Diplomarbeit Vertrauenswürdige Und Soziale Verwaltung Von

Total Page:16

File Type:pdf, Size:1020Kb

Diplomarbeit Vertrauenswürdige Und Soziale Verwaltung Von TECHNISCHE UNIVERSITÄT DRESDEN FAKULTÄT INFORMATIK INSTITUT FÜR SYSTEMARCHITEKTUR PROFESSUR FÜR RECHNERNETZE PROF. DR. RER. NAT. HABIL DR. H. C. ALEXANDER SCHILL Diplomarbeit zur Erlangung des akademischen Grades Diplom-Medieninformatiker Vertrauenswürdige und soziale Verwaltung von Ressourcen als Dienstleistung in persönlichen Cloudkontrollzentren Stephan Zepezauer (Geboren am 30. Mai 1980 in Elsterwerda) Betreuer: Dr.-Ing. Josef Spillner Dresden, 27. März 2012 Selbstständigkeitserklärung Hiermit erkläre ich, dass ich die von mir am heutigen Tag dem Prüfungsausschuss der Fakultät Infor- matik eingereichte Diplomarbeit zum Thema: Vertrauenswürdige und soziale Verwaltung von Ressourcen als Dienstleistung in persönlichen Cloudkontrollzentren vollkommen selbstständig verfasst und keine anderen als die angegebenen Quellen und Hilfsmittel benutzt sowie Zitate kenntlich gemacht habe. Dresden, 27. März 2012 Stephan Zepezauer 1 Contents 1 Introduction 4 1.1 Motivation...................................... 5 1.2 Scenario........................................ 7 1.3 Outline ......................................... 8 2 Basics 10 2.1 CloudComputingDefinition . ..... 10 2.2 Cloud Computing Reference Model . ...... 12 2.3 ServiceModelsoftheCloud . ..... 12 2.3.1 Infrastructure as a Service . ..... 13 2.3.2 PlatformasaService. 15 2.3.3 SoftwareasaService. 16 2.4 Fundamental Deployment Models of the Cloud . ......... 17 2.4.1 PublicCloud .................................. 17 2.4.2 CommunityCloud ............................... 18 2.4.3 PrivateCloud.................................. 20 2.4.4 HybridCloud.................................. 20 2.5 Bordering of the Cloud Domain and Emphasis of the Individual ........... 21 2.5.1 Toward the Integration of Regional Clouds for Businesses and Communities . 22 2.5.2 Services in Home-based Cloud Computing Environments ........... 23 2.5.3 A proper Distinction between Home Cloud and Personal Cloud . 25 2.6 Mechanisms for the Development of Trusted Clouds . ........... 26 2.6.1 PrivacyintheCloud ............................. 26 2.6.2 Security of Outsourced Data . 27 2.6.3 Trustworthy Cloud Computing . 29 2.7 Summary ........................................ 30 3 Requirements Analysis 32 3.1 ProblemContext .................................. 32 3.2 Requirements .................................... 36 3.3 Summary ........................................ 37 4 Stateofthe Art 38 4.1 PersonalCloudProducts . ..... 38 4.2 ResearchProjects ................................ 41 2 4.3 Tools........................................... 48 4.4 SummaryandDiscussion . 52 5 System Design 56 5.1 Global Process and Delimitation . ........ 56 5.2 Resource Integration . ..... 57 5.2.1 FunctionalUnits ............................... 58 5.2.2 Functional Unit Description . ..... 59 5.2.3 Remote Device and Resource Discovery . ...... 60 5.2.4 Local Device and Resource Discovery . ...... 63 5.2.5 Resource Information Discovery . ...... 65 5.2.6 Manual Resource Integration . ..... 65 5.3 TheResourceManagement . 66 5.3.1 ResourcePlan.................................. 66 5.3.2 ResourceLabeling .............................. 67 5.4 DataManagement.................................. 71 5.5 Application Programming Interface . ......... 72 5.6 Summary ........................................ 72 6 Implementation 74 6.1 PrototypeOverview............................... 74 6.1.1 Package: ResourceManagement . 74 6.1.2 Package: PluginController . ..... 75 6.1.3 Package: DataManagement . 75 6.1.4 Package:Logging ............................... 75 6.2 Resource Integration . ..... 75 6.3 Gathering of Resource Information . ......... 78 6.4 Application Programming Interface . ......... 78 6.5 PrototypeExtension.... ...... ..... ...... ..... .... ..... 78 6.6 Summary ........................................ 79 7 Evaluation 80 7.1 Evaluation of Requirements . ....... 80 7.2 Scenario-based Evaluation . ....... 82 8 Summary and Outlook 85 8.1 FutureWork...................................... 