Cloud technology providers differ from each other not only by the level of their computing cloud abstraction level but also by different computing environment conditions. The most efficient, one-use verification scheme is a hash-based function scheme that processes the entire single file per single-use. Data possession verification schemes are feasible even on mobile devices. One solution for single-use would be to delegate cyclical verification to a private server or other cloud computing. Response times to challenges can be used as proof of having resources such as computing power. Due to the powerful computing and storage, high availability and security, easy accessibility and adaptability, reliable scalability and interoperability, cost and time effective cloud computing is the top, needed for the current fast-growing business world. This work provides classification, which may help to survey of several existing cloud computing services developed by various projects globally such as Amazon, Google, Azure, Open Stack and Eucalyptus. Similarities and differences in the architecture approaches of cloud computing were identified in this chapter.
Sulich, A., Zema, T., & Zema, P. (2020). Schemes for Verification of Resources in the Cloud: Comparison of the Cloud Technology Providers. In Studies in Computational Intelligence (Vol. 887, pp. 145–162). Springer. https://doi.org/10.1007/978-3-030-40417-8_9
Mendeley helps you to discover research relevant for your work.