This review is about "different implementations of cloud computing". Only a few topics were chosen during the writing of this review. Through this review you will see implementations for healthcare, multi-source media technology, security, and network service providers. All of these areas have made important improvements and contributions to their specific fields, reviewing old research models and introducing new research models and potential implementations. As for the healthcare sector, the study reviewed proposes a new way to encrypt patient data, to transfer it back and forth to their doctor. During the analysis of Multi-Source Multimedia, it was found that researchers are trying to take advantage of the advantages of cloud computing and presented a two-tier data distribution system. Regarding security, various research papers were examined, one of which identified how to improve biometric identification and another suggested how to improve the structure and protocols that protect smart devices. Literature Overview This review consists of several academic journals and journals from this year, to address the topic of “Different Cloud Computing Implementations”. These newspapers and magazines all date back to the year 2018, making them some of the latest newspapers and magazines to address a wide range of areas. All these newspapers and magazines were collected by the IEEE. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay The areas that will be covered range from security to improving current software architecture, each with short accompanying summaries to explain what it's about. Authors Year Article Title Article Summary Qinlong Huang, Wei Yue, Yue He, Yixian Yang 2018 Secure Identity-Based Data Sharing and Profile Matching for Mobile Health Social Networks in Cloud Computing Increasing Security Regarding the Type of Health Data Shared Through several social healthcare network services. Wei Zhang, ZEESHAN SIDDIQUI, OMAR TAYAN AND MUHAMMAD KHURRAM KHAN 2018 Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols The paper is about testing the security of authentication in mobile phones, when using cloud computing. Jun Huang, Jinyun Zou and Cong-Cong Xing 2018 Service Provider Competitions in Cloud Computing: A New Economic Model The paper aims to bridge the gap between cloud service providers (CSPs) and network service providers (NPSs) . LIEHUANG ZHU, CHUAN ZHANG, CHANG A research paper (Q. Huang, W. Yue, Y. He and Y. Yang 2018) proposed from this year, a new model for profile matching and sharing data securely, via encryption is introduced identity-based transmission (IBBE) to share data with doctors. IBBE comes into play to create the preconditions for doctors to then re-encrypt the data via Ciphertext and send it through the cloud without losingsensitive information. Through the Profile Matching mechanism in MHSN, equality tests are applied to patient data. IBBE is used by patients to allow them flexible access to their friends' data. MHSN maintains private patient data. Additionally, profile matching helps keep costs down for patients. The analysis and evaluation of MHSN has shown that it is a practical way to protect data and therefore patient privacy. Multi-source multimedia MMCSACC is a new model proposed in a research paper (W. Zhang, The proposed system guides the user through the two-tier design and implementation process for MMCSACC. Using a data distribution model and taking into consideration the needs of the multi-source multimedia conference system; they were then able to find the appropriate variable bandwidth model to use. They introduced the concept of data forwarding priority, to ensure that data distribution was not compromised. To achieve this goal, the centralized processing benefits of cloud computing have been widely exploited. Additionally, they made sure to verify that the MMCSACC was a viable concept. The results of this research were experimental but still show its merits, such as high delivery ratio, better user experiences, and better performance. This research really helps overcome the limitations of multimedia conferencing and cloud computing through the use of distributed application designs. Security Improvements for Personal Identification Another influence of cloud computing involves improving security identification. One type of improvement being implemented is "biometric identification", which is starting to become widely used in several technologies. With the further development of cloud computing, to reduce the costs of large data, we want to completely switch to cloud storage. However, this has been found to lead to potential privacy issues for users. We see in this paper, a new more efficient model is proposed, to protect the privacy of biometric identification. It is described as “… the biometric system for performing biometric identification” (Zhu, Zhang, Xu, Liu, and Huang 2018), which essentially allows the database owner to encrypt the query data and send it to the cloud. Secondly, cloud services perform identification procedures on the encrypted database, which will then allow the owner to verify the result. After an in-depth security analysis of this new model, the data collected in this paper demonstrates that identification requests can still be spoofed and cause collusion with cloud services. However, compared to previous protocols, the results still show that the model is feasible and can help increase performance. Security Enhancements for Smartphones In this modern era, where we can freely access and transfer information, across different smart devices and network services, they have completely enveloped our lives. This advancement has made it difficult for security professionals to keep up with the ever-increasing breaches, compared to before, when data protection was not such a big challenge. However, this increase and advancement in technology has pushed security professionals to improve their skills and made it their primary task to better understand the world of data. Over the years they have been.
tags