Filters








504,362 Hits in 3.3 sec

Security Enhancement in Multi Clouds Using Serverless Computing Approach

R. Poorvadevi
2018 Internet of Things and Cloud Computing  
In cloud computing environment, the security services and portal systems have been highly progressed based on the user requirements.  ...  Nowadays, in any application specific domain security plays a vital role in the service access environment.  ...  In serverless computing for all the client level process there is an end point which can be provided for accessing and controlling the user services and processes based on key process area (KPA).  ... 
doi:10.11648/j.iotcc.20180601.12 fatcat:po4a75avrvaohb5pem7ig4q35q

A Reliable User Authentication and Data Protection Model in Cloud Computing Environments [article]

Mohammad Ahmadi, Mostafa Vali, Farez Moghaddam, Aida Hakemi, Kasra Madadipouya
2015 arXiv   pre-print
Security issues are the most challenging problems in cloud computing environments as an emerging technology.  ...  Accordingly, two encryption procedures have been established in an independent middleware (Agent) to perform the process of user authentication, access control, and data protection in cloud servers.  ...  In 2013, a user authentication scheme on multiserver environments for cloud computing were presented by Yang et al. [7] .  ... 
arXiv:1508.01703v1 fatcat:lslxt2ijl5astjurcozazeyqhy

CRIS and the GRIDs Architecture

K. Jeffery
2010 Data Science Journal  
The end-user demands low effort threshold access to systems providing e-information, e-business, and eentertainment.  ...  Access is required, and can now be provided, anytime, anyhow, anywhere through ambient computing technology. A new paradigm, GRIDs, provides the architectural framework.  ...  anything close to the end-user) in turn connected by bluetooth to c) an optional notebook computer carried in a backpack (but taken out for use in a suitable environment) with conventional screen, keyboard  ... 
doi:10.2481/dsj.cris9 fatcat:ptvkqidcffgizgdjrkny7te3ka

An Improved CPK Identity Authentication Scheme Based on Cloud Environment

Yanyan Song, Jun Qin
2017 DEStech Transactions on Engineering and Technology Research  
Simulation experiments are conducted on the cloud computing simulation platform via the improved CPK identity authentication based on cloud environment.  ...  The role based access control plan is integrated with the combined public key authentication scheme, to strengthen the security of access control model and guarantee the security of cloud computing.  ...  As for the authentication method, socket in Java is adopted for simulation. At first, user A is set as sending end and user B is treated as receiving end.  ... 
doi:10.12783/dtetr/apetc2017/11255 fatcat:f53qmobgnrgsxmv3dadmna5ioy

Leveraging cloud in the rapidly evolving workplace of the future

T. Chefalas, J. Doran, L. M. Herger, A. Kochut, S. Mastrianni, C. Schulz, D. G. Shea
2011 2011 8th International Conference & Expo on Emerging Technologies for a Smarter World  
Rapid advances in cloud computing have made it possible to replace individual working environments with centralized and consolidated workplaces.  ...  These workplaces bring many advantages over traditional self-managed environments, such as improved security and compliance, and rapid on-boarding.  ...  This poses significant challenges for the IT environment, from flexibility of access to secure enforcement of end point policies.  ... 
doi:10.1109/cewit.2011.6135879 fatcat:lfhtew7ptzb6vh3sd3eajxpauq

Reducing Network Bandwidth Cost on End User Resources Consumption in Cloud Environment

Buchanagandi Enock Nyamajeje, Huiqun Yu
2015 Journal of Computer Science  
The emergence of cloud computing will enable mobile device relies on access sharing computing resources, storage and bandwidth, according to end-user preferences and application requirements.  ...  Rapid increment, increase demands and bandwidth cost of access cloud resources became essential user perceive incur higher cost for utilizing cloud services.  ...  For example: (1) How to determine mobile application outsourcing is worth to improving user-perceived performance in mobile cloud computing environment such as, problem of bandwidth cost provision to enhance  ... 
doi:10.3844/jcssp.2015.943.956 fatcat:qlnsmig5mjhu5ahzagb3xf6vfy

Revisiting Client/Server Computing

Carl S. Guynes, John Windsor
2011 Journal of Business & Economics Research  
font-size: 10pt;">The role of the Information Technology department is changing as it continues to mature and adapt to changes in technology, much of that change dealing with its interaction with corporate end-users  ...  The increased interest in cloud computing, green computing, and in outsourcing are further indicators of the problems that IT departments are currently facing.  ...  With client/server computing, users have access to large databases, printers, and high speed processors, all of which will improve user productivity and quality.  ... 
doi:10.19030/jber.v9i1.935 fatcat:jtlqgdp5arg23noqcpqew4t2qa

