An OptiAssign-PSO Based Optimisation for Multi-Objective Multi-Level Multi-Task Scheduling in Cloud Computing Environment
Advanced Analytics for Disease Tracking & Remote Intravenous Injection Monitoring
DevKraft - Fueling Collaboration in Coding Challenges
Comparative Security and Compliance Analysis of Serverless Computing Platforms: AWS Lambda, Azure Functions, and Google Cloud Functions
Blockchain Healthcare Management using Patients
A Comprehensive Review of Security Issues in Cloud Computing
An Extended Min-Min Scheduling Algorithm in Cloud Computing
Data Quality Evaluation Framework for Big Data
An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier
Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology
GridSim Installation and Implementation Process
A Survey on Energy Aware Job Scheduling Algorithms in Cloud Environment
Genetic Algorithm Using MapReduce - A Critical Review
Clustering based Cost Optimized Resource Scheduling Technique in Cloud Computing
Encroachment of Cloud Education for the Present Educational Institutions
Big data is vast amount of data characterized by volume, velocity and variety. Mining such data can provide comprehensive business intelligence. However, conventional environments are not sufficient to handle and mine such data. Distributed programming frameworks like Hadoop are used to process big data. Such frameworks use a new programming paradigm known as Map Reduce. The challenging issue in big data mining is security implications. This paper explores the merits and demerits of the distributed data mining frameworks such as Hadoop, Haloop, Sailfish and AROM and describes the techniques on how the distributed frameworks for managing and mining big data can help enterprises to make expert decisions. Moreover there is a need for secure computations in distributed programming frameworks. This paper provides useful insights on big data, big data mining and the need for secure computations for processing big data.
Mobile cloud learning is a blend of portable learning and distributed computing, which is generally a new idea that holds significant guarantee for future improvement and conveyance in the instruction areas. Distributed computing helps versatile learning overcome hindrances identified with portable registering. Versatile learning (m-learning) has been acknowledged as a productive method for learning. With the expanding number of clients, administrations, training substance and assets, notwithstanding, how to send m-learning gets to be hazardous. As a promising innovation to beat the issues in m-learning, Cloud processing gives solid, redid and QoS ensured element registering situations for end-clients. The main aim of this paper is to provide different systems that provide mobile learning in cloud computing. In this study, characteristics and benefits of mobile learning are discussed.
Every technology has a value in it. To speak technically apart from theoretical and research, every technology must be implemented in real time to the human kind and solve all their issues. For every industry, profit is the major goal or a part of the whole business strategy itself. Thus every technology must be industry oriented and supported rather than a research topic every time.[1] Industrial oriented term of cloud computing is called as enterprise cloud computing. The word enterprise cloud computing refers to the business related operations and the usage of cloud computing technology for all their work. The close alignment of business related corporate IT sector and cloud computing has given a new dimension to the term enterprise cloud computing. Today cloud computing has changed the whole work culture in the corporate sector. Things have advanced very fast and have become more reliable. Gone are all the traditional and simple ways in handling all problems and solutions to them. Business related operations and solutions are well handled and managed using advanced remote cloud infrastructure and its unique capabilities. The objective of this paper is to give the overview of research issues in cloud computing
Nowadays privacy preserving is the challenging issue of public clouds. The data of fine-grained access control are enforced on confidential data hosted into the public clouds of storage. Single layer encryption (SLE) approach is to encrypt the data into public clouds by using encryption algorithm, and two layer encryption (TLE) approach is to encrypt the data before uploading into the clouds on storage. These two approaches are facing the problem of computational cost and communications process of data owner and public clouds. So, these problems are reduced by using new approach of multi layer encryption approach. In this approach, multiple keys are provided for end users and accessing the data from public clouds. So, the authors are using an algorithm known as Attribute Based-Group Key Management (AB-GKM).
In today's fast growing world, everyone needs a secure storage for their important information like personal videos. So the service provider needs an excellent cloud video server with high security. But hackers easily hack any kind of security mechanism. In this paper , the novel tolerant security mechanism is proposed. A server stores all new information in its storage. The Cloud Video Server is acting as a controller of all the slaves. This system has two protocols named Promise Protocol and Review Protocol for monitoring slaves activity. This scheme uses two standard algorithms namely SHA3 (Secure Hash Algorithm -3 ) and Advanced Encryption Standard (AES) for security test. The performance is verified with the help of the metrics like security level, time complexity ,and Quality of Storage. The performance of this system is superior than the other schemes.