17 research outputs found

    Towards performance evaluation of cloud service providers for cloud data security

    Get PDF
    © 2016, Elsevier Ltd. All rights reserved. Today's data is sensitive that requires privacy and security both from the cloud service providers (CSP) as well as from users in its all the form of data states: data at rest, while transferring data, enquiring data, and processing the data. Cloud computing has been applied in the health sector, national security services, banking and other business and companies that store confidential data into the cloud as we have seen in recent years. Therefore, information and data security is a crucial issue that needs to be addressed thoroughly in the cloud computing business. This research deals with the performance analysis of recent cloud data security models. This paper proposes cloud data security models based on Business Process Modeling Notations (BPMN) and simulation results can reveal performances issues related to data security as part of any organizations initiative on Business process management (BPM)

    An Enhanced Performance Analysis of Software Using Architectural Feedback

    Get PDF
    The importance of software products and their quality attributes attainment has been a thing of concern in recent time to both academia and industry experts. This research work evaluated an enhanced performance analysis of software using architectural feedback. Data collected were, classified and analysed using SPSS reveal that the Relative Importance Index (RII) in relations to an enhance performance analysis of software using the architectural feedback was 0.83 which led to the proposal of a framework for an enhanced performance analysis of software using architectural feedback

    A New Distributed Intrusion Detection System Based on Multi-Agent System for Cloud Environment

    Get PDF
    Cloud computing, like any distributed computing system, is continually exposed to many threats and attacks of various origins. Thus, cloud security is now a very important concern for both providers and users. Intrusion detection systems (IDSs) are used to detect attacks in this environment. The goal of security administrators (for both customers and providers) is to prevent and detect attacks while avoiding disruption of the smooth operation of the cloud. Making IDSs efficient is not an easy task in a distributed environment such as the cloud. This problem remains open, and to our knowledge, there are no satisfactory solutions for the automated evaluation and analysis of cloud security. The features of the multi-agent system paradigm, such as adaptability, collaboration, and distribution, make it possible to handle this evolution of cloud computing in an efficient and controlled manner. As a result, multi-agent systems are well suited to the effective management of cloud security. In this paper, we propose an efficient, reliable and secure distributed IDS (DIDS) based on a multi-agent approach to identify and prevent new and complex malicious attacks in this environment. Moreover, some experiments were conducted to evaluate the performance of our model

    Security Limitations with Cloud Computing: Well-defined Security Measures Using Cloud Computing

    Get PDF
    Due to the ever-growing threat of security breaches that information technology (IT) organizations continually face, protecting customer information stored in the cloud is critical to ensure data integrity. Research shows that new categories of data breaches frequently emerge; thus, security strategies that build trust in consumers and improve system performance are crucial. The purpose of this qualitative multiple case study was to explore and analyze the strategies used by database administrators (DBAs) to secure data in a private infrastructure as a service (IaaS) cloud environment. The participants comprised of six DBAs from two IT companies in Baltimore, Maryland, with experience and knowledge of security strategies to secure data in private IaaS clouds. The disruptive innovation theory was the foundational framework for this study. Data were collected using semistructured interviews and a review of seven organizational documents. A thematic analysis was used to analyze the data. Two key themes are addressed in this article: importance of well-defined security measures in cloud computing and limitations of existing security controls in cloud computing. The findings of well-defined security strategies may benefit DBAs and IT organizations by providing strategies that may prevent future data breaches. Well-defined security strategies may protect an individual’s data which, in turn, may promote individual well-being and build strong communities. Keywords: cloud computing, security strategies, data breaches DOI: 10.7176/JIEA/11-2-05 Publication date: June 30th 202

    Renovating the iPMU via Internet of Things for Pollutant Emission Estimations in Poultry Facilities

