scholarly journals Design of Massive Image Duplicate Search Algorithm in Cloud Computing Environment

2021 ◽  
Vol 2083 (4) ◽  
pp. 042078
Author(s):  
Shunyu Yao

Abstract Massive image replay algorithm adopts cloud computing technology to realize image uploading, processing and classification on cloud platform. Image classification is realized by image classifier. Zernike matrix was used to compare the classified images and determine the pseudo-edge blocks around the image. According to the pixel value of the image, the binarization method was used to process the image. After processing, edge detection and line detection were carried out to determine the real image size. The similarity of two real images is calculated by normalized similarity criterion, and the image repetition is judged accordingly. The results show that the accuracy of the algorithm is higher than 99%, and the accuracy of the algorithm is higher than that of the comparison algorithm, and the accuracy of the algorithm is the highest when the similarity threshold is 0.8∽0.9.

2013 ◽  
Vol 347-350 ◽  
pp. 3312-3316
Author(s):  
Hong Jun Chen ◽  
Xue Qin Wu

The positive factors of the cloud computing: the great commercial value, the cheap and convenient use, has been recognized widely. But there are many risks on security. These security risks will greatly restrict the development of cloud computing. Cloud security risks such as: the cloud platform is easily vulnerable, cloud resources is easily abused, the cloud platform data is accessed by unauthorized user or the data is missing, the violations in the network is difficult to trace and survey, and the service providers replacement will affect the migration of the users data and services. So we research the virtualization technology, data backup and disaster recovery technology, encryption technology of data storage and transmission, the authentication technology of service providers and users, risk assessment, and legal constraints and safety training. Our research is strived to obtain a secure cloud computing environment.


2018 ◽  
Vol 72 ◽  
pp. 149-163
Author(s):  
Agnieszka Grzegorek

Many issues need to be considered and tackled before moving data into the cloud. Adoption of cloud computing raises concerns and questions in particular with respect to security, control and privacy in cloud computing environment. Users should be aware where their data will be stored and what law governs. In a case where personal data are to be processed it is important for the contracting parties to ensure that requirements and obligations placed on them pursuant to the EU data protection laws will be fulfilled. This article also includes an overview of typical terms and conditions of cloud computing contracts, stressing that most of contractual arrangements in current practice fall short of achieving a fair balance of rights and obligations arising under the contract between cloud providers and users. The aim of this study is to indicate regulations and guidelines which are applicable to cloud computing contracts as well as initiatives undertaken at the EU level and their role in building legal certainty and trust to cloud computing technology.


2014 ◽  
Vol 1049-1050 ◽  
pp. 2122-2125
Author(s):  
Hong Li Li

In this paper, the background of cloud computing technology to study how to optimize cloud computing data center energy efficiency mechanisms. This paper analyzes the DVFS energy saving strategy, virtualization energy saving strategy, turn off / on energy saving strategies, such as the current mainstream strategy, comparing different energy saving strategies have not applied scenes.


2016 ◽  
Vol 3 (1) ◽  
pp. 42
Author(s):  
Quanhui Ren ◽  
Hui Gao

<span style="color: black; line-height: 115%; font-family: 'Calibri','sans-serif'; font-size: 12pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to adapt to rapid development of network information technology, the application of cloud computing technology is increasingly widespread. However, the security problem in the cloud computing environment has not been effectively resolved. Currently, the research on this problem is getting more attention from the industry. In order to further investigate the information security issues of cloud computing environment, this article not only discusses the basic concept, characteristics and service model of cloud computing, but also focuses on the cloud computing security reference model and cloud cube model. In this paper, the information security problems and concrete solutions in the former cloud computing environment are discussed from different aspects.</span>


2014 ◽  
Vol 4 (1) ◽  
pp. 33-44 ◽  
Author(s):  
Anil Singh ◽  
Kamlesh Dutta ◽  
Avtar Singh

Cloud Computing has changed the strategy of the way of providing different services to business and government agent as well as to sole users. Cloud Computing provides scalable and on demand services to users irrespective of their physical area. But this computing technology has many challenges. One of them is on demand resource allocation. In this paper a resource allocation method is proposed based on Analytical Hierarchy Process (AHP) called Multicriteria Preference Synthesis (MPS) method. MPS method combines many AHP synthesis methods (Additive Normalization, EigenVector, Multicriteria Synthesis etc.) to assign the priorities to the users' tasks. In MPS method Error Criteria is used to provide the consistency in providing the priorities to users' tasks if any violation is there.


Author(s):  
Shantanu Pal

Cloud computing has leaped ahead as one of the biggest technological advances of the present time. In cloud, users can upload or retrieve their desired data from anywhere in the world at anytime, making this the most important and primary function in cloud computing technology. While this technology reduces the geographical barriers and improves the scalability in the way we compute, keeping data in a Cloud Data Center (CDC) faces numerous challenges from unauthorized users and hackers within the system. Creating proper Service Level Agreements (SLA) and providing high-end storage security is the biggest barrier being developed for better Quality of Service (QoS) and implementation of a safer cloud computing environment for the Cloud Service Users (CSU) as well as for the Cloud Service Providers (CSP). Therefore, cloud applications need to have increased QoS and effective security measures and policies set in place to provide better services and to decline unauthorized access. The purpose of this chapter is to examine the cloud computing technology behind innovative business approaches and establishing SLA in cloud computing applications. This chapter provides a clear understanding of different cloud computing security challenges, risks, attacks, and solutions that exist in the present heterogeneous cloud computing environment. Storage security, different cloud infrastructures, the many advantages, and limitations are also discussed.


Author(s):  
Laima Zalieckaitė ◽  
Viktorija Kazakevičiūtė ◽  
Vilma Kalinovienė

The paper examines one of cloud computing (CC) issues that is the migration process to the cloud computing environment. The purpose of the paper is to create a cloud computing migration model through the analysis of organization's information resource migration process.The paperuses scientific literature analysis and synthesis, proposes visualization and modeling methods, analysis of the factors and criteria that determine the content of the stages of the migration process. Global information technology (IT) research and IT consulting company studies and experience show that the volume of cloud computing applications is constantly rising. The trend was also observed in Lithuanian context. It was foundthat themarket forcloud computing application scenarioscould be possibly used in different areas: for individual users, small and medium-sized companies, large organizations and the public sector. The above observations demonstrate that the growing number of organizations will use cloud computing model to manage their information resources. The future of cloud computing technology users need to understand migration processes and therefore have a defined migration model.


2014 ◽  
Vol 687-691 ◽  
pp. 3019-3022 ◽  
Author(s):  
Jun Jun Liu

Cloud computing technology is emerging technology in the field of information technology, and its technical advantage has brought new opportunities and challenges for the development and service of digital library in the Internet era. Virtualization is the key technology of cloud computing, and the paper discusses the virtualization of digital library in the cloud computing environment from technical level. Firstly, the paper introduced cloud computing and virtualization technology; then created a virtualized environment for digital library based on the cloud computing technology, and described the function of various levels; finally, the capacity of virtual machines appointment scheduling can be calculated according to formulas. The paper has great significance in enhancing the efficiency and quality of library service, constructing resource sharing system of digital library.


Sign in / Sign up

Export Citation Format

Share Document