A Lightweight Container Security Framework Adapted to the Power Cloud Platform

Author(s):  
Wei Liu ◽  
Jun Yan ◽  
Xingshen Wei ◽  
Haiqing Wang ◽  
Shishun Zhu
2011 ◽  
Vol 1 (2) ◽  
pp. 41-63 ◽  
Author(s):  
Victor Chang ◽  
Chung-Sheng Li ◽  
David De Roure ◽  
Gary Wills ◽  
Robert John Walters ◽  
...  

This paper demonstrates financial enterprise portability, which involves moving entire application services from desktops to clouds and between different clouds, and is transparent to users who can work as if on their familiar systems. To demonstrate portability, reviews for several financial models are studied, where Monte Carlo Methods (MCM) and Black Scholes Model (BSM) are chosen. A special technique in MCM, Least Square Methods, is used to reduce errors while performing accurate calculations. Simulations for MCM are performed on different types of Clouds. Benchmark and experimental results are presented for discussion. 3D Black Scholes are used to explain the impacts and added values for risk analysis. Implications for banking are also discussed, as well as ways to track risks in order to improve accuracy. A conceptual Cloud platform is used to explain the contributions in Financial Software as a Service (FSaaS) and the IBM Fined Grained Security Framework. This study demonstrates portability, speed, accuracy, and reliability of applications in the clouds, while demonstrating portability for FSaaS and the Cloud Computing Business Framework (CCBF).


An invention of cloud computing technology comes with numerous benefits for IT industries and others. The data store in the cloud can be easily shared among stakeholders irrespective of their location, i.e. data availability is very good. Nowadays organizations are switching to cloud platform for storing and sharing data in a decentralized manner. This is significantly reduces the economically burden to the organization. As the data are accessible through network, so major concern is to maintain the data confidentiality. Data breach in any form organization losses their trustworthy, and this affect the reputation of the organization. This is very important to maintain the privacy and security of data all the time. There are so many works has been proposed by many researchers to secure data in the cloud by using various encryption techniques. In this paper, we proposed a security mechanism to maintain confidentiality of data. This method is combination of multiplicative homomorphic encryption algorithms along with vertical fragmentation of data. We have tested our scheme based on crypto delays, communication delays, and query processing delays with an existing work. The results obtained show that our method out-perform the existing work. The results obtained show improvement with the proposed method.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2015 ◽  
Vol 12 (3) ◽  
pp. 209-225 ◽  
Author(s):  
Burcu Togral Koca

Turkey has followed an “open door” policy towards refugees from Syria since the March 2011 outbreak of the devastating civil war in Syria. This “liberal” policy has been accompanied by a “humanitarian discourse” regarding the admission and accommodation of the refugees. In such a context, it is widely claimed that Turkey has not adopted a securitization strategy in its dealings with the refugees. However, this article argues that the stated “open door” approach and its limitations have gone largely unexamined. The assertion is, here, refugees fleeing Syria have been integrated into a security framework embedding exclusionary, militarized and technologized border practices. Drawing on the critical border studies, the article deconstructs these practices and the way they are violating the principle of non-refoulement in particular and human rights of refugees in general. 


2019 ◽  
pp. 1-4
Author(s):  
C. T. Kantharaja

Cloud computing technology has signicant role in academic libraries. Most of the library services are available on cloud platform and library software vendors developed their Library Management Software on cloud platform. It is the right time for library professionals to upgrade their technical skills to provide good services to the library stakeholders. This study shows the library services and facilities available on cloud. It is the right time to migrate to cloud


Sign in / Sign up

Export Citation Format

Share Document