Search results for "Cloud computing security"

showing 7 items of 27 documents

A Cloud Federation Architecture

2015

Cloud Computing is the state of the art computation paradigm enabling providers to offer computing resources to customers in a pay-per-use fashion. Nowadays public Cloud providers offer similar services within few service models, mainly IaaS and PaaS. Cloud providers give to the user the feeling to dispose of infinite resources, thus having to predict the user requirements in order to provide services with minimal costs, maintaining at the same time high levels of SLAs. In order to achieve this goal, Cloud providers can cooperate together to bring new business opportunities, such as expanding available resources, achieving cost effective asset optimization and adopting power saving policies…

Service (business)Cloud computing securityVendorOrder (business)business.industryCloud testingCloud computingBusinessAsset (computer security)User requirements documentComputer securitycomputer.software_genrecomputer2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)
researchProduct

MonPaaS: An Adaptive Monitoring Platformas a Service for Cloud Computing Infrastructures and Services

2015

This paper presents a novel monitoring architecture addressed to the cloud provider and the cloud consumers. This architecture offers a monitoring platform-as-a-Service to each cloud consumer that allows to customize the monitoring metrics. The cloud provider sees a complete overview of the infrastructure whereas the cloud consumer sees automatically her cloud resources and can define other resources or services to be monitored. This is accomplished by means of an adaptive distributed monitoring architecture automatically deployed in the cloud infrastructure. This architecture has been implemented and released under GPL license to the community as “MonPaaS”, open source software for integra…

Service (systems architecture)Information Systems and ManagementCloud computing securityComputer Networks and CommunicationsComputer sciencebusiness.industryCloud computingcomputer.software_genreService-oriented modelingComputer Science ApplicationsUtility computingHardware and ArchitectureSoftware deploymentCloud testingScalabilityOperating systembusinesscomputerIEEE Transactions on Services Computing
researchProduct

Cloud Based Business Processes Orchestration

2014

Abstract As the value concept of the cloud is evolving from a cost-saving mechanism into a growth instrument, more and more organizations are turning to the cloud in an attempt to redesign their core business processes. The opportunity for process innovation is vast, and it will take the disciplined approach of BPM, with the computing understanding and accessibility of the cloud, to make the most of what lies ahead. With the popularity of cloud computing, Platform-as-a Service (PaaS) becomes one of the core technical enablers of enterprises to change the delivery of services to both customers and internal organizations. An application in an enterprise needs to take into account various spec…

Service (systems architecture)Process managementCloud computing securityCore businessbusiness.industryBusiness processComputer scienceGeneral EngineeringEnergy Engineering and Power Technologyplatform-as-a-serviceCloud computingbusiness process managementprocess innovationBusiness process managementcloud computing.Software deploymentcloudOrchestration (computing)businessProcedia Economics and Finance
researchProduct

Building a Medical Research Cloud in the EASI-CLOUDS Project

2014

The demand for IT resources is constantly growing in the scientific area. The ability to store and process increasing amounts of data has transformed many research disciplines, like the life-sciences, which now rely on complex data processing and data analytics. Cloud environments are able to integrate and encapsulate possibly distributed resources and allow convenient and on-demand access to the corresponding services, tools, and complete work environments. The European research project EASI-CLOUDS (http://www. easi-clouds.eu) develops a platform for a convenient service delivery with special regard to service integration, monitoring, management, and Service Level Agreement (SLA) negotiati…

World Wide WebService-level agreementEngineeringCloud computing securityService delivery frameworkbusiness.industryCloud testingSoftware as a serviceeMixCloud computingData as a servicebusiness2014 6th International Workshop on Science Gateways
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Supporting Cyber Resilience with Semantic Wiki

2016

Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…

ta113021110 strategic defence & security studiesEngineeringKnowledge managementCloud computing securitybusiness.industryStandard of Good Practiceinformation security management0211 other engineering and technologies02 engineering and technologyInformation securitycyber resiliencesemantic wikiSecurity information and event managementrisk managementSecurity controlsResilience (organizational)World Wide WebITIL security managementInformation security management020204 information systems0202 electrical engineering electronic engineering information engineeringbusiness
researchProduct

Opportunity Discovery and Creation in Cloud Computing

2013

Cloud computing provides opportunities for firms selling or using cloud services. However, little is known about how entrepreneurs discover or create these opportunities for cloud computing. In this study, we found that the opportunities discovered in cloud computing were related to the development of software for a particular need. By contrast, created opportunities were developed under conditions of technological uncertainty, at a time when the market did not yet exist. It appears that created opportunities, if successful, bring long-term competitive advantages, whereas discovered opportunities are more easily copied and exploited by competitors. peerReviewed

ta520pilvipalvelutCloud computing securityKnowledge managementUtility computingbusiness.industrycloud computingCloud computingCompetitor analysisbusinessCompetitive advantageOpportunity discovery
researchProduct