible with Amazon S3. The media files storage and access module based on this platform is designed. Final y, we present solutions to the chal enges we confronted with when we construct the system.

  13. 云存储在环保领域的应用研究%The Applications of Cloud Storage in the Field of Environmental Protection

    Institute of Scientific and Technical Information of China (English)

    崔洪渊

    2015-01-01

    介绍了太原市环保信息化建设的现状及问题, 提出环保信息系统云存储的建设目标和必要性, 并对云存储在环保领域的应用进行了探索研究.%This paper describes the current situation and problems of Taiyuan environmental information construction,pro-posed building objectives and the need for cloud storage of environmental information system and give the exploration and research in cloud storage applications in the field of environmental protection.

  14. Relocations of sea turtle nests of Lepidochelys olivacea, Dermochelys coriacea and Chelonia mydas in the Galibi Nature Reserve, Suriname

    OpenAIRE

    Schouten, A.D.; Weijerman, M.; Tienen, van, C.; Hoekert, W.E.J.

    1997-01-01

    SCHOUTEN, A.D., WEIJERMAN, M., VAN TIENEN, L.H.G. & W.E.J. HOEKERT, 1997. Relocations of Sea Turtle nests of Lepidochelys olivacea, Dermochelys coriace and Chelonia mydas in the Galibi Nature Reserve, Suriname. Studies Nat. Hist. Caribbean Region 73, Amsterdam, 1997: 63-69. Relocation of nests of the marine turtles Lepidochelys olivacea (ESCHSCHOLTZ 1829), Dermochelys coriace (LINNAEUS 1758) and CHELONIA MYDAS (LINNAEUS 1758) in the Galibi Nature Reserve is performed to protect them from a nu...

  15. 利用存储网关实现基于网络存储的企业私有云%Construction of enterprise private cloud based on network storage using storage gateway

    Institute of Scientific and Technical Information of China (English)

    孙一晴

    2013-01-01

    为解决企业存储快速增长的需求,避免巨量存储数据的迁移,通过引入存储网关的方式,将存储进行了虚拟化处理,从而在一定条件下简化了企业私有云的构建方式.研究结果表明,基于存储网关的企业私有云解决方案不仅能够满足存储的需求,而且具有部署方便快捷,实现相对简洁的特点,解决了企业在云存储应用和自身存储安全上的矛盾.%In order to solve the enterprise storage and rapid growth of demand, avoid the massive migration of storing data, a storage gateway was introduced, storage virtualization processing was done. The construction enterprise private cloud was simplified under certain conditions. The results show that, the enterprise private cloud solution based on storage gateway can not only meet the storage requirements, but also it has deployed conveniently, achieving relatively simple. It solves the contradiction of cloud storage application and its safe storage enterprises.

  16. Storage Design of Regional PACS Based on Cloud Architecture of Hadoop%基于Hadoop的云架构区域PACS存储方案设计

    Institute of Scientific and Technical Information of China (English)

    唐颖; 刘国庆

    2013-01-01

    Cloud storage offers an effective solution for storage problems of regional PACS (Picture Archiving & Communication System) image file. On the basis of analyzing regional PACS storage needs as well as the storage situation, a Hadoop-based cloud storage architecture was built. To improve degraded performance resulting from large quantity of small ifles storage, this paper designed two sets of storage solutions and developed a set of middleware. A test platform of Hadoop-based cloud storage was built and the results showed that:as DataNode nodes increased, the storage performance increased linearly;storage ifle should not be too large for image reading and displaying as soon as possible, each ifle should be kept within 64MB.%云存储为区域图片存档及通讯系统(PACS)的影像文件存储问题提供了有效的解决方案。本文在分析区域PACS存储需求以及目前存储现状的基础上,构建一个以Hadoop为基础的云存储服务架构。针对区域PACS影像文件类型较为单一的特点,设计了两套存储方案并开发了一套中间件加以测试。测试结果表明,随着DataNode节点增多,存储性能近似线性增加;为了尽快读取并显示影像,存储文件不宜过大,以每个文件不超过64MB为宜。

  17. CubeSat Cloud: A framework for distributed storage, processing and communication of remote sensing data on cubesat clusters

    Science.gov (United States)

    Challa, Obulapathi Nayudu

    CubeSat Cloud is a novel vision for a space based remote sensing network that includes a collection of small satellites (including CubeSats), ground stations, and a server, where a CubeSat is a miniaturized satellite with a volume of a 10x10x10 cm cube and has a weight of approximately 1 kg. The small form factor of CubeSats limits the processing and communication capabilities. Implemented and deployed CubeSats have demonstrated about 1 GHz processing speed and 9.6 kbps communication speed. A CubeSat in its current state can take hours to process a 100 MB image and more than a day to downlink the same, which prohibits remote sensing, considering the limitations in ground station access time for a CubeSat. This dissertation designs an architecture and supporting networking protocols to create CubeSat Cloud, a distributed processing, storage and communication framework that will enable faster execution of remote sensing missions on CubeSat clusters. The core components of CubeSat Cloud are CubeSat Distributed File System, CubeSat MapMerge, and CubeSat Torrent. The CubeSat Distributed File System has been created for distributing of large amounts of data among the satellites in the cluster. Once the data is distributed, CubeSat MapReduce has been created to process the data in parallel, thereby reducing the processing load for each CubeSat. Finally, CubeSat Torrent has been created to downlink the data at each CubeSat to a distributed set of ground stations, enabling faster asynchronous downloads. Ground stations send the downlinked data to the server to reconstruct the original image and store it for later retrieval. Analysis of the proposed CubeSat Cloud architecture was performed using a custom-designed simulator, called CubeNet and an emulation test bed using Raspberry Pi devices. Results show that for cluster sizes ranging from 5 to 25 small satellites, faster download speeds up to 4 to 22 times faster - can be achieved when using CubeSat Cloud, compared to a

  18. 云存储模式下图书馆数字资源建设%Library Digital Resources Construction Based on Cloud Storage Mode

    Institute of Scientific and Technical Information of China (English)

    曾祥文

    2011-01-01

    随着图书馆数字资源总量的快速增加,传统的存储方式在面对海量数据存储的需求上,存在着容量和性能的瓶颈。云存储作为一种新型的存储服务模式,为图书馆的海量数字资源建设提供了一种新的选择。在分析图书馆数字资源建设需求、介绍云存储概念的基础上,对基于云存储模式下图书馆数字资源的建设进行了探讨。%With the rapid increase in quantity of the library digital resources,there is capacity and performance of bottleneck when the traditional way of storage in the face of mass storage requirements.As a new storage service mode,cloud storage provides a new choice for the amount of library digital resources construction.Based on the analysis of library digital resources construction demand and the introduction of the concept of cloud storage,this paper discussed the library digital resources construction based on the cloud storage mode.

  19. 基于光盘库的云存储系统架构设计%Cloud Storage Systems Based on Technology of Optical Disk Library

    Institute of Scientific and Technical Information of China (English)

    薛寅颖; 万晓冬

    2013-01-01

    Efficiency, scalability, and low cost of cloud storage trends of storage services, but the uncertainty of the storage nodes and network transmission, making its safety has been questioned. This article erasures codes and CD library into cloud storage to store data in secure storage management and transmission of data in the system, to provide a solution for improving the security of cloud storage system.%云存储的高效、可扩展性、廉价等优点成为存储服务的发展趋势,但是其存储节点的不确定性以及网络传输,使得其安全性受到质疑.本文将纠删码技术和光盘库引入到云存储中,实现存储数据在系统中的安全存储管理和传榆,为提高云存储系统安全性提供一个解决方案.

  20. The application of cloud storage in University digital resources construction%云存储在高校数字资源建设中的应用

    Institute of Scientific and Technical Information of China (English)

    潘华; 尹芝

    2013-01-01

    Given the acceleration of University digital resources construction, traditional storage technologies have not been able to meet the requirement for nowadays technologies. Cloud storage technologies, a new generation of service system, provides a method for mass storage. The paper not only introduces cloud computation and stor-age but also studies the application of cloud storage in University digital resources construction.%随着高校数字资源建设步伐的加快,传统的存储技术已不能满足如今资源建设的需求。云存储技术这一新的服务体系,为海量资源存储提供了一个新的方式。本文在介绍了云计算和云存储的基础上,讨论研究了云存储在高校数字资源存储的应用。

  1. 基于Swiftstack的云存储关键技术研究%Research the Key Techniques of Cloud Storage Based on Swiftstack

    Institute of Scientific and Technical Information of China (English)

    严晔; 王欢; 苏伟; 秦雪; 吴玉宁

    2015-01-01

    With the development of cloud computing, it can provide users a convenient way to access data, but the high concurrency access and data processing and other issues affect the use of cloud storage. In view of the system structure and load balancing problems in the development of cloud computing, cloud storage. This article first on the system structure design,and puts forward the suitable strategy of load balancing for large and medium scale deployment situation. Using consistent hash,accidentally delete restoration and backup between nodes technologies to ensure the in-tegrity of the cloud data. At last,through big and small files of unstructured data write experiment to test the perfor-mance of cloud storage,the experimental results show that Swiftstack cloud storage meet the requirements of the user's need of cloud storage.%云计算的发展虽然使用户可以便捷的访问数据,但系统的高并发性访问和数据处理等问题影响着云存储的使用。文章针对开源云计算、云存储发展中系统架构设计和负载均衡问题提出了改进方案。本文首先对系统架构进行设计,提出了适合大、中规模部署情况下负载均衡的设置策略。采用一致性哈希、误删除恢复及节点间互备等技术保证云数据的完整性。最后通过实验对云存储进行大、小文件非结构化数据的写入性能测试,实验结果表明Swiftstack云存储能够满足用户的对云存储的使用要求。

  2. 基于递归秘密共享的可靠云存储方案%A Reliable Cloud Storage Scheme Based on Recursive Secret Sharing

    Institute of Scientific and Technical Information of China (English)

    王家玲

    2015-01-01

    The existing cloud storage schemes can't balance redundant storage, data confidentiality and storage costs which troubled many users. In order to overcome the deficiencies of the existing cloud storage scheme, we proposed a reliable cloud storage scheme which suitable for the characteristics of digital library resources. The scheme can realize data redundant storage and can guarantee data confidentiality. In addition, the scheme will not bring a surge in storage space. This paper not only gives a framework of the scheme but also gives a detailed description of the specific scheme. Then, we make an analysis from the confidentiality, redundancy and storage cost etc. of the scheme to improve its reliability and high efficiency.%现有云存储方案无法兼顾冗余存储、数据机密性和存储开销等多方面因素,给诸多用户带来困扰。为克服现有方案的不足,提出一个高效可靠的云存储方案,该方案既能实现数据冗余存储又能保证数据机密性,且不会带来存储空间的剧增。文章给出方案的框架且对方案进行具体的描述,然后从机密性、冗余性和存储开销等方面对方案进行分析,得出本方案可靠性和高效性的优势。

  3. 基于分离密钥的云存储加密解决方案%A Project Designed by Cloud Storage Encryption Based on Separated Key

    Institute of Scientific and Technical Information of China (English)

    王志中; 周城; 牟宇飞

    2013-01-01

    原有的云存储模式所存在的问题已经困扰行业多年,在静态数据加密存储的过程中,只有实现真正意义上的数据私有化才能保证数据的安全,保障数据拥有者的利益.针对云存储应用中用户数据安全存储需求的提高,以Amazon S3(simple storage service)为例分析当前云存储模式下静态数据安全存在的普遍问题,设计了一套新的云端静态数据加密存储方案——分离密钥存储服务(separated key S3)解决方案,设计了新的密钥管理方法,从技术上实现了云端静态数据的安全,最后对该方案的数据安全性进行了分析.%The problems existing in the original cloud storage model has plagued the industry for many years, to realize the true sense of the data privatization in the static data encrypted storage process is able to ensure data security and protect data owners' interests. Cloud storage applications for the current secure storage of user data is able to improve data security. Taking Amazon S3 as an example, the general problem in static data security was analyzed. A new set of cloud static data encryption and storage solution, separated key S3, was designed, and a new key management method was also designed. The new technology absolutely accomplished the security of static data in the cloud. Additionally the data security analysis and prospect on next research was given.

  4. Green turtle (Chelonia mydas) genetic diversity at Paranaguá Estuarine Complex feeding grounds in Brazil

    OpenAIRE

    Juliana Costa Jordão; Ana Cristina Vigliar Bondioli; Flavia Maria Guebert; Benoit de Thoisy; Lurdes Foresti de Almeida Toledo

    2015-01-01

    Sea turtles are marine reptiles that undertake long migrations through their life, with limited information regarding juvenile stages. Feeding grounds (FGs), where they spend most of their lives, are composed by individuals from different natal origins, known as mixed stock populations. The aim of this study was to assess genetic composition, natal origins and demographic history of juvenile green turtles (Chelonia mydas) at the Paranaguá Estuarine Complex (PEC), Brazil, considered a Natural ...

  5. On the Cloud Storage Mode of University Library Digital Resources%高校图书馆数字资源云存储模式探究

    Institute of Scientific and Technical Information of China (English)

    施蓉蓉

    2012-01-01

    With the rapid increase in quantity of library digital resources,the drawbacks of traditional data storage model increasingly appear.As a new storage service mode,cloud storage provides a new choice for the amount of li-brary digital resources construction.This paper introduces some digital storage technologies,and discusses the application of cloud storage in university library digital resources storage.%随着图书馆数字资源总量的快速增加,传统的数据存储方式弊端日益显现。云存储作为一种新型的存储服务模式,为图书馆的海量数字资源建设提供了一种新的选择。在介绍数字存储技术的基础上,重点探讨了云存储在高校图书馆数字资源存储中的应用。

  6. 校园网云存储客户端的设计与实现%Design and Implementation of Campus Cloud Storage Client

    Institute of Scientific and Technical Information of China (English)

    彭英

    2015-01-01

    本文设计一个基于Hadoop的校园网云存储客户端,从系统的体系结构、功能组织和各功能模块方面进行了具体实现,并对其扩展性能进行了测试与分析。用户通过这个客户端管理自己的存储空间和文件,可以将文件上传到云存储服务器中进行存储,并能将云存储服务器中的文件下载并进行处理。%This paper designs a campus cloud storage client based on Hadoop, implements it on system structure, function organization and function module and test and analysis its expand performance. With it, user can manage his own storage space and files, upload local file to cloud storage server and store, download file from cloud storage server and do the relevant process.

  7. 船舶AIS数据云存储系统研究%A Study on the Cloud Storage System of Ship’s AIS Data

    Institute of Scientific and Technical Information of China (English)

    丁振国

    2016-01-01

    This paper makes use of the characteristics of distributed database data model to build up historical AIS data and regional AIS data storage model by analyzing inadequate storage mode of the existing relational database. The new storage model realizes the cloud storage of AIS data and this paper verified its advantage in reading and writing on ship’s AIS data by the experiment.%分析了船舶AIS数据现有关系型数据库存储方式的不足,利用分布式数据库模型的特点建立了历史AIS数据和区域AIS数据存储模型,实现了AIS数据云存储,并通过实验验证了AIS数据云存储系统在读写船舶AIS数据上的优势。

  8. 关于计算机云存储中数据迁移的分析%The Analysis about Data Migration of Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    宿培成

    2012-01-01

    数据迁移问题是企业选择云存储方式最为重要的环节,文章从多个方面分析云存储中如何有效地进行数据迁移并提出一些自己的看法,旨在共同研究数据迁移的实施方案。%Data migration is the most important link when corporate chooses the cloud storage mode. This article analyzed from several aspects of how to effectively carry out cloud storage data migration and put forward some own views, aims to study data transfer scheme.

  9. Holographic Grid Cloud, a futurable high storage technology for the next generation astronomical facilities

    CERN Document Server

    Gallozzi, Stefano

    2011-01-01

    In the immediate future holographic technology will be available to store a very large amount of data in HVD (Holographic Versatile Disk) devices. This technology make extensive use of the WORM (Write-Once-Read-Many) paradigm: this means that such devices allow for a simultaneous and parallel reading of millions of volumetric pixels (i.e. voxels). This characteristic will make accessible wherever the acquired data from a telescope (or satellite) in a quite-simultaneous way. With the support of this new technology the aim of this paper is to identify the guidelines for the implementation of a distributed RAID system, a sort of "storage block" to distribute astronomical data over different geographical sites acting as a single remote device as an effect of a property of distributed computing, the abstraction of resources. The end user will only have to take care on connecting in a opportune and secure mode (using personal certificates) to the remote device and will have access to all (or part) of this potential...

  10. Genomics With Cloud Computing

    OpenAIRE

    Sukhamrit Kaur; Sandeep Kaur

    2015-01-01

    Abstract Genomics is study of genome which provides large amount of data for which large storage and computation power is needed. These issues are solved by cloud computing that provides various cloud platforms for genomics. These platforms provides many services to user like easy access to data easy sharing and transfer providing storage in hundreds of terabytes more computational power. Some cloud platforms are Google genomics DNAnexus and Globus genomics. Various features of cloud computin...

  11. Analysis on Cloud Computing

    OpenAIRE

    S.PATHRO; Venkatesh, D.; K.J.SRIHARSHA

    2013-01-01

    Cloud storage enables users to remotelystore their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose...

  12. Analytical treatment of the nonlinear electron cloud effect and the combined effects with beam-beam and space charge nonlinear forces in storage rings

    Institute of Scientific and Technical Information of China (English)

    GAO Jie

    2009-01-01

    In this paper we treat first some nonlinear beam dynamics problems in storage rings, such as beam dynamic apertures due to magnetic multipoles, wiggles, beam-beam effects, nonlinear space charge effect, and then nonlinear electron cloud effect combined with beam-beam and space charge effects, analytically. This analytical treatment is applied to BEPC Ⅱ. The corresponding analytical expressions developed in this paper are useful both in understanding the physics behind these problems and also in making practical quick hand estimations.

  13. 基于内部云存储的图书馆数据资源存储研究%Design for Library Data Resources Storage System Based on Internal Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    乔杨

    2012-01-01

    Reliable storage environment is the basis for library digital resources providing efficient services for users. Based on the discussion of library digital resources storage different technologies, cloud storage connotation and applications in library are analyzed in this paper. According to the characteristics of library digital resources, a storage architecture based on internal cloud storage for library digital resources is designed. And the hierarchical structure, the methods of access control, expansion and deployment are detailed.%可靠存储环境是图书馆数字资源为用户提供高效服务的保障。在阐述图书馆数据资源存储技术基础上,分析了云存储内涵及在图书馆中的应用,探讨基于内部云存储的图书馆数字资源数据存储方案,详细分析了其层次架构、访问控制、扩展和部署方法。

  14. 浅析云存储在高校数字化校园中的应用%Application of Cloud Storage in University Digital Campus

    Institute of Scientific and Technical Information of China (English)

    龚利; 史杨

    2014-01-01

    This paper introduces what is cloud storage technology. By analyzing the characteristics of cloud storage technology , I think the cloud storage of good expansibility, high security, low cost and customization service in university digital campus con-struction can get good application. This is the effective measures to integrate the resources, improve the management level and create the efficient digital campus.%该文介绍了什么是云存储技术,通过对云存储技术特点的分析认为,云存储的良好扩展性、较高的安全性、低成本和定制服务在高校数字化校园建设中能得到良好的应用,是整合高校资源,提高高校管理水平,创建高效节约型数字化校园的有效措施。

  15. The status, challenges, forecasts, innovations and discussions of cloud storage applications%云存储应用的现状、挑战、展望、创新及探讨

    Institute of Scientific and Technical Information of China (English)

    孔陶茹

    2014-01-01

    云存储是基于网络宽带下的数据存储服务,它将改变个人和企业的数据存储方式。针对云存储应用的现状及挑战,文章对其未来进行了展望和探讨,并对云存储应用进行了归纳,列举了当前知名云存储产品的特点及运营状况。同时根据云存储应用的现状,重点探讨了云存储应用所面临的挑战,对云存储应用的前景进行了展望,然后详述了云存储行业的数据迁移服务Backup Box。最后,重点提出了对云存储行业的四点感悟。%Cloud storage is a kind of data storage service based on broadband, and it has changed the data storage mode for individuals and businesses. Aiming at the status and challenges, the future of the cloud storage applications are prospected and discussed. The application of cloud storage is concluded, and the characteristic and operation condition of the several famous cloud storage products are listed. Meanwhile, according to application status, the challenges of cloud storage service are analyzed. The future trend of Cloud Storage Application is prospected. Then data migration service of Backup Box is elaborated. Finally, the four inspirations on cloud storage industry are highlighted.

  16. Multiparty Cloud Computation

    OpenAIRE

    Zheng, Qingji; Zhang, Xinwen

    2012-01-01

    With the increasing popularity of the cloud, clients oursource their data to clouds in order to take advantage of unlimited virtualized storage space and the low management cost. Such trend prompts the privately oursourcing computation, called \\emph{multiparty cloud computation} (\\MCC): Given $k$ clients storing their data in the cloud, how can they perform the joint functionality by contributing their private data as inputs, and making use of cloud's powerful computation capability. Namely, ...

  17. Blood Gasses Contents of Green Turtle (Chelonia mydas) Hatch Treated by Different Temperatures

    OpenAIRE

    RINI PUSPITANINGRUM; SEPTELIA INAWATI WANANDI; RONDANG ROEMIATI SOEGIANTO; MOHAMAD SADIKIN

    2011-01-01

    The aim of this research was to gain the profile of blood gasses of green turtle (Chelonia mydas) hatch. Blood gas of the green turtle was analysed after exposuring them at 28 oC and 50% of humidity for 24 hours in a pvc tube and at 34 oC under sunlight exposured with 47% of humidity for 30 minutes. The result showed the different values of blood gas contents. This result showed indication of metabolism activities and poikilothermic adaptation of green turtle hatch. This information can be u...

  18. Immunological evaluation of captive green sea turtle (Chelonia mydas) with ulcerative dermatitis

    Science.gov (United States)

    Muñoz, Fernando Alberto; Estrada-Para; Sergio; Romero-Rojas, Andrés; Gonzalez-Ballesteros, Erik; Work, Thierry; Villaseñor-Gaona, Hector; Estrada-Garcia, Iris

    2013-01-01

    Ulcerative dermatitis (UD) is common in captive sea turtles and manifests as skin erosions and ulcers associated with gram-negative bacteria. This study compared clinically healthy and UD-affected captive turtles by evaluating hematology, histopathology, immunoglobulin levels, and delayed-type hypersensitivity assay. Turtles with UD had significantly lower weight, reduced delayed-type hypersensitivity (DTH) responses, and higher heterophil:lymphocyte ratios. This study is the first to assay DTH in green turtles (Chelonia mydas) and suggests that UD is associated with immunosuppression.

  19. DATA MINING FOR DATA CLOUD AND COMPUTE CLOUD

    OpenAIRE

    PROF. UZMA ALI, PROF. PUNAM KHANDAR

    2013-01-01

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation. A storage cloud provides storage services, while a compute cloud provides compute services. We describe the design of the Sector ...

  20. Relocations of sea turtle nests of Lepidochelys olivacea, Dermochelys coriacea and Chelonia mydas in the Galibi Nature Reserve, Suriname

    NARCIS (Netherlands)

    Schouten, A.D.; Weijerman, M.; Tienen, van L.H.G.; Hoekert, W.E.J.

    1997-01-01

    SCHOUTEN, A.D., WEIJERMAN, M., VAN TIENEN, L.H.G. & W.E.J. HOEKERT, 1997. Relocations of Sea Turtle nests of Lepidochelys olivacea, Dermochelys coriace and Chelonia mydas in the Galibi Nature Reserve, Suriname. Studies Nat. Hist. Caribbean Region 73, Amsterdam, 1997: 63-69. Relocation of nests of th

  1. A reputation mechanism in peer-to-peer cloud storage systems%对等云存储系统信誉机制研究

    Institute of Scientific and Technical Information of China (English)

    吴吉义; 陈德人

    2011-01-01

    As the latest development of the distributed storage technology,cloud storage is a product of the integration of distributed storage and virtualization technologies.Cloud storage allows use to storage facilities available on the internet.Relative to the current Master/Slave computing model cloud storage file systems,including GFS,HDFS,Sector and KFS,an open P2P(peer-to-peer) cloud storage system based on DHT was proposed,and we constructed a prototype system named MingCloud based on the Kademlia algorithm.According to the research-development needs of the system,a reputation mechanism was designed for the system,specifically including the calculation of reputation degree,trust model design,work process of reputation mechanism,and safety analysis.Our simulation results show that the mechanism of this model provides a high degree of effectiveness and robustness.Meanwhile,the reputation model can effectively protect honest nodes,reduce the trust value of malicious nodes,and restrain malicious behaviors.%云存储是分布式存储技术与虚拟化技术结合的产物,是分布式存储技术的最新发展.云存储意味着存储可以作为一种服务,通过互联网提供给用户.相对于当前主从(Master/Slave)结构的GFS(Google File System),HDFS(Hadoop Distributed File System),Sector,KFS(Kosmos File System)等云存储系统,提出了一种基于DHT(Distributed Hash Table)的对等云存储系统MingCloud.重点研究了系统的信誉机制问题,具体包括综合信誉度的计算、信任模型设计、信誉机制的工作过程、安全性分析等方面.仿真实验表明,该机制具有较好的有效性和健壮性,能有效保护系统中的诚实节点,迅速降低恶意节点的信任值,抑制恶意交易行为.引入MingCredit之后,系统不再简单地以节点的物理性能诸如存储空间大小、网络带宽等方面的客观能力,以及在线时间作为评价标准,而是与节点参与到对等存储交

  2. Research of cloud storage system and technology service platform based on the Microsoft%基于微软云计算存储系统及技术服务平台研究

    Institute of Scientific and Technical Information of China (English)

    李爱国; 殷锋社

    2013-01-01

    云计算技术的兴起和发展,正逐渐改变人们使用服务和资源的方式,同时也成为计算机应用领域的研究热点.云存储可实现云端海量数据的高效存储,是云计算的重要基础云存储可实现云端海量数据的高效存储,是云计算的重要基础.对如何保证云存储系统的服务质量及可靠性,对于保证海量用户的访问效率,维护海量数据存储的可用性及用户技术服务平台的开发有着重大意义.%Cloud computing technology is arisen with development, is gradually changing people using services and resources, but also become the research hotspot in the field of computer application. Cloud storage can realize the efficient storage of massive data cloud, cloud computing is the important basis of cloud storage can realize the efficient storage of massive data cloud, cloud computing is the important foundation of. On how to ensure that the cloud storage service system to ensure the quality and reliability, large numbers of users accessing efficiency, maintain the huge data storage of usability and user technical service platform for the development has the significant significance.

  3. Study of Digital Resource Storage in College Library Based on Cloud Computing%基于云计算的高校图书馆数字资源存储研究

    Institute of Scientific and Technical Information of China (English)

    王煦

    2015-01-01

    This paper described the SAN (Storage Area Network)based on cloud storage, and analyzed the system structure with the SAN characteristic, and finally put forward layered structure of cloud storage system.%对云存储支持下SAN存储区域网络进行了介绍。分析了系统以SAN结构为特点的系统框架,最后提出了云存储系统的分层结构。

  4. An Empirical Analysis on the Patent Activities of Cloud Storage Technology Worldwide%国内外云存储技术专利实证分析

    Institute of Scientific and Technical Information of China (English)

    刘友华; 周素芳

    2014-01-01

    基于国内外云存储技术现有研究,利用“Innography专利信息检索分析平台”和“国家知识产权局专利信息检索平台”,对国内外云存储技术领域的专利进行全面检索,形成专利研究数据库,从年度趋势、申请人、发明人、技术域分布等多个角度,对该技术领域的专利活动进行统计和分析,得出该技术领域的专利现状、发展趋势以及竞争态势等信息,进而为云存储领域的创新活动提供参考。%This paper first summarizes the existing study on cloud storage technology at home and abroad. Then, using the"State Intellec-tual Property Office ( patent information) platform" and the "INNOGRAPHY" to facilitate the formation of Patent Database, the paper makes a comprehensive search for the patents in the area of cloud storage technology domestically and overseas. Moreover, the patent ac-tivities in relation to cloud storage technology are explored and analyzed from a wide perspective ranging from annual trends, patent appli-cant, patent inventor to technical components.

  5. The Technology Design Research Based on Massive Data Cloud Storage of Geographical National Conditions%地理国情海量数据云存储技术设计研究

    Institute of Scientific and Technical Information of China (English)

    朱力维; 王志强; 王军

    2014-01-01

    This research has geographic conditions mass data features and the data content .For current data storage problems , this re-search studies cloud storage concept and the related key technologies , and HDFS technology used has cloud environment for geographic conditions mass data organization and resources shared by cloud storage model , through cloud service interface access application by cloud storage service , which can effective settle geographic conditions data resources mass storage and service problems for geographic conditions data management way serving reference to data transformation .%研究了地理国情海量数据特征及数据内容,针对目前数据存储中存在的问题,研究了云存储概念及相关的关键技术,采用HDFS技术提出了云环境下地理国情海量数据组织与资源共享的云存储模型,通过云应用服务接口访问云存储服务,能够有效解决地理国情数据资源海量存储和服务问题,为地理国情数据管理方式的转变提供借鉴。

  6. Design of Virtual Data Separation Dynamic Cloud Storage Based on Information Fusion%基于信息融合的虚拟数据分离动态云存储设计

    Institute of Scientific and Technical Information of China (English)

    倪时龙; 彭巍; 林振天; 许双成

    2015-01-01

    提出一种基于信息融合的虚拟数据分离动态云存储设计方法.构建了虚拟数据的分离动态云存储调度模型,进行信息特征提取,对提取的云存储信息特征进行信息融合处理,实现虚拟数据分离动态云存储改进设计.仿真结果表明,采用该算法进行云存储设计,能较为准确地反映虚拟数据的细节信息特征,提高数据融合精度,为实现动态分离存储提供优化索引通道,进而提高云存储中数据调度性能.%A new dynamic cloud storage design method based on information fusion for virtual data separation is proposed. To construct the virtual data separation dynamic cloud storage scheduling model and feature information extraction, to ex-tract cloud storage characteristics of information of information fusion and processing, realize the virtual data separation dy-namic cloud storage to improve the design. The simulation results show that the sampling of the algorithm of cloud storage design, more accurately response the details of the virtual data information features, improving the accuracy of data fusion, and provides the optimization index channel to realize the dynamic separation and storage, and to improve the cloud storage data scheduling performance.

  7. Cloud Computing: a Prologue

    OpenAIRE

    Ullah, Sultan; Xuefeng, Zheng

    2013-01-01

    An emerging internet based super computing model is represented by cloud computing. Cloud computing is the convergence and evolution of several concepts from virtualization, distributed storage, grid, and automation management to enable a more flexible approach for deploying and scaling applications. However, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. The concept of cloud c...

  8. Hybrid cloud for dummies

    CERN Document Server

    Hurwitz, Judith; Halper, Fern; Kirsch, Dan

    2012-01-01

    Understand the cloud and implement a cloud strategy for your business Cloud computing enables companies to save money by leasing storage space and accessing technology services through the Internet instead of buying and maintaining equipment and support services. Because it has its own unique set of challenges, cloud computing requires careful explanation. This easy-to-follow guide shows IT managers and support staff just what cloud computing is, how to deliver and manage cloud computing services, how to choose a service provider, and how to go about implementation. It also covers security and

  9. Analysis of cloud storage systems based on metadata node%基于中心节点的云存储系统应用分析

    Institute of Scientific and Technical Information of China (English)

    李淼淼; 梅向东

    2015-01-01

    Due to the improvement of cloud computing, distributed cloud storage systems based on different network topologies and data transmission mechanisms are arising. The different characteristics of systems lead to the different applications. This paper, using GlusterFS with no metadata node and MooseFS with a metadata nodes as representative, shows a comprehensive analysis of the system architectures, working mechanisms, system features, etc., distinguished from whether the system contains a metadata node .Based on the ability test, this paper then gives the solutions of how to choose the most appropriate file system on the basis of existing hardware, which makes the cloud storage system achieve optimal performance.%在云计算的催生下,基于不同网络拓扑结构和数据传输机制的分布式云存储系统应运而生,系统特性不同,应用场合也不尽相同。本文从是否存在元数据中心节点的角度出发,以有元数据节点的MooseFS和无元数据节点的GlusterFS为代表,全面分析两种系统架构、工作机制、系统特点等,并对两种系统进行不同文件类型的读写测试,给出在现有硬件基础上选择适合的文件系统的方法,从而使云存储系统数据处理性能达到最优。

  10. Analysis of cloud storage systems based on metadata node%基于中心节点的云存储系统应用分析

    Institute of Scientific and Technical Information of China (English)

    李淼淼; 梅向东

    2015-01-01

    在云计算的催生下,基于不同网络拓扑结构和数据传输机制的分布式云存储系统应运而生,系统特性不同,应用场合也不尽相同。本文从是否存在元数据中心节点的角度出发,以有元数据节点的MooseFS和无元数据节点的GlusterFS为代表,全面分析两种系统架构、工作机制、系统特点等,并对两种系统进行不同文件类型的读写测试,给出在现有硬件基础上选择适合的文件系统的方法,从而使云存储系统数据处理性能达到最优。%Due to the improvement of cloud computing, distributed cloud storage systems based on different network topologies and data transmission mechanisms are arising. The different characteristics of systems lead to the different applications. This paper, using GlusterFS with no metadata node and MooseFS with a metadata nodes as representative, shows a comprehensive analysis of the system architectures, working mechanisms, system features, etc., distinguished from whether the system contains a metadata node .Based on the ability test, this paper then gives the solutions of how to choose the most appropriate file system on the basis of existing hardware, which makes the cloud storage system achieve optimal performance.

