• No results found

Cloud Service Provider

SECURITY CHALLENGES ENCOUNTER BY CLOUD USER AND CLOUD SERVICE PROVIDER (CSP)

SECURITY CHALLENGES ENCOUNTER BY CLOUD USER AND CLOUD SERVICE PROVIDER (CSP)

... in cloud computing, all the security measurements that needed in traditional computing are applicable in cloud environment also ...and cloud computing can help companies accomplish more by breaking ...

7

A Profit Maximization Mechanism for Cloud Service Provider and Its Users

A Profit Maximization Mechanism for Cloud Service Provider and Its Users

... A cloud pro communities see point advantage is a champion among the most basic examinations and it is principally directed by the plan of a cloud advantage organize under given market ...: Cloud ...

7

Protection of virtual machine deployment at a cloud service provider  through tpm

Protection of virtual machine deployment at a cloud service provider through tpm

... An attempt has been made through this study to report the activity concentrations of natural radionucleides such as 226Ra, 232Th, and 40K in some locally manufactured and commercially av[r] ...

5

DEVELOPING A HIGH PERFORMANCE REAL TIME PEOPLE DETECTION SYSTEM

DEVELOPING A HIGH PERFORMANCE REAL TIME PEOPLE DETECTION SYSTEM

... the cloud computing architecture are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service ...and cloud service provider. ...

7

Scalable and Flexible Access Control with Secure
          Data Auditing in Cloud Computing

Scalable and Flexible Access Control with Secure Data Auditing in Cloud Computing

... the cloud service provider is usually a commercial enterprise which cannot be totally ...of cloud storage ...a cloud is needed to restrict access of protected medical record to eligible ...

6

Switching among Clouds: An Approach to Ensure Cloud Service Portability

Switching among Clouds: An Approach to Ensure Cloud Service Portability

... of cloud services has been the major issue of concern among the IT ...complex service level agreements are still affecting the majority of IT sector from adapting this widely emerging ...the cloud ...

5

Enhanced Privacy for Cloud Storage Using Cued Click Points for Regenerating Code

Enhanced Privacy for Cloud Storage Using Cued Click Points for Regenerating Code

... Recently, cloud computing is receiving more and more attentions, from both industrial and academic ...community. Cloud computing separates usage of IT resources from their management and maintenance, so ...

7

COST EFFECTUAL RESOURCE PROVISIONING USING IOVMA AND SUPERLATIVE INTEGER PROGRAMMING

COST EFFECTUAL RESOURCE PROVISIONING USING IOVMA AND SUPERLATIVE INTEGER PROGRAMMING

... in cloud computing is done based on client registration using services present in cloud ...in cloud computing. For resource provisioning in cloud two mechanisms are ...the cloud there ...

8

A SECURE AND PRIVACY ASSURED MULTI CLOUD ARCHITECTURE

A SECURE AND PRIVACY ASSURED MULTI CLOUD ARCHITECTURE

... the cloud service provider and attacks on cloud interfaces to misusing the cloud data for attacks on other cloud ...the cloud computing prototype indirectly contains is ...

5

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... Fig. 1 shows [8] that how users can connect to the cloud services which are provided by cloud service provider by using any device over the internet. It includes scalable resources in ...

9

Consistency As A Service: Maintaining Cloud Cloud Consistency Using Auditing

Consistency As A Service: Maintaining Cloud Cloud Consistency Using Auditing

... The cloud service provider popularly known as CSP promising the users data is going to be available as 24/7, and they can access it ...this service or ...

12

AN Effective Handling of Credibility and Reputation Based Trust Management for Cloud Services for Cloud Data Security

AN Effective Handling of Credibility and Reputation Based Trust Management for Cloud Services for Cloud Data Security

... in cloud computing and a very active research area ...security-aware cloud architecture where trust negotiation and data coloring techniques are used to support the cloud service ...

8

Security Authentication of Cloud Service Consumers using subscribed user Identity in Federated Clouds

Security Authentication of Cloud Service Consumers using subscribed user Identity in Federated Clouds

... the cloud federation architecture is designed that the central cloud federation server does more workload on the central cloud federation management system and ...the cloud service ...

6

An Objective of Service Level Agreement (SLA) in Cloud Computing Environment

An Objective of Service Level Agreement (SLA) in Cloud Computing Environment

... the service provider when the SLA is violated, the definition and at last periodicity of the reports associated with service to be delivered to the service ...the service ...

10

Distributed Information Accountability Using Jar File and Log File Concepts

Distributed Information Accountability Using Jar File and Log File Concepts

... in cloud; other user can’t read the respective users data without having ...the service level agreements made at the time they sign on for services in the ...direct cloud service ...

8

Microsoft Azure v/s Amazon AWS Cloud Services: A Comparative Study

Microsoft Azure v/s Amazon AWS Cloud Services: A Comparative Study

... Amazon Web Services and Microsoft Azure are often regarded as the leading infrastructure as a service clouds. In this paper, we have given brief details of Amazon and Microsoft Azure Cloud and it is very ...

5

Authorized Public Auditing of Dynamic Storage on Cloud with Efficient Verifiable Fine Grained Updates with MHT

Authorized Public Auditing of Dynamic Storage on Cloud with Efficient Verifiable Fine Grained Updates with MHT

... is Cloud Computing. Cloud storage servers plays an important role in the technology buzz – cloud computing where clients can store their data at cloud servers and can access this data from ...

8

OPTIMIZING COMMUNICATION AND COOLING COSTS IN HPC DATA CENTER

OPTIMIZING COMMUNICATION AND COOLING COSTS IN HPC DATA CENTER

... and cloud, Recent years have seen the massive migration of enterprise applications to the ...cloud. Cloud computing used in business organizations and educational ...by cloud applications is ...

12

Revenue Maximization with Good Quality of Service in Cloud Computing

Revenue Maximization with Good Quality of Service in Cloud Computing

... In cloud model, client, cloud service provider and infrastructure provider are ...a service the main aim of cloud service provider is how to gain profit with ...

6

Multi-way Authentication Scheme for User Verification in  Cloud-Web Services

Multi-way Authentication Scheme for User Verification in Cloud-Web Services

... a cloud based system provides a business the processing power to work efficiently through their peak data intensive processes, and save money by paying for only as much power as they need for less intensive ...

6

Show all 10000 documents...

Related subjects