Fifth International Conference on the Innovative Computing Technology (INTECH 2015) 2015
DOI: 10.1109/intech.2015.7173369
|View full text |Cite
|
Sign up to set email alerts
|

Scheduling in hybrid cloud to maintain data privacy

Abstract: The development of cloud computing technology has been continuously growing since its invention and has attracted the attention of many researchers in the academia and the industry, particularly during the recent years. The majority of organizations, whether large corporate businesses or typical small companies, are moving towards employing this cutting edge technology. Using private cloud provides low cost and privacy for workflow applications execution. However, an organization's requirements to high perform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Wang et al [43] described several methods about protecting data security in hybrid cloud and discussed an authentication intercloud model. Abrishami et al [44] presented a scheduling algorithm to protect data privacy while minimizing the cost and satisfy the users limitation. Stout et al [45] surveyed the shortcomings and challenges of securing IoT devices and their interactions with cloud and enterprise applications.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al [43] described several methods about protecting data security in hybrid cloud and discussed an authentication intercloud model. Abrishami et al [44] presented a scheduling algorithm to protect data privacy while minimizing the cost and satisfy the users limitation. Stout et al [45] surveyed the shortcomings and challenges of securing IoT devices and their interactions with cloud and enterprise applications.…”
Section: Related Workmentioning
confidence: 99%
“…Mixed cloud on the task scheduling, virtual machine scheduling, privacy, and other related work have made some progress. Some were discussed about separating private data from public data and placing them in trusted private cloud and untrusted public cloud, respectively [27][28][29][30]. Zhou et al [27] presented a set of techniques for privacy-aware data retrieval by splitting data and storing on hybrid cloud.…”
Section: Related Workmentioning
confidence: 99%
“…Wang and Jia [29] described several methods about protecting data security in hybrid cloud and discussed an authentication intercloud model. Abrishami et al [30] presented a scheduling algorithm to protect data privacy while minimizing the cost and satisfying the users' limitation. Tasks, datasets, and virtual machines scheduling in hybrid cloud to maximize the benefits and minimize the cost were studied in [31][32][33][34].…”
Section: Related Workmentioning
confidence: 99%
“…Ensuring software performance and software reliability have increased the interest in hybrid cloud architecture. However, there are still some challenges in hybrid clouds (Zuo et al 2014;Abrishami et al 2015). (1) In a hybrid cloud, resource scheduling is studied to optimize system performance, i.e.…”
Section: Introductionmentioning
confidence: 99%