Performance analysis of data fragmentation techniques on a cloud server
نویسندگان
چکیده
منابع مشابه
Securing Data on the Cloud Server by the User Authentication and Data Security Techniques
Cloud computing is a model which offers a large number of applications under the different topologies. It is the technology of building a strong data security between the Cloud Service Provider (CSP) and User. Authentication is a direct need of an each and every organization and so it is becoming supreme necessary for an organization not because it copes only with the security threats but the r...
متن کاملa study on insurer solvency by panel data model: the case of iranian insurance market
the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.
A server for automated performance analysis of benchmarking data
As part of Performance World, we describe an automation server (PAVER: http://www.gams world.org/performance/paver) to help facilitate reproducible performance analysis of benchmarking data for optimization software. Although PAVER does not solve optimization problems, it automates the task of performance data analysis and visualization, taking into account various performance metrics. These in...
متن کاملA Literature Review on Performance Analysis of Medical Image Compression Techniques using Wavelets on Cloud Computing
This paper presents state of the art literature survey on design and development of lossless and lossy compression techniques for bio-medical images in general and performance analysis in particular. Image compression is one of the successful, predominant and inevitable research areas in the field of image processing and wavelet is a cutting edge technology. A wide variety of image coders has b...
متن کاملData Confidentiality using Fragmentation in Cloud Computing
Data confidentiality is one of the pressing challenges in the ongoing research in Cloud computing. Hosting confidential business data at a Cloud Service Provider (CSP) requires the transfer of control over the data to a semi-trusted external service provider. Existing solutions to protect the data mainly rely on cryptographic techniques. However, these cryptographic techniques add computational...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Grid and Utility Computing
سال: 2019
ISSN: 1741-847X,1741-8488
DOI: 10.1504/ijguc.2019.10022144