cloud storage
Recently Published Documents


TOTAL DOCUMENTS

3659
(FIVE YEARS 1185)

H-INDEX

51
(FIVE YEARS 13)

Author(s):  
Neha Kewate

Abstract: Cloud computing is something simple we can define as maintaining data centers and data servers and also u can access technology services by computing power, storage, and database using cloud computing technology AWS(Amazon Web Services). It is an emerged model which is already popular among almost all enterprises. It provides us the concept of ondemand services where we are using and scaling cloud resources on demand and as per demand respectively. AWS Cloud computing is a cost-effective model. The major concern in this model is Security and Storage in the cloud. This is one of the major reasons many enterprises of choosing AWS cloud computing. This paper provides a review of security research in the field of cloud security and storage services of the AWS cloud platform. After security and storage, we have presented the working of AWS (Amazon Web Service) cloud computing. AWS is the most trusted provider of cloud computing which not only provides excellent cloud security but also provides excellent cloud storage services. The main aim of this paper is to make cloud computing storage and security a core operation and not an add-on operation. As per the increase in the Service provider and related companies, this AWS Cloud Platform plays a vital role in service industries by giving its best web services, so, therefore, choosing the cloud service providers wisely is the basic need of the industry. Therefore we are going to see how AWS fulfills all these specific needs. Keywords: Trusted Computing, AWS, Information-Centric Security, Cloud Storage, S3, EC2, Cloud Computing


2022 ◽  
Vol 2 (14) ◽  
pp. 26-34
Author(s):  
Nguyen Manh Thang ◽  
Tran Thi Luong

Abstract—Almost developed applications tend to become as accessible as possible to the user on the Internet. Different applications often store their data in cyberspace for more effective work and entertainment, such as Google Docs, emails, cloud storage, maps, weather, news,... Attacks on Web resources most often occur at the application level, in the form of HTTP/HTTPS-requests to the site, where traditional firewalls have limited capabilities for analysis and detection attacks. To protect Web resources from attacks at the application level, there are special tools - Web Application Firewall (WAF). This article presents an anomaly detection algorithm, and how it works in the open-source web application firewall ModSecurity, which uses machine learning methods with 8 suggested features to detect attacks on web applications. Tóm tắt—Hầu hết các ứng dụng được phát triển có xu hướng trở nên dễ tiếp cận nhất có thể đối với người dùng qua Internet. Các ứng dụng khác nhau thường lưu trữ dữ liệu trên không gian mạng để làm việc và giải trí hiệu quả hơn, chẳng hạn như Google Docs, email, lưu trữ đám mây, bản đồ, thời tiết, tin tức,... Các cuộc tấn công vào tài nguyên Web thường xảy ra nhất ở tầng ứng dụng, dưới dạng các yêu cầu HTTP/HTTPS đến trang web, nơi tường lửa truyền thống có khả năng hạn chế trong việc phân tích và phát hiện các cuộc tấn công. Để bảo vệ tài nguyên Web khỏi các cuộc tấn công ở tầng ứng dụng, xuất hiện các công cụ đặc biệt - Tường lửa Ứng dụng Web (WAF). Bài viết này trình bày thuật toán phát hiện bất thường và cách thức hoạt động của tường lửa ứng dụng web mã nguồn mở ModSecurity khi sử dụng phương pháp học máy với 8 đặc trưng được đề xuất để phát hiện các cuộc tấn công vào các ứng dụng web.


SISTEMASI ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 239
Author(s):  
Ratna A. I. Wulandari ◽  
Johan J. C. Tambotoh

2022 ◽  
Vol 2022 ◽  
pp. 1-10
Author(s):  
Tingting Yu

In order to meet the requirements of users in terms of speed, capacity, storage efficiency, and security, with the goal of improving data redundancy and reducing data storage space, an unbalanced big data compatible cloud storage method based on redundancy elimination technology is proposed. A new big data acquisition platform is designed based on Hadoop and NoSQL technologies. Through this platform, efficient unbalanced data acquisition is realized. The collected data are classified and processed by classifier. The classified unbalanced big data are compressed by Huffman algorithm, and the data security is improved by data encryption. Based on the data processing results, the big data redundancy processing is carried out by using the data deduplication algorithm. The cloud platform is designed to store redundant data in the cloud. The results show that the method in this paper has high data deduplication rate and data deduplication speed rate and low data storage space and effectively reduces the burden of data storage.


2022 ◽  
Vol 7 (3) ◽  
pp. 390
Author(s):  
Rizka Fauziah Ramdhani ◽  
Raka Yusuf

Perusahaan di bidang percetakan masih sangat dibutuhkan, meski dunia digital kini semakin berkembang pesat. Banyak korporasi masih membutuhkan media cetak sebagai penunjang untuk memenuhi kebutuhan perusahaan. House Printing adalah salah satu perusahaan di bidang percetakan yang masih berkembang, dengan perkembangan teknologi saat ini kebutuhan akses data tidak cukup dibebankan dengan akses lokal saja, sehingga dibutuhkannya struktur jaringan yang mampu mengakses data lebih cepat meski dengan jarak jauh sekalipun. Selain itu, koneksi jaringan yang dibutuhkanpun tidak ingin terpaku oleh salah satu provider saja. Sebagai perusahaan industri kreatif yang sedang berkembang dengan mengikuti perkembangan teknologi yang ada, House Printing memiliki tanggung jawab penuh untuk memberi layanan terbaiknya kepada para pelanggannya. Tidak hanya sekedar meliputi produk atau jasa yang ditawarkan, akan tetapi berkaitan dengan akses data dari kantor cabang ke kantor pusat atau sebaliknya. Terlebih dengan kondisi pandemic yang tak kunjung usai, yang mengharuskan karyawan bekerja dari rumah. Dengan file grafis yang memiliki ukuran kapasitas yang cukup besar, sangat menghambat kinerja perusahaan jika hanya transfer data melalui email saja. Selain itu menjadikan pelayanan perusahaan tidak efektif dan kurang memuaskan bagi pelanggan apabila terdapat gangguan jaringan dll, karena tidak dapat akses ke kantor pusat. Dengan menyesuaikan kondisi perusahaan dan kebutuhan dukungan jaringan pada perusahaan, salah satu opsi penyelesaian masalah untuk transfer data agar lebih mudah adalah dengan menggunakan metode VPN atau dengan menggunakan metode Cloud Storage. VPN atau yang disebut juga Virtual Private Network merupakan salah satu alternatif pengaman data yang bersifat privat yang memungkinkan penggunaannya untuk perusahaan berkembang dengan efisiensi biaya untuk perusahaan.


2022 ◽  
Vol 12 (1) ◽  
pp. 0-0

Nowadays, in online social networks, there is an instantaneous extension of multimedia services and there are huge offers of video contents which has hindered users to acquire their interests. To solve these problem different personalized recommendation systems had been suggested. Although, all the personalized recommendation system which have been suggested are not efficient and they have significantly retarded the video recommendation process. So to solve this difficulty, context extractor based video recommendation system on cloud has been proposed in this paper. Further to this the system has server selection technique to handle the overload program and make it balanced. This paper explains the mechanism used to minimize network overhead and recommendation process is done by considering the context details of the users, it also uses rule based process and different algorithms used to achieve the objective. The videos will be stored in the cloud and through application videos will be dumped into cloud storage by reading, coping and storing process.


Sign in / Sign up

Export Citation Format

Share Document