  11. ultrastructural study of limb bud development in green turtles chelonia mydas

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    morphological changes during the embryonic development of limbs of the green turtle,chelonia mydas,were studied during the entire period of incubation,using transmission and scanning electron microscopy (tem and sem).limb buds were first observed at stage 2.at that stage,the tip was covered with an apical ectodermal ridge (aer) which began to regress at stage 6.associated with aer was the presence of the mesenchymal cells which,consequently,differentiated into muscles,cartilage and bones.the gross features of the skeletal development appeared as a condensation of the cartilaginous structures in the proximal distal region of the limbs.the primordial digits were gradually enclosed by hard keratinized webbed skin.the increase in rate of ossification and skin pigmentation was correlated with the growth of the limbs.the development of the limbs was closely related to the transitional appearance of mucus secretion from the epidermis.

  12. Identification of CD3+ T lymphocytes in the green turtle Chelonia mydas

    Science.gov (United States)

    Munoz, F.A.; Estrada-Parra, S.; Romero-Rojas, A.; Work, T.M.; Gonzalez-Ballesteros, E.; Estrada-Garcia, I.

    2009-01-01

    To understand the role of the immune system with respect to disease in reptiles, there is the need to develop tools to assess the host's immune response. An important tool is the development of molecular markers to identify immune cells, and these are limited for reptiles. We developed a technique for the cryopreservation of peripheral blood mononuclear cells and showed that a commercially available anti-CD3 epsilon chain antibody detects a subpopulation of CD3 positive peripheral blood lymphocytes in the marine turtle Chelonia mydas. In the thymus and in skin inoculated with phytohemagglutinin, the same antibody showed the classical staining pattern observed in mammals and birds. For Western blot, the anti-CD3 antibodies identified a 17.6 kDa band in membrane proteins of peripheral blood mononuclear cell compatible in weight to previously described CD3 molecules. This is the first demostration of CD3+ cells in reptiles using specific antibodies. ?? 2009 Elsevier B.V.

  13. Food preferences and Hg distribution in Chelonia mydas assessed by stable isotopes.

    Science.gov (United States)

    Bezerra, M F; Lacerda, L D; Rezende, C E; Franco, M A L; Almeida, M G; Macêdo, G R; Pires, T T; Rostán, G; Lopez, G G

    2015-11-01

    Mercury (Hg) is a highly toxic pollutant that poses in risk several marine animals, including green turtles (Chelonia mydas). Green turtles are globally endangered sea turtle species that occurs in Brazilian coastal waters as a number of life stage classes (i.e., foraging juveniles and nesting adults). We assessed total Hg concentrations and isotopic signatures ((13)C and (15)N) in muscle, kidney, liver and scute of juvenile green turtles and their food items from two foraging grounds with different urban and industrial development. We found similar food preferences in specimens from both areas but variable Hg levels in tissues reflecting the influence of local Hg backgrounds in food items. Some juvenile green turtles from the highly industrialized foraging ground presented liver Hg levels among the highest ever reported for this species. Our results suggest that juvenile foraging green turtles are exposed to Hg burdens from locally anthropogenic activities in coastal areas. PMID:26196313

  14. Survey of proofs on data storage security in cloud computing%云计算下的数据存储安全可证明性综述

    Institute of Scientific and Technical Information of China (English)

    梁彪; 曹宇佶; 秦中元; 张群芳

    2012-01-01

    In cloud computing, data service outsourcing relieves the data owners of the burden of local data storage and main-tenance. However, it also eliminates their physical control of the storage dependability and security, which makes the out-sourced data assurances in cloud computing a very challenging and potentially formidable task. Based on the overall study of the recent researches on data storage security, it introduced the architecture of cloud data storage firstly. And studied the state-of-the-art schemes from proofs of retrievahilily and provable data possession. Then, this paper discussed the function design in protocol based on public verification, homomorphic authenticators, data dynamics, data privacy protection, batch auditing and multiple-server environment. Furthermore, made some comparisons of functions and the complexity in different protocols in ta-bles. At last, summarized and discussed the further direction of research.%云计算的数据服务外包可以减少数据所有者本地的存储和维护压力,然而用户会因此失去对数据可靠性和安全的物理控制.于是如何确保云中数据的安全就成为了非常有挑战性的任务和难题.在全面研究云计算数据存储安全现有成果的基础上,介绍了云计算数据存储的基本架构,并从可检索证明和可证明数据拥有两个角度分析了相关研究方案的发展,从公共认证、同态认证、数据动态化、隐私保护、批审计和多服务器环境得方面讨论了协议的功能设计,并且列表进行了功能和开销对比,在此基础上提出了一个比较完备的云计算环境下的协议框架.最后总结并阐述了后续工作.

  15. Efficient VM Storage for Clouds Based on the High-Throughput BlobSeer BLOB Management System

    OpenAIRE

    Carpen-Amarie, Alexandra; Dinh, Tuan Viet; Antoniu, Gabriel

    2010-01-01

    Le Cloud computing a récemment émergé comme un nouveau paradigme qui vise à fournir une infrastructure informatique et des services fiables et flexibles en s'appuyant sur des ressources virtuelles. Dans ce contexte, les utilisateurs peuvent télécharger des images de machines virtuelles vers un service de stockage Cloud, d'où elles sont propagées sur demande vers les noeuds physiques sur lesquels elles vont être exécutées. En consequence, il est essentiel que le service de gestion des données C...

  16. CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Dr. Vinod Kumar

    2013-01-01

    Full Text Available Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid over a network (typically the internet. Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Parallel to this concept can be drawn with the electricity grid, wherein end-users consume power without needing to understand the component devices or infrastructure required to provide the service.

  17. A support privacy encryption method in the application of the cloud storage%一种支持隐私保护的加密方法在云存储中的应用

    Institute of Scientific and Technical Information of China (English)

    张林

    2016-01-01

    With the rapid development of cloud storage technology, cloud storage data security has become a key problem. En-cryption is an effective method for protection of data. In order to improve the cloud storage environment, the protection of cus-tomer privacy, this article design research a kind of support CESVMC privacy cloud storage encryption method. Based on the matrix and vector add, subtract, multiply, divide, complete the cloud storage data and customer information confidential work. Finally through security analysis and performance evaluation, prove CESVMC encryption technology has high safety perfor-mance, and reasonable operation complexity, meet the needs of the daily work of cloud storage.%随着云存储技术的快速发展,云存储的数据安全性成了一个最为关键的问题。加密是一种对数据进行保护的有效方法。为了提高云存储环境中对客户隐私的保护,本文设计研究了一种支持隐私保护的云存储加密方法CESVMC。通过对矩阵和向量进行加、减、乘、除运算,完成对云存储数据和客户信息的保密工作。最后经过安全分析和对其性能进行评测,证明CESVMC加密技术具有较高的安全性能,以及合理的运算复杂度,满足日常云存储的工作需要。

  18. 基于P2P分布式开放资源管理服务的云存储方案研究%Research on Mass Data Cloud Storage System

    Institute of Scientific and Technical Information of China (English)

    陈敏

    2014-01-01

    Because able to provide users with safety and mass data storage function, cloud storage technology developed very rapidly in recent years. This paper introduces the basic principle of cloud storage technology and analyzes the present situation of the cloud storage technology, introduces the use of existing natural distribution network around the world plenty of free storage service, such as disc, FTP, email and other forms of storage. These services will be held together, so as to provide users with low price and reliable storage systems. This paper introduces the design of a kind of low cost,quick speed,high availability,can be expanded cloud storage topology system. By means of the system to expanding other function,finally achieves the purpose of distributed storage resources sharing.%云存储技术因其能为用户提供了安全、海量、随时随地的数据存储功能而得以快速发展。提出了利用网络上现存的自然分布于世界各地的大量免费存储服务,如网盘、ftp、email以及其他形式等存储空间,将这些服务集中起来,为用户提供价廉、可靠的存储系统。介绍了一种低开销、快速度、高可用、可扩展的云存储拓扑系统,以期在该拓扑架构下实现以文件存储和共享服务为基础,不断扩展其他功能,最终形成P2P分布式存储资源共享的目的。

  19. Multinational Tagging Efforts Illustrate Regional Scale of Distribution and Threats for East Pacific Green Turtles (Chelonia mydas agassizii)

    OpenAIRE

    Hart, Catherine E.; Blanco, Gabriela S.; Coyne, Michael S.; Delgado-Trejo, Carlos; Godley, Brendan J.; Jones, T. Todd; Resendiz, Antonio; Seminoff, Jeffrey A.; Witt, Matthew J.; Wallace J Nichols

    2015-01-01

    To further describe movement patterns and distribution of East Pacific green turtles (Chelonia mydas agassizii) and to determine threat levels for this species within the Eastern Pacific. In order to do this we combined published data from existing flipper tagging and early satellite tracking studies with data from an additional 12 satellite tracked green turtles (1996-2006). Three of these were tracked from their foraging grounds in the Gulf of California along the east coast of the Baja Cal...

  20. Morfologia do tubo digestório da tartaruga verde (Chelonia mydas Morphology of the digestive tube of the green turtle (Chelonia mydas

    Directory of Open Access Journals (Sweden)

    Marcela S. Magalhães

    2010-08-01

    Full Text Available Para avaliar a morfologia do tubo digestório da tartaruga verde (Chelonia mydas 10 animais, 9 juvenis e 1 adulto, foram analisados. A retirada dos órgãos digestórios procedeu-se após abertura do plastrão. A descrição e a medida do comprimento de cada órgão [esôfago, estômago, intestino delgado (ID e intestino grosso (IG] foram realizadas com o tubo digestório aberto. Os resultados mostraram que tanto nos animais juvenis como no adulto, o esôfago foi marcado pela presença de papilas pontiagudas em sua mucosa interna. O estômago apresentou aspecto saculiforme com fundo cego. No ID foi observado pregas reticulares na mucosa duodenal, enquanto o jejuno e do íleo mostrou pregas retilíneas longitudinais. O IG foi marcado pela alternância de regiões abauladas (haustros ou saculações e estreitamentos. A microscopia do tudo digestório em C. mydas revelou esôfago com mucosa pregueada revestida por epitélio estratificado pavimentoso queratinizado. O estômago mostrou-se dividido em regiões: cárdica, fúndica, pilórica, as quais diferiam quanto ao número de glândulas e disposição da camada muscular. O ID apresentou-se marcado por vilosidades, e o IG por mucosa pregueada contendo glândulas na lâmina própria. A morfologia do tubo digestório da tartaruga verde mostrou-se adaptada ao seu hábito alimentar, possuindo especializações e um longo trato digestório que promove o aumento da superfície de absorção, já que seu alimento é de difícil digestão.The morphology of the digestive tube of the green turtle (Chelonia mydas was evaluated. Nine young e 1 adult turtles were analyzed. The digestive organs withdrew occurred after plastron opening. The length's description and measurement from each organ [esophagus, stomach, small intestine (SI and large intestine (LI] were made with digestive tube opened. The results showed that in both the adult and young animals, the esophagus from all species were marked by the presence

  1. 从共享到共有:学术图书馆云存储联盟研究%From Sharing to Co-owning:Academic Library Cloud Storage Consortium Research

    Institute of Scientific and Technical Information of China (English)

    刘华; 许新巧

    2014-01-01

    This paper attempts to define the structure and framework of academic library cloud storage consortium.The au-thors analyze the opportunities for academic libraries which cloud-computing is bringing basing on some American cloud storage consortium cases and propose that China academic libraries should accelerate the building of academic library cloud storage consorti-um based on cloud-computing.%探讨学术馆藏云存储联盟的结构和操作框架,并以美国学术图书馆云存储联盟为案例,分析研究云存储联盟给学术图书馆带来的机遇,指出云存储联盟将促进云图书馆的建设,中国学术图书馆应利用云技术,加快建设本国的云存储联盟。

  2. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  3. The Application of Cloud Storage in the"Wisdom Campus"in Colleges and Universities%云存储在高校"智慧校园"中的应用

    Institute of Scientific and Technical Information of China (English)

    史杨

    2015-01-01

    该文简要的介绍了云存储技术,并且通过分析云存储技术,可以看到在云存储中良好的扩展性、较高的安全性、定制服务和低成本等特点,在高校"智慧校园"网络数字化建设中有良好的应用,可以通过云存储技术来整合高校数字资源,提高高校教科研管理水平,是创建"智慧校园"的有效措施.%This paper briefly introduces the cloud storage technology, and through the analysis of cloud storage technology, We can learn the characteristics of cloud storage, such as good scalability, high security, customized service and low cost, etc."Wisdom campus"in colleges and universities have good application in the construction of network digital. We can integrate the digital re-sources in colleges and universities through the cloud storage technology, so as to improve the level of scientific research manage-ment in colleges and universities, it is the effective measures to create"Wisdom campus".

  4. Discussion on the Information Resource Storage Architecture Model in Digital Library Based on Cloud Storage Technology%基于云存储技术的数字图书馆信息资源存储架构模型探讨

    Institute of Scientific and Technical Information of China (English)

    金志敏

    2015-01-01

    Cloud computing is a hotspot of current research and application problems,cloud storage as the bottom lay-er of cloud computing service,provides an important support role to upper layers. With the rapid increase of the digital library information resources,the traditional way of storage in the face of mass data storage requirements,there is the bottleneck of capacity and performance. Cloud storage as a new mode of storage service,for the huge amounts of digital library information resource construction provides a new choice This article introduces the cloud computing and cloud storage,cloud storage technology based on digital library,discusses the model of the digital library information resource storage architecture. Finally the application of digital library ,the advantage of the cloud storage.%云计算是当前研究与应用的热点问题,云存储作为云计算的底层服务,对上层应用提供了重要的支持作用。随着数字图书馆信息资源总量的快速增加,传统的存储方式在面对海量数据存储的需求上,存在着容量和性能的瓶颈。云存储作为一种新型的存储服务模式,为数字图书馆的海量信息资源建设提供了一种新的选择。。本文在介绍云计算与云存储、数字图书馆云存储技术基础上,探讨了数字图书馆信息资源存储架构模型。最后阐述了数字图书馆应用云存储的优势。

  5. 云计算用户数据传输与存储安全研究%Data transmission and storage security of cloud-computing users

    Institute of Scientific and Technical Information of China (English)

    李海涛

    2013-01-01

    With the rapid development of computer network technology and relevant knowledge popularization,under the ef-fect of market economy,the users’data security problem has become one of the important issues of the network data transmis-sion and storage. "Cloud computing" is one of the computer technologies which is widely used in recent years. The users’data security issues in application process have become the focus of attention of people. Therefore,the research has not only theoreti-cal value,but also practical application value. In this paper,the related concepts about cloud computing are introduced,and the impact on the security of cloud computing user data transmission and storage is analyzed. Some advanced measures are intro-duced.%随着计算机网络技术的快速发展以及相关知识的普及,在市场经济的影响下,用户的数据安全问题已经成为当前网络数据传输以及存储的重要问题之一。“云计算”是近年来应用比较广泛的技术之一,其在应用过程的用户数据安全问题也成为了人们关注的热点。因此,对该问题的研究工作既具有理论价值,又具有重要的实际应用价值。首先对云计算的相关概念进行介绍,然后,对影响云计算用户数据传输和存储的安全问题进行分析,最后,介绍目前一些先进的解决措施。

  6. RS纠删码在电子健康档案云存储中的应用%Application of RS erasure code in cloud storage of electronic health records

    Institute of Scientific and Technical Information of China (English)

    杨进; 王亮明; 唐德玉

    2012-01-01

    Cloud storage has become highlight in the electronic health records. Due to the uncontrollable characteristics of cloud storage, security of electronic health records data stored in the cloud storage node could not be ensured. Hence, its further application is limited. In this paper, the technique of RS erasure encoding is introduced to prevent the whole electronic health records being stolen when the data in local cloud storage nodes leaked, through splitting the whole information and storing them in fragments. Meanwhile, the RS erasure code is used to recover the damaged data of electronic health records and provide a new data security protection in cloud storage of electronic health records.%电子健康档案云存储成为研究热点,但云端存储节点的不可控特性使得其存储数据的安全性得不到保障,从而制约了电子健康档案云存储的进一步发展.利用RS纠删码编码将文件信息割裂并分片存储米防止局部存储节点数据块泄露导致的整个文件信息被窃取,利用其纠删能力实现损坏数据的恢复,为电子健康档案云存储数据安全性保障提供了一种新的解决方案.

  7. 基于SWOT分析的高校图书馆数字资源云存储模式探讨%The SWOT Analysis of the Digital Resources of University Library Based on Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    彭文

    2014-01-01

    First elaborated the current situation of library digital resources storage, problems and future resource storage requirements, on this basis, using swot analysis of cloud storage brings to the University Library opportunities and threats, as well as the application of cloud storage library's own advantages and disadvantages, and finally the formation of swot analysis matrix, and puts forward four kinds of strategies of University Library Application cloud development of storage.%本文首先阐述了目前图书馆数字资源存储现状、面临的问题和未来资源存储需求,在此基础上,采用SWOT方法分析云存储给高校图书馆带来的机遇和威胁,以及图书馆自身应用云存储的优势和劣势,最后形成SWOT分析矩阵,并提出高校图书馆应用云存储发展的四种战略对策。

  8. DESIGN AND IMPLEMENTATION OF CLOUD STORAGE SECURITY GATEWAY SYSTEM BASED ON CIFS PROTOCOL%基于CIFS协议的云存储安全网关的设计与实现

    Institute of Scientific and Technical Information of China (English)

    郝斐; 王雷; 荆继武; 王平建

    2013-01-01

    CIFS ( Common Internet File System) , the core protocol of the network storage in application layer, is the communication protocol for data storage applied in NAS (network attached storage). Cloud storage is a novel form of network storage, and both the enterprise and individual users begin to use cloud storage as their network storage media. Along with the widespread use, the security issues of the cloud storage catch the eyes of users, such as data leakage and data tampering. In this paper, based on the cloud storage service of Amazon S3, we design and implement a CIFS-based cloud storage security gateway system (CSSGS). With the CSSGS, users are able to utilise the cloud storage service of Amazon S3 in their habits the same as accessing NAS. It also encrypts/decrypts all the users data before uploading/downloading to/from Amazon S3, hence the information leakage during the process of data communication and storage is prevented effectively. It also offers the integrity checking on files downloaded from S3 to examine the consistency of the contents with the uploaded one for data tempering prevention.%CIFS(Common Internet File System)协议是网络存储在应用层的核心协议,是应用于网络附加存储NAS(Network Attached Storage)进行数据存储的通信协议.云存储是一种新型的网络存储形式,企业和个人用户都开始使用云存储作为其网络存储媒介.随着云存储的广泛使用,云存储中数据的安全问题,如数据泄漏和数据篡改,也成了用户广泛关注的问题.基于Amazon S3的云存储服务,设计并实现一款基于CIFS协议的云存储安全网关系统CSSGS (Cloud Storage Security Gateway System).通过该网关,用户能够以访问NAS的访问习惯,使用Amazon S3云存储服务;该网关还对用户上传至Amazon S3的数据进行加密保护,可以有效防止数据在传输和存储过程中的泄漏;同时该网关还对从S3下载的文件进行完整性校验,检测其内容与上

  9. Cloud Infrastructure Service Management - A Review

    OpenAIRE

    2012-01-01

    The new era of computing called Cloud Computing allows the user to access the cloud services dynamically over the Internet wherever and whenever needed. Cloud consists of data and resources; and the cloud services include the delivery of software, infrastructure, applications, and storage over the Internet based on user demand through Internet. In short, cloud computing is a business and economic model allowing the users to utilize high-end computing and storage virtually with minimal infrast...

  10. Bacteremia in free-ranging Hawaiian green turtles, Chelonia mydas, with fibropapillomatosis

    Science.gov (United States)

    Work, T.M.; Balazs, G.H.; Wolcott, M.; Morris, R.

    2003-01-01

    Past studies of free-ranging green turtles Chelonia mydas with fibropapillomatosis (FP) in Hawaii have shown that animals become immunosuppressed with increasing severity of this disease. Additionally, preliminary clinical examination of moribund turtles with FP revealed that some animals were also bacteraemic. We tested the hypothesis that bacteraemia in sea turtles is associated with the severity of FP. We captured free-ranging green turtles from areas in Hawaii where FP is absent, and areas where FP has been endemic since the late 1950s. Each turtle was given an FP severity score ranging from 0 (no tumours) to 3 (severely affected). A fifth category included turtles that were stranded ashore and moribund with FP. We found that the percentage of turtles with bacteraemia increased with the severity of FP, and that the majority of bacteria cultured were Vibrio spp. Turtles with severe FP were more susceptible to bactaeremia, probably in part due to immunosuppression. The pattern of bacteraemia in relation to severity of disease strengthens the hypothesis that immunosuppression is a sequel to FP.

  11. Histology and Immunohistochemistry of the Cardiac Ventricular Structure in the Green Turtle (Chelonia mydas).

    Science.gov (United States)

    Braz, J K F S; Freitas, M L; Magalhães, M S; Oliveira, M F; Costa, M S M O; Resende, N S; Clebis, N K; Silva, N B; Moura, C E B

    2016-08-01

    This study describes the implications of cardiac ventricular microscopy in Chelonia mydas relating to its ability to dive. For this work, 11 specimens of the marine turtle species C. mydas found dead on the coast of Rio Grande do Norte (Northeast Brazil) were used. After necropsy, fragments of the cardiac ventricular wall were fixed in 10% buffered formaldehyde solution for 24 h and then subjected to routine processing for light and scanning electron microscopy (SEM). The ventricle in this species is formed by the epicardium, myocardium and endocardium. The subepicardial layer consists of highly vascularised connective tissue that emits septa to reinforce the myocardium surface. There is an abundant and diffuse subepicardial nerve plexus shown by immunostaining technique. The thickness of the spongy myocardium and the nature of its trabeculae varied between the heart chambers. The endocardium shows no characteristic elements of the heart conduction system. The valves have a hyaline cartilage skeleton, coated by dense irregular connective tissues characterised by elastic fibres. These findings in the green turtle ventricular microscopy are related to hypoxia resistance during diving. PMID:26268418

  12. Aerobic bacterial flora of nesting green turtles (Chelonia mydas) from Tortuguero National Park, Costa Rica.

    Science.gov (United States)

    Santoro, Mario; Hernández, Giovanna; Caballero, Magaly

    2006-12-01

    Bacteriological examination of 70 nesting green turtles (Chelonia mydas) from Tortuguero National Park, Costa Rica was performed to investigate nasal and cloacal aerobic bacteria. A total of 325 bacterial isolates were obtained, including 10 Gram-negative and three Gram-positive genera. Two hundred thirty-nine were Gram-negative and 86 were Gram-positive isolates. Klebsiella pneumoniae was the most common microbe identified in turtle samples: 27/70 (38.5%) in cloacal, and 33/70 (47.1%) in nasal samples. The Enterobacteriaceae family, including Enterobacter agglomerans, E. cloacae, Escherichia coli, Klebsiella oxytoca, K. pneumoniae, and Serratia marcescens, was the largest Gram-negative group of bacteria recovered and comprised 127 of 239 (53.1%) of the Gram-negative isolates. Staphylococcus species was the largest Gram-positive bacteria group, including S. aureus, S. cromogenes, S. epidermis, and S. intermedius, and made up 63 of 86 (73.2%) of the Gram-positive isolates recovered. The results of this study demonstrate that the aerobic bacterial flora of nesting green turtles at Tortuguero National Park is composed of a very wide spectrum of bacteria, including several potential pathogens. PMID:17315444

  13. Green turtle (Chelonia mydas) genetic diversity at Paranaguá Estuarine Complex feeding grounds in Brazil.

    Science.gov (United States)

    Jordão, Juliana Costa; Bondioli, Ana Cristina Vigliar; Guebert, Flavia Maria; de Thoisy, Benoit; Toledo, Lurdes Foresti de Almeida

    2015-01-01

    Sea turtles are marine reptiles that undertake long migrations through their life, with limited information regarding juvenile stages. Feeding grounds (FGs), where they spend most of their lives, are composed by individuals from different natal origins, known as mixed stock populations. The aim of this study was to assess genetic composition, natal origins and demographic history of juvenile green turtles (Chelonia mydas) at the Paranaguá Estuarine Complex (PEC), Brazil, considered a Natural World Heritage site. Tissue samples of stranded animals were collected (n = 60), and 700 bp mitochondrial DNA sequences were generated and compared to shorter sequences from previously published studies. Global exact tests of differentiation revealed significant differences among PEC and the other FGs, except those at the South Atlantic Ocean. Green turtles at PEC present genetic signatures similar to those of nesting females from Ascension Island, Guinea Bissau and Aves Island/Surinam. Population expansion was evidenced to have occurred 20-25 kYA, reinforcing the hypothesis of recovery from Southern Atlantic refugia after the last Glacial Maximum. These results contribute to a better understanding of the dynamics of green turtle populations at a protected area by providing knowledge on the dispersion patterns and reinforcing the importance of the interconnectivity between nesting and foraging populations. PMID:26500439

  14. Green turtle (Chelonia mydas genetic diversity at Paranaguá Estuarine Complex feeding grounds in Brazil

    Directory of Open Access Journals (Sweden)

    Juliana Costa Jordão

    2015-09-01

    Full Text Available Sea turtles are marine reptiles that undertake long migrations through their life, with limited information regarding juvenile stages. Feeding grounds (FGs, where they spend most of their lives, are composed by individuals from different natal origins, known as mixed stock populations. The aim of this study was to assess genetic composition, natal origins and demographic history of juvenile green turtles (Chelonia mydas at the Paranaguá Estuarine Complex (PEC, Brazil, considered a Natural World Heritage site. Tissue samples of stranded animals were collected (n = 60, and 700 bp mitochondrial DNA sequences were generated and compared to shorter sequences from previously published studies. Global exact tests of differentiation revealed significant differences among PEC and the other FGs, except those at the South Atlantic Ocean. Green turtles at PEC present genetic signatures similar to those of nesting females from Ascension Island, Guinea Bissau and Aves Island/Surinam. Population expansion was evidenced to have occurred 20–25 kYA, reinforcing the hypothesis of recovery from Southern Atlantic refugia after the last Glacial Maximum. These results contribute to a better understanding of the dynamics of green turtle populations at a protected area by providing knowledge on the dispersion patterns and reinforcing the importance of the interconnectivity between nesting and foraging populations.

  15. Evidence for retrovirus infections in green turtles Chelonia mydas from the Hawaiian islands

    Science.gov (United States)

    Casey, R.N.; Quackenbush, S.L.; Work, T.M.; Balazs, G.H.; Bowser, P.R.; Casey, J.W.

    1997-01-01

    Apparently normal Hawaiian green turtles Chelonia mydas and those displaying fibropapillomas were analyzed for infection by retroviruses. Strikingly, all samples were positive for polymerase enhanced reverse transcriptase (PERT) with levels high enough to quantitate by the conventional reverse transcriptase (RT) assay. However, samples of skin, even from asymptomatic turtles, were RT positive, although the levels of enzyme activity in healthy turtles hatched and raised in captivity were much lower than those observed in asymptomatic free-ranging turtles. Turtles with fibropapillomas displayed a broad range of reverse transcriptase activity. Skin and eye fibropapillomas and a heart tumor were further analyzed and shown to have reverse transcriptase activity that banded in a sucrose gradient at 1.17 g ml-1. The reverse transcriptase activity purified from the heart tumor displayed a temperature optimum of 37??C and showed a preference for Mn2+ over Mg2+. Sucrose gradient fractions of this sample displaying elevated reverse transcriptase activity contained primarily retrovitalsized particles with prominent envelope spikes, when negatively stained and examined by electron microscopy. Sodium dodecylsulfate-polyacrylamide gel electrophoresis (SDS-PAGE) analysis of gradient-purified virions revealed a conserved profile among 4 independent tumors and showed 7 prominent proteins having molecular weights of 116, 83, 51, 43, 40, 20 and 14 kDa. The data suggest that retroviral infections are widespread in Hawaiian green turtles and a comprehensive investigation is warranted to address the possibility that these agents cause green turtle fibropapillomatosis (GTFP).

  16. Exertional Myopathy in a Juvenile Green Sea Turtle (Chelonia mydas Entangled in a Large Mesh Gillnet

    Directory of Open Access Journals (Sweden)

    Brianne E. Phillips

    2015-01-01

    Full Text Available A juvenile female green sea turtle (Chelonia mydas was found entangled in a large mesh gillnet in Pamlico Sound, NC, and was weak upon presentation for treatment. Blood gas analysis revealed severe metabolic acidosis and hyperlactatemia. Plasma biochemistry analysis showed elevated aspartate aminotransferase and creatine kinase, marked hypercalcemia, hyperphosphatemia, and hyperkalemia. Death occurred within 24 hours of presentation despite treatment with intravenous and subcutaneous fluids and sodium bicarbonate. Necropsy revealed multifocal to diffuse pallor of the superficial and deep pectoral muscles. Mild, multifocal, and acute myofiber necrosis was identified by histopathological examination. While histological changes in the examined muscle were modest, the acid-base, mineral, and electrolyte abnormalities were sufficiently severe to contribute to this animal’s mortality. Exertional myopathy in reptiles has not been well characterized. Sea turtle mortality resulting from forced submergence has been attributed to blood gas derangements and seawater aspiration; however, exertional myopathy may also be an important contributing factor. If possible, sea turtles subjected to incidental capture and entanglement that exhibit weakness or dull mentation should be clinically evaluated prior to release to minimize the risk of delayed mortality. Treatment with appropriate fluid therapy and supportive care may mitigate the effects of exertional myopathy in some cases.

  17. Structure and Function of the Gastrointestinal Tract of the Green Turtle (Chelonia mydas) Hatchling

    Institute of Scientific and Technical Information of China (English)

    Hualing CHEN; Mingbin YE; Yuyan LU; Jinxia DUAN; Pipeng LI; Hexiang GU

    2015-01-01

    The gastrointestinal tracts of four Chelonia mydas hatchlings were examined at the anatomical, histological and ultrastructural level. Our results show that the gastrointestinal tract (GI) is composed by esophagus, stomach, small intestine (SI) and large intestine (LI), and histologically of mucosa, submucosa, muscularis externa (ME) and serosa. The esophagus is marked by conical papillae lined by keratinized stratified squamous epithelium, whereas the remaining GI by simple columnar epithelium; esophageal diverticulum is absent. The stomach covered with mucous granule cells, contains cardia, fundic regions and pylorus, which are separately characterized by cardiac glands, fundic glands and pyloric glands, and have the thickest submucosa and ME of the GI. The ME of the esophagus mainly consist of one layer of circular smooth muscle whereas the rest of GI of two layers, inner circular muscle and outer longitudinal muscle. The SI is slightly longer than the LI and the GI is approximately 5.11 times of the carapace length. The SI is lined with longitudinal zigzag folds and characterized by absorptive cells with longer and denser microvilli, whereas the LI by transversal folds, goblet cells and lymphoid nodules. Only intestinal glands appear in duodenum. Endocrine cells are observed in all sections of the GI and accounted for the largest proportion in duodenum. The results demonstrate a perfect combination of the structure and function of the GI and reveal that the digestion and absorption primarily occurs in the foregut. C. mydas hatchling may prefer carnivorous diet.

  18. Migrations of green turtles (Chelonia mydas between nesting and foraging grounds across the Coral Sea.

    Directory of Open Access Journals (Sweden)

    Tyffen C Read

    Full Text Available Marine megafauna tend to migrate vast distances, often crossing national borders and pose a significant challenge to managers. This challenge is particularly acute in the Pacific, which contains numerous small island nations and thousands of kilometers of continental margins. The green sea turtle, Chelonia mydas, is one such megafauna that is endangered in Pacific waters due to the overexploitation of eggs and adults for human consumption. Data from long-term tagging programs in Queensland (Australia and New Caledonia were analysed to investigate the migrations by C. mydas across the Coral Sea between their nesting site and their feeding grounds. A review of data collected over the last 50 years by different projects identified multiple migrations of C. mydas to and from New Caledonia (n = 97 and indicate that turtles foraging in New Caledonia nest in the Great Barrier Reef (Australia and vice versa. Several explanations exist for turtles exhibiting this energetically costly movement pattern from breeding to distant foraging grounds (1200-2680 km away despite viable foraging habitat being available in the local vicinity. These include hatchling drift, oceanic movements and food abundance predictability. Most of the tag recoveries in New Caledonia belonged to females from the south Great Barrier Reef genetic stock. Some females (n = 2 even showed fidelity to foraging sites located 1200 km away from the nesting site located in New Caledonia. This study also reveals previously unknown migrations pathways of turtles within the Coral Sea.

