1,131 research outputs found

    A new MDA-SOA based framework for intercloud interoperability

    Get PDF
    Cloud computing has been one of the most important topics in Information Technology which aims to assure scalable and reliable on-demand services over the Internet. The expansion of the application scope of cloud services would require cooperation between clouds from different providers that have heterogeneous functionalities. This collaboration between different cloud vendors can provide better Quality of Services (QoS) at the lower price. However, current cloud systems have been developed without concerns of seamless cloud interconnection, and actually they do not support intercloud interoperability to enable collaboration between cloud service providers. Hence, the PhD work is motivated to address interoperability issue between cloud providers as a challenging research objective. This thesis proposes a new framework which supports inter-cloud interoperability in a heterogeneous computing resource cloud environment with the goal of dispatching the workload to the most effective clouds available at runtime. Analysing different methodologies that have been applied to resolve various problem scenarios related to interoperability lead us to exploit Model Driven Architecture (MDA) and Service Oriented Architecture (SOA) methods as appropriate approaches for our inter-cloud framework. Moreover, since distributing the operations in a cloud-based environment is a nondeterministic polynomial time (NP-complete) problem, a Genetic Algorithm (GA) based job scheduler proposed as a part of interoperability framework, offering workload migration with the best performance at the least cost. A new Agent Based Simulation (ABS) approach is proposed to model the inter-cloud environment with three types of agents: Cloud Subscriber agent, Cloud Provider agent, and Job agent. The ABS model is proposed to evaluate the proposed framework.Fundação para a Ciência e a Tecnologia (FCT) - (Referencia da bolsa: SFRH SFRH / BD / 33965 / 2009) and EC 7th Framework Programme under grant agreement n° FITMAN 604674 (http://www.fitman-fi.eu

    Security Strategies to Prevent Data Breaches in Infrastructure as a Service Cloud Computing

    Get PDF
    Due to the ever-growing threat of security breaches that information technology (IT) organizations continually face, protecting customer information stored within the cloud is critical to ensuring data integrity. Research shows that new categories of data breaches constantly emerge; thus, security strategies that build trust in consumers and improve system performance are a must. The purpose of this qualitative multiple case study was to explore and analyze the strategies used by database administrators (DBAs) to secure data in a private infrastructure as a service (IaaS) cloud computing. The participants comprised of 6 DBAs from 2 IT companies in Baltimore, Maryland, with experience and knowledge of security strategies to secure data in private IaaS cloud computing. The disruptive innovation theory was the conceptual framework for this study. Data were collected using semistructured interviews and a review of 7 organizational documents. A thematic analysis was used to analyze the data. Four key themes emerged: importance of well-defined security measures in cloud computing, measures to address security controls in cloud computing, limitations of existing security controls in cloud computing, and future and potential security measures solutions in cloud computing. The findings may benefit DBAs and IT organizations by providing strategies to prevent future data breaches. Well-defined security strategies may protect an individual’s data, which in turn may promote individual well-being and build strong communities

    A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features

    Get PDF
    A disgusting problem in public cloud is to securely share data based on fine grained access control policies and unauthorized key management. Existing approaches to encrypt policies and data with different keys based on public key cryptosystem are Attribute Based Encryption and proxy re-encryption. The weakness behind approaches is: It cannot efficiently handle policy changes and also problem in user revocation and attribute identification.  Even though it is so popular, when employed in cloud it generate high computational and storage cost. More importantly, image encryption is some out complex in case of public key cryptosystem. On the publication of sensitive dataset, it does not preserve privacy of an individual. A direct application of a symmetric key cryptosystem, where users are served based on the policies they satisfy and unique keys are generated by Data Owner (DO). Based on this idea, we formalize a new key management scheme, called Symmetric Chaos Based key Management (SCBKM), and then give a secure construction of a SCBKM scheme called AS-Chaos. The idea is to give some secrets to Key Manager (KM) based on the identity attributes they have and later allow them to derive actual symmetric keys based on their secrets. Using our SCBKM construct, we propose an efficient approach for fine-grained encryption-based access control for data stored in untrusted cloud storage

    Exploring Strategies that IT Leaders Use to Adopt Cloud Computing

    Get PDF
    Information Technology (IT) leaders must leverage cloud computing to maintain competitive advantage. Evidence suggests that IT leaders who have leveraged cloud computing in small and medium sized organizations have saved an average of $1 million in IT services for their organizations. The purpose of this qualitative single case study was to explore strategies that IT leaders use to adopt cloud computing for their organizations. The target population consisted of 15 IT leaders who had experience with designing and deploying cloud computing solutions at their organization in Long Island, New York within the past 2 years. The conceptual framework of this research project was the disruptive innovation theory. Semistructured interviews were conducted and company documents were gathered. Data were inductively analyzed for emergent themes, then subjected to member checking to ensure the trustworthiness of findings. Four main themes emerged from the data: the essential elements for strategies to adopt cloud computing; most effective strategies; leadership essentials; and barriers, critical factors, and ineffective strategies affecting adoption of cloud computing. These findings may contribute to social change by providing insights to IT leaders in small and medium sized organizations to save money while gaining competitive advantage and ensure sustainable business growth that could enhance community standards of living

    Cloud Computing Implementation Organizational Success in the Department of Defense

    Get PDF
    The DoD tends to implement user based IT systems without quantifying whether those systems would be properly utilized by the target populous. Focus is generally emphasized on mission enhancement rather than looking at how or if it will be utilized by organizations. There would appear to be no reason for cloud computing to be implemented with the same disregard for acceptance and success. The day of large amounts of data is here and needs to converge with what this thesis investigates, the factors that positively influence organization acceptance and success of cloud computing specifically in the DoD so that is can properly maintain, utilize and store that data. This research focused in depth on that utilization

    Towards full network virtualization in horizontal IaaS federation: security issues

    Full text link
    corecore