- Cloud Data Architecture

2012 ◽  
pp. 222-265
Keyword(s):  
2019 ◽  
Vol 2 (1) ◽  
pp. 1-16
Author(s):  
Anjas Tryana

With the development of technology today, it is very important for every company to plan and develop a system to support business processes in each company. Achieving the goals of an enterprise faces challenges and changes that require strategies for effective measures and efficient use of resources. One important and increasingly widely used strategy is the use and improvement of information system support for the enterprise. This plan can utilize enterprise architecture planning methodology that produces data architecture, application architecture, technology architecture, and the direction of its implementation plan for the enterprise.CV Biensi Fesyenindo is engaged in retail garment, with branches throughout Indonesia, covering the areas of Kalimantan, Sulawesai, NTB, NTT, Bali, Java and Sumatra. In their daily activities, they carry out production to distribution processes to meet market and employee needs.The enterprise architecture model used in this study is by using Enterprise Architecture Planning (EAP). EAP is a process of defining enterprise architecture that focuses on data architecture, applications and technology in supporting business and plans to implement the architecture, where the EAP method has several stages, starting from planning in planning, business modeling , Current System and Technology (Current System & Technology), Data Architecture (Data Architecture), Application Architecture (Applications Architecture), Technology Architecture (Technology Architecture), Implementation Plans (Implementation Plans).The results of this study are recommendations for information systems for Fesyenindo Biensi CV in the form of enterprise architecture planing blue print planning that is successful in defining 5 main business processes, which consist of application architecture data architecture and for technological architecture to produce technology architecture proposals divided into 5 chapters 110 pages .


Author(s):  
Jiayong Yu ◽  
Longchen Ma ◽  
Maoyi Tian, ◽  
Xiushan Lu

The unmanned aerial vehicle (UAV)-mounted mobile LiDAR system (ULS) is widely used for geomatics owing to its efficient data acquisition and convenient operation. However, due to limited carrying capacity of a UAV, sensors integrated in the ULS should be small and lightweight, which results in decrease in the density of the collected scanning points. This affects registration between image data and point cloud data. To address this issue, the authors propose a method for registering and fusing ULS sequence images and laser point clouds, wherein they convert the problem of registering point cloud data and image data into a problem of matching feature points between the two images. First, a point cloud is selected to produce an intensity image. Subsequently, the corresponding feature points of the intensity image and the optical image are matched, and exterior orientation parameters are solved using a collinear equation based on image position and orientation. Finally, the sequence images are fused with the laser point cloud, based on the Global Navigation Satellite System (GNSS) time index of the optical image, to generate a true color point cloud. The experimental results show the higher registration accuracy and fusion speed of the proposed method, thereby demonstrating its accuracy and effectiveness.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


Author(s):  
Umesh Banodha ◽  
Praveen Kumar Kataria

Cloud is an emerging technology that stores the necessary data and electronic form of data is produced in gigantic quantity. It is vital to maintain the efficacy of this data the need of data recovery services is highly essential. Cloud computing is anticipated as the vital foundation for the creation of IT enterprise and it is an impeccable solution to move databases and application software to big data centers where managing data and services is not completely reliable. Our focus will be on the cloud data storage security which is a vital feature when it comes to giving quality service. It should also be noted that cloud environment comprises of extremely dynamic and heterogeneous environment and because of high scale physical data and resources, the failure of data centre nodes is completely normal.Therefore, cloud environment needs effective adaptive management of data replication to handle the indispensable characteristic of the cloud environment. Disaster recovery using cloud resources is an attractive approach and data replication strategy which attentively helps to choose the data files for replication and the strategy proposed tells dynamically about the number of replicas and effective data nodes for replication. Thus, the objective of future algorithm is useful to help users together the information from a remote location where network connectivity is absent and secondly to recover files in case it gets deleted or wrecked because of any reason. Even, time oriented problems are getting resolved so in less time recovery process is executed.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Sign in / Sign up

Export Citation Format

Share Document