Cloud Computing Presentations

Fall 2018

Sri Harsha Akurathi

Secure Data Storage in Cloud Computing

In this era, Cloud computing has gained a big hype in the current IT industry. After the internet, cloud computing is treated as the next big thing in this world. With the help of the internet, we create virtual machines with the configurations which we request. In comparison to conventional ways, Cloud Computing moves application software and databases to the large data centers, where the data and services will not be fully trustworthy as they are in the public cloud. In this paper, I focus on how to secure data in the cloud and also to provide the quality of service to the end user. In this paper, the author presents the authenticated user to access the data and data error localization.

Priyanka Chava

Study of Data Security Policy Based on Cloud Storage

Cloud computing is a widely used technology nowadays. Cloud storage has been paid more and more attention as an emerging new storage technology. At the same time, security of data stored on cloud has become a serious problem. Cloud storage security concerns about users' data security. The purpose of this presentation is to achieve data security of cloud storage and to formulate corresponding cloud storage security policy.

Sabrina Cosey-Sylvester

Security and Privacy in Cloud Computing

Frederick Eccher

Security in the Cloud

Jayashree Venkatasubramanian

Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems

Many big data computing applications have been deployed in cloud platforms. These applications normally demand concurrent data transfers among computing nodes for parallel processing. It is important to find the best transfer scheduling leading to the least data retrieval time—the maximum throughput in other words. However, the existing methods cannot achieve this, because they ignore link bandwidths and the diversity of data replicas and paths. In this paper, we aim to develop a max-throughput data transfer scheduling to minimize the data retrieval time of applications. Specifically, the problem is formulated into mixed integer programming, and an approximation algorithm is proposed, with its approximation ratio analyzed. The extensive simulations demonstrate that our algorithm can obtain near optimal solutions.

Michael Moldafsky

An Introduction to Fog Computing: A More Efficient Cloud

Zach Prescott

Integration of Cloud Computing and Internet of Things: A Survey

The cloud and the Internet of Things are two completely different things, but they can be complementary to each other. This is important, since both are becoming more pervasive in modern society. This paper explores the degree to which they can be merged and what risks/challenges are posed by this scenario.

Vijay Sukhadeve