  19. Research on Security Protection Technology of Distributed Storage Based on Cloud Computing%基于云计算的分布式存储安全保护技术研究

    Institute of Scientific and Technical Information of China (English)

    陈克明

    2016-01-01

    In this paper,through cloud computing environment safety threat and the cloud computing distributed storage security protection technology research status analysis,research on Design of cloud computing in distributed data storage security protection technology of three security protocols,in cloud computing distributed storage security protection technology research and design continue to improve and make a contribution.%文章通过对云计算环境下安全隐患的威胁和云计算分布式存储安全保护技术研究现状进行分析,进行对云计算中分布式存储数据安全保护技术的3个安全协议方案的设计研究,以期在云计算下分布式存储安全保护技术的设计研究中不断进行完善并做出贡献。

  20. Provenance for the Cloud

    OpenAIRE

    Muniswamy-Reddy, Kiran-Kumar; MACKO Peter; Seltzer, Margo I.

    2010-01-01

    The cloud is poised to become the next computing environment for both data storage and computation due to its pay-as-you-go and provision-as-you-go models. Cloud storage is already being used to back up desktop user data, host shared scientific data, store web application data, and to serve web pages. Today’s cloud stores, however, are missing an important ingredient: provenance. Provenance is metadata that describes the history of an object. We make the case that provenance is crucial for da...

  1. [Cystic Fibrosis Cloud database: An information system for storage and management of clinical and microbiological data of cystic fibrosis patients].

    Science.gov (United States)

    Prieto, Claudia I; Palau, María J; Martina, Pablo; Achiary, Carlos; Achiary, Andrés; Bettiol, Marisa; Montanaro, Patricia; Cazzola, María L; Leguizamón, Mariana; Massillo, Cintia; Figoli, Cecilia; Valeiras, Brenda; Perez, Silvia; Rentería, Fernando; Diez, Graciela; Yantorno, Osvaldo M; Bosch, Alejandra

    2016-01-01

    The epidemiological and clinical management of cystic fibrosis (CF) patients suffering from acute pulmonary exacerbations or chronic lung infections demands continuous updating of medical and microbiological processes associated with the constant evolution of pathogens during host colonization. In order to monitor the dynamics of these processes, it is essential to have expert systems capable of storing and subsequently extracting the information generated from different studies of the patients and microorganisms isolated from them. In this work we have designed and developed an on-line database based on an information system that allows to store, manage and visualize data from clinical studies and microbiological analysis of bacteria obtained from the respiratory tract of patients suffering from cystic fibrosis. The information system, named Cystic Fibrosis Cloud database is available on the http://servoy.infocomsa.com/cfc_database site and is composed of a main database and a web-based interface, which uses Servoy's product architecture based on Java technology. Although the CFC database system can be implemented as a local program for private use in CF centers, it can also be used, updated and shared by different users who can access the stored information in a systematic, practical and safe manner. The implementation of the CFC database could have a significant impact on the monitoring of respiratory infections, the prevention of exacerbations, the detection of emerging organisms, and the adequacy of control strategies for lung infections in CF patients. PMID:26895996

  2. Cloud ERP and Cloud Accounting Software in Romania

    OpenAIRE

    Gianina MIHAI

    2015-01-01

    Nowadays, Cloud Computing becomes a more and more fashionable concept in the IT environment. There is no unanimous opinion on the definition of this concept, as it covers several versions of the newly emerged stage in the IT. But in fact, Cloud Computing should not suggest anything else than simplicity. Thus, in short, simple terms, Cloud Computing can be defined as a solution to use external IT resources (servers, storage media, applications and services), via Internet. Cloud computing is no...

  3. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  4. 一种基于蚁群算法的云存储副本动态选择机制研究%Pheromone-based ant colony replica selection mechanism in cloud storage

    Institute of Scientific and Technical Information of China (English)

    左方; 何欣

    2015-01-01

    针对云存储技术中副本选择优化问题,提出一种基于蚁群原理的云存储副本动态选择算法。构建基于蚁群的副本动态选择模型,建立副本选择度量标准(如带宽占用、网络路径时延和平均访问时间等)与蚁群信息素的映射,并对虚拟机实例负载状况和虚拟机集群资源利用状况进行量化评估,感知所监控的云节点的资源度量情况;最后利用副本信息素概率计算式得到一组选择副本资源的最优解,最终达到优化负载均衡的目的。经OpenStack 模式的云平台对新算法仿真实现,实验结果表明新算法成功实现了副本的有效分发和虚拟机集群的负载均衡,与 Round Robin 和 Server Load 算法相比,新算法有更好的负载均衡效果。%This paper designed and analyzed a feasible,distributed,ant colony optimization algorithm based replica selection method on big data transferring in cloud storage,which was called pheromone-based ant colony replica selection algorithm in cloud storage (PARSA).PARSA provided a new,promising direction in cloud storage.This algorithm was different from the previously studied researches in three ways to make it more accurately reflective of cloud environment.It inclined multifactors to affect the efficiency of data accessing and processing in cloud,considered such as bandwidth,file accessing time and average delay as pheromones in PARSA.PARSA avoided a large-scale flat flooding and supports multi-attribute range query,which were accompanied by unstructured or structured P2P replica selection methods.Lastly,simulation results from cloud test bed based on OpenStack show that,compared by Round Robin and Server Load,PARSA can reduce data access latency and band-width consumption,and effectively achieve cloud load balancing between storage nodes and improve the speed of data access.

  5. Research and Implementation of Cloud Computing Platform Oriented Online Storage System%面向云计算平台的在线存储系统研究与实现

    Institute of Scientific and Technical Information of China (English)

    耿胜男; 刘川意; 吴旭

    2012-01-01

    This paper designs and implements an important part of the infrastructure cloud - online storage system of the cloud storage system. The system follows the REST architectural pattern, and uses cURL, HSQLDB and other open source components to achieve the creation, upload, download and delete of directories and files and other functions.%研究基础设施云中的重要组成部分——云存储系统中在线存储系统的设计与实现。本系统的设计遵循REST架构模式,使用cURL、HSQLDB等开源组件实现目录与文件的创建、上传、下载、删除等功能。

  6. Location Allocation of Logistics Distribution Centers Based on Concept of Cloud Storage and Logistics%以云仓储物流概念为基础的物流配送中心选址

    Institute of Scientific and Technical Information of China (English)

    张珂宁

    2014-01-01

    In this paper, on the basis of an exposition of the concept of cloud storage and logistics, we analyzed the path for the implementation of cloud storage, then designed correspondingly the location model of the logistics center, next solved it using the genetic algorithm, and at the end, through an empirical example, validated the model and algorithm.%在论述云仓储物流概念的基础上分析了实施云仓储的思路,随后以云仓储的思想设计了物流中心选址的模型,并通过遗传算法对模型进行求解,最后以实例进行模型和算法的验证。

  7. 基于RIA和云存储的Web2.0 OS设计与实现%Design and implementation of Web2.0 OS based on RIA & cloud-storage

    Institute of Scientific and Technical Information of China (English)

    季志远

    2012-01-01

    This paper introduces a Web2.00S based on Flash & Flex (RIA),which provides the basic functions of entertain- ment,file storage,information updating and customization,so that it can be used as online entertainment platform,online storage p|at- form and online office platform. And introduces two key technologies of data communication between OS and cloud-storage-based Server, and file storage and representation.The server based on cloud-storage makes file uploads and downloads instantly with fluent using experiments.%设计了基于RIA下Flash/Flex联合开发的Web2.0OS,提供影音娱乐、文件存储、实时信息更新、用户自由定制等功能,可作为网上娱乐、存储和办公平台,并给出了OS与云存储端通信机制和文件存储再现机制这两个关键技术。服务器端采用云存储技术使得文件上传下载瞬间完成,给用户流畅的使用体验。

  8. 云存储在web3D内容管理系统中的应用%Application of Cloud Storage in Web3D Content Management System

    Institute of Scientific and Technical Information of China (English)

    陈晓波

    2015-01-01

    Google launched"Google101 program"in 2006. This is when truly specific concept of the"cloud"and related theories appear.Many companies have launched their own cloud platform. Facing the possibility of upcoming massive data of the library, cloud storage can linearly extend inactive data mass. This paper firstly outlines the basic architecture of the cloud platform, and in⁃troduces Hadoop distributed storage technology , then a program for the cloud storage in small files is designed.Finally a summary and recommendations for future improvements are put forward.%谷歌公司在2006年推出“Google101计划”,这才真正的有具体化的“云”的概念和相关理论,不少公司都相继推出了自己的云平台。面临未来素材库可能会到来的海量数据,利用云存储可以线性地扩展海量的非活动数据。该文首简述了云平台的基本架构,并对Hadoop分布式存储技术进行了介绍,然后设计了云存储针对小型文件的存储方案,最后进行总结,并对未来的改进提出了建议。

  9. Blood gases, biochemistry, and hematology of Galapagos green turtles (Chelonia mydas.

    Directory of Open Access Journals (Sweden)

    Gregory A Lewbart

    Full Text Available The green turtle, Chelonia mydas, is an endangered marine chelonian with a circum-global distribution. Reference blood parameter intervals have been published for some chelonian species, but baseline hematology, biochemical, and blood gas values are lacking from the Galapagos sea turtles. Analyses were done on blood samples drawn from 28 green turtles captured in two foraging locations on San Cristóbal Island (14 from each site. Of these turtles, 20 were immature and of unknown sex; the other eight were males (five mature, three immature. A portable blood analyzer (iSTAT was used to obtain near immediate field results for pH, lactate, pO2, pCO2, HCO3-, Hct, Hb, Na, K, iCa, and Glu. Parameter values affected by temperature were corrected in two ways: (1 with standard formulas; and (2 with auto-corrections made by the iSTAT. The two methods yielded clinically equivalent results. Standard laboratory hematology techniques were employed for the red and white blood cell counts and the hematocrit determination, which was also compared to the hematocrit values generated by the iSTAT. Of all blood analytes, only lactate concentrations were positively correlated with body size. All other values showed no significant difference between the two sample locations nor were they correlated with body size or internal temperature. For hematocrit count, the iSTAT blood analyzer yielded results indistinguishable from those obtained with high-speed centrifugation. The values reported in this study provide baseline data that may be useful in comparisons among populations and in detecting changes in health status among Galapagos sea turtles. The findings might also be helpful in future efforts to demonstrate associations between specific biochemical parameters and disease.

  10. Nesting phenology of marine turtles: insights from a regional comparative analysis on green turtle (Chelonia mydas.

    Directory of Open Access Journals (Sweden)

    Mayeul Dalleau

    Full Text Available Changes in phenology, the timing of seasonal activities, are among the most frequently observed responses to environmental disturbances and in marine species are known to occur in response to climate changes that directly affects ocean temperature, biogeochemical composition and sea level. We examined nesting seasonality data from long-term studies at 8 green turtle (Chelonia mydas rookeries that include 21 specific nesting sites in the South-West Indian Ocean (SWIO. We demonstrated that temperature drives patterns of nesting seasonality at the regional scale. We found a significant correlation between mean annual Sea Surface Temperature (SST and dates of peak nesting with rookeries exposed to higher SST having a delayed nesting peak. This supports the hypothesis that temperature is the main factor determining peak nesting dates. We also demonstrated a spatial synchrony in nesting activity amongst multiple rookeries in the northern part of the SWIO (Aldabra, Glorieuses, Mohéli, Mayotte but not with the eastern and southern rookeries (Europa, Tromelin, differences which could be attributed to females with sharply different adult foraging conditions. However, we did not detect a temporal trend in the nesting peak date over the study period or an inter-annual relation between nesting peak date and SST. The findings of our study provide a better understanding of the processes that drive marine species phenology. The findings will also help to predict their ability to cope with climate change and other environmental perturbations. Despite demonstrating this spatial shift in nesting phenology, no trend in the alteration of nesting dates over more than 20 years was found.

  11. Assessing humoral and cell-mediated immune response in Hawaiian green turtles, Chelonia mydas

    Science.gov (United States)

    Work, T.M.; Balazs, G.H.; Rameyer, R.A.; Chang, S.P.; Berestecky, J.

    2000-01-01

    Seven immature green turtles, Chelonia mydas, captured from Kaneohe Bay on the island of Oahu were used to evaluate methods for assessing their immune response. Two turtles each were immunized intramuscularly with egg white lysozyme (EWL) in Freunda??s complete adjuvant, Gerbu, or ISA-70; a seventh turtle was immunized with saline only and served as a control. Humoral immune response was measured with an indirect enzyme linked immunosorbent assay (ELISA). Cell-mediated immune response was measured using in vitro cell proliferation assays (CPA) using whole blood or peripheral blood mononuclear cells (PBM) cultured with concanavalin A (ConA), phytohaemagglutinin (PHA), or soluble egg EWL antigen. All turtles, except for one immunized with Gerbu and the control, produced a detectable humoral immune response by 6 weeks which persisted for at least 14 weeks after a single immunization. All turtles produced an anamnestic humoral immune response after secondary immunization. Antigen specific cell-mediated immune response in PBM was seen in all turtles either after primary or secondary immunization, but it was not as consistent as humoral immune response; antigen specific cell-mediated immune response in whole blood was rarely seen. Mononuclear cells had significantly higher stimulation indices than whole blood regardless of adjuvant, however, results with whole blood had lower variability. Both Gerbu and ISA-70 appeared to potentiate the cell-mediated immune response when PBM or whole blood were cultured with PHA. This is the first time cell proliferation assays have been compared between whole blood and PBM for reptiles. This is also the first demonstration of antigen specific cell-mediated response in reptiles. Cell proliferation assays allowed us to evaluate the cell-mediated immune response of green turtles. However, CPA may be less reliable than ELISA for detecting antigen specific immune response. Either of the three adjuvants appears suitable to safely elicit a

  12. Population trends and survival of nesting green sea turtles Chelonia mydas on Aves Island, Venezuela

    Science.gov (United States)

    Garcia-Cruz, Marco A.; Lampo, Margarita; Penaloza, Claudia L.; Kendall, William; Solé, Genaro; Rodriguez-Clark, Kathryn M.

    2015-01-01

    Long-term demographic data are valuable for assessing the effect of anthropogenic impacts on endangered species and evaluating recovery programs. Using a 2-state open robust design model, we analyzed mark-recapture data from green turtles Chelonia mydas sighted between 1979 and 2009 on Aves Island, Venezuela, a rookery heavily impacted by human activities before it was declared a wildlife refuge in 1972. Based on the encounter histories of 7689 nesting females, we estimated the abundance, annual survival, and remigration intervals for this population. Female survival varied from 0.14-0.91, with a mean of 0.79, which is low compared to survival of other populations from the Caribbean (mean = 0.84) and Australia (mean = 0.95), even though we partially corrected for tag loss, which is known to negatively bias survival estimates. This supports prior suggestions that Caribbean populations in general, and the Aves Island population in particular, may be more strongly impacted than populations elsewhere. It is likely that nesters from this rookery are extracted while foraging in remote feeding grounds where hunting still occurs. Despite its relatively low survival, the nesting population at Aves Island increased during the past 30 years from approx. 500 to >1000 nesting females in 2009. Thus, this population, like others in the Caribbean and the Atlantic, seems to be slowly recovering following protective management. Although these findings support the importance of long-term conservation programs aimed at protecting nesting grounds, they also highlight the need to extend management actions to foraging grounds where human activities may still impact green turtle populations.

  13. Data Mining Using High Performance Data Clouds: Experimental Studies Using Sector and Sphere

    OpenAIRE

    Grossman, Robert L.; Gu, Yunhong

    2008-01-01

    We describe the design and implementation of a high performance cloud that we have used to archive, analyze and mine large distributed data sets. By a cloud, we mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud provides compute services. We describe the design of the Sector storage cloud and how it provides the storage services required by the Sphere compute cloud. We also describe the programming...

  14. Cloud Robotics Model

    Directory of Open Access Journals (Sweden)

    Gyula Mester

    2015-01-01

    Full Text Available Cloud Robotics was born from the merger of service robotics and cloud technologies. It allows robots to benefit from the powerful computational, storage, and communications resources of modern data centres. Cloud robotics allows robots to take advantage of the rapid increase in data transfer rates to offload tasks without hard real time requirements. Cloud Robotics has rapidly gained momentum with initiatives by companies such as Google, Willow Garage and Gostai as well as more than a dozen active research projects around the world. The presentation summarizes the main idea, the definition, the cloud model composed of essential characteristics, service models and deployment models, planning task execution and beyond. Finally some cloud robotics projects are discussed.

  15. Search Cloud

    Science.gov (United States)

    ... this page: https://medlineplus.gov/cloud.html Search Cloud To use the sharing features on this page, ... Top 110 zoster vaccine Share the MedlinePlus search cloud with your users by embedding our search cloud ...

  16. Cloud computing

    OpenAIRE

    Kodera, Lukáš

    2014-01-01

    This thesis deals with cloud computing in Czech Republic, specifically providers of cloud services. In theoretical part there will be explained what is cloud computing, different kinds of cloud computing, virtualization necessary for cloud computing, main concerns about cloud security and also, where cloud is physically stored. In practical part author choose the best solution for company from selected cloud providers in the Czech Republic by using mathematical methods, then author compare th...

  17. Guidance Notes for Cloud Research Users

    OpenAIRE

    Bacigalupo, David; Chen, Xiaoyu; Wills, Gary; Gilbert, Lester

    2010-01-01

    There is a rapidly increasing range of research activities which involve the outsourcing of computing and storage resources to public Cloud Service Providers (CSPs), who provide managed and scalable resources virtualised as a single service. For example Amazon Elastic Computing Cloud (EC2) and Simple Storage Service (S3) are two widely adopted open cloud solutions, which aim at providing pooled computing and storage services and charge users according to their weighted resource usage. Other e...

  18. Cloud Auditing With Zero Knowledge Privacy

    Directory of Open Access Journals (Sweden)

    Shilpa Dilip Sapatnekar,

    2015-07-01

    Full Text Available The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.

  19. Cloud benchmarking for performance

    OpenAIRE

    Varghese, Blesson; Akgun, Ozgur; Miguel, Ian; Thai, Long; Barker, Adam

    2014-01-01

    How can applications be deployed on the cloud to achieve maximum performance? This question has become significant and challenging with the availability of a wide variety of Virtual Machines (VMs) with different performance capabilities in the cloud. The above question is addressed by proposing a six step benchmarking methodology in which a user provides a set of four weights that indicate how important each of the following groups: memory, processor, computation and storage are to the applic...

  20. VIRTUALIZATION IN CLOUD COMPUTING

    OpenAIRE

    LAKSHAY MALHOTRA; DEVYANI AGARWAL; ARUNIMA JAISWAL

    2014-01-01

    Cloud computing technology is one of the biggest milestones in leading us to next generation technology and booming up business and IT field. It helps to overcome the problems of data loss, accessing data whenever needed and data security. This technology is mainly service oriented and focuses on cost reduction, hardware reduction and pay just for service concept. Virtualization in cloud computing is making a virtual image of the storage devices, servers or network resources so that they can ...

  1. Cloud computing basics

    CERN Document Server

    Srinivasan, S

    2014-01-01

    Cloud Computing Basics covers the main aspects of this fast moving technology so that both practitioners and students will be able to understand cloud computing. The author highlights the key aspects of this technology that a potential user might want to investigate before deciding to adopt this service. This book explains how cloud services can be used to augment existing services such as storage, backup and recovery. Addressing the details on how cloud security works and what the users must be prepared for when they move their data to the cloud. Also this book discusses how businesses could prepare for compliance with the laws as well as industry standards such as the Payment Card Industry.

  2. Phaeohyphomycosis resulting in obstructive tracheitis in three green sea turtles Chelonia mydas stranded along the Florida coast.

    Science.gov (United States)

    Donnelly, Kyle; Waltzek, Thomas B; Wellehan, James F X; Sutton, Deanna A; Wiederhold, Nathan P; Stacy, Brian A

    2015-04-01

    Three wild immature green sea turtles Chelonia mydas were found alive but lethargic on the shores of the Indian River Lagoon and Gulf of Mexico in Florida, USA, and subsequently died. Necropsy findings in all 3 turtles included partial occlusion of the trachea by a mass comprised of granulomatous inflammation. Pigmented fungal hyphae were observed within the lesion by histology and were characterized by culture and sequencing of the internal transcribed spacer 2 domain of the rRNA gene and D1/D2 region of the fungal 28s gene. The dematiaceous fungus species Veronaea botryosa was isolated from the tracheal mass in 2 cases, and genetic sequence of V. botryosa was detected by polymerase chain reaction in all 3 cases. Genetic sequencing and fungal cultures also detected other dematiaceous fungi, including a Cladosporium sp., an Ochroconis sp., and a Cochliobolus sp. These cases are the first report of phaeohyphomycosis caused by V. botryosa in wild marine animals. PMID:25850403

  3. Cloud-Based Mobile Applications

    OpenAIRE

    Irakoze, Imelda

    2013-01-01

    The goal of this project was to use cloud computing in order to improve the computing ability of mobile devices. Processing power, storage capacity, battery lifetime, and display size present a concern for developers when creating applications for mobile devices. In addition to this, with all the different types of smartphone operating systems on the market today, a need arises for a way to create cross-platform applications and cloud computing offers a solution to that. Cloud computin...

  4. LINUX BASED CLOUD OPERATING SYSTEM

    OpenAIRE

    Ravindra Gupta; Mr. Gajendra Singh; Lokesh Patel

    2012-01-01

    Cloud computing is a type of computing in which dynamically scalable and virtualized resources are provided as a service. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the cloud that supports them. Furthermore, cloud computing employs a model for enabling available, convenient and on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, services) that can be rapidly provisi...

  5. Search Cloud

    Science.gov (United States)

    ... https://www.nlm.nih.gov/medlineplus/cloud.html Search Cloud To use the sharing features on this page, please enable JavaScript. Share the MedlinePlus search cloud with your users by embedding our search ...

  6. Cloud Database Management System (CDBMS)

    OpenAIRE

    Snehal B. Shende; Prajakta P. Chapke

    2015-01-01

    Cloud database management system is a distributed database that delivers computing as a service. It is sharing of web infrastructure for resources, software and information over a network. The cloud is used as a storage location and database can be accessed and computed from anywhere. The large number of web application makes the use of distributed storage solution in order to scale up. It enables user to outsource the resource and services to the third party server. This paper include, the r...

  7. Analysis of epibiont data in relation with the Debilitated Turtle Syndrome of sea turtles in Chelonia mydas and Lepidochelys olivacea from Concepción coast, Chile

    OpenAIRE

    Italo Fernández; Marco Antonio Retamal; Miguel Mansilla; Francisco Yáñez; Víctor Campos; Carlos Smith; Guillermo Puentes; Ariel Valenzuela; Hernán González

    2015-01-01

    Epibionts on the surface of the skin and shell of a specimen of Chelonia mydas and three Lepidochelys olivacea found floating on the coast of Concepción, Chile, between June 2010 and December 2012, were analyzed. These epibionts were analyzed during the clinical inspection and the tissue changes related to its settlement, with filamentous algae around, were observed. Subsequently, the epibionts were identified by morphological observation. The knowledge about theses epibionts in Chile is revi...

  8. A Survey on Mobile Cloud Computing with Embedded Security Considerations

    OpenAIRE

    Victor Onomza Waziri; Joshua Abah; Olumide Sunday Adewale; Muhammad Bashir Abdullahi

    2014-01-01

    The emergence of cloud computing hold a promise to computing where software is provided as a services (SaaS) via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth) of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducin...

  9. Research and Application of the Cloud Computation Storage System%云存储系统的分析与应用研究

    Institute of Scientific and Technical Information of China (English)

    唐箭

    2009-01-01

    The article first carried on to the cloud memory introduced that then introduced emphatically the cloud memory system's struc-tural model and realized key technologies, ultimate analysis cloud memory system's several kind of application pattern.%文章首先对云存储进行了介绍,然后着重介绍了云存储系统的结构模型及其实现的关键技术,最后分析了云存储系统的几种应用模式.

  10. Research on the Secure Storage Scheme of Cloud Computing Based on Encryption Mechanism%基于加密机制的云计算数据可靠存储方案研究

    Institute of Scientific and Technical Information of China (English)

    赵莉; 王魁祎

    2014-01-01

    为了克服因收发双方都使用同样钥匙导致的其安全性不高等缺点,引入深度加密机制,与AES ( Advanced Encryption Standard)算法耦合,设计了基于双级加密的云计算数据可靠存储方案。先采用AES对用户数据客户端进行对称加密,到达云资源管理器后,采用分布式重组的方法进行深度加密,构造了“初级-深度”双级加密的云计算数据可靠存储结构,并完成了基于加密的云计算数据安全存储加密和解密操作流程。借助Eclipse与Java语言,建立了云计算安全模块。结果表明:该系统的加密效率高,拥有较高的安全性且界面操作简单。%In order to overcome the defects such as low security resulting by both using the same key for sending and receiving, the depth encryption mechanism was introduced, and taking it coupling the AES algorithm to propose the secure storage system of cloud computation based on the encryption mechanism. Basing on the analysis of previous research on the security of cloud storage, the symmetric encryption for the user data was used in the client, when the data reached the cloud resource management device, the method of distributed restructuring was used to operate depth encryption;and the security storage structure of “initial encryption-depth encryption” was constructed; and then the encryption and decryption process of data safety storage was finished. Based on the eclipse simulation platform, the de-sign and implementation were done for the cloud computing security module. The results showed that the encryption ef-ficiency and security of this system was high and simple interface.

  11. 一种基于蚁群算法的云存储副本动态选择机制研究%Pheromone-based ant colony replica selection mechanism in cloud storage

    Institute of Scientific and Technical Information of China (English)

    左方; 何欣

    2015-01-01

    This paper designed and analyzed a feasible,distributed,ant colony optimization algorithm based replica selection method on big data transferring in cloud storage,which was called pheromone-based ant colony replica selection algorithm in cloud storage (PARSA).PARSA provided a new,promising direction in cloud storage.This algorithm was different from the previously studied researches in three ways to make it more accurately reflective of cloud environment.It inclined multifactors to affect the efficiency of data accessing and processing in cloud,considered such as bandwidth,file accessing time and average delay as pheromones in PARSA.PARSA avoided a large-scale flat flooding and supports multi-attribute range query,which were accompanied by unstructured or structured P2P replica selection methods.Lastly,simulation results from cloud test bed based on OpenStack show that,compared by Round Robin and Server Load,PARSA can reduce data access latency and band-width consumption,and effectively achieve cloud load balancing between storage nodes and improve the speed of data access.%针对云存储技术中副本选择优化问题,提出一种基于蚁群原理的云存储副本动态选择算法。构建基于蚁群的副本动态选择模型,建立副本选择度量标准(如带宽占用、网络路径时延和平均访问时间等)与蚁群信息素的映射,并对虚拟机实例负载状况和虚拟机集群资源利用状况进行量化评估,感知所监控的云节点的资源度量情况;最后利用副本信息素概率计算式得到一组选择副本资源的最优解,最终达到优化负载均衡的目的。经OpenStack 模式的云平台对新算法仿真实现,实验结果表明新算法成功实现了副本的有效分发和虚拟机集群的负载均衡,与 Round Robin 和 Server Load 算法相比,新算法有更好的负载均衡效果。

  12. Networking for the cloud: challenges and trends

    NARCIS (Netherlands)

    Drago, I.; O. Schmidt, de R.; Hofstede, R.; Sperotto, A.; Karimzadeh, M.; Haverkort, B.R.; Pras, A.; Spaniol, O.

    2013-01-01

    Cloud services have changed the way computing power is delivered to customers, by offering computing and storage capacity in remote data centers on demand over the Internet. The success of the cloud model, however, has not come without challenges. Cloud providers have repeatedly been related to repo

  13. AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

    Directory of Open Access Journals (Sweden)

    Dr. L. Arockiam

    2015-02-01

    Full Text Available Cloud dominates the IT enterprises by way of its computing services. One of the services provided by the cloud is data storage. Cloud storage mainly supports Small and Medium scale Enterprises (SMEs by reducing their capital investments and maintenance of storage servers. Most of the SMEs are outsourcing their data to cloud storage. Enterprises’ data that are forwarded to the cloud have to be kept in the public cloud storage. Safety and security are the top most issues in cloud storage. The confidentiality parameter provides data storage security. This paper proposes a security service algorithm named AROcrypt to ensure the security of data stored in cloud storage. It also describes Security as a Service (SEaaS in the cloud environment. Simulation was conducted using a security analysis tool with existing techniques. The proposed technique provides better performance and good security when compared with existing techniques.

  14. Cloud Aggregation and Bursting for Object Based Sharable Environment

    Directory of Open Access Journals (Sweden)

    Mr. Pradeep Kumar Tripathi

    2011-09-01

    Full Text Available Cloud computing promises innate scalability and high availability at low cost. So far cloud storage deployments were subject to big companies but an increasing amount of available open-source systems allow also smaller private cloud installations. In this paper we discuss cloud aggregation and cloud bursting with their empirical review. Based on the review we map class and object in the sharable small clouds for making clouds more efficient. We also consider some of the security concern for the cloud computing for authorized data sharing between clouds.

  15. INTRASPECIFIC VARIATION OF THE GREEN TURTLE, Chelonia mydas (CHELONIIDAE, IN THE FORAGING AREA OF GORGONA NATURAL NATIONAL PARK (COLOMBIAN PACIFIC

    Directory of Open Access Journals (Sweden)

    Laura Sampson

    2014-06-01

    Full Text Available The size distribution and body condition of the two morphotypes of green turtle (Chelonia mydas foraging in Gorgona Natural National Park (GNNP in the Colombian Pacific was assessed from 2003 to 2012. Measurements of straight carapace length (SCL, curved carapace length (CCL, weight, and body condition of 1,023 turtles captured on the GNNP reefs were recorded. More black turtles (n = 747 than yellow turtles (n = 276 were captured, all of them juveniles. Black turtles were significantly larger and heavier than yellow turtles. The size of recruitment to the neritic zone was 40.0-49.9 cm SCL for both morphotypes, but there were more yellow than black turtles in this size class, indicating a difference in the recruitment pattern. The body condition index of yellow turtles was significantly higher than that of black turtles, which could indicate differences in resource use. Based on our results, we suggest that GNNP might function as a recruitment area for yellow turtles, which arrive at smaller sizes and as part of a coastal migratory route for black turtles, which arrive at larger sizes and maintain residence at this location for an unknown period of time.Variación intraespecífica de la tortuga verde Chelonia mydas (Cheloniidae en el área de forrajeo del Parque Nacional Natural Gorgona (Pacífico colombianoSe comparó la distribución de tallas y condición corporal de los dos morfotipos conocidos de tortuga verde (Chelonia mydas en el área de forrajeo del Parque Nacional Natural Gorgona (PNNG en el Pacífico colombiano entre 2003 y 2012. Se tomaron medidas de largo recto de caparazón (LRC, largo curvo de caparazón (LCC, peso y condición corporal de 1.023 tortugas capturadas en los arrecifes del PNG. Se capturaron más tortugas negras (n = 747 que amarillas (n = 276, todas juveniles. Las tortugas negras fueron significativamente más grandes y pesadas que las amarillas. El tamaño de reclutamiento a la zona nerítica fue de 40,0–49,9 cm

  16. Storage System Design Scheme in Virtualization Construction

    Institute of Scientific and Technical Information of China (English)

    Si Zhen-yu

    2012-01-01

    In order to improve resource utilization, it is necessary to integrate storage and data, and the emergence of cloud computing makes it possible. This paper analyzed the study of virtualization and cloud computing, proposed a new scheme based on virtualization, and established a shared storage platform, which made a good complement and perfected the centralized storage platform.

  17. Implement Security using smart card on Cloud

    Directory of Open Access Journals (Sweden)

    Amish Kumar Aman

    2013-04-01

    Full Text Available Cloud is a concept of accessing the data from theirown datacenters such that the chances ofeavesdropping have been reduced and storage costis reduced. Here in this paper we are giving a briefsurvey of various cloud based techniqueimplemented so far. Although there are varioustechniques implemented so far for the cloudcomputing but here we are giving a survey of notonly cloud based techniques but also the concept ofsmart cards for the authentication between onecloud to another cloud.

