Conferences related to Cloud Computing

Back to Top

2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)

robotics, intelligent systems, automation, mechatronics, micro/nano technologies, AI,


2019 Winter Simulation Conference (WSC)

WSC is the premier international forum for disseminating recent advances in the field of system simulation. In addition to a technical program of unsurpassed scope and quality, WSC provides the central meeting for practitioners, researchers, and vendors.


IEEE INFOCOM 2019 - IEEE Conference on Computer Communications

IEEE INFOCOM solicits research papers describing significant and innovative research contributions to the field of computer and data communication networks. We invite submissions on a wide range of research topics, spanning both theoretical and systems research.


2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field


2018 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)

Cluster Computing, Grid Computing, Edge Computing, Cloud Computing, Parallel Computing, Distributed Computing


More Conferences

Periodicals related to Cloud Computing

Back to Top

Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Cloud Computing

Back to Top

No authors for "Cloud Computing"


Xplore Articles related to Cloud Computing

Back to Top

Cloud Computing Innovation in India: A Framework and Roadmap - White Paper 2.0

Cloud Computing Innovation in India: A Framework and Roadmap - White Paper 2.0, 2014

Explores the market opportunities for cloud computing in India. Cloud Computing is a new paradigm in information technology (IT) and IT-enabled services(ITES) that transforms “computing as a resource” to “computing as a service”. It is a disruptive technology with influence pervading across all aspects of a modern economy. While this has the potential of leapfrogging the economy of emerging markets ...


Block Design-based Key Agreement for Group Data Sharing in Cloud Computing

IEEE Transactions on Dependable and Secure Computing, None

Data sharing in cloud computing enables multiple participants to freely share the group data, which improves the efficiency of work in cooperative environments. However, how to ensure the security of data sharing within a group and how to efficiently share the outsourced data in a group manner are formidable challenges. Note that key agreement protocols have played a very important ...


An anonymous remote attestation for trusted cloud computing

2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, 2012

Cloud computing provides users and companies a cost-efficient and flexible service. However, for a cloud computing client, one of most worrying problems is that IT infrastructure is under control of the cloud provider. To secure cloud users' computation, efficient remote attestation protocol is required. In this paper, by combining trusted computing and dynamic accumulators, we put forward an anonymous remote ...


Cloud Computing for Emerging Mobile Cloud Apps

2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 2015

The tutorial will begin with an explanation of the concepts behind cloud computing systems, cloud software architecture, the need for mobile cloud computing as an aspect of the app industry to deal with new mobile app design, network apps, app designing tools, and the motivation for migrating apps to cloud computing systems. The tutorial will review facts, goals and common ...


Security of virtual working on cloud computing platform

2012 IEEE Asia Pacific Cloud Computing Congress (APCloudCC), 2012

With the development of information technology and attention of energy reservation, more and more people and organizations are interested in working virtually. However, security is one of important challenges for virtual working since sensitive data is transmitted and stored online. In this paper, we propose a novel solution as a security service on cloud computing platform to protect virtual working ...


More Xplore Articles

Educational Resources on Cloud Computing

Back to Top

IEEE-USA E-Books

  • Cloud Computing Innovation in India: A Framework and Roadmap - White Paper 2.0

    Explores the market opportunities for cloud computing in India. Cloud Computing is a new paradigm in information technology (IT) and IT-enabled services(ITES) that transforms “computing as a resource” to “computing as a service”. It is a disruptive technology with influence pervading across all aspects of a modern economy. While this has the potential of leapfrogging the economy of emerging markets like India, the adoption and deployment in such countries poses a unique set of technological, business, and regulatory challenges. Examines the viability of developing cloud computing markets, applications, and services in India. [Note: This IEEE Standards Association (“IEEE-SA”) Industry Connections publication (“Work”) is not a consensus standard document. Specifically, this document is NOT AN IEEE STANDARD. Information contained in this work has been created by, or obtained from, sources believed to be reliable, and reviewed by members of the IEEE-SA Industry Connections activity that produced this Work. IEEE and the IEEE-SA Industry Connections activity members expressly disclaim all warranties (express, implied, and statutory) related to this Work, including, but not limited to, the warranties of: merchantability; fitness for a particular purpose; non-infringement; quality, accuracy, effectiveness, currency, or completeness of the Work or content within the Work. In addition, IEEE and the IEEE-SA Industry Connections activity members disclaim any and all conditions relating to: results; and workmanlike effort. This IEEE-SA Industry Connections document is supplied “AS IS” and “WITH ALL FAULTS”].

  • Block Design-based Key Agreement for Group Data Sharing in Cloud Computing

    Data sharing in cloud computing enables multiple participants to freely share the group data, which improves the efficiency of work in cooperative environments. However, how to ensure the security of data sharing within a group and how to efficiently share the outsourced data in a group manner are formidable challenges. Note that key agreement protocols have played a very important role in secure and efficient group data sharing in cloud computing. In this paper, by taking advantage of the symmetric balanced incomplete block design (SBIBD), we present a novel block design-based key agreement protocol that supports multiple participants, which can flexibly extend the number of participants in a cloud environment according to the structure of block design. Based on the proposed group data sharing model, we present general formulas for generating the common conference key <formula> <tex>${\cal K}$</tex> </formula> for multiple participants. Note that by benefiting from the (<formula> <tex>$v,k+1,1$</tex> </formula>)-block design, the computational complexity of the proposed protocol linearly increases with the number of participants and the communication complexity is greatly reduced. In addition, the fault tolerance property of our protocol enables the group data sharing in cloud computing to withstand different key attacks, which is similar to Yi&#x0027;s protocol.

