Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
— The cloud is no longer in future, it’s here today. The cloud has fundamentally changed the landscape of computing. Governments are facing critical challenge of improving resource utilization, increase service responsiveness, distributed... more
    • by 
    •   7  
      Cloud ComputingHybrid CloudCloud Computing SecurityCloud Security
Cloud computing is an emerging IT service paradigm. Instead of developing their own IT departments, business sectors purchase on-demand IT service from external providers in a per-use basis. From business cost perspective, companies are... more
    • by 
    •   4  
      AuthenticationData PrivacyCloud SecuritySecret Sharing
The rapid development of Internet due to increasing data rates through both broadband cable networks and 4G wireless mobile, make everyone easily connected to the internet. Storages as Services (StaaS) is more popular and many users want... more
    • by 
    •   4  
      EngineeringPhysical sciencesCloud SecurityCloud Data Storage Security
Cloud Computing reshapes the entire computing paradigm. In general, cloud computing means outsourcing available services and data storage in centralized scenario. In cloud computing task allocation is a major problem because multiple... more
    • by 
    •   4  
      Cloud ComputingCloud SecurityData Storage Management in CloudJob Scheduling on Grid Computing and Cloud Computing
    • by 
    •   8  
      Computer ScienceBiometricsCloud SecuritySSO
Today the IT environment concentrates on Cloud computing where the usage of cloud based applications poses various security threats. Many possible cloud applications fall victim to a tragedy of the generic approach such that a shared... more
    • by 
    •   4  
      Obfuscation (Information Security And Cryptography)Cloud SecurityPseudo-Random Number Generator (PRNG)ANSI X9.31
The pioneering decentralized access control scheme for susceptible data storage in clouds that supports unidentified authentication. In the proposed scheme, the clouds verify the authenticity of the server without knowing the user’s... more
    • by 
    •   4  
      Cloud ComputingComputer and Network Security, Cloud Computing, Distributed SystemsCloud SecuritySecurity in Cloud Computing
In last two decades continues increase of comput-ational power and recent advance in the web technology cause to provide large amounts of data. That needs large scale data processing mechanism to handle this volume of data. MapReduce is a... more
    • by 
    •   24  
      Computer ScienceComputer EngineeringComputer NetworksClouds
Cloud computing technology offers the possibility of inter-organizational medical data sharing at a larger scale. The different organizations can maintain their own cloud environment while exchanging healthcare data among them in a... more
    • by 
    •   8  
      Cloud ComputingMobile Cloud ComputingCloud Computing SecurityCloud Security
    • by 
    • Cloud Security
Cloud computing is a growing area of concern in the IT security community because cloud architectures are literally popping up all over. Public clouds are available from Google.com, Amazon.com, Microsoft, Oracle/Sun, Canonical/Eucalyptus... more
    • by 
    •   4  
      Information Security and PrivacyCloud ComputingCloud Computing SecurityCloud Security
Hadoop Ecosystem is generally considered as a platform or a framework which solves Big Data issues. Read here to know the basics of Hadoop ecosystem and advantages of migrating Hadoop Ecosystem in Google Cloud Platform (GCP).
    • by 
    •   6  
      Cloud ComputingCloudCloud SecurityComputer Network and Cloud Computing
With the tremendous growth of sensitive information on cloud, cloud security is getting more important than even before. The cloud data and services reside in massively scalable data centers and can be accessed everywhere. The growth of... more
    • by 
    •   5  
      Computer ScienceCryptographyAESCloud Security
    • by 
    •   4  
      EMC EducationCloud ComputingCloud SecurityCloud Computing and Virtualization
    • by 
    •   5  
      Information Security and AssuranceService managementCloudCloud Security
    • by 
    •   11  
      Computer ScienceInformation SecurityComputer SecurityReview
    • by 
    •   20  
      Computer ScienceDistributed ComputingGrid ComputingComputer Networks
Organizations and individuals have been moving to the cloud computing technology looking for effective and fast computing services. Confidential information is becoming more vulnerable to leak due to outsource computations to... more
    • by 
    •   7  
      Genetic AlgorithmsCryptographyEncryptionConfidentiality
Cloud computing provides IT services to users worldwide, Data centers in Clouds consume large amount of Energy leading to highly effective costs. Therefore green energy computing is solution for decreasing operational costs. This survey... more
    • by 
    •   11  
      Computer ScienceInformation SecurityCloud ComputingMobile Cloud Computing
The paper is part of my graduate course work at the Harvard University. The paper investigates securing cloud solutions for financial institutions.
