Citations

  • Furht and Escalante 2010 (†583)

    Furht, Borko, and Armando Escalante, eds. Handbook of Cloud Computing (Springer, 2010).

Existing Citations

  • backup (p.353): ...cloud computing means easier administration, with issues such as licensing, backup, and security being taken care of elsewhere. (†1167)
  • cloud broker (p.588-589): The Cloud broker collects and manages information about the available Clouds and the services they provide (both functional and non-functional parameters, such as QoS, costs, reliability, request formats’ specifications . . . . (†1170)
  • cloud bursting (p.407): Using remote resources to handle peaks in demand for an application. (†1218)
  • cloud computing (p.339): A Cloud is essentially a class of systems that deliver IT resources to remote users as a service. The resources encompass hardware, programming environments and applications. The services provided through cloud systems can be classified into Infrastructure as a service (IaaS), Platform as a Service (PaaS) and Software as a service (SaaS). (†1175)
  • cloud computing (p.38): Huge amounts of videos, images, and documents are to be stored in data centers so that users can download and view them at any time, and they can promote interaction. Cloud computing can effectively support this kind of business requirements, and get maximal storage with limited resources. (†1182)
  • cloud computing (p.336-337): Cloud Computing enables users to access various computing resources simply, including computing cycles, storage space, programming environments and software applications (all you need is a web browser). Moreover, Cloud computing promises to provide other benefits -- Less investment: Clouds provide affordable solutions that handle peaks, or scale easily at a fraction of the traditional costs of space, time and financial investment., Scale: Cloud vendors have vast data centers full of tens of thousands of server computers, offering computing power and storage of a magnitude never before available – cloud computing promises virtually unlimited resources., Manageability: The user experience is simplified as no configuration or backup is needed. (†1217)
  • cloud computing (p.66): While the purists are still debating the precise definition of cloud computing, the IT industry views cloud computing – an emerging business model – as a new way to solve today’s business challenges. A survey conducted by Oliver Wyman (Survey, private study for IBM) in November 2008 with business executives from different enterprises identified “reduce capital cost,” “reduce IT management cost,” “accelerate technology deployment,” and “accelerate business innovation” as the main business benefits for cloud computing... Despite the benefits promised by cloud computing, the IT industry also sees that significant innovation and improvement on technologies and operations governance are needed to enable broad adoption of cloud services. Chief concerns are security and performance issues. (†1222)
  • cloud computing (v): Cloud computing has become a great solution for providing a flexible, on-demand, and dynamically scalable computing infrastructure for many applications. Cloud computing also presents a significant technology trends, and it is already obvious that it is reshaping information technology processes and the IT marketplace. (†1224)
  • cloud computing (p.3): A new style of computing in which dynamically scalable and often virtualized resources are provided as a services over the Internet. (†1225)
  • cloud computing (p.339-340): A Cloud is essentially a class of systems that deliver IT resources to remote users as a service. The resources encompass hardware, programming environments and applications. The services provided through cloud systems can be classified into Infrastructure as a service (IaaS), Platform as a Service (PaaS) and Software as a service (SaaS). Different enterprises play different roles in building and using cloud systems. These roles range from cloud technology enablers (enabling the underlying technologies used to build the cloud, such as hardware technologies, Virtualization technology, web services and so on), to cloud providers (delivering their infrastructure and platform to customers), to cloud customers (using the providers’ services to improve their web applications), and users (who use the web applications, possibly unaware that it is being delivered using cloud technologies). (†1229)
  • cloud computing (p. 575-576): Cloud computing is derived from the service-centric perspective that is quickly and widely spreading on the IT world. From this perspective, all capabilities and resources of a Cloud (usually geographically distributed) are provided to users as a service, to be accessed through the Internet without any specific knowledge of, expertise with, or control over the underlying technology infrastructure that supports them. (†1399)
  • cloud computing (p. 11 (1.3 Cloud Computing Features)): Cloud computing brings a number of new features compared to other computing paradigms. . . . ·  Scalability and on-demand services Cloud computing provides resources and services for users on demand. The resources are scalable over several data centers. ·  User-centric interface Cloud interfaces are location independent and can be accesses by well established interfaces such as Web services and Internet browsers. ·  Guaranteed Quality of Service (QoS) Cloud computed can guarantee QoS for users in terms of hardware/CPU performance, bandwidth, and memory capacity. ·  Autonomous system The cloud computing systems are autonomous systems managed transparently to users. However, software and data inside clouds can be automatically reconfigured and consolidated to a simple platform depending on user’s needs. ·  Pricing Cloud computing does not require up-from investment. No capital expenditure is required. Users pay for services and capacity as they need them. (†1373)