  18. GEMBus as a service oriented platform for cloud-based composable services

    NARCIS (Netherlands)

    M. Grammatikou; C. Marinos; Y. Demchenko; D.R. Lopez; K. Dombek; J. Jofre

    2011-01-01

    Cloud computing has become a common technology for provisioning infrastructure services on-demand. Modern Cloud platforms can provide cloud-based applications, software, deployment platforms, or general infrastructure services that may include both computational and storage resources. However existi

  19. NeuronDepot: Keeping your colleagues in sync by combining modern cloud storage services, the local file system, and simple web applications

    Directory of Open Access Journals (Sweden)

    Philipp L Rautenberg

    2014-06-01

    Full Text Available Neuroscience today deals with a data deluge derived from the availability of high-throughput sensors of brain structure and brain activity, and increased computational resources for detailed simulations with complex output. We report here (1 a novel approach to data sharing between collaborating scientists that brings together file system tools and cloud technologies, (2 a service implementing this approach, called NeuronDepot, and (3 an example application of the service to a complex use case in the neurosciences. The main drivers for our approach are to facilitate collaborations with a transparent, automated data flow that shields scientists from having to learn new tools or data structuring paradigms. Using NeuronDepot is simple: one-time data assignment from the originator and cloud based syncing – thus making experimental and modeling data available across the collaboration with minimum overhead. Since data sharing is cloud based, our approach opens up the possibility of using new software developments and hardware scalabitliy which are associated with elastic cloud computing. We provide an implementation that relies on existing synchronization services and is usable from all devices via a reactive web interface. We are motivating our solution by solving the practical problems of the GinJang project, a collaboration of three universities across eight time zones with a complex workflow encompassing data from electrophysiological recordings, imaging, morphological reconstructions, and simulations.

  20. Detecting patterns of fertilization and frequency of multiple paternity in Chelonia mydas of Colola (Michoacán, Mexico Detección de patrones de fertilización y frecuencia de paternidad múltiple en Chelonia mydas de Colola (Michoacán, México

    Directory of Open Access Journals (Sweden)

    Libny Ingrid Lara-De La Cruz

    2010-04-01

    Full Text Available We present a microsatellite analysis that allows an indirect determination of the process of fertilization in the genital tract of Chelonia mydas. The strategy was based in that the order of oviposition is related to fertilization order. Once the genotype of the offspring was obtained through microsatellite analyses, it was possible to determine the frequency of multiple paternity and to infer the presence of anatomical structures or physiological mechanisms that allow females to undergo cryptic choice processes, which allowed us to hypothesize the existence of post-copula factors that determine reproductive success in a polyandrous system. This paper does not show the presence of physiological mechanisms that allow control of fertilization order in polyandrous females of Chelonia mydas.Presentamos un análisis con microsatélites para determinar de manera indirecta si existe un mecanismo de control del proceso de fertilización en el tracto genital de Chelonia mydas. La estrategia utilizada se basa en que el orden de oviposición está relacionado con el orden de fertilización. Determinando el genotipo de la progenie, fue posible determinar la frecuencia de paternidad múltiple e inferir la presencia de estructurasanatómicas o mecanismos fisiológicos, que actúen como factores post-copulatorios para regular los eventos reproductivos en un sistema poliándrico. El presente trabajo no muestra la presencia de mecanismos fisiológicos que permitan el control del orden de fertilización en hembras poliándricas de Chelonia mydas.

  1. Winter diets of immature green turtles (Chelonia mydas) on a northern feeding ground: integrating stomach contents and stable isotope analyses

    Science.gov (United States)

    Williams, Natalie C.; Bjorndal, Karen A.; Lamont, Margaret M.; Carthy, Raymond R.

    2015-01-01

    The foraging ecology and diet of the green turtle, Chelonia mydas, remain understudied, particularly in peripheral areas of its distribution. We assessed the diet of an aggregation of juvenile green turtles at the northern edge of its range during winter months using two approaches. Stomach content analyses provide a single time sample, and stable isotope analyses integrate diet over a several-month period. We evaluated diet consistency in prey choice over time by comparing the results of these two approaches. We examined stomach contents from 43 juvenile green turtles that died during cold stunning events in St. Joseph Bay, Florida, in 2008 and 2011. Stomach contents were evaluated for volume, dry mass, percent frequency of occurrence, and index of relative importance of individual diet items. Juvenile green turtles were omnivorous, feeding primarily on seagrasses and tunicates. Diet characterizations from stomach contents differed from those based on stable isotope analyses, indicating the turtles are not feeding consistently during winter months. Evaluation of diets during warm months is needed.

  2. Individual variation in feeding habitat use by adult female green sea turtles (Chelonia mydas): are they obligately neritic herbivores?

    Science.gov (United States)

    Hatase, Hideo; Sato, Katsufumi; Yamaguchi, Manami; Takahashi, Kotaro; Tsukamoto, Katsumi

    2006-08-01

    Satellite telemetry and stable isotope analysis were used to confirm that oceanic areas (where water depths are >200 m) are alternative feeding habitats for adult female green sea turtles (Chelonia mydas), which have been thought to be obligate herbivores in neritic areas (where depths are 20 m, implying that they not only rested, but also foraged on macroplankton that exhibit diel vertical migration. Comparisons of stable carbon and nitrogen isotope ratios between 89 females and the prey items in a three-source mixing model estimated that 69% of the females nesting on Ogasawara Islands mainly used neritic habitats and 31% mainly used oceanic habitats. Out of four females tracked by satellite, two females were inferred from isotope ratios to be neritic herbivores and the two others oceanic planktivores. Although post-nesting movements for four females were not completely consistent with the inferences from isotope ratios, possibly due to short tracking periods (28-42 days), their diving behaviors were consistent with the inferences. There were no relationships between body size and the two isotope ratios, indicating a lack of size-related differences in feeding habitat use by adult female green turtles, which was in contrast with loggerhead sea turtles (Caretta caretta). These results and previous findings suggest that ontogenetic habitat shifts by sea turtles are facultative, and consequently, their life histories are polymorphic. PMID:16683139

  3. Stable isotopes in barnacles as a tool to understand green sea turtle (Chelonia mydas) regional movement patterns

    Science.gov (United States)

    Detjen, M.; Sterling, E.; Gómez, A.

    2015-12-01

    Sea turtles are migratory animals that travel long distances between their feeding and breeding grounds. Traditional methods for researching sea turtle migratory behavior have important disadvantages, and the development of alternatives would enhance our ability to monitor and manage these globally endangered species. Here we report on the isotope signatures in green sea-turtle (Chelonia mydas) barnacles (Platylepas sp.) and discuss their potential relevance as tools with which to study green sea turtle migration and habitat use patterns. We analyzed oxygen (δ18O) and carbon (δ13C) isotope ratios in barnacle calcite layers from specimens collected from green turtles captured at the Palmyra Atoll National Wildlife Refuge (PANWR) in the central Pacific. Carbon isotopes were not informative in this study. However, the oxygen isotope results suggest likely regional movement patterns when mapped onto a predictive oxygen isotope map of the Pacific. Barnacle proxies could therefore complement other methods in understanding regional movement patterns, informing more effective conservation policy that takes into account connectivity between populations.

  4. Public Auditing and Data Dynamics in Cloud with Performance Assessment on Third Party Auditor

    DEFF Research Database (Denmark)

    P. Sawant, Snehal; Deshmukh, Aaradhana A.; Mihovska, Albena Dimitrova;

    2016-01-01

    Cloud computing allows the user to outsource their computation and storage overhead to a public cloud, managed by cloud service providers. Data stored in the cloud may reside on remotely servers and this raises security issues. This paper addresses the issue of data storage integrity. The scheme...

  5. Exploiting Virtualization and Cloud Computing in ATLAS

    International Nuclear Information System (INIS)

    The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R and D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.

  6. Cloud Governance

    DEFF Research Database (Denmark)

    Berthing, Hans Henrik

    Denne præsentation beskriver fordele og værdier ved anvendelse af Cloud Computing. Endvidere inddrager resultater fra en række internationale analyser fra ISACA om Cloud Computing.......Denne præsentation beskriver fordele og værdier ved anvendelse af Cloud Computing. Endvidere inddrager resultater fra en række internationale analyser fra ISACA om Cloud Computing....

  7. Partitioning an Open Source Database in the Cloud

    OpenAIRE

    Østvold, Even

    2014-01-01

    Cloud computing has become a part of how web applications are being developed. Theeasy access to virtually endless supply of servers that the cloud provides has brought manybenefits, but at the precondition that the application is able to utilize its distributed nature.Data storage is an integral part of most applications and most cloud providers offers servicesto facilitate storage. Some users of the cloud may however decide to use a databasesolution of their own choice.In this thesis we wil...

  8. Anidación de la tortuga verde (Chelonia mydas) y caracterización de las playas en Cayo Largo, Cuba

    OpenAIRE

    Medina Cruz, Y.; Moncada Gavilán, F.; Nodarse Andreu, G.; Blanco López, R.

    2009-01-01

    Quantitative and qualitative relation between beach characteristic and number of observed nests of Green turtle Chelonia mydas at Cayo Largo is shown. The nest quantification was carried out by patrolling and direct count in reproduction season for this species (June-September) in period 2002-2006. A total of 7 beaches were identified with sands strips between 5 and 50 m of wide and between 70 and 4 060 m of length. Annual nesting between 1 114 and 1 866 nests was registered. Maxi...

  9. Ingestion of solid wastes by juvenile green turtles, Chelonia mydas (L. 1758), in the eastern Rio de Janeiro state coast, Brazil

    OpenAIRE

    Danielle Rodrigues Awabdi; Salvatore Siciliano; Ana Paula Madeira Di Beneditto

    2013-01-01

    This paper analyzed the solid wastes of anthropogenic origin obtained from the stomach contents of juvenile green turtles, Chelonia mydas, on the eastern Rio de Janeiro state coast, southeastern Brazil (22º50’S – 23º00’S). Between June 2009 and May 2010, the stomach contents of 49 specimens stranded on beaches were analyzed. Solid wastes were recorded in 29 stomach contents (59.2%) and more than one category of wastes was found out in 22 samples. Plastic bags, categorized as flexible plastic ...

  10. Integration of cloud services with Invenio digital library

    OpenAIRE

    Kraljević, Željko; Kunčar, Jiří

    2013-01-01

    Project Specification: Connect Invenio digital library with popular cloud storage services such as Google Drive, Dropbox and Sky Drive. Abstract: Cloudutils is a standalone python module which provides an interface to popular cloud storage services (e.g. Google Drive, Skydrive…). It is built on top of the PyFilesystem module. In this project Cloudutils module was developed and used to connect Invenio digital library and popular cloud storage services.

  11. Cloud optics

    CERN Document Server

    Kokhanovsky, A

    2006-01-01

    Clouds affect the climate of the Earth, and they are an important factor in the weather. Therefore, their radiative properties must be understood in great detail. This book summarizes current knowledge on cloud optical properties, for example their ability to absorb, transmit, and reflect light, which depends on the clouds' geometrical and microphysical characteristics such as sizes of droplets and crystals, their shapes, and structures. In addition, problems related to the image transfer through clouds and cloud remote sensing are addressed in this book in great detail. This book can be an im

  12. Cloud ERP and Cloud Accounting Software in Romania

    Directory of Open Access Journals (Sweden)

    Gianina MIHAI

    2015-05-01

    Full Text Available Nowadays, Cloud Computing becomes a more and more fashionable concept in the IT environment. There is no unanimous opinion on the definition of this concept, as it covers several versions of the newly emerged stage in the IT. But in fact, Cloud Computing should not suggest anything else than simplicity. Thus, in short, simple terms, Cloud Computing can be defined as a solution to use external IT resources (servers, storage media, applications and services, via Internet. Cloud computing is nothing more than the promise of an easy accessible technology. If the promise will eventually turn into something certain yet remains to be seen. In our opinion it is too early to make an assertion. In this article, our purpose is to find out what is the Romanian offer of ERP and Accounting software applications in Cloud and / or as services in SaaS version. Thus, we conducted an extensive study whose results we’ll present in the following.

  13. Direct User Data Authentication in Cloud

    Directory of Open Access Journals (Sweden)

    P. N. karthikayan

    2012-09-01

    Full Text Available Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data storage and maintenance, it also eliminates their physical control of storage dependability and security, which traditionally has been expected by both enterprises and individuals with high service-level requirements. In order to facilitate rapid deployment of cloud data storage service and regain security assurances with outsourced data dependability, efficient methods that enable ondemand data correctness verification on behalf of cloud data owners have to be designed. In this article we propose that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established. With public audit ability, a trusted entity with expertise and capabilities data owners do not possess can be delegated as an external audit party to assess the risk of outsourced data when needed. Such an auditing service not only helps save data owners computation resources but also provides a transparent yet cost-effective method for data owners to gain trust in the cloud. We describe approaches and system requirements that should be brought into consideration, and outline challenges that need to be resolved for such a publicly auditable secure cloud storage service to become a reality.

  14. Cloud Computing with Open Source Tool :OpenStack

    OpenAIRE

    Dr. Urmila R. Pol

    2014-01-01

    OpenStack is a especially scalable open source cloud operating system that is a global alliance of developers and cloud computing technologists producing the ubiquitous open source cloud computing platform for public and private clouds. OpenStack provides series of interrelated projects delivering various components for a cloud infrastructure solution as well as controls large pools of storage, compute and networking resources throughout a datacenter that all managed through a Dashboard(Horiz...

  15. Is cloud computing finally beginning to mature?

    Directory of Open Access Journals (Sweden)

    Dimitrios Zissis

    2012-10-01

    Full Text Available The buzz term that came into popularity in the beginning of 2006 to describe an innovative IT deployment architecture, originated from the cloud metaphor that was used to represent the Internet in various network diagrams as early as the 1990s. In a short period of time after the term appeared, cloud solutions were being rapidly marketed by many IT companies and various new buzz words came into vogue such as "cloud in a can", "cloud bursting", and we suddenly had “blue clouds”, “green clouds”, “white label cloud services” and many others. We witnessed what is now being labeled as "cloud washing", the attempts of many vendors to strap the cloud term onto their traditional products, which became the source of huge disambiguation, conflicts and misunderstandings. Today, the term “cloud computing” is everywhere. A quick search on Google for the term “cloud computing” will return 267 million search results. Cloud computing is being marketed as the complex-free efficient method of accessing huge amounts of computing and storage as a service. Behind the curtains though, cloud computing has often been called a huge leap of faith and concerns were fuelled when reports started to surface of random failures (e.g. power outages and shortcomings of cloud infrastructures. Small black clouds of uncertainty have appeared in the otherwise clear skies of cloud computing

  16. 一种基于海量信息处理的云存储模型研究%A Kind of Cloud Storage Model Research Based on Massive Information Processing

    Institute of Scientific and Technical Information of China (English)

    张桂刚; 李超; 张勇; 邢春晓

    2012-01-01

    提出了一种云环境下海量数据组织与资源共享的存储总模型,该模型包括:结构化、半结构化及其非结构化数据与资源的对应存储方法;能兼顾海量大小数据文件处理的分布式文件系统THDFS;云数据库系统设计模型THCloudDB;云环境下强于MapReduce弱于SQL,以Hadoop++为基础的一种针对互联网海量数据文件处理且具有语义计算效能的计算模型THMapReduce;针对THDFS及其THCloudDB的具有语义效能的智能挖掘分析工具THBI;最后以“清华通”为案例分析了该模型平台的具体应用.%This paper presents a kind of cloud storage model based on massive information processing. The model includes: 1)storage methods of structured, semi-structured and unstructured data and the corresponding resources; 2) THDFS (Tsing Hua Distributed File System) which will take into account all size of the massive data files(big files and small files); 3) a cloud database system design model THCloudDB (Tsing Hua Cloud Database); 4) a internet-base massive data processing computation model THMapReduce (Tsing Hua MapReduce) computation model based on hadoopH-h which is stronger than MapReduce and weaker than SQL, especially it have merged into the semantic computing technology; 5)a intelligent mining tool THBI (Tsing Hua Business Intelligent) based on the THDFS and THCloudDB, and it have the semantic functions. Finally, paperend takes "Tsinghua Tong" as a case and make some analysis about the model's applications.

  17. PSO应用于QoS偏好感知的云存储任务调度%Apply PSO into cloud storage task scheduling with QoS preference awareness

    Institute of Scientific and Technical Information of China (English)

    王娟; 李飞; 张路桥

    2014-01-01

    研究有QoS偏好要求的云存储任务调度。首先,分析云存储与云计算的差异,用存在矩阵避免无效解的产生。其次,归纳云存储的QoS需求为时间、代价与质量3大类,并据此修改PSO算法的适应度函数用权重因子调节QoS偏好。实验发现,在不同优先级任务分布不均的情况下,分布广的任务的偏好会掩盖其他任务的偏好,因而不适宜用PSO进行整体性调度,而必须进行分级调度。实验证明,改进后的分级PSO算法对QoS偏好具有较好的感知能力。%The task scheduling algorithm in cloud storage area with QoS preference awareness was studied. Firstly, the differences between cloud storage and cloud computing were pointed, and exist matrix was used to avoid the creation of useless solutions. Secondly, QoS factors were summarized into three classes:time, cost and quality classes. Based on the three classes, the fitness function of the PSO was improved by using weighted factors to adjust the QoS preference. The simulation results release that PSO is not fit for the overall scheduling when the task distributions of different degrees are unevenness because the QoS demand of wide distribution tasks may cover the QoS demand of other tasks. So a hierar-chical scheduling based on degree is necessary. The simulation results show that the improved hierarchical PSO schedul-ing algorithm can aware the QoS preference relevantly.

  18. Securing Data Transfer in Cloud Environment

    Directory of Open Access Journals (Sweden)

    K. S. Wagh

    2014-05-01

    Full Text Available Data security and access control is one of the most challenging ongoing research work in cloud computing, due to users outsourcing their sensitive data to cloud providers. The various existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. Cloud storage moves the user’s data to large data centers, that are remotely located, on which user does not have any control. This unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved.

  19. High energy physics and cloud computing

    International Nuclear Information System (INIS)

    High Energy Physics (HEP) has been a strong promoter of computing technology, for example WWW (World Wide Web) and the grid computing. In the new era of cloud computing, HEP has still a strong demand, and major international high energy physics laboratories have launched a number of projects to research on cloud computing technologies and applications. It describes the current developments in cloud computing and its applications in high energy physics. Some ongoing projects in the institutes of high energy physics, Chinese Academy of Sciences, including cloud storage, virtual computing clusters, and BESⅢ elastic cloud, are also described briefly in the paper. (authors)

  20. LINUX BASED CLOUD OPERATING SYSTEM

    Directory of Open Access Journals (Sweden)

    Ravindra Gupta

    2012-02-01

    Full Text Available Cloud computing is a type of computing in which dynamically scalable and virtualized resources are provided as a service. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the cloud that supports them. Furthermore, cloud computing employs a model for enabling available, convenient and on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, services that can be rapidly provisioned and released with minimal management effort or service provider interaction. The services mainly operating systems running on a single virtualized computing environment, middleware layers that attempt to combine physical and virtualized resources from multiple operating systems, and specialized application engines. In this paper, we discuss about the virtual distributed operating system, Cloud Operating System, to provide maximum features of cloud computing. The Cloud Operating System will work on the principle laid out by LINUX. The Cloud OS aims to provide simple programming abstractions to available cloud resources, strong isolation techniques between Cloud processes, and strong integration with network resources.

  1. Information Leakage Prevention In Cloud Computing

    Directory of Open Access Journals (Sweden)

    Raziqa Masood

    2014-11-01

    Full Text Available The cloud computing is still in it infancy.this is an emerging technology which will bring about innovations in terms of businessmodels and applications.the widespread penetration of smartphones will be a major factor in driving the adoption of cloude computing.however, cloud computing faces challenges related to privacy and security. Due to varied degree of security features and management schemes within the cloud entities security in the cloud is challenging. Security issues ranging from system misconfiguration, lack of proper updates, or unwise user behaviour from remote data storage that can expose user ̳s private data and information to unwanted access can plague a Cloud Computing. The intent of this paper is to investigate the security related issues and challenges in Cloud computing environment . We also proposed a security scheme for protecting services keeping in view the issues and challenges faced by cloud computing.

  2. Multinational tagging efforts illustrate regional scale of distribution and threats for east pacific green turtles (Chelonia mydas agassizii.

    Directory of Open Access Journals (Sweden)

    Catherine E Hart

    Full Text Available To further describe movement patterns and distribution of East Pacific green turtles (Chelonia mydas agassizii and to determine threat levels for this species within the Eastern Pacific. In order to do this we combined published data from existing flipper tagging and early satellite tracking studies with data from an additional 12 satellite tracked green turtles (1996-2006. Three of these were tracked from their foraging grounds in the Gulf of California along the east coast of the Baja California peninsula to their breeding grounds in Michoacán (1337-2928 km. In addition, three post-nesting females were satellite tracked from Colola beach, Michoacán to their foraging grounds in southern Mexico and Central America (941.3-3020 km. A further six turtles were tracked in the Gulf of California within their foraging grounds giving insights into the scale of ranging behaviour. Turtles undertaking long-distance migrations showed a tendency to follow the coastline. Turtles tracked within foraging grounds showed that foraging individuals typically ranged up to 691.6 km (maximum from release site location. Additionally, we carried out threat analysis (using the cumulative global human impact in the Eastern Pacific clustering pre-existing satellite tracking studies from Galapagos, Costa Rica, and data obtained from this study; this indicated that turtles foraging and nesting in Central American waters are subject to the highest anthropogenic impact. Considering that turtles from all three rookeries were found to migrate towards Central America, it is highly important to implement conservation plans in Central American coastal areas to ensure the survival of the remaining green turtles in the Eastern Pacific. Finally, by combining satellite tracking data from this and previous studies, and data of tag returns we created the best available distributional patterns for this particular sea turtle species, which emphasized that conservation measures in key

  3. Multinational tagging efforts illustrate regional scale of distribution and threats for east pacific green turtles (Chelonia mydas agassizii).

    Science.gov (United States)

    Hart, Catherine E; Blanco, Gabriela S; Coyne, Michael S; Delgado-Trejo, Carlos; Godley, Brendan J; Jones, T Todd; Resendiz, Antonio; Seminoff, Jeffrey A; Witt, Matthew J; Nichols, Wallace J

    2015-01-01

    To further describe movement patterns and distribution of East Pacific green turtles (Chelonia mydas agassizii) and to determine threat levels for this species within the Eastern Pacific. In order to do this we combined published data from existing flipper tagging and early satellite tracking studies with data from an additional 12 satellite tracked green turtles (1996-2006). Three of these were tracked from their foraging grounds in the Gulf of California along the east coast of the Baja California peninsula to their breeding grounds in Michoacán (1337-2928 km). In addition, three post-nesting females were satellite tracked from Colola beach, Michoacán to their foraging grounds in southern Mexico and Central America (941.3-3020 km). A further six turtles were tracked in the Gulf of California within their foraging grounds giving insights into the scale of ranging behaviour. Turtles undertaking long-distance migrations showed a tendency to follow the coastline. Turtles tracked within foraging grounds showed that foraging individuals typically ranged up to 691.6 km (maximum) from release site location. Additionally, we carried out threat analysis (using the cumulative global human impact in the Eastern Pacific) clustering pre-existing satellite tracking studies from Galapagos, Costa Rica, and data obtained from this study; this indicated that turtles foraging and nesting in Central American waters are subject to the highest anthropogenic impact. Considering that turtles from all three rookeries were found to migrate towards Central America, it is highly important to implement conservation plans in Central American coastal areas to ensure the survival of the remaining green turtles in the Eastern Pacific. Finally, by combining satellite tracking data from this and previous studies, and data of tag returns we created the best available distributional patterns for this particular sea turtle species, which emphasized that conservation measures in key areas may have

  4. EFFECTS OF "SWIM WITH THE TURTLES" TOURIST ATTRACTIONS ON GREEN SEA TURTLE (CHELONIA MYDAS) HEALTH IN BARBADOS, WEST INDIES.

    Science.gov (United States)

    Stewart, Kimberly; Norton, Terry; Mohammed, Hamish; Browne, Darren; Clements, Kathleen; Thomas, Kirsten; Yaw, Taylor; Horrocks, Julia

    2016-04-01

    Along the West Coast of Barbados a unique relationship has developed between endangered green sea turtles (Chelonia mydas) and humans. Fishermen began inadvertently provisioning these foraging turtles with fish offal discarded from their boats. Although initially an indirect supplementation, this activity became a popular attraction for visitors. Subsequently, demand for this activity increased, and direct supplementation or provisioning with food began. Food items offered included raw whole fish (typically a mixture of false herring [Harengula clupeola] and pilchard [Harengula humeralis]), filleted fish, and lesser amounts of processed food such as hot dogs, chicken, bread, or various other leftovers. Alterations in behavior and growth rates as a result of the provisioning have been documented in this population. The purpose of this study was to determine how tourism-based human interactions are affecting the overall health of this foraging population and to determine what potential health risks these interactions may create for sea turtles. Juvenile green sea turtles (n=29) were captured from four sites off the coast of Barbados, West Indies, and categorized into a group that received supplemental feeding as part of a tour (n=11) or an unsupplemented group (n=18) that consisted of individuals that were captured at sites that did not provide supplemental feeding. Following capture, a general health assessment of each animal was conducted. This included weight and morphometric measurements, a systematic physical examination, determination of body condition score and body condition index, epibiota assessment and quantification, and clinical pathology including hematologic and biochemical testing and nutritional assessments. The supplemented group was found to have changes to body condition, vitamin, mineral, hematologic, and biochemical values. Based on these results, recommendations were made to decrease negative behaviors and health impacts for turtles as a result

  5. Artisanal Green Turtle, Chelonia mydas, fishery of Caribbean Nicaragua: I. Catch rates and trends, 1991-2011.

    Directory of Open Access Journals (Sweden)

    Cynthia J Lagueux

    Full Text Available This is the first assessment of catch rates for the legal, artisanal green turtle, Chelonia mydas, fishery in Caribbean Nicaragua. Data were collected by community members, monitoring up to 14 landing sites from 1991 to 2011. We examined take levels, and temporal and spatial variability in catch rates for the overall fishery, by region, and community using General Additive Mixed Models (GAMMs. More than 171,556 green turtles were killed during the period, with a mean estimated minimum 8,169±2,182 annually. There was a statistically significant decline in catch rates overall. Catch rates peaked in 1997 and 2002, followed by a downward trend, particularly from mid-2008 to the end of the study period. Similar downward trends were evident in both study regions. Community specific catch rate trends also indicated declines with decreases ranging from 21% to 90%. Decrease in catch rates in Nicaragua is cause for concern even though the principal source rookery at Tortuguero, Costa Rica, shows an increase in nesting activity. Explanations for the apparent discrepancy between the increasing trend at Tortuguero and decreasing catch rate trends in Nicaragua include: i an increase in reproductive output, ii insufficient time has passed to observe the impact of the fishery on the rookery due to a time lag, iii changes in other segments of the population have not been detected since only nesting activity is monitored, iv the expansive northern Nicaragua foraging ground may provide a refuge for a sufficient portion of the Tortuguero rookery, and/or v a larger than expected contribution of non-Tortuguero rookeries occurring in Nicaragua turtle fishing areas. Our results highlight the need for close monitoring of rookeries and in-water aggregations in the Caribbean. Where consumptive use still occurs, nations sharing this resource should implement scientifically based limits on exploitation to ensure sustainability and mitigate impacts to regional population

  6. Increasing Security in Cloud Environment

    OpenAIRE

    Naik, Priyanka; Sanyal, Sugata

    2013-01-01

    The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at a very low cost. But with this new system comes the major concern of security, as the connection to the cloud is through the web and the data and application availability need to be handled for each cl...

  7. Mobile Cloud Computing and Applications

    Institute of Scientific and Technical Information of China (English)

    Chengzhong Xu

    2011-01-01

    @@ In 2010, cloud computing gained momentum.Cloud computing is a model for real-time, on-demand, pay-for-use network access to a shared pool of configurable computing and storage resources.It has matured from a promising business concept to a working reality in both the private and public IT sectors.The U.S.government, for example, has requested all its agencies to evaluate cloud computing alternatives as part of their budget submissions for new IT investment.

  8. Trusted Cloud for Data Sharing

    Directory of Open Access Journals (Sweden)

    Vishal V.Bhanawase*1

    2014-04-01

    Full Text Available Cloud computing is a general term for anything that involves delivering hosted services over the internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS, Platform-as-a Service (PaaS and Software-as-a-Service (SaaS. A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; it is elastic - a user can have as much or as little of a service as they want at any given time and the service is fully managed by the cloud service provider (the consumer needs nothing but a personal computer and Internet access.The advantage of cloud is cost savings. The prime disadvantage is security. Cloud computing is used by many software industries nowadays. Since the data placed in the cloud is accessible to everyone, security is not guaranteed. Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus it makes security problems. All types of users who require the secure transmission or storage of data in any kind of media or network. By this new technology, users also start worrying about losing control of their own data. The data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. Such fears are becoming a significant barrier to the wide adoption of cloud services. To allay users’ concerns, it is essential to provide an effective mechanism for users to monitor the usage of their data in the cloud. For example, users need to be able to ensure that their data are handled according to the service level agreements made at the time they sign on for services in the cloud.

  9. Cloud Computing

    CERN Document Server

    Antonopoulos, Nick

    2010-01-01

    Cloud computing has recently emerged as a subject of substantial industrial and academic interest, though its meaning and scope is hotly debated. For some researchers, clouds are a natural evolution towards the full commercialisation of grid systems, while others dismiss the term as a mere re-branding of existing pay-per-use technologies. From either perspective, 'cloud' is now the label of choice for accountable pay-per-use access to third party applications and computational resources on a massive scale. Clouds support patterns of less predictable resource use for applications and services a

  10. Cloud Computing

    OpenAIRE

    Mirashe, Shivaji P.; Kalyankar, N. V.

    2010-01-01

    Computing as you know it is about to change, your applications and documents are going to move from the desktop into the cloud. I'm talking about cloud computing, where applications and files are hosted on a "cloud" consisting of thousands of computers and servers, all linked together and accessible via the Internet. With cloud computing, everything you do is now web based instead of being desktop based. You can access all your programs and documents from any computer that's connected to the ...

  11. Managing Clouds in Cloud Platforms

    CERN Document Server

    Ahmat, Kamal A

    2010-01-01

    Managing cloud services is a fundamental challenge in todays virtualized environments. These challenges equally face both providers and consumers of cloud services. The issue becomes even more challenging in virtualized environments that support mobile clouds. Cloud computing platforms such as Amazon EC2 provide customers with flexible, on demand resources at low cost. However, they fail to provide seamless infrastructure management and monitoring capabilities that many customers may need. For instance, Amazon EC2 doesn't fully support cloud services automated discovery and it requires a private set of authentication credentials. Salesforce.com, on the other hand, do not provide monitoring access to their underlying systems. Moreover, these systems fail to provide infrastructure monitoring of heterogenous and legacy systems that don't support agents. In this work, we explore how to build a cloud management system that combines heterogeneous management of virtual resources with comprehensive management of phys...

  12. Distributed Cloud Computing (Dagstuhl Seminar 15072)

    OpenAIRE

    Coady, Yvonne; Kempf, James; McGeer, Rick; Schmid, Stefan

    2015-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 15072 "Distributed Cloud Computing". A distributed cloud connecting multiple, geographically distributed and smaller datacenters, can be an attractive alternative to today's massive, centralized datacenters. A distributed cloud can reduce communication overheads, costs, and latency's by offering nearby computation and storage resources. Better data locality can also improve privacy. In this seminar, we revisit the vision o...

  13. A Revolution in Information Technology - Cloud Computing

    OpenAIRE

    Divya BHATT

    2012-01-01

    What is the Internet? It is collection of “interconnected networks” represented as a Cloud in network diagrams and Cloud Computing is a metaphor for certain parts of the Internet. The IT enterprises and individuals are searching for a way to reduce the cost of computation, storage and communication. Cloud Computing is an Internet-based technology providing “On-Demand” solutions for addressing these scenarios that should be flexible enough for adaptation and responsive to requirements. The hug...

  14. Securing Mobile Cloud Using Finger Print Authentication

    OpenAIRE

    IehabALRassan; HananAlShaher

    2013-01-01

    Mobile cloud computing becomes part of mobile usersdaily life transactions. Mobile devices with Internetcapabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobiledevices, these devices can't install and run applications require heavy CPU processing or extensivememory. Cloud computing allows mobile users to synchronize their data with remote storage and utilizeapplications require heavy CPU processing or extensive memory such as Microsoft Office or ...

