Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Cloud

Series

Faculty of Engineering and Information Sciences - Papers: Part A

Articles 1 - 26 of 26

Full-Text Articles in Engineering

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving For Cloud Storage, Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min Jan 2017

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving For Cloud Storage, Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min

Faculty of Engineering and Information Sciences - Papers: Part A

Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of RDIC protocols have been proposed in the literature. However, most of the constructions suffer from the issue of requiring complex key management. That is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system …


Predictive Inference For Big, Spatial, Non-Gaussian Data: Modis Cloud Data And Its Change-Of-Support, Aritra Sengupta, Noel A. Cressie, Brian H. Kahn, Richard Frey Jan 2016

Predictive Inference For Big, Spatial, Non-Gaussian Data: Modis Cloud Data And Its Change-Of-Support, Aritra Sengupta, Noel A. Cressie, Brian H. Kahn, Richard Frey

Faculty of Engineering and Information Sciences - Papers: Part A

Remote sensing of the earth with satellites yields datasets that can be massive in size, nonstationary in space, and non-Gaussian in distribution. To overcome computational challenges, we use the reduced-rank spatial random effects (SRE) model in a statistical analysis of cloud-mask data from NASA's Moderate Resolution Imaging Spectroradiometer (MODIS) instrument on board NASA's Terra satellite. Parameterisations of cloud processes are the biggest source of uncertainty and sensitivity in different climate models' future projections of Earth's climate. An accurate quantification of the spatial distribution of clouds, as well as a rigorously estimated pixel-scale clear-sky-probability process, is needed to establish reliable estimates …


Public Cloud Data Auditing With Practical Key Update And Zero Knowledge Privacy, Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang Jan 2016

Public Cloud Data Auditing With Practical Key Update And Zero Knowledge Privacy, Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang

Faculty of Engineering and Information Sciences - Papers: Part A

Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user's private auditing key (as well as the authenticators those keys are associated with) without the user's re-possession of the data remains an open problem. In this paper, we propose a key-updating and authenticator-evolving mechanism with zero-knowledge privacy of the stored files for secure cloud data auditing, which incorporates zero knowledge proof systems, proxy re-signatures and homomorphic linear authenticators. …


Cloud Computing Services Adoption In Australian Smes: A Firm-Level Investigation, Salim Al Isma'ili, Mengxiang Li, Qiang He, Jun Shen Jan 2016

Cloud Computing Services Adoption In Australian Smes: A Firm-Level Investigation, Salim Al Isma'ili, Mengxiang Li, Qiang He, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

Cloud computing services can boost the competitiveness of Small and Medium-sized Enterprises (SMEs) and leverage countries' economies. In the Australian context, there is an emerging trend that SMEs begin to embrace cloud technology in their traditional business activities. However, prior studies did not pay much attention to investigating the factors that influence the cloud computing adoption among Australian SMEs. To fill the research gap, this paper investigates the influential factors that affect the decision on adopting cloud computing services for Australian SMEs. Protocol data collected from fifteen firm-level semi-structured interviews with practitioners are presented and discussed. The protocol analysis indicates …


Cloud Computing Adoption Determinants: An Analysis Of Australian Smes, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He Jan 2016

Cloud Computing Adoption Determinants: An Analysis Of Australian Smes, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He

Faculty of Engineering and Information Sciences - Papers: Part A

In Australia, there is an emerging tendency among SMEs towards the adoption of cloud computing. However, there are limited studies investigating the factors that influence cloud computing adoption within Australian SMEs. To fill the research vacuum, we developed a research model based on the diffusion of innovation theory (DOI), the technology-organisation-environment (TOE) framework, and our prior exploratory study to investigate the determinants that influence the adoption of cloud computing. An organizational-level survey was conducted across Australia to collect data from technology decision makers in SMEs. Data collected from 203 firms are used to test the related hypotheses. This study contributes …


Two-Factor Data Security Protection Mechanism For Cloud Storage System, Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang Jan 2016

