Cloud

Cloud Computing Based Optimized Sensor Nodes for Effective Data Management

Free registration required

Executive Summary

The security problem with cloud computing is based on the fact that the application is open to anyone. Without security measures, the cloud computing application is vulnerable to attacks from hackers .Cloud computing or Internet developers have to make sure that they build a secured website for their users. The behavior of cloud computing is highly dynamic wherein the only way the process would be possible is through proper interaction of the application and hardware. Certain support measures have to be implemented to prevent any form of downtime. Continuous monitoring is usually a requirement to properly implement cloud computing and stay true to its behavior. As a next step, this paper focus on utilizing the optimized sensor network for commercial purposes

  • Format: PDF
  • Size: 181.8 KB