• Home
  • Cloud Computing
    • List of Articles Cloud Computing

      • Open Access Article

        1 - Identifying Technological Business Criteria Based On Cloud Computing Using Fuzzy Delphi Method
        Ahmad fendereski
        This study aimed to identify technological business criteria based on cloud computing that technology can greatly help to technological business in Iran small and medium-sized trade, and it can also have a significant impact on improving the delivery of services, decrea More
        This study aimed to identify technological business criteria based on cloud computing that technology can greatly help to technological business in Iran small and medium-sized trade, and it can also have a significant impact on improving the delivery of services, decreasing current problems and decreasing costs. The current research has been done during one year and it is developmental research and it is analytical- exploratory based on nature. The current study has been done based on mixed research (quality-quantity) and gathering data conducted via literature review and viewpoint of experts and the method of gathering data was questionnaire and interview and fuzzy Delphi. Criteria and sub criteria were identified by interview and literature review and the comments of experts were given by Delphi questionnaire. In this method, fuzzy theory has been used for modeling variables in experts’ comments and group decision making. This research has been done during one year and the most important results were selected for reviewing criteria including space accessibility, information retrievability, appropriateness, technical factors and economic factors which had maximum limits in technological business. Manuscript profile
      • Open Access Article

        2 - Reliable resource allocation and fault tolerance in mobile cloud computing
        Zahra Najafabadi Samani Mohammad Reza  Khayyam Bashi
        By switching the computational load from mobile devices to the cloud, Mobile Cloud Computing (MCC) allows mobile devices to offer a wider range of functionalities. There are several issues in using mobile devices as resource providers, including unstable wireless connec More
        By switching the computational load from mobile devices to the cloud, Mobile Cloud Computing (MCC) allows mobile devices to offer a wider range of functionalities. There are several issues in using mobile devices as resource providers, including unstable wireless connections, limited energy capacity, and frequent location changes. Fault tolerance and reliable resource allocation are among the challenges encountered by mobile service providers in MCC. In this paper, a new reliable resource allocation and fault tolerance mechanism is proposed in order to apply a fully distributed resource allocation algorithm without exploiting any central component. The objective is to improve the reliability of mobile resources. The proposed approach involves two steps: (1) Predicting device status by gathering contextual information and applying TOPSIS to prevent faults caused by volatility of mobile devices, and (2) Adapting replication and checkpointing methods to fault tolerance. A context-aware reliable offloading middleware is developed to collect contextual information and manage the offloading process. To evaluate the proposed method, several experiments are run in a real environment. The results indicate improvements in success rates, completion time, and energy consumption for tasks with high computational load Manuscript profile
      • Open Access Article

        3 - Reallocation of Virtual Machines to Cloud Data Centers to Reduce Service Level Agreement Violation and Energy Consumption Using the FMT Method
        Hojjat Farrahi Farimani Davoud  Bahrepour Seyed Reza Kamel Tabbakh reza Ghaemi
        Due to the increased use of cloud computing services, cloud data centers are in search of solutions in order to better provide the services demanded by their users. Virtual machine consolidation is an appropriate solution to the trade-off between power consumption and s More
        Due to the increased use of cloud computing services, cloud data centers are in search of solutions in order to better provide the services demanded by their users. Virtual machine consolidation is an appropriate solution to the trade-off between power consumption and service level agreement violation. The present study aimed to identify low, medium, and high load identification techniques, as well as the energy consumption and SLAv to minimize. In addition to the reduced costs of cloud providers, these techniques enhance the quality of the services demanded by the users. To this end, reallocation of resources to physical hosts was performed at the medium load level using a centralized method to classify the physical hosts. In addition, quartile was applied in each medium to reduce the energy consumption parameters and violation level. The three introduced SMT - NMT and FMT methods for reallocation of resources were tested and the best results were compared with previous methods.The proposed method was evaluated using the Cloudsim software with real Planet Lab data and five times run, the simulation results confirmed the efficiency of the proposed algorithm, which tradeoff between decreased the energy consumption and service level of agreement violation (SLAv) properly. Manuscript profile
      • Open Access Article

