VMM based Secured Virtualization in Cloud-Computing

Author(s):  
P. ILA Chandana Kumari ◽  
S. Swarajya Laxmi ◽  
B. Rekha ◽  
B. Pravallika ◽  
G. Chaitanya ◽  
...  

Cloud computing, utility computing, the future will be the main IT field. The government and companies are realizing that foreigners can clearly increase the cloud with minimal costs and maximum flexibility in the plant or existing equipment. But the clouds to ensure user privacy and digital asset management challenge in cloud client. Protection must always contain a performance. The complex is a sure way to end the occupation of the problem, the study suggests two Ebionitism security architecture. The movement and different approaches to health and safety and the level of the best things for their security costs hyper-visor layer to a reduction in order to avoid false alarms

Author(s):  
Hsin-Te Wu ◽  
Gwo-Jiun Horng

This project designed a set of network security mechanisms for cloud applications in VANETs. At present, cloud computing is one of the government’s development priorities in the industry. We divide cloud into public, private, and hybrid clouds in this project. Vehicles or passengers can access road conditions or public transport information through the public cloud; public transportation can access current driving records and users can access relevant enterprise information on the private cloud and hybrid cloud is a combination of public and private clouds. Both cloud computing or VANETs require network and information security. At present, many researches on VANETs security only focus on message communication, and neglect information storage. Researches on cloud computing security only focus on information protection, and neglect user privacy and anonymity. This project designed a set of network and information security mechanisms in line with the requirements of Confidentiality, Authentication, Non-repudiation, Conditional Anonymity, and Conditional Untraceability. This project primarily needs to achieve the following: 1.an authentication mechanism to verify the identity of each other between the passenger and the vehicle and to verify the identity with Single Sign-On; 2. vehicle or user privacy and anonymity, which need to be able to replace the anonymous ID and related parameters for the vehicle or the user; 3. a private communication mechanism, which enables any vehicle or user to communicate privately; and 4. an information security encryption method, which can encrypt the information on a cloud server to avoid unauthorized access by internal personnel or hackers.


2017 ◽  
Author(s):  
Christopher Soghoian

Over the last few years, consumers, corporations and governments have rushed to move their data to “the cloud,” adopting web-based applications and storage solutions provided by companies that include Amazon, Google, Microsoft and Yahoo. Unfortunately the shift to cloud computing needlessly exposes users to privacy invasion and fraud by hackers. Cloud based services also leave end users vulnerable to significant invasions of privacy by the government, resulting in the evisceration of traditional Fourth Amendment protections of a person’s private files and documents. These very real risks associated with the cloud computing model are not communicated to consumers, who are thus unable to make an informed decision when evaluating cloud based services. This paper will argue that the increased risk that users face from hackers is primarily a result of cost-motivated design decisions on the part of the cloud providers, who have repeatedly opted to forgo strong security solutions already used in other Internet based industries. With regard to the intrusion upon user privacy performed by government agencies, fault for this privacy harm does not lie with the service providers; but the inherently coercive powers the government can flex at will. The third party doctrine, which permits government agents to obtain users’ private files from service providers with a mere subpoena, is frequently criticized by privacy scholars. However, this paper will argue that this doctrine becomes moot once encryption is in use and companies no longer have access to their customers’ private data. The real threat to privacy lies with the fact that corporations can and have repeatedly been forced to modify their own products in ways that harm end user privacy, such as by circumventing encryption.


2015 ◽  
Vol 5 (1) ◽  
Author(s):  
Astri Furqani ◽  
Hafidhah .

