distributed computing
Recently Published Documents


TOTAL DOCUMENTS

4434
(FIVE YEARS 689)

H-INDEX

61
(FIVE YEARS 7)

Author(s):  
Ms. Pooja Goyal ◽  
◽  
Dr. Sukhvinder Singh Deora ◽  

Cloud computing is an innovation that conveys administrations like programming, stage, and framework over the web. This computing structure is wide spread and dynamic, which chips away at the compensation per-utilize model and supports virtualization. Distributed computing is expanding quickly among purchasers and has many organizations that offer types of assistance through the web. It gives an adaptable and on-request administration yet at the same time has different security dangers. Its dynamic nature makes it tweaked according to client and supplier’s necessities, subsequently making it an outstanding benefit of distributed computing. However, then again, this additionally makes trust issues and or issues like security, protection, personality, and legitimacy. In this way, the huge test in the cloud climate is selecting a perfect organization. For this, the trust component assumes a critical part, in view of the assessment of QoS and Feedback rating. Nonetheless, different difficulties are as yet present in the trust the board framework for observing and assessing the QoS. This paper talks about the current obstructions present in the trust framework. The objective of this paper is to audit the available trust models. The issues like insufficient trust between the supplier and client have made issues in information sharing likewise tended to here. Besides, it lays the limits and their enhancements to help specialists who mean to investigate this point.


2022 ◽  
Author(s):  
Ahmed Taloba ◽  
Mohamed Ahmed Fouly ◽  
Taysir Soliman

Abstract Distributed computing includes putting aside the data utilizing outsider storage and being able to get to this information from a place at any time. Due to the advancement of distributed computing and databases, high critical data are put in databases. However, the information is saved in outsourced services like Database as a Service (DaaS), security issues are raised from both server and client-side. Also, query processing on the database by different clients through the time-consuming methods and shared resources environment may cause inefficient data processing and retrieval. Secure and efficient data regaining can be obtained with the help of an efficient data processing algorithm among different clients. This method proposes a well-organized through an Efficient Secure Query Processing Algorithm (ESQPA) for query processing efficiently by utilizing the concepts of data compression before sending the encrypted results from the server to clients. We have addressed security issues through securing the data at the server-side by an encrypted database using CryptDB. Encryption techniques have recently been proposed to present clients with confidentiality in terms of cloud storage. This method allows the queries to be processed using encrypted data without decryption. To analyze the performance of ESQPA, it is compared with the current query processing algorithm in CryptDB. Results have proven the efficiency of storage space is less and it saves up to 63% of its space.


2022 ◽  
Vol 4 ◽  
Author(s):  
Alessandro Di Girolamo ◽  
Federica Legger ◽  
Panos Paparrigopoulos ◽  
Jaroslava Schovancová ◽  
Thomas Beermann ◽  
...  

As a joint effort from various communities involved in the Worldwide LHC Computing Grid, the Operational Intelligence project aims at increasing the level of automation in computing operations and reducing human interventions. The distributed computing systems currently deployed by the LHC experiments have proven to be mature and capable of meeting the experimental goals, by allowing timely delivery of scientific results. However, a substantial number of interventions from software developers, shifters, and operational teams is needed to efficiently manage such heterogenous infrastructures. Under the scope of the Operational Intelligence project, experts from several areas have gathered to propose and work on “smart” solutions. Machine learning, data mining, log analysis, and anomaly detection are only some of the tools we have evaluated for our use cases. In this community study contribution, we report on the development of a suite of operational intelligence services to cover various use cases: workload management, data management, and site operations.


Author(s):  
Naoki Konno ◽  
Yusuke Kijima ◽  
Keito Watano ◽  
Soh Ishiguro ◽  
Keiichiro Ono ◽  
...  

2022 ◽  
Vol 97 ◽  
pp. 107639
Author(s):  
Tiantian Ding ◽  
Wenzhong Yang ◽  
Fuyuan Wei ◽  
Chao Ding ◽  
Peng Kang ◽  
...  

2022 ◽  
pp. 1-1
Author(s):  
Maryam Haghighi Ardakani ◽  
Mehrad Mehrabi ◽  
Masoud Ardakani ◽  
Chintha Tellambura

Sign in / Sign up

Export Citation Format

Share Document