SMS Spam Filtering Based on “Cloud Security”

2012 ◽  
Vol 263-266 ◽  
pp. 2015-2019
Author(s):  
Hongli Wu ◽  
Yong Hui Jiang

“Cloud Computing” technology has very big advantage in the computing power, scalability, reliability and cost etc. “Cloud Security "and " Cloud Storage " is one of the two main research fields. This paper puts forward “filter cloud” strategies of filter spam messages based on "Cloud Security" in order to achieve the purpose of filtering spam messages by addressing its root causes. It is a new attempt that applying “Cloud Computing” in spam messages filter and more mobile business would move to "cloud computing" platform in the future.

2013 ◽  
Vol 760-762 ◽  
pp. 1718-1722
Author(s):  
Tao Zhang ◽  
Shou Ming Ma ◽  
Wei Min Lin ◽  
Yuan Yuan Ma

As a new paradigm for hosting and delivering services over the Internet, cloud computing technology especially suitable for dealing with series of problems in strong smart grid. However, despite the fact that cloud computing offers huge opportunities to the strong smart grid, the development of cloud computing technology is currently at its infancy, especially with many security issues to be addressed. In this paper, we present the overall architecture and benefits of cloud computing applications in strong smart grid. After that, we propose a unified security protection system framework of power cloud computing and give some practicable security protection suggestions.


2012 ◽  
Vol 542-543 ◽  
pp. 1271-1274
Author(s):  
Yu Bo Song ◽  
Zhao Yuan Jiang

Enterprise asset management system can help to reduce operating costs, improve the management level of enterprise, and the relevant industry expert knowledge contained in this system can provide a unified management platform for all key assets of enterprise. To build an information center of enterprise asset management that is cross-industry and cross-area, cloud computing technology should be introduced to build cloud computing platform of asset management. The construction needs of asset management cloud platform are analyzed, and the cloud computing characteristics of platform construction is studied in this paper. Afterwards, the system architecture and key technologies of constructing the cloud computing platform for enterprise asset management are put forward.


2016 ◽  
Vol 11 (1) ◽  
Author(s):  
Hrnjica Bahrudin ◽  
Sanel Jakupović

Cloud computing or cloud computing can be defined as computer evolution that began 30 years ago and represents the integration of several technologies (Autonomic Computing, Grid Computing, Utility Computing and Virtualization) located in remote and guarded data centers. Although only a few years in wide use, greatly changed the way we use computers not only in the business sector, but also in other segments of society. Social networks, mobile technologies and services on the Internet such as Skype and other services to communicate, share files and photos, the entertainment industry and others. based on cloud computing technology, but we are not even aware of. In this paper, several common business scenarios in which the cloud computing technology optimal choice compared to the now classic client-server architecture. Cloud computing platform that handles the work represents the Microsoft Azure platform, which represents the most complete and fastest growing cloud platform today.


Biometrics ◽  
2017 ◽  
pp. 205-232
Author(s):  
Tarunpreet Bhatia ◽  
A. K. Verma

Cloud computing is a way of providing unlimited storage capacity and enhancing parallel processing capabilities without investing in new infrastructure or licensing new software. Designing a secure data access for cloud computing platform is a big challenge as more and more information is placed over cloud by individuals and companies. It is not enough to authenticate a device, or even a user to a device. Cloud computing requires a level of trust that can only be possible through biometric identity assurance, as biometrics offer the unique ability to bind an identity to an actual user, not just to a logical or physical token or credential. This chapter evaluates cloud security by identifying unique security requirements and attempts to present viable solutions based on biometrics to eliminate possible threats. It provides a comprehensive and structured overview of biometric authentication for enhancing cloud security.


Author(s):  
Tarunpreet Bhatia ◽  
A. K. Verma

Cloud computing is a way of providing unlimited storage capacity and enhancing parallel processing capabilities without investing in new infrastructure or licensing new software. Designing a secure data access for cloud computing platform is a big challenge as more and more information is placed over cloud by individuals and companies. It is not enough to authenticate a device, or even a user to a device. Cloud computing requires a level of trust that can only be possible through biometric identity assurance, as biometrics offer the unique ability to bind an identity to an actual user, not just to a logical or physical token or credential. This chapter evaluates cloud security by identifying unique security requirements and attempts to present viable solutions based on biometrics to eliminate possible threats. It provides a comprehensive and structured overview of biometric authentication for enhancing cloud security.


Author(s):  
Zeyu Sun ◽  
Yunxing Shu

With the development of science and technology, cloud computing technology has been widely applied in a variety of engineering fields, while its application and promotion in the education is always neglected. In this paper, the cloud computing assisted hybrid learning scheme is put forward based on the analysis of the cloud computing technology and the hybrid method. Firstly, the cloud computing platform architecture and key technology are explained. Secondly, the four stages of the blended learning scheme model are established in accordance with its guiding ideology and construction principle. Furthermore, the four stages are given a detailed description and analysis in which seven blended teaching links are concluded in combination with Baihui cloud platform application characteristics. Finally, the scores from students of different grades and different years are compared. The comparison result verifies the blended learning scheme is effective in the classroom, and is helpful to stimulate the students’ learning interest and enthusiasm, which is significant for the further in-depth study.


2014 ◽  
Vol 530-531 ◽  
pp. 696-700
Author(s):  
Ying Liu ◽  
Jun Yao

Through the research of virtualization and cloud computing platform, the thesis is aimed at the problem of autonomous learning system and propose the solutions. This is the starting point in the application of the technology of cloud computing, and for further research on the construction of digital campus is based on cloud computing technology laid the foundation. This system has been completed the demonstration in the virtual cloud platform programming with Java combined with HBase .


2012 ◽  
Vol 35 (6) ◽  
pp. 1262 ◽  
Author(s):  
Ke-Jiang YE ◽  
Zhao-Hui WU ◽  
Xiao-Hong JIANG ◽  
Qin-Ming HE

2020 ◽  
Vol 29 (2) ◽  
pp. 1-24
Author(s):  
Yangguang Li ◽  
Zhen Ming (Jack) Jiang ◽  
Heng Li ◽  
Ahmed E. Hassan ◽  
Cheng He ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document