Cloud Environment

Alibabacloud.com offers a wide variety of articles about cloud environment, easily find your cloud environment information here online.

Research on key problems of high performance computing application in cloud environment

Research on the key problems of high performance computing application in cloud Environment Lanzhou University Ding Fan Cloud Computing provides on-demand, at-will-pay and readily scalable computing and storage resources in the form of services. Compared to the high scalability of cloud computing, the limited resources in traditional computing mode show that the demand of large scale resources can not be satisfied with the high performance computing gradually, and in addition, the large amount of computing resources in the traditional mode is idle for a long time, which causes the waste of resources, and makes the traditional high performance computing mode have high input cost, The disadvantage of inflexible use of resources. In view of this situation, in the open ...

A job transfer scheduling algorithm based on Hadoop

A kind of job transfer scheduling algorithm based on Hadoop Deng, Van Tong, Peak cloud environment Service cluster There is a problem of non-uniform distribution in job submission, which leads to the aggregation of jobs at one time, which causes the response time of the job to exceed the user tolerance range. To solve this problem, a queue based job transfer scheduling strategy (JTSA) is proposed under the Hadoop platform using two-level queue technology. The experimental results show that in the case of a sharp increase in the number of operations, the total completion time has little effect and can be more significant ...

Research on proof model of data holding in cloud storage

Research on the proof model of data holding in cloud storage the Liu Huanan of Zhengzhou University, as the next-generation architecture of the IT industry, cloud computing is more than simply putting applications and databases in a centralized large-scale data center, but with greater flexibility, allowing arbitrary endpoints to participate in cloud service interactions, This is reflected in cloud storage services: entities that provide storage services may be the integration of a variety of providers. This heterogeneous new feature and the incomplete credibility of the storage provider makes it possible to prove the data holdings in the cloud environment.

Cloud computing internal threats: a mitigation measure to study risk and risk

Security is often a top priority when planning to invest in cloud-based technologies. Of course, in a cloud environment, technology is often outside the network boundaries of an enterprise, so users can use resources instead of physical racks, servers, power systems, and other related devices. One important issue to be sure of is that critical data such as customer data, medical records, and intellectual property rights are not affected by other customer systems and data files. In this article, we will look at another security issue in the Enterprise Cloud environment: internal threats. We will explore deliberate (planned) attacks and accidents based on cloud-critical resources (...).

Research and application of access control mechanism in cloud computing environment

Research and application of access control mechanism in cloud computing environment University Li Shigang based on the research of traditional access control technology, this paper analyzes the application requirements of access control technology in cloud computing environment. Aiming at the problem of virtual machine security and privilege management in cloud computing environment, a security solution based on access control technology is proposed and implemented. The main work is as follows: 1. This paper studies the application status of the traditional access control technology, analyzes the application status of the access control technology in cloud environment, analyzes its characteristics and analyzes the new requirements under the cloud computing environment. 2. For virtual machine security isolation, ...

Single mixed cloud computing in modern economy

scalability, availability, and accessibility will always be the backbone of cloud computing.   But where does the next cost-efficiency boost come from? The answer is not an entirely new concept, but rather the integration of two existing cloud technologies, such as public and private, to create the next great innovation: a hybrid cloud environment with proprietary patches. Hybrid cloud enables companies to collaborate on strategies for public and private infrastructure, rather than isolating them. Private patching connects these different cloud environments without expensive public IP lines, offering many benefits to your business, not just ...

Foreign information security experts: Cloud security concerns are exaggerated

According to foreign media reports, experts attending a subcommittee meeting at the RSA security conference this week said cloud security concerns were exaggerated. Now worry about cloud security is just like the worry of virtualization technology earlier. Concerns about security should not discourage businesses from using public cloud services. If you choose the right cloud service provider, most enterprise workloads and data can be safely migrated to the cloud environment. 498) this.width=498 ' OnMouseWheel = ' javascript:return big.

[Document] A way of managing protocol heterogeneity in a cloud environment

An approach to Manage Policy heterogeneity in Cloud Computing Environnement Hassan Takabi James B. Joshi in this monitors, we int Roduce Policy Management as a Service (Pmaas), a C ...

Experts say cloud security concerns are exaggerated

According to foreign media reports, experts attending a subcommittee meeting at the RSA security conference this week said cloud security concerns were exaggerated. Now worry about cloud security is just like the worry of virtualization technology earlier. Concerns about security should not discourage businesses from using public cloud services.   If you choose the right cloud service provider, most enterprise workloads and data can be safely migrated to the cloud environment. The Subcommittee believes that at present, security concerns remain a major impediment to the application of cloud services by many large enterprises. This concern comes mainly from thinking about moving to cloud services ...

Keep enterprise data secure in the public cloud environment

Considering the maturity of IT outsourcing services, enterprises will naturally choose public cloud computing services in order to achieve greater cost savings and resource utilization. That is not the case. The security questioning of public cloud services is the main reason why enterprises dare not adopt public cloud service.   For most businesses, the risk of data security makes them very fearful. This article will outline why companies should adopt public cloud services for better benefits, and what are the key security issues and challenges facing the adoption of public cloud services, as well as in ...

