Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Cloud

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 75

Full-Text Articles in Engineering

Cloud Container Security’ Next Move, Vishakha Sadhwani Dec 2022

Cloud Container Security’ Next Move, Vishakha Sadhwani

Dissertations and Theses

In the last few years, it is apparent to cybersecurity experts everywhere that the proverbial container tech genie is out of the bottle, and has been widely embraced across multiple organizations. To achieve the flexibility of building and deploying applications anywhere and everywhere, cloud native environments have gained great momentum and made the development lifecycle simpler than ever. However, container environments brings with them a range of cybersecurity issues that includes images, containers, hosts, runtimes, registries, and orchestration platforms, which needs the necessity to focus on investing in securing your container stack.

According to this report[1], released by cloud-native …


Digital Forensics Range, Cody P. Shanahan, Bryson Y. Shishido, Samuel R. Mckee, Justin Siu, Lisa Li, Maxwell Brewer Jun 2022

Digital Forensics Range, Cody P. Shanahan, Bryson Y. Shishido, Samuel R. Mckee, Justin Siu, Lisa Li, Maxwell Brewer

Computer Engineering

The Digital Forensics Range was developed to serve as an online training for groups interested in computer forensics. This year's team had the goal to expand upon last year, by adding a new forensics image, unity scenario, and additional AWS functionality. The team still wanted to continue with last year's goals of keeping the training easily runnable, quickly deployable, and rapidly scalable through the use of the cloud. Adding to last year's work, this year's team hoped to further increase the educational value of the simulation with more practice, and the addition of feedback. The training is meant to be …


Web Services In Cloud Computing Research: Insights From Scientometric, Sivankalai S, Virumandi A Jun 2021

Web Services In Cloud Computing Research: Insights From Scientometric, Sivankalai S, Virumandi A

Library Philosophy and Practice (e-journal)

The research is the outcome of the investigation of 4035 papers on web services and cloud study, as covered in the Web of Knowledge core collection database during 2010 - 2019, going through an overall group author contribution of 29.00% during the period, Iosup, Alexandru, et al with a citation impact per paper of 44.10% and a journal impact per paper of 5.768 by Future generation computer systems-the international journal of science. The world's web services and cloud research output is diverse, with the top three open access research journals accounting for 66.59% (All Open Access 44.03%, DOAJ Gold 17.41%, …


Recent Trends In Software-Defined Networking: A Bibliometric Review, Jones Jefferson, Harikrishnan R Jun 2021

Recent Trends In Software-Defined Networking: A Bibliometric Review, Jones Jefferson, Harikrishnan R

Library Philosophy and Practice (e-journal)

Software-Defined Networking is referred to as the next big thing in the field of networking. Legacy networks contain various components such as switches, routers, etc. with a variety of complex protocols. A network administrator is responsible for configuring all these various components. Apart from complex network management, network security is also a persistent issue in the field of networking. SDN promises simplicity in network management while also dramatically improving the security of networks. This paper gives an analysis of the current trends in in SDN as well as Security challenges with SDN. A bibliometric review on SDN has also been …


Iot Garden Frost Alarm, Andrew James Jun 2021

Iot Garden Frost Alarm, Andrew James

Honors Theses

Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.

The system as designed …


Navigating In Numerous Video Data: User Interface Design For An On-Camera Video Analytics Engine, Sabriya Maryam Alam Aug 2020

Navigating In Numerous Video Data: User Interface Design For An On-Camera Video Analytics Engine, Sabriya Maryam Alam

The Journal of Purdue Undergraduate Research

Video analytics powered by artificial intelligence shows high promise in making our society smarter. Harnessing large amounts of video data, however, requires the development of processing systems demonstrating high performance and high efficiency. To this end, this work has contributed to a video analytics system powered by artificial intelligence for object detection and recognition. Rather than streaming all the video frames to the cloud, the system analyzes images on-camera and only returns those of interest to the cloud. This edge analytics research-grade software is available, but it lacks a simple web interface for general use by scientists, engineers, and other …


