A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2

Abstract

Job scheduling system problem is a core and challenging issue in Cloud Computing. How to use Cloud computing resources efficiently and gain the maximum profits with job scheduling. Job scheduling system is one of the Cloud computing service providers’ ultimate goals. In this paper, firstly, by analysis the differentiated QoS requirements of Cloud computing resources users’ jobs, we build the corresponding non-pre-emptive priority M/G/1 queuing model for the jobs.Then, considering Cloud computing service providers’ destination which is to gain the maximum profits by offering Cloud computing resources, we built the system cost function for this queuing model. After that, based on the queuing model and system cost function, considering the goals of both the Cloud Computing service users and providers, we gave the corresponding strategy and algorithm to get the approximate optimistic value of service for each job in the corresponding no-pre-emptive priority M/G/1 queuing model. Finally, we also provide corresponding simulations and numeral results.Analysis and number results show that our approach for job scheduling system can not only guarantee the QoS requirements of the users’ jobs, but also can make the maximum profits for the Cloud computing service providers.While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional”computing of the past several years. Looking back further to the time-sharing era, many of these problems already received attention. On the other hand, we argue that two facets are to some degree new and fundamental to cloud computing: the complexities of multi-party trust considerations, and the ensuing need for mutual audit ability.

Authors and Affiliations

Bohar Singh, Mandeep Kaur, Chetan Batra

Keywords

Related Articles

Measuring Radar Signatures of a Simple Pendulum using Cantenna Radar

This paper gives a detailed analysis of the physics of simple pendulum and the equations governing the motion and velocity. The pendulum works in three modes: simple, damped and driving and driving only. The signatures a...

Discovering Mexican Birth Rate Patterns Using Machine Learning Techniques

In this research, we attempt to discover patterns that describe and predict the birth rate in Mexico by using data mining techniques based on relevant demographic and economic information about Mexico. More than twelve m...

The Power Savings Possibilities by Light in the Smart Home Care

When designing a visualisation environment for controlling the building service system in Smart Home Care in order to meet the needs of seniors, emphasis is placed not only on the ease of operation and safety of the elde...

Assessing the Critical Factors for E-Learning Systems Using Fuzzy TOPSIS and Fuzzy Logic

Assessing the success of Information Systems (ISs) has been identified as one of the most critical issues in IS field. Offering more services and the ease of access is considered as a significant factor for today’s aca...

THE CHALLENGE OF IMPLEMENTING SCRUM AGILE METHODOLOGY IN A TRADITIONAL DEVELOPMENT ENVIRONMENT

Agile software development management is gradually gaining more profile and followers among technology companies. The current article presents a study on agile methodologies in contrast to traditional methodologies as we...

Download PDF file
  • EP ID EP649935
  • DOI 10.24297/ijct.v4i2b1.3221
  • Views 144
  • Downloads 0

How To Cite

Bohar Singh, Mandeep Kaur, Chetan Batra (2013). A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(2), 340-344. https://europub.co.uk/articles/-A-649935