677 research outputs found

    Twenty security considerations for cloud-supported Internet of Things

    Get PDF
    To realise the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends towards the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy and personal safety risks that arise beyond these subsystems; that is, from the wide-scale, crossplatform openness that cloud services bring to IoT. In this paper we focus on security considerations for IoT from the perspectives of cloud tenants, end-users and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies (be they things or entire IoT subsystems). Our contribution is to analyse the current state of cloud-supported IoT to make explicit the security considerations that require further work.This work was supported by UK Engineering and Physical Sciences Research Council grant EP/K011510 CloudSafetyNet: End-to-End Application Security in the Cloud and Microsoft through the Microsoft Cloud Computing Research Centre

    Design and Implementation of a Scalable Crowdsensing Platform for Geospatial Data

    Get PDF
    In the recent years smart devices and small low-powered sensors are becoming ubiquitous and nowadays everything is connected altogether, which is a promising foundation for crowdsensing of data related to various environmental and societal phenomena. Very often, such data is especially meaningful when related to time and location, which is possible by already equipped GPS capabilities of modern smart devices. However, in order to gain knowledge from high-volume crowd-sensed data, it has to be collected and stored in a central platform, where it can be processed and transformed for various use cases. Conventional approaches built around classical relational databases and monolithic backends, that load and process the geospatial data on a per-request basis are not suitable for supporting the data requests of a large crowd willing to visualize phenomena. The possibly millions of data points introduce challenges for calculation, data-transfer and visualization on smartphones with limited graphics performance. We have created an architectural design, which combines a cloud-native approach with Big Data concepts used in the Internet of Things. The architectural design can be used as a generic foundation to implement a scalable backend for a platform, that covers aspects important for crowdsensing, such as social- and incentive features, as well as a sophisticated stream processing concept to calculate incoming measurement data and store pre-aggregated results. The calculation is based on a global grid system to index geospatial data for efficient aggregation and building a hierarchical geospatial relationship of averaged values, that can be directly used to rapidly and efficiently provide data on requests for visualization. We introduce the Noisemap project as an exemplary use case of such a platform and elaborate on certain requirements and challenges also related to frontend implementations. The goal of the project is to collect crowd-sensed noise measurements via smartphones and provide users information and a visualization of noise levels in their environment, which requires storing and processing in a central platform. A prototypic implementation for the measurement context of the Noisemap project is showing that the architectural design is indeed feasible to realize

    Selecting Link Resolver and Knowledge Base Software: Implications of Interoperability

    Get PDF
    Link resolver software and their associated knowledge bases are essential technologies for modern academic libraries. However, because of the increasing number of possible integrations involving link resolver software and knowledge bases, a library’s vendor relationships, product choices, and consortial arrangements may have the most dramatic effects on the user experience and back-end maintenance workloads. A project team at a large comprehensive university recently investigated link resolver products in an attempt to increase efficiency of back-end workflows while maintaining or improving the patron experience. The methodology used for product comparison may be useful for other libraries

    Digital Librarian Competency in Managing digitized Library: A requirement for Cloud Computing Implementation in Libraries

    Get PDF
    This article appreciates the opportunities made available by Information and Communication Technology tools in the global world and tries to provide a measure by which librarians and library professionals can fully take up responsibilities of managing digitized library in a cloud computing environment. The specific functions required of a digital librarian are been identified via Digital Librarian Cloud Competency Model (DLCCM), bearing in mind skills of Digital Librarians such as knowledge on computer hardware and software that are required to facilitate implementation of Cloud Computing in Libraries. It is believed that competency could be attained by digital librarian via rigorous training and regular application of the ICT tools to any aspect of library functions in either sequential or sporadic manner, and as fast as possible. Suggestions are given to provide guides for digital librarian in establishing coordinated efforts while involving in cloud computing activities where library functions are now beyond space, time frame and geographical location. Keywords: Library, Digital Librarian, ICTs, Cloud Computing, Computer Competency, Digital Library, Information Ag

