Newsletter on Cloud Computing Research: September-2018

Research brings cloud computing costs back to earth

Researchers area unit searching for ways that to cut back the high value of net information storage and retrieval in cloud computing – running software package and managing information on a distant laptop, instead of your own.

Social media equivalent to Facebook and Flickr area unit easy samples of cloud computing, however the drain on resources from these does not compare to the volumes of high-end information generated by the world’s analysis establishments, tending systems, and industries. [1]

The Resource Allocation Optimization Problem for Cloud Computing Environments

In this paper, we have a tendency to gift the utilization of improvement models to gauge the way to best portion cloud computing resources to reduce price and time to get analysis. we glance at cloud platform suppliers Amazon net Services, Google Cloud and Microsoft Azure on their product providing. we have a tendency to hand-picked eighteen machine configuration instances among these suppliers and analyze the valuation structure of the various configuration. [2]

Implementing Data Privacy and Security of Authentication on Cloud Computing using Two-Factor Data Encryption and Key Sharing System

The primary indicator of this venture is to propose a two-factor info security support element with issue revocability for distributed storage framework. The framework endorses a sender to send a disorganized message to a beneficiary through a distributed storage server. The sender simply must ken the character of the recipient but no alternative knowledge, (for example, its open key or its declaration). The beneficiary must have 2 things keeping in mind the top goal to rewrite the figure content. The principal issue is his/her mystery enter place away in the laptop. The second issue is a remarkable individual security appliance that associates with the laptop. [3]

THE ANALYSIS NETWORK FORENSICS USING HONEYPOT ON PUBLIC CLOUD COMPUTING SERVICE NETWORK

This analysis presents visualization in dashboard exploitation beard field Protea cynaroides log knowledge connected to IHP (Kemkominfo) national capital on public cloud computing service network to categorize time stamp in knowledge. Package attack knowledge is split into 3 classes specifically morning, noon, and night supported Time Western state (WIB). DDoS attacks attacked many ports twenty-one, 80, 135, and 445. K -means bunch methodology is enforced during this analysis to induce categorization results of time of the effective attack to understand DDoS attack and cyber profiling that is predicted to assist observance method of anticipation of vulnerability cloud network of DDoS / cybercrime attacks. [4]

Cloud Computing: New Opportunities or New Risks? How to Mitigate Cloud Risks in Oil & Gas Industry

The recent emergence of cloud computing has drastically modified the general perception of infrastructure architectures, code delivery, and development models. the speedy transition towards the cloud setting has fuelled issues on an important issue for the success of knowledge systems, communication, and data security.

Several risks and challenges are introduced from this migration to the cloud setting, so the aim of this paper is twofold; first, to spot key risk aspects of migration to cloud and second to aim to gift some viable solutions that eliminate these potential threats. [5]

Reference

[1] Research brings cloud computing costs back to earth

MANDY THOO, Swinburne Magazine, 24 JUL 2011 (web link)

[2] The Resource Allocation Optimization Problem for Cloud Computing Environments

Yim V, Fernandes C. The Resource Allocation Optimization Problem for Cloud Computing Environments. SMU Data Science Review. 2018;1(3):2. (web link)

[3] Implementing Data Privacy and Security of Authentication on Cloud Computing using Two-Factor Data Encryption and Key Sharing System

Sailesh A, Kumar SA. Implementing Data Privacy and Security of Authentication on Cloud Computing using Two-Factor Data Encryption and Key Sharing System. Journal for Studies in Management and Planning. 2017 Sep 5;3(3):273-9. (web link)

[4] THE ANALYSIS NETWORK FORENSICS USING HONEYPOT ON PUBLIC CLOUD COMPUTING SERVICE NETWORK

Wulandari WA. THE ANALYSIS NETWORK FORENSICS USING HONEYPOT ON PUBLIC CLOUD COMPUTING SERVICE NETWORK. Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM). 2018 Aug 28;1(1):18-25. (web link)

[5] Cloud Computing: New Opportunities or New Risks? How to Mitigate Cloud Risks in Oil & Gas Industry

Akop Gulushanian1,2*

1Department of Entrepreneurship, Kingston Business School, London, United Kingdom.

The 2Saint-Petersburg State University of Aerospace Instrumentation, Saint Petersburg, Russia. (web link)

Leave a comment

Your email address will not be published. Required fields are marked *