Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Cloud

Series

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 49

Full-Text Articles in Engineering

Web Services In Cloud Computing Research: Insights From Scientometric, Sivankalai S, Virumandi A Jun 2021

Web Services In Cloud Computing Research: Insights From Scientometric, Sivankalai S, Virumandi A

Library Philosophy and Practice (e-journal)

The research is the outcome of the investigation of 4035 papers on web services and cloud study, as covered in the Web of Knowledge core collection database during 2010 - 2019, going through an overall group author contribution of 29.00% during the period, Iosup, Alexandru, et al with a citation impact per paper of 44.10% and a journal impact per paper of 5.768 by Future generation computer systems-the international journal of science. The world's web services and cloud research output is diverse, with the top three open access research journals accounting for 66.59% (All Open Access 44.03%, DOAJ Gold 17.41%, …


Recent Trends In Software-Defined Networking: A Bibliometric Review, Jones Jefferson, Harikrishnan R Jun 2021

Recent Trends In Software-Defined Networking: A Bibliometric Review, Jones Jefferson, Harikrishnan R

Library Philosophy and Practice (e-journal)

Software-Defined Networking is referred to as the next big thing in the field of networking. Legacy networks contain various components such as switches, routers, etc. with a variety of complex protocols. A network administrator is responsible for configuring all these various components. Apart from complex network management, network security is also a persistent issue in the field of networking. SDN promises simplicity in network management while also dramatically improving the security of networks. This paper gives an analysis of the current trends in in SDN as well as Security challenges with SDN. A bibliometric review on SDN has also been …


Design Of A Robotic Inspection Platform For Structural Health Monitoring, Jason R. Soto Jun 2020

Design Of A Robotic Inspection Platform For Structural Health Monitoring, Jason R. Soto

FIU Electronic Theses and Dissertations

Actively monitoring infrastructure is key to detecting and correcting problems before they become costly. The vast scale of modern infrastructure poses a challenge to monitoring due to insufficient personnel. Certain structures, such as refineries, pose additional challenges and can be expensive, time-consuming, and hazardous to inspect.

This thesis outlines the development of an autonomous robot for structural-health-monitoring. The robot is capable of operating autonomously in level indoor environments and can be controlled manually to traverse difficult terrain. Both visual and lidar SLAM, along with a procedural-mapping technique, allow the robot to capture colored-point-clouds.

The robot is successfully able to automate …


Organisational-Level Assessment Of Cloud Computing Adoption: Evidence From The Australian Smes, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Pu Huang, Qiang He, Wu Zhan Jan 2020

Organisational-Level Assessment Of Cloud Computing Adoption: Evidence From The Australian Smes, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Pu Huang, Qiang He, Wu Zhan

Faculty of Engineering and Information Sciences - Papers: Part B

Cloud Computing (CC) is an emerging technology that can potentially revolutionise the application and delivery of IT. There has been little research, however, into the adoption of CC in Small and Medium-Sized Enterprises (SMEs). The indicators show that CC has been adopted very slowly. There is also a significant research gap in the investigation of the adoption of this innovation in SMEs. This article explores how the adoption of CC in Australia is related to technological factors, risk factors, and environmental factors. The study provides useful insights that can be utilised practically by SMEs, policymakers, and cloud vendors.


Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili Aug 2019

Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Interactions with IoT devices generates vast amounts of personal data that can be used as a source of evidence in digital investigations. Currently, there are many challenges in IoT forensics such as the difficulty in acquiring and analysing IoT data/devices and the lack IoT forensic tools. Besides technical challenges, there are many concepts in IoT forensics that have yet to be explored such as definitions, experience and capability in the analysis of IoT data/devices and current/future challenges. A deeper understanding of these various concepts will help progress the field. To achieve this goal, we conducted a survey which received 70 …


A Strategic Audit Of Microsoft Azure, Lee Fitchett Apr 2019

A Strategic Audit Of Microsoft Azure, Lee Fitchett

Honors Theses

This paper looks at Microsoft Azure's current strategies and proposes possible options for the future. It looks at several competitors and explores how Azure will affect and react to Microsoft’s vision.