  15. Mobile multimedia services in the cloud

    OpenAIRE

    Kovachev, Dejan

    2014-01-01

    Cloud computing is a paradigm shift promising a utility-based delivery of storage and processing capacity, services, and software over the Internet. In essence it aims to reduce costs, facilitate self-automated systems and decouple service delivery from underlying technology. Thus, the cloud paradigm empowers customers with the ability to focus on creating novel services alleviating the burden of software and hardware resource provisioning. The success of cloud computing in the domain of ente...

  16. Cloud Service Based On Database Management System

    OpenAIRE

    Monica Kadam; Shubhangi Tambe

    2014-01-01

    Cloud database management system is a distributed database that delivers computing as a service. It is sharing of web infrastructure for resources, software and information over a network. The cloud is used as a storage location and database can be accessed and computed from anywhere. The large number of web application makes the use of distributed storage solution in order to scale up. It enables user to outsource the resource and services to the third party server. In this p...

  17. Sector and Sphere: the design and implementation of a high-performance data cloud

    OpenAIRE

    Gu, Yunhong; Grossman, Robert L.

    2009-01-01

    Cloud computing has demonstrated that processing very large datasets over commodity clusters can be done simply, given the right programming model and infrastructure. In this paper, we describe the design and implementation of the Sector storage cloud and the Sphere compute cloud. By contrast with the existing storage and compute clouds, Sector can manage data not only within a data centre, but also across geographically distributed data centres. Similarly, the Sphere compute cloud supports u...

  18. Cloud Computing

    CERN Document Server

    Mirashe, Shivaji P

    2010-01-01

    Computing as you know it is about to change, your applications and documents are going to move from the desktop into the cloud. I'm talking about cloud computing, where applications and files are hosted on a "cloud" consisting of thousands of computers and servers, all linked together and accessible via the Internet. With cloud computing, everything you do is now web based instead of being desktop based. You can access all your programs and documents from any computer that's connected to the Internet. How will cloud computing change the way you work? For one thing, you're no longer tied to a single computer. You can take your work anywhere because it's always accessible via the web. In addition, cloud computing facilitates group collaboration, as all group members can access the same programs and documents from wherever they happen to be located. Cloud computing might sound far-fetched, but chances are you're already using some cloud applications. If you're using a web-based email program, such as Gmail or Ho...

  19. Cloud Cover

    Science.gov (United States)

    Schaffhauser, Dian

    2012-01-01

    This article features a major statewide initiative in North Carolina that is showing how a consortium model can minimize risks for districts and help them exploit the advantages of cloud computing. Edgecombe County Public Schools in Tarboro, North Carolina, intends to exploit a major cloud initiative being refined in the state and involving every…

  20. Cloud Control

    Science.gov (United States)

    Ramaswami, Rama; Raths, David; Schaffhauser, Dian; Skelly, Jennifer

    2011-01-01

    For many IT shops, the cloud offers an opportunity not only to improve operations but also to align themselves more closely with their schools' strategic goals. The cloud is not a plug-and-play proposition, however--it is a complex, evolving landscape that demands one's full attention. Security, privacy, contracts, and contingency planning are all…

  1. 基于NoSQL的海量空间数据云存储与服务方法%Massive Geo-spatial Data Cloud Storage and Services Based on NoSQL Database Technique

    Institute of Scientific and Technical Information of China (English)

    陈崇成; 林剑峰; 吴小竹; 巫建伟; 连惠群

    2013-01-01

    近年来,实现海量空间数据高效地存储管理和在线服务,成为地学信息科学领域日益关注的热点问题。本文根据矢量和栅格空间数据的不同特点,提出并实现了矢量栅格数据一体化的海量空间数据分布式云存储管理与访问服务方案,在海量矢量数据存储和处理中创新性引入分布式图数据库Neo4J和并行图计算框架。在三层式空间数据云存储架构基础上,给出NoSQL数据库技术的栅格和矢量数据云存储的实现策略与方法,并开展了通用数据访问接口的设计。采用分布式文件系统 HDFS 存储栅格数据,并使用列族数据库 HBase 对其建立分布式空间索引,及采用满足ACID约束的分布式图数据库Neo4J来存储矢量数据,并使用R树建立空间索引。在自主研发的地理知识云平台GeoKSCloud框架下,初步实现了核心组件-空间数据聚合中心(GeoDAC)软件,可为各类用户提供空间数据分布式存储管理和访问服务。通过搭建试验床,开展GeoDAC与开源GIS软件PostGIS在矢量数据读写访问性能方面的对比测试。结果表明,虽然GeoDAC没有获得写入性能的加速作用,但其具有PostGIS无法比拟的强大读取性能。GeoDAC将海量数据经过空间分割后分布在集群上,能够并行处理查询请求,极大地提高空间查询速度,具有广阔的应用前景。%In recent years, how to implement a efficient storage management on massive geo-spatial data and ul-teriorly web service for a broad variety of users, has becomes an increasingly hot issue in the field of geographi-cal information science, with the explosive growth of Earth Observation System(EOS) data and the flourish of the new geography paradigm. A cloud storage system to provide distributed cloud-enabled storage management and services for massive geo-spatial data with an integrity of both vector and raster formats is proposed in this paper in

  2. Secure Architectures in the Cloud

    NARCIS (Netherlands)

    De Capitani di Vimercati, Sabrina; Pieters, Wolter; Probst, Christian W.

    2011-01-01

    This report documents the outcomes of Dagstuhl Seminar 11492 “Secure Architectures in the Cloud”. In cloud computing, data storage and processing are offered as services, and data are managed by external providers that reside outside the control of the data owner. The use of such services reduces th

  3. Cloud migration

    CERN Document Server

    Höllwarth, Tobias

    2012-01-01

    This book is designed for managers and entrepreneurs, who are considering improving the economics and flexibility of their IT solutions and infrastructures. The book is also for readers who wish to learn more about the Cloud, but do not want to become specialists.This book discusses the technical, legal, fiscal, economic, organisational and environmental aspects of Cloud services. If you are looking for practical advice on vendor selection and certification, as well as real world Cloud project case studies, this is the book to consult.It is the result of a highly cooper

  4. Cloud Computing

    CERN Document Server

    Baun, Christian; Nimis, Jens; Tai, Stefan

    2011-01-01

    Cloud computing is a buzz-word in today's information technology (IT) that nobody can escape. But what is really behind it? There are many interpretations of this term, but no standardized or even uniform definition. Instead, as a result of the multi-faceted viewpoints and the diverse interests expressed by the various stakeholders, cloud computing is perceived as a rather fuzzy concept. With this book, the authors deliver an overview of cloud computing architecture, services, and applications. Their aim is to bring readers up to date on this technology and thus to provide a common basis for d

  5. Design of Cloud Storage about Enterprise Human Resources Information Platform based on NoSQL%基于NoSQL的企业人力资源信息云平台存储方案设计

    Institute of Scientific and Technical Information of China (English)

    姚远

    2014-01-01

    全球信息化时代的来临,带动了社交网络与电子商务的快速发展,使企业逐渐进入全球化市场,而人力资源管理已经成为制约企业发展的瓶颈问题。本文分析了企业在招聘人才时所遇到的困难,建议企业建立自己的人才资源数据库,重点分析了云平台的存储海量数据问题,以非关系型数据库HBase配合开源的分布式框架Hadoop来存储管理企业搜集的海量的各种类型的人才信息数据,适应每天剧增的数据资源。%With theglobal information age coming,enterprises gradually join into the global market driven by the rapid development of social networking and e-commerce,while human resources management has become the bottleneck problem restricting the development of enterprises.This paper analyzes difficulties enterprises encountered in the recruitment of personnel,it advise to establish a database resource proposals of their own enterprises,focuses on the analysis of the mass data storage problem of cloud platform,personnel information data of various types of storage management enterprise search to non relational database HBase with Hadoop distributed framework of open source mass to meet everyday data resource.

  6. Big Data Services Security and Security challenges in cloud environment

    OpenAIRE

    Alsufyani, Raed; Jama, Khursand; Yao, Yulin; Ramachandran, Muthu; Chang, Victor

    2016-01-01

    This paper explores security issues of storage in the cloud and the methodologies that can be used to improve the security level. This study is concluded with a discussion of current problems and the future direction of cloud computing. Big data analysis can also be classified into memory level analysis, business intelligence (BI) level analysis, and massive level analysis. This research paper is based on cloud computing security and data storage issues that organizations face when they uploa...

  7. Electron Cloud: an Analytic View

    CERN Document Server

    Vos, L

    1998-01-01

    Electron cloud activity has been observed in some positron storage rings but not in others. It is a major concern for the LHC. In this paper the electron cloud problematics is treated purely analytica lly. The equilibrium electron cloud density is derived from the standard photon production rate, taking into account the photo-electric yield and the process of secondary emission. A fundamental ingre dient in the derivation is the Kollath{2] energy spectrum of the secondary emission. The phenomenon of space charge is discussed as well. The transverse acceleration of the electrons by the bunches is used to introduce the concept of closely and sparsely bunched beams. There is a fundamental difference between them, especially from the point of view of power deposition. Expressions for an equivalen t transverse impedance and imaginary tune shift are derived. Finally the analysis is confronted with electron cloud observations in existing positron machines (DAPHINE, PF, BEPC) before it is applied to the LHC. It comes...

  8. Cloud Computing

    DEFF Research Database (Denmark)

    Krogh, Simon

    2013-01-01

    with technological changes, the paradigmatic pendulum has swung between increased centralization on one side and a focus on distributed computing that pushes IT power out to end users on the other. With the introduction of outsourcing and cloud computing, centralization in large data centers is again dominating...... the IT scene. In line with the views presented by Nicolas Carr in 2003 (Carr, 2003), it is a popular assumption that cloud computing will be the next utility (like water, electricity and gas) (Buyya, Yeo, Venugopal, Broberg, & Brandic, 2009). However, this assumption disregards the fact that most IT production......), for instance, in establishing and maintaining trust between the involved parties (Sabherwal, 1999). So far, research in cloud computing has neglected this perspective and focused entirely on aspects relating to technology, economy, security and legal questions. While the core technologies of cloud computing (e...

  9. Development of a Survivable Cloud Multi-robot Framework for Heterogeneous Environments

    OpenAIRE

    Osunmakinde, Isaac; Ramharuk, Vikash

    2014-01-01

    Cloud robotics is a paradigm that allows for robots to offload computationally intensive and data storage requirements into the cloud by providing a secure and customizable environment. The challenge for cloud robotics is the inherent problem of cloud disconnection. A major assumption made in the development of the current cloud robotics frameworks is that the connection between the cloud and the robot is always available. However, for multi-robots working in heterogeneous environments, the c...

  10. 一种基于分布式开放资源管理服务的“云存储”(ppStore)方案研究%STUDY ON CLOUD STORAGE SCHEME BASED ON DISTRIBUTED OPEN SOURCE MANAGEMENT SERVICE (ppStore)

    Institute of Scientific and Technical Information of China (English)

    李建国; 袁平鹏

    2011-01-01

    云存储技术因其能为用户提供安全、海量、随时随地的数据存储功能而得以快速发展.提出利用网络上现存的自然分布于世界各地的大量免费存储服务,如网盘、ftp、email以及其他形式等存储空间,将这些服务集中起来,为用户提供价廉、可靠的存储系统.介绍一种低开销、快速度、高可用、可扩展的云存储拓扑系统,以期在该拓扑架构下买现以文件存储和共享服务为基础,不断扩展其他功能,最终形成一个分布式存储资源共享社区的目的.%Cloud storage technology, due to its secure, mass data convenient data storage, function that is provided to customers, has got very rapid development. The thesis suggests to take advantage of the great number of free storage services that are naturally allocated over the network around the world at present, for example, netdisk, ftp, email as well as storage spaces in other forms, then aggregate all of them to provide customers with cheap and reliable storage systems. The thesis introduces a low cost, high speed, high available and expandable cloud storage topological system, so that the purpose can be realized, under such a topological architecture, based on file storage and sharing service, to continuously explore other functions and finally form a distributed storage resources sharing community.

  11. Cloud Computing

    OpenAIRE

    Bhavana Gupta

    2012-01-01

    Cloud computing is such a type of computing environment, where business owners outsource their computing needs including application software services to a third party and when they need to use the computing power or employees need to use the application resources like database, emails etc., they access the resources via Internet. Cloud computing the use of computing resources (hardware and software) that are delivered as a service over a (typically the Internet).

  12. A REVIEW ON SECURED CLOUD COMPUTING ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    M. Hemanth Chakravarthy

    2014-01-01

    Full Text Available Nowadays, the scientific problem becomes very complex; therefore, it requires more computing power and storage space. These requirements are very common in an organization while dealing with current technological data and requirements. Based on these basic requirements, need of higher computational resources is an important issue when dealing with current technological methodology. Hence, cloud computing has become the most important computing paradigm of recent world. The cloud computing is an open source and using Internet as network model. Rapid growth in the field of “cloud computing” also increases severe security concerns, because security has a constant issue. This study reviews security models of cloud computing.

  13. The Ozobranchus leech is a candidate mechanical vector for the fibropapilloma-associated turtle herpesvirus found latently infecting skin tumors on Hawaiian green turtles (Chelonia mydas)

    International Nuclear Information System (INIS)

    Fibropapillomatosis (FP) of marine turtles is a neoplastic disease of ecological concern. A fibropapilloma-associated turtle herpesvirus (FPTHV) is consistently present, usually at loads exceeding one virus copy per tumor cell. DNA from an array of parasites of green turtles (Chelonia mydas) was examined with quantitative PCR (qPCR) to determine whether any carried viral loads are sufficient to implicate them as vectors for FPTHV. Marine leeches (Ozobranchus spp.) were found to carry high viral DNA loads; some samples approached 10 million copies per leech. Isopycnic sucrose density gradient/qPCR analysis confirmed that some of these copies were associated with particles of the density of enveloped viruses. The data implicate the marine leech Ozobranchus as a mechanical vector for FPTHV. Quantitative RT-PCR analysis of FPTHV gene expression indicated that most of the FPTHV copies in a fibropapilloma have restricted DNA polymerase expression, suggestive of latent infection

  14. The Ozobranchus leech as a mechanical vector for the fibropapilloma-associated turtle herpes virus found latently infecting skin tumors on Hawaiian green turtles (Chelonia mydas)

    Science.gov (United States)

    Greenblatt, R.J.; Work, T.M.; Balazs, G.; Sutton, C.A.; Casey, R.N.; Casey, J.W.

    2004-01-01

    Fibropapillomatosis (FP) of marine turtles is a neoplastic disease of ecological concern. A fibropapilloma-associated turtle herpesvirus (FPTHV) is consistently present, usually at loads exceeding one virus copy per tumor cell. DNA from an array of parasites of green turtles (Chelonia mydas) was examined with quantitative PCR (qPCR) to determine whether any carried viral loads are sufficient to implicate them as vectors for FPTHV. Marine leeches (Ozobranchus spp.) were found to carry high viral DNA loads; some samples approached 10 million copies per leech. Isopycnic sucrose density gradient/qPCR analysis confirmed that some of these copies were associated with particles of the density of enveloped viruses. The data implicate the marine leech Ozobranchus as a mechanical vector for FPTHV. Quantitative RT-PCR analysis of FPTHV gene expression indicated that most of the FPTHV copies in a fibropapilloma have restricted DNA polymerase expression, suggestive of latent infection.

  15. Green turtles (Chelonia mydas) foraging at Arvoredo Island in Southern Brazil: Genetic characterization and mixed stock analysis through mtDNA control region haplotypes.

    Science.gov (United States)

    Proietti, Maíra Carneiro; Lara-Ruiz, Paula; Reisser, Júlia Wiener; da Silva Pinto, Luciano; Dellagostin, Odir Antonio; Marins, Luis Fernando

    2009-07-01

    We analyzed mtDNA control region sequences of green turtles (Chelonia mydas) from Arvoredo Island, a foraging ground in southern Brazil, and identified eight haplotypes. Of these, CM-A8 (64%) and CM-A5 (22%) were dominant, the remainder presenting low frequencies (Rocas/Noronha, in Brazil (p > 0.05). Mixed Stock Analysis, incorporating eleven Atlantic and one Mediterranean rookery as possible sources of individuals, indicated Ascension and Aves islands as the main contributing stocks to the Arvoredo aggregation (68.01% and 22.96%, respectively). These results demonstrate the extensive relationships between Arvoredo Island and other Atlantic foraging and breeding areas. Such an understanding provides a framework for establishing adequate management and conservation strategies for this endangered species. PMID:21637527

  16. Green turtles (Chelonia mydas foraging at Arvoredo Island in Southern Brazil: genetic characterization and mixed stock analysis through mtDNA control region haplotypes

    Directory of Open Access Journals (Sweden)

    Maíra Carneiro Proietti

    2009-01-01

    Full Text Available We analyzed mtDNA control region sequences of green turtles (Chelonia mydas from Arvoredo Island, a foraging ground in southern Brazil, and identified eight haplotypes. Of these, CM-A8 (64% and CM-A5 (22% were dominant, the remainder presenting low frequencies ( 0.05. Mixed Stock Analysis, incorporating eleven Atlantic and one Mediterranean rookery as possible sources of individuals, indicated Ascension and Aves islands as the main contributing stocks to the Arvoredo aggregation (68.01% and 22.96%, respectively. These results demonstrate the extensive relationships between Arvoredo Island and other Atlantic foraging and breeding areas. Such an understanding provides a framework for establishing adequate management and conservation strategies for this endangered species.

  17. A case for static analyzers in the cloud

    OpenAIRE

    Barnett, Michael; Bouaziz, Mehdi; Logozzo, Francesco; Fähndrich, Manuel

    2013-01-01

    We describe our ongoing effort of moving a desktop static analyzer, Clousot, into a cloud-based one, Cloudot. A cloud-based static analyzer runs as a service. Clients issue analysis requests through the local network or over the internet. The analysis takes advantage of the large computation resources offered by the cloud: the underlying infrastructure ensures scaling and virtually unlimited storage. Cloud-based analyzers may relax performance-precision trade-offs usually associated with desk...

  18. Model of cloud-based services for data mining analysis

    OpenAIRE

    Aleksandar Karadimce; Slobodan Kalajdziski; Danco Davcev

    2015-01-01

    New cloud-based services are being developed constantly in order to meet the need for faster, reliable and scalable methods for knowledge discovery. The major benefit of the cloud-based services is the efficient execution of heavy computation algorithms in the cloud simply by using Big Data storage and processing platforms. Therefore, we have proposed a model that provides data mining techniques as cloud-based services that are available to users on their demand. The widely known data mining ...

  19. Telemedicine Based on Mobile Devices and Mobile Cloud Computing

    OpenAIRE

    Lidong Wang; Cheryl Ann Alexander

    2014-01-01

    Mobile devices such as smartphones and tablets support kinds of mobile computing and services. They can access to the cloud or offload the computation-intensive part to the cloud computing resources. Mobile cloud computing (MCC) integrates the cloud computing into the mobile environment, which extends mobile devices’ battery lifetime, improves their data storage capacity and processing power, and improves their reliability and information security. In this paper, the applications of smartphon...

  20. A Swarm Intelligence Based Model for Mobile Cloud Computing

    OpenAIRE

    Salama, Ahmed S.

    2015-01-01

    Mobile Computing (MC) provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC). MCC aims at using cloud computing techniques for storage and processing of data on mobile devices, thereby reducing their limitations. This paper proposes architecture for a Swarm Intelligence Based Mobile Cloud Computing M...

  1. The Evolution of Cloud Computing in ATLAS

    Science.gov (United States)

    Taylor, Ryan P.; Berghaus, Frank; Brasolin, Franco; Domingues Cordeiro, Cristovao Jose; Desmarais, Ron; Field, Laurence; Gable, Ian; Giordano, Domenico; Di Girolamo, Alessandro; Hover, John; LeBlanc, Matthew; Love, Peter; Paterson, Michael; Sobie, Randall; Zaytsev, Alexandr

    2015-12-01

    The ATLAS experiment at the LHC has successfully incorporated cloud computing technology and cloud resources into its primarily grid-based model of distributed computing. Cloud R&D activities continue to mature and transition into stable production systems, while ongoing evolutionary changes are still needed to adapt and refine the approaches used, in response to changes in prevailing cloud technology. In addition, completely new developments are needed to handle emerging requirements. This paper describes the overall evolution of cloud computing in ATLAS. The current status of the virtual machine (VM) management systems used for harnessing Infrastructure as a Service resources are discussed. Monitoring and accounting systems tailored for clouds are needed to complete the integration of cloud resources within ATLAS' distributed computing framework. We are developing and deploying new solutions to address the challenge of operation in a geographically distributed multi-cloud scenario, including a system for managing VM images across multiple clouds, a system for dynamic location-based discovery of caching proxy servers, and the usage of a data federation to unify the worldwide grid of storage elements into a single namespace and access point. The usage of the experiment's high level trigger farm for Monte Carlo production, in a specialized cloud environment, is presented. Finally, we evaluate and compare the performance of commercial clouds using several benchmarks.

  2. Auditing for Distributed Storage Systems

    OpenAIRE

    Le, Anh; Markopoulou, Athina; Dimakis, Alexandros G.

    2012-01-01

    Distributed storage codes have recently received a lot of attention in the community. Independently, another body of work has proposed integrity checking schemes for cloud storage, none of which, however, is customized for coding-based storage or can efficiently support repair. In this work, we bridge the gap between these two currently disconnected bodies of work. We propose NC-Audit, a novel cryptography-based remote data integrity checking scheme, designed specifically for network coding-b...

  3. Architecting the cloud design decisions for cloud computing service models (SaaS, PaaS, and IaaS)

    CERN Document Server

    Kavis, Michael J

    2014-01-01

    An expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and tec

  4. Identity Management issues in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Smita Saini

    2014-03-01

    Full Text Available Cloud computing is providing a low cost on demand services to the users, omnipresent network, large storage capacity due to these features of cloud computing web applications are moving towards the cloud and due to this migration of the web application, cloud computing platform is raised many issues like privacy, security etc. Privacy issue are major concern for the cloud computing. Privacy is to preserve the sensitive information of the cloud consumer and the major issues to the privacy are unauthorized secondary usage, lack of user control, unclear responsibility. For dealing with these privacy issues Identity management method are used. This paper discusses the privacy issue and different kind of identity management technique that are used for preserving the privacy.

  5. A Review on Impacts of Cloud Computing on Digital Forensics

    Directory of Open Access Journals (Sweden)

    Farid Daryabar

    2015-05-01

    Full Text Available Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infrastructure provides data storage for organizations and individuals. Due to this large scale, in case an attack occurs in the network of a cloud it would be a big challenge to investigate the cloud. Therefore, digital forensics in cloud computing is a new discipline related to the increasing use of computers, networks and digital storage devices in numerous criminal activities in both traditional and Hi-Tech. This study reviews the literature on some challenges in cloud computing forensic investigation, and it is followed by evaluation and analysis of all types of information on cloud computing and its impacts on computer forensic investigations in publishing alliances with the survey was carried out in the field.

  6. Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Katz, Marcos

    A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile...... examples of mobile clouds applications, based on both existing commercial initiatives as well as proof-of-concept test-beds. Visions and prospects are also discussed, paving the way for further development. As mobile networks and social networks become more and more reliant on each other, the concept of...

  7. Cloud Computing with Open Source Tool :OpenStack

    Directory of Open Access Journals (Sweden)

    Dr. Urmila R. Pol

    2014-09-01

    Full Text Available OpenStack is a especially scalable open source cloud operating system that is a global alliance of developers and cloud computing technologists producing the ubiquitous open source cloud computing platform for public and private clouds. OpenStack provides series of interrelated projects delivering various components for a cloud infrastructure solution as well as controls large pools of storage, compute and networking resources throughout a datacenter that all managed through a Dashboard(Horizon that gives administrators control while empowering their users to provision resources through a web interface.In this paper, we present a overview of Cloud Computing Platform such as, Openstack, Eucalyptus ,CloudStack and Opennebula which is open source software, cloud computing layered model, components of OpenStack, architecture of OpenStack. The aim of this paper is to show mainly importance of OpenStack as a Cloud provider and its installation.

  8. Virtualization and cloud computing in dentistry.

    Science.gov (United States)

    Chow, Frank; Muftu, Ali; Shorter, Richard

    2014-01-01

    The use of virtualization and cloud computing has changed the way we use computers. Virtualization is a method of placing software called a hypervisor on the hardware of a computer or a host operating system. It allows a guest operating system to run on top of the physical computer with a virtual machine (i.e., virtual computer). Virtualization allows multiple virtual computers to run on top of one physical computer and to share its hardware resources, such as printers, scanners, and modems. This increases the efficient use of the computer by decreasing costs (e.g., hardware, electricity administration, and management) since only one physical computer is needed and running. This virtualization platform is the basis for cloud computing. It has expanded into areas of server and storage virtualization. One of the commonly used dental storage systems is cloud storage. Patient information is encrypted as required by the Health Insurance Portability and Accountability Act (HIPAA) and stored on off-site private cloud services for a monthly service fee. As computer costs continue to increase, so too will the need for more storage and processing power. Virtual and cloud computing will be a method for dentists to minimize costs and maximize computer efficiency in the near future. This article will provide some useful information on current uses of cloud computing. PMID:24941546

  9. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  10. CHPS IN CLOUD COMPUTING ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    K.L.Giridas

    2012-10-01

    Full Text Available Workflow have been utilized to characterize a various form of applications concerning high processing and storage space demands. So, to make the cloud computing environment more eco-friendly,our research project was aiming in reducing E-waste accumulated by computers. In a hybrid cloud, the user has flexibility offered by public cloud resources that can be combined to the private resources pool as required. Our previous work described the process of combining the low range and mid range processors with the high end processor to make the IT environment without e-waste. Then we focused on the allocation of resources in an optimal manner with respect to bandwidth and processors’ ability. In this paper we deal with presenting (CHPS Compatibility of Hybrid processor scheduler in green IT cloud computing environment. CHPS decides which resources should be chartered from the public cloud and combined to the private cloud to offer adequate processing power to perform a workflow inside a specified execution time. We present widespread experimental and simulation results which illustrate that CHPS can decrease costs as attaining the recognized preferred execution time.

  11. DDoS Mitigation in Cloud by Using C.I.T.F.A.

    OpenAIRE

    Virender Kumar; Hiresh Kumar Gupta; Sunil Kumar Sharma

    2013-01-01

    Cloud computing provides huge computing services to the business for improving the organizational growth. Basic requirement needed for this technology is Internet but provides higher capability when compared to the Internet. Cloud computing is a combination of computation, software, data access and also provides storage services. In Cloud, storage of data and the location of stored data are not known to the user. Cloud computing adopts the concept of virtualization, service oriented architect...

  12. Cloud Computing

    OpenAIRE

    Bhavana Gupta

    2012-01-01

    Cloud computing is such a type of computing environment, where business owners outsource their computing needs including application software services to a third party and when they need to use the computing power or employees need to use the application resources like database, emails etc., they access the resources via Internet

  13. A Survey on Mobile Cloud Computing with Embedded Security Considerations

    Directory of Open Access Journals (Sweden)

    Victor Onomza Waziri

    2014-04-01

    Full Text Available The emergence of cloud computing hold a promise to computing where software is provided as a services (SaaS via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducing cost, increasing storage, improving battery life of mobile devices and providing flexibility and mobility of data and information. However, the realization of some of these benefits is far from reality in mobile applications, as a result, opens new areas of research such as security of privacy and services. To better understand how to facilitate the development of mobile cloud computing, we surveyed existing work in mobile cloud computing in the context and principles of its foundational cloud computing technology. We provided a definition of mobile cloud computing and gave a summary of results from this review, in particular, the models, architecture, applications and challenges of mobile cloud computing. We concluded with recommendations for how this better understanding of mobile cloud computing can assist in the development of better and stronger mobile applications.

  14. Energy Storage.

    Science.gov (United States)

    Eaton, William W.

    Described are technological considerations affecting storage of energy, particularly electrical energy. The background and present status of energy storage by batteries, water storage, compressed air storage, flywheels, magnetic storage, hydrogen storage, and thermal storage are discussed followed by a review of development trends. Included are…

  15. The Risk and Challenges of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Usman Namadi Inuwa

    2015-12-01

    Full Text Available Cloud computing is a computing technology aiming to share storage, computation, and services transparently among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and operated by third party service providers despite it sensitivity (example contact address, mails, the risks of disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage by third party is also increasing. The purpose of this study is to review researches done on this technology, identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.

  16. Bioinformatics clouds for big data manipulation

    OpenAIRE

    Dai Lin; Gao Xin; Guo Yan; Xiao Jingfa; Zhang Zhang

    2012-01-01

    Abstract As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and a...

  17. A REVIEW ON SECURED CLOUD COMPUTING ENVIRONMENT

    OpenAIRE

    M. Hemanth Chakravarthy; E. Kannan

    2014-01-01

    Nowadays, the scientific problem becomes very complex; therefore, it requires more computing power and storage space. These requirements are very common in an organization while dealing with current technological data and requirements. Based on these basic requirements, need of higher computational resources is an important issue when dealing with current technological methodology. Hence, cloud computing has become the most important computing paradigm of recent world. The cloud computing is ...

  18. Mobile Computation Dynamic Offloading using Cloud

    OpenAIRE

    Pooja V. Bhokare; Chitra J. Patil

    2014-01-01

    The mobile cloud computing integrates the cloud computing into the mobile environment and overcomes obstacles related to the performance (e.g., battery life, storage, and bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and privacy).The Mobile devices are becoming global for online web services and applications. Many services available for the mobile devices, but the mobile devices have some limitation in the sense of computation lo...

  19. Data Acquisition as Industrial Cloud service

    OpenAIRE

    Stankevichus, Ivan

    2016-01-01

    The aim of this thesis was to develop a practical solution for industrial remote monitoring of automation equipment including real-time data acquisition from Siemens automation devices and storage of the obtained data to the SAP HANA Cloud database. Because HANA will be implemented by Siemens as a Cloud service, it was also reasonable to introduce important features and benefits of HANA technology for the industrial sector. The implementation of data acquisition solution was divided into ...

  20. Making a Cloud Provenance-Aware

    OpenAIRE

    Muniswamy-Reddy, Kiran-Kumar; MACKO Peter; Seltzer, Margo I.

    2009-01-01

    The advent of cloud computing provides a cheap and convenient mechanism for scientists to share data. The utility of such data is obviously enhanced when the provenance of the data is also available. The cloud, while convenient for storing data, is not designed for storing and querying provenance. In this paper, we present desirable properties for distributed provenance storage systems and present design alternatives for storing data and provenance on Amazon’s popular Web Services platform (A...

  1. The Risk and Challenges of Cloud Computing

    OpenAIRE

    Usman Namadi Inuwa

    2015-01-01

    Cloud computing is a computing technology aiming to share storage, computation, and services transparently among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and operated by third party service providers despite it sensitivity (example contact address, mails), the risks of disclosing user confidential data by service...

  2. Commune: Shared Ownership in an Agnostic Cloud

    OpenAIRE

    Soriente, Claudio; Karame, Ghassan; Ritzdorf, Hubert; Marinovic, Srdjan; Capkun, Srdjan

    2013-01-01

    Although cloud storage platforms promise a convenient way for users to share files and engage in collaborations, they require all files to have a single owner who unilaterally makes access control decisions. Existing clouds are, thus, agnostic to shared ownership. This can be a significant limitation in many collaborations because one owner can, for example, delete files and revoke access without consulting the other collaborators. In this paper, we first formally define a notion of shared ow...

  3. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  4. Surrogate cloud fields with measured cloud properties

    CERN Document Server

    Venema, V; Simmer, C; Venema, Victor; Crewell, Susanne; Simmer, Clemens

    2003-01-01

    This paper describes two new methods to generate 2D and 3D cloud fields based on 1D and 2D ground based profiler meas-urements. These cloud fields share desired statistical properties with real cloud fields. As they, however, are similar but not the same as real clouds, we call them surrogate clouds. One important advantage of the new methods is that the amplitude distribution of cloud liquid water is also exactly determined by the measurement: The surrogate clouds made with the classi-cal methods such as the Fourier method and the Bounded Cascade method are Gaussian and 'log-normal-like', respectively. Our first new method iteratively creates a time series with a measured amplitude distribution and power spectrum. Our sec-ond method uses an evolutionary search algorithm to generate cloud fields with practically arbitrary constraints. These clouds will be used to study the relation between radiation and cloud structure.

  5. Soft Clouding

    DEFF Research Database (Denmark)

    Søndergaard, Morten; Markussen, Thomas; Wetton, Barnabas;

    2012-01-01

    Soft Clouding is a blended concept, which describes the aim of a collaborative and transdisciplinary project. The concept is a metaphor implying a blend of cognitive, embodied interaction and semantic web. Furthermore, it is a metaphor describing our attempt of curating a new semantics of sound...... competencies brought together in one transdisciplinary process of curating a semantics of sound: Technological, Humanistic /Curatorial, and Design / Action-based practice....

