Cloud Computing and Fundamental Laws of Library and Information Science
ABSTRACT:
The demand of users to access Library resources is expected to increase dynamically which creates high demands for Information and Communication Technology (ICT). Available resources of the Library and Information Centre may not be enough to fulfill such demands of library users. The solution for its library and information Centre have to use Cloud Computing. The aim of cloud computing is to make save cost expenditure on the machine, hardware, software, and resource optimize among users of the library where the different user need different things. This paper is intended to adopt cloud computing in library and Information Centre which will very useful and new Technology to achieve maximum usage of library resources in terms of the fundamental laws of Library science.
KEYWORDS: Cloud Computing, Laws of Library Science, Cloud Service Models, Cloud Deploy Models.
INTRODUCTION:
Cloud Computing is a new technology which provides computing as a utility over the internet. Cloud providers provide different deployed models like Public cloud, Private cloud, Community cloud and Hybrid cloud. Cloud providers also provide different services like Infrastructure as a service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Cloud Computing gives benefits to individual or Institutions as they were not required extra setting up of hardware like CPU, Storage, network and software like applications, databases, web servers to use cloud resources. Now, more and more Institutions adopt cloud computing. One of the best advantages of cloud computing is anyone can access cloud resources anytime and anywhere through internet.
LITERATURE REVIEW:
(Agrawal and Rathore, 2011) discussed cloud computing scheduling, cloud resource management, they also proposed model of architecture platform and FCAPS based services for distributed cloud computing platform. (Baghel and Dewangan, 2012) emphasis data storage in cloud computing, they gave security aspects, threats, attacks of cloud computing data storage. They also suggest effective scheme for data storage. (GSGN, Sisodiya and Saurav, 2016) discussed encryption for secrecy in cloud computing. For security purpose encryption technique is essential in cloud computing, they also discussed ID based encryption, attribute based encryption, proposed network based cryptosystem for cloud security. (LeeladharandPrabadevi, 2017) expressed ID based ring signature by validating time slot in cloud environment, they discussed about ring signature method, its applications for users who want privacy and security. (Santhi and Saravanan, 2017) explored models for cloud computing architecture in health care, cloud management applications are defined as QoS criteria, proposed SHARPE tool model, results showed total waiting time and end users in model rates and batch size are different. (Bedi, 2017) described technologies for safe guard data in cloud computing such as AES, Hashing, Digital signature, Single sign on, Hardened Virtualserver images etc. he also discussed statistical analysis of New Zealand based financial organization, Risk in cloud computing, benefits of hybrid cloud computing etc. (Manu et al., 2010) highlighted cloud computing and its research issues. They discussed different service and deployed models, cloud services of cloud computing, research issues of cloud computing like data privacy, data reliability, cloud standardization etc (Naderkar, et. al, 2015) explored key policy of attribute based encryption algorithms, methodology for implementation like privacy preserving public auditing scheme, design goals and proposed system and module, they also discussed about cloud storage service providers to save cost, time and work load of organization.
Purpose of Study:
1. To Study cloud computing in Library services
2. To applied laws of library science in Cloud computing
Definition of Cloud Computing:
NIST (National Institute of Standards and Technology) Defining "Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (such as networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models."
Deployed Models:
Following are deployed models of Cloud Computing
Public Cloud:
Public cloud also known as external clouds. The public cloud itself to the public, it run by third party and applications from the different client, both mixed together on storage, Servers, and network.
Private Cloud:
Private Cloud itself owned and used by one organization or Institute, not data available to the general public. It also known as Internal clouds. The private cloud model is more secure than Public Cloud. Private clouds may be either on-or-off campus (Sosinsky, 2015)
Community Cloud:
It made for several institutions or organizations and supports a particular community for shared concern like vision, mission, policy etc. (Buyya et. al.2015)
Hybrid Cloud:
It a combination of two or more cloud called the hybrid cloud. It would be the composition of more than two clouds of a public, private or hybrid cloud. (Bassi, and Chaudhary, 2015) Hybrid cloud retains their unique identities, but they are bound together as a unit. It offers standardized access to application and data. (Sosinsky, 2015)
Cloud Service Models:
There are Three service models as following:
Infrastructure as a Service (IaaS):
It offers virtualized resources on demand and customized software stack. It considered the bottom layer of the Cloud computing systems. Ex. Amazon Web Services
Platform as a Service (PaaS):
It providing raw computing and storage services to make easily programmable called PaaS. It offers developers to create and deploy applications to run on the cloud. Ex. Google AppEngine.
Software as a Service (SaaS):
It provided services to end users by web portals. Users shifting from the local machine to online software services which offer the same functions. Traditionally word, Excel, power point applications now accessed services on the web. Ex. Salesforce.com
Five laws of Library and Information Science:
Five laws of Library science theory introduced by S. R. Ranganathan in 1928, detailed laws and their implication given in the book by Dr. S. R. Ranganathan in 1931.most of library and information Centre accept them as a fundamental law. These laws are as follows.
1. Books are for use
2. Every reader his/her book
3. Every Book its reader
4. Save the Time of User
5. The Library is a growing Organism
(Crawford and Gorman, 1995) applied fundamental laws in new ways as follows:
1. Libraries serve Humanities
2. Respect all forms by which knowledge is communicated
3. Use Technology Intelligently to enhance service.
4. Protect free access to knowledge
5. Honor the past and create the future
(Noruzi, 2004) applied laws of library science in web resources as follows:
1. Web resources are for use.
2. Every user has his or her web resource.
3. Every web resources its user.
4. Save the time of the user.
5. The Web is growing an organism
Now, in this era, five laws of library science used in Cloud computing for serving new and high tech services to the user. these laws are as follows:
First Law: Cloud Resources are for use:
First law of Library Science Books are for Use indicates the basis of library services, it shows that books are not for storage and preservation, it for use. Therefore, the book should be open access, the location of the library and library hours are convenient for users. In cloud computing all Library resources kept in the cloud, anyone can use it on their demand, in this term cloud resources fulfill the first law.
