The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS
Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depen...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-04-01
|
Series: | Computers |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-431X/11/5/62 |
_version_ | 1827669524483145728 |
---|---|
author | Dhuratë Hyseni Nimete Piraj Betim Çiço Isak Shabani |
author_facet | Dhuratë Hyseni Nimete Piraj Betim Çiço Isak Shabani |
author_sort | Dhuratë Hyseni |
collection | DOAJ |
description | Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depending on the ITSS (IT security specialist) of a certain organization based on selecting options. Some of the difficulties we encountered in our previous work while using traditional programming were the coordination of parallel processes and the modification of real-time data. This study provides results for two methods of programming based on the solutions of the proposed model for cloud security, with the first method of traditional programming and the use of reactive programming as the most suitable solution in our case. While taking the measurements in this paper, we used the same algorithms, and we present comparative results between the first and second methods of programming. The results in the paper are presented in tables and graphs, which show that reactive programming in the proposed model for cloud security offers better results compared to traditional programming. |
first_indexed | 2024-03-10T03:05:25Z |
format | Article |
id | doaj.art-1117d167a16f4e60bdd2a47335734521 |
institution | Directory Open Access Journal |
issn | 2073-431X |
language | English |
last_indexed | 2024-03-10T03:05:25Z |
publishDate | 2022-04-01 |
publisher | MDPI AG |
record_format | Article |
series | Computers |
spelling | doaj.art-1117d167a16f4e60bdd2a473357345212023-11-23T10:33:28ZengMDPI AGComputers2073-431X2022-04-011156210.3390/computers11050062The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSSDhuratë Hyseni0Nimete Piraj1Betim Çiço2Isak Shabani3Faculty of Electrical and Computer Engineering, University of Prishtina, St. Bregu i Diellit p.n., 10000 Prishtina, KosovoFaculty of Computer Science, University of Prizren “Ukshin Hoti”, St. Rruga e Shkronjave, nr. 1, 20000 Prizren, KosovoDepartment of Computer Engineering, Epoka University, St. Tiranë-Rinas, 1032 Tirana, AlbaniaFaculty of Electrical and Computer Engineering, University of Prishtina, St. Bregu i Diellit p.n., 10000 Prishtina, KosovoReactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depending on the ITSS (IT security specialist) of a certain organization based on selecting options. Some of the difficulties we encountered in our previous work while using traditional programming were the coordination of parallel processes and the modification of real-time data. This study provides results for two methods of programming based on the solutions of the proposed model for cloud security, with the first method of traditional programming and the use of reactive programming as the most suitable solution in our case. While taking the measurements in this paper, we used the same algorithms, and we present comparative results between the first and second methods of programming. The results in the paper are presented in tables and graphs, which show that reactive programming in the proposed model for cloud security offers better results compared to traditional programming.https://www.mdpi.com/2073-431X/11/5/62reactive programmingcloud providerreactive architecturereactive extensionsencryption and decryption filedata sources |
spellingShingle | Dhuratë Hyseni Nimete Piraj Betim Çiço Isak Shabani The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS Computers reactive programming cloud provider reactive architecture reactive extensions encryption and decryption file data sources |
title | The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS |
title_full | The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS |
title_fullStr | The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS |
title_full_unstemmed | The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS |
title_short | The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS |
title_sort | use of reactive programming in the proposed model for cloud security controlled by itss |
topic | reactive programming cloud provider reactive architecture reactive extensions encryption and decryption file data sources |
url | https://www.mdpi.com/2073-431X/11/5/62 |
work_keys_str_mv | AT dhuratehyseni theuseofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss AT nimetepiraj theuseofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss AT betimcico theuseofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss AT isakshabani theuseofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss AT dhuratehyseni useofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss AT nimetepiraj useofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss AT betimcico useofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss AT isakshabani useofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss |