Search results for "Cloud computing"
showing 10 items of 327 documents
Cost-Effective eHealth System Based on a Multi-Sensor System-on-Chip Platform and Data Fusion in Cloud for Sport Activity Monitoring
2018
eHealth systems provide medical support to users and contribute to the development of mobile and quality health care. They also provide results on the prevention and follow-up of diseases by monitoring health-status indicators and methodical data gathering in patients. Telematic management of health services by means of the Internet of Things provides immediate support and it is cheaper than conventional physical presence methods. Currently, wireless communications and sensor networks allow a person or group to be monitored remotely. The aim of this paper is to develop and assess a system for monitoring physiological parameters to be applied in different scenarios, such as health or sports.…
Stealthy Attacks in Cloud-Connected Linear Impulsive Systems
2018
This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…
Intelligent virtual manufacturing cell formation in cloud-based design and manufacturing
2018
Abstract Cloud-based design and manufacturing (CBDM) can presumably stimulate greater intelligence in cloud-based models. This paper assumes that cloud-based design for cellular manufacturing can be referred to as a multiscale, uncertain, and dynamic service-oriented network where a set of CAD parts, modelled by set of features, can be manufactured in intelligent virtual manufacturing cells under certain constraints. Using the concepts of the holon and the attractor, integrating the uncertainty in the modelling of part design and part–manufacturing network, an approach to address intelligent virtual manufacturing cell formation in CBDM is proposed. The powerful role of the CAD features is e…
Summarizing Large Scale 3D Point Cloud for Navigation Tasks
2017
International audience; Democratization of 3D sensor devices makes 3D maps building easier especially in long term mapping and autonomous navigation. In this paper we present a new method for summarizing a 3D map (dense cloud of 3D points). This method aims to extract a summary map facilitating the use of this map by navigation systems with limited resources (smartphones, cars, robots...). This Vision-based summarizing process is applied in a fully automatic way using the photometric, geometric and semantic information of the studied environment.
Impact of accounting process characteristics on accounting outsourcing - Comparison of users and non-users of cloud-based accounting information syst…
2019
Article In Press The article of record as published may be found at https://doi.org/10.1016/j.accinf.2019.06.002 Prior literature informs us that a company's decision to outsource a business process depends on process characteristics such as how frequently the process is performed or how specific the assets required by the process are. In this article, we compare the effects of accounting process characteristics on outsourcing decisions across users of traditional and cloud-based accounting information systems (AIS). By focusing on outsourcing of accounting processes among small and medium sized enterprises, we investigate the effect of five business process characteristics (frequency, huma…
Towards Shipping 4.0. A preliminary gap analysis
2020
Abstract The paradigm of Industry 4.0 involves a substantial innovation to the value creation approach thought the supply chain and the application of digital enabling technologies like the Internet of Things (IoT), Big Data Analytics (BDA) and cloud computing. The fourth industrial revolution is thus expected to have a disruptive impact on maritime transport and shipping sectors, where smart ships and autonomous vessels well be part of a new and fully interconnected maritime ecosystem. Specific hardware components, such as sensors, actuators, or processors will be embedded in the ship’s key systems in order to provide valuable information to increase the efficiency, sustainability and safe…
Efficient Protection for VDI Workstations
2019
Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
2019
Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.
Self-validating bundles for flexible data access control
2016
Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…
On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds
2017
Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…