Multimedia cloud computing has the potential for tremendous benefits, but wide scale adoption has a range of challenges like Multimedia and service heterogeneity, QoS heterogeneity, Network heterogeneity, Device heterogeneity ,Security, Power Consumption that must be met.
 Wu Yue; Shi Changhong; Zhang Xianghong; Yang Wei; , "Design of new intelligent street light control system," Control and Automation(ICCA), 2010 8th IEEE International Conference on , vol., no., pp.1423-1427, 9-11 June 2010.
 Yu Chen; Zhaoyu Liu; , "Distributed Intelligent City Street Lamp Monitoring and Control System Based on Wireless Communication chip nRF401," Networks Security, Wireless Communications and Trusted Computing, 2009.
Cluster Computing addresses the latest results in these fields that support High Performance Distributed Computing (HPDC). In HPDC environments, parallel and/or distributed computing techniques are applied to the solution of computationally intensive applications across networks of computers. The journal represents an important source of information for the growing number of researchers, developers and users of HPDC environments.
Cluster Computing: the Journal of Networks, Software Tools and Applications provides a forum for presenting the latest research and technology in the fields of parallel processing, distributed computing systems and computer networks.
Cluster Computing: the Journal of Networks, Software Tools and Applications will provide a forum for presenting the latest research and technology that unify the fields of parallel processing, distributed computing systems and high performance computer networks. The current advances in computing, networking technology and software have spurred a lot of research interest in cluster and internet computing, as demonstrated in Cloud and Grid computing, and distributed high performance data centers.
In this paper we have discussed about cloud computing security issues, mechanism, challenges that cloud service provider face during cloud engineering and presented the metaphoric study of various security algorithms
Key words: Algorithms: AES, Blowfish, DES, RSA, Cloud Computing, Data Security
 Zhidong Shen, Li Li , Fei Yan, Xiaoping Wu , Cloud Computing System Based on Trusted Computing Platform,(2010) International Conference on Intelligent Computation Technology and Automation.
The benefits include: 1) low message complexity, which facilitates low latency in distributed networks, 2) scalability, which provides support for very large networks, and 3) low maintainability, since no additional software is needed on compute resources.
Key words: MRAC, Induction Motor drive, drift and saturation
In the last few years, we have seen an increased interest in developing applications, software tools, communications protocols and high performance data centers, Grids and cloud computing sites to capitalize on these advances and initiatives. Publications about these developments currently appear in several journals that either focus on the communications field, or on parallel and distributed computing with a strong emphasis on the parallel algorithms. Cluster Computing Journal will uniquely address the latest results in integrating these three fields to support the development of high performance parallel distributed computing systems and their applications. The journal will be an important source of information for the growing number of researchers, developers and users of High Performance Parallel and Distributed Computing environments. In these environments, parallel and/or distributed computing techniques are applied to the solution of large-scale scientific and engineering applications running on clusters, cloud computing and/or distributed data centers.
Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system in order to detect signs of security problems.
She is one of the investigators of the clinical e-Science project, CLEF-Services, supervising the design and development of the CLEF security architecture to support secure remote access to patient data. She is also the designer of the architecture and algorithms to support privacy-preserving record linkage for the Genetic Lab Pilot project hosted at the Manchester St Mary Hospital, and the security advisor for the PsyGrid project on building a security bridge linking Janet and the NHS (National Health Services) Network.
The goal of intrusion detection system (IDS) is to provide another layer of defense against malicious (or unauthorized) uses of computer systems by sensing a misuse or a breach of a security policy and alerting operators to an ongoing attack.
Key words: Intrusion Detection System, Anomaly Detection, Web Server, Attacks, SQLIA, Classification of SQLIA.
She leads the security research subgroup in IMG, the School of Computer Science at the University of Manchester. The group currently works on a range of security projects including smart card based multi-factor authentication, authentication strength linked fine-grained access control, context-aware and adaptive security provision in mobile ad hoc networks and Ubiquitous Computing, digital rights management, accountable anonymity, signature delegation and distributed trust management.