Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

Chapter 9Organization Assignment in Federated Cloud Environments based on Multi-Target Optimization of Security

Abhishek Kumar1, Palvadi Srinivas Kumar2, T.V.M. Sairam3

1 Computer Science Department, Aryabhatta College of Engineering & Research Center (ACERC Ajmer), Rajasthan, India

2 Department of Computer Science and Engineering, Sri Satya Sai University of Technology and Medical Sciences, Sehore, Madhya Pradesh, India

3 Department of Computing Science and Engineering, Vellore Institute of Technology, Chennai, India

Emails: abhishekkmr812@gmail.com

Abstract

Cloud security alliance permits interconnected cloud computing conditions of various cloud service providers (CSPs) to share their assets and convey more proficient administration execution. In any case, each CSP gives an alternate level of security regarding expense and execution. Rather than expending the entire arrangement of cloud benefits that are required to send an application through a solitary CSP, purchasers could profit by the cloud organization by adaptively allocating the administrations to various CSPs while keeping in mind the end goal to fulfil every one of their administrations’ security necessities. In this chapter, we demonstrate the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security. The model enables shoppers to consider an exchange between three security factors- cost, execution, and hazard when appointing their administrations to CSPs. The ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book