Published: Oct. 25, 2023
Language: Английский
Published: Oct. 25, 2023
Language: Английский
Security and Privacy, Journal Year: 2023, Volume and Issue: 6(6)
Published: April 12, 2023
Abstract It has become possible to link anything and everything the Internet in recent decades due expanding of Things (IoT). As a result, our usage technology changed lot, causing digital disruption real world. IoT allows drones, sensors, set‐top boxes, surveillance cameras, wearable technology, medical equipment be connected internet. Healthcare, manufacturing, utilities, transportation, housing are among various sectors that intelligent. Recently, we have seen surge cybersecurity challenges opportunities for improvement applications. Although extensively researched, there is dearth studies exclusively focus on evolution area AI machine learning, blockchain zero trust, lightweight security, integration with 5G networks, many more The availability environment‐capturing sensors internet‐connected tracking devices private life cloud data transmission. Therefore, significant problem researchers developers ensure CIA (Confidentiality, Integrity, Availability) security triangle people. This paper presents comprehensive study applications, challenges, architectural layer, attacks against related issues highlighted. Furthermore, along strength weaknesses existing techniques discussed detail. Our will provide insight into current research trends
Language: Английский
Citations
55The Journal of Supercomputing, Journal Year: 2024, Volume and Issue: 80(8), P. 11491 - 11555
Published: Jan. 27, 2024
Language: Английский
Citations
112022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Journal Year: 2023, Volume and Issue: unknown, P. 829 - 834
Published: Nov. 3, 2023
Cloud computing stands at the forefront of a technological revolution, fundamentally altering provisioning, utilization, and administration resources. This paper conducts comprehensive examination visionary aspects, obstacles, possibilities inherent in cloud computing. It delves deep into foundational principles distinguishing features this technology, showcasing its capacity to redefine realm information technology. Additionally, it scrutinizes hurdles encountered when embracing while spotlighting potential benefits offers both organizations individuals. By grasping effectively confronting challenges, capitalizing on opportunities hand, businesses can fully exploit computing's drive innovation, enhance operational efficiency, achieve unprecedented scalability. Our study aims offer insights emerging trends developments field
Language: Английский
Citations
142022 9th International Conference on Computing for Sustainable Global Development (INDIACom), Journal Year: 2024, Volume and Issue: unknown, P. 111 - 117
Published: Feb. 28, 2024
One of the key facets this paradigm shift is outsourcing data storage and management to third-party cloud service providers (CSPs). The auditing outsourced a crucial component since it essential upholding accountability confidence. Verification validation integrity, access control, regulatory compliance are all part auditing. loss physical control over storage, opaqueness provider operations, worries about privacy confidentiality some difficulties associated with data. This paper examines potential avenues for growth in field computing. As more businesses rely on services, critical guarantee accuracy, safety, their also provides an in-depth overview concept computing, delving into challenges, existing solutions, future directions pivotal field.
Language: Английский
Citations
4SN Computer Science, Journal Year: 2025, Volume and Issue: 6(2)
Published: Jan. 22, 2025
Language: Английский
Citations
0Future Internet, Journal Year: 2025, Volume and Issue: 17(2), P. 51 - 51
Published: Jan. 21, 2025
In cloud computing environments, the representation and management of data through workflows are crucial to ensuring efficient processing. This paper focuses on securing scientific workflow scheduling, which involves executing complex data-processing tasks with specific dependencies. The security intermediate data, often transmitted between virtual machines during execution, is critical for maintaining integrity confidentiality workflows. review analyzes methods scheduling in emphasizing application principles such as confidentiality, authentication, integrity. Various algorithms, including heuristics metaheuristics, examined their effectiveness balancing constraints like execution time cost.
Language: Английский
Citations
0Algorithms, Journal Year: 2025, Volume and Issue: 18(2), P. 99 - 99
Published: Feb. 10, 2025
Cloud computing, a superset of heterogeneous distributed allows sharing geographically dispersed resources across multiple organizations on rental basis using virtualization as per demand. In cloud workflow allocation to achieve the optimum schedule has been reported be NP-hard. This paper proposes Levelized Multiple Workflow Heterogeneous Earliest Finish Time (LMHEFT) model optimize makespan in computing environment. The two phases: task prioritization and allocation. phase begins by dividing workflows into number partitions level attribute; after that, upward rank is employed determine partition-wise order. phase, best-suited virtual machine determined offer lowest finish time for each mapping minimize task’s completion time. considers inter-task communication between cooperative tasks. A comparative performance evaluation LMHEFT conducted with competitive models from literature implemented MATLAB, i.e., earliest (HEFT) dynamic scheduling (DLS), makespan, flowtime, utilization. experimental findings indicate that surpasses HEFT DLS terms 15.51% 85.12% when varying workflows, 41.19% 86.73% depth levels, 13.74% 80.24% machines, respectively. Further statistical analysis carried out confirm hypothesis developed simulation study normality tests, homogeneity Kruskal–Wallis test.
Language: Английский
Citations
0Expert Systems with Applications, Journal Year: 2025, Volume and Issue: unknown, P. 127376 - 127376
Published: March 1, 2025
Language: Английский
Citations
0Cluster Computing, Journal Year: 2025, Volume and Issue: 28(5)
Published: April 28, 2025
Language: Английский
Citations
0Information, Journal Year: 2023, Volume and Issue: 14(11), P. 619 - 619
Published: Nov. 19, 2023
With the proliferation of IoT devices, there has been exponential growth in data generation, placing substantial demands on both cloud computing (CC) and internet infrastructure. CC, renowned for its scalability virtual resource provisioning, is paramount importance e-commerce applications. However, dynamic nature services introduces unique challenges, notably establishment service-level agreements (SLAs) continuous monitoring compliance. This paper presents a versatile framework adaptation applications to CC environments. It comprehensive set metrics designed support SLAs by enabling periodic assessments, ensuring alignment with objectives (SLOs). policy-driven approach seeks automate management era thereby reducing dependency extensive human intervention culminates case study that demonstrates practical utilization policies resources. Furthermore, it provides valuable insights into requisites deploying within realms CC. holistic holds potential streamline administration services, ultimately enhancing their efficiency reliability.
Language: Английский
Citations
9