Facilitating Application-Aware Bandwidth Allocation In The Cloud With One-Step-Ahead Traffic Information, Dian Shen, Junzhou Luo, Fang Dong, Jiahui Jin, Junxue Zhang, Jun Shen Jan 2019

Facilitating Application-Aware Bandwidth Allocation In The Cloud With One-Step-Ahead Traffic Information, Dian Shen, Junzhou Luo, Fang Dong, Jiahui Jin, Junxue Zhang, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part B

Bandwidth allocation to virtual machines (VMs) has a significant impact on the performance of communication-intensive big data applications hosted in VMs. It is crucial to accurately determine how much bandwidth to be reserved for VMs and when to adjust it. Past approaches typically resort to predicting the long-term network demands of applications for bandwidth allocation. However, lacking of prediction accuracy, these methods lead to the unpredictable application performance. Recently, it is conceded that the network demands of applications can only be accurately derived right before each of their execution phases. Hence, it is challenging to timely allocate the bandwidth to …


Marine Boundary Layer Aerosol In The Eastern North Atlantic: Seasonal Variations And Key Controlling Processes, Guangjie Zheng, Yang Wang, For Full List Of Authors, See Publisher's Website. Dec 2018

Marine Boundary Layer Aerosol In The Eastern North Atlantic: Seasonal Variations And Key Controlling Processes, Guangjie Zheng, Yang Wang, For Full List Of Authors, See Publisher's Website.

Civil, Architectural and Environmental Engineering Faculty Research & Creative Works

The response of marine low cloud systems to changes in aerosol concentration represents one of the largest uncertainties in climate simulations. Major contributions to this uncertainty are derived from poor understanding of aerosol under natural conditions and the perturbation by anthropogenic emissions. The eastern North Atlantic (ENA) is a region of persistent but diverse marine boundary layer (MBL) clouds, whose albedo and precipitation are highly susceptible to perturbations in aerosol properties. In this study, we examine MBL aerosol properties, trace gas mixing ratios, and meteorological parameters measured at the Atmospheric Radiation Measurement Climate Research Facility's ENA site on Graciosa Island, …


Data Privacy And System Security For Banking And Financial Services Industry Based On Cloud Computing Infrastructure, Abhishek Mahalle, Jianming Yong, Xiaohui Tao, Jun Shen Jan 2018

Data Privacy And System Security For Banking And Financial Services Industry Based On Cloud Computing Infrastructure, Abhishek Mahalle, Jianming Yong, Xiaohui Tao, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part B

No abstract provided.


Fast Multi-Resource Allocation With Patterns In Large Scale Cloud Data Center, Jiyuan Shi, Junzhou Luo, Fang Dong, Jiahui Jin, Jun Shen Jan 2018

Fast Multi-Resource Allocation With Patterns In Large Scale Cloud Data Center, Jiyuan Shi, Junzhou Luo, Fang Dong, Jiahui Jin, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part B

How to achieve fast and efficient resource allocation is an important optimization problem of resource management in cloud data center. On one hand, in order to ensure the user experience of resource requesting, the system has to achieve fast resource allocation to timely process resource requests; on the other hand, in order to ensure the efficiency of resource allocation, how to allocate multi-dimensional resource requests to servers needs to be optimized, such that server's resource utilization can be improved. However, most of existing approaches focus on finding out the mapping of each specific resource request to each specific server. This …


A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Jun 2017

A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this system gives excellent security to stored data and complete control for accessing data by the client at different locations. The motivation for developing this personal encryption came about because of poor Cloud security and doubts over the safety of public encryption algorithms which might contain backdoors. However, side-channel attacks and other unwanted third-party interventions in Cloud security, probably contribute more to the poor security record history. These factors led to the development of a prototype for personalising security locally which defeats cryptanalysis. The …


Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving For Cloud Storage, Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min Jan 2017

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving For Cloud Storage, Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min

Faculty of Engineering and Information Sciences - Papers: Part A

Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of RDIC protocols have been proposed in the literature. However, most of the constructions suffer from the issue of requiring complex key management. That is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system …


A General Framework For Secure Sharing Of Personal Health Records In Cloud System, Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Zoe L. Jiang Jan 2017

A General Framework For Secure Sharing Of Personal Health Records In Cloud System, Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Zoe L. Jiang

Faculty of Engineering and Information Sciences - Papers: Part B

Personal Health Record (PHR) has been developed as a promising solution that allows patient-doctors interactions in a very effective way. Cloud technology has been seen as the prominent candidate to store the sensitive medical record in PHR, but to date, the security protection provided is yet inadequate without impacting the practicality of the system. In this paper, we provide an affirmative answer to this problem by proposing a general framework for secure sharing of PHRs. Our system enables patients to securely store and share their PHR in the cloud server (for example, to their carers), and furthermore the treating doctors …


