Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7337003
Younes Oulad Sayad, H. Mousannif, M. Le Page
Crops management might be a hard task especially in semi-arid environments, where crops are not getting enough water by rainfall or natural drainages. Providing additional water resources to crops by irrigation comes with many challenges. On the one hand, too much irrigation will imply losses by evaporation or percolation, while a lack of irrigation can cause water stress. On the other hand, the application of the exact amount of water needed requires the knowledge of numerous parameters such as soil cond itions, plant development, and weather. This paper addresses such issues by providing an efficient strategy for crops and water resources management. The strategy makes use of Big Data and remote sensing to process satellite images over large areas and extract insights from the collected data to help farmers in managing their crops and taking irrigation decisions. We implemented a web service that allows farmers to perform all above-mentioned tasks online.
{"title":"Crop management using Big Data","authors":"Younes Oulad Sayad, H. Mousannif, M. Le Page","doi":"10.1109/CLOUDTECH.2015.7337003","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337003","url":null,"abstract":"Crops management might be a hard task especially in semi-arid environments, where crops are not getting enough water by rainfall or natural drainages. Providing additional water resources to crops by irrigation comes with many challenges. On the one hand, too much irrigation will imply losses by evaporation or percolation, while a lack of irrigation can cause water stress. On the other hand, the application of the exact amount of water needed requires the knowledge of numerous parameters such as soil cond itions, plant development, and weather. This paper addresses such issues by providing an efficient strategy for crops and water resources management. The strategy makes use of Big Data and remote sensing to process satellite images over large areas and extract insights from the collected data to help farmers in managing their crops and taking irrigation decisions. We implemented a web service that allows farmers to perform all above-mentioned tasks online.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336977
Zeddari Abderrazzak, Ettalbi Ahmed
In this paper, we continue improving our MDA Framework whose aim is to generate a SaaS (Software as a Service) inside a Cloud Environment from a multiview model using a Colored Petri Nets. This framework is composed of 4 modules, we will focus on the 3rd one which design an extended PNML based on a multiview system who is supporting views.
{"title":"Cloud SaaS using MDA approach on a multiview models generate a SaaS from a colored Petri Net using view PNML","authors":"Zeddari Abderrazzak, Ettalbi Ahmed","doi":"10.1109/CLOUDTECH.2015.7336977","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336977","url":null,"abstract":"In this paper, we continue improving our MDA Framework whose aim is to generate a SaaS (Software as a Service) inside a Cloud Environment from a multiview model using a Colored Petri Nets. This framework is composed of 4 modules, we will focus on the 3rd one which design an extended PNML based on a multiview system who is supporting views.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123572482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CloudTech.2015.7336962
Saddek Benabied, Abdelhafid Zitouni, M. Djoudi
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud., Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.
{"title":"A cloud security framework based on trust model and mobile agent","authors":"Saddek Benabied, Abdelhafid Zitouni, M. Djoudi","doi":"10.1109/CloudTech.2015.7336962","DOIUrl":"https://doi.org/10.1109/CloudTech.2015.7336962","url":null,"abstract":"Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud., Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336970
M. E. Elsaid, C. Meinel
Online Social Networks (OSN) is one of the booming technologies started in the last decade with significant influence in people internet usage and daily life. Billions of individuals and organizations can share their status, news, photos, videos and files in a free open online world wide community. During the last few years, social networks became a key player in the media sector, advertisement, politics and online gaming. Social networks are a special kind of networks; where the users access not only their own data but their friends' data as well. So each user may access many datacenters in few minutes while browsing his/her friends' feeds., Cloud computing is the new era of datacenter that offers IT as a service. In this paper, we propose a storage allocation mechanism in cloud computing that considers the OSN characteristics such as the friendship matrix and users' locations in order to utilize cloud computing usage for social networks. The proposed algorithm minimizes the average users' data access latency in OSN.
