The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS

Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depen...

Full description

Bibliographic Details
Main Authors: Dhuratë Hyseni, Nimete Piraj, Betim Çiço, Isak Shabani
Format: Article
Language:English
Published: MDPI AG 2022-04-01
Series:Computers
Subjects:
Online Access:https://www.mdpi.com/2073-431X/11/5/62
_version_ 1827669524483145728
author Dhuratë Hyseni
Nimete Piraj
Betim Çiço
Isak Shabani
author_facet Dhuratë Hyseni
Nimete Piraj
Betim Çiço
Isak Shabani
author_sort Dhuratë Hyseni
collection DOAJ
description Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depending on the ITSS (IT security specialist) of a certain organization based on selecting options. Some of the difficulties we encountered in our previous work while using traditional programming were the coordination of parallel processes and the modification of real-time data. This study provides results for two methods of programming based on the solutions of the proposed model for cloud security, with the first method of traditional programming and the use of reactive programming as the most suitable solution in our case. While taking the measurements in this paper, we used the same algorithms, and we present comparative results between the first and second methods of programming. The results in the paper are presented in tables and graphs, which show that reactive programming in the proposed model for cloud security offers better results compared to traditional programming.
first_indexed 2024-03-10T03:05:25Z
format Article
id doaj.art-1117d167a16f4e60bdd2a47335734521
institution Directory Open Access Journal
issn 2073-431X
language English
last_indexed 2024-03-10T03:05:25Z
publishDate 2022-04-01
publisher MDPI AG
record_format Article
series Computers
spelling doaj.art-1117d167a16f4e60bdd2a473357345212023-11-23T10:33:28ZengMDPI AGComputers2073-431X2022-04-011156210.3390/computers11050062The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSSDhuratë Hyseni0Nimete Piraj1Betim Çiço2Isak Shabani3Faculty of Electrical and Computer Engineering, University of Prishtina, St. Bregu i Diellit p.n., 10000 Prishtina, KosovoFaculty of Computer Science, University of Prizren “Ukshin Hoti”, St. Rruga e Shkronjave, nr. 1, 20000 Prizren, KosovoDepartment of Computer Engineering, Epoka University, St. Tiranë-Rinas, 1032 Tirana, AlbaniaFaculty of Electrical and Computer Engineering, University of Prishtina, St. Bregu i Diellit p.n., 10000 Prishtina, KosovoReactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depending on the ITSS (IT security specialist) of a certain organization based on selecting options. Some of the difficulties we encountered in our previous work while using traditional programming were the coordination of parallel processes and the modification of real-time data. This study provides results for two methods of programming based on the solutions of the proposed model for cloud security, with the first method of traditional programming and the use of reactive programming as the most suitable solution in our case. While taking the measurements in this paper, we used the same algorithms, and we present comparative results between the first and second methods of programming. The results in the paper are presented in tables and graphs, which show that reactive programming in the proposed model for cloud security offers better results compared to traditional programming.https://www.mdpi.com/2073-431X/11/5/62reactive programmingcloud providerreactive architecturereactive extensionsencryption and decryption filedata sources
spellingShingle Dhuratë Hyseni
Nimete Piraj
Betim Çiço
Isak Shabani
The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS
Computers
reactive programming
cloud provider
reactive architecture
reactive extensions
encryption and decryption file
data sources
title The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS
title_full The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS
title_fullStr The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS
title_full_unstemmed The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS
title_short The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS
title_sort use of reactive programming in the proposed model for cloud security controlled by itss
topic reactive programming
cloud provider
reactive architecture
reactive extensions
encryption and decryption file
data sources
url https://www.mdpi.com/2073-431X/11/5/62
work_keys_str_mv AT dhuratehyseni theuseofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss
AT nimetepiraj theuseofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss
AT betimcico theuseofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss
AT isakshabani theuseofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss
AT dhuratehyseni useofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss
AT nimetepiraj useofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss
AT betimcico useofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss
AT isakshabani useofreactiveprogrammingintheproposedmodelforcloudsecuritycontrolledbyitss