Preferred Language
Articles
/
JBfoV5MBVTCNdQwCIdFo
Security in Cloud Computing

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pays everywhere i.e. for the subsidy unaccompanied. Reclusion, Atypical, Availability, Genuineness, and Solitariness are empty concerns for both Tiresome providers and flagrant as broadly. Sorry as a Subsidize (IaaS) serves as the subservient paint for the interexchange oversight models, and an insufficiency of rivet in this covering stamina utterly transform the remodeling in turn provision models, i.e., PaaS, and SaaS cruise are technique from IaaS jacket. These essay hand-outs a pompous estimate of IaaS components’ attach and determines vulnerabilities and countermeasures. Uphold Equiponderance be consistent obligation be even very hugely benefit.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
Scopus (5)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of King Saud University - Computer And Information Sciences
Heuristic initialization of PSO task scheduling algorithm in cloud computing

Scopus (89)
Crossref (55)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Development of an Attendance System Based on Cloud / Fog Computing with Data Recovery Capability

Given the high importance of attendance for university students, upon which the possibility of keeping or losing their places in the course is based, it is essential to replace the inefficient manual method of attendance recording with a more efficient one.  To handle this problem, technology must be introduced into this process. This paper aims to propose an automatic attendance system based on passive Radio Frequency Identification (RFID), fog, and cloud computing technologies (AASCF). The system has three sides. The first one, which is the Client-side; works on collecting the attendance data then sending a copy from it. The second side, which is the Server-side, works on calculating an absence ratio of all the students during the

... Show More
Scopus (6)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach

Scopus (2)
Scopus Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Jan 13 2021
Journal Name
Iraqi Journal Of Science
Cloud Computing Platform for Mentoring Trainees: The Case of the Professional Training of Midwives in Morocco

The digital transformation invites several solutions to optimize professional training. Its particularity lies in the management, conservation and securing of their data to each of the players. The use of the electronic learning booklet with Cloud computing aims to be simple and intuitive, it creates interaction and makes it possible to strengthen the links of the trinomial (Student, Educational tutor, supervisor on a training)
We thought of using a online platform tool using Cloud Computing Technology to overcome the limitations of the "paper" learning booklet. This technical-pedagogical system makes it possible to save all data of the apprentice through evaluation grids and follow-up sheets, both during training periods and in theor

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact Cloud Computing On The Development of Accounting Education: Evidence From Sultanate of Oman

Cloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of ​​cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 30 2024
Journal Name
International Journal Of Engineering Pedagogy (ijep)
E-learning in the Cloud Computing Environment: Features, Architecture, Challenges and Solutions

The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services

... Show More
Scopus (1)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
A Deadline-Budget Constrained Task Admission Control for a Software-as-a-Service Provider in Cloud Computing

    Cloud computing is a pay-as-you-go model that provides users with on-demand access to services or computing resources. It is a challenging issue to maximize the service provider's profit and, on the other hand, meet the Quality of Service (QoS) requirements of users. Therefore, this paper proposes an admission control heuristic (ACH) approach that selects or rejects the requests based on budget, deadline, and penalty cost, i.e., those given by the user. Then a service level agreement (SLA) is created for each selected request. The proposed work uses Particle Swarm Optimization (PSO) and the Salp Swarm Algorithm (SSA) to schedule the selected requests under budget and deadline constraints. Performances of PSO and SSA with and witho

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms

The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities.   Cloud computing can be used to store big data.  The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r

... Show More
Scopus (23)
Crossref (11)
Scopus Clarivate Crossref
View Publication Preview PDF