        4 - Providing a New Smart Camera Architecture for Intrusion Detection in Wireless Visual Sensor Network
        Meisam Sharifi Sani Amid Khatibi
        The wireless Visual sensor network is a highly functional domain of high-potential network generations in unpredictable and dynamic environments that have been deployed from a large number of uniform or non-uniform groups within the desired area, cause the realization o More
        The wireless Visual sensor network is a highly functional domain of high-potential network generations in unpredictable and dynamic environments that have been deployed from a large number of uniform or non-uniform groups within the desired area, cause the realization of large regulatory applications from the military and industrial domain to hospital and environment. Therefore, security is one of the most important challenges in these networks. In this research, a new method of routing smart cameras with the help of cloud computing technology has been provided. The framework in the cloud computing management layer increases security, routing, inter interaction, and other features required by wireless sensor networks. Systematic attacks are simulated by a series of standard data collected at the CTU University related to the Czech Republic with RapidMiner software. Finally, the accuracy of detection of attacks and error rates with the suggested NN-SVM algorithm, which is a combination of vector machines and neural networks, is provided in the smart cameras based on the visual wireless sensor networks in MATLAB software. The results show that different components of the proposed architecture meet the quality characteristics of visual wireless sensor networks. Detection of attacks in this method is in the range of 99.24% and 99.35% in the worst and best conditions, respectively. Manuscript profile
      • Open Access Article

        5 - Presenting a Model for Technology Transfer Governance of Cloud Computing
        mozhgan marashi neda abdolvand
        In recent years, developing countries have followed the use of technological advances and technology transfer of cloud computing is one of these innovations. Using innovations in the domain of information technology enables organizations to improve their economic status More
        In recent years, developing countries have followed the use of technological advances and technology transfer of cloud computing is one of these innovations. Using innovations in the domain of information technology enables organizations to improve their economic status. As a result, it is necessary for organizations to learn how to manage their process of technology transfer. Technology transfer governance is a new concept that can help organizations in this area. Implementation of technology transfer governance can reduce costs and increase productivity For Organizations and facilitate the progress of organizations towards a competitive advantage. In the scope of new technologies such as cloud computing that success and acceptance needs to overcome the challenges and risks that it is facing, Governance transfer processes of this technology can reduce these challenges. As a result, the use of cloud computing can be extended in organizations and organization will benefit from this extention. Current research objective is fundamental and the methodology used is qualitative–descriptive in which the Library Studies are conducted to collect information. Results of research is presentation of two models of governance.in presentation of these models the COBIT framework is used as an efficient and strong governance framework in the field of information technology. The first proposed model is for technology transfer governance and the second model for technology transfer governance of cloud computing Manuscript profile
      • Open Access Article

        6 - Cloud Computing Technology in the Management of Human Resources for Small and Medium Enterprises - Applications, Advantages and Challenges
        Mona Kardani malekinezhad Mohammad Mahdi  Farahi
        In recent years, the advent of cloud computing has brought significant advances in the IT industry, and business management. One of the most important advantages of this technology is its reduced cost and the ability to seamlessly manage resources without the need for c More
        In recent years, the advent of cloud computing has brought significant advances in the IT industry, and business management. One of the most important advantages of this technology is its reduced cost and the ability to seamlessly manage resources without the need for costly deployment of multiple infrastructures and software, and is thus widely used in the deployment of management systems and systems in organizations. Cloud computing technology has also been widely used in human resource management systems. In many cases the implementation and deployment of multiple HRM systems and software, especially for small and medium-sized organizations, entails numerous costs. Cloud computing technology is a tool that allows organizations to form and manage management systems, including their own human resource management systems, in a seamless, low-cost cloud environment. The purpose of this study is to explore the applications, advantages and challenges of cloud computing technology in human resource management, and its implementation requirements especially in small and medium enterprises. The study was carried out through library method and literature review. And it has attempted to review how literature and the requirements of cloud computing are applied in human resource management by reviewing literature and research in this area. Based on the findings of this study, the applications of cloud computing in human resource management systems in SMEs are widespread. This technology can be used in talent recruitment, training and development of human resources, compensation management systems, and human resource management and evaluation. Also, the advantages and challenges of this technology in human resource management of small and medium-sized enterprises can be categorized into two general categories, including internal and external factors. Internal advantages and challenges include technical, security, human, and financial factors, and external factors include environmental and legal factors. The applications and advantages and challenges of this technology are described in detail in the HRM systems of SMEs. The findings of this study can serve as a basis for companies and organizations to manage small organizations using and utilizing cloud computing technology in human resource management systems. Manuscript profile
      • Open Access Article

