Showing 401 - 420 results of 691 for search '"cloud computing"', query time: 0.07s Refine Results
  1. 401

    Personalized client-edge-cloud hierarchical federated learning in mobile edge computing by Chunmei Ma, Xiangqian Li, Baogui Huang, Guangshun Li, Fengyin Li

    Published 2024-12-01
    “…Journal of Cloud Computing: Advances, Systems and Applications…”
    Get full text
    Article
  2. 402
  3. 403
  4. 404

    基于层次分析—模糊评价的云计算安全评估与对策 by Ai-min YANG, Fang GAO, Min-hua BIAN, Shu-lei YANG

    Published 2016-10-01
    “…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
    Get full text
    Article
  5. 405

    An efficient load balancing algorithm for virtual machine allocation based on ant colony optimization by Peng Xu, Guimin He, Zhenhao Li, Zhongbao Zhang

    Published 2018-12-01
    “…With the rapid development of information technologies and the popularization of Internet applications, more and more companies and developers pay great attention to the cloud computing. As one of the most significant problems in cloud computing, virtual machine allocation has attracted significant attention. …”
    Get full text
    Article
  6. 406

    Construction of Basic Network in Data Center Based on SDN Technology by Qiang Wu, Xin Xu, Guoyan Liu

    Published 2013-01-01
    “…By appling SDN technology in data center, the resource was aggregated to become an ability pool through abstracting the hardware resource by using the intelligent software, which makes network more like software and more agility, and provides automatic, safe, flexible and effective scheduling resources ability to meet the cloud computing data center. The solution makes up for the cloud computing in the short plate of network virtualization, makes calculation, storage and network more integrated, and realizes fully automated deployment of resource, real-time resource scheduling and rapid network troubleshooting, and has the potential to increase new business at any time, speeds up the network innovation rhythm, and provides a new option for cloud computing center operators to reduce the maintenance cost and improve user experience.…”
    Get full text
    Article
  7. 407

    Towards Dynamic Remote Data Auditing in Computational Clouds by Mehdi Sookhak, Adnan Akhunzada, Abdullah Gani, Muhammad Khurram Khan, Nor Badrul Anuar

    Published 2014-01-01
    “…Cloud computing is a significant shift of computational paradigm where computing as a utility and storing data remotely have a great potential. …”
    Get full text
    Article
  8. 408

    Attribute based sanitizable signature scheme by Xi-meng LIU, Jian-feng MA, Jin-bo XIONG, Jun MA, Qi LI

    Published 2013-08-01
    “…Sensitive information in the document needs to be hidden in cloud computing environment, and attribute based sanitizable signature (ABSS) scheme was proposed to solve this problem. …”
    Get full text
    Article
  9. 409

    Security risk analysis and evaluation techniques in power information system cloud by Liang SHEN, Dong WANG, Jiaxing XUAN

    Published 2018-02-01
    “…Combining the power industry with cloud computing technology,a systematic study on safety analysis and evaluation methods of the power cloud was carried out.A comprehensive combing on functional entities and business processes of the power information system under the cloud environment was conducted.Through the combination of static STRIDE threat modeling and dynamic attack chain algorithm,the main risks of cloud platform were classified and quantified.A security protection architecture of power cloud system was put forward to promote the popularization and application of cloud computing in the power industry,and to provide a strong support for the safety and control of power information system.…”
    Get full text
    Article
  10. 410

    NFV security requirements and strategies by Zhibin GUO, Yangfan CHEN, Lu LIU

    Published 2016-03-01
    “…Rapid development of cloud computing technology not only brings the convenience of high-speed computing,but also buries a lot of unsafe factors.European Telecommunications Standards Institute(ETSI)pointed out that the problem of virtualization security would become a major problem for telecom operators and enterprises in the next year.The NFV architecture security technology was researched,the importance of the safety was pointed out,the facilities of availability management and startup related safety problems were analyzed,and the NFV software security risks was summarized too.Through continuous improvement of NFV security technology makes cloud computing environment can be more secure and orderly development.…”
    Get full text
    Article
  11. 411

    PPPoE internet access for government-enterprise customer in LSN environment by Yongming YAN, Kechuang YE, Bin XU, Haifeng XU, Liang ZUO, Kaiyuan HONG

    Published 2017-09-01
    “…With the blowout development of cloud-computing market,start-up enterprises gradually increase the demand for cloud business.For the cost-sensitive customers,using the traditional government-enterprise PPPoE in the LSN environment could reduce the wastage of public IPv4 addresses.Meanwhile,ICT services based on cloud-computing was provided for customers.Several solutions which mixed the traditional government-enterprise gateway solution and the latest LSN scene were presented.Through the analysis of advantages and disadvantages of each scheme,reference for government-enterprise customers dialing-up to access internet in LSN environment was presented.…”
    Get full text
    Article
  12. 412

