Abstract
For a hybrid cloud, efficient identity authentication and services retrieval are the two most important issues. Therefore, this paper proposes an architecture for a hybrid cloud that solves these two problems. The services requiring a large amount of resources are designed to be intelligent agents and embedded into a private cloud for applications supported by the Google application engine (GAE). When the users acquire the services from the hybrid cloud, these intelligent agents efficiently authenticate the access rights and retrieve the required services for users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Eason, M., El-Seoud, S.A., Wyne, M.F.: Cloud Computing Based E-Learning System. International Journal of Distance Education Technologies 8(2), 58–71 (2010)
Mell, P., Grance, T.: The NIST Definition of Cloud Computing Ver. 15, 10-7-09. NIST, Information Technology Lab (2009)
Xu, X.: From cloud computing to cloud manufacturing. Robotics and Computer-Integrated Manufacturing 28(1), 75–86 (2012)
Vouk, M.A.: Cloud Computing Issues Research and Implementations. Journal of Computing and Information Technology 16, 235–246 (2008)
Doelitzscher, F., Sulistio, A., Reich, C., Kuijs, H., Wolf, D.: Private Cloud for Collaboration and e-Learning Services:from IaaS to SaaS. Computing 91, 23–42 (2011)
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25(6), 599–616 (2009)
Xu, H.X.: Preliminary Study on the Influence of Cloud Computing on Education. Computer Knowledge and Technology 5, 2690–2692 (2009)
BigTable, http://en.wikipedia.org/wiki/BigTable
BigTable, http://zh.wikipedia.org/wiki/BigTable
Bedra, A.: Getting Started with Google App Engine and Clojure. IEEE Internet Computing 14(4), 85–88 (2010)
González, J.F., RodrÃguez, M.C., Nistal, M.L., Rifón, L.A.: Reverse OAuth: A solution to achieve delegated authorizations in single sign-on e-learning systems. Computers & Security 28(8), 843–856 (2009)
Hwang, K., Li, D.: Trusted Cloud Computing with Secure Resources and Data Coloring. Internet Computing 14(5), 14–22 (2010)
Shehab, M., Marouf, S.: Recommendation Models for Open Authorization. IEEE Transactions On Dependable And Secure Computing 9(4), 583–596 (2012)
OAuth for java, https://developers.google.com/appengine/docs/java/oauth/
Users Java API Overviews, https://developers.google.com/appengine/docs/java/users/overview
Bin, W., Yuan, H.H., Xi, L.X., Min, X.J.: Open Identity Management Framework for Saas Ecosystem. In: Proc. IEEE Int’l Conf. e-Business Eng (ICEBE 2009), pp. 512–517. IEEE Computer Society, Washington (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, YH., Chen, JY. (2013). A Hybrid Cloud for Effective Retrieval from Public Cloud Services. In: Selamat, A., Nguyen, N.T., Haron, H. (eds) Intelligent Information and Database Systems. ACIIDS 2013. Lecture Notes in Computer Science(), vol 7802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36546-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-36546-1_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36545-4
Online ISBN: 978-3-642-36546-1
eBook Packages: Computer ScienceComputer Science (R0)