The new generation of networks, distributed systems, grid computing, which allows users to share files and Users need to use different sources to provide. Grid computing system as one of the competing technologies for cloud computing can be considered to have many advantages for users. One goal of grid computing systems, the management of computing resources for processing user applications or clients So that the resulting high quality of service, lower costs and greater flexibility is. In this paper, to solve the scheduling problem in grid computing system combining genetic algorithms and algorithms of gravity is used.
Cloud computing technology is a rapidly growing field of study, which relies on sharing computing resources rather than having local servers or personal devices to handle applications. Most of the growth in this field is due to transfer of the traditional model of IT services to a novel model of cloud and the ubiquity of access to electronic and digital devices. Cloud computing posed a critical risk and challenges to digital investigators, but provides plenty of opportunities to investigators for improving the digital forensics. Moreover, cloud service providers and customers have yet to establish adequate forensic capabilities that could support investigations of criminal activities in the cloud. Notwithstanding the cloud presents some promising technical and economic benefits, users still resist to use cloud mainly due to security issues because it poses a challenge in doing cloud forensic investigations. Regarding this some research has been done, which propose solutions in doing forensic investigation. In this review paper, we take the first step towards reviewing the cloud forensics works that have been done by other researchers, and then do some discussion and analysis based on our findings to consider the opportunities and challenges confront the cloud forensics based on our findings.
The mobile cloud storage application becomes more ubiquities recently for storing data such as image, audio, text files and etc. The most important issue in this regard is security of these tools and using the best method for encrypting the users' data for keeping them protected. In this study, we examine ten mobile cloud storage applications namely 4Shared, One Drive, Mega, Surdoc, Cubby, ADrive, Safe Sync, Team Drive, Wuala and Just Cloud. In these applications, we analyze the intercepted communications to determine encryption of the captured text and voice communication to bring out the results to find out the best cloud application that follows the encryption methods mostly. Thus, we use a histogram to analysis the text file and use a Wire shark to check whether a plaintext has been found in the cloud storage application or not, after that we analyze the plain text.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.