cloud computing is a rising technology that is still unclear to many security issues. The most challenging issue today in cloud servers is to ensure data security and privacy of the users. The proposed schema presents...
详细信息
ISBN:
(纸本)9781467382038
cloud computing is a rising technology that is still unclear to many security issues. The most challenging issue today in cloud servers is to ensure data security and privacy of the users. The proposed schema presents HE-RSA or hybrid encryption RSA along with Advanced Encryption Standard or AES to ensure efficiency, consistency and trustworthiness in cloud servers. The goal of this paper is to use various cryptography concepts during communication along with its application in cloud computing and to enhance the security of ciphertext or encrypted data in cloud servers along with minimizing the consumption of time, cost and memory size during encryption and decryption.
cloud computing is buzz word now days. cloud providers try to provide security, sharing, authenticity and integrity. Under this research work, we have focused on adding new functionality for cloud providers that is se...
详细信息
ISBN:
(纸本)9781479907250
cloud computing is buzz word now days. cloud providers try to provide security, sharing, authenticity and integrity. Under this research work, we have focused on adding new functionality for cloud providers that is secure sharing. In public cloud anyone can see data of any user but in private cloud data is secured and limited to particular user. This research work proposes framework that allow generating a key for particular users with particular permissions. cloud user can generate keys for different users with different permissions to access their files. This framework uses cryptography algorithms like AES and RSA. AES is most secure algorithm in cryptography. Once key is generated user (user who have generated a key for their own files) can provide that key to decided user (user for whom key is generated). So when decided user will try to access files on cloud with that key, permission decided by owner will be given to that user. This is partial access to user and more secure then providing password to user. cloud service providers can also add concept of defining files also like cloud user can generate key for particular file, particular user and particular permission. Those keys then can be provided to different users.
In cloud computing, resources such as CPU, RAM, and disk etc. are provided as a service via the Internet. Elasticity is a key feature of cloud computing. It aims to enabling a cloud Service Provider (CSP) to negotiate...
详细信息
ISBN:
(纸本)9781479937660
In cloud computing, resources such as CPU, RAM, and disk etc. are provided as a service via the Internet. Elasticity is a key feature of cloud computing. It aims to enabling a cloud Service Provider (CSP) to negotiate the possibility to borrow external resources from other CSPs when its own facilities are not able to satisfy a client request. Reciprocally, a CSP may sell some of its unused resources to another CSP in case of under load. Today, cloud Federation is a key approach considered for cloud elasticity. In the context of the Easi-clouds European ITEA 2 research project, we aim to develop Pricing-as-a-Service (PraaS) suited to the Federated cloud environment. The aim of this paper is twofold. First, we provide a state of the art of the pricing and revenue sharing models in federated environment. We discuss the specifications of cloud Federation as well as its different drivers and barriers. Three types of pricing strategies (on-demand, spot and reserved) are presented. In the second part, we present the problem of revenue sharing in the federation with some properties we are willing to fulfill. We propose and evaluate our revenue sharing model suited to the Federated environment with numerical analysis via simulation. We compare our approach to the proportional share and the Shapley value method. Finally, we provide and analyze the results of our simulations with our conclusion and perspectives.
cloud computing is a computational model that provides all computing services and its requirements over the Internet. So our computation is always available without burdens of carrying large-scale hardware and softwar...
详细信息
ISBN:
(纸本)9781728150758
cloud computing is a computational model that provides all computing services and its requirements over the Internet. So our computation is always available without burdens of carrying large-scale hardware and software. The utilization of resources has been decreasing due to the growth of parallel processing in most parallel applications. Accordingly, job scheduling, one of the fundamental issues in cloud computing, should manage more efficiently. The accuracy of parallel job scheduling is greatly important for cloud providers in order to guarantee the quality of their service. Given that optimal scheduling improves utilization of resources, reduces response time and satisfies user requirements. Most of the current parallel job scheduling algorithms do not use the consolidation of parallel workloads to improve scheduling performance. This paper introduces a scheduling algorithm enriches the powerful ACFCFS algorithm. To begin with, we employ tentative runs, workload consolidation and two-tier virtual machines architecture. Particularly, we consider deadline for jobs in order to prevent starvation of parallel jobs and improve performance. The simulation results indicate that our algorithm considerably reduces the makespan and the maximum waiting time. Therefore it improves scheduling compare to the basic algorithm (ACFCFS). Overall, it can be employed as a strong and effective method for scheduling parallel jobs in the cloud.
cloud computing remains an increasingly popular topic among practitioners as well as researchers. The literature spans across multiple disciplines, and the knowledge is fragmented and not systematized. To address this...
详细信息
ISBN:
(纸本)9780769556703
cloud computing remains an increasingly popular topic among practitioners as well as researchers. The literature spans across multiple disciplines, and the knowledge is fragmented and not systematized. To address this issue we apply topic models to conduct a meta-review on cloud computing. We identify twenty research topics across multiple disciplines, and demonstrate the use of the approach to conduct reviews in the field of information systems (IS). In additionally, we discuss multidisciplinary nature of cloud research, as well as research topics attracting contributions from various scientific fields.
