An Efficient and Secure Privacy-Preserving Approach for Outsourced Data of Resource Constrained Mobile Devices in Cloud Computing
SK Pasupuleti, S Ramalingam, R Buyya - Journal of Network and Computer …, 2016
Abstract Outsourcing of data into cloud has become an effective trend in modern day
computing due to its ability to provide low-cost, pay-as-you-go IT services. Although cloud
based services offer many advantages, privacy of the outsourced data is a big concern. To ...
computing due to its ability to provide low-cost, pay-as-you-go IT services. Although cloud
based services offer many advantages, privacy of the outsourced data is a big concern. To ...
[PDF] Technical Review on Security Issues & Cryptographic Algorithm in Cloud Computing
RS Bhore, R Sheikh - 2015
Abstract—ata storage security refers to the security of your personal or official work on the
storage media. Security has been a number one issue within the Information Technology
space as a result of as users knowledge or work we have a tendency to don't wish anyone ...
storage media. Security has been a number one issue within the Information Technology
space as a result of as users knowledge or work we have a tendency to don't wish anyone ...
[PDF] Deadline Aware Two Stage Scheduling Algorithm in Cloud Computing
IRK Raju, PS Varma, MVR Sundari, GJ Moses - Indian Journal of Science and …, 2016
Background/Objectives: Cloud computing is a large-scale distributed computing paradigm in
which a pool of abstracted, virtualized, dynamically-scalable resources such as computing
power, storage, platforms and services are delivered on demand to external customers ...
which a pool of abstracted, virtualized, dynamically-scalable resources such as computing
power, storage, platforms and services are delivered on demand to external customers ...
Wireless sensor and actuator system for smart irrigation on the cloud
N Sales, O Remedios, A Arsenio - Internet of Things (WF-IoT), 2015 IEEE 2nd World …, 2015
... environmental benefits. The high storage and processing capabilities, the rapid
elasticity and pay- per-use characteristics makes Cloud Computing an attractive
solution to the large amount of data generated by the WSN. This ...
elasticity and pay- per-use characteristics makes Cloud Computing an attractive
solution to the large amount of data generated by the WSN. This ...
Taking the SIoT down from the cloud: Integrating the Social Internet of Things in the INPUT architecture
I Farris, R Girau, M Nitti, L Atzori, R Bruschi, A Iera… - Internet of Things (WF-IoT), …, 2015
... Index Terms—Social Internet of Things, network virtualization, cloud computing. ... [Accessed July
2015]. [13] Jain Raj, and Sudipta Paul, "Network virtualization and software defined networking
for cloud computing: a survey”, IEEE Communications Magazine, 51.11 (2013): 24-31. ...
2015]. [13] Jain Raj, and Sudipta Paul, "Network virtualization and software defined networking
for cloud computing: a survey”, IEEE Communications Magazine, 51.11 (2013): 24-31. ...
TRANSPORTABLE PRIVATE CLOUD COMPUTING PLATFORM AND ASSOCIATED METHOD OF USE
RA Kirsch, AC Guzman, RJ Channing - US Patent 20,160,014,197, 2016
Abstract: The present invention is a transportable private cloud computing platform, having a
rack, several servers, a system management server, an interface device, a network switch, a
power supply circuit, and a transit case. The present invention also includes a method for ...
rack, several servers, a system management server, an interface device, a network switch, a
power supply circuit, and a transit case. The present invention also includes a method for ...
[PDF] QoS based Workload Design Patterns in Cloud Computing: A
S Singh, I Chana - 2015
Abstract Provisioning of appropriate resources to cloud workloads depends on the Quality of
Service (QoS) requirements of cloud workloads and workload design patterns. Based on
application requirements of cloud users, discovery and allocation of best workload– ...
Service (QoS) requirements of cloud workloads and workload design patterns. Based on
application requirements of cloud users, discovery and allocation of best workload– ...
Certificateless Anonymous User Authentication Protocol for Cloud Computing
M Zhang, Y Zhang - Intelligent Transportation, Big Data and Smart City ( …, 2015
Cloud computing can be defined as a networN technique allowing users to store and access
data, programs, and services over the Internet. The Icloud" can be explained the set of
hardware, software, storage, services, and interfaces provided by cloud servers. In ...
data, programs, and services over the Internet. The Icloud" can be explained the set of
hardware, software, storage, services, and interfaces provided by cloud servers. In ...
Resource Provision Algorithms in Cloud Computing: A Survey
J Zhang, H Huang, X Wang - Journal of Network and Computer Applications, 2016
Abstract Efficient resource provision which can guarantee the satisfactory cloud computing
services to the end user, lays the foundation for the success of commercial competition. In
the Iaas model, services are deployed as virtual machines in the cloud computing ...
services to the end user, lays the foundation for the success of commercial competition. In
the Iaas model, services are deployed as virtual machines in the cloud computing ...
Physics and microeconomics-based metrics for evaluating cloud computing elasticity
EF Coutinho, PAL Rego, DG Gomes, JN de Souza - Journal of Network and …, 2016
Abstract Currently, many customers and broadband providers are using cloud resources,
such as processing and storage, for their applications and services. With the increase of
computational resources usage, elasticity has become quite attractive and a key feature in ...
such as processing and storage, for their applications and services. With the increase of
computational resources usage, elasticity has become quite attractive and a key feature in ...
No comments:
Post a Comment