A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2

Abstract

Job scheduling system problem is a core and challenging issue in Cloud Computing. How to use Cloud computing resources efficiently and gain the maximum profits with job scheduling. Job scheduling system is one of the Cloud computing service providers’ ultimate goals. In this paper, firstly, by analysis the differentiated QoS requirements of Cloud computing resources users’ jobs, we build the corresponding non-pre-emptive priority M/G/1 queuing model for the jobs.Then, considering Cloud computing service providers’ destination which is to gain the maximum profits by offering Cloud computing resources, we built the system cost function for this queuing model. After that, based on the queuing model and system cost function, considering the goals of both the Cloud Computing service users and providers, we gave the corresponding strategy and algorithm to get the approximate optimistic value of service for each job in the corresponding no-pre-emptive priority M/G/1 queuing model. Finally, we also provide corresponding simulations and numeral results.Analysis and number results show that our approach for job scheduling system can not only guarantee the QoS requirements of the users’ jobs, but also can make the maximum profits for the Cloud computing service providers.While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional”computing of the past several years. Looking back further to the time-sharing era, many of these problems already received attention. On the other hand, we argue that two facets are to some degree new and fundamental to cloud computing: the complexities of multi-party trust considerations, and the ensuing need for mutual audit ability.

Authors and Affiliations

Bohar Singh, Mandeep Kaur, Chetan Batra

Keywords

Related Articles

On multi-objective linear programming problems with inexact rough interval-fuzzy coefficients

This paper deals with a multi-objective linear programming problem with an inexact rough interval fuzzy coefficients IRFMOLP. This problem is considered by incorporating an inexact rough interval fuzzy number in both the...

HYBRID-CMOS LOGIC STYLE DESIGN FOR FAST SELF-CHECKING ADDERS DATA PATHS

In this paper we present an efficient design for self-checking fast adders data paths. We investigate the implementation of concurrent error detection fast adders: carry look-ahead, Carry skip, Carry-select and Condition...

Implementation of Colored CAPTCHA

CAPTCHAs is an interesting of research are short forCompletely Automated Public Turing test to tell Computersand Humans Apart. The purpose of a CAPTCHA is to blockform submissions from spam bots –automated scripts that...

Model-Based Tool-Assistance for Packet-Filter Design and its Future

Firewall is a device that secure the private network from unauthorized access. Model based  tool assistance  facilitate the design task and has contribute to the correctness of the filters. But the model based tool ass...

Cloud Implementation and Cloud Integration

Cloud computing is innovated model which deliversconvenient and on-demand computing services over internetto requested end users. Cloud service engineering is adiscipline that combines the business and technology thinkin...

Download PDF file
  • EP ID EP649935
  • DOI 10.24297/ijct.v4i2b1.3221
  • Views 136
  • Downloads 0

How To Cite

Bohar Singh, Mandeep Kaur, Chetan Batra (2013). A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(2), 340-344. https://europub.co.uk./articles/-A-649935