29 research outputs found

    Semantic Search Approach in Cloud

    Get PDF
    With the approach of cloud computing, more and more information data are distributed to the public cloud for economic savings and ease of access. But, the encryption of privacy information is necessary to guarantee the security. Now a days efficient data utilization, and search over encrypted cloud data has been a great challenge. Solution of existing methods depends only on the keyword of submitted query and didn�t examine the semantics of keyword. Thus the search schemes are not intelligent and also omit some semantically related documents. To overcome this problem, we propose a semantic expansion based similar search solution over encrypted cloud data. The solution of this method will return not only the exactly matched files, but also the files including the terms semantically related to the query keyword. In this scheme, a corresponding file metadata is constructed for each file. After this, both the encrypted file metadata set and file collection are uploaded to the cloud server. With the help of metadata set file, the cloud server maintains the inverted index and create semantic relationship library (SRL) for the keywords set. After receiving a query request from user , this server firstly search out the keywords that are related to the query keyword according to SRL. After this, both the query keyword and the extensional words are used to retrieve the files to fulfill the user request. These files are returned in order according to the total relevance score. Our detailed security analysis shows that our method is privacy-preserving and secure than the previous searchable symmetric encryption (SSE) security definition. Experimental evaluation demonstrates the efficiency and effectives of the scheme

    Faktor penambahbaikan kriteria kebolehgunaan bagi portal kerajaan Malaysia

    Get PDF
    Penggunaan internet menjadi trend baru pengguna untuk memperoleh maklumat dan pengetahuan terutamanya perkhidmatan dari agensi kerajaan. Justeru, pembangun portal perlu memberi fokus ke atas kualiti antara muka portal bagi memasti interaksi pengguna yang lancar dan fleksibel. Isu kebolehgunaan yang timbul semasa pembangunan dapat menjejas fungsi antara muka portal yang disedia. Ketidakpatuhan kepada garis panduan kebolehgunaan semasa pembangunan, rujukan yang kompleks dan tidak merangkumi kriteria kebolehgunaan sebenar menjadi punca kepada kegagalan menghasil antara muka yang boleh guna. Satu model pengukuhan kriteria kebolehgunaan dibangun sebagai langkah penambahbaikan dan garis panduan sedia ada yang dikuat kuasa diteliti bagi mengatasi isu kebolehgunaan ini. Hasil daripada penambahbaikan mengenal pasti tujuh kriteria kebolehgunaan baharu; Fungsi dan Kesesuaian, Sokongan dan Panduan, Ralat dan Pemulihan, Kawalan dan Kestabilan, Perisian dan Perkakasan, Proses Reka Bentuk dan Penilaian serta Kerahsiaan. Kriteria ini tidak disenarai sebagai kriteria wajib patuh oleh agensi penguatkuasa dan ianya dijangka mampu mempengaruhi reka bentuk kebolehgunaan portal sektor awam

    A Lightweight Authentication Scheme for Transport System Farecards

    Get PDF
    Proximity Integrated Circuit Cards (PICC) are widely used for public transport fare collection. The stored contents in the card can only be accessed or modified after the card is able to authenticate the Proximity Coupling Device (PCD) or reader using a shared secret key. We propose a new authentication scheme that is not based on shared secret keys. Instead, authentication is based on the card and reader being able to compute an identical pairwise key using their own private keying material obtained from the same source. The computation is done off-line and does not require the participation of a third party. It uses simple modular arithmetic operations over a small binary extension field, achieving fast computation speed using the limited resources in cards. In addition, should the keys be stolen from the cards or readers, the security of the other parts of the system cannot be compromised

    CHINESE E-COMMERCE MODEL: Using ALIBABA as a case study

    Get PDF
    This report aims to analyze Alibaba’s e-commerce mode. With the development of internet technology, e-commerce is attracting more and more attention from governments, businesses and individuals which is one of the major reasons for Alibaba’s quick development. The author has seen the importance of e-commerce and important role of Alibaba in e-commerce field. This report will start by introducing Alibaba briefly. And then the major theories and concepts used by the report will be analyzed, especially e-commerce, PEST framework and Porter’s five forces model. In addition, details of Alibaba’s e-commerce mode, problems of its mode will be provided in the following paragraph. Based on this situation, several suggestions will help Alibaba to resolve its problems. Literature review, theoretical research and practical analysis are two major approaches to analyze its e-commerce mode. In this way, Alibaba can make further progress in the future

