Fog and Fogonomics 2020
DOI: 10.1002/9781119501121.ch9
|View full text |Cite
|
Sign up to set email alerts
|

A Decentralized Adaptation System forQoSOptimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 69 publications
0
1
0
Order By: Relevance
“…Furthermore, blockchain technology also helps cloud computing CSPs to offer the best approach for the application developers to create a virtual database of their services and transactions with one click, just as Pay-Per-User can be used to improve the autonomy of their cloud services further since these services will be carried out through a decentralized mechanism where functionalities are performed autonomously without the intervention of central authorities. This process enhances the trustworthiness amongst the participating clients as QoS information is persistent and cannot be modified [22]. This paper explores and evaluates various cloud security issues and threats happening at multiple cloud infrastructure levels, focusing on virtualization specific threats and vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, blockchain technology also helps cloud computing CSPs to offer the best approach for the application developers to create a virtual database of their services and transactions with one click, just as Pay-Per-User can be used to improve the autonomy of their cloud services further since these services will be carried out through a decentralized mechanism where functionalities are performed autonomously without the intervention of central authorities. This process enhances the trustworthiness amongst the participating clients as QoS information is persistent and cannot be modified [22]. This paper explores and evaluates various cloud security issues and threats happening at multiple cloud infrastructure levels, focusing on virtualization specific threats and vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%