In this era, a lot of activities that can not be separated from the practice of cheating or fraud , no exception In the government . Inspektorat Sumenep is the leading institution of internal Local Government in preventing and detecting fraud in the Local Government appropiate Perbup Sumenep No. 29 of 2008 . Dinas Pendidikan Sumenep need attention on the issue . This is due to Dinas Pendidikan Sumenep an agency with the largest number of assets and managing large budgets . These conditions led to the formulation of the problem is How Inspektorat Sumenep role in preventing and detecting fraud in Dinas Pendidikan Sumenep. This study used a qualitative approach in which the focus of this study is Inspektorat role in preventing and detecting fraud at Dinas Pendidikan Sumenep . Primary data obtained by direct interviews with the parties directly related to the determination of the source of research data in a qualitative study using nonprobability sampling . The sampling technique used was purposive sampling . The conclusion of this study, role of the Inspektorat Sumenep in the prevention of fraud in Dinas Pendidikan Sumenep still not maximal . This is due to Inspektorat Sumenep not supervise from the planning / budgeting and not optimal in overseeing and assisting the implementation of the SPIP as an instrument of fraud prevention in Dinas Pendidikan Sumenep . The role of Inspektorat Sumenep in the detection of fraud in Dinas Pendidikan Sumenep done by conducting an audit of financial and asset management in each financial year.Keywords: fraud, government, inspektorat.


2021 ◽  
pp. 000276422110031
Author(s):  
Elizabeth A. Petre ◽  
David Haldane Lee

In 2011, “What’s Cooking, Uncle Sam? The Government’s Effect on the American Diet” (WCUS) was exhibited at the Lawrence F. O’Brien Gallery of the National Archives Building in Washington, DC. Afterward, it toured the country, visiting the Centers for Disease Control and Prevention’s (CDC) David J. Sencer Museum in Atlanta, the National Constitution Center in Philadelphia, and the Kansas Museum of History in Topeka. The exhibition website states that WCUS was “made possible” by candy corporation Mars, Incorporated. WCUS featured over a 100 artifacts tracing “the Government’s effect on what Americans eat.” Divided into four thematic sections (Farm, Factory, Kitchen, and Table), WCUS moves from agrarianism, through industrial food production and into mess halls, cafeterias, and individual kitchens. Photos, documents, news clippings, and colorful propaganda posters portray the government as a benevolent supporter of agriculture, feeder of soldiers and children, and protector of consumer health and safety. Visitors are positioned as citizens in an ideological mélange of paternalism and patriotism. In this rhetorical walk-through of the exhibition, we consider the display of archival materials for purposes of positioning, in consideration of past and present issues of diet and governance. Making explicit unstated assumptions, we claim that, although propagandistic artifacts take on different meanings to those viewing them decades later as memorabilia, they maintain their ideological flavor.


2010 ◽  
Vol 20-23 ◽  
pp. 1040-1045 ◽  
Author(s):  
Cheng Hua Shi ◽  
Zi Lai Sun ◽  
Kun Jing Dong

Food is the most basic material conditions of survival and development of human society, its security situation is relation to the health and safety of consumer directly. This paper analyze the reasons of causing problems of food quality and safety in the agricultural products supply chain from the perspective of the game theory as well as the government incentive and regulatory mechanisms affect the decision-making of farmers and food producers respectively. In the game between crop growers - farmers and food producers, the government play the outsider role and should give farmers subsidies to encourage them to grow high-quality green crops, as far as possible to ensure food safety from the source. In the game between producers and regulators, the government, as the game participant, should be asked to improve the supervision efficiency and the control ability to prevent unqualified food products entering the market.


2018 ◽  
Vol 195 ◽  
pp. 06007
Author(s):  
Mulyadi ◽  
Ayomi Rarasati

The feasibility of government buildings, especially offices and schools as public service and social infrastructures, must be well maintained. When the building needs to be majorly rehabilitated, the government sometimes has to combine building demolition and deconstruction processes. In the government asset management cycle, the process starts with erasing the asset from the accountancy system, by selecting a building demolition contractor, then producing a new asset by selecting another builder contractor. In the past few years, the duration of this actual process acquired longer than the planned time. Therefore, this research aims to develop a management strategy in order to improve the government building disposal process. The process of the research started with obtaining the dominant factors that influence the demolition and deconstruction process, and then it is continued by developing the strategy.


Sign in / Sign up

Export Citation Format

Share Document