It In The Cloud

Read about it in the cloud, The latest news, videos, and discussion topics about it in the cloud from alibabacloud.com

The basic problems of security management and enterprise risk control in cloud computing

In cloud computing, effective security management and enterprise risk control are obtained from the process of good development of information security and safety management, which is the attention of the Organization's overall enterprise security management responsibility.   A well developed information security and safety management process enables information security management processes to be scalable, repeatable, measurable, sustainable, defensible, sustainable, and cost-effective in the organization. The basic issues of security management and enterprise risk control in cloud computing are related to identifying and implementing appropriate organizational structures, processes and controls to maintain effective information security and safety management, risk management and compliance.

Research on data security in cloud computing security

Research on data security in cloud computing Security University Zheng This paper focuses on the cloud in this particular environment of data security issues for in-depth research, mainly do the following two aspects of work: 1. For security issues such as protecting the privacy of user queries and data confidentiality, by analyzing the advantages and disadvantages of existing schemes, combining cryptography theory, an improved scheme is proposed for a data retrieval scheme based on all-homomorphic encryption, which can not only guarantee the user's data not to be leaked, but also ensure the privacy of the user's query process. ...

Protection of trade secret in cloud computing environment

The protection of trade secret under cloud computing environment Zhou Minghuan in cloud computing environment, the protection of trade secret is confronted with some special problems related to cloud computing mode and network technology, such as the existence form of trade secret, tort manifestation, tort characteristic, security hidden danger and so on, for this reason, It is necessary to adopt some security secrecy technology and system measures, and there are many misunderstandings about the protection of cloud computing trade secret. Protection of trade secret in cloud computing environment

How to avoid coding errors in cloud computing I'll teach you to fix it.

Last week, we described how to evaluate the code used to extend cloud applications. Now, we're going to look at the coding and system-change strategies that are likely to make the system more vulnerable over time. Because of the seemingly never-ending development requirements of the CRM system, the durability of our code will be a key factor in the long-term smooth running of these systems. But before I begin, I need to declare that the usages and terms I cite apply only to the salesforce.com environment, and that other applications and platforms use different types of association ...

Application of CRM in cloud computing

The emergence of CRM, changed the past customer data dispersed, customer management complex and cumbersome situation, but also to enable enterprises to customer data, product information, employee data to achieve a unified. Since the 1990s, CRM's management concept and operation system have been rapidly accepted by the business community and widely used in large enterprises, but how to apply CRM effectively is a very important research topic for the small and medium-sized enterprises that account for more than 90% of the total enterprise. This is not only because of the large number of small and medium-sized enterprises, the national economy has a significant impact, but also because this is the survival and development of SMEs within ...

not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us

Research on carbon emission management based on information resource allocation in cloud environment

Research on carbon emission management based on information resource allocation in cloud environment she Li Feifei Shu first outlines the concept of carbon footprint, compares the development and practice of carbon footprint in various countries, and builds a carbon management system by building capacity maturity models embedded in carbon administration. Then, the simulation case of Amazon cloud service is used to analyze the allocation efficiency of information resources, and to calculate the reduced carbon emissions by optimizing the allocation of information resources. Finally, according to the information resources under the cloud environment, the paper puts forward some suggestions to promote Low-carbon green management. Research on carbon emission management based on information resource allocation in cloud environment.

[Document] Fast real-time migration of virtual machines in cloud computing environment

A fast real-time migration method for virtual machines in cloud computing environment Pegasus, Feng, Li Zhui. In this paper, a fast real time migration method of virtual machine is proposed for the long time migration of virtual machines in cloud computing data center. By formulaic description and performance analysis of the pre copy model, the page bitmap used to mark the changed pages of memory is added in the pre-copy method. During the migration process, the frequently changed memory pages are judged, and the pages that have changed frequently are marked in the new page bitmap and transmitted only in the last iteration. Experimental results show that with the traditional pre-handcuff ...

CT-RBAC: An access control model in cloud computing environment

CT-RBAC: An access control model in cloud computing environment Changlingxia Wang Zhao Lianjun Microelectronics and Computers, Microelectronics & Computer, 2014 06 Ct-rbac: An access control model in cloud computing environment

Ant colony Optimization: Load Balancing solution in cloud computing

Ant Colony Optimization:a Solution of Load balancing in Cloud Ratan-Mishra and Anant Jaiswal in-monitors we are proposing A m Ethod based on Ant Colony optimization to resolve the p ...

Research on data access control method in cloud computing

Research on data access control method in cloud computing Nanjing University of Posts and telecommunications This paper proposes an attribute-based access control model (DACC) for cloud computing environment using CP-ABE encryption algorithm. The core idea is to use the AES symmetric encryption algorithm and the Cp-abe encryption algorithm, respectively to encrypt the data and symmetric key, and the user of the attribute matching to decrypt the key cipher text and the data cipher in sequence. In order to reduce the cost of storing and updating keys, the Key Distribution center KDC is introduced to manage attributes and keys. Cloud computing Service Provider ...

Research on ciphertext search technology in cloud environment

Research on ciphertext search technology in cloud environment Beijing, Beijing, China posts a new and efficient method for searching public key Cryptography (Nscf-peck) is proposed in this paper. The scheme is based on bilinear pair structure and uses public channel to transmit ciphertext. In the design of the whole algorithm, only two times bilinear pair operation is used, which greatly reduces the computational expenditure of the searchable public key cryptography. Meanwhile, using public channel to transmit encrypted data between client and cloud server reduces the cost of constructing secure channel. Finally, this paper proves that nscf-pec ...