    Get PDF
    The emissions of ammonia (NH3), particulate matter (PM2.5), and carbon dioxide (CO2) are major concerns in poultry facilities. They can pose environmental concerns and nuances. Robust and affordable measurement systems are needed to accurately measure in-barn concentrations and quantify the emissions. The Intelligent Portable Monitoring Unit (iPMU or PMU3) developed in 2016 was reconstructed into PMU4 to include upgraded NH3 and PM2.5 sensors and wireless connectivity for a low-cost, robust, and accurate air quality monitoring device with contactless data transfer using the concept of Internet of Things (IoT). In addition, a user-friendly web-based interface was developed for 1) real-time and historical data visualization, and 2) estimation of NH3 and PM2.5 emissions with suitable ventilation measurement. The PMU4 device developed in this project features back-up data stores and leverages cloud computing for data analysis and visualization. It was designed to collect and store sensor data (temperature, relative humidity, NH3, PM2.5, and CO2) on an SD card, and simultaneously send the data to a secure server. The PMU4 device uses Wi-Fi for internet access, but it was programmed to tolerate internet outages by queueing data and automatically transmitting the data queue to the secure server when the internet restores. The PMU4 device was deployed in the Robert T. Hamilton Poultry Teaching & Research Facility (Iowa State University, Ames, IA) for 13 days (September 15 – September 27, 2023) for field evaluation. The results showed that the mean temperature and relative humidity were 23.2 ± 1.8 ˚C and 62.1 ± 11.8% respectively. The mean concentrations of NH3, PM2.5, and CO2 were 0.47 ± 0.27 ppm, 12.0 ± 12.6 µg/m3, and 581.3 ± 134.2 ppm. The NH3 and PM2.5 per bird emission rates for the monitoring period were estimated using facility temperature, NH3 and PM2.5 concentrations, atmospheric barometric pressure obtained from the nearest airport, and ventilation and chicken inventory obtained from the facility manger. The mean per bird emission rates for NH3 and PM2.5 were 0.23 g/d/hen and 7.44 mg/d/hen, respectively. Advisor: Yijie Xion

    CPA firm’s cloud auditing provider for performance evaluation and improvement: an empirical case of China

    Get PDF
    While CPA (Certified Public Accountant) firms utilize cloud auditing technologies to generate auditing reports and convey information to their clients in the Internet of Things (IoT) Era, they often cannot determine whether cloud auditing is a secure and effective form of communication with clients. Strategies related to cloud auditing provider evaluation and improvement planning are inherently multiple attribute decision making (MADM) issues and are very important to the auditor industry. To overcome these problems, this paper proposes an evaluation and improvement planning model to be a reference for CPA firms selecting the best cloud auditing provider, and illustrates an application of such a model through an empirical case study. The DEMATEL (decision-making trial and evaluation laboratory) approach is first used to analyze the interactive influence relationship map (IIRM) between the criteria and dimensions of cloud auditing technology. DANP (DEMATEL-based ANP) is then employed to calculate the influential weights of the dimensions and criteria. Finally, the modified VIKOR method is utilized to provide improvement priorities for performance cloud auditing provider satisfaction. Based on expert interviews, the recommendations for improvement priorities are privacy, security, processing integrity, availability, and confidentiality. This approach is expected to support the auditor industry to systematically improve their cloud auditing provider selection

    Strategies for Cloud Services Adoption in Saudi Arabia

    Get PDF
    The adoption rate of cloud computing is low among business organizations in Saudi Arabia, despite the cost-saving benefits of using cloud services. The purpose of this multiple case study was to explore the strategies that information technology (IT) leaders in the manufacturing industry in Saudi Arabia used to adopt cloud computing to reduce IT costs. The target population of this study consisted of 5 IT leaders from 5 different manufacturing companies in Saudi Arabia who successfully adopted cloud computing in their companies to reduce IT costs. Rogers\u27s diffusion of innovation theory was the conceptual framework for this research. Data collected from face-to-face, semistructured interviews and a review of relevant corporate documentation were analyzed using Yin\u27s 5-step data analysis method, which included compiling, disassembling, reassembling, interpreting, and concluding the data. Five themes emerged from the data analysis: identify business needs and requirements, apply value realization metrics, plan for migration, choose the right cloud service provider, and provide adequate training and awareness sessions. The implications of this study for positive social change include the potential to improve the local economy in Saudi Arabia by ensuring the sustainability of firms in the manufacturing industry through the implementation of cost-saving strategies associated with cloud computing adoption
    corecore