Private Face Detection Based On Random Sub-Images In Cloud, Yuan Peng, Jin Xin, Xiaodong Li, Zhao Geng, Yaming Wu, Mingxin Ma, Yulu Tian, Yingya Chen Aug 2020

Private Face Detection Based On Random Sub-Images In Cloud, Yuan Peng, Jin Xin, Xiaodong Li, Zhao Geng, Yaming Wu, Mingxin Ma, Yulu Tian, Yingya Chen

Journal of System Simulation

Abstract: In order to detect faces of terminal face image in the cloud at the same time protect both privacy of data,a method of face images privacy detection based on random sub-Images representation was proposed. Terminal divided original image into 2 value sub-images weighted sum based on random sub-images generation algorithm and randomly arranges weights of sub-images. Terminal sent sub-images according to the weights of random sequence to the cloud server. Cloud server detected sub-images with its face detection algorithm. Terminal merges test results based on random sub were exploded. Two random vectors were leveraged to protect the parameters …


Design Of A Robotic Inspection Platform For Structural Health Monitoring, Jason R. Soto Jun 2020

Design Of A Robotic Inspection Platform For Structural Health Monitoring, Jason R. Soto

FIU Electronic Theses and Dissertations

Actively monitoring infrastructure is key to detecting and correcting problems before they become costly. The vast scale of modern infrastructure poses a challenge to monitoring due to insufficient personnel. Certain structures, such as refineries, pose additional challenges and can be expensive, time-consuming, and hazardous to inspect.

This thesis outlines the development of an autonomous robot for structural-health-monitoring. The robot is capable of operating autonomously in level indoor environments and can be controlled manually to traverse difficult terrain. Both visual and lidar SLAM, along with a procedural-mapping technique, allow the robot to capture colored-point-clouds.

The robot is successfully able to automate …


Organisational-Level Assessment Of Cloud Computing Adoption: Evidence From The Australian Smes, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Pu Huang, Qiang He, Wu Zhan Jan 2020

Organisational-Level Assessment Of Cloud Computing Adoption: Evidence From The Australian Smes, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Pu Huang, Qiang He, Wu Zhan

Faculty of Engineering and Information Sciences - Papers: Part B

Cloud Computing (CC) is an emerging technology that can potentially revolutionise the application and delivery of IT. There has been little research, however, into the adoption of CC in Small and Medium-Sized Enterprises (SMEs). The indicators show that CC has been adopted very slowly. There is also a significant research gap in the investigation of the adoption of this innovation in SMEs. This article explores how the adoption of CC in Australia is related to technological factors, risk factors, and environmental factors. The study provides useful insights that can be utilised practically by SMEs, policymakers, and cloud vendors.


Factors That Influence Throughput On Cloud-Hosted Mysql Server, Eric Brown Jan 2020

Factors That Influence Throughput On Cloud-Hosted Mysql Server, Eric Brown

Walden Dissertations and Doctoral Studies

Many businesses are moving their infrastructure to the cloud and may not fully understand the factors that can increase costs. With so many factors available to improve throughput in a database, it can be difficult for a database administrator to know which factors can provide the best efficiency to maintain lower costs. Grounded in Six Sigma theoretical framework, the purpose of this quantitative, quasi-experimental study was to evaluate the relationship between the time of day, the number of concurrent users, InnoDB buffer pool size, InnoDB Input/Output capacity, and MySQL transaction throughput to a MySQL database running on a cloud, virtual, …


Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili Aug 2019

Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Interactions with IoT devices generates vast amounts of personal data that can be used as a source of evidence in digital investigations. Currently, there are many challenges in IoT forensics such as the difficulty in acquiring and analysing IoT data/devices and the lack IoT forensic tools. Besides technical challenges, there are many concepts in IoT forensics that have yet to be explored such as definitions, experience and capability in the analysis of IoT data/devices and current/future challenges. A deeper understanding of these various concepts will help progress the field. To achieve this goal, we conducted a survey which received 70 …


A Strategic Audit Of Microsoft Azure, Lee Fitchett Apr 2019

A Strategic Audit Of Microsoft Azure, Lee Fitchett

Honors Theses

This paper looks at Microsoft Azure's current strategies and proposes possible options for the future. It looks at several competitors and explores how Azure will affect and react to Microsoft’s vision.


