12,459 research outputs found

    Formulating a Security Layer of Cloud Data Storage Framework Based on Multi Agent System Architecture

    Get PDF
    The tremendous growth of the cloud computingenvironments requires new architecture for security services.In addition, these computing environments are open,and users may be connected or disconnected at any time.Cloud Data Storage, like any other emerging technology, isexperiencing growing pains. It is immature, it is fragmentedand it lacks standardization. To verify the correctness, integrity,confidentially and availability of users’ data in the cloud, wepropose a security framework. This security framework consistsof two main layers as agent layer and cloud data storage layer.The propose MAS architecture includes five types of agents: UserInterface Agent (UIA), User Agent (UA), DER Agent (DERA),Data Retrieval Agent (DRA) and Data Distribution PreparationAgent (DDPA). The main goal of this paper is to formulate oursecure framework and its architecture

    Formulating a security layer of cloud data storage framework based on multi agent system architecture.

    Get PDF
    The tremendous growth of the cloud computing environments requires new architecture for security services. In addition, these computing environments are open, and users may be connected or disconnected at any time. Cloud Data Storage, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. To verify the correctness, integrity, confidentially and availability of users’ data in the cloud, we propose a security framework. This security framework consists of two main layers as agent layer and cloud data storage layer. The propose MAS architecture includes five types of agents: UserInterface Agent (UIA), User Agent (UA), DER Agent (DERA), Data Retrieval Agent (DRA) and Data Distribution Preparation Agent (DDPA). The main goal of this paper is to formulate our secure framework and its architecture

    CloudZone: towards an integrity layer of cloud data storage based on multi agent system architecture

    Get PDF
    The computing power in a cloud computing environments is supplied by a collection of data centers, or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. Data integrity checking of data and data structures has grown in importance recently in cloud computing due to the expansion of online cloud services, which have become reliable and scalable. In this paper we propose an integrity layered architecture of a typical cloud based on MAS architecture consists of two main layers cloud resources layer (cloud server-side) and MAS architecture layer (cloud client-side). At the cloud resources layer there exist massive physical cloud resources (storage servers and cloud application servers) that power the CDS. MAS's architecture layers consist of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Integrity Backup Agent (CDIBA). This layered architecture named as “CloudZone”. A prototype of our proposed “CloudZone” will be designed using Prometheus Methodology and implemented using the Java Agent Development Framework Security (JADE-S)

    Always in control? Sovereign states in cyberspace

    Get PDF
    For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals and societies live. But how has it impacted the sovereignty of states? An initial wave of scholars argued that it had dramatically diminished centralised control by states, helped by a tidal wave of globalisation and freedom. These libertarian claims were considerable. More recently, a new wave of writing has argued that states have begun to recover control in cyberspace, focusing on either the police work of authoritarian regimes or the revelations of Edward Snowden. Both claims were wide of the mark. By contrast, this article argues that we have often misunderstood the materiality of cyberspace and its consequences for control. It not only challenges the libertarian narrative of freedom, it suggests that the anarchic imaginary of the Internet as a ‘Wild West’ was deliberately promoted by states in order to distract from the reality. The Internet, like previous forms of electronic connectivity, consists mostly of a physical infrastructure located in specific geographies and jurisdictions. Rather than circumscribing sovereignty, it has offered centralised authority new ways of conducting statecraft. Indeed, the Internet, high-speed computing, and voice recognition were all the result of security research by a single information hegemon and therefore it has always been in control

    The future of social is personal: the potential of the personal data store

    No full text
    This chapter argues that technical architectures that facilitate the longitudinal, decentralised and individual-centric personal collection and curation of data will be an important, but partial, response to the pressing problem of the autonomy of the data subject, and the asymmetry of power between the subject and large scale service providers/data consumers. Towards framing the scope and role of such Personal Data Stores (PDSes), the legalistic notion of personal data is examined, and it is argued that a more inclusive, intuitive notion expresses more accurately what individuals require in order to preserve their autonomy in a data-driven world of large aggregators. Six challenges towards realising the PDS vision are set out: the requirement to store data for long periods; the difficulties of managing data for individuals; the need to reconsider the regulatory basis for third-party access to data; the need to comply with international data handling standards; the need to integrate privacy-enhancing technologies; and the need to future-proof data gathering against the evolution of social norms. The open experimental PDS platform INDX is introduced and described, as a means of beginning to address at least some of these six challenges

    The Landscape of Salesforce for Nonprofits: A Report on the Current Marketplace for Apps

    Get PDF
    Do you use Salesforce as a Constituent Relationship Management database at your organization, or are you considering it? Since it launched in 1999, more than 20,000 nonprofits have employed the cloud-based system, which is made available to them for free through the philanthropic Salesforce Foundation. What's the catch? Making such a powerful system work for the particular needs of a nonprofit isn't always straightforward. This report can tell you everything you need to know.What's in it? To learn more about the benefits and drawbacks of Salesforce, we interviewed nine prominent consultants specializing in implementing Salesforce for nonprofits along with several members of the Salesforce.com Foundation about what the platform does well, and what you'll want to add to it to suit your needs. We evaluated some of the constituent management packages built on top of Salesforce, including the Salesforce Foundation's Nonprofit Starter Pack, which is aimed at turning the sales automation platform into a tool for nonprofits. We also took a look at the universe of add-ons to the base Salesforce platform -- called "apps" because of Salesforce's online marketplace, the App Exchange -- to find out which might be useful to support a nonprofit's processes.The goal for this report was to break down misconceptions about the tool and to collect disparate information in one place to help you make informed decisions. Whether you're already using Salesforce, are thinking about adopting it, or have yet to even consider it, there's information here for you.What's more, we've included a directory of consultants or firms with experience working with nonprofits to implement Salesforce and the additional App Exchange modules that we cover in this report to make it easier for you to find the help you'll need
    corecore