86 research outputs found

    Energy efficiency and environmental consideration for green data centres

    Get PDF
    The advancement in information and communication technology based business and social practices in last few decades have transferred many, if not most, economies into e-economy and businesses into e-businesses. Technology has potential to create sustainable business and society both in grim and green economic times. Data centres are found major culprits in consuming too much energy in their overall operations and generating huge amount of CO2. This paper determines the properties and attributes of green IT infrastructures and provides ways for achieving green sustainable businesses. The proposed green IT attributes and characteristics using virtualization technology are very industrious and efficient for data centers to be more energy efficient and green, hence reducing the emission for greenhouse gases so that the overall effect on global warming can be reduced or even eliminated.

    Green IT based energy efficiency model for data centers to reduce energy consumption & CO2 emissions

    Get PDF
    Problem Statement: The advancement of Information and Communication Technologies (ICTs) based business and social practices in the last few decades has transformed many, if not most, economies into e-economy and businesses into e-businesses. For economies, ICTs are increasingly playing critical roles in transforming and generating ortunities. On the other hand, global warming and climate change coalescing with limited availability and rising cost of energy are posing serious challenges for the sustainability of the global digital (or otherwise) economy. Technology has a potential to create sustainable business and society both in grim and green economic times. Especially, the recovery from the current economic crisis is going to need and lead to more Greener and energy efficient industries. As corporations look to become more energy efficient, they are examining their operations more closely. Data centers provide capabilities of central storage, backups and networking, recovery. Data centers are found major culprits in consuming too much energy in their overall operations and generating too much CO2. In order to handle the sheer magnitude of today’s data, data centers have had to use much more power and servers have become larger, denser, hotter and significantly more costly to operate. This study determine the properties and attributes of green IT infrastructures and determines the way it will be helpful in achieving green sustainable businesses. The proposed Green IT model will be drafted using Virtualization technology for data centers to make them more energy efficient and green, hence reducing the emission of green house gases so that the overall effect on global warming can be reduced or even eliminated. Results & Conclusion: The proposed model would reveal the qualities of green IT to enhance the proper utilization of hardware and software resources available in the data center. It helps data center managers to come up with a new environment friendly and sustainable green IT strategy making environment greener and sustainable. The heart of this strategy is to reduce global warming effects by using green and energy efficient data centers

    Disaster Recovery Framework for Commercial Banks in Sri Lanka

    Get PDF
    The banking sector is the backbone of the entire financial economy of a country. In today's globalized world, most organizations use online transaction processing systems for transferring money and doing business. Natural or man-made disasters can lead to data loss which in turn can cause millions of dollars of money lost. This study focuses on disaster recovery practices in commercial banks in Sri Lanka. From our preliminary findings, it was concluded that commercial banks only have ad-hoc disaster recovery standards and practices, as there is no standard framework available. Fourteen (14) banks were selected for data collection and relevant authorities were interviewed. The results were translated as qualitative observations to understand the best practices. Similarly, international standards, compliance requirements of the central bank, and existing researches were used to develop a disaster recovery practice framework. The proposed framework was then validated for its efficiency and usefulness among commercial banks and found to be acceptable by the banking industry. 

    Selecting a mentor: guide for a Protégé

    Get PDF
    The development of entrepreneurial skills within the education system increases the possibility of producing more entrepreneurs in future. Many economists now believe that entrepreneurship plays an important role in economic growth of a country. Entrepreneurial education can be used as a mediation tool for impacting attitude of people towards entrepreneurship.A Mentor plays an important role in entrepreneurial development of an individual. It is a mentor who guide entrepreneur from conception of business to product development and business growth, but in order to provide mentoring a mentor need to have certain qualities and a proven track record. Select the right mentor is most important because a mentor who is incompatible with entrepreneur’s personality or requirement may cost entrepreneur the whole business. This research puts a light on subjective and objective qualities a mentor should possess and will provide a guideline to protégé regarding selection of appropriate mentor