86 9 Abbreviation 88 Bibliography 90 List of Figures 95 3 List of Tables 96 A Service Discovery Protocols 97 B Scenario-based Evaluation 113 1. INTRODUCTION 4 1 Introduction Cloud computing emerged from the Service-Oriented Architecture (SOA) paradigm that defines prin- ciples for the development of software, in which well-defined business functionalities are provided as a service. According to this paradigm, all resources of the Cloud are made available as services and can be accessed through the Internet by offering a user-centric interface that acts as a point of access for costumer’s needs and requirements. The term Cloud originated from the early days of the Internet, where internal processes and the complexity of message propagation were hidden in a Cloud of interconnected computer networks. This image of a global network system was derived from network diagrams from the early 1960s, whereby the network was drawn as a cloud in which data was delegated across carrier backbones from one location to another [RR10]. Another idea of this time was to provide computing power and even specific applications through a utility business model - just as water and electricity utilities operate today. The idea of utility computing was first proposed by John McCarthy in 1961 and is realized by the current cloud computing technology1. But the IT-related technologies that existed at this time, could not implement such a futuristic computing model and so it took more than forty years until Cloud computing emerged in technology and public circles. The new millennium brought innovations in the field of Internet technologies (SOA, Web 2.0, Web Services), distributed computing (clusters, grids) and hardware (virtualization, multi-core chips). As some of these innovations were in their infancy, they were first seen as hype, but later became pop- ular in academia and major industry, followed by specifications and standardizations [VBB11]. The maturity of these technologies mainly influenced the advent of Cloud computing. Cloud computing is determined by virtualized resources, dynamically scaled services and the avail- ability of resources as a web-delivered service to customers (e.g., companies, developer teams). The services provided by Cloud vendors mostly contain infrastructure, platform and software (applica- tions) as a service. This way, the applications of Cloud users, deployed in the cloud, are not tightly bound to the underlying IT infrastructure and are managed by the vendors. For example, a Software- as-a-Service (Saas) vendor is responsible for all of the hardware and software management consumed by their customer base. Thus, the customers can obtain additionally required resources immediately and are liberated from the maintenance burden they would otherwise have for their own applications. From the customer’s perspective, cloud computing allows the reduction of management cost, whereby the customers can focus on their business activities. As with other new technologies, this new way of IT infrastructure management brings new challenges and risks. When considering the customers’ data is stored and processed by a Cloud vendor, questions about privacy, trust and security of information arise immediately. 1http://computinginthecloud.wordpress.com/2008/09/25/utility-cloud-computingflashback-to-1961-prof-john-mccarthy/ 1. INTRODUCTION 5 Besides the aforementioned relationship between customers and Cloud vendors, also known as pub- lic cloud, in which the vendors provide services to a variety of customers distributed over the whole world, separated by different goals and management domains, there exist other solutions to organize the relationship between customers’ and vendors’ domains. A private cloud contains all Cloud ser- vices where customers and vendors belong to the same organizational unit and thus, control over the data remains with the customers or their organization [BKNT11]. If companies, managing a private cloud, outsource data into the public cloud for the purpose of storage or processing, then this rela- tionship is called hybrid cloud. Another case is the provision of resources for a community, called community cloud, which constitutes the context of this thesis. In such a community each mem- ber should have the possibility to provide own resources and to use resources of other community members in a flexible and trustworthy environment. When considering the storage and processing of data by remote vendors, whereby data and applications are distributed over several locations, then the latency for transfered data is a further challenge. Regional/local clouds are a solution for such a challenge and provide the disintegration of dependencies from the public cloud providers. Imagine a community of regionally collaborating musicians make up a social network, which allows them to use resources of other musicians according to the rules of the social network. Such a process facilitates the storage and sharing of different kinds of media, such as audio files, music sheets, and digital graphics, and even the computation of specific task. Even with this simple scenario, one can already notice the underlying concept of this thesis: The concept of trustworthy and social manage- ment of resources as a service. This thesis provides solutions for resource owners to automatically discover available personal resources to integrate them into the Cloud (community cloud, region- al/local cloud) and assures that the resources can be synchronized trustworthy with heterogenous computing devices.
