Emerging trends, techniques and open issues of containerization: A review
Containerization is revolutionizing the way that many industries operate, provisioning major
impact to modern computing technologies because it is extra lightweight, highly portable …
impact to modern computing technologies because it is extra lightweight, highly portable …
An overview of multi-cloud computing
J Hong, T Dreibholz, JA Schenkel, JA Hu - … of the Workshops of the 33rd …, 2019 - Springer
The purpose of this paper is to provide a brief overview of cloud computing technologies,
particularly with respect to multi-cloud networks. First, the basics of cloud computing …
particularly with respect to multi-cloud networks. First, the basics of cloud computing …
Towards photography through realistic fog
Imaging through fog has important applications in industries such as self-driving cars,
augmented driving, airplanes, helicopters, drones and trains. Here we show that time …
augmented driving, airplanes, helicopters, drones and trains. Here we show that time …
[PDF][PDF] A survey of cloud computing security challenges and solutions
NH Hussein, A Khalid - International Journal of Computer Science …, 2016 - tarjomefa.com
Cloud computing is the next generation networks which is soon going to revolutionize the
computing world. It has much flexibility like on demand resources and services availability …
computing world. It has much flexibility like on demand resources and services availability …
Cost benefit analysis of cloud computing in education
KB Nayar, V Kumar - International Journal of Business …, 2018 - inderscienceonline.com
Application of cloud computing in education not only relieves the educational institutions
from the burden of handling the complex IT infrastructure management as well as …
from the burden of handling the complex IT infrastructure management as well as …
Towards performance evaluation of cloud service providers for cloud data security
Today's data is sensitive that requires privacy and security both from the cloud service
providers (CSP) as well as from users in its all the form of data states: data at rest, while …
providers (CSP) as well as from users in its all the form of data states: data at rest, while …
[HTML][HTML] A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability
The idea of the Internet of Things that everything is linked to anything and everything
interacts with the other is a great idea, and that the topic of integrating these devices will add …
interacts with the other is a great idea, and that the topic of integrating these devices will add …
[PDF][PDF] Cyber attacks and impacts: A case study in saudi arabia
With the development of technology, modern computer-assisted and Internet crimes have
been increasing all this while, and there is a need to further investigate the current status of …
been increasing all this while, and there is a need to further investigate the current status of …
A survey on integrity auditing for data storage in the cloud: from single copy to multiple replicas
The rapid advancement of cloud computing has promoted the development of cloud storage
services. One of the biggest concerns of cloud users is whether the completeness and …
services. One of the biggest concerns of cloud users is whether the completeness and …
[PDF][PDF] Cybersecurity attacks on wireless sensor networks in smart cities: an exposition
The smart city concept is a link between digital world and the physical world. The smart city
is designed and constructed by using advanced techniques which consist of sensors …
is designed and constructed by using advanced techniques which consist of sensors …