Gscheduler: Optimizing Resource Provision By Using Gpu Usage Pattern Extraction In Cloud Environment, Zhuqing Xu, Fang Dong, Jiahui Jin, Junzhou Luo, Jun Shen Jan 2017

Gscheduler: Optimizing Resource Provision By Using Gpu Usage Pattern Extraction In Cloud Environment, Zhuqing Xu, Fang Dong, Jiahui Jin, Junzhou Luo, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part B

GPU-based clusters are widely chosen for accelerating a variety of scientific applications in high-end cloud environments. With their growing popularity, there is a necessity for improving the system throughput and decreasing the turnaround time for co-executing applications on the same GPU device. However, resource contention among multiple applications on a multi-tasked GPU leads to the performance degradation of applications. Previous works are not accurate enough to learn the characteristics of GPU application before execution, or cannot get such information timely, which may lead to misleading scheduling decisions. In this paper, we present GScheduler, a framework to detect and reduce interference …


A Consumer-Oriented Decision-Making Approach For Selecting The Cloud Storage Service: From Paprika Perspective, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He Jan 2017

A Consumer-Oriented Decision-Making Approach For Selecting The Cloud Storage Service: From Paprika Perspective, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He

Faculty of Engineering and Information Sciences - Papers: Part B

In recent years there is a growth in the number of companies that offers cloud storage solutions. From user’s perspectives, it is becoming a challenging task to choose which cloud storage to use and from whom, based on user’s needs. In this context, no framework can evaluate the decision criteria for selection of cloud storage services. This paper proposes a solution to this problem by identifying the cloud storage criteria and introduces the PAPRIKA approach for measuring the criteria of cloud storage based on client’s preference. This work demonstrated the applicability of the framework (decision model) by testing it with …


A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Jonathan Blackledge, Paul Tobin, Lee Tobin, Mick Mckeever Jan 2017

A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Jonathan Blackledge, Paul Tobin, Lee Tobin, Mick Mckeever

Conference papers

Abstract: In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this system gives excellent security to stored data and complete control for accessing data by the client at different locations. The motivation for developing this personal encryption came about because of poor Cloud security and doubts over the safety of public encryption algorithms which might contain backdoors. However, side-channel attacks and other unwanted third-party interventions in Cloud security, probably contribute more to the poor security record history. These factors led to the development of a prototype for personalising security locally which defeats cryptanalysis. …


Vertical Implementation Of Cloud For Education (V.I.C.E.), Travis S. Brummett Jul 2016

Vertical Implementation Of Cloud For Education (V.I.C.E.), Travis S. Brummett

Masters Theses & Specialist Projects

There are several different implementations of open source cloud software that organizations can utilize when deploying their own private cloud. Some possible solutions are OpenNebula, Nimbus, and Eucalyptus. These are Infrastructure-as-a-Service (IaaS) cloud implementations that ultimately gives users virtual machines to undefined job types. A typical IaaS cloud is composed of a front-end cloud controller node, a cluster controller node for controlling compute nodes, a virtual machine image repository node, and many persistent storage nodes and compute nodes. These architectures are built for ease of scalability and availability.

Interestingly, the potential of such architectures could have in the educational field …


Joint Resource Provisioning In Optical Cloud Networks, Pan Yi May 2016

Joint Resource Provisioning In Optical Cloud Networks, Pan Yi

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Resource allocation is an evolving part of many Cloud computing and data center management problems. For infrastructure as a service (IaaS) in the Cloud, the Cloud service provider allocates virtual machines (VMs) to the customers with required CPU, memory and disk configurations. In addition to the computing infrastructures, the bandwidth resources would also be allocated to customers for data transmission between reserved VMs. In the near future, users may also want to reserve multiple virtual data centers (VDCs) to construct their own virtual Cloud, which could be called data center as a service (DCaaS). For these two types of services, …


Predictive Inference For Big, Spatial, Non-Gaussian Data: Modis Cloud Data And Its Change-Of-Support, Aritra Sengupta, Noel A. Cressie, Brian H. Kahn, Richard Frey Jan 2016

Predictive Inference For Big, Spatial, Non-Gaussian Data: Modis Cloud Data And Its Change-Of-Support, Aritra Sengupta, Noel A. Cressie, Brian H. Kahn, Richard Frey

