scholarly journals RESIKO IMPLEMENTASI CLOUD COMPUTING DAN PENANGANANNYA DALAM MENDUKUNG RISET KELAUTAN DAN PERIKANAN

Jurnal Pari ◽  
2021 ◽  
Vol 6 (2) ◽  
pp. 157
Author(s):  
Eva Mustikasari ◽  
Dani Saepulloh

Riset adalah proses mengumpulkan, menganalisis, dan menerjemahkan informasi atau data secara sistematis untuk menambah pemahaman kita terhadap suatu fenomena tertentu yangmenarik perhatian kita. FORMAL RESEARCH yaitu riset yang ditujukan untuk menambah pemahaman kita terhadap suatu fenomena dan untuk dikomunikasikan kepada komunitas (dipublikasikan) melalui media internet (online) dengan menggunakan teknologi cloud Computing.Menggunakan Cloud Computing harus diperhatikan keamanan data agar pengguna memiliki kepercayaan dalam menggunakannya. Pengembangan cloud computing akan mengarah padaberkembangnya suatu teknologi pengiring cloud computing yaitu suatu bentuk teknologi yang dapat menjamin keamanan data. Selain itu, perkembangan cloud computing ini selanjutnya akanmemasuki tahap integrasi antar berbagai provider dengan mengedepankan prinsip interoperabilitas.Research is the process of collecting, analyzing, and systematically translating information or data to increase our understanding of a particular phenomenon that interests us. FORMAL RESEARCH, which is research aimed at increasing our understanding of a phenomenon and to be communicated to the community (published) via the internet (online) using cloud computing technology. Using Cloud Computing data security must be considered so that users have confidencein using it. The development of cloud computing will lead to the development of a technology that accompanies cloud computing, which is a form of technology that can ensure data security. In addition, the development of cloud computing will then enter the integration stage between various providers by prioritizing the principle of interoperability.

Author(s):  
Hicham Amellal ◽  
Abdelmajid Meslouhi ◽  
Abderahim El Allati ◽  
Annas El Haddadi

With the advancement of communication and information technology, the internet has become used as a platform for computing and not only a way of communications networks. Accordingly, the large spread of cloud computing led to the emergence of different privacy implications and data security complexities. In order to enhance data security in the cloud, the authors propose in this chapter the use of an encryption box, which includes different cryptosystems. In fact, this step gives the user the opportunities to encrypt data with an unknown algorithm and makes a private key before the storage of data in the host company servers. Moreover, to manage the encryption database, the authors propose a quantum approach in search based on Grover's algorithm.


2019 ◽  
Vol 8 (2) ◽  
pp. 40-43
Author(s):  
Sheik Saidhbi

Internet working security has become one of the biggest uprising points of concern now days. People are getting attached more and more to the internet in order to fulfill their demands. Not only customers but also the IT based companies are also getting themselves relying on up growing technology called as cloud computing. Cloud is a branch of computer science that provides the services on lease. In this paper we will make a comparative analysis of various technical security issues towards cloud computing, cloud deployment based security and model based security issues. A comparative analysis has been made at the end of the paper.


2022 ◽  
Vol 2022 ◽  
pp. 1-14
Author(s):  
Zhenzhong Zhang ◽  
Wei Sun ◽  
Yanliang Yu

With the vigorous development of the Internet of Things, the Internet, cloud computing, and mobile terminals, edge computing has emerged as a new type of Internet of Things technology, which is one of the important components of the Industrial Internet of Things. In the face of large-scale data processing and calculations, traditional cloud computing is facing tremendous pressure, and the demand for new low-latency computing technologies is imminent. As a supplementary expansion of cloud computing technology, mobile edge computing will sink the computing power from the previous cloud to a network edge node. Through the mutual cooperation between computing nodes, the number of nodes that can be calculated is more, the types are more comprehensive, and the computing range is even greater. Broadly, it makes up for the shortcomings of cloud computing technology. Although edge computing technology has many advantages and has certain research and application results, how to allocate a large number of computing tasks and computing resources to computing nodes and how to schedule computing tasks at edge nodes are still challenges for edge computing. In view of the problems encountered by edge computing technology in resource allocation and task scheduling, this paper designs a dynamic task scheduling strategy for edge computing with delay-aware characteristics, which realizes the reasonable utilization of computing resources and is required for edge computing systems. This paper proposes a resource allocation scheme combined with the simulated annealing algorithm, which minimizes the overall performance loss of the system while keeping the system low delay. Finally, it is verified through experiments that the task scheduling and resource allocation methods proposed in this paper can significantly reduce the response delay of the application.


2014 ◽  
Vol 651-653 ◽  
pp. 2510-2513 ◽  
Author(s):  
Li Ping Yang ◽  
Da Wei Xu ◽  
Wei Wang

Cloud computing is a model about the increase , usage and delivery of related services in Internet, usually provides dynamically scalable and often virtualized resources by the Internet. This paper first introduces the cloud computing technology, then discusses the system structure, system flow and system function, and finally expounds the cloud computing role and the realization of the examination system .


