configurable computing
Recently Published Documents


TOTAL DOCUMENTS

105
(FIVE YEARS 20)

H-INDEX

13
(FIVE YEARS 0)

2022 ◽  
Vol 54 (8) ◽  
pp. 1-36
Author(s):  
Jinglin Zou ◽  
Debiao He ◽  
Sherali Zeadally ◽  
Neeraj Kumar ◽  
Huaqun Wang ◽  
...  

Cloud computing is a network model of on-demand access for sharing configurable computing resource pools. Compared with conventional service architectures, cloud computing introduces new security challenges in secure service management and control, privacy protection, data integrity protection in distributed databases, data backup, and synchronization. Blockchain can be leveraged to address these challenges, partly due to the underlying characteristics such as transparency, traceability, decentralization, security, immutability, and automation. We present a comprehensive survey of how blockchain is applied to provide security services in the cloud computing model and we analyze the research trends of blockchain-related techniques in current cloud computing models. During the reviewing, we also briefly investigate how cloud computing can affect blockchain, especially about the performance improvements that cloud computing can provide for the blockchain. Our contributions include the following: (i) summarizing the possible architectures and models of the integration of blockchain and cloud computing and the roles of cloud computing in blockchain; (ii) classifying and discussing recent, relevant works based on different blockchain-based security services in the cloud computing model; (iii) simply investigating what improvements cloud computing can provide for the blockchain; (iv) introducing the current development status of the industry/major cloud providers in the direction of combining cloud and blockchain; (v) analyzing the main barriers and challenges of integrated blockchain and cloud computing systems; and (vi) providing recommendations for future research and improvement on the integration of blockchain and cloud systems.


2021 ◽  
Author(s):  
Walter Nowocin ◽  

The National Institute of Standards and Technology (NIST) was directed by the federal government to define cloud computing to assist federal agencies in implementing cloud architectures. In 2011, NIST published NIST SP 800-145 “The NIST Definition of Cloud Computing” and defined cloud computing as: “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. [1]” Cloud computing is a relatively new IT concept and as such, there is much to learn about the benefits that this business model can bring to organizations. Cloud computing will transform how you do business. The objective of this paper is to explain the benefits of using a cloud architecture for calibration management software systems. The following benefits and topics will be discussed: Work From Anywhere, Always On, Reduced IT Costs, Scalability, Automatic Updates, Reduce Coordination Costs, Improved Quality Control, Disaster Recovery, Environmental Sustainability, Increased Competitiveness, Stronger Security, and Compliance Considerations [2].


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Rawan Naous ◽  
Anne Siemon ◽  
Michael Schulten ◽  
Hamzah Alahmadi ◽  
Andreas Kindsmüller ◽  
...  

AbstractThe inevitable variability within electronic devices causes strict constraints on operation, reliability and scalability of the circuit design. However, when a compromise arises among the different performance metrics, area, time and energy, variability then loosens the tight requirements and allows for further savings in an alternative design scope. To that end, unconventional computing approaches are revived in the form of approximate computing, particularly tuned for resource-constrained mobile computing. In this paper, a proof-of-concept of the approximate computing paradigm using memristors is demonstrated. Stochastic memristors are used as the main building block of probabilistic logic gates. As will be shown in this paper, the stochasticity of memristors’ switching characteristics is tightly bound to the supply voltage and hence to power consumption. By scaling of the supply voltage to appropriate levels stochasticity gets increased. In order to guide the design process of approximate circuits based on memristors a realistic device model needs to be elaborated with explicit emphasis of the probabilistic switching behavior. Theoretical formulation, probabilistic analysis, and simulation of the underlying logic circuits and operations are introduced. Moreover, the expected output behavior is verified with the experimental measurements of valence change memory cells. Hence, it is shown how the precision of the output is varied for the sake of the attainable gains at different levels of available design metrics. This approach represents the first proposition along with physical verification and mapping to real devices that combines stochastic memristors into unconventional computing approaches.


