The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Given the omnipresent role of information technology in today's society, interdisciplinary approaches to system design become increasingly indispensable. Unilateral assessments coming from one discipline are creating the risk that important issues are overlooked. Current cloud security is hard to assess, because virtualization technology also implies losing control and transparency over data and processes...
Cloud computing datacenters dynamically provide millions of virtual machines in actual cloud computing markets and several challenging problems have to be addressed towards an efficient resource management of these infrastructures. In the context of resource allocation, Virtual Machine Placement (VMP) is one of the most studied problems with several possible formulations and a large number of existing...
We present a design for a general federation agent based on the OpenStack Keystone v3 service. We examine and choose an initial approach based on peer-to-peer methods that support the use of arbitrary application-level services in Virtual Organizations. We review general federation management requirements, deployment models, and current work, including those using Keystone. We then extend our work...
A Body of Knowledge (BOK) is a term used to represent the complete set of concepts, terms, and activities that make up a professional domain. It encompasses the core teaching skills and research in a field or industry [13]. One of the main concerns of the software industry is to develop the talent of its human resources since the quality and innovation of its products and services depend of a great...
Service level agreements (SLAs) are considered not only a central tool for managing QoS compliance, but also a differentiating factor between service implementations. In today's application environments with fast instrumentation deployment cycles in hybrid Cloud platforms, managing QoS compliance poses tremendous challenges, including how to deliver solutions that live up to promised QoS properties...
As the adoption of Cloud Computing is growing exponentially, a huge sheer amount of data is generated therefore needing to be processed in order to control efficiently what is going within the infrastructure, and also to respond effectively and promptly to security threats. Herein, we provide a highly scalable plugin based and comprehensive solution in order to have a real-time monitoring by reducing...
With the pervasion of cloud computing new security risks are created. A promising approach to alleviating these risks is to provide a security-by-design framework that will assist cloud application developers in defining appropriate context-driven access control policies. This paper surveys different approaches to context-driven access control, as well as different modelling formalisms for representing...
The emerging new EU data protection regulation requires that regardless of the location of the data centers a cloud service provider will have to comply with the EU data protection regulation if it provides services to EU citizens. Handling personal data in a legally compliant way is a very important factor for ensuring the trustworthiness of a cloud service provider. In this paper we present a software...
Before deploying their infrastructure (resources, data, communications, ) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deployed, the company want to be assured that this policy is applied and enforced. But...
The use of cloud computing for AEC (Architecture/ Engineering/ Construction) projects has been intensively explored in recent research. Companies have adopted cloud computing for storing the massive amount of data that the AEC industry generates. In most cases these cloud systems are private, isolated and limited in terms of the actual computing operations. With the emergence of "multi-Clouds"...
SaaS providers typically adopt a multi-tenant architecture to leverage economies of scale. By maximizing the sharing of resources among multiple customer organizations, called tenants, operational costs are reduced. However, this high degree of resource sharing complicates performance isolation between tenants: different tenants have different requirements regarding performance and ensuring compliance...
Multi-tenant Software as a Service (SaaS) is the cloud computing delivery model that maximizes resource sharing up to the level of a single application instance servicing many customer organizations (tenants) at once. Due to this scale of delivery, a SaaS offering, once successful, becomes difficult to upgrade and evolve without affecting service continuity and tenant businesses profoundly. However,...
The deployment of applications able to consume cloud infrastructure services is currently a tedious process especially when it should be often repeated in the application developing phase. We present a technical solution that simplifies the deployment process, as being almost fully automated. Its integration as a module of an open-source platform for enforcing security controls by its users is further...
Nowadays, a growing number of companies are using Cloud Computing to optimize their business processes by using dynamically scalable and often virtualized resources on demand. Nevertheless, due to the lack of explicit and formal description of the resource perspective in existing business processes, Cloud resource allocation behavior cannot be efficiently and correctly managed. In this paper, we aim...
Beacons are small Bluetooth low energy (BLE) signal emitting devices that can transmit data about their location, temperature, motion etc. Various startups have commercialized Beacon based applications, such as for tracking valuable items, micro-location targeting of people, micro payments etc. However, these applications are not customizable beyond the use cases they were designed to serve. We feel...
The dependency on cloud computing is expanding exponentially due to its operational and cost-effective benefits, allowing organizations to adopt solutions within very short periods without wasting enormous efforts and resources on implementation, instead focusing on more strategic objectives. Therefore, the process of understanding the effect of critical success factors (CSFs) which influences the...
The convergence of Internet of Things (IoT) and the Cloud has significantly facilitated the provision and management of services in large-scale applications such as smart cities. With a huge number of IoT services accessible through clouds, it is very important to model and expose cloud-based IoT services in a scalable manner, promising easy and realtime delivery of smart city services. The existing...
By nature, cloud computing systems are static, homogenous entities. They consist of multiple layers of hardware and software resources. These resources are organized into stacks which provide services to end users. Many service stacks are built from a single template. As a result, they consist of identical resources with identical configurations. This gives potential attackers the asymmetric advantage...
Existing research on implementing the mobile cloud computing paradigm is typically based on offloading demanding computation from mobile devices to cloud-based servers. A continuous, high quality connection to the cloud infrastructure is normally required, with frequent high-volume data transfer, which can have a detrimental impact on the user experience of the application or service. In this paper,...
Proliferation of Cloud markets has created influx of e-service consumers seeking cost effective services. But, mobile consumers face the challenge of intermittent internet disconnection, long latency, and high energy consumption. To address this challenge, Ad-hoc Mobile Cloud (AMC) paradigm has evolved, where web services are hosted and provided by mobile peers. However, there are three inherent challenges...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.