The guest editors discuss this special issue on cloud computing, exploring how cloud platforms and abstractions can be effectively used to support real-world science and engineering applications.
The guest editors discuss this special issue on cloud computing, exploring how cloud platforms and abstractions can be effectively used to support real-world science and engineering applications.
cloud computing is a recent trend in information technology and networking that has the potential to change radically the way computer services are constructed, managed, and delivered. The key driving forces behind th...
详细信息
cloud computing is a recent trend in information technology and networking that has the potential to change radically the way computer services are constructed, managed, and delivered. The key driving forces behind the emergence of cloud computing include the overcapacity of today's large corporate data centers, the ubiquity of broadband and wireless networking, the falling cost of storage, and progressive improvements in networking technologies. cloud computing opens new perspectives with profound implications in the area of communication networks, raising new issues in their architecture, design, and implementation.
With the widespread application of cloud computing technology, the secure transmission of image data in cloud environments has become an important issue. Traditional image encryption techniques face challenges in deal...
详细信息
With the widespread application of cloud computing technology, the secure transmission of image data in cloud environments has become an important issue. Traditional image encryption techniques face challenges in dealing with large-scale and dynamic cloud computing environments, such as complex key management and insufficient encryption efficiency. To address these issues, this study proposes an innovative image encryption decryption algorithm that combines pixel sorting classification (PSC) method and block mod256 scrambling encryption (SE) technology, aiming to improve the security of image data transmission in cloud computing. Through empirical experiments, this study found that the newly proposed algorithm exhibited superior performance while maintaining image integrity. In comparison to existing technologies, the new technology has demonstrated an improvement in both peak signal-to-noise ratio (PSNR) and image size. Specifically, at lower data embedding rates, the average PSNR value of this algorithm ranged from 52 dB to 54 dB, and it exhibited high security ratings on different types of images. In addition, the algorithm also demonstrated strong robustness in resisting various attack paradigms in cloud computing systems. Although the algorithm proposed in this study has limitations in real-time processing, it provides a new approach for secure transmission of image data in cloud computing and valuable reference for future research. Future work will focus on optimizing the realtime processing capabilities of algorithms and further validating and expanding them in real-world cloud computing environments.
cloud computing is currently being used by a large number of organizations. Many consider it a major development of the decade in computing. In this article we define cloud computing, various services available on the...
详细信息
cloud computing is currently being used by a large number of organizations. Many consider it a major development of the decade in computing. In this article we define cloud computing, various services available on the cloud infrastructure, and the different types of cloud. We then discuss the technological trends which have led to its emergence, its advantages and disadvantages, and the applications which are appropriate to outsource to a cloud computing service.
Educational institutions face inherent uncertainties in student performance, stakeholder priorities, and data analysis. This paper explores how cloud computing, with its data storage, analytics, and collaboration tool...
详细信息
Nowadays, the IT departments face numerous problems which considerably affect their performance. Several factors such as technological obsolescence that shortens the useful life of equipment, amount of data that deman...
详细信息
Purpose This study aims to analyze the applicability of the technological, organizational and environmental (TOE) framework features in the decision to adopt cloud computing (CC) in small and medium-sized enterprises ...
详细信息
Purpose This study aims to analyze the applicability of the technological, organizational and environmental (TOE) framework features in the decision to adopt cloud computing (CC) in small and medium-sized enterprises (SMEs) operating in disruptive contexts. Design/methodology/approach A mixed-methods approach was used. Initially, 94 questionnaires were collected in 2021-2022 through a survey based on the TOE framework, with the first section involving six filter questions and the second one including 45 Likert scale questions. Subsequently, a qualitative study was carried out in 2023 based on semistructured interviews held with 10 information technology experts. FindingsThe outcomes of the quantitative study revealed a significant association between CC adoption and technological features, but no association with the organizational and environmental features. The results of the qualitative study pointed to five major barriers to CC adoption, including economic barriers, brain drain, poor technical infrastructure, survival mode of existence and cultural barriers. Originality/valueThis empirical investigation uncovered specific TOE features that influence CC adoption in SMEs operating in disruptive contexts. By integrating qualitative insights, this research unveiled new context-dependent barriers to CC adoption that were previously overlooked by traditional quantitative techniques.
Effective monitoring of the environment over a large area will require mobilization of a considerable amount of information. Otherwise, the use of traditional methods will prove to be costly and would take up so much ...
详细信息
In modern cloud-based computing through pooled resources, service providers must ensure resource accessibility. The migration of workloads to the cloud necessitates careful planning, including the provision of a suffi...
详细信息
In modern cloud-based computing through pooled resources, service providers must ensure resource accessibility. The migration of workloads to the cloud necessitates careful planning, including the provision of a sufficient number of easily available virtual machines (VMs). This paper addresses the NP-hard problem of load distribution by proposing an advanced scheduling technique designed to tackle this issue directly. The main goal of the investigation is to maximize the assignment of tasks among virtual machines (VMs), ensuring an evenly distributed workload throughout the entire system. We proposed a new method to enhance the distribution of work in cloud-based structures, leveraging insights from spider monkey foraging habits. The proposed optimization technique tries to increase efficiency by strategically distributing jobs to the VMs with the least workload. The algorithm demonstrates robust performance in simulations evaluating load distribution, response time, and efficiency across several task types. The suggested load distribution technique demonstrates substantial enhancements compared to current methods, with an amazing 85% effectiveness in distributing the workload across 20 concurrent tasks. The proposed method outperforms existing algorithms, such as Improved Ant Colony Optimization and Particle Swarm Optimization-Artificial Bee Colony, which achieve load-balancing rates of 70% and 75%, respectively. This paper elucidates the intricacies of workload distribution in cloud-based computing systems while proposing a comprehensive method to improve resource consumption and overall system efficiency, hence advancing distributed computing settings.
暂无评论