116 research outputs found

    A Comparative Analysis on Handling Big Data Using Cloud Services

    Get PDF
    In this era of technology, a lot of advancements have been done in almost every field such as medical, science, aerospace and other fields. With the increasing advancements in technology, a lot of data is being produced at the same time. For instances in the field of medicine there is a huge amount of data that is being generated as there are hundreds and thousands of patients who came for their checkup. So now the question arises where this huge amount of data is being stored. This huge amount of data is called as Big Data. And the major problem faced is how to manage and organize this huge amount of data along with its security and not being lost. Big data is used for extracting a lot of useful information but it is not easy to organize it. If the data is being lost than there are a lot of problems that can occur on a huge level as a lot of data being stored in big data is very confidential. This data can be stored on cloud which is the new advancement in the field of technology as it is highly reliable for huge amount of information. So, in this survey paper we will discuss about the solutions of organizing and handling big data proposed by different authors

    Cloudarmor: Supporting Reputation-Based Trust Management for Cloud Services

    Get PDF
    Cloud services have become predominant in the current technological era. For the rich set of features provided by cloud services, consumers want to access the services while protecting their privacy. In this kind of environment, protection of cloud services will become a significant problem. So, research has started for a system, which lets the users access cloud services without losing the privacy of their data. Trust management and identity model makes sense in this case. The identity model maintains the authentication and authorization of the components involved in the system and trust-based model provides us with a dynamic way of identifying issues and attacks with the system and take appropriate actions. Further, a trust management-based system provides us with a new set of challenges such as reputation-based attacks, availability of components, and misleading trust feedbacks. Collusion attacks and Sybil attacks form a significant part of these challenges. This paper aims to solve the above problems in a trust management-based model by introducing a credibility model on top of a new trust management model, which addresses these use-cases, and also provides reliability and availability

    Infrastructure as a service: exploring network access control challenges

    Get PDF
    Cloud Computing Infrastructure as a Service (IaaS) is a great model for outsourcing IT infrastructure. It is built to offer fascinating features to support business development, such as elasticity, multi-tenancy, configurability and dynamicity. However, IaaS faces security challenges on account of its flexible nature. For this article, we studied the IaaS characteristics and investigated their related security challenges. We then elaborated these security challenges by exploring the security threats on live virtual machine migration as it is one of the main IaaS operations. We found that proper access control techniques and models are a critical element in enhancing IaaS and mitigating the identified security threats. Therefore, we investigated and contrasted the implemented and the proposed firewall architectures in IaaS as a firewall is a basic security appliance that enforces access control. We also explored and contrasted the proposed access control models in the IaaS. It was found that the traditional firewalls and access control models were not sufficient for IaaS. Therefore, there is a need to develop a proper access control model and enforcement techniques to mitigate IaaS security threats. Based on the security research trend and the results obtained in this articles exploration, we endorse an IaaS access control system built on a computational intelligent approach

    A Survey on Energy Efficiency in Smart Homes and Smart Grids

    Get PDF
    Empowered by the emergence of novel information and communication technologies (ICTs) such as sensors and high-performance digital communication systems, Europe has adapted its electricity distribution network into a modern infrastructure known as a smart grid (SG). The benefits of this new infrastructure include precise and real-time capacity for measuring and monitoring the different energy-relevant parameters on the various points of the grid and for the remote operation and optimization of distribution. Furthermore, a new user profile is derived from this novel infrastructure, known as a prosumer (a user that can produce and consume energy to/from the grid), who can benefit from the features derived from applying advanced analytics and semantic technologies in the rich amount of big data generated by the different subsystems. However, this novel, highly interconnected infrastructure also presents some significant drawbacks, like those related to information security (IS). We provide a systematic literature survey of the ICT-empowered environments that comprise SGs and homes, and the application of modern artificial intelligence (AI) related technologies with sensor fusion systems and actuators, ensuring energy efficiency in such systems. Furthermore, we outline the current challenges and outlook for this field. These address new developments on microgrids, and data-driven energy efficiency that leads to better knowledge representation and decision-making for smart homes and SGsThis research was co-funded by Interreg Österreich-Bayern 2014–2020 programme project KI-Net: Bausteine für KI-basierte Optimierungen in der industriellen Fertigung (AB 292). This work is also supported by the ITEA3 OPTIMUM project and ITEA3 SCRATCH project, all of them funded by the Centro Tecnológico de Desarrollo Industrial (CDTI), Spain

