4 research outputs found

    A Call Graph Reduction based Novel Storage Allocation Scheme for Smart City Applications

    Get PDF
    Today s world is going to be smart even smarter day by day Smart cities play an important role to make the world smart Thousands of smart city applications are developing in every day Every second very huge amount of data is generated The data need to be managed and stored properly so that information can be extracted using various emerging technologies The main aim of this paper is to propose a storage scheme for data generated by smart city applications A matrix is used which store the information of each adjacency node of each level as well as the weight and frequency of call graph It has been experimentally depicted that the applied algorithm reduces the size of the call graph without changing the basic structure without any loss of information Once the graph is generated from the source code it is stored in the matrix and reduced appropriately using the proposed algorithm The proposed algorithm is also compared to another call graph reduction techniques and it has been experimentally evaluated that the proposed algorithm significantly reduces the graph and store the smart city application data efficientl

    Fog based Secure Framework for Personal Health Records Systems

    Get PDF
    The rapid development of personal health records (PHR) systems enables an individual to collect, create, store and share his PHR to authorized entities. Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions' repositories located in the cloud. The cloud computing paradigm cannot meet such a massive transformative healthcare systems due to drawbacks including network latency, scalability and bandwidth. Fog computing relieves the burden of conventional cloud computing by availing intermediate fog nodes between the end users and the remote servers. Aiming at a massive demand of PHR data within a ubiquitous smart city, we propose a secure and fog assisted framework for PHR systems to address security, access control and privacy concerns. Built under a fog-based architecture, the proposed framework makes use of efficient key exchange protocol coupled with ciphertext attribute based encryption (CP-ABE) to guarantee confidentiality and fine-grained access control within the system respectively. We also make use of digital signature combined with CP-ABE to ensure the system authentication and users privacy. We provide the analysis of the proposed framework in terms of security and performance.Comment: 12 pages (CMC Journal, Tech Science Press

    Adoption of Cloud Computing Services in an Illinois-Based Insurance Company

    Get PDF
    The decision to adopt cloud computing services should involve business units of an insurance company as well as information technology (IT) because cloud computing services are viewed as both a technology offering and business alternative. The purpose of this qualitative exploratory case study was to explore the strategies used by IT architects of an Illinois-based insurance company when adopting cloud computing services. The theory supporting this study was the technology acceptance model. The study\u27s population consisted of IT architects from an Illinois-based insurance company that have used strategies to adopt cloud computing services. This study\u27s data collection included semistructured interviews and review of organizational documents. Member checking with each participant increased the validity of this study\u27s findings. Four major themes emerged from this study: strategies to adopt cloud computing services, strategies to adopt cloud services models, strategies to adopt cloud computing models, and concerns affecting the strategies to adopt cloud computing services. The study findings may assist IT architects in developing effective strategies to adopt cloud computing services for their respective business unit. This study might serve as a foundation for positive social change by decreasing customer concerns regarding critical information being compromised when adopting cloud computing services
    corecore