Internet offers bunch of services and resources, one of them is cloud computing. The centers which provide these services are located all around the world and this service has its own mainstream pros and cons. Cloud computing consists of taking cloud services from the internet and taking them away from the considerable firewall. This paper aims in enhancing specifications of cloud computing, review its security threats and address security concerns along with the cloud operations that needs security. Also, this paper addresses basic security models, qualities and prerequisites for cloud Computing


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Wensheng Dai

With the development of science and technology and the improvement of industrialization, the development of more and more industries has interacted to form many industrial clusters. For the healthy development and safety of various industries, environmental quality monitoring and management in industrial clusters is of utmost importance. Currently, domestic and foreign enterprises and related departments are vigorously developing smart environment platforms. The purpose of this paper is to design an intelligent environment platform for industrial clusters based on cloud computing technology. This article first uses the methods of literature research and network investigation to collect relevant literature and research results and organizes statistics on the collected information. Then, through case analysis to study the needs and overview of the construction of smart environment platforms in industrial clusters, it uses the wireless smart sensing technology of the Internet of Things and the information interaction technology of the Internet to provide data to cloud computing through mobile terminals, and cloud computing provides various types on demand data service. Then, according to the demand analysis of the intelligent environment platform, the functional modules and operation procedures of the intelligent environment platform are designed. The main monitoring content is water quality testing, air quality testing, garbage disposal and soil quality testing, etc. Finally, this article processes, analyzes, and predicts the detected sampled data through cloud computing. It can also locate and track abnormal data. Through the curve fitting of the data, the environmental conditions in the area can be predicted. Experiments show that the prediction accuracy rate is as high as 93.8%, which plays an important role in monitoring and preventing environmental pollution.


2015 ◽  
Vol 791 ◽  
pp. 42-48 ◽  
Author(s):  
Monika Kulisz ◽  
Jakub Pizoń

Internet of Things (IoT) is a technology enabling identification of individual devices, providing mutual communication between them and their user, and allowing them to cooperate. What is more, IoT delivers tools for simplification of monitoring and controlling of processes. The present article introduces an evolved solution to the Internet of Things usage in a machine cutting process of laminated boards relying on the Cloud Computing technology.


2013 ◽  
Vol 760-762 ◽  
pp. 1718-1722
Author(s):  
Tao Zhang ◽  
Shou Ming Ma ◽  
Wei Min Lin ◽  
Yuan Yuan Ma

As a new paradigm for hosting and delivering services over the Internet, cloud computing technology especially suitable for dealing with series of problems in strong smart grid. However, despite the fact that cloud computing offers huge opportunities to the strong smart grid, the development of cloud computing technology is currently at its infancy, especially with many security issues to be addressed. In this paper, we present the overall architecture and benefits of cloud computing applications in strong smart grid. After that, we propose a unified security protection system framework of power cloud computing and give some practicable security protection suggestions.


Cloud computing (CC) is the expertise over which every person is capable of sharing the reserves, amenities, and evidence amongst the individuals as a result of harnessing the internet in link. Subsequently, protection is a key concern on the facts pooled by means of the internet. In CC a numerous security issues prone to occur that includes confidentiality, integrity, authentication and/or thin well-honed edit control (TWHEC). In this research an innovative security replica has been aforethought. The design stipulates an approach across which secure communication besides data hiding from unauthorized punters can be got hold of. The security resolved with all categories of CC aspects similar to Platform as a Service (aaS), and Process aaS (PaaS), Software aaS, Storage aaS and Security aaS (SaaS), Network aaS (NaaS), Functions aaS (FaaS), Infrastructure aaS, Information aaS, and Integration aaS (IaaS), Database aaS (DBaaS), Application as a Service aaS and API aaS (AaaS), Management aaS (MaaS), Testing aaS (TaaS), etc., This anticipated system yield thin well-honed, mutable and ascendable statistics editing control by means of the manipulation of complex traits of Hierarchical (Ranked/Ordered) attribute-set-based encryption (HASBE). This multifarious qualities of blend of HASBE and Rivest–Shamir–Adleman (RSA) algorithm too. For instance, cyber individual healthiness record (IHR) aids sick persons to deal with his/her personal medicinal archives into a unified means that is to a great extent vital in storing, editing and partaking of the individual healthiness data. Further down encryption, it is impeding in accomplishing the TWHEC to CIHR data in an ascendable and effectual technique by using HASBE. Prevailing RSA encryption does not endow the data with high security in health. To fulfill ascendable, elastic, and thin well-honed edit control of subcontracted statistics in cloud. In this archetypal instigated a mish-mash RSA encryption with HASBE. Cyber IHR dispenses with patients to get along medical archives in a secure way, in which very significant concerns are the storing, access and distribution of individual wellness information. This composite process is responsible for three mode precautions, i.e. data precautions, certification and corroboration. In this report, the HASBE encryption algorithm has been put forward in realizing TWHEC to IHR data in an ascendable and effectual way


Sign in / Sign up

Export Citation Format

Share Document