    • by 
    •   3  
      Cloud ComputingCloud SecurityFinancial Security
Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business... more
    • by  and +1
    •   54  
      Information SystemsBusiness EthicsComputer ScienceHuman Computer Interaction
Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a... more
    • by 
    • Cloud Security
    • by 
    •   7  
      Information SystemsComputer ScienceGrid ComputingData Protection
In this work, we employ a key access control management scheme which effortlessly transitions any organization-like security policy to state of the art cloud level security. Offering a very flexible, secure, and hierarchical key access... more
    • by 
    •   4  
      Cloud SecuritySecurity Issues in cloud ComputingSecret SharingMulti-secret Sharing
Cloud Computing fondamenti di sicurezza, la sicurezza nei modelli IaaS, PaaS e SaaS. La virtualizzazione, l'Intrusion Detection Service e la crittografia
    • by 
    •   4  
      Cloud ComputingCloud SecuritySecurity in Cloud ComputingCloud Computing and Virtualization
— The ever-increasing amount of personal or sensitive data stored in a cloud data storage needs to be protected, since losing it is a very serious problem. As their popularity increases, cloud storage is becoming an option for user in... more
    • by 
    •   9  
      Information SecurityComputer SecurityCryptographyAuthentication
    • by  and +2
    •   4  
      Decision TheoryCloud ComputingCloud SecurityGreen Cloud Computing
    • by 
    •   5  
      Information SecurityCloud ComputingDigital ForensicsCloud Security
    • by 
    •   7  
      Information SecurityCloud SecurityDropboxElectronic identity
Amazon Web Services Practice Lab Guide. Absolute beginners can try this lab practice guide. Topics Covered in this Lab Guide are below Table of Contents | Page Number About Author 5 Services we provide to our customers 6... more
    • by 
    •   9  
      Cloud ComputingCloudCloud SecurityAmazon EC2
Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could base... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyCloud ComputingComputer Networking
Cloud computing is an emerging area of computer technology that benefits form the processing power and the computing resources of many connected, geographically distanced computers connected via Internet. Cloud computing eliminates the... more
    • by 
    •   5  
      PrivacyCloud ComputingIntegrityCloud Security
Advanced Persistent Threat is a specific design to survive until it reaches the target and creates backdoor for future Intrusion. The objective of this paper is, to design and implementation of a defense in depth system to protect social... more
    • by  and +1
    •   5  
      VulnerabilityCloud Computing SecurityCloud SecurityDefense-in-depth Strategy
Leading Fintech company LoanTap upgraded its web application to the AWS Cloud for improved scalability and application
    • by 
    •   4  
      Cloud ComputingCloud ComputingDistributed System # Peer-to-Peer # Philosophy # Security # Semantic Web # Sensor Network SecurityCloud SecurityFintech
Cloud computing is the current IT buzzword synonymous with outsourced data center management and agile solution architecture. It has the potential to improve scalability of large enterprise network delivery of services and the capability... more
    • by 
    •   6  
      Distributed ComputingCloud ComputingSoftware as a ServiceCloud Security
    • by 
    •   4  
      Computer ScienceModeling and SimulationCloud SecurityData Storage Management in Cloud
Cloud computing is growing significantly day by day, and has created a shift in the IT industry. It brings several advantages to consumers by delivering computing as a service, such as self-service, on-demand, broad network access, rapid... more
    • by 
    •   12  
      Computer ScienceRisk ManagementCloud ComputingMobile Cloud Computing
    • by 
    •   4  
      Computer ScienceCloud SecurityAttribute Based EncryptionPartial Order
    • by 
    •   4  
      CloudsCloud ComputingCloudCloud Security
In a computing context, cybersecurity is undergoing massive shifts in technology and its operations in recent days, and data science is driving the change. Extracting security incident patterns or insights from cybersecurity data and... more
    • by 
    •   5  
      Data MiningData ScienceCyber SecurityBig Data
In the last decade, cloud computing has been incorporated in various industries, from Health to Military, which has been meticulously guided by exploring related technologies in the industry and academia alike. The individual and... more
    • by  and +1
    •   3  
      Cloud ComputingCloud SecuritySecurity in Cloud Computing
Secure data access and effective data sharing in public cloud is an problem to solve. This paper focuses on the secure data sharing and storage. It will provide high security and efficiency. In this mechanism, group members can... more
    • by  and +2
    •   3  
      CryptographyCloudCloud Security
Web servers which provide customer services are usually connected to highly sensitive information contained backend databases. The incrementing bar of deploying such web applications initiated in ranging the corresponding bar of number... more
    • by 
    •   13  
      Computer ScienceInformation SecurityComputer EngineeringNetwork Security
Cloud computing is commonly used to represent any work done on a computer, mobile or any device, where the data and possibly the application being used do not reside on the device but rather on an unspecified device elsewhere on the... more
    • by 
    •   20  
      MathematicsComputer ScienceAlgorithmsInformation Technology
This document provides detailed but basic information that someone wanting to enter the Cybersecurity Career Field can use to become familiar with the multiple aspects of Cybersecurity. Likewise, most Cybersecurity professionals can use... more
    • by 
    •   19  
      Information AssuranceCybersecurityCISSPCloud Security
    • by 
    •   5  
      Cloud Computing SecurityEnsuring data storage security in cloud computingCloud SecuritySecurity in Cloud Computing
    • by 
    •   6  
      Information SystemsCloud ComputingSmesSWOT analysis
Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National... more
    • by  and +1
    •   12  
      EngineeringDigital CircuitsElectrical and ElectronicsEntropy
Cloud computing is one among today’s hottest research areas thanks to its ability to scale back costs related to computing while increasing scalability and adaptability for computing services. Cloud computing is Internet based computing... more
    • by 
    •   5  
      Computer ScienceCryptographyEncryptionDatabase Security
Cloud computing is the next generation networks which is soon going to revolutionize the computing world. It has much flexibility like on demand resources and services availability. Security is still critical challenge in the cloud... more
    • by 
    •   15  
      Information SystemsComputer ScienceInformation TechnologyInformation Security