Faculty of Engineering and Information Sciences - Papers: Part A

Remote sensing of the earth with satellites yields datasets that can be massive in size, nonstationary in space, and non-Gaussian in distribution. To overcome computational challenges, we use the reduced-rank spatial random effects (SRE) model in a statistical analysis of cloud-mask data from NASA's Moderate Resolution Imaging Spectroradiometer (MODIS) instrument on board NASA's Terra satellite. Parameterisations of cloud processes are the biggest source of uncertainty and sensitivity in different climate models' future projections of Earth's climate. An accurate quantification of the spatial distribution of clouds, as well as a rigorously estimated pixel-scale clear-sky-probability process, is needed to establish reliable estimates …


Public Cloud Data Auditing With Practical Key Update And Zero Knowledge Privacy, Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang Jan 2016

Public Cloud Data Auditing With Practical Key Update And Zero Knowledge Privacy, Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang

Faculty of Engineering and Information Sciences - Papers: Part A

Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user's private auditing key (as well as the authenticators those keys are associated with) without the user's re-possession of the data remains an open problem. In this paper, we propose a key-updating and authenticator-evolving mechanism with zero-knowledge privacy of the stored files for secure cloud data auditing, which incorporates zero knowledge proof systems, proxy re-signatures and homomorphic linear authenticators. …


Cloud Computing Services Adoption In Australian Smes: A Firm-Level Investigation, Salim Al Isma'ili, Mengxiang Li, Qiang He, Jun Shen Jan 2016

Cloud Computing Services Adoption In Australian Smes: A Firm-Level Investigation, Salim Al Isma'ili, Mengxiang Li, Qiang He, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

Cloud computing services can boost the competitiveness of Small and Medium-sized Enterprises (SMEs) and leverage countries' economies. In the Australian context, there is an emerging trend that SMEs begin to embrace cloud technology in their traditional business activities. However, prior studies did not pay much attention to investigating the factors that influence the cloud computing adoption among Australian SMEs. To fill the research gap, this paper investigates the influential factors that affect the decision on adopting cloud computing services for Australian SMEs. Protocol data collected from fifteen firm-level semi-structured interviews with practitioners are presented and discussed. The protocol analysis indicates …


Cloud Computing Adoption Determinants: An Analysis Of Australian Smes, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He Jan 2016

Cloud Computing Adoption Determinants: An Analysis Of Australian Smes, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He

Faculty of Engineering and Information Sciences - Papers: Part A

In Australia, there is an emerging tendency among SMEs towards the adoption of cloud computing. However, there are limited studies investigating the factors that influence cloud computing adoption within Australian SMEs. To fill the research vacuum, we developed a research model based on the diffusion of innovation theory (DOI), the technology-organisation-environment (TOE) framework, and our prior exploratory study to investigate the determinants that influence the adoption of cloud computing. An organizational-level survey was conducted across Australia to collect data from technology decision makers in SMEs. Data collected from 203 firms are used to test the related hypotheses. This study contributes …


Two-Factor Data Security Protection Mechanism For Cloud Storage System, Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang Jan 2016

Two-Factor Data Security Protection Mechanism For Cloud Storage System, Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we propose a two-factor data security protection mechanism with factor revocability for cloud storage system. Our system allows a sender to send an encrypted message to a receiver through a cloud storage server. The sender only needs to know the identity of the receiver but no other information (such as its public key or its certificate). The receiver needs to possess two things in order to decrypt the ciphertext. The first thing is his/her secret key stored in the computer. The second thing is a unique personal security device which connects to the computer. It is impossible …


Cloud Computing Adoption Decision Modelling For Smes: From The Paprika Perspective, Salim Al Isma'ili, Mengxiang Li, Jun Shen Jan 2016

Cloud Computing Adoption Decision Modelling For Smes: From The Paprika Perspective, Salim Al Isma'ili, Mengxiang Li, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

The popularity of cloud computing has been growing among enter-prises since its inception. It is an emerging technology which promises competi-tive advantages, significant cost savings, enhanced business processes and ser-vices, and various other benefits. The aim of this paper is to propose a decision modelling using Potentially All Pairwise RanKings of all possible Alternatives (PAPRIKA) for the factors that have impact in SMEs cloud computing adoption process.


