The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In cloud computing environments, resources stored on the cloud servers are transmitted in the form of data flow to the clients via networks. Due to the real-time and ubiquitous requirements of cloud computing services, how to design a sophisticated transmission model to ensure service reliability and security becomes a key problem. In this paper, we first propose a Comprehensive Transmission (CT)...
In recent years, cloud computing is no doubt one of the most-talked-about terms in both the industry and academic worlds. In clouds, resources are delivered as services over the Internet in a pay-as-you-go fashion. By leasing cloud platforms to run their business, startups can achieve cost-saving and scale-up elasticity without being concerned about over-provisioning or under-provisioning for a service...
In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in measurable terms, what resources a the CSP will provide the user. CSP's being profit based companies have incentive to cheat on the SLA. By providing a user with less resources than...
Recent years have witnessed the development of Cloud Computing. The management of images is a big problem in virtualized environment because there are quantities of Virtual Machine images being stored in a Cloud and most of them are outdated. How to detect the outdated images and patch them efficiently? In this paper, we present a prototype called OPS- Offline Patching Scheme for the Images Management...
Security issues of cloud computing are always being concerned by customers. Research on a virtual machine's quantitative or qualitative value of risk will be a good start to know the security status of a cloud data center. Risk assessment is a solution for really understanding security procedures of the network and information system, analyzing where security threats come from and how much loss the...
Migrating applications with strong consistency requirements to public cloud platforms remains risky since the data owner cannot verify the correctness of the public cloud's locking algorithm. In this paper, we identify new attacks that an untrusted cloud provider can launch via control of the locking mechanism, and propose an extension to existing locking scheme to address such attacks. Our solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.