2018
DOI: 10.46298/jdmdh.4085
|View full text |Cite
|
Sign up to set email alerts
|

A Secured Data Processing Technique for Effective Utilization of Cloud Computing

Abstract: International audience Digital humanities require IT Infrastructure and sophisticated analytical tools, including datavisualization, data mining, statistics, text mining and information retrieval. Regarding funding, tobuild a local data center will necessitate substantial investments. Fortunately, there is another optionthat will help researchers take advantage of these IT services to access, use and share informationeasily. Cloud services ideally offer on-demand software and resources over the Inter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
(18 reference statements)
0
2
0
Order By: Relevance
“…In comparison, the Cloud executes the Machine Learning for data classification, using relevant information received from the Edge (HTTPS) or the CPS (MQTT); once the model returns the prediction, the result is sent, as feedback, to the DA element for visualization and reporting. Computing as a model for enabling on-demand network access to a shared pool of configurable computing resources (networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [79]. According to Birje et al, the four deployment models include public, private, hybrid, and community cloud.…”
Section: ) Artificial Intelligencementioning
confidence: 99%
“…In comparison, the Cloud executes the Machine Learning for data classification, using relevant information received from the Edge (HTTPS) or the CPS (MQTT); once the model returns the prediction, the result is sent, as feedback, to the DA element for visualization and reporting. Computing as a model for enabling on-demand network access to a shared pool of configurable computing resources (networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [79]. According to Birje et al, the four deployment models include public, private, hybrid, and community cloud.…”
Section: ) Artificial Intelligencementioning
confidence: 99%
“…This can be linked to the benefits of cloud computing, which cloud providers present to cloud consumers. These benefits include scalability, elasticity, powerful calculations, and lower service costs, despite the fact that data security is one of the roadblocks to mainstream use of cloud services [1]. Reference [3], defines data security as "a method of protecting digital data, such as data stored in a database, from attackers and unauthorised actions of unauthorized users.…”
Section: Introductionmentioning
confidence: 99%