Technologies of Cloud Computing - Architecture Concepts based on Security and its Challenges
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. we present a survey of cloud computing, highlighting its key concepts, architectural principles, state-of-the-art implementation as well as research challenges. The aim of this paper is to provide a better understanding of the design challenges of cloud computing and identify important research directions in this increasingly important area. As Clouds are complex, large-scale, and heterogeneous distributed systems, management of their resources is a challenging task. They need automated and integrated intelligent strategies for provisioning of resources to offer services that are secure, reliable, and costefficient.
Authors and Affiliations
Nandini Mishra , Kanchan khushwha, , Ritu chasta , Er. Abhishek Choudhary
Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability
Mobile ad hoc networks (MANET) have been proposed for a variety of applications where support for real-time multimedia services will be necessary. Due to high mobility of nodes in mobile ad hoc networks, there exist...
A Statistical Approach to Classify and Identify DDoS Attacks using UCLA Dataset
Nowadays, Internet is the most well-known and popular thing that is widely used by human beings. It is also an essential part of human life and provides the best and fast communication medium. As many people widely used...
A Survey of Performance based Secure Routing Protocols in MANET
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a...
Secure Policy Based Data Sharing for Dynamic Groups in the Cloud
Major problem in public clouds is how to share documents based on fine-grained attribute based access control policies, sharing data in a dynamic groups while preserving data and identity privacy from an un trusted...
Analysing Radio Wave Propagation Model for Indoor Wireless Communication
for several wireless communication technologies, many propagation models have been presented in measuring path losses. In this paper, two propagation prediction models which relate signal strength log of distance...