Communication
Version 2
Preserved in Portico This version is not peer-reviewed
Safe Control of Autonomous Cloud Entities in Distributed Systems
Version 1
: Received: 16 January 2023 / Approved: 18 January 2023 / Online: 18 January 2023 (10:24:34 CET)
Version 2 : Received: 29 January 2023 / Approved: 30 January 2023 / Online: 30 January 2023 (09:24:01 CET)
Version 2 : Received: 29 January 2023 / Approved: 30 January 2023 / Online: 30 January 2023 (09:24:01 CET)
How to cite: Kara, M. Safe Control of Autonomous Cloud Entities in Distributed Systems. Preprints 2023, 2023010335. https://doi.org/10.20944/preprints202301.0335.v2 Kara, M. Safe Control of Autonomous Cloud Entities in Distributed Systems. Preprints 2023, 2023010335. https://doi.org/10.20944/preprints202301.0335.v2
Abstract
In recent years, Cloud Computing and Big Data have been considered the most attractive areas that are revolutionizing the IT world. Cloud Computing paradigm has recently appeared that allows running proprietary or difficult portable applications outside their original software environment on one or more virtual hardware platforms. Therefore, we are to developing such techniques which make it possible to secure communication between the communicating Cloud entities. These techniques must take into account several factors due to the data transmitted in this type of environment is proprietary and of significant size. Conventional data security techniques are not suitable for today's cloud usage. Hence, the main research of this thesis is to define an adaptable architecture with the aim to propose a scalable system that supports cloud services. We will define feasible security solutions dedicated to the Cloud computing context in order to robustly protect data stored in the Cloud. We are more precisely looking for working on NoSQL databases. We also intend to propose a secure solution based on the blockchain that has powerful features like decentralization, autonomy, security, reliability, and transparency.
Keywords
Cloud Computing; Data Protection; Secure Communication; Middleware; Protocols
Subject
Computer Science and Mathematics, Information Systems
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (1)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment
Commenter: Mostefa Kara
Commenter's Conflict of Interests: Author