Ms In Cloud Computing

Want to know ms in cloud computing? we have a huge selection of ms in cloud computing information on alibabacloud.com

Research on digital library data management strategy based on user experience in cloud computing environment

Research on digital library data management strategy based on user experience in cloud computing environment Chen Sen GAO Library theory and practice, libraries germ and Practice, the research of Digital library data management strategy in the 2014 05 cloud computing environment

CT-RBAC: An access control model in cloud computing environment

CT-RBAC: An access control model in cloud computing environment Changlingxia Wang Zhao Lianjun Microelectronics and Computers, Microelectronics & Computer, 2014 06 Ct-rbac: An access control model in cloud computing environment

Research on parallel Gauss elimination method in cloud computing platform

Research on cloud computing platform based on parallel Gaussian elimination Pan Xiaohui in order to solve the problem that the Gaussian elimination algorithm of the serial partial selected principal element cannot make full use of the multi-core processor, a Gaussian elimination algorithm of the partial selected principal element of parallel multithreading is proposed and implemented, and the whole algorithm is analyzed and optimized, The storage layout of the data and the pattern of the algorithm are matched, which greatly improves the performance of the program. By comparing and analyzing the experimental results on the local Linux server and the various platforms of Amazon EC2 Cloud, the Gaussian elimination algorithm of the partial selected principal element is greatly affected by the cache, so it is in CP ...

Research on data security related problems in cloud computing

Research on data security related problems in cloud computing Nanjing University of Posts and Telecommunications Zhou This paper presents a key/value data storage model to store data, and then through the relevant data backup and isolation mechanism to ensure data security storage. In order to improve the security of data transmission, an improved hybrid encryption algorithm is proposed for data transmission outside the cloud. Aiming at the efficiency of data processing in the service model, based on the cloud computing platform and the load balancing mechanism used in the cluster, this paper presents a distributed load balancing algorithm under the cloud computing platform. The Count ...

Research on virus propagation model in cloud computing environment

Research on virus propagation model in cloud computing environment the emergence of Chen Qiuxia Chen Hongwei Cloud security system, so that the spread of computer viruses has a certain new characteristics, virus detection and defense of the center of gravity from the user to the network and backend server groups. In view of cloud security environment, a virus propagation model based on traditional Seir model is proposed ( Seir_c). Seir_c model in the consideration of latent computer viruses in order to better control the spread of viruses on the basis of the inclusion of the user whether to participate in the cloud Security program of this attribute, the more members reported more ...

Design and implementation of information collection system in cloud computing environment

Design and implementation of information collection system in cloud computing environment Sun Fuquan This paper mainly introduces the information collection of virtual machine and monitoring control of cloud environment in the environment based on OpenStack Cloud platform, in order to achieve the commercial purpose of cloud computing. This paper analyzes the cloud platform OpenStack and virtualization technology used in the usage information Acquisition system KVM, XEN, evaluates and uses the Libvirt virtual software, web.py, JSON and other key technologies. The function and sex of the dosage information collection system.

Research and simulation of resource scheduling strategy in cloud computing environment

Research and simulation of resource scheduling strategy in cloud computing environment Zhejiang Normal University The task scheduling research content is based on the second part of Map/reduce thought, and the two aspects of virtual machine migration are worked: (1) Task Scheduling algorithm optimization, This paper focuses on how to allocate each subtask to virtual resources reasonably to improve the overall completion time of the task. Firstly, the cloud environment resource is modeled as genetic optimization and ant colony optimization task scheduling algorithm optimization problem, the task is classified, then the initial solution is obtained by the improved genetic algorithm, then the initial solution is introduced into the improved ant colony.

Analysis of data Mining application in cloud computing

Data mining application analysis of cloud computing Hebei Normal University Yun Xiaodong new sharing method, new foundation and framework, completely different service mode and service standard, this is cloud computing. Around the entire internet, to provide them with convenient, safe, fast network computing services and data storage. Compared with a single computer, the computational speed is faster, the processing method is more and faster with a large number of computer groups to complete the computation and dynamic grid processing capabilities. Combining data mining with cloud computing can provide a lot of solutions for a large number of web data mining ...

Application of Smart Grid technology in cloud computing data center

Smart Grid is the latest trend of the development of the world's energy industry, reflecting the social progress, representing the future development of the power grid. It is widely believed that the future grid should have the characteristics of high efficiency, cleanliness, safety, reliability and interaction.   Smart grids should be "stronger and smarter".   According to the research and summary of the smart grid, smart grid should have the following characteristics: the need for self-healing ability, high reliability, asset optimization management, cost-effective, user-friendly interaction with the user, compatible with a large number of distributed power access. Smart Grid as the future of power grid development ...

Legal risk in cloud computing environment

Legal risk in cloud computing environment--from the perspective of data security Xu Huili Cloud computing technology in providing people with economic, convenient service experience, but also buried a lot of legal hidden dangers. Now the economic advantage of this new technology has gone beyond people's concerns about security, and cloud services are pervasive in everyday life. Only by keeping a clear understanding of the potential legal risks that they face can the technology better benefit people's lives and reduce the negative effects of risk. Data security is one of the most urgent core issues in this field, which endangers the user's right of privacy, trade secret, copyright and other legal rights.