  6. Interaction among Cloud Services on Common Software Application with Service Level Agreement

    OpenAIRE

    C. Saravanakumar C. Arun

    2011-01-01

    Nowadays the cloud computing has plays important role for larger organization, IT Industries, educational industries etc. Cloud computing is the complex infrastructure of software, hardware, processing and storage that are available as a service. It has huge number of advantages and also suffers lot of disadvantages. In the Cloud Service User (CSU) point there is no specific protocol, algorithm. There is no design pattern and interface for accessing a cloud services. The Cloud Service Provide...

  7. A secure dynamic collaboration environment in a cloud context

    DEFF Research Database (Denmark)

    Piechotta, C.; Jensen, Adam Enø; Olsen, Martin Grooss;

    In recent years, the cloud has emerged as an attractive means for hosting and delivering services over the Internet. This has resulted in a renewed focus on information security in the case where data is stored in the virtual space of the cloud and is not physically accessible to the customer....... This paper addresses the increasing security concerns of migrating to the cloud and utilising it for data storage, focusing on securing data in an untrusted cloud environment and ensuring detailed data access control in the cloud....

  8. Motion/imagery secure cloud enterprise architecture analysis

    Science.gov (United States)

    DeLay, John L.

    2012-06-01

    Cloud computing with storage virtualization and new service-oriented architectures brings a new perspective to the aspect of a distributed motion imagery and persistent surveillance enterprise. Our existing research is focused mainly on content management, distributed analytics, WAN distributed cloud networking performance issues of cloud based technologies. The potential of leveraging cloud based technologies for hosting motion imagery, imagery and analytics workflows for DOD and security applications is relatively unexplored. This paper will examine technologies for managing, storing, processing and disseminating motion imagery and imagery within a distributed network environment. Finally, we propose areas for future research in the area of distributed cloud content management enterprises.

  9. Securing Mobile Cloud Using Finger Print Authentication

    Directory of Open Access Journals (Sweden)

    IehabALRassan

    2013-11-01

    Full Text Available Mobile cloud computing becomes part of mobile usersdaily life transactions. Mobile devices with Internetcapabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobiledevices, these devices can't install and run applications require heavy CPU processing or extensivememory. Cloud computing allows mobile users to synchronize their data with remote storage and utilizeapplications require heavy CPU processing or extensive memory such as Microsoft Office or AdobePhotoshop, as they run in a desktop computer.The combination of cloud computing and mobile computing introduces mobile cloud computing, which alsopresent new issues of security threats such as unauthorized access to resources exist in mobile cloud.Protecting mobile cloud computing from illegitimateaccess becomes an important concern to mobile users.This paper proposes and implements a new user authentication mechanism of mobile cloud computingusing fingerprint recognition system. Fingerprint images of mobile users can be captured and processedusing mobile phone camera to access mobile cloud computing . The implementation of the proposedsolution in different mobile operating systems anddevices show security enhancement in mobile cloudcomputing with accepted performance level

  10. Three-dimensional geospatial information service based on cloud computing

    Science.gov (United States)

    Zhai, Xi; Yue, Peng; Jiang, Liangcun; Wang, Linnan

    2014-01-01

    Cloud computing technologies can support high-performance geospatial services in various domains, such as smart city and agriculture. Apache Hadoop, an open-source software framework, can be used to build a cloud environment on commodity clusters for storage and large-scale processing of data sets. The Open Geospatial Consortium (OGC) Web 3-D Service (W3DS) is a portrayal service for three-dimensional (3-D) geospatial data. Its performance could be improved by cloud computing technologies. This paper investigates how OGC W3DS could be developed in a cloud computing environment. It adopts the Apache Hadoop as the framework to provide a cloud implementation. The design and implementation of the 3-D geospatial information cloud service is presented. The performance evaluation is performed over data retrieval tests running in a cloud platform built by Hadoop clusters. The evaluation results provide a valuable reference on providing high-performance 3-D geospatial information cloud services.

  11. A survey on top security threats in cloud computing

    Directory of Open Access Journals (Sweden)

    Muhammad Kazim

    2015-03-01

    Full Text Available Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.

  12. Using Cloud Storage for NMR Data Distribution

    Science.gov (United States)

    Soulsby, David

    2012-01-01

    An approach using Google Groups as method for distributing student-acquired NMR data has been implemented. We describe how to configure NMR spectrometer software so that data is uploaded to a laboratory section specific Google Group, thereby removing bottlenecks associated with printing and processing at the spectrometer workstation. Outside of…

  13. Data Mining Using High Performance Data Clouds: Experimental Studies Using Sector and Sphere

    CERN Document Server

    Grossman, Robert L

    2008-01-01

    We describe the design and implementation of a high performance cloud that we have used to archive, analyze and mine large distributed data sets. By a cloud, we mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud provides compute services. We describe the design of the Sector storage cloud and how it provides the storage services required by the Sphere compute cloud. We also describe the programming paradigm supported by the Sphere compute cloud. Sector and Sphere are designed for analyzing large data sets using computer clusters connected with wide area high performance networks (for example, 10+ Gb/s). We describe a distributed data mining application that we have developed using Sector and Sphere. Finally, we describe some experimental studies comparing Sector/Sphere to Hadoop.

  14. Cloud Computing with iPlant Atmosphere.

    Science.gov (United States)

    McKay, Sheldon J; Skidmore, Edwin J; LaRose, Christopher J; Mercer, Andre W; Noutsos, Christos

    2013-01-01

    Cloud Computing refers to distributed computing platforms that use virtualization software to provide easy access to physical computing infrastructure and data storage, typically administered through a Web interface. Cloud-based computing provides access to powerful servers, with specific software and virtual hardware configurations, while eliminating the initial capital cost of expensive computers and reducing the ongoing operating costs of system administration, maintenance contracts, power consumption, and cooling. This eliminates a significant barrier to entry into bioinformatics and high-performance computing for many researchers. This is especially true of free or modestly priced cloud computing services. The iPlant Collaborative offers a free cloud computing service, Atmosphere, which allows users to easily create and use instances on virtual servers preconfigured for their analytical needs. Atmosphere is a self-service, on-demand platform for scientific computing. This unit demonstrates how to set up, access and use cloud computing in Atmosphere. PMID:26270172

  15. Autonomic Data Replication in Cloud Environment

    Directory of Open Access Journals (Sweden)

    Dhananjaya Gupt,

    2013-04-01

    Full Text Available Cloud computing is an emerging practice that offers more flexibility in infrastructure and reduces cost than our traditional computing models. Cloud providers offer everything from access to raw storage capacity resources to complete application services. The services that are provided by the cloud can be accessed from anywhere and data flows from one place to another. Since data is moving via network, there are chances of data loss. So we need to keep multiple copies of data and thus data replication is one of the main issues in cloud computing. In this paper we have implemented automatic replication of data from local host to cloud environment. Data replication is implemented by using HADOOP which stores the data at various nodes. If one node goes down then data can be retrieved from other node seamlessly.

  16. Cloud computing for data-intensive applications

    CERN Document Server

    Li, Xiaolin

    2014-01-01

    This book presents a range of cloud computing platforms for data-intensive scientific applications. It covers systems that deliver infrastructure as a service, including: HPC as a service; virtual networks as a service; scalable and reliable storage; algorithms that manage vast cloud resources and applications runtime; and programming models that enable pragmatic programming and implementation toolkits for eScience applications. Many scientific applications in clouds are also introduced, such as bioinformatics, biology, weather forecasting and social networks. Most chapters include case studie

  17. Cloud Databases: A Paradigm Shift in Databases

    Directory of Open Access Journals (Sweden)

    Indu Arora

    2012-07-01

    Full Text Available Relational databases ruled the Information Technology (IT industry for almost 40 years. But last few years have seen sea changes in the way IT is being used and viewed. Stand alone applications have been replaced with web-based applications, dedicated servers with multiple distributed servers and dedicated storage with network storage. Cloud computing has become a reality due to its lesser cost, scalability and pay-as-you-go model. It is one of the biggest changes in IT after the rise of World Wide Web. Cloud databases such as Big Table, Sherpa and SimpleDB are becoming popular. They address the limitations of existing relational databases related to scalability, ease of use and dynamic provisioning. Cloud databases are mainly used for data-intensive applications such as data warehousing, data mining and business intelligence. These applications are read-intensive, scalable and elastic in nature. Transactional data management applications such as banking, airline reservation, online e-commerce and supply chain management applications are write-intensive. Databases supporting such applications require ACID (Atomicity, Consistency, Isolation and Durability properties, but these databases are difficult to deploy in the cloud. The goal of this paper is to review the state of the art in the cloud databases and various architectures. It further assesses the challenges to develop cloud databases that meet the user requirements and discusses popularly used Cloud databases.

  18. REVIEW PAPER ON MOBILE CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Priyanka d. Raut

    2015-10-01

    Full Text Available Nowadays smart-phones are being capable of supporting a broad range of applications, many of which demand an increasing computational power. This leads to a challenge because smart-phones are resource-constrained devices with finite computation power, memory, storage, and energy. With the development of mobility and cloud computing, mobile cloud computing (MCC has introduced and become a point of research. With the need of extendibility and on-demand self-service, it can provide the good infrastructure, platform and software services in a cloud to mobile clients through the mobile network. Therefore, Cloud computing is anticipated to bring an innovation in mobile computing, where the mobile devices can make use of clouds for data processing, storage and other intensive operations. Despite the surprising advancement achieved by MCC, the clients of MCC are still below expectations due to the related risks in terms of security and confidentiality. The more and more information is placed onto the cloud by individuals and enterprises, the more the security issue begins to grow. This paper presents the various security issues that arise about how secure the mobile cloud computing environment is.

  19. Essentials of cloud computing

    CERN Document Server

    Chandrasekaran, K

    2014-01-01

    ForewordPrefaceComputing ParadigmsLearning ObjectivesPreambleHigh-Performance ComputingParallel ComputingDistributed ComputingCluster ComputingGrid ComputingCloud ComputingBiocomputingMobile ComputingQuantum ComputingOptical ComputingNanocomputingNetwork ComputingSummaryReview PointsReview QuestionsFurther ReadingCloud Computing FundamentalsLearning ObjectivesPreambleMotivation for Cloud ComputingThe Need for Cloud ComputingDefining Cloud ComputingNIST Definition of Cloud ComputingCloud Computing Is a ServiceCloud Computing Is a Platform5-4-3 Principles of Cloud computingFive Essential Charact

  20. Instrument measures cloud cover

    Science.gov (United States)

    Laue, E. G.

    1981-01-01

    Eight solar sensing cells comprise inexpensive monitoring instrument. Four cells always track Sun while other four face sky and clouds. On overcast day, cloud-irradiance sensors generate as much short-circuit current as Sun sensor cells. As clouds disappear, output of cloud sensors decreases. Ratio of two sensor type outputs determines fractional cloud cover.

  1. Estimating Cloud Cover

    Science.gov (United States)

    Moseley, Christine

    2007-01-01

    The purpose of this activity was to help students understand the percentage of cloud cover and make more accurate cloud cover observations. Students estimated the percentage of cloud cover represented by simulated clouds and assigned a cloud cover classification to those simulations. (Contains 2 notes and 3 tables.)

  2. Extension of the Trusted Cloud Domain for the Composite Cloud Process

    Directory of Open Access Journals (Sweden)

    Sameer Rajan

    2012-05-01

    Full Text Available Internet is a "network of networks" that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-opticcables, wireless connections, and other technologies. Cloud computing [1] is a new flavor of computing where our trend of using internet changes. It makes a virtual pool of resources such as storage, CPU,networks and memory to fulfill the user’s resource requirement and provides on demand (pay per use hardware and software services without barriers. It can be named as dynamic computing because itprovides resources, when required. Cloud Computing manages the pool of resources automatically and dynamically through software and hardware. Various businesses form their cloud for the users to providepay per use services. Users are required to access the cloud according to the service. In this way, user can get benefited from the proprietary cloud on cheap prices but it is difficult for the user to find the cloud that can fulfill his demand. It is also not safe for cloud to cloud communication without trust. To resolvesuch difficulties and various other issues, it is required to extend the trusted cloud domain for accessing the compatible services provided by other clouds.

  3. Analysis of epibiont data in relation with the Debilitated Turtle Syndrome of sea turtles in Chelonia mydas and Lepidochelys olivacea from Concepción coast, Chile

    Directory of Open Access Journals (Sweden)

    Italo Fernández

    2015-11-01

    Full Text Available Epibionts on the surface of the skin and shell of a specimen of Chelonia mydas and three Lepidochelys olivacea found floating on the coast of Concepción, Chile, between June 2010 and December 2012, were analyzed. These epibionts were analyzed during the clinical inspection and the tissue changes related to its settlement, with filamentous algae around, were observed. Subsequently, the epibionts were identified by morphological observation. The knowledge about theses epibionts in Chile is reviewed and the potential occurrence of Debilitated Turtle Syndrome (DTS in these turtles is discussed. The presence of sea turtles in the Chilean coast is considered a casual event, so there is little information on this issue. We propose it is necessary to carry out more studies on the association between turtles and epibionts because their identification, colonizing reptiles’ surface may give relevant information to a better understanding of different diseases, including DTS, that affect these marine reptiles and facilitates the development of strategies intended to recover their populations.

  4. Ingestion of solid wastes by juvenile green turtles, Chelonia mydas (L. 1758, in the eastern Rio de Janeiro state coast, Brazil

    Directory of Open Access Journals (Sweden)

    Danielle Rodrigues Awabdi

    2013-03-01

    Full Text Available This paper analyzed the solid wastes of anthropogenic origin obtained from the stomach contents of juvenile green turtles, Chelonia mydas, on the eastern Rio de Janeiro state coast, southeastern Brazil (22º50’S – 23º00’S. Between June 2009 and May 2010, the stomach contents of 49 specimens stranded on beaches were analyzed. Solid wastes were recorded in 29 stomach contents (59.2% and more than one category of wastes was found out in 22 samples. Plastic bags, categorized as flexible plastic materials, achieved the greatest occurrence frequency (96.5%. Perhaps, these wastes came from the disposal of garbage bags, raffia bags, commercial shop bags and various packaging. Wastes related to manufacture of fishing equipment were also often reported, such as nylon yarns, rubber, ropes, Styrofoam, and fishhooks. The region is an area of regular occurrence of C. mydas and the relatively large intake of solid wastes deposited in the environment poses a risk to the conservation of this species.

  5. Oxidative stress indicators and chemical contaminants in East Pacific green turtles (Chelonia mydas) inhabiting two foraging coastal lagoons in the Baja California peninsula.

    Science.gov (United States)

    Labrada-Martagón, Vanessa; Rodríguez, Paola A Tenorio; Méndez-Rodríguez, Lia C; Zenteno-Savín, Tania

    2011-08-01

    In order to determine the potential effects of contaminants in juveniles of East Pacific green turtle, Chelonia mydas, captured alive, circulating trace metal and organochlorine pesticide concentrations were correlated with body condition, antioxidant enzyme activities and lipid peroxidation levels. Turtles were sampled in Punta Abreojos (PAO) and Bahía Magdalena (BMA). Turtles from PAO showed higher silicon and cadmium concentrations, but lower α-hexachlorocyclohexane, γ-hexachlorocyclohexane, hexachlorobenzene and aldrin concentrations than individuals from BMA. In BMA cadmium concentration decreased as the standard carapace length of the turtles increased. In PAO concentrations of α-hexachlorocyclohexane, heptachlor and hexachlorobenzene were positively correlated with the weight of the individuals. Lipid peroxidation levels were positively correlated with cadmium concentrations. In turtles captured in PAO, enzymatic antioxidant activities correlated mostly with pesticide concentrations, while in individuals from BMA enzyme activities were correlated with trace element concentrations. Correlations between antioxidant enzyme activities and concentration of xenobiotics suggest physiological sensitivity of East Pacific green turtles to chemicals. Regional differences found could be influenced by habitat conditions such as currents, upwellings (PAO) and agricultural activities (BMA). We suggest that, combined, circulating contaminant concentrations, lipid peroxidation levels and antioxidant enzyme activities in sea turtles could be used as biomarkers of the habitat conditions. PMID:21377544

  6. Cloud Computing, Tieto Cloud Server Model

    OpenAIRE

    Suikkanen, Saara

    2013-01-01

    The purpose of this study is to find out what is cloud computing. To be able to make wise decisions when moving to cloud or considering it, companies need to understand what cloud is consists of. Which model suits best to they company, what should be taken into account before moving to cloud, what is the cloud broker role and also SWOT analysis of cloud? To be able to answer customer requirements and business demands, IT companies should develop and produce new service models. IT house T...

  7. USING CLOUD COMPUTING TO PROVIDE DATA MINING SERVICES

    OpenAIRE

    Naskar Ankita* , Mrs. Mishra Monika R

    2013-01-01

    Data security and access control are the most challenging research work going on, at present, in cloud computing. This is because of the users sending their sensitive data to the cloud providers for acquiring their services. In cloud computing, the data is going to be stored in storage area provided by the service providers. The service providers must have a suitable way to protect their client’s sensitive data, especially to protect the data from unauthorized access. A common method of infor...

  8. Realisation of Resourceful Data Mining Services Using Cloud Computing

    OpenAIRE

    Ankita Naskar; Prof. Mrs. Monika R. Mishra

    2013-01-01

    Data security and access control are the most challenging research work going on, at present, in cloud computing. This is because of the users sending their sensitive data to the cloud providers for acquiring their services. In cloud computing, the data is going to be stored in storage area provided by the service providers. The service providers must have a suitable way to protect their client’s sensitive data, especially to protect the data from unauthorized access. A general method of info...

  9. How mobility increases mobile cloud computing processing capacity

    OpenAIRE

    Nguyen, Anh-Dung; Sénac, Patrick; Ramiro, Victor; Diaz, Michel

    2011-01-01

    In this paper, we address a important and still unanswered question in mobile cloud computing ``how mobility impacts the distributed processing power of network and computing clouds formed from mobile ad-hoc networks ?''. Indeed, mobile ad-hoc networks potentially offer an aggregate cloud of resources delivering collectively processing, storage and networking resources. We demonstrate that the mobility can increase significantly the performances of distributed computation in such networks. In...

  10. Review and analysis of Cloud Computing Quality of Experience

    OpenAIRE

    Safdari, Fash; Chang, Victor

    2014-01-01

    Cloud computing is gaining growing interest from industry, organizations and the research community. The technology promises many advantages in terms of cost saving by allowing organizations and users to remotely gain access to a huge pool of data storage and processing power. However, migrating services to cloud computing introduce new challenges in performance and service quality. Quality of service (QoS) is and has been used as a means of monitoring cloud service performance. However, QoS...

  11. A SURVEY ON DE-DUPLICATION IN CLOUD COMPUTING

    OpenAIRE

    Priyadharsini.P; Dhamodran.P; Kavitha.M.S

    2014-01-01

    Cloud computing is an emerging technology for providing infrastructure as a services to cloud users. The infrastructure as a service is based on virtualization where it allocates the virtual machine to user through internet. Virtual machine is a guest machine runs in the environment of host machine. VMI are used to purchase VM instances to run on virtual machine in cloud platforms. The storage of large number of VMI and provisioning remains challenging problem. In this paper, data...

  12. Utilizing HDF4 File Content Maps for the Cloud

    Science.gov (United States)

    Lee, Hyokyung Joe

    2016-01-01

    We demonstrate a prototype study that HDF4 file content map can be used for efficiently organizing data in cloud object storage system to facilitate cloud computing. This approach can be extended to any binary data formats and to any existing big data analytics solution powered by cloud computing because HDF4 file content map project started as long term preservation of NASA data that doesn't require HDF4 APIs to access data.

  13. Review and Analysis of Networking Challenges in Cloud Computing

    OpenAIRE

    Moura, Jose Andre; Hutchison, David

    2016-01-01

    Cloud Computing offers virtualized computing, storage, and networking resources, over the Internet, to organizations and individual users in a completely dynamic way. These cloud resources are cheaper, easier to manage, and more elastic than sets of local, physical, ones. This encourages customers to outsource their applications and services to the cloud. The migration of both data and applications outside the administrative domain of customers into a shared environment imposes transversal, f...

  14. Growing Cloud Computing Efficiency

    Directory of Open Access Journals (Sweden)

    Dr. Mohamed F. AlAjmi, Dr. Arun Sharma, Shakir Khan

    2012-05-01

    Full Text Available Cloud computing is basically altering the expectation for how and when computing, storage and networking assets should be allocated, managed and devoted. End-users are progressively more sensitive in response time of services they ingest. Service Developers wish for the Service Providers to make sure or give the ability for dynamically assigning and managing resources in respond to alter the demand patterns in real-time. Ultimately, Service Providers are under anxiety to build their infrastructure to facilitate real-time end-to-end visibility and energetic resource management with well grained control to decrease total cost of tenure for improving quickness. What is required to rethink of the underlying operating system and management infrastructure to put up the on-going renovation of data centre from the traditional server-centric architecture model to a cloud or network centric model? This paper projects and describes a indication model for a network centric data centre infrastructure management heap that make use of it and validates key ideas that have enabled dynamism, the quality of being scalable, reliability and security in the telecommunication industry to the computing engineering. Finally, the paper will explain a proof of concept classification that was implemented to show how dynamic resource management can be enforced to enable real-time service guarantee for network centric data centre architecture.

  15. Cloud droplet measurement methods

    International Nuclear Information System (INIS)

    All important techniques to measure cloud and fog droplets are mentioned in this compendium. It especially refers to those authors who established and developed measurement methods for cloud droplets and to those whose papers contained cloud droplet size distributions. (orig.)

  16. Blue skies for CLOUD

    CERN Multimedia

    2006-01-01

    Through the recently approved CLOUD experiment, CERN will soon be contributing to climate research. Tests are being performed on the first prototype of CLOUD, an experiment designed to assess cosmic radiation influence on cloud formation.

  17. Cloud Computing (4)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ 8 Case Study Cloud computing is still a new phenomenon. Although many IT giants are developing their own cloud computing infrastructures,platforms, software, and services, few have really succeeded in becoming cloud computing providers.

  18. Building Cloud-based Biometric Services

    OpenAIRE

    Žganec Gros, Jerneja; Bule, Jernej; Štruc, Vitomir; PEER, PETER

    2013-01-01

    Over the next few years the amount of biometric data being at the disposal of various agencies and authentication service providers is expected to grow significantly. Such quantities of data require not only enormous amounts of storage but unprecedented processing power as well. To be able to face this future challenges more and more people are looking towards cloud computing, which can address these challenges quite effectively with its seemingly unlimited storage capacity, ra...

  19. Provenance as First Class Cloud Data

    OpenAIRE

    Muniswamy-Reddy, Kiran-Kumar; Seltzer, Margo I.

    2010-01-01

    Digital provenance is meta-data that describes the ancestry or history of a digital object. Most work on provenance focuses on how provenance increases the value of data to consumers. However, provenance is also valuable to storage providers. For example, provenance can provide hints on access patterns, detect anomalous behavior, and provide enhanced user search capabilities. As the next generation storage providers, cloud vendors are in the unique position to capitalize on this opportunity t...

  20. Batch Attribute-Based Encryption for Secure Clouds

    OpenAIRE

    Chen Yang; Yang Sun; Qianhong Wu

    2015-01-01

    Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE) is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only if the associated attributes match the predetermined access policy, which allows one to enforce fin...

  1. A Distributed Approach to Privacy on the Cloud

    OpenAIRE

    Pagano, Francesco

    2015-01-01

    The increasing adoption of Cloud-based data processing and storage poses a number of privacy issues. Users wish to preserve full control over their sensitive data and cannot accept it to be fully accessible to an external storage provider. Previous research in this area was mostly addressed at techniques to protect data stored on untrusted database servers; however, I argue that the Cloud architecture presents a number of specific problems and issues. This dissertation contains a detailed ana...

  2. Silicon Photonics Cloud (SiCloud)

    DEFF Research Database (Denmark)

    DeVore, P. T. S.; Jiang, Y.; Lynch, M.;

    2015-01-01

    Silicon Photonics Cloud (SiCloud.org) is the first silicon photonics interactive web tool. Here we report new features of this tool including mode propagation parameters and mode distribution galleries for user specified waveguide dimensions and wavelengths.......Silicon Photonics Cloud (SiCloud.org) is the first silicon photonics interactive web tool. Here we report new features of this tool including mode propagation parameters and mode distribution galleries for user specified waveguide dimensions and wavelengths....

  3. Feasibility Analysis of Critical Factors Affecting Cloud Computing in Nigeria

    Directory of Open Access Journals (Sweden)

    Eustace Manayi Dogo

    2013-10-01

    Full Text Available Cloud computing is an evolving and new way of delivering computing services and resources over the internet which are managed by third parties at remote sites. Cloud computing is based on existing technologies like web services, Service Oriented Architecture (SOA, web3.0, grid computing and virtualization, etc. Computing services includes data storage, processing and software. Cloud computing is enjoying a lot of buzz in Nigeria due to its perceived economic and operational benefits and stakeholders believe that it will transform the IT industry in Nigeria. Despite all its promises there still exist so many challenges before Cloud computing see the light of the day in Nigeria. This paper delivers an overview of Cloud computing together with its advantages and disadvantages. Thereafter, the challenges and drivers affecting the adoption of Cloud computing in Nigeria are outlined. Finally, recommendations for the adoption of Cloud computing is discussed with Nigeria as a case study.

  4. 77 FR 74829 - Notice of Public Meeting-Cloud Computing and Big Data Forum and Workshop

    Science.gov (United States)

    2012-12-18

    ... unprecedented demands on storage, integration, and analysis presented by massive data sets--demands that Cloud... National Institute of Standards and Technology Notice of Public Meeting--Cloud Computing and Big Data Forum...) announces a Cloud Computing and Big Data Forum and Workshop to be held on Tuesday, January 15,...

  5. Cloud Based Educational Systems and Its Challenges and Opportunities and Issues

    Science.gov (United States)

    Paul, Prantosh Kr.; Lata Dangwal, Kiran

    2014-01-01

    Cloud Computing (CC) is actually is a set of hardware, software, networks, storage, services an interface combines to deliver aspects of computing as a service. Cloud Computing (CC) actually uses the central remote servers to maintain data and applications. Practically Cloud Computing (CC) is extension of Grid computing with independency and…

  6. TRUSTED CLOUD COMPUTING FRAMEWORK FOR HEALTHCARE SECTOR

    Directory of Open Access Journals (Sweden)

    Mervat Adib Bamiah

    2014-01-01

    Full Text Available Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness, availability and elasticity. Healthcare organizations and consumers lose control when they outsource their sensitive data and computing resources to a third party Cloud Service Provider (CSP, which may raise security and privacy concerns related to data loss and misuse appealing threats. Lack of consumers’ knowledge about their data storage location may lead to violating rules and regulations of Health Insurance Portability and Accountability Act (HIPAA that can cost them huge penalty. Fear of data breach by internal or external hackers may decrease consumers’ trust in adopting cloud computing and benefiting from its promising features. We designed a Healthcare Trusted Cloud Computing (HTCC framework that maintains security, privacy and considers HIPAA regulations. HTCC framework deploys Trusted Computing Group (TCG technologies such as Trusted Platform Module (TPM, Trusted Software Stack (TSS, virtual Trusted Platform Module (vTPM, Trusted Network Connect (TNC and Self Encrypting Drives (SEDs. We emphasize on using strong multi-factor authentication access control mechanisms and strict security controls, as well as encryption for data at storage, in-transit and while process. We contributed in customizing a cloud Service Level Agreement (SLA by considering healthcare requirements. HTCC was evaluated by comparing with previous researchers’ work and conducting survey from experts. Results were satisfactory and showed acceptance of the framework. We aim that our proposed framework will assist in optimizing trust on cloud computing to be adopted in healthcare sector.

  7. Interoperating Cloud-based Virtual Farms

    Science.gov (United States)

    Bagnasco, S.; Colamaria, F.; Colella, D.; Casula, E.; Elia, D.; Franco, A.; Lusso, S.; Luparello, G.; Masera, M.; Miniello, G.; Mura, D.; Piano, S.; Vallero, S.; Venaruzzo, M.; Vino, G.

    2015-12-01

    The present work aims at optimizing the use of computing resources available at the grid Italian Tier-2 sites of the ALICE experiment at CERN LHC by making them accessible to interactive distributed analysis, thanks to modern solutions based on cloud computing. The scalability and elasticity of the computing resources via dynamic (“on-demand”) provisioning is essentially limited by the size of the computing site, reaching the theoretical optimum only in the asymptotic case of infinite resources. The main challenge of the project is to overcome this limitation by federating different sites through a distributed cloud facility. Storage capacities of the participating sites are seen as a single federated storage area, preventing the need of mirroring data across them: high data access efficiency is guaranteed by location-aware analysis software and storage interfaces, in a transparent way from an end-user perspective. Moreover, the interactive analysis on the federated cloud reduces the execution time with respect to grid batch jobs. The tests of the investigated solutions for both cloud computing and distributed storage on wide area network will be presented.

  8. Hypervisor for Virtualization in Private Cloud

    Science.gov (United States)

    Závacký, Pavol; Eliáš, Andrej; Stémy, Maximilián

    2015-08-01

    The article deals with testing and choosing right virtualization platform with management tools for building private cloud, in which methods for power control of virtual machines can be applied. Main brick in every virtualization platform is hypervisor which carries out virtualization and management tools which deliver the services such as web management, storage management and resources management from one place.

  9. Where the Cloud Meets the Commons

    Science.gov (United States)

    Ipri, Tom

    2011-01-01

    Changes presented by cloud computing--shared computing services, applications, and storage available to end users via the Internet--have the potential to seriously alter how libraries provide services, not only remotely, but also within the physical library, specifically concerning challenges facing the typical desktop computing experience.…

  10. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Heide, Janus; Roetter, Daniel Enrique Lucani;

    2016-01-01

    Although cloud systems provide a reliable and flexible storage solution, the use of a single cloud service constitutes a single point of failure, which can compromise data availability, download speed, and security. To address these challenges, we advocate for the use of multiple cloud storage...... providers simultaneously using network coding as the key enabling technology. Our goal is to study two challenges of network coded storage systems. First, the efficient update of the number of coded fragments per cloud in a system aggregating multiple clouds in order to boost the download speed of files. We...... developed a novel scheme using recoding with limited packets to trade-off storage space, reliability, and data retrieval speed. Implementation and measurements with commercial cloud providers show that up to 9x less network use is needed compared to other network coding schemes, while maintaining similar...

  11. Electron cloud observations: a retrospective

    International Nuclear Information System (INIS)

    A growing number of observations of electron cloud effects (ECEs) have been reported in positron and proton rings. Low-energy, background electrons ubiquitous in high-intensity particle accelerators. Amplification of electron cloud (EC) can occur under certain operating conditions, potentially giving rise to numerous effects that can seriously degrade accelerator performance. EC observations and diagnostics have contributed to a better understanding of ECEs, in particular, details of beam-induced multipacting and cloud saturation effects. Such experimental results can be used to provide realistic limits on key input parameters for modeling efforts and analytical calculations to improve prediction capability. Electron cloud effects are increasingly important phenomena in high luminosity, high brightness, or high intensity machines - Colliders, Storage rings, Damping rings, Heavy ion beams. EC generation and instability modeling increasingly complex and benchmarked against in situ data: (delta), (delta)0, photon reflectivity, and SE energy distributions important. Surface conditioning and use of solenoidal windings in field-free regions are successful cures: will they be enough? What are new observations and how do they contribute to body of work and understanding physics of EC?

  12. SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Amina AIT OUAHMAN

    2014-10-01

    Full Text Available Today, cloud computing is defined and talked about across the ICT industry under different contexts and with different definitions attached to it. It is a new paradigm in the evolution of Information Technology, as it is one of the biggest revolutions in this field to have taken place in recent times. According to the National Institute for Standards and Technology (NIST, “cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction” [1]. The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. A study by Gartner [2] considered Cloud Computing as the first among the top 10 most important technologies and with a better prospect in successive years by companies and organizations. Clouds bring out tremendous benefits for both individuals and enterprises. Clouds support economic savings, outsourcing mechanisms, resource sharing, any-where any-time accessibility, on-demand scalability, and service flexibility. Clouds minimize the need for user involvement by masking technical details such as software upgrades, licenses, and maintenance from its customers. Clouds could also offer better security advantages over individual server deployments. Since a cloud aggregates resources, cloud providers charter expert security personnel while typical companies could be limited with a network administrator who might not be well versed in cyber security issues. The new concepts introduced by the clouds, such as computation outsourcing, resource sharing, and external data warehousing, increase the security and privacy concerns and create new security challenges. Moreover, the large scale of the clouds, the proliferation of mobile access devices (e

  13. ENHANCING SECURITY OF CLOUD DATA FROM DATA MINING BASED ON FULLY HOMOMORPHIC ENCRYPTION

    OpenAIRE

    Aachal R. Borkar*, Prof. Vijay Bagdi

    2016-01-01

    The advancement in technology, industry, e-commerce and research. A large amount of complex and pervasive digital data is being generated which is increasing at an exponential rate and often termed as Big data. For analyze and handling such big data various tools are available .The cloud computing is resolved for the problems arises in big data storage. Data security is major issues in the cloud can be enhance by fully homomorphic encryption technique. As the cloud, data storage can be manage...

