scholarly journals New Approach for Managing Keys in Cloud & Use Cases for Cloud Computing

2013 ◽  
Vol 4 (1) ◽  
pp. 111-113
Author(s):  
Sarvesh Singh ◽  
Anupam Shukla ◽  
Ankit Sharma ◽  
Kalimullah Lone

Now a days cloud computing is best innovative technology in the field of IT. In its broadest usage, the term cloud computing refers to the delivery of IT resources over the internet as opposed to hosting and operating these resources locally, such as a college or university network. These resources can include application and services as well as infrastructure and services over the network. Any organization can purchase these resources on as needed basis and avoid the capital expenditure cost of software and hardware. Security is major problem in cloud computing, thus key distribution is important thing for managing security in cloud computing. In this paper we derived a proposed algorithms for managing keys in the cloud and also discuss uses cases for cloud computing.

2018 ◽  
Vol 19 (2) ◽  
pp. 211-229
Author(s):  
Paweł Kobis

As enterprises process more and more information and to do so they use infor¬matic systems, this forces them to apply protective measures at the level which makes it possible to eliminate threats at the level of the local organizational network and the global one – the Internet. The goal of the present article is to show basic principles in the scope of protecting informatic systems which support information management. It presents models illustrating optimum solutions in the scope of data protection in economic entities which make use of traditional IT departments as well as entities that have decided to use in their operations cloud computing. The empirical part presents the results of the research concern¬ing application of selected protection elements in the SME sector enterprises.


2010 ◽  
Vol 439-440 ◽  
pp. 1318-1323
Author(s):  
Jian Wang ◽  
Yan Zhao ◽  
Jia Jin Le

Cloud computing seems to offer some incredible benefits for communicators: the availability of an incredible array of software applications, access to lightning-quick processing power, unlimited storage, and the ability to easily share and process information. All of this is available through your browser any time you can access the Internet. While this might all appear enticing, there remain issues of reliability, portability, privacy, and security. When our private data are out-sourced in cloud computing, we should guarantee the confidentiality and searchability of the private data. Our paper provides a new approach to avoid the disclosure of the sensitive attributes of users when user ask for service from the Service Provider (SP) in cloud computing.


2014 ◽  
Vol 13 (12) ◽  
pp. 5193-5198
Author(s):  
Rahul Rathore ◽  
Bhumika Gupta ◽  
Vaibhav Sharma ◽  
Kamal Kumar Gola

Cloud computing is the dynamic delivery of information technology resources and capabilities as a service over the Internet. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. It generally incorporates infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). [1] Load balancing is one of the biggest challenges in the cloud computing. The concept of load balancing is to equally distribute the workload, resources across all the nodes to guarantee that all the nodes have equal load i.e. no single node is over loaded. As we all know that cloud computing services are mainly product based so in this approach we are using different product based priority queues for different services.


Author(s):  
Prashant Jain ◽  
Yan Pang

Cloud computing has been one of the most disruptive technologies, which has changed the way IT is consumed by enterprises, both small and large. The ability to subscribe to “as-a-service” consumption model, while converting capital expenditure to operational expenditure, has been a key driver for Cloud adoption. Rapid provisioning and deprovisioning of services, elastic scaling of infrastructure resources and self-service ability for users are some of the key characteristics and benefits offered by Cloud. Infrastructure as a Service (IaaS) provides the basic building block, with Platform as a Service (PaaS) providing a layer of abstraction on top of IaaS and similarly Software as a Service (SaaS) providing a layer of abstraction on top of PaaS. Moving up the layers reduces complexity and enables users to tap into a much larger spectrum of benefits that Cloud computing has to offer. While Cloud opens the door for “as-a-service” consumption model, there are many additional benefits that can be realized by enterprises beyond the typical IaaS, PaaS and SaaS. A number of these benefits can be realized by leveraging Cloud in different scenarios and use cases. For example, an enterprise may continue to pursue a traditional non-Cloud based infrastructure deployment strategy, however, it could use a public Cloud for storage elasticity. Such use cases exemplify many atypical benefits that Cloud can provide, which often got overlooked. This paper will present a number of such cloud deployment use cases that go beyond the typical IaaS usage of cloud. A hierarchical architectural model of cloud solution pattern is proposed to describe both the business requirements and technical considerations of these use cases. These cloud architectural patterns are further elaborated through real-life case studies and examples.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2018 ◽  
Vol 2 (1) ◽  
pp. 63-69
Author(s):  
Muhammad Zarlis ◽  
Sherly Astuti ◽  
Muhammad Salamuddin

In education, for educational instruments scientific writing is a very important thing. It requires an information management skill, information management is a library search, which can be done through a computer and guided by the internet. It can also be through the quality of reading used as a reference for scientific writing. In addition, in producing a paper also must know the management of writing, not only required to pay attention to the rules of standard language, but also must be able to convey ideas and ideas well and meet scientific criteria, such as making a quote or reference list used. This paper was written with the aim of improving the quality of research through reading material, making notes and avoiding plagiarism, references using the Harvard system for journals, books, and articles. Management of citing articles either CD or internet, writing, editing, storing references electronically, writing bibliography, and quotations.


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


Author(s):  
Eter Basar ◽  
Ankur Pan Saikia ◽  
L. P. Saikia

Data Technology industry has been utilizing the customary social databases for around 40 years. Be that as it may, in the latest years, there was a generous transformation in the IT business as far as business applications. Remain solitary applications have been supplanted with electronic applications, conferred servers with different proper servers and committed stockpiling with framework stockpiling. Lower expense, adaptability, the model of pay-as-you-go are the fundamental reasons, which caused the conveyed processing are transformed into reality. This is a standout amongst the hugest upsets in Information Technology, after the development of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting the opportunity to be more natural to groups. They featured the hindrances of current social databases as far as convenience, adaptability, and provisioning. Cloud databases are basically utilized for data raised applications, for example, stockpiling and mining of gigantic information or business information. These applications are adaptable and multipurpose in nature. Various esteem based data organization applications, such as managing an account, online reservation, e-exchange and stock organization, and so on are delivered. Databases with the help of these sorts of uses need to incorporate four essential highlights: Atomicity, Consistency, Isolation, and Durability (ACID), in spite of the fact that utilizing these databases isn't basic for utilizing as a part of the cloud. The objective of this paper is to discover the points of interest and disservices of databases generally utilized in cloud frameworks and to survey the difficulties in creating cloud databases


2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


Sign in / Sign up

Export Citation Format

Share Document