Competition and cooperation in cloud Computing's three main camps

Cloud computing has never lacked the participation of large Internet companies, and with the development of cloud computing, the field has initially formed three major competing camps, the Internet camp, the It camp, and the telecom operators ' camp. The Internet camp is led by the foreign Amazon and domestic bat, mainly for the public cloud market, the IT camp mainly in IBM, HP, Huawei and other representatives, mainly for the enterprise-class customers; Finally, the main representatives of the telecom operators ' camp are at&t and the three major domestic operators,   This article comes from Internet weekly. At present, the cloud computing industry ...

Research on service delivery problem of multilayer application in cloud

Research on service delivery problem of multi-layered application in cloud Shandong Zhang Sweet This paper presents the challenges faced by multi-tier application service delivery in the cloud, this paper mainly studies: 1, constructs the on-line monitoring structure, carries on the monitoring to the Multi-layer application each layer load distribution, and proposes the forecast method based on the autoregressive model to forecast the application load, It solves the problem of dependency complexity between layers of multi-layer application, and monitors the service characteristics of each layer, which solves the complexity of service characteristics between layers of multilayer application. 2, the application of queuing theory to deploy multi-layer application of the resources of each layer to model, to solve the resources of ...

Partner selection model of dynamic virtual enterprise in cloud computing environment

Dynamic Virtual Enterprise Partner selection model under cloud computing environment Zhang Yiwen Yu Zhiwei Songjie The massive enterprise information retrieval in the Internet and the establishment and management of the virtual enterprise UDDI have become the serious obstacles for the small and medium-sized enterprises to set up virtual enterprises. Cloud computing provides virtualized resource computing patterns through the Internet, enabling businesses to quickly deploy resources and access information services, making it possible for SMEs to create business alliances at fast and low cost. This paper proposes a dynamic virtual Enterprise partner selection model under cloud computing environment, and adopts parallel filtering mechanism to reduce the problem solving space.

2013 Hot topics in cloud computing: Big Data analysis and Cloudstack

As cloud computing moves from test to production, the real world is increasingly focused on the details of cloud computing. We found the trend of cloud computing in the new Year. These hot topics may not be the hottest, but 2012 years of technology, the point of interest is heating up, some cloud computing problems and the main idea we will be in 2013 years to face. Large data analysis has confirmed this year the energy of large data and the competitive advantage it can bring to enterprises. According to Gartner, the impact of big data in the 2013 was only expanded through research on the web. ...

Radware: The five most urgent security problems in cloud computing

As companies continue to accelerate the pace of cloud technology, using new technologies such as infrastructure, Service (IaaS) or software as a service (SaaS), the need for solutions to secure access and reliable operations in the cloud architecture is becoming increasingly evident. It now appears that, as enterprise data is kept in different devices, which are provided by different providers or partners, the enterprise must monitor and protect the new "security boundaries". Similarly, carefully weighing how to protect cloud-based data should be incorporated into the enterprise's context as part of the overall security strategy for the enterprise. and protect ...

Research on digital library data management strategy based on user experience in cloud computing environment

Research on digital library data management strategy based on user experience in cloud computing environment Chen Sen GAO Library theory and practice, libraries germ and Practice, the research of Digital library data management strategy in the 2014 05 cloud computing environment

A multi-device file synchronization algorithm in cloud environment

A multi-device file synchronization algorithm in cloud environment Liu Shujun, Chang, Frankfurt Cloud Environment, the client and cloud show a dynamic star topology, the client anytime, anywhere online, off-line dynamic characteristics, so that maintaining user data in the consistency between multiple replicas becomes complex. In this paper, a real-time automatic file synchronization algorithm based on file metadata is proposed, and a cloud network client prototype program is realized by calling the open API provided by Peng Yun T disk and combining the synchronization algorithm presented in this paper. A multi-device file synchronization algorithm in cloud environment

Research on key technologies of mobile file storage and spatio-temporal data analysis in cloud environment

Research on key technologies of mobile file storage and spatio-temporal data analysis in cloud environment the research work and innovation of the National Defense University of Science and Technology (Mao Hua) are as follows: (1) a seamless and unified access method for heterogeneous cloud storage services based on file system is proposed Wukong. At present, different cloud storage service access interfaces vary, because of the lack of seamless access to a variety of cloud storage Services Unified interface, spatio-temporal data applications can not modify the direct access and use of the back-end cloud storage data. File system is widely supported by the application of a data use interface to the file system interface to encapsulate various ...

Research on key technologies of water quality safety Service platform in cloud environment

Research on key technology of water quality safety Service platform in Cloud environment Zhejiang University Guo Sheng This paper uses cloud computing technology to construct water quality Safety Service platform, the integration of heterogeneous water quality information data, high performance parallel computation and remote simulation of water quality model are realized through the construction of distributed data resource layer, virtual computing resource layer and visualized water quality simulation rendering module. , water quality information and early warning information visualization. The main research contents and achievements are as follows: (1) The function requirement analysis of water quality Safety Service platform is completed, and the Water Quality Safety Service platform based on cloud computing technology is finished.

Total Pages: 15 1 .... 5 6 7 8 9 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us
not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.