A Review on Cloud Computing and Internet of Things
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
A Review on Cloud Computing and Internet of Things

Authors: Sahar S. Tabrizi, Dogan Ibrahim

Abstract:

Cloud Computing is a convenient model for on-demand networks that uses shared pools of virtual configurable computing resources, such as servers, networks, storage devices, applications, etc. The cloud serves as an environment for companies and organizations to use infrastructure resources without making any purchases and they can access such resources wherever and whenever they need. Cloud computing is useful to overcome a number of problems in various Information Technology (IT) domains such as Geographical Information Systems (GIS), Scientific Research, e-Governance Systems, Decision Support Systems, ERP, Web Application Development, Mobile Technology, etc. Companies can use Cloud Computing services to store large amounts of data that can be accessed from anywhere on Earth and also at any time. Such services are rented by the client companies where the actual rent depends upon the amount of data stored on the cloud and also the amount of processing power used in a given time period. The resources offered by the cloud service companies are flexible in the sense that the user companies can increase or decrease their storage requirements or the processing power requirements at any time, thus minimizing the overall rental cost of the service they receive. In addition, the Cloud Computing service providers offer fast processors and applications software that can be shared by their clients. This is especially important for small companies with limited budgets which cannot afford to purchase their own expensive hardware and software. This paper is an overview of the Cloud Computing, giving its types, principles, advantages, and disadvantages. In addition, the paper gives some example engineering applications of Cloud Computing and makes suggestions for possible future applications in the field of engineering.

Keywords: Cloud computing, cloud services, IaaS, PaaS, SaaS, IoT.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1130605

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1397

References:


