لخّصلي

خدمة تلخيص النصوص العربية أونلاين،قم بتلخيص نصوصك بضغطة واحدة من خلال هذه الخدمة

نتيجة التلخيص (50%)

Cloud computing is a promising computing paradigm which
recently has drawn extensive attention from both academia and
industry.By combining a set of existing and new techniques
from research areas such as Service-Oriented Architectures
(SOA) and virtualization, cloud computing is regarded as such
a computing paradigm in which resources in the computing
infrastructure are provided as services over the Internet.


النص الأصلي

Cloud computing is a promising computing paradigm which
recently has drawn extensive attention from both academia and
industry. By combining a set of existing and new techniques
from research areas such as Service-Oriented Architectures
(SOA) and virtualization, cloud computing is regarded as such
a computing paradigm in which resources in the computing
infrastructure are provided as services over the Internet. Along
with this new paradigm, various business models are developed, which can be described by terminology of “X as a
service (XaaS)” [1] where X could be software, hardware,
data storage, and etc. Successful examples are Amazon’s EC2
and S3 [2], Google App Engine [3], and Microsoft Azure [4]
which provide users with scalable resources in the pay-as-youuse fashion at relatively low prices. For example, Amazon’s S3
data storage service just charges $0.12 to $0.15 per gigabytemonth. As compared to building their own infrastructures,
users are able to save their investments significantly by migrating businesses into the cloud. With the increasing development
of cloud computing technologies, it is not hard to imagine that
in the near future more and more businesses will be moved
into the cloud.
As promising as it is, cloud computing is also facing many
challenges that, if not well resolved, may impede its fast
growth. Data security, as it exists in many other applications,
is among these challenges that would raise great concerns
from users when they store sensitive information on cloud
servers. These concerns originate from the fact that cloud
servers are usually operated by commercial providers which
are very likely to be outside of the trusted domain of the users.
Data confidential against cloud servers is hence frequently
desired when users outsource data for storage in the cloud. In
some practical application systems, data confidentiality is not
only a security/privacy issue, but also of juristic concerns. For
example, in healthcare application scenarios use and disclosure
of protected health information (PHI) should meet the requirements of Health Insurance Portability and Accountability Act
(HIPAA) [5], and keeping user data confidential against the
storage servers is not just an option, but a requirement.
Furthermore, we observe that there are also cases in which
cloud users themselves are content providers. They publish
data on cloud servers for sharing and need fine-grained data
access control in terms of which user (data consumer) has the
access privilege to which types of data. In the healthcare case,
for example, a medical center would be the data owner who
stores millions of healthcare records in the cloud. It would
allow data consumers such as doctors, patients, researchers
and etc, to access various types of healthcare records under
policies admitted by HIPAA. To enforce these access policies,
the data owners on one hand would like to take advantage of
the abundant resources that the cloud provides for efficiency
and economy; on the other hand, they may want to keep the
data contents confidential against cloud servers.
As a significant research area for system protection, data
access control has been evolving in the past thirty years and
various techniques [6]–[9] have been developed to effectively
implement fine-grained access control, which allows flexibility
in specifying differential access rights of individual users. Traditional access control architectures usually assume the data
owner and the servers storing the data are in the same trusted
domain, where the servers are fully entrusted as an omniscient
reference monitor [10] responsible for defining and enforcing
access control policies. This assumption however no longer
holds in cloud computing since the data owner and cloud
servers are very likely to be in two different domains. On one
hand, cloud servers are not entitled to access the outsourced
data content for data confidentiality; on the other hand, the
data resources are not physically under the full control of


تلخيص النصوص العربية والإنجليزية أونلاين

تلخيص النصوص آلياً

تلخيص النصوص العربية والإنجليزية اليا باستخدام الخوارزميات الإحصائية وترتيب وأهمية الجمل في النص

تحميل التلخيص

يمكنك تحميل ناتج التلخيص بأكثر من صيغة متوفرة مثل PDF أو ملفات Word أو حتي نصوص عادية

رابط دائم

يمكنك مشاركة رابط التلخيص بسهولة حيث يحتفظ الموقع بالتلخيص لإمكانية الإطلاع عليه في أي وقت ومن أي جهاز ماعدا الملخصات الخاصة

مميزات أخري

نعمل علي العديد من الإضافات والمميزات لتسهيل عملية التلخيص وتحسينها


آخر التلخيصات

We should colle...

We should collect water samples properly before testing and evaluating the water quality. Care needs...

Low back pain (...

Low back pain (LBP) is a major health problem1, considered the leading cause of years lived with di...

: غالبا ما تهتم...

: غالبا ما تهتم نظم المعلومات IS بالبيانات الكمية السهلة دون أن تتوقف عند وجود سياق يتم تفسير هذه ا...

بلد سياحي باعتب...

بلد سياحي باعتبارها وسيلة من وسائل الاستثمارات الإنتاجية كما أنها تشكل تأثيرا إيجابيا على اقتصاد الد...

Chromatography ...

Chromatography is a crucial technique in biophysics, enabling the separation, identification, and pu...

فتح العرب لمصر ...

فتح العرب لمصر والحقب الأولى (1) (1) فتح العرب لمصر معروف أن مصر نهضت بأقدم دور في تاريخ الحضارة ا...

حيثُ إنّ السجل ...

حيثُ إنّ السجل الطبي؛ عبارة عن مصطلح يستخدم لوصف المستند الذي يُوضح جميع المعلومات المتعلقة بالمريض؛...

Actually, chron...

Actually, chronostratigraphic work is very similar some of the toughest cases confronted by police d...

وقد ساهم ذلك في...

وقد ساهم ذلك في جعل الشركات تدرك حقيقة هامة تتمثل في أن خسارة عميل إنما يعني أكثر من مجرد فقدان صفقه...

The geologist s...

The geologist studying the stratigraphic record is a sort of detective, looking for clues. Just as d...

يعمل بالصيد وحد...

يعمل بالصيد وحده في مركب شراعي صغير في مجرى الخليج، قصة حب ووفاء ربطت بين الصياد العجوز "سانتياجو" و...

عندما جلس مارك ...

عندما جلس مارك جوكر بيرج )23 عاما( أمام شاشة الكمبيوتر في حجرته بمساكن الطلبة في جامعة هارفارد األمر...