"Applying mathematical models in cloud computing: A survey"
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: As more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. It is better to prevent security threats before they enter into the systems and there is no way how this can be prevented without knowing where they come from. The issue of resource allocation and revenue maximization is also equally important especially when it comes to cloud security. This brings about the necessity of different modelling techniques including but not limited; security threat, resource allocation and revenue maximization models. This survey paper will try to analysesecurity threats and risk mitigation in cloud computing. It gives introduction of how viral attack can invade the virtual machines on the cloud, discusses the top security threats and countermeasures by providing the viral threat modelling in virtual machines and risk mitigation. Resource allocation models and revenue maximization techniques are also discussed.
Authors and Affiliations
Alexander Ngenzi , Dr. Selvarani R , Dr. Suchithrar
The Grouping of Files in Allocation of Job Using ServerScheduling In Load Balancing
Abstract: The Task scheduling is an importantevent for the act of network infrastructure, in the reality of usersrequest and dependency of load the network to provide convenient quality of service for managing the millio...
An Enhanced Authentication System Using Face and Fingerprint Technologies
Abstract: The primary aim of this paper is to develop an enhanced authentication system using a CascadedLink Feed-Forward Neural Networks. In the end, the system overcomes some limitations of face recognition and fingerp...
Highly Available Hadoop Name Node Architecture-Using Replicas of Name Node with Time Synchronization among Replicas
Abstract : Hadoop is a Java software framework that supports data - intensive distributed applications and is developed under open source license. It enables applications to work with thousands of nodes and petabyt...
Effect of Thermal Radiation on Unsteady Gravity Flow of a Power-Law Fluid with Viscous Dissipation through a Porous Medium
Abstract:In this work, we studied the effect of thermal radiation on unsteady gravity flow of a power-law fluid with viscous dissipation through a porous medium. The modified Darcy’s law is considered together with...
Content Evocation Using Web Scraping and Semantic Illustration
Abstract: Web scraping is the process of automatically collecting information from the World Wide Web. It is a field with active developments, sharing a common goal with the semantic web vision, an ambitious initi...