在线社交网络(Online Social Networks, OSN)是近十年来兴起的新兴技术之一,对人们的网络使用和日常生活产生了重大影响。数十亿个人和组织可以在一个免费开放的全球在线社区中分享他们的状态、新闻、照片、视频和文件。在过去的几年里,社交网络成为媒体、广告、政治和在线游戏领域的关键角色。社交网络是一种特殊的网络;用户不仅可以访问自己的数据,还可以访问朋友的数据。因此,每个用户可以在几分钟内访问多个数据中心,同时浏览他/她的朋友的feed。云计算是提供IT即服务的数据中心的新时代。在本文中,我们提出了一种云计算中的存储分配机制,该机制考虑了OSN的特征,如友谊矩阵和用户的位置,以利用云计算在社交网络中的使用。该算法最大限度地降低了OSN中用户的平均数据访问时延。
{"title":"Friendship based storage allocation for online social networks cloud computing","authors":"M. E. Elsaid, C. Meinel","doi":"10.1109/CLOUDTECH.2015.7336970","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336970","url":null,"abstract":"Online Social Networks (OSN) is one of the booming technologies started in the last decade with significant influence in people internet usage and daily life. Billions of individuals and organizations can share their status, news, photos, videos and files in a free open online world wide community. During the last few years, social networks became a key player in the media sector, advertisement, politics and online gaming. Social networks are a special kind of networks; where the users access not only their own data but their friends' data as well. So each user may access many datacenters in few minutes while browsing his/her friends' feeds., Cloud computing is the new era of datacenter that offers IT as a service. In this paper, we propose a storage allocation mechanism in cloud computing that considers the OSN characteristics such as the friendship matrix and users' locations in order to utilize cloud computing usage for social networks. The proposed algorithm minimizes the average users' data access latency in OSN.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133069149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336989
A. Maarouf, A. Marzouk, A. Haqiq
Recent years have seen a significant increase in cloud computing simulation tools. They are essential to evaluate cloud computing services and applications. Indeed, they can help to test, evaluate, and replicate the assumptions cost-effectively before a cloud platform is deployed in a real environment. It also provides an option to change and control the bottlenecks of the performance prior to implementing on an actual cloud platform. The simulation tools for cloud computing are also important to help users choose which cloud computing service is suitable for their requirements as deploying and operating a cloud platform in a real environment are often expensive, time consuming, or even impractical due to multiple test runs in different conditions and requirements. This paper surveys the various simulation platforms and tools of cloud computing. We identify the characteristics of the tools highlighting their strengths and weaknesses. Finally, the paper notes the challenges and the future research directions.
{"title":"Comparative study of simulators for cloud computing","authors":"A. Maarouf, A. Marzouk, A. Haqiq","doi":"10.1109/CLOUDTECH.2015.7336989","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336989","url":null,"abstract":"Recent years have seen a significant increase in cloud computing simulation tools. They are essential to evaluate cloud computing services and applications. Indeed, they can help to test, evaluate, and replicate the assumptions cost-effectively before a cloud platform is deployed in a real environment. It also provides an option to change and control the bottlenecks of the performance prior to implementing on an actual cloud platform. The simulation tools for cloud computing are also important to help users choose which cloud computing service is suitable for their requirements as deploying and operating a cloud platform in a real environment are often expensive, time consuming, or even impractical due to multiple test runs in different conditions and requirements. This paper surveys the various simulation platforms and tools of cloud computing. We identify the characteristics of the tools highlighting their strengths and weaknesses. Finally, the paper notes the challenges and the future research directions.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"30 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130521115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336969
Kun Ma, Bo Yang
Change data capture (CDC) is an approach to data integration that is used to determine and track the data that has changed so that action can be taken using the change data. However, the state of art of change data capture (CDC) in the context of document-oriented NoSQL databases is not mature. Therefore, it is urgent to require a NoSQL CDC solution. Although some manufacturers of NoSQL databases start to research on CDC for NoSQL, these approaches are just for the specific product. In our paper, we propose a log-based CDC approach from abstract schema-free document stores using MapReduce. The process is divided into map and reduce procedures, benefited from MapReduce framework, to generate cell state models (CSMs). In order to infinitely look back to any revision, we enable our proposed CSM to support copy-modify-merge model to manage the revisions of change data. Finally, experimental results show that this approach is independent and appropriate for document stores, with high performance and throughput capacity.
{"title":"Log-based change data capture from schema-free document stores using MapReduce","authors":"Kun Ma, Bo Yang","doi":"10.1109/CLOUDTECH.2015.7336969","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336969","url":null,"abstract":"Change data capture (CDC) is an approach to data integration that is used to determine and track the data that has changed so that action can be taken using the change data. However, the state of art of change data capture (CDC) in the context of document-oriented NoSQL databases is not mature. Therefore, it is urgent to require a NoSQL CDC solution. Although some manufacturers of NoSQL databases start to research on CDC for NoSQL, these approaches are just for the specific product. In our paper, we propose a log-based CDC approach from abstract schema-free document stores using MapReduce. The process is divided into map and reduce procedures, benefited from MapReduce framework, to generate cell state models (CSMs). In order to infinitely look back to any revision, we enable our proposed CSM to support copy-modify-merge model to manage the revisions of change data. Finally, experimental results show that this approach is independent and appropriate for document stores, with high performance and throughput capacity.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122390480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336987
Mohssine El Ajjouri, S. Benhadou, H. Medromi
The agents used in the intrusion detection architectures have multiple characteristics namely delegation, cooperation and communication. However, an important property of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. For this, normal profiles are built in a dedicated training phase, these profiles are then compared with the current activity. Thus, the IDS does not have the ability to detect new attacks., In this paper, we propose a new architecture for intrusion detection based in MAS adding a learning feature abnormal behaviors that correspond to new attack patterns. To learn a new attack, the architecture must detect at first and then update the base of attack patterns. For the detection step, the approach adopted is based on the technique of Case-Based Reasoning (CBR). The proposed architecture is based on a hierarchical and distributed strategy where features are structured and separated into layers., We focus after on the modeling of our Multi agent systems Architecture, for reasons of simplicity, we use the methodology O-MaSE.
