The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the explosive growth of data capacity, large enterprises increasingly rely on business information systems. A highly informational and data-centralized grid company that engages in high-frequency businesses will face major business failures, incalculable impacts and irreparable damages once data errors occur. The development of an effective high-availability information system has become a hot...
In recent years, millions of people are connected on social networks. Social networks have become an excellent platform for sharing information and communication that reflects real world relationships. This global use of social networks has made them to be an excellent candidate for using cloud. As a result, numerous access control methods have been proposed to maximize available resources. In addition,...
The growth of public DNA sequence and metagenomic data over the last two decades has been exponential. Bioinformatics researchers are confronted with analysis of massive data sets, while the problem is still growing at an alarming rate in the near future. In this paper, we integrate many open source software tools in biological sequences analysis to construct an effective cloud-based microbial metagenomics...
The fast growing and the aging of the population are some of the major problems today in terms of medical treatment in public or private hospitals. In this context, particularly talking about the health equipments belonging to each hospital, we also observe that governments and administrators still face difficulties in overseeing the tracking, allocation and management of such equipments in real-time...
With emergence in cloud computing there was a huge demand for the data center technology and the operating system which can handle the data center. Increasing demand of infrastructure services leading the organizations to move towards Cloud. The aim is to provide an opportunity to the industry to build a hosting architecture, massively scalable which is completely open source, and to provide a solution...
The primary issues of data storage in cloud are the data authentication and confidentiality accessing the data. A direct solution to data privacy by encrypting the data before outsourcing the data in the untrusted server of cloud. This proposes the Privacy and Access Control for Security of Credit Card Records in the cloud using Partial Shuffling. Three components in privacy of records, Initially...
Cloud computing, often referred to as simply “the cloud,” is the delivery of on-demand computing resources; everything from applications to data centers over the Internet. Cloud is used not only for storing data, but also the stored data can be shared by multiple users. Due to this, the integrity of cloud data is subject to doubt. Every time it is not possible for user to download all data and verify...
In this paper, we describe a framework that allows to automate and repeat business process execution on different cloud configurations. We present how and why the different components of the experimentation pipeline-like Ansible, Docker and Jenkins have been set up, and the kind of results we obtained on a large set of configurations from the AWS public cloud. It allows us to calculate actual prices...
IT services built from cloud applications are subject of several maintenance operations like upgrades, reconfigurations, or redeployments. Monitoring those changes is crucial to detect operator errors, which are a main source of service failures. Another challenge, which exacerbates operator errors is the increasing frequency of changes, e.g. because of continuous deployments. In this paper we propose...
Privacy and security of big data is emerging as one among the most relevant research challenges of recent years, also stirred-up by a wide family of critical applications ranging from scientific computing to social network analysis and mining, from data stream management to smart cities, and so forth. Traditionally, the issue of making (even very-large) databases private and secure has a long history...
Apache Cassandra is a distributed database of choice when it comes to big data management with zero downtime, linear scalability, and seamless multiple data center deployment. However, resource allocation for the system during deployment is a major issue which could either lead to bad performance or under-utilization of resources. In this paper we describe a QoS-aware architecture that manages resources...
Social networking platforms such as Twitter have become a global phenomenon. Net citizens use such services as part of their daily lives. Given this, the opportunities to mine such data resources is of considerable interest to researchers, businesses and government alike. Many researchers have explored the analysis of such resources to support sentiment analysis and event detection amongst many other...
The healthcare system consists of large volumes of data which are usually generated from diverse sources such as physicians' case notes, hospital admission notes, discharge summaries, pharmacies, insurance companies, medical imaging, laboratories, sensor based devices, genomics, social media as well as articles in medical journals. Healthcare data are however very complex and difficult to manage....
The technology of Intelligence agent is an application of artificial intelligence, as well as a hot topic of the IT circle. A new system architecture related to intelligent agent technology is proposed based on the characteristics of cloud computing. The architecture is divided into four layers: user layer, agent layer, application layer and data layer. The paper analyses the key technology of intelligent...
Flexible IT landscapes and efficient management of resources are key issues for enterprises. In cloud computing, varying requirements are discussed at application and platform level. In contrast, variability at cloud infrastructure level is seldom discussed. We have identified several variability requirements at infrastructure level from customer perspective. From service provider perspective, we...
Cloud computing enables massive parallelization of execution of large scale simulation experiments but it is complex to do it in a cost-efficient way. We present methodology used to achieve this goal that was devised in the ROUTE-TO-PA project, where we develop a simulator for generalization of the dynamics of preferences observed on the social platform to the entire population. Experimenting with...
In this paper, we discuss the issue of collaborative data sharing among a number of parties to provide rich online services to their clients. We assume that each party hosts its data in a private cloud infrastructure but they collectively agree to certain well-defined set of accesses and access restrictions to one another's databases. We show how these can be used to derive access rules that become...
Cloud computing relies on virtualization technologies to provide computer resource elasticity and scalability. Despite its benefits, virtualization technologies come with serious concerns in terms of security. Although existing work focuses on specific vulnerabilities and attack models related to virtualization, a systematic analysis of known vulnerabilities for different virtualization models, including...
Cloud computing provides reliable and highlyscalable access to resources over the internet. But outsourcing sensitive data to an probably untrusted cloud provider (third party) requires cryptographic methods like encryption. This paper presents a novel approach to a distributed cloud key management scheme. In a setting with a public cloud application, data is encrypted by a separate trusted adapter...
Cloud Computing is the key technology of today's cyber world which provides online provisioning of resources on demand and pay per use basis. Malware attacks such as virus, worm and rootkits etc. are some threats to virtual machines (VMs) in cloud environment. In this paper, we present a system call analysis approach to detect malware attacks which maliciously affect the legitimate programs running...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.