Wednesday, February 3, 2016

Research Readings in Cloud Computing

Model of hidden IT security threats in the cloud computing environment

AS Molyakov, VS Zaborovsky, AA Lukashin - Automatic Control and Computer …, 2015
Abstract A model of threats has been proposed that makes it possible to identify potential
vulnerabilities of the cloud computing environment, including the actions related to system
task scheduler malfunction in a timely manner and, thus, efficiently block information ...

[PDF] … OF THE OPTIMISTIC MAPREDUCE TECHNIQUES FOR ENERGY MINIMIZATION AND PERFORMANCE ENHANCEMENT FOR MULTICORE CLOUD COMPUTING 

P Gupta, K Kaur - 2015
Abstract—Multi-core architecture is established on a number of processors and has local
caches (memories). When all the mandatory actions of a computer are executed on a
processor which has more than one core to execute, its processor is known as multi core ...

Data Integrity in Cloud Computing Security

KN Kumar, N Srinivas - International Journal of Research, 2016
Abstract Cloud computing requires comprehensive security solutions based upon many
aspects of a large and loosely integrated system. The application software and databases in
cloud computing are moved to the centralized large data centers, where the management ...

Multiple queries optimization for data streams on cloud computing

FM Najib, RM Ismail, NL Badr, MF Tolba - Computer Engineering & Systems (ICCES), …, 2015
Abstract—Most of the recent applications such as sensor networks applications, financial
applications and click-streams applications generate continuous, rapid, unbounded and
time varying datasets that are called data streams. In this paper we proposed a multiple ...

… LOGIC BASED APPROACH IN CHOOSING THE APPROPRIATE PHYSICAL MACHINES FOR LIVE VIRTUAL MACHINES MIGRATION INCLOUD COMPUTING

SR Hosseini, S Adabi, R Tavoli - Journal of Telecommunication, Electronic and …, 2015
Abstract Migration of Virtual Machine (VM) has become a critical issue in modern data
centers that are working based on virtualization. Among VM Migration challenges, choosing
an appropriate Physical Machine (PM) is an important issue. To choose a place for VM ...

Consumer Adoption of Cloud Computing Services in Germany: Investigation of Moderating Effects by Applying an UTAUT Model

H Moryson, G Moeser - International Journal of Marketing Studies, 2016
Abstract Cloud computing services have been growing rapidly in recent years, with Dropbox,
Apple iCloud and Google Drive being amongst the most established. The main purpose of
this study was to investigate whether there were moderator effects for cloud usage. ...

Cloud Computing: Risks and Opportunities for Corporate Social Responsibility

N Patrignani, M De Marco, R Fakhoury, M Cavallari - Information and Communication …, 2016
Abstract This paper studies the impact of the information and communication technologies
(ICT) used by organizations in their Corporate Social Responsibility (CSR) strategy. In
particular, it analyses the impact of the most recent technological development, Cloud ...

[PDF] Adaptive Model for Authentication on Cloud Computing

R Satpute, S Telrandhe
Abstract Cloud computing is an internet-based computing, where a set of resources and
services such as applications, Storage and servers are delivered to computers and devices
through the Internet. It incorporates large open distributed system, virtualization and ...

[PDF] A Survey on Workflow Task Scheduling Using Intelligent Water Droplets in Cloud Computing

P Kumar, P Shobana
ABSTRACT Cloud computing is a internet-based computing where different services are
delivered to computers and devices through internet. Cloud computing is used for delivering
and managing the services or application in an on-demand environment. Cloud ...

[PDF] Optimization Approach for Resource Allocation on Cloud Computingfor IoT

Y Choi, Y Lim
Abstract—Combinatorial auction is a popular approach for resource allocation in cloud 
computing. One of the challenges in resource allocation is that QoS (Quality of Service)
constraints are satisfied and provider's profit is maximized. In order to increase the profit, ...

No comments:

Post a Comment

 

blogger templates 3 columns | Make Money Online