Lakhasly

Online English Summarizer tool, free and accurate!

Summarize result (50%)

Cloud computing is a promising computing paradigm which
recently has drawn extensive attention from both academia and
industry.By combining a set of existing and new techniques
from research areas such as Service-Oriented Architectures
(SOA) and virtualization, cloud computing is regarded as such
a computing paradigm in which resources in the computing
infrastructure are provided as services over the Internet.


Original text

Cloud computing is a promising computing paradigm which
recently has drawn extensive attention from both academia and
industry. By combining a set of existing and new techniques
from research areas such as Service-Oriented Architectures
(SOA) and virtualization, cloud computing is regarded as such
a computing paradigm in which resources in the computing
infrastructure are provided as services over the Internet. Along
with this new paradigm, various business models are developed, which can be described by terminology of “X as a
service (XaaS)” [1] where X could be software, hardware,
data storage, and etc. Successful examples are Amazon’s EC2
and S3 [2], Google App Engine [3], and Microsoft Azure [4]
which provide users with scalable resources in the pay-as-youuse fashion at relatively low prices. For example, Amazon’s S3
data storage service just charges $0.12 to $0.15 per gigabytemonth. As compared to building their own infrastructures,
users are able to save their investments significantly by migrating businesses into the cloud. With the increasing development
of cloud computing technologies, it is not hard to imagine that
in the near future more and more businesses will be moved
into the cloud.
As promising as it is, cloud computing is also facing many
challenges that, if not well resolved, may impede its fast
growth. Data security, as it exists in many other applications,
is among these challenges that would raise great concerns
from users when they store sensitive information on cloud
servers. These concerns originate from the fact that cloud
servers are usually operated by commercial providers which
are very likely to be outside of the trusted domain of the users.
Data confidential against cloud servers is hence frequently
desired when users outsource data for storage in the cloud. In
some practical application systems, data confidentiality is not
only a security/privacy issue, but also of juristic concerns. For
example, in healthcare application scenarios use and disclosure
of protected health information (PHI) should meet the requirements of Health Insurance Portability and Accountability Act
(HIPAA) [5], and keeping user data confidential against the
storage servers is not just an option, but a requirement.
Furthermore, we observe that there are also cases in which
cloud users themselves are content providers. They publish
data on cloud servers for sharing and need fine-grained data
access control in terms of which user (data consumer) has the
access privilege to which types of data. In the healthcare case,
for example, a medical center would be the data owner who
stores millions of healthcare records in the cloud. It would
allow data consumers such as doctors, patients, researchers
and etc, to access various types of healthcare records under
policies admitted by HIPAA. To enforce these access policies,
the data owners on one hand would like to take advantage of
the abundant resources that the cloud provides for efficiency
and economy; on the other hand, they may want to keep the
data contents confidential against cloud servers.
As a significant research area for system protection, data
access control has been evolving in the past thirty years and
various techniques [6]–[9] have been developed to effectively
implement fine-grained access control, which allows flexibility
in specifying differential access rights of individual users. Traditional access control architectures usually assume the data
owner and the servers storing the data are in the same trusted
domain, where the servers are fully entrusted as an omniscient
reference monitor [10] responsible for defining and enforcing
access control policies. This assumption however no longer
holds in cloud computing since the data owner and cloud
servers are very likely to be in two different domains. On one
hand, cloud servers are not entitled to access the outsourced
data content for data confidentiality; on the other hand, the
data resources are not physically under the full control of


Summarize English and Arabic text online

Summarize text automatically

Summarize English and Arabic text using the statistical algorithm and sorting sentences based on its importance

Download Summary

You can download the summary result with one of any available formats such as PDF,DOCX and TXT

Permanent URL

ٌYou can share the summary link easily, we keep the summary on the website for future reference,except for private summaries.

Other Features

We are working on adding new features to make summarization more easy and accurate


Latest summaries

** الزلابية الت...

** الزلابية التي لا تقاوم ** كانت أمسية شتوية باردة، ووجدت نفسي في مطعم صغير متواضع يقع في قلب المد...

تعد الاتجاهات ج...

تعد الاتجاهات جزءاً أساسياً من حياتنا اليومية ومن تطور المجتمعات والثقافات. تعكس الاتجاهات ميولًا وت...

يتصور اللغويين ...

يتصور اللغويين غير الوظيفيين كليات اللغوية على اساس انها مجموعة من المبادئ العامة المتعلقة بالخصائص ...

في زاوية الكوخ ...

في زاوية الكوخ تحت قميصه النظيف. سأله الصبي : «ماذا عندك من طعام»؟ «قدر من الرز الأصفر مع السمك، ...

Keeping plants ...

Keeping plants healthy • Providing a favorable soil environment encourages growth of healthy roots,...

مفهوم تقرير الأ...

مفهوم تقرير الأعمال تقارير الأعمال هي مستندات تنشأ بغرض إيصال المعلومات بإيجاز وكفاءة حول أعمال أو م...

تعد البوذية، من...

تعد البوذية، من أعرق الأديان العالمية، والتي تمثل نظاماً فكرياً وروحياً يتبعه ملايين الأشخاص حول الع...

عداد الأجواء ال...

عداد الأجواء الدراسية للطلبة أثناء عملية المذاكرة ، بهدف تشجيعهم على التحصيل العلمي الفعّال . والترك...

Current State o...

Current State of People and Ecosystems Demographic Profile Detailed analysis of population character...

يهدف هذا التطبي...

يهدف هذا التطبيق إلى مساعدة المستخدمين على إنقاص الوزن وتحسين صحتهم بشكل عام من خالل توفير خطط غذائي...

كان التعاون الس...

كان التعاون السلبي لا ينتج بذاته أي اندماج ، لا يتميز بأية صفة نوعية ، فإننا نعترف إذن بوجود نوعين ف...

يتم الإشهار في ...

يتم الإشهار في اجل أقصاه 07 أيام عن طريق الإعلان في يوميتين إحداهما باللغة العربية والأخرى باللغة ال...