The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Authentication mechanisms available in existing cloud platforms are inadequate for and poorly-suited to modern cloud-based systems. To support this argument, we describe a variety of authentication mechanisms commonly used in the cloud, and we detail how these mechanisms are actually used in one significant open-source service deployed to a popular cloud platform. We further report on authentication...
Cloud computing offers the potential for productivity, cost savings and innovation advantages to organizations. To utilize these benefits, to facilitate wide-scale cloud adoption and to embrace cloud computing, we must address many cloud security challenges. Attackers can compromise the vulnerable hosts and can either take over their resources or use them as stepping stones for future attacks. Open...
With the prevalence of cloud computing, privacy-preserving database outsourcing has been spotlighted. To preserve both data privacy and query privacy from adversaries, databases need to be encrypted before being outsourced to the cloud. However, there exists the only kNN classification scheme over the encrypted databases in the cloud. Because the existing scheme suffers from high computation overhead,...
Leveraging Virtual Machine (VM) technologies to host multiple Web applications on the same physical machine can improve the resource utilization and thus save a cloud provider's provisioning cost. By allocating and scheduling virtual CPU (vCPU) resources for running VMs, a hosted Web application may achieve varying performances. Thus, when facing an end user with a specific SLA (Service Level Agreement)...
To respond to requests for proposals from clients requiring complex Information technology (IT) services, IT service providers have to prepare a solution composed of the multiple services requested by the clients and price that solution. Then, each provider competes in a tender-kind of process trying to convince the client with their solution. Pricing these solutions/deals, using historical and market...
Cloud computing offers many advantages as flexibility or resource efficiency and can significantly reduce costs. However, when sensitive data is outsourced to a cloud provider, classified records can leak. To protect data owners and application providers from a privacy breach data must be encrypted before it is uploaded. In this work, we present a distributed key management scheme that handles user-specific...
Outsourcing data processing and storage to the cloud is a persistent trend in the last years. Cloud computing offers many advantages like flexibility in resource allocation, cost reduction and high availability. However, when sensitive information is handed to a third party, security questions are raised since the cloud provider and his employees are not fully trusted. Standard security mechanisms...
In the past two decades, due to Taiwans national insurance policy, a substantial amount of medical and patient records have been stored in a large database. From this database, much important medical knowledge has been discovered; however, with the rapid growth of database size, it takes an increasingly long time to process queries on the database, even rather simple queries. We, therefore, propose...
Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in the cloud using Hadoop/Spark. In this paper, we discuss the importance of providing provenance capabilities in context of Hadoop as a service (HaaS) framework. We first review the state of the art in provenance tracking in context of databases and work-flow processing,...
B2B (business-to-business) systems often use service-oriented architecture (SOA) with decomposed business services. These services can interact and share data among each other. Service might use a cloud – hosted database, such as a non - relational encrypted key – value store. However, the cloud platform hosting the database can be untrusted. Data owner needs to be sure that each service can access...
Database is widely used for information storage and management. With the explosion of the data size, the requirement of the storage capacity is growing dramatically. Cloud offers clients a scalable solution to meet the demand of the increasing space. A cloud service, if used and managed properly, can increase the resource usability and provide more secure services. In this paper, we propose a cloud-based...
The recent deployment of novel network concepts, such as M2M communication or IoT, has undoubtedly stimulated the placement of a new set of services, leveraging both centralized resources in Cloud Data Centers and distributed resources shared by devices at the edge of the network. Moreover, Fog Computing has been recently proposed having as one of its main assets the reduction of service response...
Remote experimentation has long conflicted with security policies imposed by networks administrators. To provide external access to experiment servers in a university, security measures are demanded. Such leads to an excessive dependency on the IT departments for services configuration and maintenance. In the present work, modifications in ISA/ELSA architecture are proposed to circumvent those problems...
The paper proposes a modern solution to sustain data communication in an e-Health framework and also the design principles for an e-Health Interoperability Platform for Health Information Systems support. Additionally, the paper presents a mediating service mechanism used to map and convert the context-specific data exchanged between the different parties that are communicating and a dedicated interface...
Near Field Communication (NFC) is a special subset within the family of RFID. It is quite popular for a smart phone to support NFC features. In this paper, we use NFC technology to construct a one card points (OCP) system. The store staff can use a smart phone to scan the user's RFID tag or smart phone to manage the collected points for the user. Traditionally, stores distribute paper cards to users...
With the growth of Infrastructure as a Service (IaaS) in cloud computing, and the Internet of Things (IoT), network monitoring of the global infrastructure will continue to expand, as cybersecurity will become of primary importance. Current network monitoring approaches, particularly those that are agent-based, are proprietary, costly, and may not scale. This paper proposes a lightweight, scalable...
In this paper, we describe a cloud platform for health care tourism of Hainan province, China. The relevant business process is designed in a way that the characteristics of health care are taken into account. A scheme that combines medical tourism with a self-health care system and a nursing system is proposed. The data storage structure of the health care system is given, together with the specific...
Despite their proliferation as a dominant computing paradigm, cloud computing systems lack effective mechanisms to manage their vast amounts of resources efficiently. Resources are stranded and fragmented, ultimately limiting cloud systems' applicability to large classes of critical applications that pose non-moderate resource demands. Eliminating current technological barriers of actual fluidity...
From the perspective of services to the population, with vast social implications, in which the security, confidentiality, and access to personal data represents a critical region, the medical services and information systems that are on the base of the strategic management in health care systems, are a theme of maximum interest and rather less approached. In particular, the prospect of at-home health...
The paper presents an ICT system that supports medical staff's activity, monitoring and assessing the treatment. Based on it, the MDs may decide the most effective treatments. The ICT system consists of a web-based application in the cloud, named Obstetrics-Gynecology Department Information System (OGD IS). The OGD IS described in this paper is a new version and includes the Statistical Component...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.