Previous studies have established the impact of information technology on interdepartmental cooperation. However, the move from distributed computing to centralize computing as a result of cloud adoption is having an ...
详细信息
ISBN:
(纸本)9780996683104
Previous studies have established the impact of information technology on interdepartmental cooperation. However, the move from distributed computing to centralize computing as a result of cloud adoption is having an impact on the current type and level of coordination in workplaces. This study attempts to identify factors influencing the type of coordination strategy and the moderating effect of cloud computing usage. Specifically the study contends that cloud computing usage strengthens the effect of goal alignment and task interdependence on the cooperative intensity between the IT department and business line. Hopefully, data from an online survey of managers and their subordinates will be used to test hypothesis advanced in this study.
The financial crisis that the world's states are confronted with affects the national economies, leading to pressures with respect to costs cutting at the level of each organization. In the situation of budgetary ...
详细信息
ISBN:
(纸本)9780982148945
The financial crisis that the world's states are confronted with affects the national economies, leading to pressures with respect to costs cutting at the level of each organization. In the situation of budgetary cuts, universities are confronted with problems in assuring the IT (Information Technology) support necessary to educational and research/development activities. As a response to these challenges, the universities must perform changes in order to be service oriented and to optimize the efficiency and effectiveness of all operations. The evolution of information and communication technologies comes to support the consumers, offering them a new pattern of IT supply, management and security by using cloud computing. At the university level, cloud computing may be considered an extension of SOA (Service Oriented Architecture) and may represent an alternative of obtaining fast access to technology while achieving some savings within the institution. The paper offers an approach regarding the use of cloud computing within the higher educational system, emphasizing its main benefits and limitations and highlighting data security. The paper also proposes a strategy for adopting cloud computing within higher education in order to gain agility.
Recent advances in cloud computing and ubiquitous computing have changed the computing paradigm rapidly. cloud computing is the computing that relies on a large pool of systems interconnected in private or public netw...
详细信息
ISBN:
(纸本)9781479917907
Recent advances in cloud computing and ubiquitous computing have changed the computing paradigm rapidly. cloud computing is the computing that relies on a large pool of systems interconnected in private or public networks to deliver computing resources like services and data. Nowadays, there is no need of having local servers or personal devices to handle applications and data. Access to these resources for everyone and anywhere has become a necessity. Moreover, the evolution of ubiquitous computing combined with cloud computing implies the development of personalized services and applications considering the user preferences in order to provide an appropriate user interface anywhere anytime. However, the user interfaces so far are not conforming to the needs of people and especially those with disabilities or elderly. The paper introduces an accessible tool for declaring and managing user preferences that participate in personalization implementation in cloud computing environment. The proposed tool focuses mostly on elderly and people with disabilities and helps the users to build preference sets in order to improve access efficiency.
In a cloud computing environment, it is necessary to simultaneously allocate both processing ability and network bandwidth needed to access it. The authors proposed the congestion control method for a cloud computing ...
详细信息
ISBN:
(纸本)9781457702518
In a cloud computing environment, it is necessary to simultaneously allocate both processing ability and network bandwidth needed to access it. The authors proposed the congestion control method for a cloud computing environment which reduces the size of required resource for congested resource type, instead of restricting all service requests as in the existing networks. Although this method can achieve an efficient use of resources in congested situation, it may result in an 'unfair' use of resources. Therefore, it is required to enhance the proposed congestion control method in order to enable the fair resource allocation even in congested situation. First, this paper proposes a definition of fairness in congested situation, assuming that multiple resource types are allocated simultaneously to each service request. Next, this paper identifies a measure for evaluating fair resource allocation. On the basis of the above concepts, this paper proposes to enhance the previous congestion control method, so as to enable the fair resource allocation among users in congested situation. It is demonstrated by simulation evaluations that the proposed method enables fair resource allocation, compared with the previous method which does not consider the fair allocation.
Moving Target Defense (MTD) is an emerging security solution based on continuously changing attack surface thus makes it unpredictable for attackers. cloud computing could leverage such MTD approaches to prevent its r...
详细信息
ISBN:
(纸本)9783319723594;9783319723587
Moving Target Defense (MTD) is an emerging security solution based on continuously changing attack surface thus makes it unpredictable for attackers. cloud computing could leverage such MTD approaches to prevent its resources and services being compromised from an increasing number of attacks. Most of the existing MTD methods so far have focused on devising subtle strategies for attack surface mitigation, and only a few have evaluated the effectiveness of different MTD techniques deployed in systems. We conducted an in-depth study, based on realistic simulations done on a cloud environment, on the effects of security and reliability for three different MTD techniques: (i) Shuffle, (ii) Redundancy, and (iii) the combination of Shuffle and Redundancy. For comparisons, we use a formal scalable security model to analyse the effectiveness of the MTD techniques. Moreover, we adopt Network Centrality Measures to enhance the performance of security analysis to overcome the exponential computational complexity which is often seen in a large networked mode.
暂无评论