Second Law: Every Reader his / her Cloud Resources:
In second law, Library resources are for use and all have equal right to read their interesting materials. Library resources classified in such a way that user can easily approach their required materials. In Cloud computing, all library resources are available 24 * 7, the user easy access to their library resources via the internet.
Third Law: Every cloud resources its user:
This law-related to the second law, according to Dr. Ranganathan, every book its reader, means every book has equal right to read it. In cloud computing all information stored in thousands of servers, every information has equal right to read it, the user has to just log in to their account and they use it.
Fourth Law: Save the Time of user:
Books are shelves perfectly so the user of library access it easily without wasting of time and also the location of the library is near to user. fourth law of library science, save the time of the user, in cloud computing user access library resource without going anywhere, the user just log in and they access all resources without the geographical interface, this way cloud resources fulfill the law.
Fifth Law: The Cloud Library is a growing organism:
Fifth law of Library science, The Library is a growing organism, focused on continues changing of the library collection, library building, need of users, etc., it's a never-ending process. In cloud computing, Cloud resources are online, no problem of space, user access it without special IT skill, a vast collection of cloud resources and it increasing day by day, it justifies the laws of library science.
CONCLUSION:
Cloud computing is a technology which takes the library and Information Centre to the next level. In this paper, Fundamental laws of library science applied to cloud computing and it described how it useful to the user of the library. Cloud library refers to the use of multiple cloud-based resources through the internet, it is given and managed by cloud servers. Cloud library resources are stored in the cloud configuration. Laptop, desktop, smartphone or any devices with the connection of internet may access the library resources in cloud computing.
REFERENCES:
1. Bassi, S., and Chaudhary, A. (2015). Cloud Computing Data Security–Background and Benefits. International Journal of Computer Science and Communication, 6(1), 34-40.
2. The NIST Definition of Cloud Computing (2011). National Institute of Standards and Technology, Mell, Peter, Grance, Timothy, September, 2011.
3. Buyya, R., Broberg, J., and Goscinski, A. M. (Eds.). (2015). Cloud computing: Principles and paradigms. New Jersey: John Wiley and Sons. ISBN 978-81-265-4125-6
4. Buyya, R., Vecchiola, C., and Selvi, S.T (2013). Mastering Cloud Computing. New Delhi: McGraw Hill Education. ISBN 978-12-5902-995-0
5. Srinivasan, A. and Suresh, J. (2017). Cloud Computing: A practical approach for learning and implementation. 2nd ed. Noida: Pearson India Education Services Pvt. Ltd., ISBN 9788131776513
6. Sosinsky, Barrie (2015). Cloud computing bible. New Delhi: Wiley Publishing. ISBN – 978-81-265-2980-3
7. Gorman, Michael (1995). Five New laws of Librarianship. American Libraries, 26(8), 784-785
8. Wikipedia (2018, April 28). Five laws of library science. Retrieved from https://en.wikipedia.org/wiki/Five_laws_of_library_science
9. Noruzi, A. (2004). Application of Ranganathan’s Laws to the Web. Webology, 1(2) available at http://www.webology.org/2004/v1n2/a8.html
10. Crawford, W, and Gorman, M. (1995). Future libraries: dreams, madness and reality. Chicago: American Library Association. ISBN 978-0838906477
11. Agrawal, P and Rathore, Y. (2011). An Approach for Effective Resource Management in Cloud Computing. International Journal of Technology, 1(2), 121-124.
12. Baghel, S. and Dewangan, B.(2012). Defense in Depth for Data Storage in Cloud Computing. International Journal of Technology, 2(2), 58-61.
13. Anjaneyulu, GSGN, Sisodiya, Y., and Saurav K. (2016). Novel Composite Encryption for Secrecy in Cloud Computing. Research J. Pharm. and Tech, 9(9), 1501-1504.
14. Leeladhar A and Prabadevi B. (2017). Enhanced ID-Based Ring Signature by Validating Time Slots in Cloud Environment. Research Journal of Pharmacy and Technology, 10(1), 65-69.
15. Santhi, K. and Saravanan, R. (2017). Performance Analysis of Cloud Computing Using Batch Queueing Models in Healthcare Systems. Research Journal of Pharmacy and Technology, 10(10), 3331-3336.
16. Bedi, S. (2017). Security Measures to Protect Sensitive Customer Data in Cloud Computing. Asian J. Management, 8(1), 12-18.
17. Manu, A. P., Shishodia, A. and Patle, V. K. (2010). O.P. Vyas. State of the Art of Cloud Computing and its Research Issues. Research J. Science and Technology, 2(6), 117-128.
18. Nadekar, K., Ramteke, S., Babulkar, P., Dhuriya, J., and Aote, N. (2015). Annexure Privacy Preserving Public Auditing for Data Storage Security in Cloud Computing. Research Journal of Engineering and Technology, 6(2), 301-304.
Received on 15.11.2018 Modified on 18.12.2018
Accepted on 12.01.2019 ©AandV Publications All right reserved
Res. J. Humanities and Social Sciences. 2019; 10(1): 160-162.
DOI: 10.5958/2321-5828.2019.00027.5