A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2

Abstract

Job scheduling system problem is a core and challenging issue in Cloud Computing. How to use Cloud computing resources efficiently and gain the maximum profits with job scheduling. Job scheduling system is one of the Cloud computing service providers’ ultimate goals. In this paper, firstly, by analysis the differentiated QoS requirements of Cloud computing resources users’ jobs, we build the corresponding non-pre-emptive priority M/G/1 queuing model for the jobs.Then, considering Cloud computing service providers’ destination which is to gain the maximum profits by offering Cloud computing resources, we built the system cost function for this queuing model. After that, based on the queuing model and system cost function, considering the goals of both the Cloud Computing service users and providers, we gave the corresponding strategy and algorithm to get the approximate optimistic value of service for each job in the corresponding no-pre-emptive priority M/G/1 queuing model. Finally, we also provide corresponding simulations and numeral results.Analysis and number results show that our approach for job scheduling system can not only guarantee the QoS requirements of the users’ jobs, but also can make the maximum profits for the Cloud computing service providers.While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional”computing of the past several years. Looking back further to the time-sharing era, many of these problems already received attention. On the other hand, we argue that two facets are to some degree new and fundamental to cloud computing: the complexities of multi-party trust considerations, and the ensuing need for mutual audit ability.

Authors and Affiliations

Bohar Singh, Mandeep Kaur, Chetan Batra

Keywords

Related Articles

ANALYSIS AND COMPARISION OF SRG AND DFIG FOR WIND GENERATION APPLICATION

Renewable energy is very important topic to be study to find new sources of energy to produce electricity. The main advantages of the renewable energy are available, clean, low cost, and continuous energy.The main object...

RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing

Cloud computing presents IT organizations with a funda­mentally different model of operation, one that takes advantage of the maturity of web applications and networks and the rising interoperability of computing system...

IMPROVED NEGATIVE SELECTION BASED DECISION BASED MEDIAN FILTER FOR NOISE REMOVAL

For de-noising an image, various filtering techniques are used but they have contradiction between noise removal and Edge preservation in an image. This de-noising contradiction has no efficient solution and they have to...

Implementation and Analysis of a Refactoring Tool for Detecting Code Smells

Software development is a field which is in action for decades. Preparing code for Software is not a difficult task, but preparing an efficient code is complicated one. To change the code is to make internal structure of...

Finite State Testing and Syntax Testing

This paper is concerned with the testing of the software which is being developed in a structured way. The advantages which accrue from a well-structured or modular organization of software depend upon an ability to inde...

Download PDF file
  • EP ID EP649935
  • DOI 10.24297/ijct.v4i2b1.3221
  • Views 127
  • Downloads 0

How To Cite

Bohar Singh, Mandeep Kaur, Chetan Batra (2013). A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(2), 340-344. https://europub.co.uk/articles/-A-649935