Sunday, May 17, 2020

The Costs of Smoking Essay - 1250 Words

The Costs of Smoking It has now been more than 50 years since Richard Doll and Bradford Hills discovery linking tobacco smoking with lung cancer has been published. Their conclusion that â€Å"smoking is a factor â€Å" (1), that causes the production of carcinoma of the lung has been confirmed by many further studies done by different scientists throughout the world. These studies have also ascertained connection between smoking and heart dieases, cancer (especially lung cancer), bronchitis, organ failure, indigestion. In my essay I will discuss the costs of smoking in terms of health care associated with tobacco-related illness and the fact that a smoker’s quality of life is reduced and life span†¦show more content†¦Ã¢â‚¬Å"This increases heart rate and blood pressure and decreases the blood supply to the extremities - for example, the hands and feet.†(2). Therefore smoker are more likely to suffer from heart disease than people who do not smoke. * Nicotine also affects the platelets by making them stickier which, â€Å"can lead to an increased risk of blood clots forming.†(3). 2. Carbon monoxide:  · Carbon monoxide is a gas that diffuses across the alveoli and is absorbed into blood.  · In the blood it combines directly with haemoglobin inside the red blood cells and so forms carboxyhaemoglobin.  · This means that the hemoglobin is stopped from becoming fully saturated and therefore there is less hemoglobin available to carry oxygen (â€Å"it carries 5-10% less oxygen† (4)).  · So basically someone who smokes heavily and inhales up to 1/5 of his hemoglobin is combined with carbon monoxide instead of oxygen!  · It also damages the heart because it supplies the heart with less oxygen and more carbon monoxide can harm the linings of arteries. As well as cutting down the amount of oxygen supply in the blood, this gas also makes body cells less able to absorb oxygen from the blood andShow MoreRelatedThe Cost Of Smoking Cigarettes1833 Words   |  8 Pagesare pivotal in generating more than half of the money they earned from exports, $165 million. So, would we be doing more harm than good by banning the smoking of cigarettes? When investigating the true cost of smoking cigarettes there is an overwhelming amount of research into the multiple effects smoking has on health. The smoke inhaled when smoking a cigarette contains 4,000 compounds which often leave toxic traces in the lungs and other organs. This is one of the biggest contributing factors asRead MoreEssay on The Costs of Cigarette Smoking.888 Words   |  4 PagesThe Costs of Cigarette Smoking Cigarette smoking causes a variety of life threatening diseases, including lung cancer, emphysema, and heart disease. In the UK about 120,000 people die each year due to smoking. A half of all smokers die from smoking related diseases.0 There are many ingredients in tobacco smoke which are harmful to our health in different ways.1 Some of the ingredients are tar, carbon monoxide, nicotine and other chemicals and additives suchRead MoreAddicted: The High Cost of Cigarette Smoking796 Words   |  4 PagesThere are many forms of addictions but the most common addiction is smoking. According to the American Cancer Society, on average about 45 million Americans currently smoke cigarettes. About twenty three percent are male adults and eighteen percent are female adults. Many smokers do not realize the serious effects of smoking until it is too late. It wasn’t known until the past twenty or thirty years what the harmful effects of smoking were. Many people who smoke started because of peer pressure, theRead MoreCost/Benefit Analysis of Cigarette Smoking2774 Words   |  12 PagesThe overall economic costs of smoking cigarettes has become somewhat of an epidemic in society for a variety of reasons. It includes numerous private and social costs. The private cost to smokers goes far beyond the price of cigarettes alone. Smokers also pay with their health, life, and fina nces. Alongside the great cost to smokers, they enjoy benefits to the same degree. The total cost of smoking not only effects smokers, but society as well. The externalities from smoking are both negativeRead MoreHow Smoking Affects The Health Care Costs2951 Words   |  12 Pages1. Introduction There are three main reasons on how smoking affects the impact of health care cost: an increase on the taxes for purchase of the cigarettes and other limitations will diminish smoking; inflation of more health related issues due to an increase in smoking; and the rise of the cost of health care due to the increase in deteriorating health. 2. What is in a cigarette? What is in a cigarette? Cigarettes contain about 600 ingredients, and once they are burned they create more than 7000Read MoreThe Externalities of Smoking1470 Words   |  6 PagesIntroduction In the past decades, an increasing number of countries have imposed a ban on smoking in public places, including restaurants and bars. Unlike other regulations of cigarettes such as tax or promoting ban, this territorial smoking control sparked heated debates. While some argue that the implementation of this regulation is inefficient and reduce the public welfare (Viscusi, 1994; Tollison and Wagner, 1992; Lambert, 2006), others claim that smokers do impose negative externalities toRead MoreBans on Smoking in Public Areas1476 Words   |  6 Pagesmultiply that number by four, you get the number of people that die because of smoking each year! Smoking is the leading preventable cause of death in the U.S. Each year more than 480,000 people die because of smoking. This is just one of the many reasons why I believe that cigarette smoking should be banned in public areas. I will argue this point in three ways. First, I will argue that the health effects of smoking are so harmful that ciga rettes should not be allowed in public areas. Next, I willRead MoreEffects Of Smoking On Children s Health953 Words   |  4 PagesSmoking causes serious damage to person’s health. This section look at the cost smoking have on government, most notably, the cost of smoking to the NHS such as prescription costs and the cost of the ‘stop smoking’ campaigns which puts an substantial deficit for the NHS budget. A report published by Health Social Care Information Centre revealed that the illness and disease associated with smoking gives rise to costs in the NHS (Eastwood, P Head, S 2013). The costs of smoking can be categorisedRead MoreShould Smoking Be Banned Harmful Effects On Individuals And The Economy1498 Words   |  6 Pages Smoking- A Costly and Deadly Habit One of the most common problems today that are killing people all over the world is smoking. Stress, personal issues, and high blood pressure are many reasons why people start this horrible habit. One cigarette leads to another which then can lead to major addiction. When someone smokes a cigarette they are not only hurting themselves, but others around them. Smoking causes people to be exposed to hazardous fumes and chemicals in many places. The habit of smokingRead MoreNegative Effects of Smoking on Human Health and the Economy1475 Words   |  6 Pages Moreover, smoking particularly adversely affects womens reproductive health, and smoke exposure on children has had detrimental and some sometimes fatal effects on children. Many studies have examined and outlined the adverse effects of maternal smoking on both the mother as well as on the baby and/or infant ( Hofhuis, de Jongste, Merkus, 2003 Woolbright 1994). Many states such as Alabama required documentation on birth certificates of tobacco use of mothers (Woolbright, 1994). Despite the

Wednesday, May 6, 2020

Kat s Life Dramatic Changes - 1435 Words

Kat’s life dramatic changes: As a very important dramatic changes in Kat’s life. That’s when Kat left United States and went to Iraq. For her job requirements to be an oversea worker as a security monitoring in United States armed forces. She was very distracted and being stressed enough making her decision to travel oversea countries. It’s actually challenging have been made, because Kat didn’t have doubt with her faith and ability to go to Iraq the most dangerous country in the world. It’s been a tough time since gulf war two, lots of changes had been made in this country, lots of bad attitudes and civil wars been record on the ground everyday until this moment. It’s incredibly hard on Kat’s life to transit from civilian to military and then go forth to her normal life but Kat believes that transitions in life inescapable, it could be marriage, open relationship, gain weight and lose weight or even death. It’s hard to e xplain in words, how she was in pain, she was in a silent cry among the others, meanwhile she was realized will come back home as soon as she can. Nothing doubt with her reliability and responsibility to get her goal done as well. Kat had finally made her decision in 2007 to leave home and family beyond, exposed her life threatening, feeling of fulfillment about herself got much more experienced, explorer new cultures and new environments, gain new insightsShow MoreRelatedWrestler Men Perpetuating Violence Against A Professional Woman Wrestler Essay1982 Words   |  8 Pageswrestling roles in the WWE world that show any distinction of homosexuality. The women wrestlers are mostly used as illustrations of the men’s heterosexuality, thus dismissing any impression of homosexuality. Divas: Sex and Male fantasy. Before the 1990’s women were not characterized much in the WWE but to escort a man to the wrestling ring, usually as a girlfriend or wife. As Katz says, â€Å"the conventions of pornography have made their way more and more into the main stream† (Jhally, 2003). Women wrestlersRead MoreCoke vs Pepsi in India6705 Words   |  27 PagesMarketing Consultants in Mumbai (formerly Bombay), commented that Coke lost a number ofyears over errors. But at last it seems to be getting its positioning right. Similarly, Ronald McEachern, PepsiCo s Asia chief, asserted India is the beverage battlefield for 2003. The experience ofthe world s two giant soft drinks companies in India during the 1990s and the beginning of the new millennium was not a happy one, even though the government had opened its doors wide to foreign companies. Both companiesRead MoreCOMM292 Case Studies23202 Words   |  93 PagesProduct Chemicals in Allentown, Pennsylvania. He was hired into the competitive Engineering Career Development Program consisting of three one-year rotational assignments in varying locations and functional roles. Being single, Delery embraced the social life of the school community and could often be found at the Thursday Night Drinking Club. Like Griffin, Delery planned on going into investment banking after graduation. This brings us to the sixth learning team member—Jason Cooper. He was also a formerRead MoreBrand Orientation and Market Orientation — from Alternatives to Synergy8734 Words   |  35 PagesMerrilees c a b c Lund University, Sweden Berlin School of Economics and Law, Marketing Division, HWR Berlin, Germany Department of Marketing, Grifï ¬ th Business School, Gold Coast Campus Queensland 4222, Australia a r t i c l e i n f o a b s t r a c t This paper explores the interaction between brand orientation and market orientation. Brand orientation is an inside-out, identity-driven approach that sees brands as a hub for an organization and its strategy. Similarly, market orientationRead Moreobesity case study4929 Words   |  20 Pageslast 25 years. (Department of Health 2012) largely due to dramatic changes in dietary/lifestyle trends with attributing factors such increasing use of transportation, sedentary lifestyles, wider food choices, availability of cheap convenience foods in times of economic decline and also powerful food advertising through media coverage and the increase in fast food restaurants and larger portions; all of these factors have led to a dramatic rise in obesity in the UK, leaving the government with aRead MoreCadbury Dairy Milk 4cs 4ps Swot8150 Words   |  33 PagesC O N T E N T S 1) SITUATION ANALYSIS i) COMPANY ii) CONTEXT iii) COMPETITOR iv) CUSTOMER 2) BARND 3) 4 Ps i) PRODUCT ii) PRICE iii) PROMOTION iv) PLACE 4) COMMENTS 5) SWOT ANALYSIS Product Category: Chocolate Confectionary Brand: Cadbury Product: Cadbury Dairy Milk (CDM) SITUATION ANALYSIS (4 CS) 1) Company: Parent Company: Cadbury plc Indian Subsidiary: Cadbury India Ltd (CIL) History of Cadbury: Cadbury plc is a confectionery andRead MoreMary and Max9879 Words   |  40 Pagesnew lease on life and resumes his correspondence with Mary. The two remain friends for the next two decades, keeping one another updated on various events in their lives. Mary (Toni Colette), inspired by her friendship with Max, becomes a psychologist and marries her childhood crush, an effeminate young Greek Australian man named Damien Popodopoulos (Eric Bana) who enjoys sewing but fears Marys sexual advances. Max wins the New York lottery, using his winnings to buy a (literal) life-time supplyRead MoreIndian Beverage Industry Report15071 Words   |  61 Pagesthis year, according to experts. Food and beverages segment has not suffered despite the slowdown in the economy. FMCG in our stores has done very well. In fact, we registered 10-15% growth in this segment last year, said a spokesperson at Spencer s Retail Ltd. Beverage majors like Coca Cola India, for example, again reported growing sales.Coca-Cola in India reported a solid first quarter 2009 results not only despite a challenging economic environment, but also with unit case volume increasingRead MoreA Study on Customer Preference in Retail Store- Adani Store28361 Words   |  114 Pagessupport and inspiration. We would also like to sincerely express our gratitude to our director Prof. S. Chinnam Reddy all the faculty members who have been time again directly or indirectly helped us in relation to the Grand Project. Without the theoretical knowledge imparted by them during 4th Semester of M.B.A. course it was not possible to have it applied in practical life. We are thankful to the librarian at the SKPIMCS at the AMA for extending their helpful hands as andRead MoreEdexcel Igcse Economics Answer49663 Words   |  199 Pagesdemand for British style fast food such as fish chips, British newspapers, British television programmes, English Premier League football shirts, and tea. Question 2: (a) One reason for the increase in demand for computer games would be a change in tastes. An increasing number of parents are now buying them. Other reasons may be an increase in incomes, heavy advertising by manufacturers such as Nintendo and Sony and possibly a fall in price. (b) The demand for computer games increased

Storage And Computation In Cloud Computing â€Myassignmenthelp.Com

Question: Discuss About The Storage And Computation In Cloud Computing? Answer: Introducation A recognized and renowned regional retailer of Australia is the Webbs Stores. The main business of this company is to sell food items. It also sells some of the specialty stuffs. The company has two original data centers (Arora, Parashar Transforming, 2013). They are in Sydney and Melbourne. Apart from these two main data centers, the company even has some of the regional data centers in Brisbane, Bathurst, Port Macquarie, Auckland and Wagga. Recently, they have decided to move their database from MS SQL Server 2012 R2 to IaaS instance. Webbs Stores have taken a decision of undertaking cloud computing for their business. The problem with this decision is that the data management, the operational and application complexities have become much complicated and they are not able to handle them. They have even decided to close down the regional data center in Auckland because of its traditional infrastructure (Avram, 2014). They could have easily replaced or updated its existing infrastru cture. All the services and the important data are shifted to the cloud database. A Risk and Security Workshop is planned to run for accessing the security risks, threats and the possible control methods, which are need for a hybrid cloud. The following report covers a detailed discussion on the Webbs Stores case study. The report also briefs about the benefits of data migration to cloud IaaS infrastructure. The threats of data migration to cloud are also provided in the report. The report even describes the use of cloud in case of removal and backup of the records. The report further helps to understand how to protect and control the access to the data and services for migration of data. Proper suggestions and recommendations are given in the following report. Type of Security Deployed Webbs Stores have decided to move their database from MS SQL Server 2012 R2 to IaaS instance. They are worried about the security of their data and services. The type of security policy that should be deployed is the authentication and authorization policy (Dinh et al., 2013). Authorization is the permission given to a particular organization or individual for performing a task or job. Authentication is the process of verification of the identity of an individual, who will be performing a task. This security policy is extremely important in case of cloud computing as it provides permission and sanctions the activity to be performed. The open normative format of data, used for authentication purpose in cloud is the SAML or Security Assertion Markup Language (Garg, Versteeg Buyya, 2013). Webbs stores is moving their data to IaaS instance. The best IaaS instances the Microsoft Azure and AWS. The data moved to cloud is bulk in quantity. This type of policy would be helpful for them for protection of their data and services during migration. Benefits and Issues of Deployment The type of data security policy Webb should take is the authentication and authorization. Various advantages will be obtained by them due to this deployment. The benefits are as follows: i) Security: The first and the foremost thing that comes in mind during data migration is the security. Cloud computing provides excess security for transferring data (Fernando, Loke Rahayu, 2013). Moreover, authorization and authentication policy enables only the sanctioned and authorized users for accessing data or service. ii) Cost Effective: Cloud computing is extremely cost effective and does not incur much cost. This type of policy can be easily maintained with lower price. iii) Flexibility: This is again an important benefit that can be obtained by this security policy (Rahimi et al., 2014). The whole system turns out to be flexible after deployment. iv) Scalability: Authentication and authorization makes the database extremely scalable. The advantages of this security policy do make it popular enough to be accepted by several organizations (Arora, Parashar Transforming, 2013). However, it does have few disadvantages. The problems that can be faced after the deployment are as follows: i) Encryption: Encoding any message is a must for authentication and authorization policy. This can be an issue as there always exists a chance of losing the encryption key. ii) Complexity: this is another issue that is normally faced after deployment of this policy (Malawski et al., 2015). The implementation of this policy is complex in nature. iii) Brute Force Attacks: The most common attack that is faced due to this type of policy is the brute force attack. The hacker or intruder gets the password by a software and is able to get all the data. iv) Storage: The storage of usernames and passwords are hacked easily, the moment they are authenticated. Security risks are extremely common for migration of data. Webbs Stores will be migrating the data and services to cloud from MS SQL Server R2 database to IaaS instance (Botta et al., 2016). This new database can have various risks. The threats that are common for database are as follows: i) Loss of Data: This is the most significant threat for migration of data. The data can be lost when it is transferred to another database (Li et al., 2013). Moreover, there is a chance that the data cannot be recovered, which is extremely harmful for the company. ii) Database Corruption: This is the second most significant risk during data migration. The entire database can get corrupted and cannot be recovered. The IaaS Infrastructure Threats and risks are also common for the infrastructure of the cloud, which is the IaaS. The threats are as follows: i) Denial of Service Attacks: This is the most significant threat that occurs in the infrastructure during data migration. When a user uses the resources of the cloud, the overall quality of the services that are used by other users, gets degraded (Almorsy, Grundy Mller, 2016). The intruders utilize this opportunity and get all the resources for denying or slowing down the services. The attack is known as the denial of service or DoS attack. ii) Insider Threats: During migration of data, the infrastructure enables the administrator for accessing the data and the database. This type of risk is known as the insider threat. The Communications The communications between the IaaS instance and Webbs Stores can attract various threats and risks. The risks are as follows: i) Breaching of Data: Breaching of data is extremely common when migration is done (Li et al., 2013). The moment IaaS and Webbs Stores communicates with each other, this type of risk occurs. ii) Incompatible Database: The second most significant threat is the incompatibility of database. It must be compatible to avoid all types of threats while communication. Risks with Backup of Data i) Backup: Periodical backup is extremely needed for any company. Although, there are some risks that are common during the backup of data (Malawski et al., 2015). The risks are as follows: Security: Lack of security can be vulnerable during backup of data. Often data is lost during this backup. Control over Data: During backup of data, the cloud provider obtains the total control and access of the data. There is always a chance that the data can be intercepted. ii) Storing of Data: Data is normally stored in the cloud storage. Webbs stores might face various threats during this storage of data (Xiao, Song Chen, 2013). They are as follows: Security: Security is the most significant threat during data storing. Often data is lost during this phenomenon. Lack of Standardization: The cloud vendor never follow a normal set of protocols or rules for supporting their business (Xiao, Song Chen, 2013). The selection of the vendors should be done carefully by Webbs Stores. iii) Data Retrieval: Several risks are even common during retrieval of data. They are as follows: Snooping: The intruder can always snoop into the data, the moment it is retrieved from the cloud (Almorsy, Grundy Mller, 2016). This is extremely dangerous for confidential data. Leakage of Data: Leakage of data is the most significant risk during data retrieval. Webbs Stores should be careful during their retrieval especially because they are using public cloud. Cloud Backup in DR Plans Cloud DR Plan or disaster recovery is a strategy for any type of backup and recovery of data that is utilized for storing and maintaining of records (Whaiduzzaman et al., 2014). These are stored for security issues. The most important task is done by the cloud backup. The DR plan will simplify the overall procedure of data migration. Only the storage is needed to be transferred. This will in case migrate the entire the data with that particular storage (Xiao, Song Chen, 2013). The benefit that Webbs Stores will be getting is that the entire data will have a copy that is sent to the offsite server by a public network. The major benefit of backup and restore strategy is the easy and simple backing up of data. The whole system of the database of Webbs Stores will be altered with this strategy (Rahimi et al., 2014). The second benefit is that if any data is lost during migration, it can be quickly and easily recovered. Therefore, the cloud recovery plan is extremely helpful for Webbs Stores. Protection of Access and Recommendations Access is the most important security factor. Everyone should not have the access to all the data and services. The authorized and authenticated users should be allowed to access the data and services of Webbs Stores. IaaS Infrastructure The IaaS infrastructure should not be accessed by everyone. Two significant methods are mentioned below for protection of access to the IaaS infrastructure. They are as follows: i) Physical Access to Infrastructure: The physical access should be protected and secured so that there exists no loopholes in the security (Wei et al., 2014). This will prevent the unauthorized users to access the infrastructure and thus it can be protected. ii) Access via API: Unauthorized use of API should be stopped and mitigated for Webbs Stores (Sanaei et al., 2014). It is recommended that they should check and stop this type of access on an immediate basis. MS SQL Server 2012 R2 Cloud Instance The overall access to the previous database, which is the MS SQL Server 2012 R2 can be protected by some methods (Rahimi et al., 2014). Two suggested methods are as follows: i) Physical Access: The physical access should be protected and secured so that there exists no loopholes in the security of the components of hardware and server. ii) Operating system Access: Webbs Stores should be strict about their access to the operating system (Rittinghouse Ransome, 2016). Firewalls might protect their operating system easily. Cloud Network Infrastructure Webbs Stores should protect and control their access to the cloud network infrastructure. Two recommendations are provided for controlling the access to the cloud network infrastructure. They are as follows: i) External and Internal Threats: Cloud network infrastructure always have the risk from external and internal threats (Sanaei et al., 2014). Webbs stores should be careful about their security of cloud network infrastructure. ii) Server Monitoring: Webbs Stores should monitor their server regularly so that the access is controlled (Tao et al., 2014). This can protect the access of the cloud network infrastructure. Cloud Backup and Restore Infrastructure Webbs Stores should protect and control the access of the backup and restoration infrastructure. Two suggestions that can help Webbs Stores in this phenomenon are as follows: i) Encryption: Encryption is the procedure of hiding a confidential data or information in such a way so that it does not get stolen by intruder (Hashem et al., 2015). It encrypts the data into a cipher text and only the authorized receiver is able to access that data. Webbs Stores should opt for encryption for protection of access to the backup and restore infrastructure. ii) Passwords: Passwords can protect any system from hackers and intruders. Webbs Stores should protect their cloud backup and restore infrastructure by applying password protection to it (Botta et al., 2016). It is recommended that the password should be biometric authenticated. The above mentioned recommendations will be extremely helpful for the Board of Webbs Stores for migration of data. Conclusion Therefore, from the above report it can concluded that, a recognized and renowned regional retailer of Australia is the Webbs Stores. The main business of this company is to sell food items. It also sells some of the specialty stuffs. The company has two original data centers. They are in Sydney and Melbourne. Apart from these two main data centers, the company even has some of the regional data centers in Brisbane, Bathurst, Port Macquarie, Auckland and Wagga. Recently, they have decided to move their database from MS SQL Server 2012 R2 to IaaS instance. Webbs Stores have taken a decision of undertaking cloud computing for their business. The problem with this decision is that the data management, the operational and application complexities have become much complicated and they are not able to handle them. They have even decided to close down the regional data center in Auckland because of its traditional infrastructure. They could have easily replaced or updated its existing infra structure. All the services and the important data are shifted to the cloud database. A Risk and Security Workshop is planned to run for accessing the security risks, threats and the possible control methods, which are need for a hybrid cloud. The above report covers a detailed discussion on the Webbs Stores case study. The report also briefs about the benefits of data migration to cloud IaaS infrastructure. The type of security policy that should be deployed is the authentication and authorization policy. The various threats of data migration to cloud are also provided in the report. The report even describes the use of cloud in case of removal and backup of the records. The report further helps to understand how to protect and control the access to the data and services for migration of data. Proper suggestions and recommendations are given in the following report. Migration of data from MS SQL Server R2 database to any IaaS instance would be extremely helpful for the company. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Arora, R., Parashar, A., Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), 1922-1926. Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, 529-534. Botta, A., De Donato, W., Persico, V., Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Garg, S. K., Versteeg, S., Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), 1012-1023. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Malawski, M., Juve, G., Deelman, E., Nabrzyski, J. (2015). Algorithms for cost-and deadline-constrained provisioning for scientific workflow ensembles in IaaS clouds.Future Generation Computer Systems,48, 1-18. Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions.Mobile Networks and Applications,19(2), 133-143. RittinghouType of Security Deployedent, and security. CRC press. Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges.IEEE Communications Surveys Tutorials,16(1), 369-392. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344. Xiao, Z., Song, W., Chen, Q. (2013). Dynamic resource allocation using virtual machines for cloud computing environment.IEEE transactions on parallel and distributed systems,24(6), 11