Facilitating Application-Aware Bandwidth Allocation In The Cloud With One-Step-Ahead Traffic Information, Dian Shen, Junzhou Luo, Fang Dong, Jiahui Jin, Junxue Zhang, Jun Shen Jan 2019

Facilitating Application-Aware Bandwidth Allocation In The Cloud With One-Step-Ahead Traffic Information, Dian Shen, Junzhou Luo, Fang Dong, Jiahui Jin, Junxue Zhang, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part B

Bandwidth allocation to virtual machines (VMs) has a significant impact on the performance of communication-intensive big data applications hosted in VMs. It is crucial to accurately determine how much bandwidth to be reserved for VMs and when to adjust it. Past approaches typically resort to predicting the long-term network demands of applications for bandwidth allocation. However, lacking of prediction accuracy, these methods lead to the unpredictable application performance. Recently, it is conceded that the network demands of applications can only be accurately derived right before each of their execution phases. Hence, it is challenging to timely allocate the bandwidth to …


Towards Data And Model Confidentiality In Outsourced Machine Learning, Sagar Sharma Jan 2019

Towards Data And Model Confidentiality In Outsourced Machine Learning, Sagar Sharma

Browse all Theses and Dissertations

With massive data collections and needs for building powerful predictive models, data owners may choose to outsource storage and expensive machine learning computations to public cloud providers (Cloud). Data owners may choose cloud outsourcing due to the lack of in-house storage and computation resources or the expertise of building models. Similarly, users, who subscribe to specialized services such as movie streaming and social networking, voluntarily upload their data to the service providers' site for storage, analytics, and better services. The service provider, in turn, may also choose to benefit from ubiquitous cloud computing. However, outsourcing to a public cloud provider …


Marine Boundary Layer Aerosol In The Eastern North Atlantic: Seasonal Variations And Key Controlling Processes, Guangjie Zheng, Yang Wang, For Full List Of Authors, See Publisher's Website. Dec 2018

Marine Boundary Layer Aerosol In The Eastern North Atlantic: Seasonal Variations And Key Controlling Processes, Guangjie Zheng, Yang Wang, For Full List Of Authors, See Publisher's Website.

Civil, Architectural and Environmental Engineering Faculty Research & Creative Works

The response of marine low cloud systems to changes in aerosol concentration represents one of the largest uncertainties in climate simulations. Major contributions to this uncertainty are derived from poor understanding of aerosol under natural conditions and the perturbation by anthropogenic emissions. The eastern North Atlantic (ENA) is a region of persistent but diverse marine boundary layer (MBL) clouds, whose albedo and precipitation are highly susceptible to perturbations in aerosol properties. In this study, we examine MBL aerosol properties, trace gas mixing ratios, and meteorological parameters measured at the Atmospheric Radiation Measurement Climate Research Facility's ENA site on Graciosa Island, …


Data Privacy And System Security For Banking And Financial Services Industry Based On Cloud Computing Infrastructure, Abhishek Mahalle, Jianming Yong, Xiaohui Tao, Jun Shen Jan 2018

Data Privacy And System Security For Banking And Financial Services Industry Based On Cloud Computing Infrastructure, Abhishek Mahalle, Jianming Yong, Xiaohui Tao, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part B

No abstract provided.


Fast Multi-Resource Allocation With Patterns In Large Scale Cloud Data Center, Jiyuan Shi, Junzhou Luo, Fang Dong, Jiahui Jin, Jun Shen Jan 2018

Fast Multi-Resource Allocation With Patterns In Large Scale Cloud Data Center, Jiyuan Shi, Junzhou Luo, Fang Dong, Jiahui Jin, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part B

How to achieve fast and efficient resource allocation is an important optimization problem of resource management in cloud data center. On one hand, in order to ensure the user experience of resource requesting, the system has to achieve fast resource allocation to timely process resource requests; on the other hand, in order to ensure the efficiency of resource allocation, how to allocate multi-dimensional resource requests to servers needs to be optimized, such that server's resource utilization can be improved. However, most of existing approaches focus on finding out the mapping of each specific resource request to each specific server. This …