Recommended publications
  • Filecloud Server Version 20.1 Installation Guide Filecloud Server Version 20.1 Installation Guide
    FileCloud Server Version 20.1 Installation Guide FileCloud Server Version 20.1 Installation Guide Copyright Notice © 2020 CodeLathe Technologies, Inc. All rights reserved. No reproduction without written permission. While all reasonable care has been taken in the preparation of this document, no liability is accepted by the authors, CodeLathe Technologies, Inc., for any errors, omissions or misstatements it may contain, or for any loss or damage, howsoever occasioned, to any person relying on any statement or omission in this document. Any questions regarding this document should be forwarded to: CodeLathe Technologies, Inc. 13785 Research Blvd, Suite 125 Austin TX 78750, USA Phone: U.S: +1 (888) 571-6480 Fax: +1 (866) 824-9584 Email: [email protected] 1. About FileCloud Server for Administrators . 4 1.1 FileCloud Sizing Guide . 8 2. Installing FileCloud Server . 11 2.1 Requirements . 13 2.2 Installation . 16 2.2.1 Direct Installation . 17 2.2.1.1 Installation on Windows . 18 2.2.1.1.1 Install Webserver as Service for Windows . 19 2.2.1.1.2 Install MongoDB as service in Windows . 21 2.2.1.1.3 FileCloud Watchdog Service . 23 2.2.1.1.4 Windows Setup Wizard . 25 2.2.1.1.5 Configuring Servers with the FileCloud Control Panel . 26 2.2.1.1.6 Configuring Optional Components . 30 2.2.1.1.7 Post-Installation Steps . 31 2.2.1.1.8 FileCloud Retention CLI tool for Windows . 32 2.2.1.2 Ubuntu Package Installation . 33 2.2.1.3 FileCloud RPM Package Installation . 34 2.2.1.4 Installation on Linux Distros .
    [Show full text]
  • Filecloud Administration.Pdf
    1. FileCloud Administration Guide . 3 1.1 FileCloud Site Setup . 3 1.1.1 Logging in as Administrator . 4 1.1.1.1 Logging In . 4 1.1.1.2 Changing Admin Password . 5 1.1.1.3 Resetting Admin Password . 6 1.1.2 Setting Up Managed Storage . 6 1.1.2.1 Setting up FileCloud Managed Disk Storage . 7 1.1.2.2 Setting up FileCloud Managed OpenStack Storage . 9 1.1.2.3 Setting up FileCloud Managed S3 Storage . 10 1.1.3 Setting up Local Storage Encryption . 13 1.1.3.1 Storage Encryption Technical Details . 13 1.1.3.2 Enabling Storage Encryption . 16 1.1.3.3 Disabling Storage Encryption . 20 1.1.4 Setting up S3 Encryption . 21 1.1.5 Basic Server Settings . 21 1.1.6 Setting up User Access . 23 1.1.6.1 FileCloud User . 24 1.1.6.2 FileCloud User Authentication . 25 1.1.6.2.1 FileCloud Default Authentication . 26 1.1.6.2.2 Active Directory Authentication . 27 1.1.6.2.3 LDAP Based Authentication . 35 1.1.6.3 Enable new account creation requests . 38 1.1.6.3.1 Account Approval . 41 1.1.6.4 Preload data for new accounts . 45 1.1.7 Creating User Groups . 46 1.1.8 Setting up Network Folders . 51 1.1.8.1 Network Shares with NTFS permissions . 62 1.1.8.2 Realtime syncing for Network Folders . 66 1.1.8.3 Setting up Permissions for WebServer on Windows . 69 1.1.9 Setting up FileCloud Branding .