  • An anonymous remote attestation for trusted cloud computing

    Cloud computing provides users and companies a cost-efficient and flexible service. However, for a cloud computing client, one of most worrying problems is that IT infrastructure is under control of the cloud provider. To secure cloud users' computation, efficient remote attestation protocol is required. In this paper, by combining trusted computing and dynamic accumulators, we put forward an anonymous remote attestation scheme for cloud computing service provider. Under the help of online or offline trusted third parties, a user can attest remote trusted nodes and establish a secure communication. In addition, the scheme can also protect privacy of trusted nodes and greatly reduce the cost of storage and management.

  • Cloud Computing for Emerging Mobile Cloud Apps

    The tutorial will begin with an explanation of the concepts behind cloud computing systems, cloud software architecture, the need for mobile cloud computing as an aspect of the app industry to deal with new mobile app design, network apps, app designing tools, and the motivation for migrating apps to cloud computing systems. The tutorial will review facts, goals and common architectures of mobile cloud computing systems, as well as introduce general mobile cloud services for app developers and marketers. This tutorial will highlight some of the major challenges and costs, and the role of mobile cloud computing architecture in the field of app design, as well as how the app- design industry has an opportunity to migrate to cloud computing systems with low investment. The tutorial will review privacy and security issues. It will describe major mobile cloud vendor services to illustrate how mobile cloud vendors can improve mobile app businesses. We will consider major cloud vendors, such as Microsoft Windows Azure, Amazon AWS and Google Cloud Platform. Finally, the tutorial will survey some of the cuttingedge practices in the field, and present some opportunities for future development.

  • Security of virtual working on cloud computing platform

    With the development of information technology and attention of energy reservation, more and more people and organizations are interested in working virtually. However, security is one of important challenges for virtual working since sensitive data is transmitted and stored online. In this paper, we propose a novel solution as a security service on cloud computing platform to protect virtual working with on-demand virtual private network (VPN) as well as transparent encryption. Advantages of the solution are on-demand, easy to use, cost effective and simple management. It can also save expenditure for small and medium-sized enterprises which needn't invest IT systems to set up their own security solution for virtual working.

  • Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues

    In recent years cloud computing has gained a momentum and is transforming the internet computing infrastructure. Also the mobile applications and mobile devices are developing rapidly. Cloud computing is anticipated to bring an innovation in mobile computing, where the mobile devices can use clouds for data processing, storage and other intensive operations. Already there are some mobile cloud applications for example Google's Map, Gmail for iPhone and Cisco's WebEx on iPad, however these applications are using the Software as a Service model. In this paper we introduce state-of-the-art Mobile Cloud Computing and its implementation methods. We also investigate some critical issues to be solved and point-out further future research directions.

  • An oriented-application adaptive mobile cloud computing middleware

    This paper presents the cloud virtual machine resources allocation strategy based on virtual machine implementation, deployment structures in virtual machine management. By consulting a large number of literature, thought resources management not only confined to the system level, application level actually need more resources to cooperate, therefore this paper proposes adaptive cloud computing middleware AMCCM (Adaptive Mobile Cloud Computing Middleware) this concept, and gives the structure of the AMCCM and process, finally through the implementation of a XX's mobile office system to verify this method, and the original office system were compared, the cloud platform of mobile office system efficiency more efficient.

  • Information service quality evaluation study of cloud computing environment based on big data

    Give full play to the big data in the cloud computing environment application advantages has become an important information service mode of the era of Internet +, paper with information service quality evaluation as the main line, using fuzzy comprehensive evaluation method to analyze a set of cloud computing environment information service quality evaluation process, at the same time, using the case of project construction example analysis, the evaluation of cloud computing environment based on large data information service quality has important reference value.

  • The research of a resource-aware cloud computing architecture based on web security

    Web hosting has a lot of problems, such as low security, waste of bandwidth resource or sudden lack of resource. A self-adaptive cloud computing architecture - RA-Cloud architecture (Resource-aware Cloud Computing Architecture) based on web security in resource-aware situation is proposed. This architecture uses cloud computing technology and self-adaptive linear regression model to estimate the dynamic migration threshold and to search the most suitable neighbor node for data migration. This platform and algorithm distributes the huge amount of computing resource to many server “end” according to the resource constrained self-adaptive policy. The new method increases the user access speed, enhances the anti-attack ability, blocks the attacks effectively and improves the web site security.

  • Towards a Stakeholder-Oriented Taxonomical Approach for Secure Cloud Computing

    The emerging paradigm of cloud computing (CC) arises security risks that adversely impact its different stakeholders. The widespread deployment and service models of CC in addition to the wide variety of stakeholders make it difficult to guarantee privacy and security. This work-in-progress paper proposes a stakeholder-oriented taxonomical approach that determines the security and privacy issues for various CC models from a stakeholder's perspective. It recommends a comprehensive list of security and privacy attributes that are related to these issues. The goal is to provide stakeholders with the security issues associated with their interaction with the cloud. This will assist every stakeholder of a CC model in identifying the security and privacy concerns that are pertinent to them, based on the service and deployment model they use. This will help promote security and privacy among the stakeholders and refute their fears from utilizing this emerging technology.



Standards related to Cloud Computing

Back to Top

No standards are currently tagged "Cloud Computing"