Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment
Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines
An Extended Min-Min Scheduling Algorithm in Cloud Computing
Data Quality Evaluation Framework for Big Data
An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier
GridSim Installation and Implementation Process
Genetic Algorithm Using MapReduce - A Critical Review
Encroachment of Cloud Education for the Present Educational Institutions
A Survey on Energy Aware Job Scheduling Algorithms in Cloud Environment
Clustering based Cost Optimized Resource Scheduling Technique in Cloud Computing
In this article, the author has discussed about the online applications, which are the resources of cloud computing. The cloud-computing is the style of reinstating conventional learning into applications given through the online that helps to reduce the expenses and duration of time spent for a purpose. Cloud computing supply virtualized hardware and software resources collectively. In addition, it provides various applications to fulfill the specific needs in education, business, travels, information gathering, etc. It gives amenities for customer to employ, organize, and handle their applications in their devices with the assist of online. Cloud computing situations replicate existent world with application's recital, steadiness, rapidity, and protection. Cloud computing is a vital renovation of innovative facility. Elearning and Web based virtual reality applications are solitary of this scenario, which are the resource of cloud computing. These are extensively practiced in education, virtual conferences, entertainment, practical, training courses, and so on. In modern days, many of them prefer e-learning situations to share information through online. Cloud computing was used by organizations to enter the current information from all over the globe in a fraction of second. In the side of instruction the educators and the pupils continuously renew their accumulation in the applications and it also stored in the cloud. Also cloud computing is an assortment of applications which may be entered and controlled by many benefiters. Therefore, in the present article, the author has discussed about cloud computing as a source of the entire online applications.
Cloud computing has three types of services, mainly they are platform as service, software as service, and Infrastructure as service. So based on whatever the requirements they have, the consumers will select different services and try to use them. Securing the information in the cloud is the better way to access it. Cloud storage will have some different roles like data owner and the service who provides. Particular data owners will not interact with the different users. Now-a-days, the information access is one of the challenging tasks in the cloud storage. Cloud owner would not have fully trusted data owners. So for avoiding the untrusted servers of data by accessing very expressive information for that purposes, they will encrypt the data and so the user will have the valid keys, on whatever they expect to access the information. So in order to validate it they need a management scheme. In this paper, the authors have proposed an advanced attribute based encryption standard system to control the scrambled information. They have used Advanced Encryption standard algorithm for the encryption of secret keys. This approach demonstrated the performance of the services efficiently in a secured cloud environment.
The cloud computing in the world of IT industry has a huge value. It made things reliable and comfortable. As the number of consumers or customers are increasing on cloud computing they are dispatchers of their workload on it. Some different qualities make it unique from others like providing high resources in performance, providing huge space for data storage, etc. In this article, the authors briefly discuss about privacy and security in cloud computing, examining different techniques and methods for securing information and also their drawbacks. The purpose of this article is to understand the security issues and to defeat these events in parliamentary procedure to secure users' assets. In the result of this study, they were able to understand the issues and provide some new methods or algorithm to resolve these issues.
The Internet of Things (IoT) is entering the daily operation of many sectors, but these technologies are not limited to smart technologies like Smart homes and physical security such as E-health, and logistics. The concept for developing the smart cities is emerging in different segments, where enhanced street lighting controls and infrastructure were developed. A number of deployment limiting issues currently impact the scope of IoT utilization include lack of comprehensive end to end standards. This paper reviews some of the technical challenges faced by IoT in the smart arena.
Extending the capabilities of technology and mobile applications through cloud services to a large audience remains one of the key factors of success in the last decade of the digital transformation. However, this paper examines the Strengths, Weaknesses, Opportunities, and Threats of Cloud Computing that provide credentials in an attempt to interrupt the silence of tangible transition occurring in the Information and Communication Technology landscape today through democratization. The paper has identified security issues to be both a threat and weakness to cloud computing while its strength resides in its elasticity and scalability. With the demonstration of its characteristics to be a disruptive technology, cloud computing has the potential of helping emerging markets reap the benefits of information technology without the substantial upfront investments that have hindered past efforts. In addition to this opportunity presented to emerging countries, the rapid strides created by cloud computing in all areas conveyed a malleable way of dealing with technology called democratization. The democratization of technology is the process by which access to technology continues to become easily available to more people through several devices, fixed and mobile. However, due to the quality method exuded in this paper, the opinion of the author does not necessary imply the view of other advocates and cloud-computing evangelists.