    [Show full text]
  • Konferenzprogramm: Mittwoch, 09.06.2010
    Konferenzprogramm: Mittwoch, 09.06.2010 London (UG) Berlin I (OG) Berlin II (OG) Europa I (OG) Europa II (OG) 10:00 Ruth Heidingsfelder (it- Nils Magnus (LinuxTag e. V.): Oliver Böhm (agentes AG): Caroline Helbing (OXID novum GmbH) und Steffen Eröffnung Java unter Linux - es war eSales AG): eCommerce in Rieger (it-novum GmbH): The Big einmal ... der Cloud: Open Source und SaaS Picture: IT-Infrastruktur- und - ein Traumpaar? Datacentermanagement mit Open Source 10:30 Sven Grounsell (Blubbsoft Jürgen Renfer (Behörde): IT- Torsten Werner (tarent Robert Douglass (Acquia): GmbH): "Ihr macht ja alles Management mit der GLPI- GmbH): Der Java-Albtraum Building Scalable, High kaputt!" - Der Weg eines KMU von Suite Performance Drupal Sites in the Windows zu Linux Cloud 11:00 Bernd Erk (NETWAYS GmbH): Andreas Hankel (IT Jutta Kreyss (IBM Dalibor Topic (Sun Arnd Böken (Graf von Open Source Data Produktion): Deutschland Entwicklung Microsystems GmbH): JDK 7 Westphalen Rechtsanwälte): Warehouse für das IT ImmobilienScout24.de: über 4 GmbH): Linux Arbeitsplätze & OpenJDK Update Cloud-Computing und Management Millionen Besucher pro Monat mit erfolgreich einführen! Usability Auftragsdatenverarbeitung Open Source Software und Diversity im Fokus 11:30 Henning Westerholt Erwin Tenhumberg (SAP AG): Florian Schießl Karsten Gerloff (Free (Kamailio project ): Integrating SAP Applications (Landeshautpstadt Software Foundation Geographical redundant VoIP with Open Source München, Projekt LiMux): Europe) und Torsten Grote (Free systems with Kamailio OpenOffice.org
    [Show full text]
  • 044-046 Tonido-Bubba.Pdf
    ReViews Review: TonidoPlug and Bubba Two Linux Server at Home SERVE YOURSELF Fotolia Kwest, Two ready-to-go Linux-based servers make it easy to set up your home tasks Bubba Two is designed to perform. The back panel of the server (Figure 1) network. BY DMITRI POPOV sports two Gigabit Ethernet jacks marked as WAN and LAN, two USB ports, and two eSATA ports for adding f you want to add a Linux-based back book – and it sports a clean and more storage and connecting a printer. server to your home network, you slick design. Bubba Two’s enclosure is Bubba Two is available in several config- ihave two options: build a server made of thick aluminum, which serves urations with different hard disk capaci- yourself using a spare machine or buy a two purposes: It provides excellent pro- ties: from a modest 80GB to a humon- ready-to-use solution. Choosing the tection against bumps and knocks and gous 2TB. If you have a spare hard disk, ready-made option will save you a lot of helps to dissipate heat generated by the you can also order Bubba Two without a hassle, but it leads to the perennial ques- processor and the hard disk. disk. In case low noise and minimal tion: What Linux-based home server Thanks to a low-power processor and power consumption are your primary should you buy? At least two home passive cooling, the server is whisper- concerns, you can opt for a version of server solutions deserve a closer look: quiet, and the only moving part inside it Bubba Two with a 32GB solid-state disk.
