A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2

Abstract

Job scheduling system problem is a core and challenging issue in Cloud Computing. How to use Cloud computing resources efficiently and gain the maximum profits with job scheduling. Job scheduling system is one of the Cloud computing service providers’ ultimate goals. In this paper, firstly, by analysis the differentiated QoS requirements of Cloud computing resources users’ jobs, we build the corresponding non-pre-emptive priority M/G/1 queuing model for the jobs.Then, considering Cloud computing service providers’ destination which is to gain the maximum profits by offering Cloud computing resources, we built the system cost function for this queuing model. After that, based on the queuing model and system cost function, considering the goals of both the Cloud Computing service users and providers, we gave the corresponding strategy and algorithm to get the approximate optimistic value of service for each job in the corresponding no-pre-emptive priority M/G/1 queuing model. Finally, we also provide corresponding simulations and numeral results.Analysis and number results show that our approach for job scheduling system can not only guarantee the QoS requirements of the users’ jobs, but also can make the maximum profits for the Cloud computing service providers.While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional”computing of the past several years. Looking back further to the time-sharing era, many of these problems already received attention. On the other hand, we argue that two facets are to some degree new and fundamental to cloud computing: the complexities of multi-party trust considerations, and the ensuing need for mutual audit ability.

Authors and Affiliations

Bohar Singh, Mandeep Kaur, Chetan Batra

Keywords

Related Articles

PERFORMANCE ANALYSIS OF EFFECT RATE OF CROSS LAYER BASED INTRUSION DETECTION FOR WIRELESS LAN

Wireless ad-hoc networks are vulnerable to various kinds of security threats and attacks due to relative ease of access to wireless medium and lack of a centralized infrastructure. Security is an alarming concern, as eve...

A REVIEW ON ENGERY EFFICIENT STRATEGY FOR TASK ALLOCATION IN CLOUD ENVIRONMENT

Although cloud computing is now becoming more advanced and matured as many companies have released their own computing platforms to provide services to public, but the research on cloud computing is still in its infancy....

COMPARATIVE STUDY AND ANALYSIS OF BER OF CDMA FOR DIFFERENT MODULATION SCHEME

With the increasing demand in wireless communication, it has become necessary to give better and efficient service to users by using better technique. This paper propose and analyse the bit error rate of CDMA, for differ...

Introduction to Cloud Computing

The Cloud computing is a fastest growing area in IT industry, computing and research industry. Cloud is a pool of virtualized computer resources .A cloud can support self-redundant, self-recovering and scalable programmi...

Cloud Computing Issues

Abstract- Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. It aims to construct a perfect syste...

Download PDF file
  • EP ID EP649935
  • DOI 10.24297/ijct.v4i2b1.3221
  • Views 137
  • Downloads 0

How To Cite

Bohar Singh, Mandeep Kaur, Chetan Batra (2013). A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(2), 340-344. https://europub.co.uk/articles/-A-649935