In this era, Cloud computing has gained a big hype in the current IT industry.
After the internet, cloud computing is treated as the next big thing in this
world. With the help of the internet, we create virtual machines with the
configurations which we request. In comparison to conventional ways, Cloud
Computing moves application software and databases to the large data centers,
where the data and services will not be fully trustworthy as they are in the
public cloud. In this paper, I focus on how to secure data in the cloud and also
to provide the quality of service to the end user. In this paper, the author
presents the authenticated user to access the data and data error localization.
Cloud computing is a widely used technology nowadays. Cloud storage has been
paid more and more attention as an emerging new storage technology. At the
same time, security of data stored on cloud has become a serious problem.
Cloud storage security concerns about users' data security. The purpose of
this presentation is to achieve data security of cloud storage and to formulate
corresponding cloud storage security policy.
Many big data computing applications have been deployed in cloud platforms.
These applications normally demand concurrent data transfers among computing
nodes for parallel processing. It is important to find the best transfer
scheduling leading to the least data retrieval timeāthe maximum throughput in
other words. However, the existing methods cannot achieve this, because they
ignore link bandwidths and the diversity of data replicas and paths. In this
paper, we aim to develop a max-throughput data transfer scheduling to minimize
the data retrieval time of applications. Specifically, the problem is formulated
into mixed integer programming, and an approximation algorithm is proposed, with
its approximation ratio analyzed. The extensive simulations demonstrate that our
algorithm can obtain near optimal solutions.
The cloud and the Internet of Things are two completely different things, but
they can be complementary to each other. This is important, since both are
becoming more pervasive in modern society. This paper explores the degree to
which they can be merged and what risks/challenges are posed by this scenario.
Sri Harsha Akurathi
Secure Data Storage in Cloud Computing
Priyanka Chava
Study of Data Security Policy Based on Cloud Storage
Sabrina Cosey-Sylvester
Security and Privacy in Cloud Computing
Frederick Eccher
Security in the Cloud
Jayashree Venkatasubramanian
Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in
Cloud Systems
Michael Moldafsky
An Introduction to Fog Computing: A More Efficient Cloud
Zach Prescott
Integration of Cloud Computing and Internet of Things: A Survey
Vijay Sukhadeve