    Supporting Users in Cloud Plan Selection

    Get PDF
    Cloud computing is a key technology for outsourcing data and applications to external providers. The current cloud market offers a multitude of solutions (plans) differing from one another in terms of their characteristics. In this context, the selection of the right plan for outsourcing is of paramount importance for users wishing to move their data/applications to the cloud. The scientific community has then developed different models and tools for capturing users\u2019 requirements and evaluating candidate plans to determine the extent to which each of them satisfies such requirements. In this chapter, we illustrate some of the existing solutions proposed for cloud plan selection and for supporting users in the specification of their (crisp and/or fuzzy) needs

    Sustainability Condition of Open Innovation: Dynamic Growth of Alibaba from SME to Large Enterprise

    Get PDF
    Research Question: Open innovation and the open business model exaggerate complexity (a transaction cost) in addition to the realization of emergence and its lock-in. Within a short period, Alibaba has become one of the global top e-commerce companies with several open innovation business models. Our research question was: How could Alibaba become a global top e-commerce company in China in such a short time? Research Method: We chose a deep interview method, participatory observation, and meta-analysis to answer this research question. Research Result: Alibaba has applied global, creative e-commerce business models through open innovation in a short time. In addition, it has overcome complexity-i.e., the cost of open innovation and the force that breaks down a company-through an open innovation-friendly culture. This is a Jack-Ma style consumer confidence and new Guanxi culture, a new and strong Chinese corporate culture. Alibaba has also undergone the expansion of its open business model feedback loop platform. This study investigated the expanded open business model feedback loop platform, the continuously strengthened open-innovation-friendly culture, and complexity, with the latter being the cost of open innovation, which was controlled by an open-innovation-friendly culture and open business model feedback loop. © 2020 by the authors. Licensee MDPI, Basel, Switzerland.1

    A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions

    Get PDF
    While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision directions for future research. In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research directions

    A consensus-based approach for selecting cloud plans

    Get PDF
    An important problem when moving an application to the cloud consists in selecting the most suitable cloud plan (among those available from cloud providers) for the application deployment, with the goal of finding the best match between application requirements and plan characteristics. If a user wishes to move multiple applications at the same time, this task can be complicated by the fact that different applications might have different (and possibly contrasting) requirements. In this paper, we propose an approach enabling users to select a cloud plan that best balances the satisfaction of the requirements of multiple applications. Our solution operates by first ranking the available plans for each application (matching plan characteristics and application requirements) and then by selecting, through a consensus-based process, the one that is considered more acceptable by all applications

    Information Technology in Healthcare: HHC-MOTES, a Novel Set of Metrics to Analyse IT Sustainability in Different Areas

    Get PDF
    Sustainability, as a science, is the guideline of the present work. It aims to analyse, by means of a literature review, various areas of healthcare in which information technology (IT) has been- or could be-used, leading to several sources of sustainability, for example, cost savings, better teamwork, higher quality and efficiency of medical care. After a brief introduction analysing the strategic contexts in which innovation in general, and IT in particular, can be a source of general improvements in efficiency, cost savings and service quality, the research focuses on the healthcare system by discussing the different nature of private and public organizations in terms of adopting innovations and changes and discussing the issue of consumer health costs and consumer choices. The following part focuses on the qualitative benefits of IT in healthcare and discusses the importance of metrics for measuring performance, costs and efficiency in this area. The work then qualitatively introduces a new set of Key Performance Indicators (KPI), partly based on literature from different topics and existing and validated sets of metrics, analysing, under the point of view of sustainability, the implementation of IT in healthcare, namely in management, organization, technology, environment and social fields (HHC-MOTES framework). The model, inspired by and to sustainability, can be used as a decision support at the strategic management level as well as for the analysis and investigation of the effects of IT systems in the healthcare sector from various perspectives
    corecore