This website uses cookies to ensure you have the best experience. Learn more

Mobile Gis Cloud Computing Survey Essay

1388 words - 6 pages

GIS is a data intensive in nature and it is a mature technology. It has facilitated a large amount of geospatial and non-spatial data. The size of these data with time will grow to be large enough to restrict any single organization to maintain and handle such a massive data. Also GIS applications are severe consume of computational resources such as processing, memory and storage to perform manipulative operations on such huge data. These applications generally include data acquisition and preprocessing from multiple sources which is followed by exhaustive spatial analysis [1]. GIS functions and services are geographically and logically distributed due to the source of data, location of computing facilities and organizations. GI systems are expensive investment (HW, SW, personnel), moreover data acquisition and maintenance which are usually expensive and time consuming [2].
Therefore GIS always develops through governmental authorities and massive organizations which can afford such investment. Many of smaller users in different domains do not have the capability to drive GIS. Cloud computing provides resources as a service. It offers scalable infrastructure and solution to such challenges to host large volumes of data as well as powerful computing resources [1]. With cost reduction are needed and release the upfront expensive cost, Cloud GIS help many businesses [3][4]. The extensive use of GIS especially in mobile apps which becoming increasingly widespread all over the world in different types of fields, can with good opportunity be moved to the Cloud. This trend will provide on-demand services to wider range and a variety of small users.
"GIS experienced a tectonic change from stand-alone applications to a distributed environment illustrated in Spatial Data Infrastructure (SDI)" (Masser, 2005). The evolution of GIS from two-layer architecture (client and server) to the multi-layer architecture is driven by the related need of GIS applications. Open Geospatial Consortium (OGC) provides a blueprint for implementing Service Oriented Architecture (SOA) in GI science applications (Friis Christensen, 2007).
The OGC standards are technical documents that detail interfaces or encodings. These standards are implemented in products or online services. It has been the backbone of the standardization and interoperability relating to the spatial data and GI services. OGC tiered architecture shows the interaction among modular tiers in the geospatial landscape (OGC, 2011) as shown in figure 1, the interaction among modular tiers in the geospatial landscape. [5][6]

OGC facilitates the interoperability and SOA standards (OGC, 2008):
• Web Map Services (WMS) provides implementation specification for the creation and display of map like views of information.
• Web Feature Services (WFS) allows a client to retrieve and update geospatial data encoded in Geography Markup Language (GML) from multiple web feature...

Find Another Essay On Mobile GIS Cloud Computing Survey

Introduction to Cloud Computing Essay

1033 words - 5 pages Introduction Cloud Computing is an up and coming strategy that could create millions of jobs while allowing companies to become more profitable. How does Cloud Computing work? The basis of Cloud Computing is having data, software, platforms or networks stored and executed by an outside source and then streaming the output to your electronic device.(McKendrick, J. 2012 march 3) In this paper I will address the following three topics: the

Three Core Uses of Geographic Information Systems in Pakistan

2065 words - 9 pages and other planets, including the hydrologic cycle, water resources and environmental watershed sustainability. GIS is a mechanical field that fuses topographical characteristics with even information so as to guide, examine, and survey genuine issues. The decisive word to this innovation is Geography – this implies that some bit of the information is spatial. as such, this alludes to information that is somehow referenced to areas on the earth

Analysis of Cloud Computing Security

1549 words - 7 pages Cloud computing security or cloud security is a growing sub-domain of network security, computer security and more broadly information security. It refers to a set politics, technologies and controls deployed to protect the data, applications and the associated infrastructure of cloud computing. Cloud computing importance is increasing and gaining scientific attention and industrial communities. Cloud computing is one among the top 10 most

Cloud Computing

1666 words - 7 pages ). A View of Cloud Computing. Communications of The ACM, 53(4), 50-58. Bhadauria, R., Chaki, R., Chaki, N., & Sanyal, S. (2011). A Survey on Security Issues in Cloud Computing. Retrieved from EBSCOhost. Currier, G. (2011). SPEEDING TO THE CLOUD. Baseline, (110), 18. Retrieved from EBSCOhost Misra, S., & Mondal, A. (n.d). Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding

Cloud Forensics

1033 words - 5 pages ] Personal Cloud Storage Also known as mobile cloud storage, personal cloud storage is a division of public cloud storage that applies to storing an individual's data in the cloud and providing the individual with access to the data from anywhere provided there’s internet connection. It also provides data syncing and sharing competencies across multiple devices. Apple's iCloud is one of many examples of personal cloud storage where devices