        7 - Mobility-Aware and Fault-Tolerant Computation Offloading for Mobile Cloud Computing
        R. Roostaei Z. Movahedi
        Nowadays, Internet of Things (IoT) has emerged as an important field in information and communication technologies. Despite the progress of networks and communication technologies, the development of IoT has encountered some challenges mainly with regard to computation More
        Nowadays, Internet of Things (IoT) has emerged as an important field in information and communication technologies. Despite the progress of networks and communication technologies, the development of IoT has encountered some challenges mainly with regard to computation power, battery lifetime and memory of mobile devices. In order to overcome these challenges, mobile cloud computing has been raised which uses the cloud storage space and computation power to extend the capabilities of mobile devices. In this regard, some of application’s components are selected to be offloaded to the cloud in order to optimize the execution time and energy consumption of application. Since the mobility has an important effect on the acquired condition of the access network and the quality of the connection, the mobility should be considered while selecting components for offloading. Although a number of mobility-aware offloading approaches has been already proposed, these works suffer from the lack of an appropriate mobility-model, ignorance of the fault-tolerance capability and use of only coarse-grain offloading. In order to address these issues, we propose a mobility-aware offloading scheme which uses the user mobility Markov chain and the fault tolerance capability in order to optimize the offloading decision. Evaluation results show that our proposed method significantly outperforms the existing alternatives, reaching respectively up to 75 and 65 percent enhancement in terms of the execution time and the energy consumption. Manuscript profile
      • Open Access Article

        8 - Reliable and Energy Efficient Deployment Optimization of Internet of Things Applications in Cloud and Fog Infrastructure by Using Cuckoo Search Algorithm
        Yaser Ramzanpoor میرسعید حسینی شیروانی
        Deployment applications of internet of things (IoT) in fog infrastructure as cloud complementary leads effectively computing resource saving in cloud infrastructure. Recent research efforts are investigating on how to better exploit fog capabilities for execution and su More
        Deployment applications of internet of things (IoT) in fog infrastructure as cloud complementary leads effectively computing resource saving in cloud infrastructure. Recent research efforts are investigating on how to better exploit fog capabilities for execution and supporting IoT applications. Also, the distribution of an application’s components on the possible minimum number of fog nodes for the sake of reduction in power consumption leads degradation of the service reliability level. In this paper, a hybrid meta-heuristic algorithm based on cuckoo search algorithm is presented for static deployment the components of IoT applications on fog infrastructure in the aim of trade-off between efficient power usage, reduction in the effect of one point of failure and boosting the application reliability against failure. The results of simulations show that the proposed approach in this paper reduces the power consumption of fog network and meets the quality of service requirement of IoT application with the high reliability level. Manuscript profile
      • Open Access Article

        9 - Provide an Energy-aware Markov Based Model for Dynamic Placement of Virtual Machines in Cloud Data Centers
        mehdi rajabzadeh Abolfazl Toroghi Haghighat Amir Masoud Rahmani
        The use of energy-conscious solutions is one of the important research topics in the field of cloud computing. By effectively using virtual machine placement and aggregation algorithms, cloud suppliers will be able to reduce energy consumption. In this paper, a new mode More
        The use of energy-conscious solutions is one of the important research topics in the field of cloud computing. By effectively using virtual machine placement and aggregation algorithms, cloud suppliers will be able to reduce energy consumption. In this paper, a new model is presented that seeks to achieve the desired results by improving the algorithms and providing appropriate methods. Periodic monitoring of resource status, proper analysis of the data obtained, and prediction of the critical state of the servers using the proposed Markov model have reduced the number of unnecessary migrations as much as possible. The combination of genetic algorithm and simulated annealing in the replacement section along with the definition of the adsorbent Markov chain has resulted in better and faster performance of the proposed algorithm. Simulations performed in different scenarios in CloudSim show that compared to the best algorithm compared, at low, medium and high load, energy consumption has decreased significantly. Violations of service level agreements also fell by an average of 17 percent. Manuscript profile
      • Open Access Article

        10 - BOM Model; Designing and Presenting Learning Services based on Cloud Computing by Learning Service Providers
        Dr Firouz Nouri Kalkhoran Kurosh Fathi Vajargah Abasalt Khorasani Amir reza Asnafi
        Cloud computing and cloud services, as a technological solution to the development of educational services, can be very useful in accelerating and expanding services for this type of activities. This study aims to provide a coherent model for the design and delivery of More
        Cloud computing and cloud services, as a technological solution to the development of educational services, can be very useful in accelerating and expanding services for this type of activities. This study aims to provide a coherent model for the design and delivery of services provided by Learning Service Providers (LSPs) based on the capabilities of cloud computing for human resources training and learning. To achieve this, a mixed approach and the theoretical research method were adopted. To identify the elements of the model for designing and delivering cloud-based learning services, we organized semi-structured interviews with specialists in organizational learning and business education. The participants in the interview process were selected using the theoretical sampling method. The interviews were organized using the open coding method. The test-retest reliability method was used in this study to measure the reliability of the coding process used in the specialized interviews. The consistency level (PAQ) was equal to 0.83, indicating a high level of internal consistency. In the second phase, the structure and method of Interactive Management (IM) and the Interpretive Structural Modeling (ISM) software were used for integrating the data and determining the relationship between the elements of the model. In the third section, related to the quantitative part of the research, the Analytic Hierarchy Process (AHP) and Expert Choice software were used to weigh the model design and cloud computing-based learning service delivery elements. Then, a comprehensive model called BOM was presented for the delivery of cloud computing-based learning services. The main elements of the model in the order of weight and level of importance in the model include the tools and mechanisms of technological learning (0.215), establishment of a curriculum planning system (0.208), design of learning services (0.151), learning support services (0.105), learning system performance evaluation (0.074), incentive mechanisms and tools for the use of cloud space for learning (0.068), legal dimensions of the use of cloud space (0.046), learning services business management (0.040), curriculum assessment (0.038), and marketing , advertising and sales of learning services (0.033). Manuscript profile
      • Open Access Article

