Similar publications

Article
Full-text available
Cloud computing is viewed as one of the most dominant ideal models in the Information Technology industry nowadays. It offers new savvy administrations on-request like Software as a Service, Infrastructure as a Service, and Platform as a Service. Nonetheless, with these administrations promising offices and advantages, there are yet various difficu...
Conference Paper
Full-text available
Managing encryption keys on-premise infrastructure in not straightforward matter for IT teams. In cloud computing environments, where the model is shared or entirely controlled by the providers, it becomes a very challenging task. In addition to critical issue related to properly manage and secure the keys on providers infrastructures, cloud users...
Thesis
Full-text available
Nowadays, cloud computing allows researchers and health professionals to flexibly store and process large amounts of genetic data remotely, without a need to purchase and to maintain their own infrastructures. These data are especially used in genome-wide association studies (GWAS) in order to conduct the identification of genetic variants that are...
Conference Paper
Full-text available
Cloud software continues to expand globally, highly motivated by how widespread the Internet is and the possibilities it unlocks with cloud computing. Still, cloud development has some intrinsic properties to it, making it complex to unexperienced developers. This research is capturing those intricacies in the form of a pattern language that gather...
Conference Paper
Full-text available
The majority of security breaches in cloud infrastructure in recent years are caused by human errors and misconfigured resources. Novel security models are imperative to overcome these issues. Such models must be customer-centric, continuous, not focused on traditional security paradigms like intrusion detection and adopt proactive techniques. Thus...

Citations

... A cloud user might have various access privileges to the same resource, ACaaS for public IaaS clouds [22]. e architecture manages many access control policies and models. ...
Article
Full-text available
Cloud computing has increased its service area and user experience above traditional platforms through virtualization and resource integration, resulting in substantial economic and societal advantages. Cloud computing is experiencing a significant security and trust dilemma, requiring a trust-enabled transaction environment. The typical cloud trust model is centralized, resulting in high maintenance costs, network congestion, and even single-point failure. Also, due to a lack of openness and traceability, trust rating findings are not universally acknowledged. “Blockchain is a novel, decentralised computing system. Its unique operational principles and record traceability assure the transaction data’s integrity, undeniability, and security. So, blockchain is ideal for building a distributed and decentralised trust infrastructure. This study addresses the difficulty of transferring data and related permission policies from the cloud to the distributed file systems (DFS). Our aims include moving the data files from the cloud to the distributed file system and developing a cloud policy. This study addresses the difficulty of transferring data and related permission policies from the cloud to the DFS. In DFS, no node is given the privilege, and storage of all the data is dependent on content-addressing. The data files are moved from Amazon S3 buckets to the interplanetary file system (IPFS). In DFS, no node is given the privilege, and storage of all the data is dependent on content-addressing.
Article
Full-text available
Portable and mobile devices are one of the most expedient sources accessible that can give the latest update regarding events happening around humans and machines altogether in a convenient way despite the location of users which can be stationary as well as in motion. In addition, what we need and what information is required can be downloaded quickly on these mobile devices from anywhere. While mobile devices not only the source of communication but also used for other purposes such as data processing, computers, uploading, downloading video and audio files. Given the storage capacity of these devices and the data load in performing several tasks, the blocking problem is clearly expected. At hand is a prerequisite outside help to improve the situation and platform for cloud computing proposals in this environment, But it is actually problematic to ought to right to use these platforms easily. Now, arises a need that somehow has to find the mobile devices actually can access the cloud computing display place and also must be guaranteed access anywhere, anytime. The virtual cloud computing platform is basically alone a means that could be useful because of the ubiquity of mobile devices. This document is an effort to describe and jotting down their association and ubiquitous cloud computing in addition to what means to get benefited from the creation of the IT platform in the virtual cloud. In this paper, various pervasive and cloud computing challenges and techniques are discussed in detail. Certain available techniques are considered along with the comparison among each other to identify the better option for adoption.