Virtual machine Security Strategy for printing industry ERP in cloud computing environment

Virtual machine security Strategy of printing ERP in cloud computing environment Shen Keqin Li Yunwei in the current ERP (Enterprise Resource plan) project facing the massive data processing problems, based on the advantages of cloud computing platform, developed a cloud computing environment ERP system. However, one of the major challenges facing cloud computing is the security of virtual machine systems. This paper analyzes the system factors affecting the security of virtual machines, and presents a new security solution for virtual machines, which realizes the security system under dynamic monitoring of virtual machines. To solve the traditional virtual machine easy to network ...

Document] Virtualization driven Mashup Container in Cloud Computing PaaS Model

Virtualization driven Mashup Container in Cloud Computing PaaS Model hitesh A bheda chirag S thaker This monitors highlights the Results of virtualization of mashups container through its suppo ...

Research on the service quality measurement method of cloud bank model in cloud computing environment

Research on the measurement method of cloud Bank model service quality in cloud computing environment Yunnan University Chen Zhu This paper focuses on the cloud Bank model service Quality measurement method, which is mainly used to solve the cloud Bank model service quality metrics. Mainly from the cloud banking service availability, performance, security, utilization, reliability, throughput rate of six aspects of cloud banking service quality measurement. At the end of this thesis, we use the Cloudsim simulation platform to do a simple simulation experiment on the service quality measurement method, verify the validity of the method, and realize the measurement of the service quality of cloud Bank model. ...

Research on application of grid file storage in cloud computing environment

Research on the application of grid file storage in cloud computing environment Liu Youan, Roming the grid storage hierarchy and designed the prototype of network file storage System, aiming at the growing problem of massive file data management in Internet application. This paper compares the similarities and differences of cloud storage and network storage, designs the data storage process of grid file based on security authentication, uses name service to solve the problem of unified view of grid file, and uses redundant storage strategy to solve the problem of data storage reliability. Compared with traditional data center mode storage structure, the new system has higher availability. This storage application can be used for data management in energy power systems and ...

Research on user behavior habit verification model in cloud computing

Research on user behavior habit verification model in cloud computing Guo Fuliang Zhou Gang Chi Liang based on the analysis of cloud computing security status, this paper establishes a user behavior verification model based on stochastic network model to introduce the behavior habit of user accessing resource or invoking service mainly includes the choice probability deviation degree and the service occupation time two Measure this model to use user access habits for authentication in order to access user resources and invoke service behavior is an effective cloud computing user behavior Verification technology and case analysis shows that it has good practicability. Cloud meter ...

"Big Data" in cloud computing

The data center is becoming the "information power plant" of the new era and becoming the infrastructure of knowledge economy. Over the past year, "Big Data" is becoming a hot topic. The development of information technology in half a century mainly solves the storage, processing and application of "structural" data in cloud computing. The characteristics of "structural" data are like you go to the bank to access money, the bank's computer system records your name, after the name is your access to the amount of money, time, type and other information. These data are characterized by "strong logic" and each "cause" has "fruit". However, in real society, a lot of data is actually not "obvious ..."

Key Technologies in cloud computing

1 Virtualization Technology Virtualization technology refers to the computational components on a virtual basis rather than the real basis of the operation, it can expand the capacity of the hardware, simplifying the software reconfiguration process, reduce the related cost of software virtual machines and support a wider range of operating systems. Virtualization technology enables software applications to be isolated from the underlying hardware, which includes splitting patterns that divide individual resources into multiple virtual resources, as well as aggregation patterns that integrate multiple resources into a single virtual resource. Virtualization Technology based on ...

Research on security evaluation model of IAAS layer in cloud computing system

Study on the security evaluation model of IAAS layer in cloud computing system the Li Chuanlong of Inner Mongolia Agricultural University is as follows: (1) This paper summarizes the cloud computing security Service and technology support and cloud computing standards at home and abroad, and studies the key technologies of the IAAS layer, and compares the existing two open source cloud platforms. To find out its pros and cons. (2) detailed analysis of the Cloud Safety Alliance (Cloud Security ALLIANCE,CSA) of the nine threats, at the same time the IAAS layer of the unique threat of detailed adjustment ...

Cisco's interest in cloud computing will build its own storage cloud

Cisco has a lot of interest in cloud computing and will build its own computing or storage cloud, according to foreign media sources at its press conference,-cisco live. Compete with vendors like Amazon, IBM, Oracle and Sun, which are building their own cloud, as every telecoms company, service provider, and Internet hosting company do.     The entire IT world is not just about cloud-like Earth, but also clouds like Venus, or at least the eddy that forms Jupiter. ...

Microsoft Feng: The New World in cloud computing and the big Data age

October 25, 2012 cloud Computing Architect Summit held in Beijing. In recent years, it technology and the development of the Internet has affected the whole industry pattern, bringing new and fresh business model. In the face of these changes, this Conference invited the Baiyu industry elite for IT technology development and application of practical experience and other hot topics for in-depth discussion. Mr. Feng, director of the China Cloud Computing Innovation Center at Microsoft Asia-Pacific Research and Development Group, delivered a wonderful speech on the theme of "A New world of Big Data", and the following is a transcript of the speech: Today I am delighted to have such an opportunity to lead with you, as well as the IT industry.

Total Pages: 15 1 .... 4 5 6 7 8 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.