3 research outputs found

    Recent Developments in Mobile Cloud Scheduling: State-of-the-Art, Challenges and Perspectives, Journal of Telecommunications and Information Technology, 2013, nr 4

    Get PDF
    Cloud computing became recently one of the most popular multi-layer distributed computational and data processing environments with various types of services, distributed data storages and resources. With rapid development of mobile technologies, computational clouds have been transformed into the systems with dynamically changing topology and flexible infrastructure through integration with the mobile devices and mobile users as the whole system nodes and actors. The aim of this paper is to provide a comprehensive study and critical comparative analysis of the recent developments in the Mobile Clouds with a new energy optimization criterion scheduling

    From security to assurance in the cloud: a survey

    Get PDF
    The cloud computing paradigm has become a mainstream solution for the deployment of business processes and applications. In the public cloud vision, infrastructure, platform, and software services are provisioned to tenants (i.e., customers and service providers) on a pay-as-you-go basis. Cloud tenants can use cloud resources at lower prices, and higher performance and flexibility, than traditional on-premises resources, without having to care about infrastructure management. Still, cloud tenants remain concerned with the cloud's level of service and the nonfunctional properties their applications can count on. In the last few years, the research community has been focusing on the nonfunctional aspects of the cloud paradigm, among which cloud security stands out. Several approaches to security have been described and summarized in general surveys on cloud security techniques. The survey in this article focuses on the interface between cloud security and cloud security assurance. First, we provide an overview of the state of the art on cloud security. Then, we introduce the notion of cloud security assurance and analyze its growing impact on cloud security approaches. Finally, we present some recommendations for the development of next-generation cloud security and assurance solutions
    corecore