scholarly journals Redundancy Mechanisms applied to improve the performance in cloud computing environments

Author(s):  
Rosangela Melo ◽  
Vicente Sobrinho ◽  
Ivanildo Filho ◽  
Fábio Feliciano ◽  
Paulo Maciel

Cloud computing offer IT services to the users worldwide based on pay-as-you-go model. Furthermore, architectures and services that are provided by cloud computing system must have high availability, scalability, security and furthermore be fault tolerant. Plan these environments is not an easy task, it is necessary to ensure that undesirable situations or errors do not occur or can be minimized. The use of Sensitivity Analysis combined with the use of modeling hierarchy and the study of models for representing redundancy mechanisms arise in order to investigate the possible changes that these systems suffer and identify their shortcomings and propose improvements solutions for the planning of these systems. The use of redundancy techniques has been used to improve availability. In this work the redundancy mechanisms is a solution to improve the performance of environments in cloud computing.

2018 ◽  
pp. 1669-1693
Author(s):  
Amine Haouari ◽  
Zbakh Mostapha ◽  
Samadi Yassir

In this paper, the authors present a state of art survey of cloud computing, highlighting its architectural principles, implementation as well as research directions in this increasingly important domain. They cover the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system. Furthermore, in this survey the researchers highlight the concept of trust in digital environment as well as the use of containers like Docker, the block chain principle, artificial intelligence, last findings in the field of cryptography and other new concepts used in the domain of security and privacy related to cloud computing environments. They provide in the end an overview of the metrics which are mandatory in order to have a green flavor of cloud computing and the strategies that are currently used.


Author(s):  
Amine Haouari ◽  
Zbakh Mostapha ◽  
Samadi Yassir

In this paper, the authors present a state of art survey of cloud computing, highlighting its architectural principles, implementation as well as research directions in this increasingly important domain. They cover the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system. Furthermore, in this survey the researchers highlight the concept of trust in digital environment as well as the use of containers like Docker, the block chain principle, artificial intelligence, last findings in the field of cryptography and other new concepts used in the domain of security and privacy related to cloud computing environments. They provide in the end an overview of the metrics which are mandatory in order to have a green flavor of cloud computing and the strategies that are currently used.


2018 ◽  
Vol 28 (6) ◽  
pp. e2040
Author(s):  
Bruno Silva ◽  
Rubens Matos ◽  
Eduardo Tavares ◽  
Paulo Maciel ◽  
Armin Zimmermann

Author(s):  
Vaishali Ravindra Thakare ◽  
K. John Singh

Cloud computing is a new environment in computer-oriented services. The high costs of network platforms, development in client requirements, data volumes and weight on response time pushed companies to migrate to cloud computing, providing on-demand web facilitated IT services. Cloud storage empowers users to remotely store their information and delight in the on-demand high quality cloud applications without the affliction of local hardware management and programming administration. In order to solve the problem of data security in cloud computing system, by introducing fully homomorphism encryption algorithm in the cloud computing data security, another sort of information security solution to the insecurity of the cloud computing is proposed, and the scenarios of this application is hereafter constructed. This new security arrangement is completely fit for the processing and retrieval of the encrypted data, successfully prompting the wide relevant prospect, the security of data transmission, and the stockpiling of the cloud computing.


Sign in / Sign up

Export Citation Format

Share Document