An OptiAssign-PSO Based Optimisation for Multi-Objective Multi-Level Multi-Task Scheduling in Cloud Computing Environment
Advanced Analytics for Disease Tracking & Remote Intravenous Injection Monitoring
DevKraft - Fueling Collaboration in Coding Challenges
Comparative Security and Compliance Analysis of Serverless Computing Platforms: AWS Lambda, Azure Functions, and Google Cloud Functions
Blockchain Healthcare Management using Patients
A Comprehensive Review of Security Issues in Cloud Computing
An Extended Min-Min Scheduling Algorithm in Cloud Computing
Data Quality Evaluation Framework for Big Data
An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier
Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology
GridSim Installation and Implementation Process
A Survey on Energy Aware Job Scheduling Algorithms in Cloud Environment
Genetic Algorithm Using MapReduce - A Critical Review
Clustering based Cost Optimized Resource Scheduling Technique in Cloud Computing
Encroachment of Cloud Education for the Present Educational Institutions
Cloud computing is among the most widely used technologies due to its ability to reduce costs, reliability and fast access with increasing flexibility and scalability for computer processes. In recent years, cloud computing has grown rapidly in the IT industry, and IT organizations have expressed concerns regarding security issues with cloud computing. Cloud Computing has some level of risks because essential services are frequently outsourced to a third party, and as third party handles the data stored in the cloud it is harder to maintain data security and confidentiality. This paper provides an overview of security issues or menaces in the cloud and proposes some measures to address them.
Containerization is a crucial technology for automating the management of containers, which can save time and effort. This overview provides valuable insights into cloud container technology, specifically focusing on Swarm Container Orchestration and Automation. The research emphasizes the importance of automation in reducing manual tasks and achieving cost-efficiency. It also highlights the significance of horizontal and vertical scaling for Web Distributed Authoring and Versioning (WebDAV), with considerations of performance, reliability, and cost. Resiliency and redundancy are explored as crucial components for fault tolerance in the WebDAV system. Specific technologies for different aspects of WebDAV's infrastructure, such as compute, user management, storage, networking, databases, resource management, and budgeting, are explored in this paper. These technologies are recommended because they offer the flexibility, scalability, and cost-effectiveness that align with WebDAV's requirements.
Technologies such as cloud, fog, and edge computing offer exceptional solutions for many technical problems in the Internet of Things (IoT). Cloud computing offers enormous flexibility in terms of resource availability and demand. In this paper, the role of cloud, edge, and fog computing in IoT was discussed along with the emergence of numerous IoT smart scenarios which are difficult to implement. This research is important in guiding future network paradigms that require faster processing with less delay and disruption, and the advanced technologies in them can address the challenges of IoT. It also reviews cloud, fog, and edge computing and their relevance to the IoT.
This paper explores the fundamental elements of cloud computing architecture, discussing the integration of cloud computing with Big Data, the use of homomorphic encryption, and remote sensing data in cloud architecture. It also examines advanced cloud architectures, such as Hypervisor Clustering architecture, Load Balanced Virtual Server Instances architecture, Zero Downtime architecture, and Resource Reservation architecture, emphasizing their role in enhancing availability and scalability. The paper concludes by showcasing the significance of cloud computing architecture in addressing modern computational and data management challenges.
Cloud computing revolutionizes the way businesses are stored and managed, and ensures robust security measures. This paper explores the use of Rivest-Shamir-Adleman (RSA) and the Magic Rectangle Generating Algorithm (MRGA) to enhance security in cloud environments. This highlights the growing significance of cloud computing and the need for effective security measures. It then introduces RSA and MRGA as cryptographic algorithms with their unique strengths and applications. It further delves into the benefits of using RSA and MRGA for data protection, key management, authentication, and identity management in cloud environments. The potential of these algorithms to address security challenges in the cloud and improve the overall data security is discussed. Additionally, the abstract acknowledges the limitations and considerations associated with the implementation of the RSA and MRGA. This emphasizes the importance of this research in enhancing cloud security and provides insights into the potential of RSA and MRGA as security measures in the cloud.