2011 Third International Conference on Intelligent Human-Machine Systems and Cybernetics 2011
DOI: 10.1109/ihmsc.2011.109
|View full text |Cite
|
Sign up to set email alerts
|

Design and Research on Private Cloud Computing Architecture to Support Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 34 publications
(22 citation statements)
references
References 4 publications
0
22
0
Order By: Relevance
“…Instead of getting programming in a boxed course of action, the client can buy an association to utilize an application that is empowered in the cloud [14]. The standard great position of this sort of structure arrives is no need of genuine work station as the client run yet on interest assets/programming can offer it to lease [15]. So in the event that it is joined with the security associations it winds up being amazing [16].…”
Section: Introductionmentioning
confidence: 99%
“…Instead of getting programming in a boxed course of action, the client can buy an association to utilize an application that is empowered in the cloud [14]. The standard great position of this sort of structure arrives is no need of genuine work station as the client run yet on interest assets/programming can offer it to lease [15]. So in the event that it is joined with the security associations it winds up being amazing [16].…”
Section: Introductionmentioning
confidence: 99%
“…The exploratory results demonstrate the strategy can guarantee that cloud neither know client's genuine face information, nor the face private coordinating ID result, to make client's face information secure, we add to a valid, productive, lowcomplex system to ensure distributed computing security. In 2011, Ling Zheng et al [17] contrasting private cloud and open cloud , records contrasts in the middle of them and advances a structural engineering of private distributed computing to bolster keen brace, elucidates structure of every layer, and presents idea of private distributed computing working framework and system virtualization. It gives the hypothetical reference to assemble the private distributed computing, accordingly advances the development of the savvy matrix.…”
Section: Literature Surveymentioning
confidence: 99%
“…Their results shows that the method can ensure that cloud neither know user's real face data, nor the face private matching identification result, to make user's face data secure. In 2011, Zheng et al [17] provides a comparison between private cloud and public cloud. Based on their study they suggest the theoretical reference to build the private cloud computing.…”
Section: Literature Surveymentioning
confidence: 99%