Cloud Computing Scheduling Algorithms and Resource Sharing
Keywords:scheduling, cloud computing, sharing, resources
A flexible, affordable, and trustworthy platform for delivering IT services to customers or businesses online is cloud computing. It is a collection of applications, infrastructure, distributed services, and information. It is described as a collection of services that offer internet-based infrastructure resources and data storage on a third server. In comparison to other infrastructure, it offers its users scalability, dependability, high performance, and an affordable option. However, because crucial services are frequently contracted out to a third party, it is more difficult to ensure data security and privacy, support data and service availability, and mitigate risk associated with cloud computing. With relation to cloud-connected automobiles, we examine here vulnerabilities, related dangers, and potential solutions for assessing algorithms.
Backialalshmi.M. (2016). Survey on scheduling algorithms in cloud computing. IJERS, 2(6), 2091-2730.
Dr. S.K. Singh. (2016). Analysis of security issues in cloud connected vehicles within cloud security threats and computing challenges. International Journal of Engineering and Management Research, 6(4), 433-437.
Pallavi Marathe. (2015). Cloud computing security threats and tools.
T Amith Kumar. (2014). Trustworthy resource sharing on collaborative cloud computing. IJCSIT, 6(3).
Kangchan Lee. (2016). Security threats in Cloud Computing Environment. IJSIA, 6(4).
Rashmi Nigoti. (2016). A survey of cryptographic algorithms for cloud computing. IJETCAS.
How to Cite
Copyright (c) 2023 Dr. Mayuri Desai
This work is licensed under a Creative Commons Attribution 4.0 International License.