  • cloud consumer (p.187): Currently, most of the Cloud providers offer their own proprietary service protocols and information formats. As Cloud computing becomes mature and widely adopted, clients and consumer organizations would likely interact with more than one provider for various reasons, including finding the most cost effective solutions or acquiring a variety of services from different providers (e.g., compute providers or data providers). Cloud consumers will likely demand common protocols and standardized information formats for ease of federated usage and interoperability. (†1171)
  • cloud provider (p.59): Although serving customers will presumably be the first priority of a successful cloud provider, staying in business is another, and there is a definite motivation for implementing further optimizations that cut costs for the provider without necessarily increasing benefit for any of the tenants (†1172)
  • cloud provider (p.69): Cloud providers offer scalable cloud services via massive data centers. In such massive-scale data centers, Data Center Network (DCN) is constructed to connect tens, sometimes hundreds, of thousands of serves to deliver massively scalable cloud services to the public. Hierarchical network design is the most common architecture used in data center networks. (†1173)
  • community cloud (p.339): The idea of a Community Cloud is derived from the Grid Computing and Volunteer Computing paradigms. In a community cloud, several enterprises with similar requirement can share their infrastructures, thus increasing their scale while sharing the cost (Wikipedia – Cloud Computing, 2010). Another form of community cloud may be established by creating a virtual data center from virtual machines instances deployed on underutilized users machines (Briscoe & Marinos, 2009). (†1174)
  • compliance (p.59): Verification that an application or other IT resource is operating according to predefined policy objectives. (†1176)
  • data (p.439): Data is raw. It simply exists and has no significance beyond its existence (in and of itself). It can exist in any form, usable or not. It does not have meaning of itself. (†1228)
  • Data as a Service (DaaS) (p.340): Unlimited storage space is used to store the user’s data regardless of its type, charged per GByte for data size and data transfer. (†1177)
  • hybrid cloud (p.339): A composition of the two types (private and public) is called a hybrid cloud, where a private cloud is able to maintain high services availability by scaling up their system with externally provisioned resources from a public cloud when there are rapid workload fluctuations or hardware failures. In the hybrid cloud, an enterprise can keep their critical data and applications within their firewall, while hosting the less critical ones on a public cloud. (†1148)
  • information (p.86): In 2003, LexisNexis defined this issue as the “Data Gap”: the ability to gather information is far outpacing organizational capacity to use it effectively. Organizations build the applications to fill the storage they have available, and build the storage to fit the applications and data they have. But will organizations be able to do useful things with the information they have to gain full and innovative use of their untapped data resources? As organizational data grows, how will the “Data Gap” be addressed and bridged? (†1226)
  • information (p.439): Information is data that has been given meaning by way of relational connection. (†1227)
  • Information Technology as a Service (ITaaS) (p. 576): Cloud computing is strictly related to service oriented science (Foster, 2005), service computing (Zhang, 2008) and IT as a service (ITAAS) (Foster & Tuecke, 2005), a generic term that includes: platform AAS, software AAS, infrastructure AAS, data AAS , security AAS, business process management AAS and so on. (†1400)
  • information technology governance (p.51): An organization’s objective for its use of IT in general is to realize certain information-based business processes while conforming with applicable laws and regulations, and optimizing the cost/benefit tradeoff. Whether implemented with cloud computing or with conventional IT, the organization’s high-level IT objectives are the same. The promise of cloud computing is that over time, organizations may be able to meet those objectives with an ever improving cost/benefit tradeoff. (†1169)
  • Infrastructure as a Service (IaaS) (p.340): Large-scale computer hardware and high computer network connectivity are essential components of an effective IaaS. The IaaS is categorized into: (1) Computation as a Service (CaaS), in which virtual machine based servers are rented and charged per hour based on the virtual machine capacity – mainly CPU and RAM size, features of the virtual machine, OS and deployed software; and (2) Data as a Service (DaaS), in which unlimited storage space is used to store the user’s data regardless of its type, charged per GByte for data size and data transfer. (†1149)
  • mashup (p.11): ...A web application that combines data from more than one source into a single integrated storage tool. (†1215)
  • Platform as a Service (PaaS) (p.343): Platform as a Service (PaaS) cloud systems provide a software execution environment that application services can run on. The environment is not just a pre-installed operating system but is also integrated with a programming-language-level platform, which users can...use...to develop and build applications for the platform. From the point of view of PaaS clouds’ users, computing resources are encapsulated into independent containers, they can develop their own applications with certain program languages, and APIs are supported by the container without having to take care of the resource management or allocation problems such as automatic scaling and load balancing. (†1150)