Two-Factor Data Security Protection Mechanism For Cloud Storage System, Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we propose a two-factor data security protection mechanism with factor revocability for cloud storage system. Our system allows a sender to send an encrypted message to a receiver through a cloud storage server. The sender only needs to know the identity of the receiver but no other information (such as its public key or its certificate). The receiver needs to possess two things in order to decrypt the ciphertext. The first thing is his/her secret key stored in the computer. The second thing is a unique personal security device which connects to the computer. It is impossible …


Cloud Computing Adoption Decision Modelling For Smes: From The Paprika Perspective, Salim Al Isma'ili, Mengxiang Li, Jun Shen Jan 2016

Cloud Computing Adoption Decision Modelling For Smes: From The Paprika Perspective, Salim Al Isma'ili, Mengxiang Li, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

The popularity of cloud computing has been growing among enter-prises since its inception. It is an emerging technology which promises competi-tive advantages, significant cost savings, enhanced business processes and ser-vices, and various other benefits. The aim of this paper is to propose a decision modelling using Potentially All Pairwise RanKings of all possible Alternatives (PAPRIKA) for the factors that have impact in SMEs cloud computing adoption process.


Cloud Computing Adoption Decision Modelling For Smes: A Conjoint Analysis, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He Jan 2016

Cloud Computing Adoption Decision Modelling For Smes: A Conjoint Analysis, Salim Al Isma'ili, Mengxiang Li, Jun Shen, Qiang He

Faculty of Engineering and Information Sciences - Papers: Part A

Cloud computing is an emerging technology that promises competitive advantages, cost savings, enhanced business processes and services, and various other benefits to enterprises. Despite the rapid technological advancement, the adoption of cloud computing is still growing slowly among small and mediumsized enterprises (SMEs). This paper presents a model to support the decisionmaking process, using a multi-criteria decision method PAPRIKA for the socio-technical aspects influencing SMEs cloud adoption decision. Due to the multifaceted nature of the cloud computing adoption process, the evaluation of various cloud services and deployment models have become a major challenge. This paper presents a systematic approach to …


Mlaas: A Cloud System For Mobile Micro Learning In Mooc, Geng Sun, Tingru Cui, Shiping Chen, Wanwu Guo, Jun Shen Jan 2015

Mlaas: A Cloud System For Mobile Micro Learning In Mooc, Geng Sun, Tingru Cui, Shiping Chen, Wanwu Guo, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

No abstract provided.


Enhancing Teamwork Performance In Mobile Cloud-Based Learning, Geng Sun, Jun Shen Jan 2015

Enhancing Teamwork Performance In Mobile Cloud-Based Learning, Geng Sun, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

Mobile cloud-based learning is a novel trend that allows collaborative learning to happen among distributed learners, but it still lacks of mechanisms to enhance teamwork performance. Combining the features of the cloud, we have identified a learning flow based on Kolb team learning experience, executed by cloud-hosting learning management systems in conjunction with our newly designed system, 'Teamwork as a Service (TaaS)'. Each of TaaS's five web services aims to organize a certain type of learning activities, providing learners with an introduction, a 'jigsaw classroom', schedule planning, and mutual supervision during the whole collaborative learning process. In particular, enabling a …


File Sharing In Cloud Computing Using Win Stay Lose Shift Strategy, Yilei Wang, Willy Susilo, Tao Li, Qiuliang Xu Jan 2015

File Sharing In Cloud Computing Using Win Stay Lose Shift Strategy, Yilei Wang, Willy Susilo, Tao Li, Qiuliang Xu

Faculty of Engineering and Information Sciences - Papers: Part A

Traditionally, users in clouds are assumed to be willing to store and share files in clouds, where the security and efficiency issues are discussed. However, few studies involve the incentives to share files in clouds. In this paper, we delve into users' incentives for using the cloud system to store and share their files towards the view of game theory. More specifically, the process of file sharing is reduced to an infinitely repeated prisoner's dilemma PD game and the action of sharing files in clouds is considered as the action of cooperation in the infinitely repeated PD game. We incorporate …


Searchable Atribute-Based Mechanism With Efficiient Data Sharing For Secure Cloud Storage, Kaitai Liang, Willy Susilo Jan 2015

