2018
DOI: 10.1016/j.future.2018.04.005
|View full text |Cite
|
Sign up to set email alerts
|

A heterogeneous mobile cloud computing model for hybrid clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 47 publications
0
15
0
Order By: Relevance
“…Paper Year Research Result [9] 2015 Secure and resolve data security problem on cloud computing by AES [20] 2019 Secure data and reduce traffic time by AES encryption [21] 2018 Heterogeneous model on cloud computing is able to give data security contribution [22] 2019 Big volumes of private data are collected and need to be secured in cloud [23] 2019 Security modeling on cloud computing to prevent data theft [24] 2019 Symmetric encryption scheme is implemented in client before data is uploaded to cloud computing [25] 2017 Usages of authentication and cryptographic for future security on cloud computing operating system [26] 2015 Data security problem in distributed data system proposing SHA-1 algorithm to secure data…”
Section: Previous Studies Of Aes Encryption On Cloud Computingmentioning
confidence: 99%
“…Paper Year Research Result [9] 2015 Secure and resolve data security problem on cloud computing by AES [20] 2019 Secure data and reduce traffic time by AES encryption [21] 2018 Heterogeneous model on cloud computing is able to give data security contribution [22] 2019 Big volumes of private data are collected and need to be secured in cloud [23] 2019 Security modeling on cloud computing to prevent data theft [24] 2019 Symmetric encryption scheme is implemented in client before data is uploaded to cloud computing [25] 2017 Usages of authentication and cryptographic for future security on cloud computing operating system [26] 2015 Data security problem in distributed data system proposing SHA-1 algorithm to secure data…”
Section: Previous Studies Of Aes Encryption On Cloud Computingmentioning
confidence: 99%
“…This can have an enormous consequence on the business and potentially human lives as well. Orga-nizations use cloud services to avoid huge investments [12], like creating and maintaining their own DCs. They consume resources created by cloud providers [13] and pay for usage time -the "pay as you go", model.…”
Section: Introductionmentioning
confidence: 99%
“…Process mining‐controlled scheduling is an option worth pursuing when executing data‐intensive applications in the hybrid cloud to comply with some given business constraints and meeting given QoS related deadlines. Related works in scheduling and cloud resource provisioning employ techniques such as load‐awareness, 14 parallelism‐awareness, 15 structure‐awareness 16 to aid in task scheduling, and middle‐ware tooling 17,18 . Data‐awareness (sensitivity) but not process‐awareness is considered in Oktay et al 6 From our best literature search efforts, no work specifically combines data sensitivity and process‐awareness in task scheduling.…”
Section: Introductionmentioning
confidence: 99%
“…Related works in scheduling and cloud resource provisioning employ techniques such as load-awareness, 14 parallelism-awareness, 15 structure-awareness 16 to aid in task scheduling, and middle-ware tooling. 17,18 Data-awareness (sensitivity) but not process-awareness is considered in Oktay et al 6 From our best literature search efforts, no work specifically combines data sensitivity and process-awareness in task scheduling. Put together, the challenges facing business rule constrained scheduling in the hybrid cloud can be enumerated as:…”
Section: Introductionmentioning
confidence: 99%