  • private cloud (p.7): Private cloud (or internal cloud) refers to cloud computing on private networks. Private clouds are built for the exclusive use of one client, providing full control over data, security, and quality of service. Private clouds can be built and managed by a company’s own IT organization or by a cloud provider. (†1201)
  • private cloud (p.68): Critics of private clouds point out that these corporations “still have to buy, build, and manage clouds” and as such do not benefit from lower up-front capital costs and less hands-on management, essentially “lacking the economic model that makes cloud computing such an intriguing concept.” While these criticisms are true from a purist’s point view, private clouds are a viable and necessary deployment model in the overall adoption of cloud computing as a new IT model. (†1204)
  • proprietary (p.8): Currently, most of the Cloud providers offer their own proprietary service protocols and information formats. As Cloud computing becomes mature and widely adopted, clients and consumer organizations would likely interact with more than one provider for various reasons, including finding the most cost effective solutions or acquiring a variety of services from different providers (e.g., compute providers or data providers). Cloud consumers will likely demand common protocols and standardized information formats for ease of federated usage and interoperability. (†1206)
  • proprietary (p.407): However, existing commercial Cloud services are proprietary in nature. They are owned and operated by individual companies (public or private). Each of them has created its own closed network, which is expensive to setup and maintain. In addition, consumers are restricted to offerings from a single provider at a time and hence cannot use multiple or collaborative Cloud services at the same time (Coombe, 2009). (†1207)
  • provenance (p.15): It has been said that science without reproducibility is not science, yet in a world where data and computations are passed around the intricate cloud, provenance is all to easy to lose track of. (†1208)
  • provenance (p.323): Data provenance in workflows is a kind of important metadata, in which the dependencies between datasets are recorded (Simmhan, Plale, & Gannon, 2005). The dependency depicts the derivation relationship between the application datasets. In cloud workflow systems, after the execution of tasks, some intermediate datasets may be deleted to save the storage cost, but sometimes they have to be regenerated for either reuse or reanalysis (Bose & Frew, 2005). Data provenance records the information of how the datasets have been generated. Furthermore, regeneration of the intermediate datasets from the input data may be very time consuming, and therefore carry a high computation cost. With data provenance information, the regeneration of the demanding dataset may start from some stored intermediated datasets instead. In a cloud workflow system, data provenance is recorded during workflow execution. Taking advantage of data provenance, we can build an Intermediate data Dependency Graph (IDG) based on data provenance (Yuan et al., 2010). (†1209)
  • public cloud (p.7): In the public cloud (or external cloud) computing resources are dynamically provisioned over the Internet via Web applications or Web services from an off-site third-party provider. Public clouds are run by third parties, and applications from different customers are likely to be mixed together on the cloud’s servers, storage systems, and networks. (†1202)
  • public cloud (p.7): In the public cloud (or external cloud) computing resources are dynamically provisioned over the Internet via Web applications or Web services from an off-site third-party provider. Public clouds are run by third parties, and applications from different customers are likely to be mixed together on the cloud’s servers, storage systems, and networks. (†1203)
  • rapid elasticity (p.490): The services classified as deployed on the grid are data oriented. In this case the need for the elasticity provided by the cloud infrastructure is addressed to the computing intensive part of the application. The use of the cloud infrastructure is convenient because resources, i.e. virtual machines, have to be instanced only for the needed time. Using the cloud for data storing is technically possible, but some drawbacks can raise when a large amount of data are allocated permanently in the cloud without the need of storage elasticity... However, the application requirements for the storage result in a total cost of ownership which is less critical than the requirement for computing power, so that a self hosted storage turns out to be more effective than a cloud storage solution. (†1210)
  • reliability (internet) (p.18): Cloud computing still does not always offer round-the-clock reliability. There were cases where cloud computing services suffered a few-hours outages. In the future, we can expect more cloud computing providers, richer services, established standards, and best practices. (†1168)
  • security (p.17-18): Companies are still concerned about security when using cloud computing. Customers are worried about the vulnerability to attacks, when information and critical IT resources are outside the firewall. The solution for security assumes that that cloud computing providers follow standard security practices... (†1187)
