IAM Clustering Architecture for Inter-Cloud Environment

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hybrid Intrusion Detection Architecture for Cloud Environment

The Cloud computing system can be easily threatened by various attacks, because most of the cloud computing systems provide service to so many people who are not proven to be trustworthy. Due to their distributed nature, cloud computing environment are easy targets for intruders[1]. Intrusions have been a major problem in terms of computing resources such as grid computing, ubiquitous computing...

متن کامل

Inter-Cloud Architecture and Media Cloud Storage Design Considerations

The rapid increase in digital content, specially multimedia, calls now for standardization of Media Cloud and Inter-Cloud computing, for better provisioning of services. InterCloud computing faces some key challenges in terms of handling multimedia, which are discussed in this paper along with our research status towards their solutions. We also present InterCloud basic architecture and Media C...

متن کامل

An Inter-Cloud Architecture for Future Internet Infrastructures

Iaan latest years, the concept of interconnecting clouds to allow common service coordination gained significant attention mainly because of the increasing utilization of cloud resources from Internet users. An efficient common management between different clouds is essential benefit, like boundless elasticity and scalability. Yet, issues related with different standards led to interoperability...

متن کامل

A Secure Architecture for Inter-cloud Virtual Machine Migration

Virtual machine migration is an important tool that can be used in cloud computing environment for load balancing, disaster recovery, server consolidation, hardware maintenance, etc. Currently a few techniques have been proposed to secure the virtual machine migration process. However, these techniques have number of limitations e.g. lack of standard access control, mutual authentication, confi...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Korean Institute of Communications and Information Sciences

سال: 2015

ISSN: 1226-4717

DOI: 10.7840/kics.2015.40.5.860