scholarly journals Modeling and solving cloud service purchasing in multi-cloud environments

2020 ◽  
Vol 147 ◽  
pp. 113165 ◽  
Author(s):  
Leonard Heilig ◽  
Eduardo Lalla-Ruiz ◽  
Stefan Voß
Author(s):  
Shravani Jasthi Et. al.

These days, in any application development, security for specific area has become crucial job in the service access environment. Since clients needs to utilize the unique services and resources in distributed computing environment. Here the security administrations and cloud portal frameworks have been highly advanced based on the client necessities. However cloud offers a lot of resources through the global service vendors and Multicloud technologies are rapidly in use, but still the cloud requires security enhancement. Applications become complex and have attacks when deployed on multiclouds .So it is very important factor to protect the data and resources from the hackers. In multiple cloud environments it is possible to control all the applications, user resources, secret information and other confidential user process level with the help of server less approach. The server less computing approach is a sort of Distributed computing execution model through which Cloud Service provider will allocate the resource to the client in a dynamic manner .This paper represents what is Multi cloud, advantages of Multicloud, Why Security issue with Multi cloud, How server less is different from monolith services and Security Approaches to multi cloud with server less computing.


Author(s):  
Chrysostomos Zeginis ◽  
Kyriakos Kritikos ◽  
Dimitris Plexousakis

Cloud computing is an emerging technology that attracts the attention of an increasing number of organizations that are willing to virtualize their infrastructure. Towards this direction, enterprises can deploy their applications on different public virtual machines (VMs), in order to reduce their operational costs, as well as optimize the performance of the offered applications. In such heterogeneous multi-cloud environments, the need for monitoring the quality of (a) the acquired resources, (b) the services offered to the final users, and (c) the offered service-based processes, and adapting them has come into force. Current research approaches addressing these areas are limited and most of them target a subset of these offerings. This chapter aims at proposing a novel event-based approach for cross-layer monitoring and adaptation of service-based applications (SBAs) deployed on multiple clouds. The proposed approach is empirically evaluated based on an invoice management application.


Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 317
Author(s):  
Chithambaramani Ramalingam ◽  
Prakash Mohan

The increasing demand for cloud computing has shifted business toward a huge demand for cloud services, which offer platform, software, and infrastructure for the day-to-day use of cloud consumers. Numerous new cloud service providers have been introduced to the market with unique features that assist service developers collaborate and migrate services among multiple cloud service providers to address the varying requirements of cloud consumers. Many interfaces and proprietary application programming interfaces (API) are available for migration and collaboration services among cloud providers, but lack standardization efforts. The target of the research work was to summarize the issues involved in semantic cloud portability and interoperability in the multi-cloud environment and define the standardization effort imminently needed for migrating and collaborating services in the multi-cloud environment.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 56737-56749 ◽  
Author(s):  
Heba Kurdi ◽  
Fadwa Ezzat ◽  
Lina Altoaimy ◽  
Syed Hassan Ahmed ◽  
Kamal Youcef-Toumi

Author(s):  
Marco Anisetti ◽  
Claudio A. Ardagna ◽  
Piero A. Bonatti ◽  
Ernesto Damiani ◽  
Marco Faella ◽  
...  

Author(s):  
Phillip Kendrick ◽  
Thar Baker ◽  
Zakaria Maamar ◽  
Abir Hussain ◽  
Rajkumar Buyya ◽  
...  

2021 ◽  
Author(s):  
Fatema Rashid

With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage, bandwidth, and transmission costs. In order to achieve savings in storage, CSPs often employ data dedplication techniques to eliminate duplicated data. However, benefits gained through these techniques have to balanced against users' privacy concerns, as these techniques typically require full access to data. In this thesis, we propose solutions for different data types (text, image and video) for secure data deduplication in cloud environments. Our schemes allow users to upload their data in a secure and efficient manner such that neither a semi-honest CSP nor a malicious user can access or compromise the security of the data. We use different image and video processing techniques, such as data compression, in order to further improve the efficiency of our proposed schemes. The security of the deduplication schemes is provided by applying suitable encryption schemes and error correcting codes. Moreover, we propose proof of storage protocols including Proof of Retrievability (POR) and Proof of Ownership (POW) so that users of cloud storage services are able to ensure that their data has been saved in the cloud without tampering or manipulation. Experimental results are provided to validate the effectiveness of the proposed schemes.


2021 ◽  
Author(s):  
Fatema Rashid

With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage, bandwidth, and transmission costs. In order to achieve savings in storage, CSPs often employ data dedplication techniques to eliminate duplicated data. However, benefits gained through these techniques have to balanced against users' privacy concerns, as these techniques typically require full access to data. In this thesis, we propose solutions for different data types (text, image and video) for secure data deduplication in cloud environments. Our schemes allow users to upload their data in a secure and efficient manner such that neither a semi-honest CSP nor a malicious user can access or compromise the security of the data. We use different image and video processing techniques, such as data compression, in order to further improve the efficiency of our proposed schemes. The security of the deduplication schemes is provided by applying suitable encryption schemes and error correcting codes. Moreover, we propose proof of storage protocols including Proof of Retrievability (POR) and Proof of Ownership (POW) so that users of cloud storage services are able to ensure that their data has been saved in the cloud without tampering or manipulation. Experimental results are provided to validate the effectiveness of the proposed schemes.


Sign in / Sign up

Export Citation Format

Share Document