Research on the Education Reform of Desktop Virtualization Teaching Based on Cloud Computing

Gui-xian ZHOU, Kai-jian CHEN
2019 DEStech Transactions on Social Science Education and Human Science  
This paper proposes to use the desktop virtualization teaching platform based on cloud computing to realize the rapid development of education informatization compared with the traditional PC application  ...  In essence, cloud computing is a model of computing resource management that has changed so that end users can access and manage computing resources without the help of system administrators.  ...  Users can access the centrally published desktop teaching environment through the TDP client.  ... 
doi:10.12783/dtssehs/eiem2018/26909 fatcat:rqykhzkntbh4zj6lbqzll3ha2u

IJCSN.pdf

Navod Thilakarathne
2020 Figshare  
We have presented detailed access control requirement analysis for cloud computing and have identified important gaps, which are not fulfilled by conventional access control models.  ...  access control model for cloud data storage.  ...  and user requests in an organization for providing secure data storage in the real cloud environment which enforces hybrid cryptographic techniques for providing security for underlying data along with  ... 
doi:10.6084/m9.figshare.11643831.v2 fatcat:y3ufohgn4rbqnfil4x6twr65ka

End User Architecting [chapter]

Vishal Dwivedi
2013 Lecture Notes in Computer Science  
However, writing such end user compositions is hard and error prone. My research explores an improved approach for design, analysis and execution of such end user compositions.  ...  A large number of domains today require end users to compose various heterogeneous computational entities to perform their professional activities.  ...  that will improve end user composition experience.  ... 
doi:10.1007/978-3-642-38706-7_27 fatcat:e2255rlz2nawjldabdxf7yi5oe

Impact of Data Privacy on Storage in Cloud Computing Ecosystem: A Brief Survey

Megha Singh
2020 International Journal for Research in Applied Science and Engineering Technology  
Cloud computing has emerged as a boon for numerous fields which are requiring large data storage.  ...  This paper attempts to investigate the impact of privacy factor on users' trust and also attempts to investigate loopholes in existing solution.  ...  computing environment.  ... 
doi:10.22214/ijraset.2020.31181 fatcat:plbj6a7kh5e23og3nlikf3iuqm

A Usage-based Data Extraction Framework for Cloud-based Application - An Human-Computer Interaction Approach

Manoj Kesavulu, Markus Helfert, Marija Bezbradica
2017 Proceedings of the International Conference on Computer-Human Interaction Research and Applications  
environment as the usage data is spread across the interfaces on the front-end and the back-end.  ...  Features or functionalities provided by cloud-based applications are accessed by users through various interfaces such as web browser, mobile app, and command line interface.  ...  Since the usage data is spread across front-end and back-end in a cloud environment and the front-end comprises of multiple interfaces for an end-user to access the SaaS application, we consider web-browser  ... 
doi:10.5220/0006512700850092 dblp:conf/chira/KesavuluHB17 fatcat:fb2bc5qea5gnrinoga27if6xhu

ConferencePaper.pdf [article]

Navod Thilakarathne
2020 Figshare  
We have presented detailed access control requirement analysis for cloud computing and have identified important gaps, which are not fulfilled by conventional access control models.  ...  access control model for public cloud data storage.  ...  Role Manager, Data Owner, End User, and Override User.  ... 
doi:10.6084/m9.figshare.11643855.v1 fatcat:rvacbivrtbcgphe6xmjbpjwdpi

IJCSN.pdf

Navod Thilakarathne
2020 Figshare  
We have presented detailed access control requirement analysis for cloud computing and have identified important gaps, which are not fulfilled by conventional access control models.  ...  access control model for cloud data storage.  ...  Manager, Data Owner, End User, and Override User.  ... 
doi:10.6084/m9.figshare.11643831.v1 fatcat:xpouufnpbjbbbhwt5qapznujyi

Pervasive maps: Explore and interact with pervasive environments

Geert Vanderhulst, Kris Luyten, Karin Coninx
2010 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom)  
Typical user interfaces in these environments hide the heterogeneity of the environment for end-users which often makes it hard to perceive the provided functionality.  ...  We present Pervasive Maps, an approach and tool that allows to create an intuitive user interface for exploring and controlling the environment.  ...  As a result, it remains difficult for end-users to differentiate between similar resources based on a description, especially in complex environments with many embedded computing resources.  ... 
doi:10.1109/percom.2010.5466973 dblp:conf/percom/VanderhulstLC10 fatcat:sphcpg6jlbfsdn5zdjabfbuqqu
« Previous Showing results 1 — 15 out of 504,362 results