    A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment by Sanchika Gupta, Padam Kumar, Ajith Abraham

    Published 2013-03-01
    “…Cloud computing provides network based access to computing and data storage services on a pay per usage model. …”
    Get full text
    Article
  13. 413

    Research on ciphertext search and sharing technology in edge computing mode by Jifeng WANG, Guofeng WANG

    Published 2022-04-01
    “…Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture.Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index.…”
    Get full text
    Article
  14. 414

    Research progress on cloud data assured deletion based on cryptography by Jin-bo XIONG, Feng-hua LI, Yan-chao WANG, Jian-feng MA, Zhi-qiang YAO

    Published 2016-08-01
    “…The major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in cloud computing,and point out three levels of meaning of the cloud data assured deletion.Secondly,the state-of-the-art works on cloud data assured deletion was systematically surveyed from security-oriented view in terms of trusted execution environments,key managements and access control policies.It is also pointed out their highlights,limitations and general problems.Finally,some developing trends of this emerging research field were introduced.…”
    Get full text
    Article
  15. 415

    Overview of research on trusted attestation technology of cloud virtualization platform by Bibo TU, Jie CHENG, Haojun XIA, Kun ZHANG, Ruina SUN

    Published 2021-12-01
    “…With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important feature in trusted computing.The use of trusted attestation technology verifies whether the cloud virtualization platform is trustworthy, thereby providing a foundation for ensuring the security of the cloud platform.Now based on the definition of trusted attestation, the research progress of key technologies such as the root of trust virtualization, platform identity authentication, platform status certification, and trusted attestation framework for virtual machines were systematically sorted out, typical schemes were analyzed and compared.Furthermore, the limitations of existing work were discussed.Finally, the future research trend of this area were pointed out.…”
    Get full text
    Article
  16. 416

    Cloud Service Selection Using Multicriteria Decision Analysis by Md Whaiduzzaman, Abdullah Gani, Nor Badrul Anuar, Muhammad Shiraz, Mohammad Nazmul Haque, Israat Tanzeena Haque

    Published 2014-01-01
    “…Cloud computing (CC) has recently been receiving tremendous attention from the IT industry and academic researchers. …”
    Get full text
    Article
  17. 417

    Inter-Satellite Cooperative Computing Scheme Driven by Business Graph in LEO Satellite Network by Xiaobo GUO, Zhiyuan REN, Wenchi CHENG, Zhe JI

    Published 2021-06-01
    “…Low earth orbit-satellite network (LEO-SN) has the advantages of wide coverage and short satellite-to-earth link, and has become a current hot research fi eld.A business graph-driven inter-satellite collaborative computing method in LEO-SN was proposed to solve the problem of high transmission delay when the task was offl oaded to the cloud computing center.This method shielded the dynamics of LEO-SN by relying on the weighted time expansion graph model, combined multiple satellite computing resources, and dispatches tasks in the form of a directed acyclic graph to the satellites in the transmission path, thereby realizing the "computing while transmitting” of user services in the satellite cluster.The simulation results showed that when the data volume was 5 MB, the latency performance of on-orbit collaborative computing was improved by 58.9% compared to ground cloud computing.…”
    Get full text
    Article
  18. 418

    Framework for a Cloud-Based Multimedia Surveillance System by M. Anwar Hossain

    Published 2014-05-01
    “…Furthermore, the integration of sensor technology and cloud computing offers new possibilities for efficient development and deployment of sensor-based systems. …”
    Get full text
    Article
  19. 419

    Trusted auditing method of virtual machine based on improved expectation decision method by Junfeng TIAN, Yongchao ZHANG

    Published 2018-06-01
    “…Whether the cloud computing environment is credible is the key factor in the promotion and effective use of cloud computing.For this reason,the expected value decision method in risk decision-making was improved.The usage scenarios was redefined,the cost and benefit of audit scheme was digitized,and a virtual machine trusted auditing strategy based on improved expectation decision method was proposed.Several levels of security protection for the user virtual machine was provided,and the optimal audit scheme was selected autonomously according to the security protection level chosen by the user for the virtual machine.The virtual machine introspection (VMI) technology was used to obtain the virtual machine information that needs to be audited.The designed encryption mechanism was used to protect the security of users selected security protection level,so as to ensure the security of user virtual machine selection audit strategy.Finally,the simulation results show that the scheme has good performance and validity.…”
    Get full text
    Article
  20. 420

    Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services by Selvakumar Shanmugam, Rajesh Natarajan, Gururaj H. L., Francesco Flammini, Badria Sulaiman Alfurhood, Anitha Premkumar

    Published 2024-01-01
    “…Cloud computing (CC) is a network-based concept where users access data at a specific time and place. …”
    Get full text
    Article