{"title":"Use of O-MaSE methodology for designing efficient intrusion detection based on MAS to learn new attacks","authors":"Mohssine El Ajjouri, S. Benhadou, H. Medromi","doi":"10.1109/CLOUDTECH.2015.7336987","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336987","url":null,"abstract":"The agents used in the intrusion detection architectures have multiple characteristics namely delegation, cooperation and communication. However, an important property of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. For this, normal profiles are built in a dedicated training phase, these profiles are then compared with the current activity. Thus, the IDS does not have the ability to detect new attacks., In this paper, we propose a new architecture for intrusion detection based in MAS adding a learning feature abnormal behaviors that correspond to new attack patterns. To learn a new attack, the architecture must detect at first and then update the base of attack patterns. For the detection step, the approach adopted is based on the technique of Case-Based Reasoning (CBR). The proposed architecture is based on a hierarchical and distributed strategy where features are structured and separated into layers., We focus after on the modeling of our Multi agent systems Architecture, for reasons of simplicity, we use the methodology O-MaSE.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117004841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7336982
R. Gonçalves, E. Leonova, R. Puttini, Anderson C. A. Nascimento
Despite the movement towards cloud computing, the involvement of a third-party is quite challenging when dealing with sensitive information. This article proposes a practical scheme for making possible to outsource medical data to fully malicious clouds while preserving privacy, resulting in a ready-to-go architecture based on hybrid encryption carried out at the client-side. Standard efficient cryptographic primitives are used to provide dynamic key management with no further assumptions about the data structure. We also encompass two-factor authentication to combine passwords with tokens generated by mobile devices, averting cumbersome smart cards or biometrics. The resulting framework is evaluated through a real-world cloud application, producing a full-featured prototype with a controllable shared access model not exploitable by any opponents.
{"title":"A privacy-ensuring scheme for health data outsourcing","authors":"R. Gonçalves, E. Leonova, R. Puttini, Anderson C. A. Nascimento","doi":"10.1109/CLOUDTECH.2015.7336982","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336982","url":null,"abstract":"Despite the movement towards cloud computing, the involvement of a third-party is quite challenging when dealing with sensitive information. This article proposes a practical scheme for making possible to outsource medical data to fully malicious clouds while preserving privacy, resulting in a ready-to-go architecture based on hybrid encryption carried out at the client-side. Standard efficient cryptographic primitives are used to provide dynamic key management with no further assumptions about the data structure. We also encompass two-factor authentication to combine passwords with tokens generated by mobile devices, averting cumbersome smart cards or biometrics. The resulting framework is evaluated through a real-world cloud application, producing a full-featured prototype with a controllable shared access model not exploitable by any opponents.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117140828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7337016
B. Rida, Ettalbi Ahmed
This work is based on two major areas, the Multiview Service Oriented Architecture and the combination between the computing cloud and MVSOA. Thus, it is suggested to extend firstly the service oriented architecture (SOA) into an architecture called MVSOA by adding two components, the Multiview service generator, whose role is to transform the classic service into Multiview service, and the data base, this component seeks to stock all of consumer service information. It is also suggested to combine the computing cloud and Multiview Service Oriented Architecture MV-SOA. To reach such combination, the MV-SOA architecture was taken and we added to the client-side a private cloud in SAAS.
{"title":"Multiview SOA: Extending SOA using a private cloud computing as SaaS","authors":"B. Rida, Ettalbi Ahmed","doi":"10.1109/CLOUDTECH.2015.7337016","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337016","url":null,"abstract":"This work is based on two major areas, the Multiview Service Oriented Architecture and the combination between the computing cloud and MVSOA. Thus, it is suggested to extend firstly the service oriented architecture (SOA) into an architecture called MVSOA by adding two components, the Multiview service generator, whose role is to transform the classic service into Multiview service, and the data base, this component seeks to stock all of consumer service information. It is also suggested to combine the computing cloud and Multiview Service Oriented Architecture MV-SOA. To reach such combination, the MV-SOA architecture was taken and we added to the client-side a private cloud in SAAS.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130657085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-02DOI: 10.1109/CLOUDTECH.2015.7337007
Abdelhamid El Alami, Hicham Sadok, Naima Elhaoud
This paper introduces a nutshell of the cloud computing with its different deployment and delivery models. Additionally, it presents an assessment of the impact of the cloud computing on the organizational performance from many points of view.
本文简要介绍了云计算及其不同的部署和交付模型。此外,它还从多个角度评估了云计算对组织绩效的影响。
{"title":"Cloud computing & the organizational performance different approach of assessment","authors":"Abdelhamid El Alami, Hicham Sadok, Naima Elhaoud","doi":"10.1109/CLOUDTECH.2015.7337007","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337007","url":null,"abstract":"This paper introduces a nutshell of the cloud computing with its different deployment and delivery models. Additionally, it presents an assessment of the impact of the cloud computing on the organizational performance from many points of view.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}