Searchable Atribute-Based Mechanism With Efficiient Data Sharing For Secure Cloud Storage, Kaitai Liang, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

To date, the growth of electronic personal data leads to a trend that data owners prefer to remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and storage service without worrying the burden of local data management and maintenance. However, secure share and search for the outsourced data is a formidable task, which may easily incur the leakage of sensitive personal information. Efficient data sharing and searching with security is of critical importance. This paper, for the first time, proposes a searchable attribute-based proxy re-encryption system. When compared to existing systems only supporting either searchable attribute-based …


Collaborative Learning Through Taas: A Mobile System For Courses Over The Cloud, Geng Sun, Jun Shen Jan 2014

Collaborative Learning Through Taas: A Mobile System For Courses Over The Cloud, Geng Sun, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

As mobile cloud-based learning gain wide acceptance, learners engaged in online courses have more opportunities to participate in virtual teams. In this paper we present a new system, Teamwork as a Service (TaaS), which is service-oriented and emphasizes on building a smart collaborative learning context in conjunction with cloudhosting learning management systems (LMSs). Each of the five services of TaaS aims to organize a certain type of refined learning activities, so as to join together to facilitate the whole collaborative learning process. The implementation details of TaaS are demonstrated, and some typical user interfaces (UIs) are illustrated about how TaaS …


Agile Enterprise Architecture: A Case Of A Cloud Technology-Enabled Government Enterprise Transformation, Asif Qumer Gill, Steven Smith, Ghassan Beydoun, Vijayan Sugumaran Jan 2014

Agile Enterprise Architecture: A Case Of A Cloud Technology-Enabled Government Enterprise Transformation, Asif Qumer Gill, Steven Smith, Ghassan Beydoun, Vijayan Sugumaran

Faculty of Engineering and Information Sciences - Papers: Part A

Australian government enterprises have shown a significant interest in the cloud technology-enabled enterprise transformation. Australian government suggests the whole-of-a-government strategy to cloud adoption. The challenge is how best to realise this cloud adoption strategy for the cloud technology-enabled enterprise transformation? The cloud adoption strategy realisation requires concrete guidelines and a comprehensive practical framework. This paper proposes the use of an agile enterprise architecture framework to developing and implementing the adaptive cloud technology-enabled enterprise architecture in the Australian government context. The results of this paper indicate that a holistic strategic agile enterprise architecture approach seems appropriate to support the strategic whole-of-a-government …


An Adaptively Cca-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption For Cloud Data Sharing, Kaitai Liang, Man Ho Au, Willy Susilo, Duncan Wong, Guomin Yang, Yong Yu Jan 2014

An Adaptively Cca-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption For Cloud Data Sharing, Kaitai Liang, Man Ho Au, Willy Susilo, Duncan Wong, Guomin Yang, Yong Yu

Faculty of Engineering and Information Sciences - Papers: Part A

A Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) employs the PRE technology in the attribute-based en- cryption cryptographic setting, in which the proxy is allowed to convert an encryption under an access policy to another encryption under a new access policy. CP-ABPRE is applicable to many real world applications, such as network data sharing. The existing CP-ABPRE systems, how- ever, leave how to achieve adaptive CCA security as an interesting open problem. This paper, for the rst time, proposes a new CP-ABPRE to tackle the problem by integrating the dual system encryption technology with selective proof technique. The new scheme supports any …


K-Times Attribute-Based Anonymous Access Control For Cloud Computing, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou Jan 2014

K-Times Attribute-Based Anonymous Access Control For Cloud Computing, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a k-times limit for anonymous access control. That is, the server may limit a particular set of users (i.e., those users with the same set of attribute) to access the system for a maximum k-times within a period …


Enhanced Privacy Of A Remote Data Integrity-Checking Protocol For Secure Cloud Storage, Yong Yu, Man Ho Au, Yi Mu, S Tang, J Ren, Willy Susilo, Liju Dong Jan 2014

