Showing 41 - 60 results of 153 for search '"cloud services"', query time: 0.08s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46

    Neural network inspired efficient scalable task scheduling for cloud infrastructure by Punit Gupta, Arnaav Anand, Pratyush Agarwal, Gavin McArdle

    Published 2024-01-01
    “…For further improvement in cloud services, cloud resource optimization is a vital cog that defines the performance of cloud. …”
    Get full text
    Article
  7. 47

    TBAS: Token-based authorization service architecture in Internet of things scenarios by Shih-Hsiung Lee, Ko-Wei Huang, Chu-Sing Yang

    Published 2017-07-01
    “…How to make Internet of things become a smart terminal is an important topic. By connecting cloud services, the devices can receive more accurate information so as to be applied in people’s daily life. …”
    Get full text
    Article
  8. 48

    Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing by Hui LIN, Mengyang YU, Youliang TIAN, Yijie HUANG

    Published 2018-05-01
    “…The booming development of the mobile internet and cloud computing leads to the emerging of many mobile cloud platforms based services.However,since mobile users store lots of data and privacy information in the cloud when they are using the mobile cloud services,they are facing multiple increasingly serious security threats such as data leaks and privacy exposures.The data security and privacy protection was investigated in mobile cloud computing,aiming at the internal bad mouthing attacks and mobile attacks.A dynamic game and reliable recommendation based transferring reputation mechanism was proposed.First,a dynamic game based recommendation incentive mechanism was proposed.Secondly,a reliable recommendation reputation evaluation model was established based on the incentive mechanism.Last,a novel transferring reputation mechanism was proposed that combined the above mentioned incentive mechanism and reputation evaluation model.Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively,enhance the credibility of mobile terminals and improve the data security and privacy protection of mobile cloud services.…”
    Get full text
    Article
  9. 49

    Exploring the feasibility of a data center-free cloud computing framework utilizing underutilized personal computers by Ibrahim Mekawy, Alhanouf Alburaikan, Iman Atighi

    Published 2023-09-01
    “…These dormant resources can be harnessed to form an alternative cloud infrastructure, offering a wide array of cloud services, particularly focusing on infrastructure as a service. …”
    Get full text
    Article
  10. 50

    A decision framework for cloud migration: A hybrid approach by Mirsaeid Hosseini Shirvani, Gholam R. Amin, Sara Babaeikiadehi

    Published 2022-12-01
    “…There are several inhibitors and motivations related factors to determine whether one can embrace the cloud services or not. Therefore, this paper presents a holistic and flexible cloud decision framework by taking a wide spectrum weighted factors related to the acceptance or denial of the cloud services. …”
    Get full text
    Article
  11. 51

    MOBILE LEARNING IN CONDITIONS OF INFORMATION INEQUALITY by Danila N. Monakhov

    Published 2016-12-01
    “…The article considers the modern tools of using mobile means of communication and cloud services.…”
    Get full text
    Article
  12. 52

    A Method for Trust Quantification in Cloud Computing Environments by Xiaohui Li, Jingsha He, Bin Zhao, Jing Fang, Yixuan Zhang, Hongxing Liang

    Published 2016-02-01
    “…In this paper, we propose a method for trust quantification based on fuzzy comprehensive evaluation theory for cloud computing to protect user data through trust quantification of cloud services after we introduce trust ontology for cloud services and define user preference trust values. …”
    Get full text
    Article
  13. 53

    Cloud Security Certification Technology Based on Fingerprint Recognition by Yafei Tang, Yunyong Zhang, Ni Zhang

    Published 2015-08-01
    “…As the guarantee of cloud security,user identity authentication is crucial to cloud computing.In this work,the requirements of security authentication in the current cloud service systems were analyzed.Considering the principle and the advantages of fingerprint recognition,a novel system based on fingerprint recognition was proposed for cloud security authentication.The architecture and workflow of the proposed system were investigated in depth to prevent the unauthorized access,achieving the secure access of user data for cloud services.…”
    Get full text
    Article
  14. 54