[1] L. Wang, G. Laszewski, M. Kunze, and J. Tao, “Cloud Computing: A Perspective Study New Generation Computing,” Advances of Distributed Information Processing, vol. 28, no. 2, pp. 37-146, 2008.
[2] H.C. Lin, S. Babu, J.S. Chase, and S. S. Parekh, “Automated Control in Cloud Computing: Opportunities and Challenges,” 1st Workshop on Automated control for data centers and clouds, pp. 13 -18, 2009.
[3] W.K. Chan, L. Mei, and Z. Zhang, “Modelling and testing of cloud applications,” IEEE Asia-Pacific Services Comput. Conf. CA:USA, 2009
[4] I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud Computing and Grid Computing 360-Degree Compared,” 8th Int. Conf. Grid Comput. Environments Workshop, 2008, pp. 1-10.
[5] R. Maggiani, “Communication Consultant, Solari Communication, Cloud Computing is Changing How we communicate,” In: Proceeding of 2009 IEEE International Professional Conference, pp 1-4.
[6] S. Iqbal, M. L. M. Kiah, N. B. Anuar, B. Daghighi, A. W. A. Wahab, & S. Khan, “Service delivery models of cloud computing: security issues and open challenges,” Security and Communication Networks, vol. 9, no. 17, pp. 4726-4750, 2016.
[7] Sun Microsystems White Paper, Introduction to Cloud Computing Architecture, 2009.
[8] H. S. Lamba, and G. Singh, “Cloud Computing-Future Framework for e-management of NGO,” Int. J. Advancements in Technologies, vol. 2, no. 3, pp. 400-407, 2011.
[9] P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” 2011. Available at http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf (Last access March 15, 2017)
[10] G. Singh, S. Sood, and A. Sharma, “CM Measurement Facets for Cloud Performance,” Int. J. Comput. Appl., vol. 23, no. 3, pp. 37-42, 2011.
[11] J. Schaper, “Cloud Services,” 4th IEEE Int. Conf. on Digital Ecosystems and Technologies, 2010, pp. 91-91.
[12] N.V.M. Lakshmi, “Cloud Computing: An Overview, Problems & Application,” In Engineering Research, vol. 4, no. 1, pp. 324-330, 2013.
[13] S. Sun Microsystems, “Introduction to Cloud Computing architecture,” White paper, 1st Edition, 2009.
[14] D. Durkee, “Why Cloud Computing Will Never Be Free,” Queue Emulators, vol. 8, no. 4, pp. 20, 2010.
[15] M. Nazir, P. Tiwari, S. D.Tiwari, and R. G. Mishra, “Cloud Computing: An Overview Cloud Computing: Reviews, Surveys, Tools,” Techniques and Applications, vol.13, no. 18, pp. 1587-1611, 2013.
[16] A. Waqas, Z. M. Yusof, and A. Shah, “Fault tolerant cloud auditing,” 5th Int. Conf. Inform. Commun. Technol. for the Muslim World (ICT4M), 2013, pp. 1-5.
[17] R. Zota, and I.A. Petre, “An Overview of the Most Important Reference Architectures for Cloud Computing,” Informatica Economică, vol.18, no. 4, pp. 26-39, 2014.
[18] A.J. Alzaid, and J.M. Albazzaz, “Cloud Computing: An Overview,” Int. J. Advanced Research in Comput. Commun. Eng., vol. 2, no. 9, pp. 3522-3525, 2013.
[19] T. Point, Simply easy learning. Available at http://www. tutorialspoint. com/uml. (Last access March 15, 2017)
[20] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Trans. Comput. Vol. 62, no. 2, pp. 362-375, 2013.
[21] B.R. Kandukuri, R. Paturi, and A. Rakshit, “Cloud Security Issues,” IEEE Int. Conf. Services Computing, 2009, pp. 517-520.
[22] S. Arnold, “Cloud Computing and the issue of privacy,” Int. J. Comput. Networks, vol. 3, no. 5, pp. 247-55, 2011.
[23] U. Moghe, P. Lakkadwala, and D. K. Mishra, “Cloud computing: Survey of different utilization techniques” 6th IEEE Int. Conf. Software Eng. (CONSEG), 2012, pp. 1-4.
[24] L. Qian, Z. Luo, Y. Du, and L. Guo, “Cloud computing: An overview,” IEEE Int. Conf. Cloud Computing, 2009, pp. 626-631.
[25] R.L. Grossman, “The Case for Cloud Computing”, IT Professional, Vol: 11, Issue: 2, 2009, pp. 23-27
[26] Statista. (2016). http://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/
[27] S. S. Tabrizi, and D. Ibrahim, “Security of the Internet of Things: An Overview," Int. Conf. Commun. Inform. Syst., 2016, pp. 146-150, ACM.
[28] J. Bradley, “The Internet of Everything: Creating Better Experiences in Unimaginable Ways,” Nov 21, 2013, Available at http://blogs.cisco.com/ioe/theinternet-of-everything-creating-better-experiences-in-unimaginableways/#more-131793
[29] IOT Global Congress, June 21-27, 2017, London. Available at http://iotglobalcongress.com/?gclid=CJrE2vG_gNMCFcWfGwod-jQEPw (Last access March 11, 2017)
[30] S.K. Josyula, and D. Gupta, “Internet of things and cloud interoperability application based on Android”, IEEE International Conference on Advances in Computer Applications (ICACA), 2016, pp. 76-81.
[31] D. Ibrahim, Internet of Things, Elektor publication, 2016, UK.
[32] D. Ibrahim, Microcontroller Based Radio Telemetry Projects, Elektor publication, 2016, UK.
[33] M. Sain, Y.J. Kang, and H.J. Lee, “Survey on securityin Internet of Things: State of the art and challenges”, 19th International Conference on Advanced Communication Technology (ICACT), 2017, pp. 699-704.
[34] D. Evans, “The Internet of Things – How the Next Evolution of the Internet is Changing Everything”, Cisco Internet Business group, Available at: http://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/ IoT_IBSG_0411FINAL.pdf, (Last access April, 2017).
[35] K. Chard, S. Caton, O. Rana, and K. Bubendorfer, “Social Cloud: Cloud Computing in Social Networks”, IEEE 3rd International Conference on Cloud Computing (CLOUD), 2010, pp. 99-106.