Cloud Computing : Security Issues And Resource Allocation Policies
Abstract
Full Text:
PDFReferences
T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” 2010 24th IEEE International Conference on Advanced Information Networking and Applications(AINA), pp. 27-33, DOI= 20-23 April 2010.
Buyya, Rajkumar, Chee Shin Yeo, and Srikumar Venugopal. "Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities." In High Performance Computing and Communications, 2008. HPCC'08. 10th IEEE International Conference on, pp. 5-13. Ieee, 2008.
Marston, Sean, Zhi Li, Subhajyoti Bandyopadhyay, Juheng Zhang, and Anand Ghalsasi. "Cloud computing—The business perspective." Decision Support Systems 51, no. 1 (2011): 176-189.
Wu, Linlin, Saurabh Kumar Garg, and Rajkumar Buyya. "Sla-based resource allocation for software as a service provider (saas) in cloud computing environments." In Cluster, Cloud and Grid Computing (CCGrid), 2011 11th IEEE/ACM International Symposium on, pp. 195-204. IEEE, 2011.
S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “Cloud Computing Research and Development Trend,” In Proceedings of the 2010 Second International Conference on Future Networks (ICFN '10). IEEE Computer Society, Washington, DC, USA, pp. 93-97. DOI=10.1109/ICFN.2010.
Prasad, A.S.; Rao, S.,"A Mechanism Design Approach to Resource Procurement in Cloud Computing",IEEE,Computers, IEEE Transactions on,2014
Zuling Kang; Hongbing Wang,"A Novel Approach to Allocate Cloud Resource with Different Performance Traits",IEEE,Services Computing (SCC), 2013 IEEE International Conference on,2013
Chunguang Wang; Qingbo Wu; Yusong Tan; Deke Guo; Quanyuan Wu,"VCE-PSO: Virtual Cloud Embedding through a Meta-heuristic Approach",IEEE,High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on,2013
Rong Yu; Yan Zhang; Gjessing, S.; Wenlong Xia; Kun Yang,"Toward cloud-based vehicular networks with efficient resource management",IEEE,Network, IEEE,2013
Parikh, S.M.,"A survey on cloud computing resource allocation techniques",IEEE,Engineering (NUiCONE), 2013 Nirma University International Conference on,2013
P. Kalagiakos “Cloud Computing Learning,” 2011 5th International Conference on Application of Information and Communication Technologies (AICT), Baku pp. 1 - 4, DOI=12-14 Oct. 2011.
Sheng Di; Cho-Li Wang; Cappello, F.,"Adaptive Algorithm for Minimizing Cloud Task Length with Prediction Errors",IEEE,Cloud Computing, IEEE Transactions on,2014
Kumar, A.; Pilli, E.S.; Joshi, R.C.,"An efficient framework for resource allocation in cloud computing",IEEE,Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on,2013
Di. S.; Kondo, D.; Wang, C.,"Optimization of Composite Cloud Service Processing with Virtual Machines",IEEE,Computers, IEEE Transactions on,2014
Srinivasa, K.G.; Kumar, K.S.; Kaushik, U.S.; Srinidhi, S.; Shenvi, V.; Mishra, K.,"Game theoretic resource allocation in cloud computing",IEEE,Applications of Digital Information and Web Technologies (ICADIWT), 2014 Fifth International Conference on the,2014.
A. K. Bhardwaj, R. Mahajan and Surinder, “Improved Load Management In Cloud Environment Using MHT Algorithm”, published in, “Int’l J. of Control Theory and Applications (2016) ” Vol. 9(22), pp. 301-305.
A.K Bhardwaj, R. Mahajan and Surender, “TTP based Vivid Protocol Design for Authentication and Security for Cloud”, published in IEEE Xplore (2016); pp. 3275-3278.
A. Kumar, Surender and R. Mahajan, “A Modified Heuristic-Block Protocol Model for Privacy and Concurrency in Cloud”, Published in International Journal of Advanced Computer Science and Applications (IJACSA) (2015), Vol. 6, No. 9, Pg. 179-184.
Pawan Kumar, S. Singh and Surender Jangra, “Design and Implementation of Encryption based Data Security Algorithm for Cloud Environments ”, Published in, “Int’l J. of Control Theory and Applications (2017)”, Vol. 10, Issue No. 15, Pg. 163-171.
Vishal, Bikrampal Kaur and Surender Jangra, “Protection and Security Models for Mobile Cloud Computing: A Review” ” published in “Int’l J. of Engineering and Management Research [IJEMR]”, Vol. 7, Issue 3, May-June 2017, Pg. 695-700, ISSN (Online): 2250-0758, ISSN (Print): 2394-6962.
Naveen Garg, Sanjay Singla and Surender, “Challenges and Techniques for Testing of Big” published in the Journal, “Procedia Computer Science (Elsevier)”, 85 (2016), Pg. 940-948, DOI: 10.1016/j.procs.2016.05.285, ISSN: 1877-0509.
Surender, Sachin Kumar and Shashi Bhushan, “Study of Attacks & Countermeasures on Layers of Wireless Sensor Networks”, Published in, “Int’l J. of Control Theory and Applications”, Vol. 10 (2017), Issue No. 15, Pg. 153-162, ISSN: 0974-5572.
Sharma, P.K., Mahajan, R. & Surender, “A Security Architecture Attacks Detection and Authentication in Wireless Mess Network” Cluster Computing (2017). doi:10.1007/s10586-017-0970-9.
Parveen Kumar Sharma, Rajiv Mahajan and Surender, “Authentication based Secure Protocol using TTP for Wireless Mobile Networks” published in IEEE Explore (2016), Pg. 3286-3290.
Parveen Kumar Sharma, Rajiv Mahajan and Surender, “Trust Based Secure Routing With Authentication for Wireless Mesh”, published in, IJCTA, Vol. 9(23), 2016, Pg. 33-38, ISSN: 0974-5572.
DOI: https://doi.org/10.23956/ijarcsse/V7I7/0116
Refbacks
- There are currently no refbacks.