ICT (Information and communication technology) has been designated as, one of the best education systems. It enhance the quality of education, looking into the current scenario of Indian education system, it need a re...
详细信息
With emergence in cloud computing there was a huge demand for the data center technology and the operating system which can handle the data center. Increasing demand of infrastructure services leading the organization...
详细信息
ISBN:
(纸本)9781509052561
With emergence in cloud computing there was a huge demand for the data center technology and the operating system which can handle the data center. Increasing demand of infrastructure services leading the organizations to move towards Cloud. The aim is to provide an opportunity to the industry to build a hosting architecture, massively scalable which is completely open source, and to provide a solution to manage their on premises datacenters or private cloud and public cloud data centers simultaneously. When we talk about the combination of private as well as public cloud workloads, here term comes into existence i.e. Hybrid Cloud. To build and manage the Hybrid cloud, Openstack is the open source solution available in market. Here we will be discussing the whole concept of OpenStack in detail, It's architecture, functionalities and how we setup it in our environment tested different use cases.
Authentication, authorization, and access control are fundamental functionalities that are crucial for network infrastructures and software applications. These functionalities work together to create a fundamental sec...
详细信息
ISBN:
(纸本)9798331529109;9798331529093
Authentication, authorization, and access control are fundamental functionalities that are crucial for network infrastructures and software applications. These functionalities work together to create a fundamental security layer that allows administrative entities to control user actions. Implementing a security layer may be simple for basic applications, but as modern digital infrastructures become more complex, more advanced security systems are needed. Traditional perimeter-based security models, long relied upon for securing large networks, exhibit vulnerabilities and lack adaptability to modern architectures. As technology advances, there is a growing demand for new authentication and authorization systems to keep up with the changes. Zero Trust (ZT) emerges as a paradigm embodying such principles and concepts for constructing contemporary security systems. This paper introduces a ZT-based Single Sign-On (SSO) framework to demonstrate how ZT can be realized in multi-service environments using Attribute-Based Access Control (ABAC). A prototype is developed to show the feasibility and applicability of the proposed framework in a smart city context.
Near Field Communication (NFC) is an emerging wireless short-range communication technology innovation that is based on existing standards of the Radio Frequency Identification (RFID) infrastructure. In this paper we ...
详细信息
ISBN:
(纸本)9781479966295
Near Field Communication (NFC) is an emerging wireless short-range communication technology innovation that is based on existing standards of the Radio Frequency Identification (RFID) infrastructure. In this paper we give an overview of NFC technology and discuss its adaptation worldwide. We then focus on the current trends and application of NFC technology in India. Both existing NFC applications and some conceivable future situations are analyzed in this connection. Furthermore, security concerns, difficulties and present conflicts are also discussed.
Cloud computing is an emerging technology which has become today's blistering research area due to the advancement of increased connectivity and it is most interesting and attractable technology which offers the o...
详细信息
ISBN:
(纸本)9781479966295
Cloud computing is an emerging technology which has become today's blistering research area due to the advancement of increased connectivity and it is most interesting and attractable technology which offers the on demand services to the users over the internet. Since Cloud computing stores the user data and allows the user to work on the cloud system and so the security has become the main concern which creates threat and tries to deploy the Cloud environments. Even though the Cloud computing is efficient, there are many challenges for data security, which may take away the users from using the cloud computing. To ensure the security of data, we proposed a method by implementing Cramer - Shoup cryptosystem.
Cloud computing changed the way of computing as utility services offered through public network. The adoption of cloud computing services has gained the momentum over these years, due to the agility and cost associate...
详细信息
ISBN:
(纸本)9781479966295
Cloud computing changed the way of computing as utility services offered through public network. The adoption of cloud computing services has gained the momentum over these years, due to the agility and cost associated for accessing computational services over traditional one. The cloud providers offer similar services with nonlinear pricing to differentiate the services and to cater the various consumer market segments. This paper investigates different tariff of cloud service: usage based, flat rate, two part tariff, three part tariff with allowance and freemium. In particular, the cloud service tariff evaluation and choice models have been reviewed and the selection of optimal cloud pricing plan methodology for consumers is proposed.
The most important aspects of a firm are business continuity planning and disaster recovery planning, yet they are frequently overlooked. Even before a tragedy strikes, businesses need to have a well-organized strateg...
详细信息
A Cloud computing model enables convenient, on demand network access, otherwise known as cloud computing (CC) or 'the Cloud'. Cloud computing is delivered via internet, using cloud.' Everything from mobile...
详细信息
In recent decades, software and its services have played a vital role in everyone's lives. Because of the internet's phenomenal growth and use all over the world, data stored in various parts of the territory ...
详细信息
Cloud computing is a paradigm of both parallel processing and distributed computing. It offers computing facilities as a utility service in pay as par use manner. Virtualization, selfservice provisioning, elasticity a...
详细信息
ISBN:
(纸本)9781509052561
Cloud computing is a paradigm of both parallel processing and distributed computing. It offers computing facilities as a utility service in pay as par use manner. Virtualization, selfservice provisioning, elasticity and pay per use are the key features of Cloud computing. It provides different types of resources over the Internet to perform user submitted tasks. In cloud environment, huge number of tasks are executed simultaneously, an effective Task Scheduling is required to gain better performance of the cloud system. Various Cloud-based Task Scheduling algorithms are available that schedule the user's task to resources for execution. Due to the novelty of Cloud computing, traditional scheduling algorithms cannot satisfy the cloud's needs, the researchers are trying to modify traditional algorithms that can fulfil the cloud requirements like rapid elasticity, resource pooling and on-demand self-service. In this paper the current state of Task Scheduling algorithms has been discussed and compared on the basis of various scheduling parameters like execution time, throughput, makespan, resource utilization, quality of service, energy consumption, response time and cost.
暂无评论