Enhanced Privacy Of A Remote Data Integrity-Checking Protocol For Secure Cloud Storage, Yong Yu, Man Ho Au, Yi Mu, S Tang, J Ren, Willy Susilo, Liju Dong

Faculty of Engineering and Information Sciences - Papers: Part A

Remote data integrity checking (RDIC) enables a server to prove to an auditor the integrity of a stored file. It is a useful technology for remote storage such as cloud storage. The auditor could be a party other than the data owner; hence, an RDIC proof is based usually on publicly available information. To capture the need of data privacy against an untrusted auditor, Hao et al. formally defined "privacy against third party verifiers" as one of the security requirements and proposed a protocol satisfying this definition. However, we observe that all existing protocols with public verifiability supporting data update, …


On The Security Of Auditing Mechanisms For Secure Cloud Storage, Yong Yu, Lei Niu, Guomin Yang, Yi Mu, Willy Susilo Jan 2014

On The Security Of Auditing Mechanisms For Secure Cloud Storage, Yong Yu, Lei Niu, Guomin Yang, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism. We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data …


A Novel Approach For Ramp-Rate Control Of Solar Pv Using Energy Storage To Mitigate Output Fluctuations Caused By Cloud Passing, M J. E Alam, K M. Muttaqi, D Sutanto Jan 2014

A Novel Approach For Ramp-Rate Control Of Solar Pv Using Energy Storage To Mitigate Output Fluctuations Caused By Cloud Passing, M J. E Alam, K M. Muttaqi, D Sutanto

Faculty of Engineering and Information Sciences - Papers: Part A

The variability of solar irradiance with a high ramp-rate, caused by cloud passing, can create fluctuation in the PV output. In a weak distribution grid with a high PV penetration, this can create significant voltage fluctuations. Energy storage devices are used to smooth out the fluctuation using traditional moving average control. However, moving average does not control the ramp-rate directly; rather the ramp-rate depends on previous values of PV output. This paper proposes a strategy where the ramp-rate of PV panel output is used to control the PV inverter ramp-rate to a desired level by deploying energy storage (which can …


Attribute-Based Data Transfer With Filtering Scheme In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Jan 2014

Attribute-Based Data Transfer With Filtering Scheme In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Faculty of Engineering and Information Sciences - Papers: Part A

Data transfer is a transmission of data over a point-to-point or point-to-multipoint communication channel. To protect the confidentiality of the transferred data, public-key cryptography has been introduced in data transfer schemes (DTSs). Data transfer is a transmission of data over a point-to-point or point-to-multipoint communication channel. To protect the confidentiality of the transferred data, public-key cryptography has been introduced in data transfer schemes (DTSs). Unfortunately, there exist some drawbacks in the current DTSs. First, the sender must know who the real receivers are. This is undesirable in a system where the number of the users is very large, such as …


Feasibility Study On The Implementation Of Ieee 802.11 On Cloud-Based Radio Over Fibre Architecture, Sen Zhang, Daniel Franklin Jan 2014

Feasibility Study On The Implementation Of Ieee 802.11 On Cloud-Based Radio Over Fibre Architecture, Sen Zhang, Daniel Franklin

Faculty of Engineering and Information Sciences - Papers: Part A

This paper investigates the throughput performance of the IEEE 802.11 MAC when the physical layer is implemented remotely on a cloud-based SDR platform. An analytical model which considers a non-zero late ACK arrival probability is proposed to analyse throughput performance. Both conventional DCF and the Block ACK enhancement from current IEEE 802.11 standards are analysed using the proposed model. Results show that the network delay variance significantly degrades the performance of conventional DCF while enabling Block ACK significantly reduces this degradation.


