The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research aims at validating the vital factors that affecting the continuous use of cloud computing services through literature review and experts' evaluation. These factors are factors that have an effect on the decision makers to forge ahead in the use of cloud computing services in their various organizations. Semi-structured interviews using email were carried out with twenty-three experts...
In this paper we present a new, very large, rich, Comprehensive Scholarly Corpus (CompScholarCorp) as a platform and data source for future research. Our corpus contains records of 1,044,454 papers, 472,365 unique authors, and substantial publication meta-data for each record. We have integrated the data we collected from 276 publishers using a uniform and consistent XML data format within the corpus...
With the rapid growth of Cloud Computing technologies, enterprises are increasingly deploying their services in the Cloud. Dynamically priced cloud resources such as the Amazon EC2 Spot Instance provides an efficient mechanism for cloud service providers to trade resources with potential buyers using an auction mechanism. With the dynamically priced cloud resource markets, cloud consumers can buy...
In this work, we examine an access scope, a concept in authorization management broadly applied for the specification of access constraints in web service integrations. By analyzing a typical use-case of cross-organizational cloud service automation, we show the suboptimal capabilities of static, coarse-grained and inflexible scopes that negatively impact security and management of service integrations...
In sensor clouds environments, the provisioning process is a crucial task since it is responsible for selecting physical sensors nodes that will be allocated to compose virtual sensors. In literature, most works consider the allocation of all sensors within the region of interest. However, this approach causes serious problems such as wasted energy consumption. Therefore, the objective of this paper...
Cloud computing is a broad research area that uses many aspects of software and hardware solutions, including computing and storage resources, application runtimes or complex application functionalities. OpenStack is an open source cloud computing platform having a modular architecture, based on the IaaS (Infrastructure as a Service) model. The aim of this paper is to provide a high-level view of...
Cloud computing is growing rapidly due to its features of low cost, space saving, sharing etc., yet security issues are still a major concern. Multi-cloud computing technology was developed, in part, to address security concerns. One technique could use the Shamir's secret sharing method which is based on risk diversification. This work offers a solution strategy allowing users to allocate their resources...
As the volume of data stored by Big data and Cloud services continues to grow, both academia and industry are seeking for high-performance storage systems. Recently, with the recent advances in write-optimized indexes (WOI), WOI-based file systems can now outperform conventional file systems with orders of magnitude on random writes, metadata updates, and small file creation. Based on the B-tree structure,...
In this paper, we present some preliminary results on a user study which was geared to obtain a better understanding for the relevance and impact of how the media reports on data breaches. Specifically, we conducted a study to investigate whether or not there is a correlation between the media coverage of data breaches and the perceived data breach fatigue among the general public.
NoSQL is one of the technical trends that rises in this context in the Web 2.0 Era. With the aim to explore the research status and development trends related to NoSQL technology, articles between 1998 and 2016 were collected from Thomson ISI's SCI. After the analysis by using CiteSpace V, the pivotal documents related to NoSQL, as well as institutions, co-citation patterns, research hotspots and...
Internet, combined with the technologies of communication and information (ICT), is changing the society. Most aspects of the life of each individual have been influenced by this technological revolution. Education is not indifferent to this reality, since a number of tools and applications have been created which seek to improve the learning process. However, these educational technologies do not...
Trust management systems provide a means for trustworthy interactions in cloud environments. However, trust establishment could be compromised when malicious cloud users intentionally provide unfair feedbacks to decrease the reputation of some cloud providers or to benefit others. In this paper, we define "Feedback Entropy" as a newmetric to detect unfair rating attacks. As such, we propose...
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the job of choosing the suitable resource to be a very difficult one for the common users. Then the technology of service broker came out which is designed to choose the appropriate services among different providers to meet the user's...
Cloud Service Broker federates multiple Cloud Service Providers into a single entity to customers. The benefits that can be enjoyed by Cloud Service Consumer are flexibility, ease of use, and reduced cost. However, because of the unique properties and configurations of each cloud provider, sometime it's not easy to migrate between one cloud provider to another. Furthermore, the advantage of using...
The technology uses TCP / IP as the basic means of communication, adding a custom data communication protocol, through the integration of distributed storage scheduling ideas, multiple FPGA development board simulation into a large number of storage devices, through the unified mapping of the target data protocol Processing, to achieve data security, stable and reliable cloud storage, and because...
In the past few years, datacenter (DC) energy consumption has become an important issue in technology world. Server consolidation using virtualization and virtual machine (VM) live migration allows cloud DCs to improve resource utilization and hence energy efficiency. In order to save energy, consolidation techniques try to turn off the idle servers, while because of workload fluctuations, these offline...
Cloud Services have become an important part of the business world. Although public cloud services provide a range of advantages, it also creates concerns over security, network usage and the need for technical expertise in the management of the cloud. This paper describes a local private cloud which uses on-site hardware infrastructure and which incorporates a three tier management system. This device...
Network service providers have to cope with the growing on-demand need from end-users as well as the diversity of usage. The softwerization and cloudification of the network components offer an interesting solution to achieve the agility necessary to dynamically match the requirement with the level of resource consumption. This materializes with the deployment of Network Functions Virtualization (NFV)...
In this paper, we propose an approach to select top-k cloud services. Our approach combines the trust, determined by the reputation of the provider, and the QoS. We present different algorithms for processing such selection queries and evaluate them through a set of experiments.
Software Defined Networking (SDN) is increasingly being used in data centers as well as enterprise networks. In an environment that has strict compliance requirements, such as HIPAA compliance, a critical role for an SDN controller is to route all data packets while considering data privacy preservation and compliance-preservation. In this paper, we address this problem by proposing a routing protocol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.