Results (35)
Search Parameters:
Keyword: Cloud ComputingLoad Balancing Techniques in Cloud Computing: Extensive Review
It has become difficult to handle traditional networks because of extensive network developments and an increase in the number of network users, and also because of new technologies like cloud computing and big data. Traditional networks are experiencing an increase in VM load and in the time taken for processing tasks. Hence, it has become…
Read MoreElasticity Based Med-Cloud Recommendation System for Diabetic Prediction in Cloud Computing Environment
Day to day huge medical data have been accumulating for diabetic diseases. The complexity of storing, processing ,analyzing and predicting the data related to diabetics is not so easy for healthcare professionals .The prediction of accurate results also has the limitation due to scale of data increasing worldwide for patients, symptoms and test results .In…
Read MoreContribution in Private Cloud Computing Development based on Study and KPI Analysis
The preset paper describes a contributes in the implementation of private Cloud Computing. Exhaustive study made validates Cloud environment creation and successful deployed Solution Configuration choice. Related solution ensures a good investment that reduces energy costs of the data center, minimizes network traffic cost proven as an NP-hard problem. In addition, each virtual machine (VsM)…
Read MoreBusiness Process Design for Widuri Indah School Management System with the Support of Cloud Computing
This study aims to design business processes or school management solutions that are right for the school. Widuri Indah School is private school that has not been integrated with the school management system. Qualitative method such as observation and interview are conducted to gain insights about main activities and support activities in Widuri Indah school…
Read MoreA Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment
The huge growth in cloud storage utilization over the past years has made a big demand for an advanced technique and strong tools to make services even more practical and secure. Data privacy in cloud computing has become one of the biggest concerns for both individuals and organizations which adds more pressure on cloud service…
Read MoreSimilarity-based Resource Selection for Scientific Workflows in Cloud Computing
There are high expectations for commercial cloud services as an economical computation resource when executing scientific computing workflows, for which the computation is increasing on a daily basis. However, no method has been developed for determining whether a scientific computing workflow can be executed at a low usage cost, and thus scientists have difficulty in…
Read MoreClean Energy Use for Cloud Computing Federation Workloads
Cloud providers seek to maximize their market share. Traditionally, they deploy datacenters with sufficient capacity to accommodate their entire computing demand while maintaining geographical affinity to its customers. Achieving these goals by a single cloud provider is increasingly unrealistic from a cost of ownership perspective. Moreover, the carbon emissions from underutilized datacenters place an increasing…
Read MoreIntrusion detection in cloud computing based attack patterns and risk assessment
This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…
Read MoreToward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read MorePlummeting Makespan by Proficient Workflow Scheduling in Cloud Environment
Cloud is an Internet-based computing technology in which on-demand shared resources such as software, platforms, repositories, and information are delivered to customers. In the emerging era of computing cloud environment provide the use of resources with the concept of virtualization. Workflow of the tasks has vital role for the improvement of computing performance which leads…
Read MoreTime Granularity-based Privacy Protection for Cloud Metering Systems
Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…
Read MoreMulti-layered Security Design and Evaluation for Cloud-based Web Application: Case Study of Human Resource Management System
Cloud computing is the development of information technology to provides resources that can be accessed through network. Security and privacy in cloud computing are major concern for companies. Therefore, cloud computing architecture strategy and design are needed to reduce costs and ensure the security of company assets in cloud computing. In this study, we are…
Read MorePerformance Evaluation and Examination of Data Transfer: A Review of Parallel Migration in Cloud Storage
Recent years have seen a continued pattern of development in the cloud computing field. Numerous approaches to maximize file transfer capacity are still completely standing for use on cloud computing storage; however, they do not maximize the advantage of data migration scalability and elasticity in cloud storage. One potential problem is that elasticity takes time;…
Read MoreCloud Service Level Agreements and Resource Management
Cloud computing is a technical “as-a-service” usage model utilizing virtualization. Virtual machines are the core of cloud computing that runs as independent machine grouped into different networks within the hypervisor. Practically done by deployment of clouds computing hosts enterprise servers in virtual machines on an array of high-end servers. Managing cloud resources has to do…
Read MoreVirtualization in Cloud Environment: Bandwidth Management
Cloud computing recently emerged as an interesting model that enables computing and other related internet activities to take place anywhere, anytime. Cloud service providers centralize all servers, networks, and applications to allow their users’ access at any time and from any location. Cloud computing uses already existing resources like server, CPU and storage memory but…
Read MoreA Systematic Mapping Study of Cloud, Fog, and Edge/Mobile Devices Management, Hierarchy Models and Business Models
Cloud computing is an exceptional paradigm, which is facilitating the developments and utilization of resources over the internet. Fog computing operates at the edge of the network saving bandwidth, by not sending all information to the cloud, while edge computing does processing of data at the edge of the cloud. Edge computing reduces the distance…
Read MoreTowards an Efficient Federated Cloud Service Selection to Support Workflow Big Data Requirements
Cloud Computing is considered nowadays an attractive solution to serve the Big Data storage, processing, and analytics needs. Given the high complexity of Big Data workflows and their contingent requirements, a single cloud provider might not be able alone to satisfy these needs. A multitude of cloud providers that offer myriad of cloud services and…
Read MoreHardware Acceleration on Cloud Services: The use of Restricted Boltzmann Machines on Handwritten Digits Recognition
Cloud computing allows users and enterprises to process their data in high performance servers, thus reducing the need for advanced hardware at the client side. Although local processing is viable in many cases, collecting data from multiple clients and processing them in a server gives the best possible performance in terms of processing rate. In…
Read MoreDistributing the computation in combinatorial optimization experiments over the cloud
Combinatorial optimization is an area of great importance since many of the real-world problems have discrete parameters which are part of the objective function to be optimized. Development of combinatorial optimization algorithms is guided by the empirical study of the candidate ideas and their performance over a wide range of settings or scenarios to infer…
Read MoreSemantic-less Breach Detection of Polymorphic Malware in Federated Cloud
Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…
Read MoreZero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching
Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers. Traditional data center security best practices involving network segmentation are not well suited to these new environments. We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…
Read MoreAutomated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC
Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…
Read MoreInfrastructure-as-a-Service Ontology for Consumer-Centric Assessment
In the context of adopting cloud Infrastructure-as-a-Service (IaaS), prospective consumers need to consider a wide array of both business and technical factors associated with the service. The development of an intelligent tool to aid in the assessment of IaaS offerings is highly desirable. However, the creation of such a tool requires a robust foundation of…
Read MoreOntology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique
The web documents are automatically interacting to discover the information by web mining, which is one of the applications of Cloud Computing (CC) technologies. These documents may be in the form of structured, semi-structured, or unstructured formats. In current web technologies, the Semantic Web is an extension for better enabling the people and computers to…
Read More