A High Performance Peer To Cloud And Peer Model Augmented With Hierarchical Secure Communications, Zhe Sun, Jun Shen Jan 2013

A High Performance Peer To Cloud And Peer Model Augmented With Hierarchical Secure Communications, Zhe Sun, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents a secure storage model named Peer to Cloud and Peer (P2CP). P2CP uses the cloud storage system as a backbone storage system. However, when data transmission occurs, the data nodes, cloud user, and the non-cloud user are involved to complete the transaction all together. The users, typically the client peers, can communicate with each other directly, thus bypassing servers on the cloud. Similarly, cloud servers can communicate with each other in a P2P mode. We also introduce a "hierarchy security" method to guarantee the data security in the proposed P2CP storage model. A key feature of our …


Evaluations Of Heuristic Algorithms For Teamwork-Enhanced Task Allocation In Mobile Cloud-Based Learning, Geng Sun, Jun Shen, Junzhou Luo, Jianming Yong Jan 2013

Evaluations Of Heuristic Algorithms For Teamwork-Enhanced Task Allocation In Mobile Cloud-Based Learning, Geng Sun, Jun Shen, Junzhou Luo, Jianming Yong

Faculty of Engineering and Information Sciences - Papers: Part A

Enhancing teamwork performance is a significant issue in mobile cloud-based learning. We introduce a service oriented system, Teamwork as a Service (TaaS), to realize a new approach for enhancing teamwork performance in the mobile cloud environment. To coordinate most learners' talents and give them more motivation, an appropriate task allocation is necessary. Utilizing the Kolb's learning style (KLS) to refine learner's capabilities, and combining their preferences and tasks' difficulties, we formally describe this problem as a constraint optimization model. Two heuristic algorithms, namely genetic algorithm (GA) and simulated annealing (SA), are employed to tackle the teamwork-enhanced task allocation, and their …


Teamwork As A Service: A Cloud-Based System For Enhancing Teamwork Performance In Mobile Learning, Geng Sun, Jun Shen Jan 2013

Teamwork As A Service: A Cloud-Based System For Enhancing Teamwork Performance In Mobile Learning, Geng Sun, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

Although cloud computing helps learners to access online learning content through commonly used devices, it can be difficult to collaborate in the mobile environment. We develop a service-oriented system, ‘Teamwork as a Service’ (TaaS), to facilitate learners’ team learning activities. The five main services of TaaS facilitate a teamwork-enhanced learning flow associated with the theory of Kolb’s team learning experience, providing learners with an introduction, a ‘jigsaw classroom’, schedule planning, and mutual supervision during the whole process. Specifically, TaaS enables a rational grouping mechanism that allocates learners to their appropriate tasks in order to give their best performance. TaaS is …


Facilitating Collaborative Learning In Taas: A Mobile Cloud System For Enhancing Teamwork Performance, Geng Sun, Jun Shen Jan 2013

Facilitating Collaborative Learning In Taas: A Mobile Cloud System For Enhancing Teamwork Performance, Geng Sun, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

Mobile cloud-based learning is a novel trend that brings many advantages to distributed learners to achieve collaborative learning, but it still lacks of mechanisms to enhance their teamwork performances. To make up that shortcoming, combining the features of cloud environment, we have identified a learning flow, a specification of workflow, based on Kolb team learning experience. This novel learning flow can be executed by our newly designed system, Teamwork as a Service (TaaS), in conjunction with cloud-hosting learning management systems, following which learners benefit from functions given by cloudbased services, separately for organizing cloud jigsaw classroom, planning and publishing tasks, …


A Personalized Hybrid Recommendation System Oriented To E-Commerce Mass Data In The Cloud, Fang Dong, Junzhou Luo, Xia Zhu, Yuxiang Wang, Jun Shen Jan 2013

A Personalized Hybrid Recommendation System Oriented To E-Commerce Mass Data In The Cloud, Fang Dong, Junzhou Luo, Xia Zhu, Yuxiang Wang, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

Personalized recommendation technology in Ecommerce is widespread to solve the problem of product information overload. However, with the further growth of the number of E-commerce users and products, the original recommendation algorithms and systems will face several new challenges: (1) to model user’s interests more accurately; (2) to provide more diverse recommendation modes; and (3) to support large-scale expansion. To address these challenges, from the actual demands of E-commerce applications (as Made-in-China website), a personalized hybrid recommendation system, which can support massive data set, is designed and implemented in this paper by using Cloud technology. Hereinto, the recommendation algorithms are …