Academia.eduAcademia.edu

Cloud Environment

description52 papers
group5 followers
lightbulbAbout this topic
A cloud environment refers to a virtualized computing infrastructure that provides on-demand access to shared resources, such as servers, storage, and applications, over the internet. It enables scalable and flexible IT solutions, allowing users to deploy and manage services without the need for physical hardware.
lightbulbAbout this topic
A cloud environment refers to a virtualized computing infrastructure that provides on-demand access to shared resources, such as servers, storage, and applications, over the internet. It enables scalable and flexible IT solutions, allowing users to deploy and manage services without the need for physical hardware.
Cloud environments encounter massive service disruptions together with security breaches and substantial financial losses through Distributed Denial of Service (DDoS) attacks. Detecting and mitigating DDoS assaults is the focus of this... more
The aim of this study was to investigate the views of administrators and librarians of Allameh Tabataba'i University libraries on digital preservation in the cloud environment. The present study is applied in nature and with a... more
Virtual Machine (VM) consolidation is an optimization approach for VM placement in cloud infrastructure, which is one of the effective ways to efficiently utilize cloud resources in order to optimize number of VM migrations, Service Level... more
Many fault detection techniques for detecting faults in rule bases system have appeared in the literature. These techniques assume that the rule base is static. This paper presents a new approach by designing Expert system for detecting... more
The rapid advancements in Internet of Things-based healthcare systems have revolutionized patient monitoring by enabling continuous and data collection from various devices like heart rate monitors, blood pressure sensors, and glucose... more
The smart Internet of Robotic Things (IoRT) networks integrate swarm robotics, TimeSensitive Networking (TSN), Light Detection and Ranging (LiDAR) mapping, microcontrollers, and thermal imaging, producing adaptive and efficient... more
Background Details: Ensuring mobile data security has become much more difficult due to the quick uptake of cloud environments and mobile technologies. In order to secure sensitive data in mobile-cloud ecosystems, modern cryptographic... more
The swift expansion of electronic commerce has transformed commercial dealings, providing unmatched ease and availability to clients throughout the globe. But this growth has also raised serious questions about transaction security,... more
With the growing reliance on cloud computing for storing and managing data, providing security and performance for cloud storage systems has become very important and multicloud solutions offers both. Current cloud architectures suffer... more
Cloud providers aim to maximise their profits while satisfying tenant requirements, e.g., performance. The relational database management systems face many obstacles in achieving this goal. Therefore, the use of NoSQL databases becomes... more
Cloud computing datacenters currently provide mi­ llions of virtual machines in highly dynamic Infrastruc­ ture as a Service (IaaS) markets. As a first step on im­ plementing algorithms previously proposed by the au­ thors for Virtual... more
Bring Your Own Device (BYOD) at Work is a growing practice that has significantly increased network security vulnerabilities. This development has tremendous implications for both businesses and individuals in every organization. As a... more
As the market of cloud computing is in the state of constant active development, the distribution of the decentralized machine learning models, and the management of their resources in the distributed context is a problem as well. As a... more
In today's highly digital environment, centralized authentication systems are susceptible to single points of failure, exposing sensitive data to cyberattacks and data breaches. This paper presents a novel AI-driven decentralized... more
Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentiality and integrity of data increases dramatically. Attacker can take advantage of these protocols to hide the intrusion and evade... more
One of the most common causes of blackouts is unexpected failures at power system transformer levels. The purpose of this project is to create a low-cost Internet of things (IoT)-based monitoring system for power grid transformers in... more
Bring Your Own Device (BYOD) at Work is a growing practice that has significantly increased network security vulnerabilities. This development has tremendous implications for both businesses and individuals in every organization. As a... more
as the complexity in the cloud services increases day by day the role of brokers used in the cloud gain more importance. Here we basically resolve this issue by discussing preference based cloud service recommender that support MCDM... more
Cloud datacenters contain the number of servers, that there are some servers put in idle, as workload is distributed to all the active servers on the network called server virtualization. In order to minimize the number of active servers,... more
The tendencies of using multi-agent intelligent technologies for information processing are given. The main ideas of building a distributed multi-agent system with distributed knowledge and distributed processing are shown. The directions... more
In this work inevitable for power transmission boards such as Tamil Nadu Generation and Distribution Corporation Limited (TANGEDCO) to look for a low-cost communication system with low power usage and to improve supply reliability, to... more
To solve the problems of medical diagnostics, human body temperature measurement has become widespread. In many cases, to make a correct diagnosis, it is required to obtain results of continuous monitoring during a certain period instead... more
Virtual Machine (VM) consolidation is an optimization approach for VM placement in cloud infrastructure, which is one of the effective ways to efficiently utilize cloud resources in order to optimize number of VM migrations, Service Level... more
