Professional Documents
Culture Documents
978-1-7281-4514-3/20/$31.00©2020 IEEE
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on March 12,2021 at 06:48:10 UTC from IEEE Xplore. Restrictions apply.
2020 International Conference on Computer Communication and Informatics (ICCCI -2020), Jan. 22-24, 2020, Coimbatore, INDIA
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on March 12,2021 at 06:48:10 UTC from IEEE Xplore. Restrictions apply.
2020 International Conference on Computer Communication and Informatics (ICCCI -2020), Jan. 22-24, 2020, Coimbatore, INDIA
978-1-7281-4514-3/20/$31.00©2020 IEEE
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on March 12,2021 at 06:48:10 UTC from IEEE Xplore. Restrictions apply.
2020 International Conference on Computer Communication and Informatics (ICCCI -2020), Jan. 22-24, 2020, Coimbatore, INDIA
performance of their machines. Cloud service provider should compared with algorithms such as
use IDS for the security of their customers. Architecture to the Rank and EARES-D showing
deploy IDS is defined in [19]. Virtual machine security can be better results than heuristic
methods.
provided by using Trusted Cloud Computing Platform (TCCP) In a cloud, users lack effective,
[20]. quantifiable security evaluation
methods to capture their own
One
Aobing information infrastructure's security
IV. A SHORT REVIEW ON RECENT WORKS ACCOMPLISHED IN Quantifi
Sun, situation. A quantifiable security
SECURITY ISSUES OF CLOUD COMPUTING able
assessment system has been
Security
Guoho introduced for various clouds that can
Evaluati
ngGao, be accessed through a consistent API.
TABLE I. SHORT REVIEW ON DIFFERENT TYPE OF PAPER IN SECURITY on
The grading system includes the
ISSUES OF CLOUD COMPUTING 4 2018 Model
engine for security inspection, the
for
Sl Year Tongka engine for security recovery, the
Cloud
. of Paper Author iJi, design for safety analysis, the visual
Short Description Computi
N Public Title s display module, etc. The program
o ation ng
Xuping adopts "one vote vetoed"
Taking into consideration the Cruise Platform
Tu. mechanism to count one field's
Itinerary Schedule Design (CISD) score and add the summary as the
Large- Tessem issue, a cruise itinerary needs to be
scale aMengi overall score, and to establish one
identified to improve a cruise view of safety.
Optimiz stu, company's payoff. A strategy
ed optimization approach based on a Through creating a confidence model
Searchin Abdulr heuristic taboo search strategy that for the computing power of a cloud
measures and tests the cruise service, researchers have tried to
g for ahman
schedule and a genetic algorithm overcome security challenges. In this
1 2019 Cruise Alahm case, the trust value is created using
optimizing the heuristic search Trust
Itinerary adi, Snehal the implemented trust model to
parameters. The suggested Model
Scheduli performance approach and the R provide various security aspects such
ng on Abdull for as authorisation and authentication.
scalability / cost efficiency of the Rathi
the ah Computi The article tends to focus on different
Amazon Web Services cloud 5 2018
Cloud Albuali infrastructure were given. ng parameters such as data security,
Vikas
Security authorization, authentication, and
KKole
of Cloud virtualization to provide cloud
kar
security. The system enacted here
Vehicle Cloud Computing (VCC) could be used by cloud users to
has recently become an appealing evaluate different cloud services.
approach that meets demands for Research Liu This article considers as its point of
vehicles to compute and store on key Qing entry the basic network network
A new service. Traditional cryptographic technolo Zhu, security security situation, big data
Security MhidiB algorithms needs to ensure safety gy of Boyu protection, private cloud network
Mechani ousselh after compromising their keys. To network Wan security situation, analyzes the
sm for am, ensure a stable vehicle network, security Jinhua, related evaluation indexes and sets
Vehicula using a fog computing architecture, situation Li up the evaluation system model and
6 2018
r Cloud Nabil a new DT decoy technology and awarene Qinqia other key technologies, elaborates
2 2019 Computi Benam user behavior profiling (UBP) has ss of n on the security situation of private
ng Using ar, been implemented as an alternative private cloud networks in companies
Fog solution to address data security, cloud in
Computi Adnane confidentiality and confidence in enterpris
ng Addai vehicle cloud serversIn the scenario es
System m of malicious actions, a high
productivity is achieved by The enormous unused processing and
supplying decoy files in such a way storage capacities of underused PCs
that the attacker can not distinguish Tessem can be combined as complementary
between both the original and aMengi cloud fabrics to provide large cloud
A "No services, mainly as a network
decoy files. stu, Ab
Data infrastructure. They had already
The rising installation of data dulrah
Center" implemented a "no data center"
centers and cloud services manAl approach that complements the cloud
Solution
Green Mustaf worldwide, with higher electricity 7 2017 ahmadi provision model based on the data
to Cloud
Cloud a rates, increased energy costs, the , , Yous center. Their opportunistic cloud
Computi
Framew Ibrahi cost of cooling and connectivity, efAlsen computing system, known as
ng
ork for m and the emission of carbon dioxide. ani, Du cucloud, operates on underutilized
Reducin Khaleel Dynamic Voltage and Frequency nrenCh PC assets within an organization /
g Carbon , Scaling (DVFS) method has been e community.
3 2019 Dioxide applied to minimize cloud server
Emissio power consumption by measuring
ns in the best near-optimal frequency. A JianXio ECU (Electronic Control Unit) of
Cloud Awder The goals were achieved without Remote ng ; the engine can not only control the
Infrastru Moham reducing the quality of service 8 2016 Engine engine, but also can monitor the
cture med (QoS) set out in the Agreement on Health Hong working condition, diagnostic the
Ahmed Service Level (SLA). Cloud Sim Manage Gu faults of engine, generate and save
has been simulated and
978-1-7281-4514-3/20/$31.00©2020 IEEE
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on March 12,2021 at 06:48:10 UTC from IEEE Xplore. Restrictions apply.
2020 International Conference on Computer Communication and Informatics (ICCCI -2020), Jan. 22-24, 2020, Coimbatore, INDIA
978-1-7281-4514-3/20/$31.00©2020 IEEE
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on March 12,2021 at 06:48:10 UTC from IEEE Xplore. Restrictions apply.