  14. An Approach to Secure Resource Sharing Algorithm (SRSA) for Multi Cloud Environment

    OpenAIRE

    Er. Parul Indoria; Prof. Abhishek Didel

    2013-01-01

    Cloud computing is an idea intended to deliver computing and storage resources to a community of users. In a cloud computing environment a user can use applications without installing, and accessing personal files of any other user in the network. The cloud computing technology allows efficient computation by centralizing storage, memory and processing. The practice of computing in two or more data centers separated by the Internet in popularity due to an explosion in scalable ...

  15. Bioinformatics clouds for big data manipulation

    Directory of Open Access Journals (Sweden)

    Dai Lin

    2012-11-01

    Full Text Available Abstract As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS, Software as a Service (SaaS, Platform as a Service (PaaS, and Infrastructure as a Service (IaaS, and present our perspectives on the adoption of cloud computing in bioinformatics. Reviewers This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor.

  16. Bioinformatics clouds for big data manipulation

    KAUST Repository

    Dai, Lin

    2012-11-28

    As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS), Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), and present our perspectives on the adoption of cloud computing in bioinformatics.This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor. 2012 Dai et al.; licensee BioMed Central Ltd.

  17. Cloud Computing (1)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ Editor's Desk: Cloud computing is a topic of intense interest in the Internet field. Major IT giants have launched their own cloud computing products. This four-part lecture series will discuss cloud computing technology in the following aspects: The first part provides a brief description of the origin and characteristics of cloud computing from the users view of point; the other parts introduce typical applications of cloud computing, technically analyze the specific content within the cloud, its components, architecture and computational paradigm, compare cloud computing to other distributed computing technologies, and discuss its successful cases, commercial models, related technical and economic issues, and development trends.

  18. Cloud Computing (2)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ Editor's Desk: Cloud computing is a topic of intense interest in the Internet field. Major IT giants have launched their own cloud computing products. This four-part lecture series discusses cloud computing technology in the following aspects: The first part provided a brief description of the origin and characteristics of cloud computing from the users view of point; the other parts introduce typical applications of cloud computing, technically analyze the specific content within the cloud, its components, architecture and computational paradigm, compare cloud computing to other distributed computing technologies, and discuss its successful cases, commercial models, related technical and economic issues, and development trends.

  19. Dispersal and Diving Adjustments of the Green Turtle Chelonia mydas in Response to Dynamic Environmental Conditions during Post-Nesting Migration.

    Directory of Open Access Journals (Sweden)

    Philippine Chambault

    Full Text Available In response to seasonality and spatial segregation of resources, sea turtles undertake long journeys between their nesting sites and foraging grounds. While satellite tracking has made it possible to outline their migration routes, we still have little knowledge of how they select their foraging grounds and adapt their migration to dynamic environmental conditions. Here, we analyzed the trajectories and diving behavior of 19 adult green turtles (Chelonia mydas during their post-nesting migration from French Guiana and Suriname to their foraging grounds off the coast of Brazil. First Passage Time analysis was used to identify foraging areas located off Ceará state of Brazil, where the associated habitat corresponds to favorable conditions for seagrass growth, i.e. clear and shallow waters. The dispersal and diving patterns of the turtles revealed several behavioral adaptations to the strong hydrodynamic processes induced by both the North Brazil current and the Amazon River plume. All green turtles migrated south-eastward after the nesting season, confirming that they coped with the strong counter North Brazil current by using a tight corridor close to the shore. The time spent within the Amazon plume also altered the location of their feeding habitats as the longer individuals stayed within the plume, the sooner they initiated foraging. The green turtles performed deeper and shorter dives while crossing the mouth of the Amazon, a strategy which would help turtles avoid the most turbulent upper surface layers of the plume. These adjustments reveal the remarkable plasticity of this green turtle population when reducing energy costs induced by migration.

  20. Dispersal and Diving Adjustments of the Green Turtle Chelonia mydas in Response to Dynamic Environmental Conditions during Post-Nesting Migration.

    Science.gov (United States)

    Chambault, Philippine; Pinaud, David; Vantrepotte, Vincent; Kelle, Laurent; Entraygues, Mathieu; Guinet, Christophe; Berzins, Rachel; Bilo, Karin; Gaspar, Philippe; de Thoisy, Benoît; Le Maho, Yvon; Chevallier, Damien

    2015-01-01

    In response to seasonality and spatial segregation of resources, sea turtles undertake long journeys between their nesting sites and foraging grounds. While satellite tracking has made it possible to outline their migration routes, we still have little knowledge of how they select their foraging grounds and adapt their migration to dynamic environmental conditions. Here, we analyzed the trajectories and diving behavior of 19 adult green turtles (Chelonia mydas) during their post-nesting migration from French Guiana and Suriname to their foraging grounds off the coast of Brazil. First Passage Time analysis was used to identify foraging areas located off Ceará state of Brazil, where the associated habitat corresponds to favorable conditions for seagrass growth, i.e. clear and shallow waters. The dispersal and diving patterns of the turtles revealed several behavioral adaptations to the strong hydrodynamic processes induced by both the North Brazil current and the Amazon River plume. All green turtles migrated south-eastward after the nesting season, confirming that they coped with the strong counter North Brazil current by using a tight corridor close to the shore. The time spent within the Amazon plume also altered the location of their feeding habitats as the longer individuals stayed within the plume, the sooner they initiated foraging. The green turtles performed deeper and shorter dives while crossing the mouth of the Amazon, a strategy which would help turtles avoid the most turbulent upper surface layers of the plume. These adjustments reveal the remarkable plasticity of this green turtle population when reducing energy costs induced by migration. PMID:26398528

  1. Fast growing, healthy and resident green turtles (Chelonia mydas at two neritic sites in the central and northern coast of Peru: implications for conservation.

    Directory of Open Access Journals (Sweden)

    Ximena Velez-Zuazo

    Full Text Available In order to enhance protection and conservation strategies for endangered green turtles (Chelonia mydas, the identification of neritic habitats where this species aggregates is mandatory. Herein, we present new information about the population parameters and residence time of two neritic aggregations from 2010 to 2013; one in an upwelling dominated site (Paracas ∼14°S and the other in an ecotone zone from upwelling to warm equatorial conditions (El Ñuro ∼4°S in the Southeast Pacific. We predicted proportionally more adult individuals would occur in the ecotone site; whereas in the site dominated by an upwelling juvenile individuals would predominate. At El Ñuro, the population was composed by (15.3% of juveniles, (74.9% sub-adults, and (9.8% adults, with an adult sex ratio of 1.16 males per female. Times of residence in the area ranged between a minimum of 121 and a maximum of 1015 days (mean 331.1 days. At Paracas the population was composed by (72% of juveniles and (28% sub-adults, no adults were recorded, thus supporting the development habitat hypothesis stating that throughout the neritic distribution there are sites exclusively occupied by juveniles. Residence time ranged between a minimum of 65 days and a maximum of 680 days (mean 236.1. High growth rates and body condition index values were estimated suggesting healthy individuals at both study sites. The population traits recorded at both sites suggested that conditions found in Peruvian neritic waters may contribute to the recovery of South Pacific green turtles. However, both aggregations are still at jeopardy due to pollution, bycatch and illegal catch and thus require immediate enforcing of conservation measurements.

  2. Morfometria do coração e dos vasos da base e sua implicação no mergulho em Chelonia mydas

    Directory of Open Access Journals (Sweden)

    Janine K.F.S. Braz

    2013-12-01

    Full Text Available Objetivou-se caracterizar a morfologia das câmaras cardíacas e das artérias aortas e pulmonares da espécie Chelonia mydas. Foram avaliados 11 espécimes de C. mydas mortas coletadas no litoral do estado do Rio Grande do Norte, Brasil. Os animais foram necropsiados para a obtenção do coração, fragmentos das artérias aorta e pulmonares direita e esquerda. Os vasos adquiridos foram fixados em formol e submetidos ao processamento histológico de rotina e coloração com Técnica de Verhoff modificada. Enquanto, do coração, os parâmetros largura, altura base-ápice e a circunferência ventricular foram mensurados por meio do paquímetro. Nessa espécie a microscopia das artérias pulmonares e artérias aortas variaram de acordo com o antímero. A maior espessura relativa do Cavum Venosum (CV auxilia no bombeamento cardíaco durante o mergulho e sua menor espessura direita é uma vantagem para a dilatação ventricular durante a imersão profunda enquanto que a quantificação das lâminas elásticas e fibras musculares da túnica média das artérias aortas e pulmonares direita e esquerda comprovaram que a túnica média das aortas predomina o componente elástico vs. muscular, entretanto, nas artérias pulmonares o componente elástico não-predomina. Essa angioarquitetura pode estar relacionada com a capacidade de mergulho, favorecendo um maior aproveitamento do sangue oxigenado armazenado previamente durante o período de apneia.

  3. Enabling Network-Aware Cloud Networked Robots with Robot Operating System : A machine learning-based approach

    OpenAIRE

    Nordlund, Fredrik Hans

    2015-01-01

    During the recent years, a new area called Cloud Networked Robotics (CNR) has evolved from conventional robotics, thanks to the increasing availability of cheap robot systems and steady improvements in the area of cloud computing. Cloud networked robots refers to robots with the ability to offload computation heavy modules to a cloud, in order to make use of storage, scalable computation power, and other functionalities enabled by a cloud such as shared knowledge between robots on a global le...

  4. The CLOUD experiment

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The Cosmics Leaving Outdoor Droplets (CLOUD) experiment as shown by Jasper Kirkby (spokesperson). Kirkby shows a sketch to illustrate the possible link between galactic cosmic rays and cloud formations. The CLOUD experiment uses beams from the PS accelerator at CERN to simulate the effect of cosmic rays on cloud formations in the Earth's atmosphere. It is thought that cosmic ray intensity is linked to the amount of low cloud cover due to the formation of aerosols, which induce condensation.

  5. Cloud Computing (3)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ Editor's Desk: In the preceding two parts of this series, several aspects of cloud computing-including definition, classification, characteristics, typical applications, and service levels-were discussed. This part continues with a discussion of Cloud Computing Oopen Architecture and Market-Oriented Cloud. A comparison is made between cloud computing and other distributed computing technologies, and Google's cloud platform is analyzed to determine how distributed computing is implemented in its particular model.

  6. Telemedicine Based on Mobile Devices and Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Lidong Wang

    2014-04-01

    Full Text Available Mobile devices such as smartphones and tablets support kinds of mobile computing and services. They can access to the cloud or offload the computation-intensive part to the cloud computing resources. Mobile cloud computing (MCC integrates the cloud computing into the mobile environment, which extends mobile devices’ battery lifetime, improves their data storage capacity and processing power, and improves their reliability and information security. In this paper, the applications of smartphones in telemedicine and MCC-based telemedicine were presented. Issues on the information security of smartphones and tablets, challenges of smartphones in telemedicine and challenges of MCC-based telemedicine were also introduced.

  7. Cloud security - An approach with modern cryptographic solutions

    OpenAIRE

    KOSTADINOVSKA, IVANA

    2016-01-01

    The term “cloud computing” has been in the spotlights of IT specialists due to its potential of transforming computer industry. Unfortunately, there are still some challenges to be resolved and the security aspects in the cloud based computing environment remain at the core of interest. The goal of our work is to identify the main security issues of cloud computing and to present approaches to secure clouds. Our research also focuses on data and storage security layers. As a result, we f...

  8. Cloud computing and digital media fundamentals, techniques, and applications

    CERN Document Server

    Li, Kuan-Ching; Shih, Timothy K

    2014-01-01

    Cloud Computing and Digital Media: Fundamentals, Techniques, and Applications presents the fundamentals of cloud and media infrastructure, novel technologies that integrate digital media with cloud computing, and real-world applications that exemplify the potential of cloud computing for next-generation digital media. It brings together technologies for media/data communication, elastic media/data storage, security, authentication, cross-network media/data fusion, interdevice media interaction/reaction, data centers, PaaS, SaaS, and more.The book covers resource optimization for multimedia clo

  9. Design Private Cloud of Oil and Gas SCADA System

    Directory of Open Access Journals (Sweden)

    Liu Miao

    2014-05-01

    Full Text Available SCADA (Supervisory Control and Data Acquisition system is computer control system based on supervisory. SCADA system is very important to oil and gas pipeline engineering. Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated, managed and consumed. In order to increase resource utilization, reliability and availability of oil and gas pipeline SCADA system, the SCADA system based on cloud computing is proposed in the paper. This paper introduces the system framework of SCADA system based on cloud computing and the realization details about the private cloud platform of SCADA system.

  10. Crushing data silos with ownCloud

    CERN Document Server

    CERN. Geneva

    2013-01-01

    More and more people store their personal files and documents in cloud services like Dropbox, Google Drive, Skydrive or iCloud. The reason is that they provide convenient features to sync your files between devices and share them with others. We are heading full speed into a future where a huge piece of the personal information of the world is stored in very few centralized services. Questions emerge what the impact on user privacy, surveillance, lawfulness of content and storage cost will be in in the long run. I don't think that a world where most of the personal data of the world is stored on servers of a hand full companies is a good one. This talk will discuss the problems of a future with centralized cloud file sync and share services and will present ownCloud as a possible solution. ownCloud is a free software project that offers a decentralized alternative to proprietary cloud services where everybody can run an own cloud service comparable with Dropbox but on own hardware and with full ...

  11. A Cost-Effective Strategy for Storing Scientific Datasets with Multiple Service Providers in the Cloud

    OpenAIRE

    Yuan, Dong; Cui, Lizhen; Liu, Xiao; Fu, Erjiang; Yang, Yun

    2016-01-01

    Cloud computing provides scientists a platform that can deploy computation and data intensive applications without infrastructure investment. With excessive cloud resources and a decision support system, large generated data sets can be flexibly 1 stored locally in the current cloud, 2 deleted and regenerated whenever reused or 3 transferred to cheaper cloud service for storage. However, due to the pay for use model, the total application cost largely depends on the usage of computation, stor...

  12. Migration to the Cloud Ecosystem: Ushering in a New Generation of Platform Competition

    OpenAIRE

    2012-01-01

    Cloud computing is defined to be Internet based computing technology, where the term 'cloud' simply means Internet -- and cloud computing refers to services that are accessed directly over the Internet. There are essentially three categories of cloud computing. (i) Iaas (Infrastructure as a Service) -- number crunching, data storage and management services (computer servers), (ii), SaaS (Software as a Service) -- ‘web based’ applications, and (iii) PaaS (Platform as a Service) -- essentially ...

  13. Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach

    OpenAIRE

    Damiani, E; Pagano, F

    2010-01-01

    Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for multiuser databases. Users, however, are very diffident for not having full control over their sensitive data. Untrusted database-as-a-server techniques are neither readily extendable to the cloud environment nor easily understandable by non-tec...

  14. Like Open Source, Cloud Hides in Plain Sight

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ I came across an article in InfoWorld about a survey that TheInfoPro conducted among Fortune 1000 firms regarding their use of public cloud storage offerings.The bottom line: they haven't, they aren't, and they won't.Eightyseven percent of respondents stated they have no plans to use public storage-as-a-service, while only 10% say that they will.Clearly, the survey indicates this market segment has no use for cloud storage.

  15. Relationship between cloud radiative forcing, cloud fraction and cloud albedo, and new surface-based approach for determining cloud albedo

    OpenAIRE

    Liu, Y; Wu, W.; Jensen, M. P.; T. Toto

    2011-01-01

    This paper focuses on three interconnected topics: (1) quantitative relationship between surface shortwave cloud radiative forcing, cloud fraction, and cloud albedo; (2) surfaced-based approach for measuring cloud albedo; (3) multiscale (diurnal, annual and inter-annual) variations and covariations of surface shortwave cloud radiative forcing, cloud fraction, and cloud albedo. An analytical expression is first derived to quantify the relationship between cloud radiative forcing, cloud fractio...

  16. Cloud CCN feedback

    International Nuclear Information System (INIS)

    Cloud microphysics affects cloud albedo precipitation efficiency and the extent of cloud feedback in response to global warming. Compared to other cloud parameters, microphysics is unique in its large range of variability and the fact that much of the variability is anthropogenic. Probably the most important determinant of cloud microphysics is the spectra of cloud condensation nuclei (CCN) which display considerable variability and have a large anthropogenic component. When analyzed in combination three field observation projects display the interrelationship between CCN and cloud microphysics. CCN were measured with the Desert Research Institute (DRI) instantaneous CCN spectrometer. Cloud microphysical measurements were obtained with the National Center for Atmospheric Research Lockheed Electra. Since CCN and cloud microphysics each affect the other a positive feedback mechanism can result

  17. Trusted Cloud Platform for Cloud Infrastructure

    OpenAIRE

    Punit Gupta; Deepika Agrawal

    2013-01-01

    Reliability and trust Models are used to enhance secure , reliable scheduling , load balancing and QoS in cloud and Distributed environment. Trust models that are being used in Distributed and Grid environment, does not qualify cloud computing environment requirements. Since the parameters that have being taken into consideration in these trust models, does not fit in the cloud Infrastructure As A Service, a suitable trust model is proposed based on the existing model that is suitable for tru...

  18. Secure cloud computing

    CERN Document Server

    Jajodia, Sushil; Samarati, Pierangela; Singhal, Anoop; Swarup, Vipin; Wang, Cliff

    2014-01-01

    This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters addres

  19. Proposed congestion control method for cloud computing environments

    CERN Document Server

    Kuribayashi, Shin-ichi

    2012-01-01

    As cloud computing services rapidly expand their customer base, it has become important to share cloud resources, so as to provide them economically. In cloud computing services, multiple types of resources, such as processing ability, bandwidth and storage, need to be allocated simultaneously. If there is a surge of requests, a competition will arise between these requests for the use of cloud resources. This leads to the disruption of the service and it is necessary to consider a measure to avoid or relieve congestion of cloud computing environments. This paper proposes a new congestion control method for cloud computing environments which reduces the size of required resource for congested resource type instead of restricting all service requests as in the existing networks. Next, this paper proposes the user service specifications for the proposed congestion control method, and clarifies the algorithm to decide the optimal size of required resource to be reduced, based on the load offered to the system. I...

  20. DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Rajeev BV

    2013-02-01

    Full Text Available ABSTRACT There are many challenges that the developers will come across while developing or migrating applications to cloud. This paper intends to discuss various points that the developers need to be aware of during the development or migration of the application to the cloud in terms of various parameters like security, manageability, optimal storage transactions, programmer productivity, debugging and profiling, etc. The paper provides insights into how to overcome these challenges when developing / migrating the on-premise application on to cloud and the difference in programming when targeting the on-premise data center and cloud. The primary focus area for cloud in this paper would be on Microsoft Windows Azure, Google App Engine and Amazon cloud.

  1. A Swarm Intelligence Based Model for Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ahmed S. Salama

    2015-01-01

    Full Text Available Mobile Computing (MC provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC. MCC aims at using cloud computing techniques for storage and processing of data on mobile devices, thereby reducing their limitations. This paper proposes architecture for a Swarm Intelligence Based Mobile Cloud Computing Model (SIBMCCM. A model that uses a proposed Parallel Particle Swarm Optimization (PPSO algorithm to enhance the access time for the mobile cloud computing services which support different E Commerce models and to better secure the communication through the mobile cloud and the mobile commerce transactions.

  2. Automated Grid Monitoring for LHCb through HammerCloud

    CERN Document Server

    CERN. Geneva

    2015-01-01

    The HammerCloud system is used by CERN IT to monitor the status of the Worldwide LHC Computing Grid (WLCG). HammerCloud automatically submits jobs to WLCG computing resources, closely replicating the workflow of Grid users (e.g. physicists analyzing data). This allows computation nodes and storage resources to be monitored, software to be tested (somewhat like continuous integration), and new sites to be stress tested with a heavy job load before commissioning. The HammerCloud system has been in use for ATLAS and CMS experiments for about five years. This summer's work involved porting the HammerCloud suite of tools to the LHCb experiment. The HammerCloud software runs functional tests and provides data visualizations. HammerCloud's LHCb variant is written in Python, using the Django web framework and Ganga/DIRAC for job management.

  3. ABOUT THE SUITABILITY OF CLOUDS IN HIGH-PERFORMANCE COMPUTING

    Directory of Open Access Journals (Sweden)

    Harald Richter

    2016-01-01

    Full Text Available Cloud computing has become the ubiquitous computing and storage paradigm. It is also attractive for scientists, because they do not have to care any more for their own IT infrastructure, but can outsource it to a Cloud Service Provider of their choice. However, for the case of High-Performance Computing (HPC in a cloud, as it is needed in simulations or for Big Data analysis, things are getting more intricate, because HPC codes must stay highly efficient, even when executed by many virtual cores (vCPUs. Older clouds or new standard clouds can fulfil this only under special precautions, which are given in this article. The results can be extrapolated to other cloud OSes than OpenStack and to other codes than OpenFOAM, which were used as examples.

  4. ownCloud project at CNRS

    CERN Document Server

    CERN. Geneva

    2014-01-01

    CNRS will launch next November an ownCloud based service with the intend to serve CNRS research units. The first step is to deploy this service as a beta solution for 2 months and 2 000 end users, and then to generalize this offer to the whole CNRS users (potentialy 100 000 users). Our platform is based on ownCloud 7 community edition, with VMWare for virtualization, a Galera/MariaDB cluster database and Scality for the distributed storage backend. We will try to present during this workshop our service implementation in detail, and discuss about our choices, our concerns, … our troubles :)

  5. Concentrations and distributions of metals in tissues of stranded green sea turtles (Chelonia mydas) from the southern Atlantic coast of Brazil

    International Nuclear Information System (INIS)

    Silver (Ag), cadmium (Cd), copper (Cu), lead (Pb) and zinc (Zn) concentrations were analyzed in tissues of juvenile green sea turtles (Chelonia mydas) found stranded along the southern Atlantic coast in Brazil. Green sea turtles were collected (n = 29), measured (curved carapace length: CCL) and had their muscle, liver, and kidney dissected for metal concentration measurements. Sex was identified in 18 individuals (10 females and 8 males) through gonad histology. No gender differences in CCL and tissue metal concentrations were observed. In the muscle, there was a negative correlation between CCL and Cd and Cu concentrations. Metal concentrations were lower in the muscle than in the liver and kidney. Zn concentration in the muscle was the highest of all metals analyzed (16.6 mg/kg). The kidney showed the highest concentrations of Pb, Cd and Zn (5.4, 28.3 and 54.3 mg/kg, respectively), while the liver had the highest values of Ag and Cu (0.8 and 100.9 mg/kg, respectively). Tissue Ag, Zn and Cd concentrations were similar to those found in green sea turtles from other regions while Cu and Pb values were elevated, likely due to the metal-rich water and sediment reported in the collection area. In the liver and kidney, concentrations of non-essential (Ag, Cd and Pb) and essential (Cu or Zn) metals were positively correlated, likely due to an induced metallothionein synthesis to protect tissue against the toxic effect of metals. This is the first study to report and correlate the concentrations of essential and non-essential metals in tissues of green sea turtles in the Brazilian southern Atlantic coast, an important feeding and developing area for this turtle species. - Highlights: •Juvenile female and male green sea turtles have similar concentrations of metals. •Kidney accumulated more Cd, Pb and Zn while liver accumulated more Ag and Cu. •Cu and Pb concentrations are elevated in liver of sea turtles from southern Brazil. •Concentrations of Cd and Cu in

  6. Microstructure and Identification of Peripheral Blood in Chelonia mydas%绿海龟外周血细胞显微结构与分类

    Institute of Scientific and Technical Information of China (English)

    李长玲; 曹伏君; 黄翔鹄; 刘楚吾; 麦哲文

    2008-01-01

    对绿海龟(Chelonia mydas)外周血细胞的进行显微观察.结果表明,经Wright's染液染色,可鉴定出红血细胞、单核细胞、淋巴细胞、血栓细胞、嗜酸性粒细胞、嗜碱性粒细胞、嗜中性粒细胞等七种血细胞.其中红血细胞数量多,长椭圆形,具圆核.白细胞数量少,多为圆形,分无颗粒型白细胞和颗粒型白细胞两种.无颗粒型白细胞包括单核细胞和淋巴细胞,细胞质中无特殊颗粒;颗粒型白细胞包括嗜酸性粒细胞、嗜碱性粒细胞和嗜中性粒细胞,细胞质中具有特殊颗粒.在白血细胞中,血栓细胞体积最小,单核细胞体积最大;在数量上,血栓细胞最多,淋巴细胞次之.单核细胞和嗜碱性粒细胞则较少.绿海龟的淋巴细胞可分为大淋巴细胞和小淋巴细胞两种类型.在外周血细胞中可观察到分解、解体状态的红血细胞,还可观察到少量未成熟的红血细胞和嗜中性粒细胞,偶尔可见正在分裂的红血细胞,提示红血细胞也可在外周血直接分裂.

  7. Concentrations and distributions of metals in tissues of stranded green sea turtles (Chelonia mydas) from the southern Atlantic coast of Brazil

    Energy Technology Data Exchange (ETDEWEB)

    da Silva, Cinthia Carneiro [Programa de Pós-Graduação em Ciências Fisiológicas – Fisiologia Animal Comparada, Instituto de Ciências Biológicas, Universidade Federal do Rio Grande, Av. Itália km 8, 96203-900, Rio Grande, Rio Grande do Sul (Brazil); Varela, Antonio Sergio; Barcarolli, Indianara Fernanda [Instituto de Ciências Biológicas, Universidade Federal do Rio Grande, Av. Itália km 8, 96203-900, Rio Grande, Rio Grande do Sul (Brazil); Bianchini, Adalto, E-mail: adaltobianchini@furg.br [Programa de Pós-Graduação em Ciências Fisiológicas – Fisiologia Animal Comparada, Instituto de Ciências Biológicas, Universidade Federal do Rio Grande, Av. Itália km 8, 96203-900, Rio Grande, Rio Grande do Sul (Brazil); Instituto de Ciências Biológicas, Universidade Federal do Rio Grande, Av. Itália km 8, 96203-900, Rio Grande, Rio Grande do Sul (Brazil)

    2014-01-01

    Silver (Ag), cadmium (Cd), copper (Cu), lead (Pb) and zinc (Zn) concentrations were analyzed in tissues of juvenile green sea turtles (Chelonia mydas) found stranded along the southern Atlantic coast in Brazil. Green sea turtles were collected (n = 29), measured (curved carapace length: CCL) and had their muscle, liver, and kidney dissected for metal concentration measurements. Sex was identified in 18 individuals (10 females and 8 males) through gonad histology. No gender differences in CCL and tissue metal concentrations were observed. In the muscle, there was a negative correlation between CCL and Cd and Cu concentrations. Metal concentrations were lower in the muscle than in the liver and kidney. Zn concentration in the muscle was the highest of all metals analyzed (16.6 mg/kg). The kidney showed the highest concentrations of Pb, Cd and Zn (5.4, 28.3 and 54.3 mg/kg, respectively), while the liver had the highest values of Ag and Cu (0.8 and 100.9 mg/kg, respectively). Tissue Ag, Zn and Cd concentrations were similar to those found in green sea turtles from other regions while Cu and Pb values were elevated, likely due to the metal-rich water and sediment reported in the collection area. In the liver and kidney, concentrations of non-essential (Ag, Cd and Pb) and essential (Cu or Zn) metals were positively correlated, likely due to an induced metallothionein synthesis to protect tissue against the toxic effect of metals. This is the first study to report and correlate the concentrations of essential and non-essential metals in tissues of green sea turtles in the Brazilian southern Atlantic coast, an important feeding and developing area for this turtle species. - Highlights: •Juvenile female and male green sea turtles have similar concentrations of metals. •Kidney accumulated more Cd, Pb and Zn while liver accumulated more Ag and Cu. •Cu and Pb concentrations are elevated in liver of sea turtles from southern Brazil. •Concentrations of Cd and Cu in

  8. Congestions control through cloud computing with MANET

    Directory of Open Access Journals (Sweden)

    Mr. Ajey Singh

    2012-06-01

    Full Text Available Adhoc network is collection of temporary nodes thatare capable of dynamic forming temporary network,self-organize, and infrastructure less with nodescontains routing capability. As cloud computingservices rapidly expand their customer base, it hasbecome important to share cloud resources, so as toprovide them economically. In cloud computingservices, multiple types of resources, such asprocessing ability, bandwidth and storage, need tobe allocated simultaneously. If there is a surge ofrequests, a competition will arise between theserequests for the use of cloud resources. This leads tothe disruption of the service and it is necessary toconsider a measure to avoid or relieve congestion ofcloud computing environments. This dissertationproposes a new congestion control method for cloudcomputing environments which reduces the size ofpacket drop rate for congested resource type insteadof restricting all service requests as in the existingnetworks. We apply Queue based technique anddifferentiate between the queue based techniquewith cloud queue based technique .Here we use NS-2.31 simulator for simulation of MANET and takecomparative analysis between cloud and wirelessnetwork mechanism.

  9. Cloud computing strategies

    CERN Document Server

    Chorafas, Dimitris N

    2011-01-01

    A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy. Based on extensive research, it examines the opportunities and challenges that loom in the cloud. It explains exactly what cloud computing is, what it has to offer, and calls attention to the important issues management needs to consider before passing the point of no return regarding financial commitments.

  10. Virtualizace a cloud computing

    OpenAIRE

    Davídek, Michal

    2013-01-01

    The aim of this diploma thesis are current computing technologies known as Cloud computing. Main goal is to compare technologies and Cloud services provided by companies nowadays. During this thesis will be proven or not, that usage of Cloud technologies can save company finance due to optimized data management, effective backups, license administration or management of computing resources for single applications/users. Final part will present recommendations for Cloud Service providers or en...

  11. CloudWF: A Computational Workflow System for Clouds Based on Hadoop

    Science.gov (United States)

    Zhang, Chen; de Sterck, Hans

    This paper describes CloudWF, a scalable and lightweight computational workflow system for clouds on top of Hadoop. CloudWF can run workflow jobs composed of multiple Hadoop MapReduce or legacy programs. Its novelty lies in several aspects: a simple workflow description language that encodes workflow blocks and block-to-block dependencies separately as standalone executable components; a new workflow storage method that uses Hadoop HBase sparse tables to store workflow information internally and reconstruct workflow block dependencies implicitly for efficient workflow execution; transparent file staging with Hadoop DFS; and decentralized workflow execution management relying on the MapReduce framework for task scheduling and fault tolerance. This paper describes the design and implementation of CloudWF.

  12. Cloud Oriented Applications

    OpenAIRE

    Razvan DINA

    2009-01-01

    Cloud computing is a paradigm that incorporates the concept of software as a service. The current cloud computing architecture involves the existence of data centers that are able to provide services to the clients located all over the world. The major players in field of the cloud computing are Google, Microsoft, Amazon, Yahoo, and some traditional hardware producers like HP, IBM, Intel.

  13. Introduction to Cloud Computing

    OpenAIRE

    Conway, Gerry

    2011-01-01

    This paper describes cloud computing, its main characteristics and the models that are currently used for both deployment and delivery. It examines the benefits and business issues with using the cloud, and how they can be addressed. It describes some of the early adapters of cloud computing, together with their experiences.

  14. On CLOUD nine

    CERN Multimedia

    2009-01-01

    The team from the CLOUD experiment - the world’s first experiment using a high-energy particle accelerator to study the climate - were on cloud nine after the arrival of their new three-metre diameter cloud chamber. This marks the end of three years’ R&D and design, and the start of preparations for data taking later this year.

  15. Cloud Computing Explained

    Science.gov (United States)

    Metz, Rosalyn

    2010-01-01

    While many talk about the cloud, few actually understand it. Three organizations' definitions come to the forefront when defining the cloud: Gartner, Forrester, and the National Institutes of Standards and Technology (NIST). Although both Gartner and Forrester provide definitions of cloud computing, the NIST definition is concise and uses…

  16. On clocks and clouds

    Directory of Open Access Journals (Sweden)

    M. K. Witte

    2013-09-01

    Full Text Available Cumulus clouds exhibit a life cycle that consists of: (a the growth phase (increasing size, most notably in the vertical direction; (b the mature phase (growth ceases; any precipitation that develops is strongest during this period; and (c the dissipation phase (cloud dissipates because of precipitation and/or entrainment; no more dynamical support. Although radar can track clouds over time and give some sense of the age of a cloud, most aircraft in situ measurements lack temporal context. We use large eddy simulations of trade wind cumulus cloud fields from cases during the Barbados Oceanographic and Meteorological Experiment (BOMEX and Rain In Cumulus over the Ocean (RICO campaigns to demonstrate a potential cumulus cloud "clock". We find that the volume-averaged total water mixing ratio rt is a useful cloud clock for the 12 clouds studied. A cloud's initial rt is set by the subcloud mixed-layer mean rt and decreases monotonically from the initial value due primarily to entrainment. The clock is insensitive to aerosol loading, environmental sounding and extrinsic cloud properties such as lifetime and volume. In some cases (more commonly for larger clouds, multiple pulses of buoyancy occur, which complicate the cumulus clock by replenishing rt. The clock is most effectively used to classify clouds by life phase.

