Skip to main content

Cloud Computing Technology for the Network Resource Allocation on the Research of Application

  • Conference paper
  • First Online:
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIOT 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1283))

Abstract

The information revolution has brought about the rapid development of the Internet technology services. Where users obtain required hardware platforms software and services through the network in an on-demand and easily scalable manner are becoming increasingly popular. This article introduces the three architecture models four deployment models five architectures five key technologies of cloud computing and explains how to integrate and share the network through cloud computing, flexibly configure and call software and hardware resources. Under resources it greatly reduces the difficulties encountered in the construction of power costs space costs facility maintenance costs, software and hardware construction costs data maintenance costs, etc., improves network resource utilization, reduces costs and provides users with large-scale massive data storage with handling of services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guo, W., Gong, J., Jiang, W., et al.: OpenRS-Cloud: a remote sensing image processing platform based on cloud computing environment. Sci. China Tech. Sci. 53(z1), 221–230 (2010). https://doi.org/10.1007/s11431-010-3234-y

    Article  Google Scholar 

  2. Qian, L., Yu, J., et al.: Overview of Cloud Computing. IOP Conf. Ser. Mater. Sci. Eng. 677(4), 042098 (2019). https://doi.org/10.1088/1757-899x/677/4/042098

    Article  MathSciNet  Google Scholar 

  3. Sun, D.-W., Chang, G.-R., Gao, S., et al.: Modeling a dynamic data replication strategy to increase system availability in cloud computing environments. J. Comput. Sci. Technol. 27(2), 256–272 (2012). https://doi.org/10.1007/s11390-012-1221-4

    Article  MATH  Google Scholar 

  4. Chen, Z., Han, F., Cao, J., et al.: Cloud computing-based forensic analysis for collaborative network security management system. J. Tsinghua Univ. 18(1), 40–50 (2013). https://doi.org/10.3969/j.issn.1007-0214.2013.01.005

    Article  Google Scholar 

  5. Wu, H., Zhang, W., Zhang, J., et al.: A benefit-aware on-demand provisioning approach for multi-tier applications in cloud computing. Front. Comput. Sci. 7(4), 459–474 (2013). https://doi.org/10.1007/s11704-013-2201-8

    Article  MathSciNet  Google Scholar 

  6. Jaybhaye, S.M., Attar, V.Z.: Adaptive workflow scheduling using evolutionary approach in cloud computing. Vietnam J. Comput. Sci. 7(02), 179–196 (2020). https://doi.org/10.1142/s2196888820500104

    Article  Google Scholar 

  7. Liang, Q., Wang, Y.-Z., Zhang, Y.-H.: Resource virtualization model using hybrid-graph representation and converging algorithm for cloud computing. Int. J. Autom. Comput. 10(6), 597–606 (2013). https://doi.org/10.1007/s11633-013-0758-1

    Article  Google Scholar 

  8. Mishra, N., Singh, R.K.: DDoS vulnerabilities analysis and mitigation model in cloud computing. J. Discrete Math. Sci. Cryp. 23(2), 535–545 (2020). https://doi.org/10.1080/09720529.2020.1729503

    Article  Google Scholar 

  9. Vijaya, C., Srinivasan, P.: A hybrid technique for server consolidation in cloud computing environment. Cybern. Inform. Technol. 20(1), 36–52 (2020). https://doi.org/10.2478/cait-2020-0003

    Article  Google Scholar 

  10. Qi, H., Shiraz, M., Liu, J.-Y., et al.: Data center network architecture in cloud computing: review, taxonomy, and open research issues. J. Zhejiang Univ. (Engl. Ed.) (Part C: Comput. Electron.) 15(9), 776–793 (2014). https://doi.org/10.1631/jzus.c1400013

  11. Yanli, C.H.E.N., Lingling, S.O.N.G., Geng, Y.A.N.G.: Attribute-based access control for multi-authority systems with constant size ciphertext in cloud computing. China Telecom. 13(2), 146–162 (2016)

    Google Scholar 

  12. Dokuz, A.S., Celik, M.: Cloud computing-based socially important locations discovery on social media big datasets. Int. J. Inform. Technol. Decis. Making 19(02), 469–497 (2020). https://doi.org/10.1142/s0219622020500091

    Article  Google Scholar 

  13. Cheng, C., Li, J., Wang, Y.: An energy-saving task scheduling strategy based on vacation queuing theory in cloud computing. J. Tsinghua Univ. Nat. Sci. Ed. 20(1), 28–39 (2015). https://doi.org/10.3969/j.issn.1007-0214.2015.01.004

    Article  MathSciNet  Google Scholar 

  14. Gunawan, W., Setyawan, E.: Applying effective cloud computing maturity model (CCMM). IOP Conf. Ser. Mater. Sci. Eng. 725(1), 012091 (2020). https://doi.org/10.1088/1757-899x/725/1/012091

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Scientific and Technological Project of Shiyan City of Hubei Province (sysk202057).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiang Fang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhu, G., Fang, X. (2021). Cloud Computing Technology for the Network Resource Allocation on the Research of Application. In: MacIntyre, J., Zhao, J., Ma, X. (eds) The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy. SPIOT 2020. Advances in Intelligent Systems and Computing, vol 1283. Springer, Cham. https://doi.org/10.1007/978-3-030-62746-1_112

Download citation

Publish with us

Policies and ethics