"Foreign rivals" private armies cloud environment how we live

With the continuous maturation and rapid development of cloud computing technology, more and more manufacturers and enterprises at home and abroad began to pay attention to and pro-Pro, we all come to try cloud computing to bring us efficiency of the promotion, as well as the convenience of life. Referring to cloud computing, I think today's cloud computing industry has been approaching maturity, the "red Flame battlefield" has become the major manufacturers of the military battleground, throughout the domestic and foreign cloud computing enterprises, Amazon, Google, Microsoft, Huawei, Alibaba and so countless, compared to foreign countries, especially the United States, Our domestic cloud computing technology still has a ...

Cloud Application Security Development best Practices: protecting Cloud Application Security

Cloud computing is useful because it provides a new way for it to leverage shared resources to maximize productivity and cut spending. But the new approach also poses new threats. How do we minimize the risk of such an environment? The Cloud Security alliance and Safecode work together to develop a set of best practices for application development to meet the unique security requirements of cloud computing. Eventually they released the best practices for cloud application security development, which lists ways to develop secure code in a cloud environment. "In order for cloud computing to play its real potential, users and suppliers are ...

Research and implementation of access control subsystem based on attribute encryption in cloud storage

Research and realization of access control subsystem based on attribute encryption in cloud storage Sun Youpeng because of the complexity of the cloud environment, the various entities are not trusted, so password access control technology to prevent user data leakage is the most direct means. In recent years, the academia has introduced the attribute-based encryption system in the access control, which is a method developed on the basis of identity encryption. This paper chooses the access control technology in cloud storage as the research direction, and deeply analyzes some problems of access control technology based on attribute encryption. Including the lack of access policy expression, permission to withdraw ...

How safe is your cloud computing?

Attackers are targeting cloud computing.     At present, the number of attacks on cloud computing has reached the same level as the internal deployment environment.   According to a new report, increasing cloud adoption will drive cyber attackers to target the cloud environment, and the current amount of attack is almost equivalent to the amount of attack in the internal deployment environment.   According to a survey of 2,200 consumers by alert logic, a strong attack on the cloud computing environment increased from 30% to 44%, while vulnerability scans increased from 27% to 44%. Last year, 49% ...

IaaS Cloud Security: How much does user responsibility know

As companies continue to enter the cloud, it is important to define responsibility by choosing a cloud vendor and signing a contract with the manufacturer. Most cloud environments are characterized by shared security responsibilities and form a continuum. For SaaS environments, SaaS providers assume most of the responsibility. For an infrastructure that is a service (IaaS) or a platform that is a service (PaaS) environment, the vendor's responsibilities are smaller and the customer's is larger. In the IaaS cloud environment (for simplicity, this article will combine IaaS and PAAs), vendors provide the core infrastructure. Which means the basic network ...

Three sides start to reduce cloud security worries

Cloud computing can accelerate it responsiveness to changing needs.   However, cloud computing data management has been extended to the service provider's infrastructure, and the traditional it operating model is incompatible with cloud integration, which complicates the problem. Through HP's new consulting service, it provides a comprehensive approach to building a secure cloud strategy while assessing storage requirements for managing data in the cloud effectively.   These services include best practices, management scenarios, and cloud simulations to train customers to successfully protect and store data in a cloud environment. Use protective clouds ...

Index evaluation design and influence analysis of cloud supply chain

Index evaluation design and influence analysis of cloud supply chain Zhang Yajing Lin Yiu Jinyuan The characteristics of supply chain activities under cloud service environment, a quantitative evaluation index system based on 6 dimensions of service time, service quality, service cost, availability, trust and information is proposed for dynamic, combinatorial and uncertainty. The mathematical model of dimension attribute and quantization suitable for cloud environment is designed, and the evaluation function which is suitable for the activity of cloud supply chain is constructed. In an activity-oriented service resource combination dimension evaluation case, the statistical tool is used to analyze the impact ...

Intel, McAfee is developing cloud security strategy

May 4, Intel and McAfee executives explained the work they were doing. The job is to provide an enterprise with a way to ensure data security stored in a public or mixed cloud environment. Intel acquired McAfee last year to enhance its security technology. Jason Waxman, general manager of the Intel Cloud Infrastructure Division, and Cutler, vice president of McAfee Network Security, Greg the ongoing strategy. The strategy is to give IT administrators a better understanding of ...

Typical threats to cloud computing

For the healthy development of cloud computing and the smooth advancement of rank protection in the new situation, we cannot ignore the research and analysis of the various security threats faced by cloud computing, and formulate and establish corresponding level protection policies and technical systems to deal with the impending cloud wave. In the cloud environment, in addition to the traditional significance of the various security threats, there are new business models pose new threats. 1 escape threat and covert channel escape threat is the premise of control of a virtualized application (VM), through the use of various virtual system security vulnerabilities, further expand infiltration to hypervisor and even other V ...

[Patent] Profit maximization under cloud environment

Patent] Maximizing efficiency in a cloud computing environnement James C.FLETCHR temp_12060508102767.pdf

Total Pages: 11 1 2 3 4 5 6 .... 11 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.