Neidio i'r cynnwys

Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability

An extensive research has led to a general understanding of uncertainty issues in different fields ranging from computational biology to decision making in economics. However, a study of uncertainty on large scale computing systems and cloud computing systems is limited. Most of works examine uncert...

Disgrifiad llawn

Wedi'i Gadw mewn:
Manylion Llyfryddiaeth
Prif Awduron: Babenko, M. G., Бабенко, М. Г.
Fformat: Статья
Iaith:English
Cyhoeddwyd: Elsevier B.V. 2019
Pynciau:
Mynediad Ar-lein:https://www.scopus.com/record/display.uri?eid=2-s2.0-85007454148&origin=resultslist&sort=plf-f&src=s&st1=Towards+understanding+uncertainty+in+cloud+computing+with+risks+of+confidentiality%2c+integrity%2c+and+availability&st2=&sid=74064f1f4b25bf0f5642e6da8f07737a&sot=b&sdt=b&sl=126&s=TITLE-ABS-KEY%28Towards+understanding+uncertainty+in+cloud+computing+with+risks+of+confidentiality%2c+integrity%2c+and+availability%29&relpos=0&citeCnt=11&searchTerm=
https://dspace.ncfu.ru/handle/20.500.12258/9110
Tagiau: Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
Disgrifiad
Crynodeb:An extensive research has led to a general understanding of uncertainty issues in different fields ranging from computational biology to decision making in economics. However, a study of uncertainty on large scale computing systems and cloud computing systems is limited. Most of works examine uncertainty phenomena in users’ perceptions of the qualities, intentions and actions of cloud providers. In this paper, we discuss the role of uncertainty in the resource and service provisioning, privacy, etc. especially, in the presence of the risks of confidentiality, integrity, and availability. We review sources of uncertainty, and fundamental approaches for scheduling under uncertainty. We also discuss potentials of these approaches, and address methods for mitigating the risks of confidentiality, integrity, and availability associated with the loss of information, denial of access for a long time, and information leakage