    [Show full text]
  • Linux Journal | April 2017 | Issue
    ™ Categorize Documents with Machine Learning The Importance of Good Ticketing Systems for Sysadmins Since 1994: The Original Magazine of the Linux Community Tips for Cutting the Cable Cord THE SPACE Solve Physics Problems ROBOTICS with Linux CHALLENGE and Linux + Software Updates, Embedded Linux and APRIL 2017 | ISSUE 276 the IoT http://www.linuxjournal.com WATCH: ISSUE OVERVIEW V LJ276-April2017.indd 1 3/22/17 7:13 PM NEW! An NEW! Memory: Past, Architect’s Present and Guide: Future—and Linux for the Tools to Practical books Enterprise IT Optimize It Author: Author: for the most technical Sol Lederman Petros Koutoupis Sponsor: Sponsor: people on the planet. SUSE Intel Cloud-Scale Why Innovative Automation App Developers with Puppet Love High-Speed Author: OSDBMS GEEK GUIDES John S. Tonello Author: Sponsor: Ted Schmidt Puppet Sponsor: IBM Tame the SUSE Docker Life Enterprise Cycle with Storage 4 SUSE Author: Author: Ted Schmidt John S. Tonello Sponsor: Sponsor: SUSE SUSE Download books for free with a BotFactory: Containers simple one-time registration. Automating 101 the End of Author: http://geekguide.linuxjournal.com Cloud Sprawl Sol Lederman Author: Sponsor: Puppet John S. Tonello Sponsor: BotFactory.io LJ276-April2017.indd 2 3/22/17 7:14 PM NEW! An NEW! Memory: Past, Architect’s Present and Guide: Future—and Linux for the Tools to Practical books Enterprise IT Optimize It Author: Author: for the most technical Sol Lederman Petros Koutoupis Sponsor: Sponsor: people on the planet. SUSE Intel Cloud-Scale Why Innovative Automation App Developers with Puppet Love High-Speed Author: OSDBMS GEEK GUIDES John S.
    [Show full text]
  • Tonido Cloud Admin Guide
    CODELATHE LLC Tonido Cloud Admin Guide Installing and Managing Tonido Cloud CodeLathe LLC 10/27/2012 (c) CodeLathe LLC 2012. All Rights Reserved Contents 1. Introduction .......................................................................................................................................................... 3 2. Pre-Requisites ....................................................................................................................................................... 3 3. Installation ............................................................................................................................................................ 4 4. Installation on Ubuntu/Debian Linux .................................................................................................................... 4 5. Apache Configuration ........................................................................................................................................... 5 6. Tonido Cloud Installation: Uploading ZIP .............................................................................................................. 5 7. Tonido Cloud Installation: License File .................................................................................................................. 6 8. Tonido Cloud Setup ............................................................................................................................................... 6 9. Tonido Cloud Configuration .................................................................................................................................
    [Show full text]
  • ICT Innovations 2019 Big Data Processing and Mining 11Th International Conference, ICT Innovations 2019 Ohrid, North Macedonia, October 17–19, 2019 Proceedings
    Sonja Gievska • Gjorgji Madjarov (Eds.) ICT Innovations 2019 Big Data Processing and Mining 11th International Conference, ICT Innovations 2019 Ohrid, North Macedonia, October 17–19, 2019 Proceedings 123 Preface The ICT Innovations conference series, organized by the Macedonian Society of Information and Communication Technologies (ICT-ACT) is an international forum for presenting scientific results related to innovative fundamental and applied research in ICT. The 11th ICT Innovations 2019 conference that brought together academics, students, and industrial practitioners, was held in Ohrid, Republic of North Macedonia, during October 17–19, 2019. The focal point for this year’s conference was “Big Data Processing and Mining,” with topics extending across several fields including social network analysis, natural language processing, deep learning, sensor network analysis, bioinformatics, FinTech, privacy, and security. Big data is heralded as one of the most exciting challenges in data science, as well as the next frontier of innovations. The spread of smart, ubiquitous computing and social networking have brought to light more information to consider. Storage, integration, processing, and analysis of massive quantities of data pose significant challenges that have yet to be fully addressed. Extracting patterns from big data provides exciting new fronts for behavioral analytics, predictive and prescriptive modeling, and knowledge discovery. By leveraging the advances in deep learning, stream analytics, large-scale graph analysis and distributed data mining, a number of tasks in fields like, biology, games, robotics, commerce, transportation, and health care have been brought within reach. Some of these topics were brought to the forefront of the ICT Innovations 2019 conference. This book presents a selection of papers presented at the conference which contributed to the discussions on various aspects of big data mining (including algo- rithms, models, systems, and applications).
