Open Access
Subscription Access
Open Access
Subscription Access
Cloud Computing and Fundamental Laws of Library and Information Science
Subscribe/Renew Journal
The demand of users to access Library resources is expected to increase dynamically which creates high demands for Information and Communication Technology (ICT). Available resources of the Library and Information Centre may not be enough to fulfill such demands of library users. The solution for its library and information Centre have to use Cloud Computing. The aim of cloud computing is to make save cost expenditure on the machine, hardware, software, and resource optimize among users of the library where the different user need different things. This paper is intended to adopt cloud computing in library and Information Centre which will very useful and new Technology to achieve maximum usage of library resources in terms of the fundamental laws of Library science.
Keywords
Cloud Computing, Laws of Library Science, Cloud Service Models, Cloud Deploy Models.
Subscription
Login to verify subscription
User
Font Size
Information
- Bassi, S., and Chaudhary, A. (2015). Cloud Computing Data Security–Background and Benefits. International Journal of Computer Science and Communication, 6(1), 34-40.
- The NIST Definition of Cloud Computing (2011). National Institute of Standards and Technology, Mell, Peter, Grance, Timothy, September, 2011.
- Buyya, R., Broberg, J., and Goscinski, A. M. (Eds.). (2015). Cloud computing: Principles and paradigms. New Jersey: John Wiley and Sons. ISBN 978-81-265-4125-6
- Buyya, R., Vecchiola, C., and Selvi, S.T (2013). Mastering Cloud Computing. New Delhi: McGraw Hill Education. ISBN 978-12-5902-995-0
- Srinivasan, A. and Suresh, J. (2017). Cloud Computing: A practical approach for learning and implementation. 2nd ed. Noida: Pearson India Education Services Pvt. Ltd., ISBN 9788131776513
- Sosinsky, Barrie (2015). Cloud computing bible. New Delhi: Wiley Publishing. ISBN – 978-81-265-2980-3
- Gorman, Michael (1995). Five New laws of Librarianship. American Libraries, 26(8), 784-785
- Wikipedia (2018, April 28). Five laws of library science. Retrieved from https://en.wikipedia.org/wiki/Five_laws_of_library_science
- Noruzi, A. (2004). Application of Ranganathan’s Laws to the Web. Webology, 1(2) available at http://www.webology.org/2004/v1n2/a8.html
- Crawford, W, and Gorman, M. (1995). Future libraries: dreams, madness and reality. Chicago: American Library Association. ISBN 978-0838906477
- Agrawal, P and Rathore, Y. (2011). An Approach for Effective Resource Management in Cloud Computing. International Journal of Technology, 1(2), 121-124.
- Baghel, S. and Dewangan, B.(2012). Defense in Depth for Data Storage in Cloud Computing. International Journal of Technology, 2(2), 58-61.
- Anjaneyulu, GSGN, Sisodiya, Y., and Saurav K. (2016). Novel Composite Encryption for Secrecy in Cloud Computing. Research J. Pharm. and Tech, 9(9), 1501-1504.
- Leeladhar A and Prabadevi B. (2017). Enhanced ID-Based Ring Signature by Validating Time Slots in Cloud Environment. Research Journal of Pharmacy and Technology, 10(1), 65-69.
- Santhi, K. and Saravanan, R. (2017). Performance Analysis of Cloud Computing Using Batch Queueing Models in Healthcare Systems. Research Journal of Pharmacy and Technology, 10(10), 3331-3336.
- Bedi, S. (2017). Security Measures to Protect Sensitive Customer Data in Cloud Computing. Asian J. Management, 8(1), 12-18.
- Manu, A. P., Shishodia, A. and Patle, V. K. (2010). O.P. Vyas. State of the Art of Cloud Computing and its Research Issues. Research J. Science and Technology, 2(6), 117-128.
- Nadekar, K., Ramteke, S., Babulkar, P., Dhuriya, J., and Aote, N. (2015). Annexure Privacy Preserving Public Auditing for Data Storage Security in Cloud Computing. Research Journal of Engineering and Technology, 6(2), 301-304.
Abstract Views: 253
PDF Views: 0