    Multifunctional Product Marketing Using Social Media Based on the Variable-Scale Clustering

    Get PDF
    Customers\u27 demands have become more dynamic and complicated owing to the functional diversity and lifecycle reduction of products which pushes enterprises to identify the real-time needs of distinct customers in a superior way. Meanwhile, social media turned as an emerging channel where customers often spontaneously can express their perceptions and thoughts about products promptly. This paper examines the customer satisfaction identification and improvement problem based on social media mining. First, we proposed the public opinion sensitivity index (POSI) to uncover target customers from extensive short-textual reviews. Subsequently, we presented a customer segmentation approach based on the sentiment analysis and the variable-scale clustering (VSC). The approach is able to get several customer clusters with the same satisfaction level where customers belonging to each cluster have similar interests. Finally, customer-centered marketing strategies and customer difference marketing campaigns are planned under the shadow of customer segmentation results. The experiments illustrate that our proposed method can support marketing decision marketing in practice that enriches the intention of the current customer relationship management

    Cyberattacks and Security of Cloud Computing: A Complete Guideline

    Get PDF
    Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, key exposure, auditing, privacy preservability, and cloud-assisted IoT applications. We then propose security attacks and countermeasures specifically for the different cloud models based on the security trends and problems. In the end, we pinpoint some of the futuristic directions and implications relevant to the security of cloud models. The future directions will help researchers in academia and industry work toward cloud computing security

    ESTABLISHING A STANDARD SCIENTIFIC GUIDELINE FOR THE EVALUATION AND ADOPTION OF MULTI-TENANT DATABASE

    Get PDF
    A thesis submitted in partial fulfilment of the requirements of the University of Wolverhampton for the degree of Doctor of Philosophy.A Multi-tenant database (MTD) is a way of deploying a Database as a Service (DaaS). A multi-tenant database refers to a principle where a single instance of a Database Management System (DBMS) runs on a server, serving multiple clients organisations (tenants). This technology has helped to discard the large-scale investments in hardware and software resources, in upgrading them regularly and in expensive licences of application software used on in-house hosted database systems. This is gaining momentum with significant increase in the number of organisations ready to take advantage of the technology. The benefits of MTD are potentially enormous but for any organisation to venture into its adoption, there are some salient factors which must be well understood and examined before venturing into the concept. This research examines these factors, different models of MTD, consider the requirements and challenges of implementing MTDs. Investigation of the degree of impact each of these factors has on the adoption of MTD is conducted in this research which focused mainly on public organisations. The methodology adopted in undertaking this study is a mixed method which involved both qualitative and quantitative research approaches. These strategies are used here to cover statistics (quantifiable data) and experts’ knowledge and experiences (abstract data) in order to satisfactorily achieve the aim and objectives and complete the research. Following the involvement of these strategies, a framework was developed and further refined after a second survey was carried out with a quantitative approach. This framework will help prospective tenants to make informed decisions about the adoption of the concept. The research also considers the direction of decisions about MTDs in situations where two or more factors are combined. A new MTD framework is presented that improves the decision making process of MTD adoption. Also, an Expert System (ES) is developed from the framework which was validated via a survey and analysed with the aid of SPSS software. The findings from the validation indicated that the framework is valuable and suitable for use in practice since majority of respondents accepted the research findings and recommendations for success. Likewise, the ES was validated with majority of participants accepting it and embracing the high level of its friendliness
    corecore