Data center power consumption is among the largest commodity expenditures for many organizations. Reduction of power used in cloud data centres with heterogeneous physical resources can be achieved through Virtual-Machine (VM)... more
Data center power consumption is among the largest commodity expenditures for many organizations. Reduction of power used in cloud data centres with heterogeneous physical resources can be achieved through Virtual-Machine (VM)... more
In the era of cloud computing, ensuring data security is crucial for users and organizations. This paper presents an innovative approach called F-DNAES, which combines DNA cryptography and the Advanced Encryption Standard (AES) algorithm,... more
In the era of cloud computing, ensuring data security is crucial for users and organizations. This paper presents an innovative approach called F-DNAES, which combines DNA cryptography and the Advanced Encryption Standard (AES) algorithm,... more
In the era of cloud computing, ensuring data security is crucial for users and organizations. This paper presents an innovative approach called F-DNAES, which combines DNA cryptography and the Advanced Encryption Standard (AES) algorithm,... more
Cloud computing datacenters currently provide mi­ llions of virtual machines in highly dynamic Infrastruc­ ture as a Service (IaaS) markets. As a first step on im­ plementing algorithms previously proposed by the au­ thors for Virtual... more
as the complexity in the cloud services increases day by day the role of brokers used in the cloud gain more importance. Here we basically resolve this issue by discussing preference based cloud service recommender that support MCDM... more
Cloud computing datacenters currently provide mi­ llions of virtual machines in highly dynamic Infrastruc­ ture as a Service (IaaS) markets. As a first step on im­ plementing algorithms previously proposed by the au­ thors for Virtual... more
Cloud computing datacenters currently provide mi­ llions of virtual machines in highly dynamic Infrastruc­ ture as a Service (IaaS) markets. As a first step on im­ plementing algorithms previously proposed by the au­ thors for Virtual... more
The article presents an efficient energy optimization framework based on dynamic resource scheduling for VM migration in cloud data centers. This increasing number of cloud data centers all over the world are consuming a vast amount of... more
The Cloud Computing model leverages virtualization of computing resources allowing customers to provision resources on-demand on a pay-as-you-go basis. During recent years, the power consumption of datacenters in cloud environment... more
One of the most common causes of blackouts is unexpected failures at power system transformer levels. The purpose of this project is to create a low-cost Internet of things (IoT)-based monitoring system for power grid transformers in... more
Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentiality and integrity of data increases dramatically. Attacker can take advantage of these protocols to hide the intrusion and evade... more
Agile global software development (AGSD) is an increasingly prevalent software development strategy, as organizations hope to realize the benefits of accessing a larger resource pool of skilled labor, at a potentially reduced cost, while... more
In the current digital era, education system has witness tremendous growth in data storage and efficient retrieval. Many Institutes have very huge databases which may be of terabytes of knowledge and information. The complexity of the... more
One of the most common causes of blackouts is unexpected failures at power system transformer levels. The purpose of this project is to create a low-cost Internet of things (IoT)-based monitoring system for power grid transformers in... more
In current scenario, business enterprises are required to deliver improved functionality and provide on-demand services, while leveraging existing IT infrastructure and investment. They are expected to be agile and dynamic. It is the... more
Case-Based Learning (CBL) has become an effective pedagogy for student-centered learning in medical education, which is founded on persistent patient cases. Flippped learning and Internet of Things (IoTs) concepts have gained significant... more
Some of the cloud-based education solutions for distance learning that have been previously offered have a lack of security. Researchers have decided to strengthen security rather than reduce it, but this raises the question of... more
The article presents an efficient energy optimization framework based on dynamic resource scheduling for VM migration in cloud data centers. This increasing number of cloud data centers all over the world are consuming a vast amount of... more
Cloud providers aim to maximise their profits while satisfying tenant requirements, e.g., performance. The relational database management systems face many obstacles in achieving this goal. Therefore, the use of NoSQL databases becomes... more
Cloud computing is a term that they come across often these days. Many Companies are often trying to increase the functionality of Information Technology while minimizing capital expenditures. This paper presents the survey on primary... more
as the complexity in the cloud services increases day by day the role of brokers used in the cloud gain more importance. Here we basically resolve this issue by discussing preference based cloud service recommender that support MCDM... more
Case-Based Learning (CBL) has become an effective pedagogy for student-centered learning in medical education, which is founded on persistent patient cases. Flippped learning and Internet of Things (IoTs) concepts have gained significant... more
Cloud computing is a revolutionary process that has impacted the manner of using networks. It allows a high level of flexibility as Virtual Machines (VMs) run elastically workloads on physical machines in data centers. The issue of... more
Background/Objectives: Cloud computing could be considered of vital paradigms in IT which allows services to be delivered to the users via the internet on demand and on pay as you go basis. The growing demand on cloud computing... more
This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will... more
Download research papers for free!