  17. Study and Analysis of Data Sharing and Communication with Multiple Cloud Environments

    Directory of Open Access Journals (Sweden)

    Ms. Shikha Joshi ,Ms. Pallavi Jain

    2012-12-01

    Full Text Available Cloud storage enables users to access their data anywhere and at any time. It achieves the dream of getting computing, storage and communication resources as easy as to get water and electricity. All resources can be gotten in a plug-andplay way. It has the advantages of high scalability, ease-ofuse, cost-effectiveness and simplifying infrastructure planning etc. However, the emerging use of cloud storage has led to the problem of verifying that storage server indeed store the data. When users store their data in cloud storage, they mostly concern about whether the data is intact. In this paper we propose an efficient approach for making cloud data management and sharing in a secure manner. For this we mainly concentrate on six different security majors which are Confidentiality, Availability, Integrity, Possession, Authenticity and Utility. We implement these phenomena in java. We also present a graph comparison to show the betterment of our result.

  18. Point Cloud Server (pcs) : Point Clouds In-Base Management and Processing

    Science.gov (United States)

    Cura, R.; Perret, J.; Paparoditis, N.

    2015-08-01

    In addition to the traditional Geographic Information System (GIS) data such as images and vectors, point cloud data has become more available. It is appreciated for its precision and true three-Dimensional (3D) nature. However, managing the point cloud can be difficult due to scaling problems and specificities of this data type. Several methods exist but are usually fairly specialised and solve only one aspect of the management problem. In this work, we propose a complete and efficient point cloud management system based on a database server that works on groups of points rather than individual points. This system is specifically designed to solve all the needs of point cloud users: fast loading, compressed storage, powerful filtering, easy data access and exporting, and integrated processing. Moreover, the system fully integrates metadata (like sensor position) and can conjointly use point clouds with images, vectors, and other point clouds. The system also offers in-base processing for easy prototyping and parallel processing and can scale well. Lastly, the system is built on open source technologies; therefore it can be easily extended and customised. We test the system will several billion points of point clouds from Lidar (aerial and terrestrial ) and stereo-vision. We demonstrate ~ 400 million pts/h loading speed, user-transparent greater than 2 to 4:1 compression ratio, filtering in the approximately 50 ms range, and output of about a million pts/s, along with classical processing, such as object detection.

  19. Cloud Service Standard Expectations of Cloud Computing%云计算中的云服务标准期望

    Institute of Scientific and Technical Information of China (English)

    李渊

    2014-01-01

    云计算是能够使用户在互连网上使用应用程序的一种环境,可进行数据的存储和保护。云计算中需要定期备份云存储数据,管理员期望能够在云停机后将数据完整地恢复到云中。这种简单的做法存在潜在的缺陷,数据管理系统可能会被锁死在服务提供商专用的云服务与存储方法中。云服务标准可以解决并纠正基本的数据传输故障。分析了云服务用户对云互操作性的期望,并说明了各个云服务标准组织以及它们提供的解决方案。%Cloud computing is the ability to enable users to interconnect applications online using an environment for data storage and protection, while providing services. Cloud computing cloud storage needs to regularly back up data, administrators expect to shut down after the data in the cloud completely restored to the cloud. This simple approach the has potential defects. Data manage ment in the system administrators of may be locked in the service provider dedicated cloud services and storage methods. Cloud service standards can be addressed and corrected basic data transmission failures. In this paper,the cloud service user expectations of cloud interoperabilit is analyzed, and describes the various standards organizations and their cloud services to provide solutions.

  20. Cloud Computing Bible

    CERN Document Server

    Sosinsky, Barrie

    2010-01-01

    The complete reference guide to the hot technology of cloud computingIts potential for lowering IT costs makes cloud computing a major force for both IT vendors and users; it is expected to gain momentum rapidly with the launch of Office Web Apps later this year. Because cloud computing involves various technologies, protocols, platforms, and infrastructure elements, this comprehensive reference is just what you need if you'll be using or implementing cloud computing.Cloud computing offers significant cost savings by eliminating upfront expenses for hardware and software; its growing popularit

  1. The Magellanic clouds

    International Nuclear Information System (INIS)

    As the two galaxies nearest to our own, the Magellanic Clouds hold a special place in studies of the extragalactic distance scale, of stellar evolution and the structure of galaxies. In recent years, results from the South African Astronomical Observatory (SAAO) and elsewhere have shown that it is possible to begin understanding the three dimensional structure of the Clouds. Studies of Magellanic Cloud Cepheids have continued, both to investigate the three-dimensional structure of the Clouds and to learn more about Cepheids and their use as extragalactic distance indicators. Other research undertaken at SAAO includes studies on Nova LMC 1988 no 2 and red variables in the Magellanic Clouds

  2. Corona Discharge in Clouds

    Science.gov (United States)

    Sin'kevich, A. A.; Dovgalyuk, Yu. A.

    2014-04-01

    We present a review of the results of theoretical studies and laboratory modeling of corona discharge initiation in clouds. The influence of corona discharges on the evolution of the cloud microstructure and electrification is analyzed. It is shown that corona discharges are initiated when large-size hydrometeors approach each other, whereas in some cases, corona discharges from crystals, ice pellets, and hailstones can appear. The corona discharges lead to significant air ionization, charging of cloud particles, and separation of charges in clouds and initiate streamers and lightnings. The influence of corona discharges on changes in the phase composition of clouds is analyzed.

  3. Building Low Cost Cloud Computing Systems

    Directory of Open Access Journals (Sweden)

    Carlos Antunes

    2013-06-01

    Full Text Available The actual models of cloud computing are based in megalomaniac hardware solutions, being its implementation and maintenance unaffordable to the majority of service providers. The use of jail services is an alternative to current models of cloud computing based on virtualization. Models based in utilization of jail environments instead of the used virtualization systems will provide huge gains in terms of optimization of hardware resources at computation level and in terms of storage and energy consumption. In this paper it will be addressed the practical implementation of jail environments in real scenarios, which allows the visualization of areas where its application will be relevant and will make inevitable the redefinition of the models that are currently defined for cloud computing. In addition it will bring new opportunities in the development of support features for jail environments in the majority of operating systems.

  4. Diagnostic for Electron Clouds Trapped in Quadrupoles

    CERN Document Server

    Macek, Robert J

    2005-01-01

    Simulations have indicated that electron clouds generated by beam-induced multipactor can be trapped in the mirror-like fields of magnetic quadrupoles and thereby contribute significantly to the electron cloud buildup in high intensity accelerators and storage rings. This could be the most important source of electrons driving the two-stream (e-p) instability at the Los Alamos PSR and may also play a significant role in electron cloud effects at some of the new high intensity accelerator projects. We will describe the physics design and optimization of an electron-sweeping detector designed to measure the trapped electrons at various times after the beam pulse has passed. The instrument can also serve as an electro-magnetically shielded detector providing a signal obtained from electrons striking the wall during the passage of beam bunches.

  5. Resource Monitoring Algorithms Evaluation For Cloud Environment

    Directory of Open Access Journals (Sweden)

    Mustafa M. Al-Sayed

    2013-12-01

    Full Text Available Cloud computing is a type of distributed computing allowing to share many resources such as CPU, memory, storage ...etc. The status of these resources changes from time to time due to the dynamic adaptive ability of the cloud computing characteristics. Hence, the powerful and scalable monitoring algorithm is needed to monitor the status of these resources throughout the time. There are many models have been proposed for monitoring the distributed systems resources; the push-based, the pull-based, and the push/pull model. Most of the common monitoring systems are based on these models (e.g., Ganglia which based on push model and Nagios, which based on pull model. According to the work in this paper, a comparative study has been done to implement and evaluate these three models on the cloud environment. The implementation results showed that the push-based model outperforms the other two models due to its high scalability, stability, and efficiency.

  6. Cloud Databases: A Paradigm Shift in Databases

    OpenAIRE

    Indu Arora; Anu Gupta

    2012-01-01

    Relational databases ruled the Information Technology (IT) industry for almost 40 years. But last few years have seen sea changes in the way IT is being used and viewed. Stand alone applications have been replaced with web-based applications, dedicated servers with multiple distributed servers and dedicated storage with network storage. Cloud computing has become a reality due to its lesser cost, scalability and pay-as-you-go model. It is one of the biggest changes in IT after the rise of Wor...

  7. An Approach to Secure Resource Sharing Algorithm (SRSA for Multi Cloud Environment

    Directory of Open Access Journals (Sweden)

    Er. Parul Indoria

    2013-12-01

    Full Text Available Cloud computing is an idea intended to deliver computing and storage resources to a community of users. In a cloud computing environment a user can use applications without installing, and accessing personal files of any other user in the network. The cloud computing technology allows efficient computation by centralizing storage, memory and processing. The practice of computing in two or more data centers separated by the Internet in popularity due to an explosion in scalable computing needs grow. However, one of the most important challenges for the cloud as the backup and protection of data and processes information from users. Security of cloud computing environment is a new research area, the further development of both the associations of academic and industrial research. In order to create secure and reliable services in cloud computing environment is major concerning issue. This paper focuses more on the subject related to the securely resource sharing and privacy aspects in cloud computing environment, such as data integrity, data compromise, service availability. It proposes a new approach “An Approach to Secure Resource Sharing Algorithm (SRSA for Multi Cloud Environment”. It is based on multi-cloud service providers and the secret sharing key with object oriented hierarchy. This approach mainly considers three clouds in which bursting and aggregation operation had been performed and includes many object oriented aspects based on some parameter were analyzed. We also used secure sharing mechanism so that the cloud resources are shared among different cloud environment.

  8. Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions

    Directory of Open Access Journals (Sweden)

    Sultan Aldossary

    2016-04-01

    Full Text Available Cloud computing changed the world around us. Now people are moving their data to the cloud since data is getting bigger and needs to be accessible from many devices. Therefore, storing the data on the cloud becomes a norm. However, there are many issues that counter data stored in the cloud starting from virtual machine which is the mean to share resources in cloud and ending on cloud storage itself issues. In this paper, we present those issues that are preventing people from adopting the cloud and give a survey on solutions that have been done to minimize risks of these issues. For example, the data stored in the cloud needs to be confidential, preserving integrity and available. Moreover, sharing the data stored in the cloud among many users is still an issue since the cloud service provider is untrustworthy to manage authentication and authorization. In this paper, we list issues related to data stored in cloud storage and solutions to those issues which differ from other papers which focus on cloud as general.

  9. Bioinformatics and Microarray Data Analysis on the Cloud.

    Science.gov (United States)

    Calabrese, Barbara; Cannataro, Mario

    2016-01-01

    High-throughput platforms such as microarray, mass spectrometry, and next-generation sequencing are producing an increasing volume of omics data that needs large data storage and computing power. Cloud computing offers massive scalable computing and storage, data sharing, on-demand anytime and anywhere access to resources and applications, and thus, it may represent the key technology for facing those issues. In fact, in the recent years it has been adopted for the deployment of different bioinformatics solutions and services both in academia and in the industry. Although this, cloud computing presents several issues regarding the security and privacy of data, that are particularly important when analyzing patients data, such as in personalized medicine. This chapter reviews main academic and industrial cloud-based bioinformatics solutions; with a special focus on microarray data analysis solutions and underlines main issues and problems related to the use of such platforms for the storage and analysis of patients data. PMID:25863787

  10. Cloud Computing Benefits for Educational Institutions

    OpenAIRE

    Lakshminarayanan, Ramkumar; Kumar, Binod; Raju, M

    2013-01-01

    Education today is becoming completely associated with the Information Technology on the content delivery, communication and collaboration. The need for servers, storage and software are highly demanding in the universities, colleges and schools. Cloud Computing is an Internet based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Currently, IaaS (Infrastructure as a Service), PaaS (Platform as a Service...

  11. Algorithms and Systems for Virtual Machine Scheduling in Cloud Infrastructures

    OpenAIRE

    Li, Wubin

    2014-01-01

    With the emergence of cloud computing, computing resources (i.e., networks, servers, storage, applications, etc.) are provisioned as metered on-demand services over net- works, and can be rapidly allocated and released with minimal management effort. In the cloud computing paradigm, the virtual machine (VM) is one of the most com- monly used resource units in which business services are encapsulated. VM schedul- ing optimization, i.e., finding optimal placement schemes for VMs and reconfigu- ...

  12. HAVC-II - Idiap Private Cloud (Technical Inside-Out)

    OpenAIRE

    Dufour, Cédric

    2015-01-01

    Virtualizing resources – servers, storage, networks – is now part of every IT departments life. The benefits of virtualization no longer need to be demonstrated and, when played upon in a large scale, provide both the saddle and spurs with which the Cloud mantra has been riding towards its success. This document shall describe how Idiap took advantage of its infrastructure to build its own virtualization farm, which shall (shamelessly) be referred to as Idiap Private Cloud.

  13. Performance Issues of Heterogeneous Hadoop Clusters in Cloud Computing

    OpenAIRE

    Rao, B. Thirumala; Sridevi, N. V.; Reddy, V. Krishna; Reddy, L. S. S.

    2012-01-01

    Nowadays most of the cloud applications process large amount of data to provide the desired results. Data volumes to be processed by cloud applications are growing much faster than computing power. This growth demands new strategies for processing and analyzing information. Dealing with large data volumes requires two things: 1) Inexpensive, reliable storage 2) New tools for analyzing unstructured and structured data. Hadoop is a powerful open source software platform that addresses both of t...

  14. Development of a prototype cloud application for a geodatabase

    OpenAIRE

    Delipetrev, Blagoj; Mihajlov, Dragan

    2011-01-01

    Cloud is the next evolution step of IT with revolutionary implications for business and society, creating new possibilities and enabling more efficient, flexible and collaborative computing models. Cloud computing delivers computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system. Similar to this concept is the electric grid where users utilize power without understanding the system components. Majo...

  15. DATA INTEGRITY PROOF AND SECURE COMPUTATION IN CLOUD COMPUTING

    OpenAIRE

    Veeralakshmi Ponnuramu; Latha Tamilselvan

    2012-01-01

    Cloud computing is an emerging computing paradigm in which information technology resources and capacities are provided as services over the internet. The users can remotely store their data into the cloud so that the users can be relieved from the burden of local data storage and maintenance. The user does not have any control on the remotely located data. This unique feature possess many security challenges. One of the important concern is the integrity of data and computations. To ensure c...

  16. Cloud Computing for Libraries:An Economic Strategy

    OpenAIRE

    Shaw, Amit Kumar, Amit

    2013-01-01

    In the last few years, the implementation of the cloud computing is emerging as a business concept to one of the fastest growing segments of the IT industry. Thus, resources would be switched on the application of need, which could be accessed to computing and storage system as the requirement of the user. Cloud computing can be useful for library automation and digital library resources to improve information sharing capabilities, improve resource utilization and user...

  17. The Impact of Cloud Computing Technologies in E-learning

    OpenAIRE

    Hosam Farouk El-Sofany

    2013-01-01

    Cloud computing is a new computing model which is based on the grid computing, distributed computing, parallel computing and virtualization technologies define the shape of a new technology. It is the core technology of the next generation of network computing platform, especially in the field of education, cloud computing is the basic environment and platform of the future E-learning. It provides secure data storage, convenient internet services and strong computing power. This article mainl...

  18. DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE

    OpenAIRE

    Rajeev BV; Vinod Baliga; Seshubabu Tolety

    2013-01-01

    ABSTRACT There are many challenges that the developers will come across while developing or migrating applications to cloud. This paper intends to discuss various points that the developers need to be aware of during the development or migration of the application to the cloud in terms of various parameters like security, manageability, optimal storage transactions, programmer productivity, debugging and profiling, etc. The paper provides insights into how to overcome these ...

  19. Mobile Cloud Computing: A Comparison of Application Models

    OpenAIRE

    Kovachev, Dejan; Cao, Yiwei; Klamma, Ralf

    2011-01-01

    Cloud computing is an emerging concept combining many fields of computing. The foundation of cloud computing is the delivery of services, software and processing capacity over the Internet, reducing cost, increasing storage, automating systems, decoupling of service delivery from underlying technology, and providing flexibility and mobility of information. However, the actual realization of these benefits is far from being achieved for mobile applications and open many new research questions....

  20. Security in the clouds: a bird's eye view

    OpenAIRE

    Pieters, Wolter

    2010-01-01

    Over the last years, something called “cloud computing” has become a major theme in computer science and information security. Essentially, it concerns delivering information technology as a service, by enabling the renting of software, computing power and storage. In this contribution, we give a high-level overview of the issues that the emergence of cloud computing as a paradigm raises, both from a computer science and a philosophical perspective. We discuss 1) the ideal and limitations of ...

  1. SECURE DATA SHARING WITH IN GROUPS IN THE CLOUD

    OpenAIRE

    Gouthami Velakanti*, Niranjan Reddy .P, Sravanthi Venishetty

    2016-01-01

    Cloud computing refers to the delivery of computing resources over the Internet. Cloud provides a shared pool of resources, including data storage space, networks, computer processing power, and specialized corporate and user applications. It provides high level of scalability, reliability and efficiency. In this paper we propose a secure data sharing scheme within the groups and how encryption techniques help the groups in sharing the data dynamically. Sharing of data between dynamic groups ...

  2. Cloud Computing Governance Lifecycle

    Directory of Open Access Journals (Sweden)

    Soňa Karkošková

    2016-06-01

    Full Text Available Externally provisioned cloud services enable flexible and on-demand sourcing of IT resources. Cloud computing introduces new challenges such as need of business process redefinition, establishment of specialized governance and management, organizational structures and relationships with external providers and managing new types of risk arising from dependency on external providers. There is a general consensus that cloud computing in addition to challenges brings many benefits but it is unclear how to achieve them. Cloud computing governance helps to create business value through obtain benefits from use of cloud computing services while optimizing investment and risk. Challenge, which organizations are facing in relation to governing of cloud services, is how to design and implement cloud computing governance to gain expected benefits. This paper aims to provide guidance on implementation activities of proposed Cloud computing governance lifecycle from cloud consumer perspective. Proposed model is based on SOA Governance Framework and consists of lifecycle for implementation and continuous improvement of cloud computing governance model.

  3. Secure Cloud Architecture

    Directory of Open Access Journals (Sweden)

    Kashif Munir

    2013-02-01

    Full Text Available Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activitiesfrom illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. In this paper we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know a bout the k ey security threats associated with cloud computing and propose relevant solution directives to strengthen security in the Cloud environment. We also propose secure cloud architecture for organizations to strengthen the security.

  4. Energy storage

    CERN Document Server

    Brunet, Yves

    2013-01-01

    Energy storage examines different applications such as electric power generation, transmission and distribution systems, pulsed systems, transportation, buildings and mobile applications. For each of these applications, proper energy storage technologies are foreseen, with their advantages, disadvantages and limits. As electricity cannot be stored cheaply in large quantities, energy has to be stored in another form (chemical, thermal, electromagnetic, mechanical) and then converted back into electric power and/or energy using conversion systems. Most of the storage technologies are examined: b

  5. Eucalyptus Cloud to Remotely Provision e-Governance Applications

    OpenAIRE

    Sreerama Prabhu Chivukula; Rajasekhar Krovvidi; Aneesh Sreevallabh Chivukula

    2011-01-01

    Remote rural areas are constrained by lack of reliable power supply, essential for setting up advanced IT infrastructure as servers or storage; therefore, cloud computing comprising an Infrastructure-as-a-Service (IaaS) is well suited to provide such IT infrastructure in remote rural areas. Additional cloud layers of Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) can be added above IaaS. Cluster-based IaaS cloud can be set up by using open-source middleware Eucalyptus in data c...

  6. Mobile healthcare information management utilizing Cloud Computing and Android OS.

    Science.gov (United States)

    Doukas, Charalampos; Pliakas, Thomas; Maglogiannis, Ilias

    2010-01-01

    Cloud Computing provides functionality for managing information data in a distributed, ubiquitous and pervasive manner supporting several platforms, systems and applications. This work presents the implementation of a mobile system that enables electronic healthcare data storage, update and retrieval using Cloud Computing. The mobile application is developed using Google's Android operating system and provides management of patient health records and medical images (supporting DICOM format and JPEG2000 coding). The developed system has been evaluated using the Amazon's S3 cloud service. This article summarizes the implementation details and presents initial results of the system in practice. PMID:21097207

  7. An Enhanced Authentication Architecture for Cloud Computing System

    Directory of Open Access Journals (Sweden)

    Lalit Gehlod*1,

    2014-06-01

    Full Text Available Cloud computing is a powerful tool for computation ability. This provides various diverse services and platforms for develop and manage user data in a remote storage. In this context, cloud also provides the ability to share and transfer large amounts of data in an efficient manner. In this paper, we have proposed new security architecture for cloud computing system. This ensures secure authentication system and hiding information from others. In this a diverse light weight AES algorithm based cryptographic solution is proposed for optimizing security. This model also includes one time password system for user authentication process.

  8. Electron cloud effects: codes and simulations at KEK

    OpenAIRE

    Ohmi, K.

    2013-01-01

    Electron cloud effects had been studied at KEK-Photon Factory since 1995. e-p instability had been studied in proton rings since 1965 in BINP, ISR and PSR. Study of electron cloud effects with the present style, which was based on numerical simulations, started at 1995 in positron storage rings. The instability observed in KEKPF gave a strong impact to B factories, KEKB and PEPII, which were final stage of their design in those days. History of cure for electron cloud instability overlapped t...

  9. Cryptography for security and privacy in cloud computing

    CERN Document Server

    Rass, Stefan

    2013-01-01

    As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers.This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known

  10. Beam induced electron cloud resonances in dipole magnetic fields

    Science.gov (United States)

    Calvey, J. R.; Hartung, W.; Makita, J.; Venturini, M.

    2016-07-01

    The buildup of low energy electrons in an accelerator, known as electron cloud, can be severely detrimental to machine performance. Under certain beam conditions, the beam can become resonant with the cloud dynamics, accelerating the buildup of electrons. This paper will examine two such effects: multipacting resonances, in which the cloud development time is resonant with the bunch spacing, and cyclotron resonances, in which the cyclotron period of electrons in a magnetic field is a multiple of bunch spacing. Both resonances have been studied directly in dipole fields using retarding field analyzers installed in the Cornell Electron Storage Ring. These measurements are supported by both analytical models and computer simulations.

  11. Enabling Large-Scale Biomedical Analysis in the Cloud

    Directory of Open Access Journals (Sweden)

    Ying-Chih Lin

    2013-01-01

    Full Text Available Recent progress in high-throughput instrumentations has led to an astonishing growth in both volume and complexity of biomedical data collected from various sources. The planet-size data brings serious challenges to the storage and computing technologies. Cloud computing is an alternative to crack the nut because it gives concurrent consideration to enable storage and high-performance computing on large-scale data. This work briefly introduces the data intensive computing system and summarizes existing cloud-based resources in bioinformatics. These developments and applications would facilitate biomedical research to make the vast amount of diversification data meaningful and usable.

  12. Designing Virtual Labs Using Cloud Computing

    Directory of Open Access Journals (Sweden)

    Parag Nemade

    2014-10-01

    Full Text Available Cloud computing is the style of computing where massively scaled IT related capabilities are provided as a service across the internet to multiple external customers and are billed by consumption. Google, Microsoft, Yahoo, IBM and Amazon have started providing cloud computing services. Amazon is the pioneer in this field. A customer is the ultimate beneficiary of this technology as they can access, share and send data through an email server without any type of installation or hard disk storage. In this paper, we have addresses the concept of Cloud Computing and its application in the field of Education. In the Engineering courses the students often face the problem that all the software cannot be accessed from a single laboratory. Also college needs to pay more for buying different software for each PC and have to manage their updates. In this paper ,we have discuss how to provide accesses to the required software from a single Lab .We will be setting up a Virtual Private Cloud Server and deploying the required software on that server. Students will get to access all the software from those labs which are connected to this Private Cloud.

  13. DESIGNING VIRTUAL LABS USING CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Parag Nemade

    2015-10-01

    Full Text Available Cloud computing is the style of computing where massively scaled IT related capabilities are provided as a service across the internet to multiple external customers and are billed by consumption. Google, Microsoft, Yahoo, IBM and Amazon have started providing cloud computing services. Amazon is the pioneer in this field. A customer is the ultimate beneficiary of this technology as they can access, share and send data through an email server without any type of installation or hard disk storage. In this paper, we have addresses the concept of Cloud Computing and its application in the field of Education. In the Engineering courses the students often face the problem that all the software cannot be accessed from a single laboratory. Also college needs to pay more for buying different software for each PC and have to manage their updates. In this paper ,we have discuss how to provide accesses to the required software from a single Lab .We will be setting up a Virtual Private Cloud Server and deploying the required software on that server. Students will get to access all the software from those labs which are connected to this Private Cloud.

  14. Pricing Schemes in Cloud Computing: An Overview

    Directory of Open Access Journals (Sweden)

    Artan Mazrekaj

    2016-02-01

    Full Text Available Cloud Computing is one of the technologies with rapid development in recent years where there is increasing interest in industry and academia. This technology enables many services and resources for end users. With the rise of cloud services number of companies that offer various services in cloud infrastructure is increased, thus creating a competition on prices in the global market. Cloud Computing providers offer more services to their clients ranging from infrastructure as a service (IaaS, platform as a service (PaaS, software as a service (SaaS, storage as a service (STaaS, security as a service (SECaaS, test environment as a service (TEaaS. The purpose of providers is to maximize revenue by their price schemes, while the main goal of customers is to have quality of services (QoS for a reasonable price. The purpose of this paper is to compare and discuss several models and pricing schemes from different Cloud Computing providers.

  15. DATA INTEGRITY PROOF AND SECURE COMPUTATION IN CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Veeralakshmi Ponnuramu

    2012-01-01

    Full Text Available Cloud computing is an emerging computing paradigm in which information technology resources and capacities are provided as services over the internet. The users can remotely store their data into the cloud so that the users can be relieved from the burden of local data storage and maintenance. The user does not have any control on the remotely located data. This unique feature possess many security challenges. One of the important concern is the integrity of data and computations. To ensure correctness of user’s data in the cloud, an effective scheme assuring the integrity of the data stored in the cloud is proposed. We try to obtain and prove that the data stored in the cloud is not modified by the provider, thereby ensuring the integrity of data. To ensure secure computation our scheme uses the Merkle hash tree for checking the correctness of computations done by the cloud service provider. Algorithms are implemented using java core concepts and java Remote Method Invocation (RMI concepts for client-server communication by setting up the private cloud environment with eucalyptus tool. This method is used to assure data integrity and secured computations with reduced computational and storage overhead of the client.

  16. I/O Performance of Virtualized Cloud Environments

    Energy Technology Data Exchange (ETDEWEB)

    Ghoshal, Devarshi; Canon, Shane; Ramakrishnan, Lavanya

    2011-11-03

    The scientific community is exploring the suitability of cloud infrastructure to handle High Performance Computing (HPC) applications. The goal of Magellan, a project funded through DOE ASCR, is to investigate the potential role of cloud computing to address the computing needs of the Department of Energy?s Office of Science, especially for mid-range computing and data-intensive applications which are not served through existing DOE centers today. Prior work has shown that applications with significant communication orI/O tend to perform poorly in virtualized cloud environments. However, there is a limited understanding of the I/O characteristics in virtualized cloud environments. This paper will present our results in benchmarking the I/O performance over different cloud and HPC platforms to identify the major bottlenecks in existing infrastructure. We compare the I/O performance using IOR benchmark on two cloud platforms - Amazon and Magellan. We analyze the performance of different storage options available, different instance types in multiple availability zones. Finally, we perform large-scale tests in order to analyze the variability in the I/O patterns over time and region. Our results highlight the overhead and variability in I/O performance on both public and private cloud solutions. Our results will help applications decide between the different storage options enabling applications to make effective choices.

  17. Energy Aware Clouds

    Science.gov (United States)

    Orgerie, Anne-Cécile; de Assunção, Marcos Dias; Lefèvre, Laurent

    Cloud infrastructures are increasingly becoming essential components for providing Internet services. By benefiting from economies of scale, Clouds can efficiently manage and offer a virtually unlimited number of resources and can minimize the costs incurred by organizations when providing Internet services. However, as Cloud providers often rely on large data centres to sustain their business and offer the resources that users need, the energy consumed by Cloud infrastructures has become a key environmental and economical concern. This chapter presents an overview of techniques that can improve the energy efficiency of Cloud infrastructures. We propose a framework termed as Green Open Cloud, which uses energy efficient solutions for virtualized environments; the framework is validated on a reference scenario.

  18. Encyclopedia of cloud computing

    CERN Document Server

    Bojanova, Irena

    2016-01-01

    The Encyclopedia of Cloud Computing provides IT professionals, educators, researchers and students with a compendium of cloud computing knowledge. Authored by a spectrum of subject matter experts in industry and academia, this unique publication, in a single volume, covers a wide range of cloud computing topics, including technological trends and developments, research opportunities, best practices, standards, and cloud adoption. Providing multiple perspectives, it also addresses questions that stakeholders might have in the context of development, operation, management, and use of clouds. Furthermore, it examines cloud computing's impact now and in the future. The encyclopedia presents 56 chapters logically organized into 10 sections. Each chapter covers a major topic/area with cross-references to other chapters and contains tables, illustrations, side-bars as appropriate. Furthermore, each chapter presents its summary at the beginning and backend material, references and additional resources for further i...

  19. Volunteered Cloud Computing for Disaster Management

    Science.gov (United States)

    Evans, J. D.; Hao, W.; Chettri, S. R.

    2014-12-01

    Disaster management relies increasingly on interpreting earth observations and running numerical models; which require significant computing capacity - usually on short notice and at irregular intervals. Peak computing demand during event detection, hazard assessment, or incident response may exceed agency budgets; however some of it can be met through volunteered computing, which distributes subtasks to participating computers via the Internet. This approach has enabled large projects in mathematics, basic science, and climate research to harness the slack computing capacity of thousands of desktop computers. This capacity is likely to diminish as desktops give way to battery-powered mobile devices (laptops, smartphones, tablets) in the consumer market; but as cloud computing becomes commonplace, it may offer significant slack capacity -- if its users are given an easy, trustworthy mechanism for participating. Such a "volunteered cloud computing" mechanism would also offer several advantages over traditional volunteered computing: tasks distributed within a cloud have fewer bandwidth limitations; granular billing mechanisms allow small slices of "interstitial" computing at no marginal cost; and virtual storage volumes allow in-depth, reversible machine reconfiguration. Volunteered cloud computing is especially suitable for "embarrassingly parallel" tasks, including ones requiring large data volumes: examples in disaster management include near-real-time image interpretation, pattern / trend detection, or large model ensembles. In the context of a major disaster, we estimate that cloud users (if suitably informed) might volunteer hundreds to thousands of CPU cores across a large provider such as Amazon Web Services. To explore this potential, we are building a volunteered cloud computing platform and targeting it to a disaster management context. Using a lightweight, fault-tolerant network protocol, this platform helps cloud users join parallel computing projects

  20. Fog Computing to protect real and sensitivity information in Cloud

    Directory of Open Access Journals (Sweden)

    Thogaricheti Ashwini

    2015-03-01

    Full Text Available Cloud computing can simply be described as computing based on the internet. In the past, people depended on physical computer storage or servers to run their programs. However, with the introduction of cloud computing, people as well as business enterprises can now access their programs through the internet. Due this ease, software companies and other agencies are shifting more towards cloud computing environment. To achieve better operational efficiency in many organizations and small or medium agencies is using Cloud environment for managing their data. It is a combination of a number of computing strategies and concepts such as Service Oriented Architecture (SOA, virtualization and other which rely on the Internet. Cloud Computing provides an easy way for accessing, managing and computation of user data, but it also has some severe security risks. Very common risks now days are data theft attacks. Data theft considered one of the top threats to cloud computing by the Cloud Security Alliance is. To deal with such cases and malicious intruders there are some techniques which are used to secure user data. A new technology called “Fog computing” is gaining attention of the cloud users nowadays. Fog computing improves the Quality of service and also reduces latency. According to Cisco, due to its wide geographical distribution the Fog computing is well suited for real time analytics and big data.Fog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users.