The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Microservice architecture allows different parts of an application to be developed, deployed and scaled independently, therefore becoming a trend for developing cloud applications. However, it comes with challenging security issues. First, the network complexity introduced by the large number of microservices greatly increases the difficulty in monitoring the security of the entire application. Second,...
There is a clear, outstanding need for new security mechanisms that allow data to be managed and controlled within the cloud-enabled Internet of Things. Towards this, we propose an approach based on Information Flow Control (IFC) that allows: (1) the continuous, end-to-end enforcement of data flow policy, and (2) the generation of provenance-like audit logs to demonstrate policy adherence and contractual/regulatory...
Inter-area Oscillations pose serious threats to the stability of power transmission grids. Failure to notice or to handle inter-area oscillations may lead to widespread catastrophic blackouts. It is, therefore, critically important to monitor the oscillation conditions such that timely mitigation controls can be applied at the early stage. Recent research shows that it is an effective approach to...
As we are growing in new era of advance technology with Petascale computing, high bandwidth of data transmission, big data storage and the next generation of digital world. It a high time to have smart and intelligent class rooms which will subside all the traditional way of teachings. And make the end to end process of teaching and learning easy and smart. Making students and teachers a witness of...
Cloud Computing is a term which allows user to access the set applications to perform a group of functions or tasks on the internet enabled devices. The cloud has been divided into three types: private, public and hybrid which are briefly described in this paper. SaaS, IaaS and PaaS are the services of the cloud. Cloud is generally provided by the third party, thus it faces few security challenges...
The traditional education system, also referred as conventional education system, was mainly based on the black board teaching and face to face classroom interactions. The reach of an expert was upto 100 students approximately. Later, in a phase manner, a number of technologies were invented and these were used as tools to serve and meet the enhanced educational needs. Some popular medium used to...
Monitoring of the high-performance computing systems and their components, such as clusters, grids and federations of clusters, is performed using monitoring systems for servers and networks, or Network Monitoring Systems (NMS). These monitoring tools assist system administrators in assessing and improving the health of their infrastructure.
The effective and efficient use of dependable cloud infrastructures requires the agreement between users and cloud providers on resources, services, operating conditions, and features as well as the mapping of users' requirements onto the cloud architecture. In this paper, we identify the different ways in which fuzzy logic can be profitably adopted in performing these tasks, providing flexibility...
The rise and variety of cloud services and their growing availability has enabled the creation of multi-cloud applications that take advantage of cloud service combinations. These applications need to avoid security breaches and preserve data integrity and user privacy in the whole service composition. The MUSA framework arises as a global solution to support the security of the whole multi-cloud...
The past decade has witnessed immense developments in the field of network computing thanks to the rise of the cloud computing paradigm, which enables shared access to a wealth of computing and storage resources without needing to own them. While cloud computing facilitates on-demand deployment, mobility and collaboration of services, mechanisms for enforcing security and performance constraints when...
With over 200 children dying per day due to unsafe water, drinking water crisis is ranked one on the global risk by World Economic Forum, 2015. Of those who face the problem 82% are from rural areas. Despite this, the mobile penetration in these areas is much higher than sanitation and drinking water. This paper focuses on ways to improve the water quality and awareness about the same through a sensor-actuator...
Cloud computing has created a remarkable paradigm shift in the IT industry and brought several advantages such as on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. These advantages enabled cloud to have significant impact on different sectors of smart cites. However, cloud adoption has increased the sophistication of the ever changing security...
5G constitutes the next revolution in mobile communications. It is expected to deliver ultra-fast, ultra-reliable network access supporting a massive increase of data traffic and connected nodes. Different technologies are emerging to address the requirements of future mobile networks, such as Software Defined Networking (SDN), Network Function Virtualization (NFV) and cloud computing concepts. In...
Mobile cloud computing is a powerful technology for supporting the growing demand of mobile applications. Unfortunately, existing mobile cloud service architectures are imperfect since mobile devices are not considered as the available resources. In this paper, a general framework is proposed that regarding mobile devices as resources by introducing proxy. Differs from other architectures, this framework...
Monitoring cloud resources is an essential part of cloud computing, and although some effort has been made in this direction, monitoring security parameters is still an open issue because of the large number and types of resources available in a multi tenant environment. In this paper we propose a distributed monitoring system that is able to monitor, filter and store security parameters of network...
The perception of lack of control over resources deployed in the cloud may represent one of the critical factors for an organization to decide to cloudify or not their own services. Furthermore, in spite of the idea of offering security-as-a-service, the development of secure cloud applications requires security skills that can slow down the adoption of the cloud for nonexpert users. In the recent...
Service Level Agreement (SLA) is an essential tool for managing cloud computing services. The support of the security requirements through SLA is fundamental to achieve the full potential of the cloud computing paradigm. In this paper we present how security requirements are addressed in a cloud computing SLA. Furthermore, a unified SLA lifecycle for cloud computing services is proposed. The relationship...
Though current workflow systems, known as the major task managing tool in data-center, use UNIX-based user/group authorization mechanisms to defend unauthorized operations, the information in workflow systems, such as DAG (Directed Acyclic Graph), could be easily exposed to any user-level malicious monitor. In this paper, we propose a type of side channel attack to data-center workflow information...
With the rising popularity of Web applications and cloud computing technology, a secure cloud computing environment is one of the main concerns. Currently, enterprise cloud platforms often rely on their maintenance and operation, and medium and small companies cannot effectively save manpower information security costs, and thus has affected the willingness of enterprises to use cloud services. In...
Oriented by requirement of trust management in multiple cloud environment, this paper presents T-broker, a trust-aware service brokering scheme for efficient matching cloud services (or resources) to satisfy various user requests. First, a trusted third party-based service brokering architecture is proposed for multiple cloud environment, in which the T-broker acts as a middleware for cloud trust...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.