8 research outputs found

    Simulating Cloud Environment in Single Host Machine by Applying Virtual Switches in VMware

    Get PDF
    Computer virtualization in its simplest form is where one physical Server simulates being several separate servers and it allows one server to handle various functions or processes. It enables a single system to concurrently run multiple isolated virtual machines (VMs), operating systems or multiple instances of a single operating system and It minimizes resource requirements of hardware and software, minimizes power consumption, increases utilizations, maximizes hardware processing power, minimizes the work costs in the data center and maximizes the usage of available resources. Virtualization is a partitioning of single physical server into multiple logical servers. This paper work highly focuses on the configuration of virtual switch, Virtual Bridge, Virtual Host adapters and NAT devices. This paper work is implemented by using one host computer, one virtual bridge, two virtual Ethernet switches and three virtual machines. Keywords: VMware, Virtualization, Public cloud, Private cloud, Virtual cloud, community cloud, Hyper-V, VMNet, Virtual switch DOI: 10.7176/CEIS/11-4-02 Publication date:June 30th 202

    From cloud computing security towards homomorphic encryption: A comprehensive review

    Get PDF
    “Cloud computing” is a new technology that revolutionized the world of communications and information technologies. It collects a large number of possibilities, facilities, and developments, and uses the combining of various earlier inventions into something new and compelling. Despite all features of cloud computing, it faces big challenges in preserving data confidentiality and privacy. It has been subjected to numerous attacks and security breaches that have prompted people to hesitate to adopt it. This article provided comprehensive literature on the cloud computing concepts with a primary focus on the cloud computing security field, its top threats, and the protection against each one of them. Data security/privacy in the cloud environment is also discussed and homomorphic encryption (HE) was highlighted as a popular technique used to preserve the privacy of sensitive data in many applications of cloud computing. The article aimed to provide an adequate overview of both researchers and practitioners already working in the field of cloud computing security, and for those new in the field who are not yet fully equipped to understand the detailed and complex technical aspects of cloud computing

    SOSE4BD: Service-oriented software engineering framework for big data applications

    Get PDF
    © 2019 by SCITEPRESS - Science and Technology Publications, Lda. Service computing has emerged to address the notion of delivering software as a service and Service-Oriented Architecture emerged as a design method supporting well defined design principles of loose coupling, interface design, autonomic computing, seamless integration, and publish/subscribe paradigm. Integrated big data applications with IoT, Fog, and Cloud Computing grow exponentially: businesses as well as the speed of the data and its storage. Therefore, it is time to consider systematic and engineering approach to developing and deploying big data services as the data-driven applications and devices increasing rapidly. This paper proposes a software engineering framework and a reference architecture which is SOA based for big data applications' development. This paper also concludes with a simulation of a complex big data Facebook application with real-time streaming using part of the requirements engineering aspect of the SOSE4BD framework with BPMN as a tool for requirement modelling and simulation to study the characteristics before big data service design, development, and deployment. The simulation results demonstrated the efficiency and effectiveness of developing big data applications using the reference architecture framework for big data

    Adaptation and Effects of Cloud Computing on Small Businesses

    Get PDF
    One of the popular technologies in the industry today is cloud computing and the use of cloud computing in small businesses is now fashionable, it has a remarkable impact on them by bringing a new way of working, accessing their data and storing it. The aim of the study is to examine the impacts and effects of migration to cloud computing on small businesses. The methodology used for this study is based on a review of past studies, which explains in broad terms each research question of this study. The results of this study shows that there are several benefits that cloud computing has to offer small businesses if cloud computing is adopted and that includes flexibility, cost reduction and automatic software/hardware upgrades etc. Cloud computing has a large storage capacity that helps small businesses store and access large amounts of data quickly and easily, and there are a number of cloud computing data recovery techniques that help to recover lost or damaged data in the cloud. In the same way that security is a major concern for all technologies, it is also a concern for data stored in the cloud; security techniques such as encryption, cryptography are mostly used to ensure that key areas of data security (data confidentiality, data integrity and data availability) are protected. The results of this study helps small businesses to understand the impact of cloud computing on their businesses and the various security measures that need to be taken while adapting cloud computing technology.</p

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition
    corecore