198 research outputs found
Cloud for Gaming
Cloud for Gaming refers to the use of cloud computing technologies to build
large-scale gaming infrastructures, with the goal of improving scalability and
responsiveness, improve the user's experience and enable new business models.Comment: Encyclopedia of Computer Graphics and Games. Newton Lee (Editor).
Springer International Publishing, 2015, ISBN 978-3-319-08234-
Useful applications of earth-oriented satellites - Systems for remote-sensing information and distribution, panel 8
Problems and potential use of data gathered by remote sensing from satellites or aircraf
Emission reduction via supply chain coordination
This paper examines the environmental impact of potential coordination on supply chains. A decentralized two-node supply chain is studied, in which one node is a buyer ordering from a second node, who is a supplier operating under the lot-for-lot policy. The supplier is allowed to use a quantity discount to manipulate the buyer's decision reducing both his individual cost and system's operational costs. This results in decreasing the frequency of deliveries. We demonstrate that environmentally friendly policies could be also cost saving. The crucial factor about the environmental benefits is the total distance travelled rather than the vehicle loads. We establish the magnitude of the environmental benefits using numerical examples under specific operational parameters. Complete and incomplete information cases are investigated, where the buyer and the supplier make their decisions to optimize their own business operations
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE
As more businesses and users adopt cloud computing services, security
vulnerabilities will be increasingly found and exploited. There are many
technological and political challenges where investigation of potentially
criminal incidents in the cloud are concerned. Security experts, however, must
still be able to acquire and analyze data in a methodical, rigorous and
forensically sound manner. This work applies the STRIDE asset-based risk
assessment method to cloud computing infrastructure for the purpose of
identifying and assessing an organization's ability to respond to and
investigate breaches in cloud computing environments. An extension to the
STRIDE risk assessment model is proposed to help organizations quickly respond
to incidents while ensuring acquisition and integrity of the largest amount of
digital evidence possible. Further, the proposed model allows organizations to
assess the needs and capacity of their incident responders before an incident
occurs.Comment: 13 pages, 3 figures, 3 tables, 5th International Conference on
Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp.
223-236, 201
Security challenges of small cell as a service in virtualized mobile edge computing environments
Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems are going to extensively rely on dense small cell deployments, which would exploit infrastructure and network functions virtualization (NFV), and push the network intelligence towards network edges by embracing the concept of mobile edge computing (MEC). As security will be a fundamental enabling factor of small cell as a service (SCaaS) in 5G networks, we present the most prominent threats and vulnerabilities against a broad range of targets. As far as the related work is concerned, to the best of our knowledge, this paper is the first to investigate security challenges at the intersection of SCaaS, NFV, and MEC. It is also the first paper that proposes a set of criteria to facilitate a clear and effective taxonomy of security challenges of main elements of 5G networks. Our analysis can serve as a staring point towards the development of appropriate 5G security solutions. These will have crucial effect on legal and regulatory frameworks as well as on decisions of businesses, governments, and end-users
Developing a comprehensive information security framework for mHealth: a detailed analysis
It has been clearly shown that mHealth solutions, which is the use of mobile devices and other wireless technology to provide healthcare services, deliver more patient-focused healthcare, and improve the overall efficiency of healthcare systems. In addition, these solutions can potentially reduce the cost of providing healthcare in the context of the increasing demands of the aging populations in advanced economies. These solutions can also play an important part in intelligent environments, facilitating real-time data collection and input to enable various functionalities. However, there are several challenges regarding the development of mHealth solutions: the most important of these being privacy and data security. Furthermore, the use of cloud computing is becoming an option for the healthcare sector to store healthcare data; but storing data in the cloud raises serious concerns. This paper investigates how data are managed both on mHealth devices as well as in the cloud. Firstly, a detailed analysis of the entire mHealth domain is undertaken to determine domain-specific features and a taxonomy for mHealth, from which a set of security requirements are identified in order to develop a new information security framework. It then examines individual information security frameworks for mHealth devices and the cloud, noting similarities and differences. Furthermore, key mechanisms to implement the new framework are discussed and the new framework is then presented. Finally, the paper presents how the new framework could be implemented in order to develop an Advanced Digital Medical Platform
Cloud computing in industrial SMEs: Identification of the barriers to its adoption and effects of its application
ABSTRACT: Cloud computing is a new technological paradigm that may revolutionize how organizations use IT by facilitating delivery of all technology as a service. In the literature, the Cloud is treated mainly through a technological approach focused on the concept definition, service models, infrastructures for its evelopment and security problems. However, there is an important lack of works which analyze this paradigm adoption in SMEs and its results, with a gap between the technological development and its adoption by organizations. This paper uses a qualitative technique methodology -group meetings with managers- and a quantitative one-survey- and identifies which factors act as barriers to Cloud adoption and which positive effects its application generates in 94 industrial SMEs. The conclusion is that the main barriers are of a cultural type and that the positive effects go well beyond reducing costs
Social Internet of Things and New Generation Computing -- A Survey
Social Internet of Things (SIoT) tries to overcome the challenges of Internet
of Things (IoT) such as scalability, trust and discovery of resources, by
inspiration from social computing. This survey aims to investigate the research
done on SIoT from two perspectives including application domain and the
integration to the new computing models. For this, a two-dimensional framework
is proposed and the projects are investigated, accordingly. The first dimension
considers and classifies available research from the application domain
perspective and the second dimension performs the same from the integration to
new computing models standpoint. The aim is to technically describe SIoT, to
classify related research, to foster the dissemination of state-of-the-art, and
to discuss open research directions in this field.Comment: IoT, Social computing, Surve
Fog computing security: a review of current applications and security solutions
Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is fundamentally different in that it is decentralized. In addition, Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, Internet of Things (IoT) devices are required to quickly process a large amount of data. This wide range of functionality driven applications intensifies many security issues regarding data, virtualization, segregation, network, malware and monitoring. This paper surveys existing literature on Fog computing applications to identify common security gaps. Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems
- …