Digital Forensic Tools & Cloud-Based Machine Learning For Analyzing Crime Data, Majeed Kayode Raji Jan 2018

Digital Forensic Tools & Cloud-Based Machine Learning For Analyzing Crime Data, Majeed Kayode Raji

Electronic Theses and Dissertations

Digital forensics is a branch of forensic science in which we can recreate past events using forensic tools for legal measure. Also, the increase in the availability of mobile devices has led to their use in criminal activities. Moreover, the rate at which data is being generated has been on the increase which has led to big data problems. With cloud computing, data can now be stored, processed and analyzed as they are generated. This thesis documents consists of three studies related to data analysis. The first study involves analyzing data from an android smartphone while making a comparison between …


Mobile Applications To Aid Office To Field Communication, William Hunter Bryson Dec 2017

Mobile Applications To Aid Office To Field Communication, William Hunter Bryson

Construction Management

The advancements in new age communication technology are changing and shaping the construction industry more than ever, and this technology can be utilized to solve the many issues faced in the realm of office to field communication. Currently, many companies in the construction industry struggle to effectively manage office to field communication. In an industry where details surrounding RFI’s, change orders, and submittals are constantly changing, it is imperative that information is communicated effectively and in a timely manner to the necessary people. If communication is not flowing in an accurate and succinct manner, very costly mistakes can be made …


Moblie Applications To Aid Office To Field Communcation, Will H. Bryson Dec 2017

Moblie Applications To Aid Office To Field Communcation, Will H. Bryson

Construction Management

The advancements in new age communication technology are changing and shaping the construction industry more than ever, and this technology can be utilized to solve the many issues faced in the realm of office to field communication. Currently, many companies in the construction industry struggle to effectively manage office to field communication. In an industry where details surrounding RFI’s, change orders, and submittals are constantly changing, it is imperative that information is communicated effectively and in a timely manner to the necessary people. If communication is not flowing in an accurate and succinct manner, very costly mistakes can be made …


A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Jun 2017

A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this system gives excellent security to stored data and complete control for accessing data by the client at different locations. The motivation for developing this personal encryption came about because of poor Cloud security and doubts over the safety of public encryption algorithms which might contain backdoors. However, side-channel attacks and other unwanted third-party interventions in Cloud security, probably contribute more to the poor security record history. These factors led to the development of a prototype for personalising security locally which defeats cryptanalysis. The …


Cloud-Based Analytic Element Groundwater Modeling, Jacob Baird Fullerton Mar 2017

Cloud-Based Analytic Element Groundwater Modeling, Jacob Baird Fullerton

Theses and Dissertations

Managing groundwater resources requires computer modeling software, which in turn brings its own costs in education and usage fees. Although many groundwater modeling programs can be obtained at relatively inexpensive rates the hidden costs of software training remain high in general. What has been done is to make both the software and training available online for free, but this method delegates all responsibility to the users for both accessing the software in addition to learning how to use it properly. In this research the accessibility of groundwater models has been improved upon by creating a web app of an open …


Cloud Workflow Automation, William Crump, Eric Darling, Kyle Hagood, Syed Rizvi Jan 2017

Cloud Workflow Automation, William Crump, Eric Darling, Kyle Hagood, Syed Rizvi

Capstone Design Expo Posters

The goal of our project was to develop an application in the cloud which automates complex business tasks. The application allows users to create configurable events consisting of a trigger followed by an action. Triggers are designed for common tasks such as scanning a directory or email inbox for new files. When a new file is detected, the application triggers the execution of an associated action such as sending an email alerting the user of the changes or processing and moving the files. Users are thus able to automate complex tasks by configuring event sequences, leading to an increase …


Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving For Cloud Storage, Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min Jan 2017

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving For Cloud Storage, Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min

Faculty of Engineering and Information Sciences - Papers: Part A

Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of RDIC protocols have been proposed in the literature. However, most of the constructions suffer from the issue of requiring complex key management. That is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system …


Contributions To Edge Computing, Vernon K. Bumgardner Jan 2017

Contributions To Edge Computing, Vernon K. Bumgardner

Theses and Dissertations--Computer Science

Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.

