Cloud computing is a collection of distributed services, application, information and infrastructure .Cloud computing may he defined as the set of services that provide infrastructure resources using internet and data...
详细信息
ISBN:
(纸本)9789380544199
Cloud computing is a collection of distributed services, application, information and infrastructure .Cloud computing may he defined as the set of services that provide infrastructure resources using internet and data storage on a third server. It is one of the latest developments in IT industry. It provides its user scalability, reliability, high performance and low cost solution as compared to the other infrastructure. In this paper I am going to review algorithms of cloud computing security.
Social Network Service is a one of the service where people may communicate with one another;and may also exchange messages even of any type of audio or video communication. Social Network Service as name suggests a t...
详细信息
the proceedings contain 87 papers. the special focus in this conference is on Soft Computing for Problem Solving. the topics include: Traffic accident prediction model using support vector machines with gaussian kerne...
ISBN:
(纸本)9789811004506
the proceedings contain 87 papers. the special focus in this conference is on Soft Computing for Problem Solving. the topics include: Traffic accident prediction model using support vector machines with gaussian kernel;a brief overview on least square spectral analysis and power spectrum;architecture for secure communication using cloud services;using least-square spectral analysis method for time series with datum shifts;application of differential evolution for maximizing the loadability limit of transmission system during contingency;common fixed-point theorem for set-valued occasionally weakly compatible mappings in fuzzy metric spaces;privacy preservation in utility mining based on genetic algorithm;reliability evaluation of software system using AHP and fuzzy TOPSIS approach;information security and its insurance in the world of high rise of cybercrime through a model;a systematic study on mitigating parameter variation in MOSFETs;vendor-supplier cooperative inventory model with two warehouse and variable demand rate under the environment of volume agility;invariant feature extraction for finger vein matching using fuzzy logic inference;multiple-input multiple-output paper machine system control using fuzzy-PID tuned controller;optimal tuning of PID controller for centrifugal temperature control system in sugar industry using genetic algorithm;fault diagnosis of ZSI-fed 3-phase induction motor drive system using MATLAB;openMP genetic algorithm for continuous nonlinear large-scale optimization problems;combined SCP and geometric reconstruction of spine from biplanar radiographs and analysis of network IO performance in hadoop cluster environments based on docker containers.
In recent years, Internet of things (IoT) has attracted many attention. However, it still lacks on security consideration. Conventional ways of security design might not be sufficiently effective when dealing with new...
详细信息
ISBN:
(纸本)9781509023349
In recent years, Internet of things (IoT) has attracted many attention. However, it still lacks on security consideration. Conventional ways of security design might not be sufficiently effective when dealing with new types of heterogeneous systems. In this paper, we proposed a privacy verification procedure for IoT based on agent oriented Petri net (Petri nets in a Petri net; PN 2 ). We developed the privacy specification for IoT which is necessary in order to deal withthe data leak problem. We implemented the procedure to IoT environment by checking the reachability of privacy violation marking. Finally, we showed an application example.
there have been attempts to model the interaction between users, both malicious and benign, and network administrators as games. Building on such works, we here present a game model which is generic enough to capture ...
详细信息
third-party identity management services enable cross-site information sharing, making Web access seamless but also raise significant privacy implications for the users. Using a combination of manual analysis of ident...
详细信息
the significant threats from information security breaches in cyber world is one of the most serious security problems. Organizations are facing growing number of sophisticated cyber-attacks every year. Efficient and ...
详细信息
the exposure of sensitive data in storage and transmission poses a serious threat to organizational and personal secu- rity. data leak detection aims at scanning content (in stor- age or transmission) for exposed sens...
详细信息
the cloud computing provide resources and service as and when required over the internet. In cloud computing environment users share highly important data, maintaining centralizing storage of data and resource sharing...
详细信息
the cloud computing provide resources and service as and when required over the internet. In cloud computing environment users share highly important data, maintaining centralizing storage of data and resource sharing which tents to extends financial benefit, rather managing their own systems. World is still not very open to cloud computing platform due to many security, privacy and policy related issues that are responsible for limiting the adoption of cloud computing. However, legal challenges and policies issues of cloud computing are the major cause in slow down the growth of cloud computing. In this paper potential of cloud computing with reference to security, privacy and Policy issues are examined as a part of major concern which makes the computing potential puny and review of existing literature for security challenges and policies issues in cloud computing.
Cloud computing allows customers to outsource the burden of data management and benefit from economy of scale, but privacy concerns limit its reach. Even if the stored data are encrypted, access patterns may leak valu...
详细信息
暂无评论