Enhancing the Security of Cloud Computing via Unscented Kalman Filter; with Statistical Analysis About Power Consumption
International Journal of Energy and Environment
To migrate to cloud computing or other new generation of computational and communicational network we should making some laws about limitations on such networks. We should clarify clearly the level of accessions to resources and/or the ability to sending or receiving files through such network. We can avoid unpredicted and undesired works by using of law makings. Furthermore, besides of law making we can use evolutionary and/or intelligence techniques for estimation and prediction about
... rs that deal with controlling of our network – for example in this paper we introduce one type of such intelligence algorithms which named as unscented Kalman filter. By giving some raw inputs about treatments and resources of such networks we're able to estimate and predict about lots of different conditions of these networks. For example, we should have an estimation and prediction algorithm to be able to track and trace the hackers or crackers, if they're permeating to our network. Or we should estimate the amount of users that will use particular software or application on a specific hour through such network. Also, if we study users treatment on a specific network, like cloud computing, we're able to estimate and predict their keen and eagerness about new released software or application; because if we know how people treat and face and react with new emerging software we're able to construct and program our applications more precisely. In this paper, at first we tell about cloud computing – we define it completely and discuss about all aspects of this new generation of internet – also in the first section we discuss about efficiency of cloud computing in saving of energy and tell differences between the amount of energy that cloud resources use and the amount of energy that other computerized frames were use. We proof our suggestions and ideas by the means of analytical and mathematical analysis; after that when we understand about all of its concepts, a brief review about Microsoft decisions on cloud computing were present, we review new systems and software's of Microsoft that equipped with cloud computing and study the advantages and disadvantages of these new services which are equipped with cloud computing. In the next section by the knowing of whole concepts and key features of this network and also by knowing the critical uses of this network on different industries we introduce fixedinterval smoothers; which can be used for estimation and prediction of different parameters in such network. For example, we can use this for estimation and prediction about permeating of hackers or for predicting the amount of users that will use special part of our network in a particular period of time or by tracking and tracing the packets or even users. By performing such activities we're able to eliminate malicious and spyware treatments from the beginning points of our network. Also by the means of mathematical analysis in this paper, we demonstrate all of our suggestions and according to these proofs we conclude about workability and liability of such network.