Cloud Computing Adoption Decision Modelling For Smes: A Conjoint Analysis, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He Jan 2016

Cloud Computing Adoption Decision Modelling For Smes: A Conjoint Analysis, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He

Faculty of Engineering and Information Sciences - Papers: Part A

Cloud computing is an emerging technology that promises competitive advantages, cost savings, enhanced business processes and services, and various other benefits to enterprises. Despite the rapid technological advancement, the adoption of cloud computing is still growing slowly among small and mediumsized enterprises (SMEs). This paper presents a model to support the decisionmaking process, using a multi-criteria decision method PAPRIKA for the socio-technical aspects influencing SMEs cloud adoption decision. Due to the multifaceted nature of the cloud computing adoption process, the evaluation of various cloud services and deployment models have become a major challenge. This paper presents a systematic approach to …


Cumulonimbus Computing Concerns: Information Security In Public, Private, And Hybrid Cloud Computing, Daniel Adams Apr 2015

Cumulonimbus Computing Concerns: Information Security In Public, Private, And Hybrid Cloud Computing, Daniel Adams

Senior Honors Theses

Companies of all sizes operating in all markets are moving toward cloud computing for greater flexibility, efficiency, and cost savings. The decision of how to adopt the cloud is a question of major security concern due to the fact that control is relinquished over certain portions of the IT ecosystem. This thesis presents the position that the main security decision in moving to cloud computing is choosing which type of cloud to employ for each portion of the network – the hybrid cloud approach. Vulnerabilities that exist on a public cloud will be explored, and recommendations on decision factors will …


A Generalized Service Replication Process In Distributed Environments, Hany F. Elyamany, Marwa F. Mohamed, Katarina Grolinger, Miriam Am Capretz Jan 2015

A Generalized Service Replication Process In Distributed Environments, Hany F. Elyamany, Marwa F. Mohamed, Katarina Grolinger, Miriam Am Capretz

Electrical and Computer Engineering Publications

Replication is one of the main techniques aiming to improve Web services’ (WS) quality of service (QoS) in distributed environments, including clouds and mobile devices. Service replication is a way of improving WS performance and availability by creating several copies or replicas of Web services which work in parallel or sequentially under defined circumstances. In this paper, a generalized replication process for distributed environments is discussed based on established replication studies. The generalized replication process consists of three main steps: sensing the environment characteristics, determining the replication strategy, and implementing the selected replication strategy. To demonstrate application of the generalized …


Mlaas: A Cloud System For Mobile Micro Learning In Mooc, Geng Sun, Tingru Cui, Shiping Chen, Wanwu Guo, Jun Shen Jan 2015

Mlaas: A Cloud System For Mobile Micro Learning In Mooc, Geng Sun, Tingru Cui, Shiping Chen, Wanwu Guo, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

No abstract provided.


Enhancing Teamwork Performance In Mobile Cloud-Based Learning, Geng Sun, Jun Shen Jan 2015

Enhancing Teamwork Performance In Mobile Cloud-Based Learning, Geng Sun, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

Mobile cloud-based learning is a novel trend that allows collaborative learning to happen among distributed learners, but it still lacks of mechanisms to enhance teamwork performance. Combining the features of the cloud, we have identified a learning flow based on Kolb team learning experience, executed by cloud-hosting learning management systems in conjunction with our newly designed system, 'Teamwork as a Service (TaaS)'. Each of TaaS's five web services aims to organize a certain type of learning activities, providing learners with an introduction, a 'jigsaw classroom', schedule planning, and mutual supervision during the whole collaborative learning process. In particular, enabling a …


File Sharing In Cloud Computing Using Win Stay Lose Shift Strategy, Yilei Wang, Willy Susilo, Tao Li, Qiuliang Xu Jan 2015

File Sharing In Cloud Computing Using Win Stay Lose Shift Strategy, Yilei Wang, Willy Susilo, Tao Li, Qiuliang Xu

Faculty of Engineering and Information Sciences - Papers: Part A

Traditionally, users in clouds are assumed to be willing to store and share files in clouds, where the security and efficiency issues are discussed. However, few studies involve the incentives to share files in clouds. In this paper, we delve into users' incentives for using the cloud system to store and share their files towards the view of game theory. More specifically, the process of file sharing is reduced to an infinitely repeated prisoner's dilemma PD game and the action of sharing files in clouds is considered as the action of cooperation in the infinitely repeated PD game. We incorporate …