Newsletter on Cloud Computing Research: September-2018
Research brings cloud computing costs back to earth
Researchers area unit searching for ways that to cut back the high value of net information storage and retrieval in cloud computing – running software package and managing information on a distant laptop, instead of your own.
Social media equivalent to Facebook and Flickr area unit easy samples of cloud computing, however the drain on resources from these does not compare to the volumes of high-end information generated by the world’s analysis establishments, tending systems, and industries. [1]
The Resource Allocation Optimization Problem for Cloud Computing Environments
In this paper, we have a tendency to gift the utilization of improvement models to gauge the way to best portion cloud computing resources to reduce price and time to get analysis. we glance at cloud platform suppliers Amazon net Services, Google Cloud and Microsoft Azure on their product providing. we have a tendency to hand-picked eighteen machine configuration instances among these suppliers and analyze the valuation structure of the various configuration. [2]
Implementing Data Privacy and Security of Authentication on Cloud Computing using Two-Factor Data Encryption and Key Sharing System
The primary indicator of this venture is to propose a two-factor info security support element with issue revocability for distributed storage framework. The framework endorses a sender to send a disorganized message to a beneficiary through a distributed storage server. The sender simply must ken the character of the recipient but no alternative knowledge, (for example, its open key or its declaration). The beneficiary must have 2 things keeping in mind the top goal to rewrite the figure content. The principal issue is his/her mystery enter place away in the laptop. The second issue is a remarkable individual security appliance that associates with the laptop. [3]
THE ANALYSIS NETWORK FORENSICS USING HONEYPOT ON PUBLIC CLOUD COMPUTING SERVICE NETWORK
This analysis presents visualization in dashboard exploitation beard field Protea cynaroides log knowledge connected to IHP (Kemkominfo) national capital on public cloud computing service network to categorize time stamp in knowledge. Package attack knowledge is split into 3 classes specifically morning, noon, and night supported Time Western state (WIB). DDoS attacks attacked many ports twenty-one, 80, 135, and 445. K -means bunch methodology is enforced during this analysis to induce categorization results of time of the effective attack to understand DDoS attack and cyber profiling that is predicted to assist observance method of anticipation of vulnerability cloud network of DDoS / cybercrime attacks. [4]
Cloud Computing: New Opportunities or New Risks? How to Mitigate Cloud Risks in Oil & Gas Industry
The recent emergence of cloud computing has drastically modified the general perception of infrastructure architectures, code delivery, and development models. the speedy transition towards the cloud setting has fuelled issues on an important issue for the success of knowledge systems, communication, and data security.
Several risks and challenges are introduced from this migration to the cloud setting, so the aim of this paper is twofold; first, to spot key risk aspects of migration to cloud and second to aim to gift some viable solutions that eliminate these potential threats. [5]
Reference
[1] Research brings cloud computing costs back to earth
MANDY THOO, Swinburne Magazine, 24 JUL 2011 (web link)
[2] The Resource Allocation Optimization Problem for Cloud Computing Environments
Yim V, Fernandes C. The Resource Allocation Optimization Problem for Cloud Computing Environments. SMU Data Science Review. 2018;1(3):2. (web link)
[3] Implementing Data Privacy and Security of Authentication on Cloud Computing using Two-Factor Data Encryption and Key Sharing System
Sailesh A, Kumar SA. Implementing Data Privacy and Security of Authentication on Cloud Computing using Two-Factor Data Encryption and Key Sharing System. Journal for Studies in Management and Planning. 2017 Sep 5;3(3):273-9. (web link)
[4] THE ANALYSIS NETWORK FORENSICS USING HONEYPOT ON PUBLIC CLOUD COMPUTING SERVICE NETWORK
Wulandari WA. THE ANALYSIS NETWORK FORENSICS USING HONEYPOT ON PUBLIC CLOUD COMPUTING SERVICE NETWORK. Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM). 2018 Aug 28;1(1):18-25. (web link)
[5] Cloud Computing: New Opportunities or New Risks? How to Mitigate Cloud Risks in Oil & Gas Industry
Akop Gulushanian1,2*
1Department of Entrepreneurship, Kingston Business School, London, United Kingdom.
The 2Saint-Petersburg State University of Aerospace Instrumentation, Saint Petersburg, Russia. (web link)