  • security (p.337): However, Cloud Computing also raises many concerns, mainly about security, privacy, compliance and reliability. When users move their data to the service provider data center, there is no guarantee that nobody else has access to this data. If the data is being stored in a different country, there can also be issues about jurisdictions for legal rights, and control of the data. (†1211)
  • security (p. 12): The security requirements for cloud computing providers begins with the same techniques and tools as for traditional data centers, which includes the application of a strong network security perimeter. However, physical segmentation and hardwarebased security cannot protect against attacks between virtual machines on the same server. (†1374)
  • security (p. 24): From the point of view of the technology, the security of user data can be reflected in the following rules of implementation: 1. The privacy of user storage data. User storage data cannot be viewed or changed by other people (including the operator). 2. The user data privacy at runtime. User data cannot be viewed or changed by other people at runtime (loaded to system memory). 3. The privacy when transferring user data through network. It includes the security of transferring data in cloud computing center intranet and internet. It cannot be viewed or changed by other people. 4. Authentication and authorization needed for users to access their data. Users can access their data through the right way and can authorize other users to access. (†1375)
  • service level agreement (p.399-400): Service negotiation phase covers the discussion and agreement that the service provider and consumer have regarding the service delivered and its acceptance criteria. The service delivered is determined by the specifications laid down in the [request for service]. Service acceptance is usually guided by the Service Level Agreements (SLA) that the service provider and consumer agree upon. SLAs define the service data, delivery mode, agent details, compliance policy, quality and cost of the service. While negotiating the service level with potential service providers, consumers can explicitly specify service quality constraints (data quality, cost, security, response time, etc.) that they require. (†1212)
  • service level agreement (p.407): An SLA is a contract between the service provider and the customer to describe provider’s commitment and to specify penalties if those commitments are not met. (†1213)
  • Software as a Service (SaaS) (p.346): Software-as-a-Service (SaaS) is based on licensing software use on demand, which is already installed and running on a cloud platform. These on-demand applications may have been developed and deployed on the PaaS or IaaS layer of a cloud platform. SaaS replaces traditional software usage with a Subscribe/Rent model, reducing the user’s physical equipment deployment and management costs. The SaaS clouds may also allow users to compose existing services to meet their requirements. (†1151)
  • trust (p.24): Without physical control and access, the users would naturally question the security of the system. A comparable analogy to data security in a Cloud is in financial institutions where a customer deposits his cash bills into an account with a bank and thus no longer have a physical asset in his possession. He will rely on the technology and financial integrity of the bank to protect his now virtual asset. Similarly we’ll expect to see a progression in the acceptance of placing data in physical locations out of our reach but with a trusted provider. (†1155)
  • trust (p.337): However, Cloud Computing also raises many concerns, mainly about security, privacy, compliance and reliability. When users move their data to the service provider data center, there is no guarantee that nobody else has access to this data. If the data is being stored in a different country, there can also be issues about jurisdictions for legal rights, and control of the data. Moreover, to date, there are no clearly defined Service Level Agreements (SLA) offered by the cloud providers. (†1186)
  • use (p.529): Cloud computing offers obvious advantages, such as co-locating data with computations and an economy of scale in hosting the services. While these platforms obviously perform very well for their current intended use in search engines or elastic hosting of commercial Web sites, their role in scientific computing is still evolving. (†1220)
  • valuation (p.32): In the 1990’s, Internet portals spent huge amount of investment to attract eyeballs. Rather than profits and losses, their market valuation were based on the number of unique “hits” or visitors. This strategy proved to work out well as these portals begin to offer advertisement opportunities targeting their installed user base, as well as new paid services to the end user, thereby increasing revenue per capita in a theoretically infinite growth curve. Similarly Internet Data Centers (IDC) have become a strategic initiative for Cloud service providers to attract users. With a critical mass of users consuming computing resources and applications, an IDC would become a portal attracting more applications and more users in a positive cycle. (†1219)
  • vendor lock-in (p.212): This is arguably one of the weakest points in Clouds, which usually are services offered by single organizations that enforce their -often proprietary- protocols, leading for examples to the already identified problem of vendor lock-in. (†1216)
  • web 2.0 (p.10-11): Web 2.0 is a new concept that refers to the use of Web technology and Web design to enhance creativity, information sharing, and collaboration among users (Wang, Tao, & Kunze, 2008). (†1214)