Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 22
Page No. 9651 - 9655

Direct Cloud Connectivity and Increased Bandwidth

Authors : MustafaAbdalrassual Jassim

References

Ab Rahman, N.H., N.D.W. Cahyani and K.K.R. Choo, 2017. Cloud incident handling and forensic‐by‐design: Cloud storage as a case study. Concurrency Comput. Pract. Exp., Vol. 29,

Alam, Q., S.U. Malik, A. Akhunzada, K.K.R. Choo and S. Tabbasum et al., 2017. A Cross Tenant Access Control (CTAC) model for cloud computing: Formal specification and verification. IEEE. Trans. Inf. Forensics Secur., 12: 1259-1268.
CrossRef  |  Direct Link  |  

Cai, D.L., P.H. Wang, Y.C. Wang, F.H. Tsai and J.S. Wang, 2015. The implementation of peer-to-peer bandwidth estimation mechanism in multimedia streaming networks. Soc. Sci., 10: 1574-1582.
CrossRef  |  Direct Link  |  

Edelman, J., S.S. Lowe and M. Oswalt, 2018. Network Programmability and Automation: Skills for the Next-Generation Network Engineer. O’Reilly Media, Sebastopol, California, USA., ISBN:9781491931318, Pages: 584.

Garrison, G., R.L. Wakefield and S. Kim, 2015. The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations. Int. J. Inf. Manage., 35: 377-393.
Direct Link  |  

Hamid, A.H. and M.M. Yusof, 2016. Conceptualizing global cloud landscape: A review of adoption issues and challenges. Res. J. Appl. Sci., 11: 333-339.
Direct Link  |  

Hawramani, I., 2017. Cloud Computing for Complete Beginners: Building and Scaling High-Performance Web Servers on the Amazon Cloud. Independent Publisher, Chicago, Illinois, USA., ISBN:9781520633169, Pages: 95.

Jabbar, I. and S.N. Al Saad, 2016. Using fully homomorphic encryption to secure cloud computing. Internet Things Cloud Comput., 4: 13-18.

Kar, J. and M.R. Mishra, 2016. Mitigating threats and security metrics in cloud computing. J. Inf. Process. Syst., 12: 226-233.

Khan, S.S. and R.R. Tuteja, 2015. Security in cloud computing using cryptographic algorithms. Intl. J. Innovative Res. Comput. Commun. Eng., 3: 148-155.
Direct Link  |  

Manzano, M., K. Bilal, E. Calle and S.U. Khan, 2013. On the connectivity of data center networks. IEEE. Commun. Lett., 17: 2172-2175.
CrossRef  |  Direct Link  |  

Mink II, A.L., 2015. US Federal Agencies and cloud: A common decision framework for determining which legacy IT systems should migrate to cloud. Ph.D Thesis, George Mason University, Fairfax, Virginia.

Nelson, P., 2015. Cybercriminals moving into cloud big time. IDG Communications, Framingham, Massachusetts, USA. https://www.networkworld.com/article/2900125/malware-cybercrime/criminals-moving-into-cloud-big-time-says-report.html

Osanaiye, O., K.K.R. Choo and M. Dlodlo, 2016. Distributed Denial Of Service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl., 67: 147-165.
Direct Link  |  

Qi, H., M. Shiraz, J.Y. Liu, A. Gani and Z.A. Rahman et al., 2014. Data center network architecture in cloud computing: Review, taxonomy and open research issues. J. Zhejiang Univ. Sci. C, 15: 776-793.
Direct Link  |  

Singh, S., P.K. Sharma and J.H. Park, 2017. SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home. Sustainability, 9: 513-532.
CrossRef  |  Direct Link  |  

Sivasankari, T. and S. Sivasankaran, 2015. A secure strategy using weighted active monitoring load balancing algorithm for maintaining privacy in multi-cloud environments. Intl. J. Sci. Technol. Eng., 1: 232-237.
Direct Link  |  

Somani, G., M.S. Gaur, D. Sanghi, M. Conti and R. Buyya, 2017. DDoS attacks in cloud computing: Issues, taxonomy and future directions. Comput. Commun., 107: 30-48.
CrossRef  |  Direct Link  |  

Subashini, S. and V. Kavitha, 2011. A survey on security issues in service delivery models of cloud computing. J. Network Comput. Appl., 34: 1-11.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved