The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data outsourcing has become quite popular in recent years. While the rapid development of cloud storage service, it brings about many new security challenges. One of the biggest concerns with cloud data storage is that of data integrity at untrusted cloud servers. For example, when individual users store important data files in cloud servers, the data files may be damaged or corrupted because of cloud...
Patients' data security and privacy is fundamental in the perspective of moving clinical data over the Cloud. Indeed, this concern has slowed down the adoption of Cloud services in the healthcare context. In fact, clinical operators are reluctant to open Hospital Information Systems (HIS) to external Cloud services. In this paper, we discuss system developed at the IRCCS “Bonino Pulejo” clinical and...
Cloud Computing is emerging amongst all the ascending technologies as the most prodigious process in the chronicles of computing. As it still takes some time to settle, a new challenge as felt whilst its implementation across has been a relatively more gratuitously new. Today as Cloud technology is increasingly expanding across the globe for its resulting benefits but still it needs time to offer...
When employed in educational settings, cloud computing applications enable users to create, store, organize, and share divergent artefacts with their peers. As an outcome, they have a large number of users worldwide which makes them vulnerable to a variety of security and privacy related threats. With an aim to examine the extent of the perceived security and privacy in the context of cloud computing...
Internet of Things (IoT) can support numerous applications and services in various domains, such as smart cities and smart homes. IoT smart objects interact with other components e.g., proxies, mobile devices, and data collectors, for management, data sharing and other activities in the context of the provided service. Though such components contribute to address various societal challenges and provide...
In today's cloud computing platforms, more and more users are now working or collaborating in multi-cloud environment, in which collaborators, clouds, computing nodes may belong to different institutions or organizations. Those different organizations might have their own policies. Security is still a big concern in cloud computing. To help cloud vendors and customers to detect and prevent from being...
User profiles are important in many areas in which it is essential to obtain knowledge about users of software applications. Knowledge about a user includes his likes, dislikes, even his emotional state can be determined by user profiling. In this paper we examine what information constitutes a user profile; and how the profile information is used to get the emotional state of a user. We also study...
Every day we entrust our privacy, safety, and security to police officers sworn to protect and serve. While many critical infrastructure computer systems have been well studied, the computer infrastructure supporting these officers remains to be surveyed in public literature. We remedy this by characterizing a sample police department's systems through a security lens, discussing weak points and areas...
In Cloud Computing one of the most cogent issues is the storage of data because the entire data reside over a set of interconnected resource pool that enables the virtual machine to access those data. The data management and services may not be fully trustworthy because the resource pools are situated over various corners of the world. There are various issues that need to be addressed, but privacy...
Sequence alignment has been used to align DNA sequences to find matching segments of DNA from different specimens. Just as DNA sequences can be used to find similar patterns in DNA, this process can also be used on computer programs to identify when segments of code have been reused. Malware programs generally are made from other malware programs or malware templates. The byte information of these...
Dropbox, Google Drive, OneDrive, Box etc are popular File Storage providers for the Cloud. Recently reported vulnerability like Heartbleed for servers using OpenSSL has created panic among Cloud users. Hence, it is essential to encrypt the files by the users before uploading them to the cloud. Many File encrypting tools like Veracrypt, AxCrypt, Boxcrypt, are in place to encrypt files. But they have...
Certification has been proved as an essential mechanism for achieving different security properties in new systems. However, it has important advantages; among which we highlighted the increasing in users trust by means of attesting security properties, but it is important to consider that in most of cases the system that is subject of certification is considered to be monolithic, and this feature...
In this paper, we conducted a review of techniques and methods used for collaborative data management for business purposes on the WEB. The aim was to propose a document flow optimization and to offer an information technology support for all departments of an organization. In a business organization or a firm, professionals involved in solving specific tasks either use the same data (common information)...
The life-science and health care research environments offer an abundance of new opportunities for improvement of their efficiency and productivity using big data in collaborative research processes. A key component of this development is e-Science analytics, which is typically supported by Cloud computing nowadays. However, the state-of-the-art Cloud technology does not provide an appropriate support...
The adoption of cloud computing is increasing and its use is becoming widespread in many sectors. As the proportion of services provided using cloud computing increases, legal and regulatory issues are becoming more significant. In this paper we explore how an Information Flow Audit (IFA) mechanism, that provides key data regarding provenance, can be used to verify compliance with regulatory and contractual...
Network virtualization is a double-edged sword that facilitates network innovation but may cause information leakage between virtual nodes coexisting on the same substrate node via covert channels. This paper represents the first attempt to consider risk-tolerant coexistence in virtual network embedding. We propose a secure virtual network embedding scheme to mitigate the risk of covert channel attacks...
STEM education can enormously benefit from cloud technology. The cloud can offer instructors and students (whether local or remote) on-demand, dedicated, isolated, unlimited, and easily configurable compute and storage resources. The cloud can significantly reduce cost and expenditure on lab construction and maintenance. Due to these features, the cloud has been widely adopted by many universities...
Crowd-sourcing is an amalgamation of outsourcing to the crowd. Being an extremely well flourishing paradigm crowd sourcing is soon to be the new Cloud computing because it has revolutionized the entire organizational setup. In this paper we not only show the circumstances that led to the modern day crowd-sourcing but also the concerns of security complications and privacy invasions that have arisen...
Cloud computing nothing but the sharing of resources and pay as per we use. The use of cloud is increasing daily. But the problem with cloud computing is every day data is get uploaded on the cloud. The increasing similar data. So deduplication is best method to reduce the used size of cloud and with the help deduplication of data approach duplicate data is removed from cloud storage. To exclude the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.