Usage control in cloud systems

A Lazouski, G Mancini, F Martinelli… - … Conference for Internet …, 2012 - ieeexplore.ieee.org
Cloud system peculiarities, such as enormous resources and long-lasting accesses,
introduce new security and management challenges. This paper presents an advanced …

Virtual machine placement in cloud systems through migration process

K Li, H Zheng, J Wu, X Du - International Journal of Parallel …, 2015 - Taylor & Francis
Cloud computing is an emerging technology that greatly shapes our lives, where users run
their jobs on virtual machines (VMs) on physical machines (PMs) provided by a cloud …

Market‐oriented cloud computing and the cloudbus toolkit

R Buyya, S Pandey, C Vecchiola - Large Scale Network …, 2013 - Wiley Online Library
This chapter introduces the fundamental concepts of market‐oriented Cloud computing
systems and presents a reference model. The model, together with the state‐of‐the‐art …

Software quality in the clouds: a cloud-based solution

M Hussain, HM Abdulsalam - Cluster Computing, 2014 - Springer
Cloud computing, an on-demand computation model that consists of large data-centers
(Clouds) managed by cloud providers, offers storage and computation needs for cloud users …

[PDF][PDF] Obfuscrypt: A novel confidentiality technique for cloud storage

L Arockiam, S Monikandan - International Journal of Computer …, 2014 - researchgate.net
In today's IT industry, the more sophisticated data storage is cloud storage. Cloud storage
mainly helps Small and Medium scale Enterprises (SMEs) to reduce their investments and …

RETRACTED: Research on Clustering Algorithm Based on Big Data Background

C Wu - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
In recent years, machine learning has developed rapidly and clustering is an important
research direction in the field of machine learning. After continuous and in-depth research …

A blockchain-based access control scheme

X Jiang - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Access control plays an important role in protecting data privacy. However, traditional
access control models such as RBAC, ABAC and UCON need to be built based on a central …

Enhanced obfuscation technique for data confidentiality in public cloud storage

SA Oli, L Arockiam - MATEC Web of Conferences, 2016 - matec-conferences.org
With an advent of cloud computing, data storage has become a boon in information
technology. At the same time, data storage in remote places have become important issues …