A Case Study on the cyber-attack in cloud computing

2545 words - 10 pages ,Communications of the ACM 53 (4) (2010) 50–58. [p4] N. Fernando, S.W. Loke, W. Rahayu, Mobile cloud computing: a survey, Future Generation Computer Systems 29 (1) (2013) 84–106. [p5] R. Aoun, C.E. Abosi, E.A. Doumith, R. Nejabati, M. Gagnaire, D. Simeonidou,Towards an optimized abstracted topology design in cloud environment,Future Generation Computer Systems 29 (1) (2013) 46–60. [p8] G. Anthes, Security in the cloud, Communications of the ACM 53 (11

Security in The Cloud

1724 words - 7 pages Rahul Shah Paper #1 Digital Hardware Basics Security in the cloud Hackers have gotten there way into every technological gadget out there. Something simple as browsing the web can give hackers information about the people’s data. Before Cloud computing, hackers were stealing data from the physical hard drive by implementing a virus that would open a back door and send the data straight to the hacker’s server. As security measure

the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information...

3968 words - 16 pages Media has the maximum level of security at every level of management and in each of the information system they use. Employee and customer records must be kept secured so that no one can access it. Example: T-Mobile customers' private details were sold to a rival firm. So, in this case security of data is very important. (www.16) (Laudon, K. Pg. 434-442) CLOUD COMPUTING: Cloud computing is a general term for anything that

Investing in Cloud Computing Provides Improvement in Productivity

692 words - 3 pages cloud computing an attractive option. Now for cloud computing for mobile users, the primary constraints for mobile computing are limited wireless bandwidth and energy. Cloud computing can provide energy savings as a service to mobile users, though it also poses some unique challenges. Energy saving in the mobile connected to cloud depends on the connectivity, it is less when it is connected through wireless LAN it is maximum when it is connected

Security: Cloud Computing

1554 words - 6 pages computing security is still considered the major issue in the cloud computing environment. Customers do not want to lose their private information as a result of malicious insiders in the cloud. In addition, the loss of service availability has caused many problems for a large number of customers recently. Furthermore, data intrusion leads to many problems for the users of cloud computing. The purpose of this work is to survey the recent research on

Should we switch to cloud computing?

1253 words - 6 pages hardisk and software such as operating system (windows, Mac os, or Linux) to run a computer. This traditional form computer still can we see in many places such as people’s house, schools, public spaces, or companies. This time, there is a newer computing system called cloud computing. Like its name, this cloud computing use the computing resources on the ‘cloud’. This cloud means the computing resources (hardware or software) is placed far away

Similar Essays

Overview Of Cloud Computing Essay

2304 words - 9 pages data access monitoring”. The characteristics of the cloud are the main reason of delivering customer service to the cloud. Reduction of the IT cost is the most apparent reason for moving into cloud services. In addition, other benefits such as the total flexibility, able to acquire the right information in a much faster rate and able to meet the challenges of a mobile workforce are the add-ons to the benefits of usage on cloud computing. On the

Cloud Computing Essay

3648 words - 15 pages amalgamation of technologies, incorporating service oriented architecture, virtualization, Web 2.0, as well as utility computing, several of the privacy as well as security issues included might be seen as known issues throws in another setting (Jansen and Grance, 2011).Since the introduction of cloud concept, security has been a thorny issue, a dual survey by IEEE/Cloud Security Alliance (2010) stated that the need for security standard in cloud computing

What´S Cloud Computing? Essay

840 words - 4 pages applications and storage over the internet for general use. Public cloud services can be offered on a pay-per-usage mode so that you only pay for what you use. An example of a public cloud is the TV and film services Netflix what lets users stream content anywhere in the world to their mobile devices. A community cloud is a cloud infrastructure that is shared be several organizations that have common computing concerns, such as audit requirements. The

Using Data Encryption For Security In Cloud Computing

2098 words - 8 pages another device or computer system. The popularity and increased use of these devices has helped increase the popularity of cloud computing. Today, people have the ability to access this information at various locations. Mobile functionality is a necessity to many businesses and individuals. Cloud computing is a major benefit to the mobile community as it allows individuals to be able to have access to files located on a remote server. This