Edge Computing is the migration of computational functionality to sources of data generation. The importance of …


A General Framework For Secure Sharing Of Personal Health Records In Cloud System, Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Zoe L. Jiang Jan 2017

A General Framework For Secure Sharing Of Personal Health Records In Cloud System, Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Zoe L. Jiang

Faculty of Engineering and Information Sciences - Papers: Part B

Personal Health Record (PHR) has been developed as a promising solution that allows patient-doctors interactions in a very effective way. Cloud technology has been seen as the prominent candidate to store the sensitive medical record in PHR, but to date, the security protection provided is yet inadequate without impacting the practicality of the system. In this paper, we provide an affirmative answer to this problem by proposing a general framework for secure sharing of PHRs. Our system enables patients to securely store and share their PHR in the cloud server (for example, to their carers), and furthermore the treating doctors …


Gscheduler: Optimizing Resource Provision By Using Gpu Usage Pattern Extraction In Cloud Environment, Zhuqing Xu, Fang Dong, Jiahui Jin, Junzhou Luo, Jun Shen Jan 2017

Gscheduler: Optimizing Resource Provision By Using Gpu Usage Pattern Extraction In Cloud Environment, Zhuqing Xu, Fang Dong, Jiahui Jin, Junzhou Luo, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part B

GPU-based clusters are widely chosen for accelerating a variety of scientific applications in high-end cloud environments. With their growing popularity, there is a necessity for improving the system throughput and decreasing the turnaround time for co-executing applications on the same GPU device. However, resource contention among multiple applications on a multi-tasked GPU leads to the performance degradation of applications. Previous works are not accurate enough to learn the characteristics of GPU application before execution, or cannot get such information timely, which may lead to misleading scheduling decisions. In this paper, we present GScheduler, a framework to detect and reduce interference …


A Consumer-Oriented Decision-Making Approach For Selecting The Cloud Storage Service: From Paprika Perspective, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He Jan 2017

A Consumer-Oriented Decision-Making Approach For Selecting The Cloud Storage Service: From Paprika Perspective, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He

Faculty of Engineering and Information Sciences - Papers: Part B

In recent years there is a growth in the number of companies that offers cloud storage solutions. From user’s perspectives, it is becoming a challenging task to choose which cloud storage to use and from whom, based on user’s needs. In this context, no framework can evaluate the decision criteria for selection of cloud storage services. This paper proposes a solution to this problem by identifying the cloud storage criteria and introduces the PAPRIKA approach for measuring the criteria of cloud storage based on client’s preference. This work demonstrated the applicability of the framework (decision model) by testing it with …


A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Jonathan Blackledge, Paul Tobin, Lee Tobin, Mick Mckeever Jan 2017

A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Jonathan Blackledge, Paul Tobin, Lee Tobin, Mick Mckeever

Conference papers

Abstract: In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this system gives excellent security to stored data and complete control for accessing data by the client at different locations. The motivation for developing this personal encryption came about because of poor Cloud security and doubts over the safety of public encryption algorithms which might contain backdoors. However, side-channel attacks and other unwanted third-party interventions in Cloud security, probably contribute more to the poor security record history. These factors led to the development of a prototype for personalising security locally which defeats cryptanalysis. …


Distributed And Scalable Video Analysis Architecture For Human Activity Recognition Using Cloud Services, Cody Wilson Eilar Dec 2016

Distributed And Scalable Video Analysis Architecture For Human Activity Recognition Using Cloud Services, Cody Wilson Eilar

Electrical and Computer Engineering ETDs

This thesis proposes an open-source, maintainable system for detecting human activity in large video datasets using scalable hardware architectures. The system is validated by detecting writing and typing activities that were collected as part of the Advancing Out of School Learning in Mathematics and Engineering (AOLME) project. The implementation of the system using Amazon Web Services (AWS) is shown to be both horizontally and vertically scalable. The software associated with the system was designed to be robust so as to facilitate reproducibility and extensibility for future research.