    [Show full text]
  • Proyecto Fin De Grado
    ÔÔÔÔÔÔÔÔÔÔ ÔÔÔÔÔ ÔÔÔÔ ÔÔ ÔÔÔÔÔ ÔÔÔÔÔÔÔ ÔÔÔÔÔÔ ÔÔ ÔÔÔÔÔÔÍ ÍÔÔÔÔÍ ÔÔÆÔÔ ÔÔ ÔÔÔÔÔ ÍÔÔÔÔÔÔÆ ÔÔÔÔÔÔ Ô¿¿¿¿ ¿¿ Ô¿¿¿¿¿¿¿¿¿ Ô¿¿¿¿¿¿¿¿¿ VºBº ÔÔÔÔÔ ÔÔÔÔÔ ÔÆÔÔÆ ÔÔÆÔÔ ÔÔ ÔÔÔÔÔ ÍÔÔÔÔÔÔÆ ÔÔÔÔÔÔÔ ÆÔÔÔÔÍ ÔÔÔÔÔÔ ìì »¿»¿¿¿¿»¿¿ ìííí Tecnología Cloud para el Hogar Digital RESUMEN El mundo tecnológico está cambiando hacia la optimización en la gestión de recursos gracias a la poderosa influencia de tecnologías como la virtualización y la computación en la nube (Cloud Computing). En esta memoria se realiza un acercamiento a las mismas, desde las causas que las motivaron hasta sus últimas tendencias, pasando por la identificación de sus principales características, ventajas e inconvenientes. Por otro lado, el Hogar Digital es ya una realidad para la mayoría de los seres humanos. En él se dispone de acceso a múltiples tipos de redes de telecomunicaciones (3G, 4G, WI-FI, ADSL…) con más o menos capacidad pero que permiten conexiones a internet desde cualquier parte, en todo momento, y con prácticamente cualquier dispositivo (ordenadores personales, smartphones, tabletas, televisores…). Esto es aprovechado por las empresas para ofrecer todo tipo de servicios. Algunos de estos servicios están basados en el cloud computing sobre todo ofreciendo almacenamiento en la nube a aquellos dispositivos con capacidad reducida, como son los smarthphones y las tabletas. Ese espacio de almacenamiento normalmente está en los servidores bajo el control de grandes compañías. Guardar documentos, videos, fotos privadas sin tener la certeza de que estos no son consultados por alguien sin consentimiento, puede despertar en el usuario cierto recelo. Para estos usuarios que desean control sobre su intimidad, se ofrece la posibilidad de que sea el propio usuario el que monte sus propios servidores y su propio servicio cloud para compartir su información privada sólo con sus familiares y amigos o con cualquiera al que le dé permiso.
    [Show full text]
  • Tonido Platform: Developers Guide (DRAFT)
    Tonido Platform: Developers Guide (DRAFT) Updated: June 29, 2009 Contents 1. Introduction ...................................................................................................................................... 4 1.1. What is Tonido? ........................................................................................................................ 7 1.2. Why Tonido? ............................................................................................................................. 8 1.3. Supported Platforms ................................................................................................................. 8 1.4. Running Tonido ......................................................................................................................... 9 1.5. What you need to know to build Tonido applications .............................................................. 9 1.6. Reference Books ....................................................................................................................... 9 2. Build System .................................................................................................................................... 11 2.1. What is included in the SDK .................................................................................................... 11 2.2. Supported Platforms ............................................................................................................... 11 2.3. Building on Windows .............................................................................................................
    [Show full text]
  • A Simple and Iterative Reconciliation Algorithm for File Synchronizers
    Syncpal: A simple and iterative reconciliation algorithm for file synchronizers Von der Fakultät für Mathematik, Informatik und Naturwissenschaften der RWTH Aachen University zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften genehmigte Dissertation vorgelegt von Marius Alwin Shekow (M.Sc.) aus Tettnang, Deutschland Berichter: Univ.-Prof. Dr. rer. pol. Matthias Jarke Univ.-Prof. Ph. D . Wolfgang Prinz Univ.-Prof. Dr. Tom Gross Tag der mündlichen Prüfung: 22. November, 2019 Diese Dissertation ist auf den Internetseiten der Universitätsbibliothek verfügbar. Eidesstattliche Erklärung Ich, Marius Alwin Shekow, erkläre hiermit, dass diese Dissertation und die darin dargelegten Inhalte die eigenen sind und selbst- ständig, als Ergebnis der eigenen originären Forschung, generiert wurden. Hiermit erkläre ich an Eides statt 1. Diese Arbeit wurde vollständig oder größtenteils in der Phase als Doktoranddieser Fakultät und Universitätangefertigt; 2. Sofern irgendein Bestandteil dieser Dissertation zuvor für einen akademischen Abschluss oder eine andere Qualifikation an dieser oder einer anderen Institution verwendet wurde, wurde diesklar angezeigt; 3. Wenn immer andere eigene- oder Veröffentlichungen Dritter herangezogen wurden, wurden diese klar benannt; 4. Wenn aus anderen eigenen- oder Veröffentlichungen Dritter zitiert wurde, wurde stets die Quelle hierfür angegeben. Diese Dissertation ist vollständig meine eigene Arbeit, mit der Ausnahme solcher Zitate; 5. Alle wesentlichen Quellen von Unterstützung wurden benannt; 6.
