2,991 research outputs found

    Unified messaging control platform

    Get PDF

    Unified messaging control platform

    Get PDF

    Network Traffic Measurements, Applications to Internet Services and Security

    Get PDF
    The Internet has become along the years a pervasive network interconnecting billions of users and is now playing the role of collector for a multitude of tasks, ranging from professional activities to personal interactions. From a technical standpoint, novel architectures, e.g., cloud-based services and content delivery networks, innovative devices, e.g., smartphones and connected wearables, and security threats, e.g., DDoS attacks, are posing new challenges in understanding network dynamics. In such complex scenario, network measurements play a central role to guide traffic management, improve network design, and evaluate application requirements. In addition, increasing importance is devoted to the quality of experience provided to final users, which requires thorough investigations on both the transport network and the design of Internet services. In this thesis, we stress the importance of users’ centrality by focusing on the traffic they exchange with the network. To do so, we design methodologies complementing passive and active measurements, as well as post-processing techniques belonging to the machine learning and statistics domains. Traffic exchanged by Internet users can be classified in three macro-groups: (i) Outbound, produced by users’ devices and pushed to the network; (ii) unsolicited, part of malicious attacks threatening users’ security; and (iii) inbound, directed to users’ devices and retrieved from remote servers. For each of the above categories, we address specific research topics consisting in the benchmarking of personal cloud storage services, the automatic identification of Internet threats, and the assessment of quality of experience in the Web domain, respectively. Results comprise several contributions in the scope of each research topic. In short, they shed light on (i) the interplay among design choices of cloud storage services, which severely impact the performance provided to end users; (ii) the feasibility of designing a general purpose classifier to detect malicious attacks, without chasing threat specificities; and (iii) the relevance of appropriate means to evaluate the perceived quality of Web pages delivery, strengthening the need of users’ feedbacks for a factual assessment

    A Noval Approach towards Academic Data Sharing on Cloud Environment Using File Synchronization

    Get PDF
    Nowadays the use of cloud computing is increased rapidly. The Cloud computing is very much important in the data sharing application. Due to increased use of cloud platform the management of the file problem on the cloud is increased for every single day the data is uploaded on to the cloud. So increasing demand of computation on a processing of file transfer leads to develop a new kind of technology that provides services for the manageable way. This manageable way is achieved by using file synchronization techniques in the cloud environment. Cloud computing usually consists of front-end user devices and back-end cloud servers. This gives users to access a large volume of storage on the cloud. In this project, the user can upload a file from PC (and from mobile as well) on to the cloud storage. These files will be automatically synchronized on to the user's device. So, the user can be viewed the file from anywhere and on any device. In the existing system, we need to download files manually. This paradigm provides the user to synchronize data automatically between devices. Therefore, we are implementing this paradigm for windows platform only. Here we are demonstrating this concept by using simple assignment and notes sharing application between teachers and students

    ARCPS - Anti-Redundant Cloud & Public Storage Moving towards Intelligent Cloud

    Get PDF
    Clouds are the future and powerful source in almost every aspect of computing. They offer many services running to facilitate users at same time. Cloud infrastructure is made up with a number of resourceful systems connected each other and to the internet. This paper is about (STaaS) Storage as a service but we are looking as a cloud storage provider, how to improve user experience and cloud storage efficiency by de-duplication of data. Cloud storage is unlimited but practically everything has a limit, so storage is also limited but the data storage demand is increasing with every next day. Everyone wants reliable and secure storage to store all of his data. Storage space is a need for everyone, and it’s mostly beneficial to those people who want a shared space or they want to share data online with others with minimal efforts. So, this paper describes a technique in which cloud providers can save a lot of storage space by eradicating duplication and this will be an automatic and runtime process. By monitoring and analyzing the semantics of data through different channels like DBpedia, WordNet etc. Data will be categorized accordingly and among these categories, checking of duplication performed and removed if found. Different file formats can have different techniques for processing. We are mainly focusing on the public cloud
    • …
    corecore