Search results for "cloud computing"
showing 10 items of 327 documents
Information Security and Privacy in Medical Application Scenario
2010
This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.
Special Section on ITS Services to Smart City Context [Guest Editorial]
2018
The seven articles in this special section focus on new trends and developments in the intelligent transportation markets. Since the earliest of times, transportation has changed and revolutionized society and industry. Many of technology advances were focused on transportation and their means (road, rail, air, water, etc.) even, today there exist several areas of the knowledge that are focused on it. As time goes by, new terms have been established where technology is present as well, for instance, Intelligent Transportation Systems (ITS), Smart Cities, Smart Territory, Blockchain, Internet of Things, virtualization, Cloud computing, Intelligent Vehicles, embedded computing, Deep learning,…
Trusted Computing and DRM
2015
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …
On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds
2017
Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…
The Challenges for Regulation and Control in an Environment of Rapid Technological Innovations
2019
Currently, amplified use of the ITC-technologies and digitalization in almost all industries has changed the value and significance of the information. The use of these new technologies offer tremendous opportunities for innovation and development, but at the same time ask for regulation and control policies to ensure appropriate storage and use of information and avoid illicit utilization of data. Moreover, use of innovative technologies such as blockchain-based technology, artificial intelligence, cloud technology, and others has complicated and disrupted the landscape of the financial services providers and their ancillary service providers such as auditors, underwriters, advisors, actua…
Distributing Storage in Cloud Environments
2013
Cloud computing has a major impact on today's IT strategies. Outsourcing applications from IT departments to the cloud relieves users from building big infrastructures as well as from building the corresponding expertise, and allows them to focus on their main competences and businesses. One of the main hurdles of cloud computing is that not only the application, but also the data has to be moved to the cloud. Networking speed severely limits the amount of data that can travel between the cloud and the user, between different sites of the same cloud provider, or indeed between different cloud providers. It is therefore important to keep applications near the data itself. This paper investig…
A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices
2019
The diffusion of heterogeneous smart devices capable of capturing and analysing data about users, and/or the environment, has encouraged the growth of novel sensing methodologies. One of the most attractive scenarios in which such devices, such as smartphones, tablet computers, or activity trackers, can be exploited to infer relevant information is human activity recognition (HAR). Even though some simple HAR techniques can be directly implemented on mobile devices, in some cases, such as when complex activities need to be analysed timely, users’ smart devices can operate as part of a more complex architecture. In this article, we propose a multi-device HAR framework that exploits the fog c…
Examining business models of Software-as-a-Service companies
2013
Security and privacy in the cloud a long-term view
2011
In this paper we analyze security and privacy aspects of the cloud. We take a long-term view since the scope of privacy is potentially the lifetime of the privacy subject. We investigate trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. We also present promising solution for credible privacy in a cloud environment.
Role of Data Communications in Hybrid Cloud Costs
2011
Rapid adoption of cloud services in recent years has been driven by multiple factors, such as faster time-to-market and improved scalability enabled by public cloud infrastructure. Hybrid clouds, combining the in-house capacities with on-demand capacity of public clouds, achieve both the increased utilization rate of the in-house infrastructure and the limited use of more expensive public cloud, thereby lowering the total costs for the cloud user. In this paper, an analytical model of hybrid cloud costs is introduced, wherein the costs of computing and data communication are taken into account. Using this model, the costefficient division of the computing capacity between the private and th…