22 research outputs found

    CHALLENGES OF VALUE CREATION THROUGH CLOUD SAAS: BUSINESS/IT ALIGNMENT IN SERVICE ORIENTED INDUSTRIES

    Get PDF
    Although Business/IT alignment has gathered much interest in the past, it still presents a challenge for service sector companies facing Software-as-a-Service (SaaS) sourcing. Such companies lack managerial experience and competency of using ubiquitous technologies and SaaS applications in order to create business value. This paper provides evidence on how SaaS strengthens alignment between IT and business strategies and how it indirectly creates value for service sector enterprises. We employ semi-structured interviews and case studies to determine how aligning business strategy with SaaS -enabled IT strategy can lead to value creation. We found out that the features of SaaS such as on-demand self-service, rapid elasticity and measured service are considered advantageous by the companies, whilst dependence on a single vendor, incompatibility and information security were considered as a disadvantage. Future research could explore other cloud service models, such as Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) to reveal how and why other cloud service applications can succeed or fail supporting Business-IT alignment

    Sustainable cloud computing for cognitive intent based networks

    Get PDF
    Intent based networks enable auto-configuration and require low latency access to cloud platforms. The use of cloud platforms incurs high operational costs. Low latency access can be realized by siting data centres close to subscribers. This paper proposes aquaria data centers with low operating costs and latency. In LTE, cloud platforms are normally accessed via the packet network gateway reachable via the serving gateway and mobility management entity. Aquaria data centers are sited close to LTE subscribers and accessed via the mobility management entity. This reduces the size of control packets in the LTE network. Simulations show that the proposed architecture reduces the size of control packets by up to 49.7% and 99.3% when header packets are uncompressed and compressed respectively. The delay associated with receiving configuration information is reduced by 50% on average. The channelcapacity is enhanced by up to 22.8% on average. Keywords: Data centers, LTE-Advanced, Peak Age of Information, Channel Capacity, Header (Control) Packe

    IoT Security Evolution: Challenges and Countermeasures Review

    Get PDF
    Internet of Things (IoT) architecture, technologies, applications and security have been recently addressed by a number of researchers. Basically, IoT adds internet connectivity to a system of intelligent devices, machines, objects and/or people. Devices are allowed to automatically collect and transmit data over the Internet, which exposes them to serious attacks and threats. This paper provides an intensive review of IoT evolution with primary focusing on security issues together with the proposed countermeasures. Thus, it outlines the IoT security challenges as a future roadmap of research for new researchers in this domain

    Case Study Analysis of the Use of Cloud Computing for Assessing Big Data Risks

    Get PDF
    Risks associated with adopting big data and cloud computing and exposing sensitive information must be evaluated as usage of these technologies continues to rise rapidly within businesses. Also, the company needs to investigate the potential consequences of cyber security threats, considering the severity of those risks. There has been no comparative analysis of the risk assessment methods available to businesses in various nations. Thus, the researcher in this study asked forty people from four countries (Canada, Jordan, South Africa (SA), and the United Kingdom (UK)) questions on the risk assessment procedures at their respective organizations using semi-structured interviews. After compiling and analyzing the data, it became clear that Canada and the UK were the frontrunners in adopting big data and cloud computing. It also demonstrated that Jordan and SA are in the early phases of an evolving adoptive relationship. Recommendations are made to strengthen the organization's standing in light of the different risk assessment frameworks used in each country

    Setting Privacy "by Default" in Social IoT: Theorizing the Challenges and Directions in Big Data Research

    Full text link
    [EN] The social Internet of Things (SIoT) shares large amounts of data that are then processed by other Internet of Thing (IoT) devices, which results in the generation, collection, and treatment of databases to be analyzed afterwards with Big Data techniques. This paradigm has given rise to users' concerns about their privacy, particularly with regard to whether users have to use a smart handling (self-establishment and self-management) in order to correctly install the SIoT, ensuring the privacy of the SIot-generated content and data. In this context, the present study aims to identify and explore the main perspectives that define user privacy in the SIoT; our ultimate goal is to accumulate new knowledge on the adoption and use of the concept of privacy "by default" in the scientific literature. To this end, we undertake a literature review of the main contributions on the topic of privacy in SIoT and Big Data processing. Based on the results, we formulate the following five areas of application of SIoT, including 29 key points relative to the concept of privacy "by default": (i) SIoT data collection and privacy; (ii) SIoT security; (iii) threats for SIoT devices; (iv) SIoT devices mandatory functions; and (v) SIoT and Big Data processing and analytics. In addition, we outline six research propositions and discuss six challenges for the SIoT industry. The results are theorized for the future development of research on SIoT privacy by "default" and Big Data processing.In gratitude to the Ministry of Science, Innovation and Uni-versities and the European Regional Development Fund: RTI2018-096295-B-C22.Saura, JR.; Ribeiro-Soriano, D.; Palacios Marqués, D. (2021). Setting Privacy "by Default" in Social IoT: Theorizing the Challenges and Directions in Big Data Research. Big Data Research. 25:1-12. https://doi.org/10.1016/j.bdr.2021.100245S1122