    DSCOT: An NFT-Based Blockchain Architecture for the Authentication of IoT-Enabled Smart Devices in Smart Cities

    Full text link
    Smart city architecture brings all the underlying architectures, i.e., Internet of Things (IoT), Cyber-Physical Systems (CPSs), Internet of Cyber-Physical Things (IoCPT), and Internet of Everything (IoE), together to work as a system under its umbrella. The goal of smart city architecture is to come up with a solution that may integrate all the real-time response applications. However, the cyber-physical space poses threats that can jeopardize the working of a smart city where all the data belonging to people, systems, and processes will be at risk. Various architectures based on centralized and distributed mechanisms support smart cities; however, the security concerns regarding traceability, scalability, security services, platform assistance, and resource management persist. In this paper, private blockchain-based architecture Decentralized Smart City of Things (DSCoT) is proposed. It actively utilizes fog computing for all the users and smart devices connected to a fog node in a particular management system in a smart city, i.e., a smart house or hospital, etc. Non-fungible tokens (NFTs) have been utilized for representation to define smart device attributes. NFTs in the proposed DSCoT architecture provide devices and user authentication (IoT) functionality. DSCoT has been designed to provide a smart city solution that ensures robust security features such as Confidentiality, Integrity, Availability (CIA), and authorization by defining new attributes and functions for Owner, User, Fog, and IoT devices authentication. The evaluation of the proposed functions and components in terms of Gas consumption and time complexity has shown promising results. Comparatively, the Gas consumption for minting DSCoT NFT showed approximately 27%, and a DSCoT approve() was approximately 11% more efficient than the PUF-based NFT solution.Comment: 18 pages, 15 figures, 5 tables, journa

    A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks

    Get PDF
    WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it’s vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs’ success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The lack of a clear and unified study in terms of signcryption solutions can offer a bird’s eye view of WBANs. Based on the most recent signcryption papers, we analyzed WBAN’s communication architecture, security requirements, and the primary problems in WBANs to meet the aforementioned objectives. This survey also includes the most up to date signcryption security techniques in WBANs environments. By identifying and comparing all available signcryption techniques in the WBANs sector, the study will aid the academic community in understanding security problems and causes. The goal of this survey is to provide a comparative review of the existing signcryption security solutions and to analyze the previously indicated solution given for WBANs. A multi-criteria decision-making approach is used for a comparative examination of the existing signcryption solutions. Furthermore, the survey also highlights some of the public research issues that researchers must face to develop the security features of WBANs.publishedVersio

    Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review

    Get PDF
    A data center comprises of servers, storage devices, cooling and power delivery equipment to support other components, exchange data and information to provide general services such as software-as-a-service (SaaS), Platform-as-a-Service (PaaS)and Internet-as-a-Service (IaaS). Data center require massive amount of computational power to drive complex systems. In return these massive systems bring many challenges and concerns including power dissemination and environmental sustainability. Higher power demand in data centers and changes in computing technology together to maximize data center performance has led to deploying multitude methods to estimate power intensity. Energy cost increment, global economic downturn, and global warming and other concerns have resulted in new research in achieving power efficient data centers. The research proposed in this paper evaluates three task scheduling algorthms RASA, TPPC, and PALB to get the most energy efficient task scheduling algorithms to be used in data centers for measuring their performance and efficiency. The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. On top of that data center location and climate conditions are also considered and analyzed as parameters as they directly effect the operating costs, the amount of power consumption and CO2 emission. To minimize the power wasted by data center cooling systems is directly related to data center location and climate change. CloudSim simulator is used to implement the algorithms on an IaaS cloud infrastructure, to calculate the power consumption, and to analyze each algorithm's behavior for different parameters. The results generated clearly shows tha TPPC is the most efficient algorithm due to less amount of power consumption and low volume of CO2 emission; However its implementation cost is bit higher compare to PALB and RASA
    corecore