Third Party Auditing for Service Assurance in Cloud Computing

Author(s):  
Yanru Zhang ◽  
Xiang-Yang Li ◽  
Zhu Han
IJARCCE ◽  
2014 ◽  
pp. 8507-8509
Author(s):  
RAMYA. D ◽  
DR.RAJA. K ◽  
SRINIVASAN. S

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Animals ◽  
2021 ◽  
Vol 11 (3) ◽  
pp. 830
Author(s):  
Temple Grandin

In the U.S., the most severe animal welfare problems caused by COViD-19 were in the pork industry. Thousands of pigs had to be destroyed on the farm due to reduced slaughter capacity caused by ill workers. In the future, both short-term and long-term remedies will be needed. In the short-term, a portable electrocution unit that uses scientifically validated electrical parameters for inducing instantaneous unconsciousness, would be preferable to some of the poor killing methods. A second alternative would be converting the slaughter houses to carcass production. This would require fewer people to process the same number of pigs. The pandemic revealed the fragility of large centralized supply chains. A more distributed supply chain with smaller abattoirs would be more robust and less prone to disruption, but the cost of pork would be greater. Small abattoirs can coexist with large slaughter facilities if they process pigs for specialized premium markets such as high welfare pork. The pandemic also had a detrimental effect on animal welfare inspection and third party auditing programs run by large meat buyers. Most in-person audits in the slaughter plants were cancelled and audits were done by video. Video audits should never completely replace in-person audits.


Author(s):  
Shrutika Khobragade ◽  
Rohini Bhosale ◽  
Rahul Jiwahe

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.


2020 ◽  
Vol 198 ◽  
pp. 04030
Author(s):  
Dai Yanyan ◽  
Chen Meng

With the development of new technologies such as artificial intelligence, big data, and cloud computing, the “intelligent airport” is considered to be an effective means to solve or alleviate the current industry problems such as large-scale airport business, the large number of operating entities, and the complicated operation conditions. This paper is about the collaboration between universities and enterprises based on the concept of service design. Relying on big data and cloud computing technology, this paper addresses the problems of airport service robots in inquiries, blind spots of security inspection, and full monomer smart navigation diffluence, combined with the basic technology of service robot artificial intelligence and the third-party interface to design solutions to effectively solve the problems of process.


Sign in / Sign up

Export Citation Format

Share Document