    Benefits of Cloud Computing: Literature Review in a Maturity Model Perspective

    Get PDF
    Cloud computing is drawing attention from both practitioners and researchers, and its adoption among organizations is on the rise. The focus has mainly been on minimizing fixed IT costs and using the IT resource flexibility offered by the cloud. However, the promise of cloud computing is much greater. As a disruptive technology, it enables innovative new services and business models that decrease time to market, create operational efficiencies and engage customers and citizens in new ways. However, we are still in the early days of cloud computing, and, for organizations to exploit the full potential, we need knowledge of the potential applications and pitfalls of cloud computing. Maturity models provide effective methods for organizations to assess, evaluate, and benchmark their capabilities as bases for developing roadmaps for improving weaknesses. Adopting the business-IT maturity model by Pearlson & Saunders (2007) as analytical framework, we synthesize the existing literature, identify levels of cloud computing benefits, and establish propositions for practice in terms of how to realize these benefits

    Exploring Strategies that IT Leaders Use to Adopt Cloud Computing

    Get PDF
    Information Technology (IT) leaders must leverage cloud computing to maintain competitive advantage. Evidence suggests that IT leaders who have leveraged cloud computing in small and medium sized organizations have saved an average of $1 million in IT services for their organizations. The purpose of this qualitative single case study was to explore strategies that IT leaders use to adopt cloud computing for their organizations. The target population consisted of 15 IT leaders who had experience with designing and deploying cloud computing solutions at their organization in Long Island, New York within the past 2 years. The conceptual framework of this research project was the disruptive innovation theory. Semistructured interviews were conducted and company documents were gathered. Data were inductively analyzed for emergent themes, then subjected to member checking to ensure the trustworthiness of findings. Four main themes emerged from the data: the essential elements for strategies to adopt cloud computing; most effective strategies; leadership essentials; and barriers, critical factors, and ineffective strategies affecting adoption of cloud computing. These findings may contribute to social change by providing insights to IT leaders in small and medium sized organizations to save money while gaining competitive advantage and ensure sustainable business growth that could enhance community standards of living

    Harnessing Artificial Intelligence Capabilities Through Cloud Services: a Case Study of Inhibitors and Success Factors

    Get PDF
    Industry and research have recognized the need to adopt and utilize artificial intelligence (AI) to automate and streamline business processes to gain competitive edges. However, developing and running AI algorithms requires a complex IT infrastructure, significant computing power, and sufficient IT expertise, making it unattainable for many organizations. Organizations attempting to build AI solutions in-house often opt to establish an AI center of excellence, accumulating huge costs and extremely long time to value. Fortunately, this deterrence is eliminated by the availability of AI delivered through cloud computing services. The cloud deployment models, Infrastructure as a Service, Platform as a Service, and Software as a Service provide various AI services. IaaS delivers virtualized computing resources over the internet and enables the raw computational power and specialized hardware for building and training AI algorithms. PaaS provides development tools and running environments that assist data scientists and developers in implementing code to bring out AI capabilities. Finally, SaaS offers off-the-shelf AI tools and pre-trained models provided to customers on a commercial basis. Due to the lack of customizability and control of pre-built AI solutions, this empirical investigation focuses merely on IaaS and PaaS-related AI services. The rationale is associated with the complexity of developing, managing and maintaining customized cloud infrastructures and AI solutions that meet a business's actual needs. By applying the Diffusion of Innovation (DOI) theory and the Critical Success Factor (CSF) method, this research explores and identifies the drivers and inhibitors for AI services adoption and critical success factors for harnessing AI capabilities through cloud services.Based on a comprehensive review of the existing literature and a series of nine systematic interviews, this study reveals ten factors that drive- and 17 factors that inhibit the adoption of AI developer tools and infrastructure services. To further aid practitioners and researchers in mitigating the challenges of harnessing AI capabilities, this study identifies four affinity groups of success factors: 1) organizational factors, 2) cloud management factors, 3) technical factors, and 4) the technology commercialization process. Within these categories, nine sub-affinity groups and 20 sets of CSFs are presented
    corecore