2021 ◽  
pp. 08-16
Author(s):  
Ahmed N. Al Al-Masri ◽  
◽  
◽  
Manal Nasir

Cloud Computing (CC) becomes a commonly available tool to enable quick, on-demand services from a shared pool of configurable computing resources which can be allocated and utilized. Resource provisioning is a major issue in CC environment which ensures guaranteed outcomes on the applications related to CC. This study introduces an efficient fuzzy c-means clustering (FCM) with hybrid grey wolf optimization (GWO) and differential evolution (DE) algorithm, called FCM-GWODE for resource provisioning in cloud environment. The aim of the FCM-GWODE technique is to allocate the resources in such a way that the resource utilization can be accomplished. In addition, the FCM technique with metaheuristics is applied to partition the resources and scalable searching process can be minimized. Moreover, the GWODE algorithm is derived by resolving the local optima issue of the GWO and improve the population diversity using DE. A comprehensive simulation process takes place using CloudSim tool and the results are inspected interms of several evaluation metrics. The simulation results highlighted the supremacy of the FCM-GWODE technique over the other methods.


2020 ◽  
Vol 9 (2) ◽  
pp. 1230-1236

The cloud was defined by lots of experts, yet the NIST (National Institute of Standards and Technology) has presented the definition: “a model for enabling comfortable, ondemand network access to a shared pool of configurable computing resources The aim of this paper is a model for safe data sharing on cloud computing with intension to provide data confidentiality and access control over shared data, it also removes the burden of key management and files by users. The system also supports dynamic changes of membership and enables clients to reach the data they require even when the owner does not exist in the system. In the proposed system, a new security system is introduced, it provides a mechanism through which communication is safely achieved as well as it protects users and their hidden information from unauthorized users. The Entities in Proposed System consist of three parts: CSP, Users (owner ,clients ) and TPA , in this paper the focus will be on the CSP and the users. The proposed system are provides data confidentiality, access control of share data, removes the burden of key management and file encryption/decryption byusers, support dynamically of users membership. The use of a digital signature ensures the integrity and confidentiality of sharing data sent by users so that it cannot be read by the recipient TPA as it encrypts, sends a new encrypted signature and sends it to the CSP so that it cannot read its content CSP proved to be effective in the security of cloud computing.


2020 ◽  
Vol 17 (9) ◽  
pp. 4715-4717
Author(s):  
A. A. Prokin

Cloud computing is a model for providing convenient network access on demand to some common fund of configurable computing resources. These calculations are flexible, scalable, and inexpensive, but have large-scale sharing of services among multiple users. The broad coverage of the idea of cloud computing has led to significant changes, both in public access systems and in mobile communications, which prompted advanced researchers to provide suitable system protocols and network architecture. In cloud computing, there are two main problems: access control and security. Therefore, the security of both services and users is a significant problem that stands in the way of using and trust in cloud computing.


2020 ◽  
Vol 70 (2) ◽  
pp. 239-244
Author(s):  
D.N. Issabayeva ◽  
◽  
Sh.T. Shekerbekova ◽  

The article describes the advantages of the use of cloud technologies in training and theoretical researches of the scientific literature. "Cloud technology" appeared in a result of evolution of information technology over the last decade. The term "cloud technology" frequently found in scientific and technical literature. This term denotes a model of network access on-demand to a common set of configurable computing resources (network, servers, storage, applications, services) that can be quickly prepared for work; wherein the part of the user requires minimal interaction with the service provider, just having a computer device having access to the Internet. The idea of using "cloud technology" in the course of training, transfer of educational-methodical documentation, theoretical and practical exercises in the Internet is literally "in the air". Cloud computing has a great future, so all who are close to IT should master this technology


2020 ◽  
Vol 9 (1) ◽  
pp. 13-17
Author(s):  
B. Rasina Begum ◽  
P. Chithra

Cloud computing provides a scalable platform for growing amount of data and processes that work on various applications and services by means of on-demand service providing. The storage services offered by clouds have become a new profit growth by providing a comparably cheapest, scalable, location-independent platform for managing users’ data. Client uses the cloud storage and enjoys the high-quality applications and services from a shared pool of configurable computing resources using cloud services. It reduces the trouble of local data storage and maintenance. But it gives severe security threats toward users’ outsourced data. Maintaining the log record securely over extended period is very crucial to the proper functioning of any organization. Log holds the record of system events specially user activities. It is the main target for malicious attackers. An attacker, breaking into a system would not try to leave traces of his or her activities behind. This proposed work mainly concentrates on the problem of log security in cloud computing system and using fully homomorphism encryption algorithm in the cloud computing log data.


Sign in / Sign up

Export Citation Format

Share Document