    [Show full text]
  • Open Source Cloud Application Solution with Paas, Saas and Iaas
    Turkish Journal of Physiotherapy and Rehabilitation; 32(3) ISSN 2651-4451 | e-ISSN 2651-446X OPEN SOURCE CLOUD APPLICATION SOLUTION WITH PAAS, SAAS AND IAAS Dr.Vamsidhar Enireddy1, Dr.R.Prabha2,Dr.A.M.Viswa Bharathy3, Dr.A.Sahaya Anselin Nisha4, Dr.Karthikeyan.C5, Dr.D.Vijendra Babu6 1Associate Professor, CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India [email protected] 2Associate Professor, ECE, Sri Sairam Institute of Technology, Chennai, India 3Professor, CSE, Malla Reddy College of Engineering and Technology, Hyderabad, Telangana, India 4Associate Professor, ECE, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, India 5Associate Professor, CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India 6Professor& Vice Principal, ECE, Aarupadai Veedu Institute of Technology, Vinayaka Mission’s Research Foundation, Paiyanoor, Tamil Nadu, India ABSTRACT The article discuss on providing an Open source applications with Infrastructure as Service (IaaS), Platform as Service (PaaS) and Software as Service (SaaS). Using Infrastructure as a Service, we provide Open Stack as a solution for the Virtual servers and other resources like RAM, Disk storage etc. Using Software as Service - Tonido, we aim to design an Open source solution for Cloud storage. Similarly, we aim to design a solution using PaaS that can be accessible through Internet usage rather than developing and installing a complex Software and Hardware equipment. Linux Virtual Machine (VM) will be designed as an Open Source solution for PaaS. The article contributes equally to SaaS, PaaS and IaaS based applications in order to make Cloud Technology user-friendly. Keywords: Cloud Computing, Software as Service (SaaS), Infrastructure as Service (IaaS), Platform as Service (PaaS), Open Stack, Micro Stack, Tonido, Linux, Virtual Machine (VM).
    [Show full text]
  • THE 2014-15 TECHNOLOGY RESOURCE GUIDE a Builder's
    THE 2014-15 TECHNOLOGY RESOURCE GUIDE Prepared For A Builder’s Digital Toolkit - Master Session Las Vegas Convention Center, January 22, 2015 Revised 09/06/2014 TABLE OF CONTENTS TABLE OF CONTENTS ............................................................................................................................................... 1 ABOUT THE TECHNOLOGY RESOURCE GUIDE FOR 2014: .............................................................................. 4 MASTER CLASS: A BUILDER’S DIGITAL TOOLKIT: AN OVERVIEW OF MUST-HAVE TECHNOLOGY FOR BUILDERS AND REMODELERS ...................................................................................................................... 5 STAYING SAFE ONLINE: BONUS CONTENT ........................................................................................................ 6 CHEAP TRICKS 2014: BONUS CONTENT SIMPLE TECHNOLOGY SOLUTIONS TO BIG BUSINESS PROBLEMS ..................................................................................................................................................................14 HOW TO EVALUATE AND SELECT TECHNOLOGY SUCCESSFULLY “TOP-DOWN”: ........................................37 THE FUNNEL : ..................................................................................................................................................................37 INPUTS AND OUTPUTS : WHAT IS A “P ROCESS ”? ...............................................................................................................37 THE DANGERS OF GOING “B OTTOM
    [Show full text]