A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2
Abstract
Job scheduling system problem is a core and challenging issue in Cloud Computing. How to use Cloud computing resources efficiently and gain the maximum profits with job scheduling. Job scheduling system is one of the Cloud computing service providers’ ultimate goals. In this paper, firstly, by analysis the differentiated QoS requirements of Cloud computing resources users’ jobs, we build the corresponding non-pre-emptive priority M/G/1 queuing model for the jobs.Then, considering Cloud computing service providers’ destination which is to gain the maximum profits by offering Cloud computing resources, we built the system cost function for this queuing model. After that, based on the queuing model and system cost function, considering the goals of both the Cloud Computing service users and providers, we gave the corresponding strategy and algorithm to get the approximate optimistic value of service for each job in the corresponding no-pre-emptive priority M/G/1 queuing model. Finally, we also provide corresponding simulations and numeral results.Analysis and number results show that our approach for job scheduling system can not only guarantee the QoS requirements of the users’ jobs, but also can make the maximum profits for the Cloud computing service providers.While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hatsâ€. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new†is so only relative to “traditionalâ€computing of the past several years. Looking back further to the time-sharing era, many of these problems already received attention. On the other hand, we argue that two facets are to some degree new and fundamental to cloud computing: the complexities of multi-party trust considerations, and the ensuing need for mutual audit ability.
Authors and Affiliations
Bohar Singh, Mandeep Kaur, Chetan Batra
The Automated VSMs to Categorize Arabic Text Data Sets
Text Categorization is one of the most important tasks in information retrieval and data mining. This paper aims at investigating different variations of vector space models (VSMs) using KNN algorithm. we used 242 Arabic...
Modern technology applications and rainfall flooding disasters prevention.
The paper presents a case study that investigated the role of modern technology applications in rainfall flooding disasters prevention. The results reported demonstrated that modern technology facilities can be used to d...
Numerical solution of system of two Nonlinear Volterra Integral equations
In this paper, using the implicit trapezoidal rule in conjunction with Newton's method to solve nonlinear system.We have used a Maple 17 program to solve the System of two nonlinear Volterra integral equations. Finally,...
Improving Friends Matching in Social Networks Using Graph Coloring
Recently, most of people have their own profiles in different social networks. Usually, their profiles have some brief description about their personnel picture, family members, home town, career, date of birth etc. whic...
Hybrid ANFIS Controller for 6-DOF Manipulator with 3D Model
This paper proposes a hybrid ANFIS (Adaptive Neuro-Fuzzy Inference System) controller with DMRAC (Direct Model Reference Adaptive Control) and mathematical modeling of the kinematic and dynamic solutions. The controller...