        11 - Improve security in cloud computing infrastructure using block chain protocol
        Mohsen Gerami Vahid Yazdanian Siavash Naebasl
        Security in cloud computing is very important, cloud computing security is a set of computer security and network security in general is information security and when a processing task by using the virtual machine scheduling algorithm in the cloud for processing Unloadi More
        Security in cloud computing is very important, cloud computing security is a set of computer security and network security in general is information security and when a processing task by using the virtual machine scheduling algorithm in the cloud for processing Unloading will be This virtual machine will not be able to distinguish the normal mobile user from attackers, thus violating the privacy and security of the transmitted data, so after determining the unloading strategy, the China block can be used in information security. And the information of each server is encapsulated and unloaded in the form of a block. In this research, a proposed solution is presented, which is the combination of China blockchain and cloud computing to increase security and efficiency. The proposed solution is implemented and evaluated in order to evaluate its efficiency increase compared to other existing solutions. Manuscript profile
      • Open Access Article

        12 - Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework
        Seyed Omid Azarkasb Seyed Hossein Khasteh Mostafa  Amiri
        A logical solution to consider the overlap of clusters is assigning a set of membership degrees to each data point. Fuzzy clustering, due to its reduced partitions and decreased search space, generally incurs lower computational overhead and easily handles ambiguous, no More
        A logical solution to consider the overlap of clusters is assigning a set of membership degrees to each data point. Fuzzy clustering, due to its reduced partitions and decreased search space, generally incurs lower computational overhead and easily handles ambiguous, noisy, and outlier data. Thus, fuzzy clustering is considered an advanced clustering method. However, fuzzy clustering methods often struggle with non-linear data relationships. This paper proposes a method based on feasible ideas that utilizes multicore learning within the Hadoop map reduce framework to identify inseparable linear clusters in complex big data structures. The multicore learning model is capable of capturing complex relationships among data, while Hadoop enables us to interact with a logical cluster of processing and data storage nodes instead of interacting with individual operating systems and processors. In summary, the paper presents the modeling of non-linear data relationships using multicore learning, determination of appropriate values for fuzzy parameterization and feasibility, and the provision of an algorithm within the Hadoop map reduce model. The experiments were conducted on one of the commonly used datasets from the UCI Machine Learning Repository, as well as on the implemented CloudSim dataset simulator, and satisfactory results were obtained.According to published studies, the UCI Machine Learning Repository is suitable for regression and clustering purposes in analyzing large-scale datasets, while the CloudSim dataset is specifically designed for simulating cloud computing scenarios, calculating time delays, and task scheduling. Manuscript profile
      • Open Access Article

        13 - WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling
        Arash Ghorbannia Delavar Reza Akraminejad sahar mozafari
        Application of cloud computing in different datacenters around the world has led to generation of more co2 gas. In addition, energy and throughput are the two most important issues in this field. This paper has presented an energy and throughput-aware algorithm for sche More
        Application of cloud computing in different datacenters around the world has led to generation of more co2 gas. In addition, energy and throughput are the two most important issues in this field. This paper has presented an energy and throughput-aware algorithm for scheduling of compressed-instance workflows in things-internet by cluster processing in cloud. A method is presented for scheduling cloud workflows with aim of optimizing energy, throughput, and latency. In the proposed method, time and energy consumption has been improved in comparison to previous methods by creating distance parameters, clustering inputs, and considering real execution time. In WSTMOS method by considering special parameters and real execution time, we managed to reach the optimized objective function. Moreover, in the proposed method parameter of time distance of tasks to virtual machines for reduction of number of migration in virtual machines was applied. In WSTMOS method by organizing the workflow inputs to low, medium and heavy groups and also by distributing appropriate load on more suitable servers for processors threshold, we accomplished to optimize energy and cost. Energy consumption was reduced by 4.8 percent while the cost was cut down by 4.4 percent using this method in comparison to studied method. Finally, average delay time, power and workload are optimized in comparison to previous methods. Manuscript profile