    Research on Security of Virtualization on Cloud Computing by Xiaodi Wang, Yunyong Zhang, Di Liu, Ni Zhang, Yiming Yu

    Published 2015-06-01
    “…One of the problems,virtualization security,draws most attention of cloud services providers and security manufacturers. The main security threats of cloud computing virtualization environment were combed and cloud computing virtualization security technology architecture which contains virtualization security technology framework based on KVM and virtualization centralized management and control platform was proposed. …”
    Get full text
    Article
  15. 55

    New cross-layer reputation mechanism for mobile cloud computing by Mengyang YU, Hui LIN, Youliang TIAN

    Published 2018-03-01
    “…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
    Get full text
    Article
  16. 56

    Research on data encryption system and technology for cloud storage by Peiyi HAN, Chuanyi LIU, Jiahui WANG, Shaoming DUAN, Hezhong PAN, Binxing FANG

    Published 2020-08-01
    “…To order to address the problem of cloud storage data security,the generic proxy-based data protection system was proposed,which could automatically and transparently secure sensitive data in browser-based cloud storage applications.A novel dynamic program analysis technique was adopted based on JavaScript API function hooking for automatically extending to various cloud applications.And a novel proxy executed searchable encryption solution was presented so that it could achieve data encryption while maintaining the original functions of cloud applications.Experimental results show that the system can support a variety of typical cloud services,effectively protect sensitive data,and bring a relatively low overhead.…”
    Get full text
    Article
  17. 57

    Research on intelligent control technology for OSU-based OTN by Yanxia TAN, Zhiyan DUAN, Xiangkun MAN, He ZHANG, Yacheng LIU, Yantao ZHOU, Shan DONG

    Published 2023-10-01
    “…With the development of information and cloud technology, the dynamic demand for OTN service is gradually increasing.As a next generation OTN switching technology, OSU needs to provide network and cloud services for high-quality enterprise leased lines and boutique home broadband services.The OSU-based OTN needs to be able to provide integrated services and automated service provisioning through end-to-end management and control capabilities to support one-hop service into the cloud.Firstly, the background, technical characteristics, and standardization progress of OSU technology were introduced.Then, a service-aware control framework for OSU-OTN was proposed to meet the demand for efficient bearer of government and enterprise leased lines.Finally, an experimental validation of the end-to-end management and control capability of the access OSU-OTN controller system was carried out.…”
    Get full text
    Article
  18. 58

    Privacy in the Internet: Myth or reality by Mikarić Bratislav, Marković Marija, Trajković Dušan

    Published 2016-01-01
    “…The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? …”
    Get full text
    Article
  19. 59

    Scheme of virtual machine trusted migration in cloud environment by Jianbiao ZHANG, Yuanxi ZHU, Jun HU, Xiao WANG

    Published 2018-01-01
    “…With the rapid development of cloud computing,as an advantage of cloud services,virtual machine migration technology has been widely noticed and applied.However,there are some problems about VMs migration which should be solved,such as the complication of authentication of platform and the security issues of data transmission,etc.For these problems,firstly,the existing virtual machine migration scheme based on trusted computing technology was analyzed.Secondly,three secure needs that the virtual machine migration scheme which based on trusted computing technology should meet were proposed:the authenticated platform,confidentiality and integrity preserving transfer and atomicity of the vTPCM.Thirdly,a trusted migration scheme of virtual machines for cloud environment was proposed,in which the virtual machine central migration engine and trusted migration agent were introduced to solve the atomicity protection of vTPCM during the migration process.Finally,the concrete scheme was given with verification.…”
    Get full text
    Article
  20. 60

    Big Data with Cloud Computing: Discussions and Challenges by Amanpreet Kaur Sandhu

    Published 2022-03-01
    “…In this work, the definition, classification, and characteristics of big data are discussed, along with various cloud services, such as Microsoft Azure, Google Cloud, Amazon Web Services, International Business Machine cloud, Hortonworks, and MapR. …”
    Get full text
    Article