Search results for "cloud computing"

showing 10 items of 327 documents

Information Security and Privacy in Medical Application Scenario

2010

This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.

Information privacyCloud computing securityPrivacy by Designbusiness.industryPrivacy softwareInternet privacyComputer securitycomputer.software_genreSecurity information and event managementInformation sensitivityInformation security managementbusinessPersonally identifiable informationcomputer
researchProduct

Special Section on ITS Services to Smart City Context [Guest Editorial]

2018

The seven articles in this special section focus on new trends and developments in the intelligent transportation markets. Since the earliest of times, transportation has changed and revolutionized society and industry. Many of technology advances were focused on transportation and their means (road, rail, air, water, etc.) even, today there exist several areas of the knowledge that are focused on it. As time goes by, new terms have been established where technology is present as well, for instance, Intelligent Transportation Systems (ITS), Smart Cities, Smart Territory, Blockchain, Internet of Things, virtualization, Cloud computing, Intelligent Vehicles, embedded computing, Deep learning,…

Focus (computing)business.industryComputer scienceMechanical EngineeringContext (language use)Cloud computingVirtualizationcomputer.software_genreComputer Science ApplicationsOrder (exchange)Smart cityAutomotive EngineeringSpecial sectionTelecommunicationsbusinesscomputerIntelligent transportation systemIEEE Intelligent Transportation Systems Magazine
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

2017

Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…

021110 strategic defence & security studiesbusiness.industryComputer scienceVisibility (geometry)0211 other engineering and technologiesBotnetCloud computingcloud environments02 engineering and technologycomputer.software_genrepilvipalvelutInformation sensitivityMode (computer interface)Virtual machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingState (computer science)co-residence detectiontietoturvavirtual networksbusinessVirtual networkcomputerComputer network
researchProduct

The Challenges for Regulation and Control in an Environment of Rapid Technological Innovations

2019

Currently, amplified use of the ITC-technologies and digitalization in almost all industries has changed the value and significance of the information. The use of these new technologies offer tremendous opportunities for innovation and development, but at the same time ask for regulation and control policies to ensure appropriate storage and use of information and avoid illicit utilization of data. Moreover, use of innovative technologies such as blockchain-based technology, artificial intelligence, cloud technology, and others has complicated and disrupted the landscape of the financial services providers and their ancillary service providers such as auditors, underwriters, advisors, actua…

DilemmaRisk analysis (engineering)business.industryEmerging technologiesBig dataCloud computingAuditbusinessFinancial servicesUtility modelUnderwriting
researchProduct

Distributing Storage in Cloud Environments

2013

Cloud computing has a major impact on today's IT strategies. Outsourcing applications from IT departments to the cloud relieves users from building big infrastructures as well as from building the corresponding expertise, and allows them to focus on their main competences and businesses. One of the main hurdles of cloud computing is that not only the application, but also the data has to be moved to the cloud. Networking speed severely limits the amount of data that can travel between the cloud and the user, between different sites of the same cloud provider, or indeed between different cloud providers. It is therefore important to keep applications near the data itself. This paper investig…

Cloud computing securityComputer sciencebusiness.industryCloud testingDistributed computingLocalityThe InternetCloud computingLoad balancing (computing)businessCloud storageOutsourcing2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum
researchProduct

A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices

2019

The diffusion of heterogeneous smart devices capable of capturing and analysing data about users, and/or the environment, has encouraged the growth of novel sensing methodologies. One of the most attractive scenarios in which such devices, such as smartphones, tablet computers, or activity trackers, can be exploited to infer relevant information is human activity recognition (HAR). Even though some simple HAR techniques can be directly implemented on mobile devices, in some cases, such as when complex activities need to be analysed timely, users’ smart devices can operate as part of a more complex architecture. In this article, we propose a multi-device HAR framework that exploits the fog c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniExploitComputer Networks and CommunicationsComputer sciencebusiness.industryBandwidth (signal processing)Activity tracker020206 networking & telecommunicationsCloud computing02 engineering and technologyActivity recognitionHuman–computer interactionHuman activity recognition mobile crowdsensing fog computing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSmart environmentbusinessMobile deviceWearable technologyACM Transactions on Internet Technology
researchProduct

Examining business models of Software-as-a-Service companies

2013

SaaSliiketoimintamallitpilvipalvelutsoftware businessulkoistaminenohjelmistoalacloud computingsoftware companiesbusiness modelsohjelmistoliiketoimintaIT outsourcingtietotekniikkayrityksetSoftware-as-a-Service
researchProduct

Security and privacy in the cloud a long-term view

2011

In this paper we analyze security and privacy aspects of the cloud. We take a long-term view since the scope of privacy is potentially the lifetime of the privacy subject. We investigate trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. We also present promising solution for credible privacy in a cloud environment.

Information privacyCloud computing securityScope (project management)Privacy by DesignComputer sciencebusiness.industryPrivacy softwareData_MISCELLANEOUSInternet privacyCloud computingComputer securitycomputer.software_genreTerm (time)ComputingMilieux_COMPUTERSANDSOCIETYSubjective logicbusinesscomputer2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
researchProduct

Role of Data Communications in Hybrid Cloud Costs

2011

Rapid adoption of cloud services in recent years has been driven by multiple factors, such as faster time-to-market and improved scalability enabled by public cloud infrastructure. Hybrid clouds, combining the in-house capacities with on-demand capacity of public clouds, achieve both the increased utilization rate of the in-house infrastructure and the limited use of more expensive public cloud, thereby lowering the total costs for the cloud user. In this paper, an analytical model of hybrid cloud costs is introduced, wherein the costs of computing and data communication are taken into account. Using this model, the costefficient division of the computing capacity between the private and th…

Cloud computing securityhybrid cloudbusiness.industryTotal costComputer scienceDistributed computingVolume (computing)cost modeldata communications costCloud computingDivision (mathematics)kustannusmalli tietoliikenteen kustannuksetCloud testingScalabilityhybridi pilvibusinessUtilization rate
researchProduct