◾ Computing Technology for Trusted Cloud Security

2016 ◽  
pp. 357-370
2011 ◽  
Vol 186 ◽  
pp. 596-600 ◽  
Author(s):  
Ji Yi Wu ◽  
Qian Li Shen ◽  
Jian Lin Zhang ◽  
Qi Xie

Cloud computing, with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. After an objective analysis of the security challenge and problem, in current cloud computing development, the latest research progress in the field of cloud security were summarized. Finally, the important research directions in the field were pointed out. It’s will be a new trend for the cloud computing and trusted computing technology to integrate..


2012 ◽  
Vol 263-266 ◽  
pp. 2015-2019
Author(s):  
Hongli Wu ◽  
Yong Hui Jiang

“Cloud Computing” technology has very big advantage in the computing power, scalability, reliability and cost etc. “Cloud Security "and " Cloud Storage " is one of the two main research fields. This paper puts forward “filter cloud” strategies of filter spam messages based on "Cloud Security" in order to achieve the purpose of filtering spam messages by addressing its root causes. It is a new attempt that applying “Cloud Computing” in spam messages filter and more mobile business would move to "cloud computing" platform in the future.


Load Balancer helps in increasing the speed of transmission of data across the web. It increases the performance of the network by reducing network traffic and increasing the responsiveness of the application. Two devices can connect and communicate data to one another thanks to a set of standardized rules. Participants on the internet or their service providers are assigned IP addresses by address registries. In certain conditions the protocol performs better by managing the throughput and connectivity.Cloud computing is a pioneer among the rising technologies in the IT world today. Even though cloud computing has been around for a few years, the globe has yet to reap the full benefits of this technology. Among the many revolutionary effects envisaged as a result of theThere have been few successes with cloud computing technology, and the rest of the goals are currently being worked on.research. Cloud Security and Performance are two of the most significant barriers to cloud computing adoption.stability. One of the variables that has an impact on cloud performance stability is load balancing.computing.


Popular computing technologies like Distributed ,Parallel ,Grid etc., have already reached their peaks in providing services and now a hybrid aspect is capturing the focus which is a combination of traditional computing technology and network technology and termed to be “Cloud Computing ”.A desperate demand for data sharing and handling enterprise applications have called upon for cloud computing .A blocking wind for leveraging cloud computing technology is the aspect of security .But the passion towards adopting cloud have overridden the security threats. This paper glances over various security threats, risks, challenges along with their resistance capabilities to overcome the vulnerabilities in the cloud and also some of the encryption techniques that are used in the cloud.


Author(s):  
Neha Kewate

Abstract: Cloud computing is something simple we can define as maintaining data centers and data servers and also u can access technology services by computing power, storage, and database using cloud computing technology AWS(Amazon Web Services). It is an emerged model which is already popular among almost all enterprises. It provides us the concept of ondemand services where we are using and scaling cloud resources on demand and as per demand respectively. AWS Cloud computing is a cost-effective model. The major concern in this model is Security and Storage in the cloud. This is one of the major reasons many enterprises of choosing AWS cloud computing. This paper provides a review of security research in the field of cloud security and storage services of the AWS cloud platform. After security and storage, we have presented the working of AWS (Amazon Web Service) cloud computing. AWS is the most trusted provider of cloud computing which not only provides excellent cloud security but also provides excellent cloud storage services. The main aim of this paper is to make cloud computing storage and security a core operation and not an add-on operation. As per the increase in the Service provider and related companies, this AWS Cloud Platform plays a vital role in service industries by giving its best web services, so, therefore, choosing the cloud service providers wisely is the basic need of the industry. Therefore we are going to see how AWS fulfills all these specific needs. Keywords: Trusted Computing, AWS, Information-Centric Security, Cloud Storage, S3, EC2, Cloud Computing


Author(s):  
Shafagat Mahmudova

The study machine learning for software based on Soft Computing technology. It analyzes Soft Computing components. Their use in software, their advantages and challenges are studied. Machine learning and its features are highlighted. The functions and features of neural networks are clarified, and recommendations were given.


Author(s):  
Priyanshu Srivastava ◽  
Rizwan Khan

Today is the era of Cloud Computing Technology in IT Industries. Cloud computing which is based on Internet has the most powerful architecture of computation. It reckons in of a compilation of integrated and networked hardware, software and internet infrastructure. It has various avails atop grid computing and other computing. In this paper, I have given a brief of evaluation of cloud computing by reviewing more than 30 articles on cloud computing. The outcome of this review signalizes the face of the IT industries before and after the cloud computing.


Sign in / Sign up

Export Citation Format

Share Document