    Competitive Data Trading Model with Privacy Valuation for Multiple Stakeholders in IoT Data Markets

    Get PDF
    With the widespread of Internet of Things (IoT) environment, a big data concept has emerged to handle a large number of data generated by IoT devices. Moreover, since data- driven approaches now become important for business, IoT data markets have emerged, and IoT big data are exploited by major stakeholders such as data brokers and data service providers. Since many services and applications utilize data analytic methods with collected data from IoT devices, the conflict issues between privacy and data exploitation are raised, and the markets are mainly categorized as privacy protection markets and privacy valuation markets, respectively. Since these kinds of data value chains (which are mainly considered by business stakeholders) are revealed, data providers are interested in proper incentives in exchange for their privacy (i.e., privacy valuation) under their agreement. Therefore, this paper proposes a competitive data trading model that consists of data providers who weigh the value between privacy protection and valuation as well as other business stakeholders. Each data broker considers the willingness-to-sell of data providers, and a single data service provider considers the willingness-to-pay of service consumers. At the same time, multiple data brokers compete to sell their dataset to the data service provider as a non-cooperative game model. Based on the Nash Equilibrium analysis (NE) of the game, the feasibility is shown that the proposed model has the unique NE that maximizes the profits of business stakeholders while satisfying all market participants

    Υλοποίηση σε διαδίκτυο των πραγμάτων και υπολογιστική νέφους: έξυπνο θυροτηλέφωνο

    Get PDF
    Πτυχιακή εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2019Η παρουσίαση της εργασίας είναι διαθέσιμη στον ακόλουθο σύνδεσμο https://www.youtube.com/watch?v=g-7MWEvLn5gΠΤΥ ΕΠ 001/2019Το Smart Entryphone είναι ένας σύγχρονος και καινοτόμος τρόπος για να γνωρίζουμε ποιος επισκέπτεται τον χώρο μας όταν λείπουμε και με αυτό τον τρόπο να ασφαλίσουμε και να ελέγξουμε την οικία μας και οποιοδήποτε άλλο προσωπικό -ιδιωτικό χώρο επιθυμούμε. Επίσης θα δούμε πληροφορίες σχετικά με διάφορες τεχνολογίες που εκμεταλλευτήκαμε για την υλοποίηση αυτού του έξυπνου θυροτηλεφώνου, ποια είναι η απήχηση τους στην σύγχρονη κοινωνία και τι δυνατότητες παρέχουν. Το συγκεκριμένο Project αποτελείται από μια κατασκευή στην οποία χρησιμοποιήθηκαν τεχνολογίες Internet of things, Cloud Computing και υλοποιήθηκαν με την υποστήριξη των Raspberry pi 3 και Arduino Uno. Οι παραπάνω τεχνολογίες ελέγχονται από μια εφαρμογή κινητού. Η εφαρμογή του κινητού αναπτύχθηκε με την βοήθεια του προγράμματος Android Studio, όπου πληρεί όλες τις προϋποθέσεις ευχρηστίας και ασφάλειας προσωπικών δεδομένων.The Smart Entryphone is one of the modern and innovative ways to find out who is visiting in our private place when we are gone. With that way we secure and control our own home and every other part of our home we desire. Furthermore, we are going to see some information about some different technologies we exploit for the construction of this smart entryphone. We are going to find out the enormous demand for this kind of technologies by the society. This particular project is composed of one construction which we used technologies like Internet of Things and Cloud Computing supporting by the help of Raspberry pi 3 and Arduino Uno. The above technologies are of course controlled by a phone application. Last but not least, the application which is installed in the phone have been created with the help of Android Studio program. Android Studio includes all the entails of convenience and private data safety

    Relaying in the Internet of Things (IoT): A Survey

    Get PDF
    The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions
    corecore