1,165 research outputs found

    Cloud Computing in Digital and University Libraries

    Get PDF
    Libraries may soon be building and managing their own data centers. This model would let libraries maintain more control over the applications and data stores that contain sensitive, private information about patrons. Provisioning and maintenance of infrastructure for Web based digital library present several challenges. In this paper we discuss problems faced with digital library and development efforts to overcome that problem. Infrastructure virtualization and cloud computing are particularly attractive choices which is challenged by both growth in the size of the indexed document collection, new features and most prominently usage. With the purpose of applying Cloud Computing to university library, the paper describes the current status of user service models in university libraries. Then it proposed to improve current user service model with Cloud Computing. This paper explores some of the security issues surrounding data location, mobility and availability

    On the security of NoSQL cloud database services

    Get PDF
    Processing a vast volume of data generated by web, mobile and Internet-enabled devices, necessitates a scalable and flexible data management system. Database-as-a-Service (DBaaS) is a new cloud computing paradigm, promising a cost-effective and scalable, fully-managed database functionality meeting the requirements of online data processing. Although DBaaS offers many benefits it also introduces new threats and vulnerabilities. While many traditional data processing threats remain, DBaaS introduces new challenges such as confidentiality violation and information leakage in the presence of privileged malicious insiders and adds new dimension to the data security. We address the problem of building a secure DBaaS for a public cloud infrastructure where, the Cloud Service Provider (CSP) is not completely trusted by the data owner. We present a high level description of several architectures combining modern cryptographic primitives for achieving this goal. A novel searchable security scheme is proposed to leverage secure query processing in presence of a malicious cloud insider without disclosing sensitive information. A holistic database security scheme comprised of data confidentiality and information leakage prevention is proposed in this dissertation. The main contributions of our work are: (i) A searchable security scheme for non-relational databases of the cloud DBaaS; (ii) Leakage minimization in the untrusted cloud. The analysis of experiments that employ a set of established cryptographic techniques to protect databases and minimize information leakage, proves that the performance of the proposed solution is bounded by communication cost rather than by the cryptographic computational effort

    Video: Going Your Own Way: What You Need to Know About Starting Your Own Law Practice or Business

    Get PDF
    Registration & Continental Breakfast: 7:30 to 7:55 am Atrium & Lecture Room Welcome & Introduction: 7:55 to 8:00 am Elena Rose Minicucci, J.D., Director of Alumni Relations, NSU Shepard Broad Law Center Welcome Introduce Russell Miller Thompson, Esq. of the Law Offices of Russell M. Thompson, Sunrise, Florida. Seminar Presentation 8:00 am to 9:30 am Russell M. Thompson, Esq

    Cloud Computing: Challenges And Risk Management Framework

    Get PDF
    Cloud-computing technology has developed rapidly. It can be found in a wide range of social, business and computing applications. Cloud computing would change the Internet into a new computing and collaborative platform. It is a business model that achieves purchase ondemand and pay-per-use in network. Many competitors, organizations and companies in the industry have jumped into cloud computing and implemented it. Cloud computing provides us with things such as convenience, reduced cost and high scalability. But despite all of these advantages, there are many enterprises, individual users and organizations that still have not deployed this innovative technology. Several reasons lead to this problem; however, the main concerns are related to security, privacy and trust. Low trust between users and cloud computing providers has been found in the literature

    Cloud enabled data analytics and visualization framework for health-shocks prediction

    Get PDF
    In this paper, we present a data analytics and visualization framework for health-shocks prediction based on large-scale health informatics dataset. The framework is developed using cloud computing services based on Amazon web services (AWS) integrated with geographical information systems (GIS) to facilitate big data capture, storage, index and visualization of data through smart devices for different stakeholders. In order to develop a predictive model for health-shocks, we have collected a unique data from 1000 households, in rural and remotely accessible regions of Pakistan, focusing on factors like health, social, economic, environment and accessibility to healthcare facilities. We have used the collected data to generate a predictive model of health-shock using a fuzzy rule summarization technique, which can provide stakeholders with interpretable linguistic rules to explain the causal factors affecting health-shocks. The evaluation of the proposed system in terms of the interpret-ability and accuracy of the generated data models for classifying health-shock shows promising results. The prediction accuracy of the fuzzy model based on a k-fold cross-validation of the data samples shows above 89% performance in predicting health-shocks based on the given factors

    CPA’s Guide to Technology in a PFP Practice

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2697/thumbnail.jp

    Secure data storage and retrieval in cloud computing

    Get PDF
    Nowadays cloud computing has been widely recognised as one of the most inuential information technologies because of its unprecedented advantages. In spite of its widely recognised social and economic benefits, in cloud computing customers lose the direct control of their data and completely rely on the cloud to manage their data and computation, which raises significant security and privacy concerns and is one of the major barriers to the adoption of public cloud by many organisations and individuals. Therefore, it is desirable to apply practical security approaches to address the security risks for the wide adoption of cloud computing

    New Waves of IoT Technologies Research – Transcending Intelligence and Senses at the Edge to Create Multi Experience Environments

    Get PDF
    The next wave of Internet of Things (IoT) and Industrial Internet of Things (IIoT) brings new technological developments that incorporate radical advances in Artificial Intelligence (AI), edge computing processing, new sensing capabilities, more security protection and autonomous functions accelerating progress towards the ability for IoT systems to self-develop, self-maintain and self-optimise. The emergence of hyper autonomous IoT applications with enhanced sensing, distributed intelligence, edge processing and connectivity, combined with human augmentation, has the potential to power the transformation and optimisation of industrial sectors and to change the innovation landscape. This chapter is reviewing the most recent advances in the next wave of the IoT by looking not only at the technology enabling the IoT but also at the platforms and smart data aspects that will bring intelligence, sustainability, dependability, autonomy, and will support human-centric solutions.acceptedVersio

    Cloud Computing in Digital and University Libraries

    Get PDF
    Libraries may soon be building and managing their own data centers. This model would let libraries maintain more control over the applications and data stores that contain sensitive, private information about patrons. Provisioning and maintenance of infrastructure for Web based digital library present several challenges. In this paper we discuss problems faced with digital library and development efforts to overcome that problem. Infrastructure virtualization and cloud computing are particularly attractive choices which is challenged by both growth in the size of the indexed document collection, new features and most prominently usage. With the purpose of applying Cloud Computing to university library, the paper describes the current status of user service models in university libraries. Then it proposed to improve current user service model with Cloud Computing. This paper explores some of the security issues surrounding data location, mobility and availability
    • …
    corecore