Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Cloud computing

Discipline
Institution
Publication
Publication Type

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

A Survey Of Security And Privacy Challenges In Cloud Computing: Solutions And Future Directions, Yuhong Liu, Yan Lindsay Sun, Jungwoo Ryoo, Athanasios V. Vasilakos Sep 2015

A Survey Of Security And Privacy Challenges In Cloud Computing: Solutions And Future Directions, Yuhong Liu, Yan Lindsay Sun, Jungwoo Ryoo, Athanasios V. Vasilakos

Computer Science and Engineering

While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision directions for future research. In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research directions.


Elastic Highly Available Cloud Computing, Hassan Hawilo Aug 2015

Elastic Highly Available Cloud Computing, Hassan Hawilo

Electronic Thesis and Dissertation Repository

High availability and elasticity are two the cloud computing services technical features. Elasticity is a key feature of cloud computing where provisioning of resources is closely tied to the runtime demand. High availability assure that cloud applications are resilient to failures. Existing cloud solutions focus on providing both features at the level of the virtual resource through virtual machines by managing their restart, addition, and removal as needed. These existing solutions map applications to a specific design, which is not suitable for many applications especially virtualized telecommunication applications that are required to meet carrier grade standards. Carrier grade applications typically …


Development Of A Web Application For Continuous Analysis Of Many Cameras (Cam2), Anurag Anjaria, Dr. Yung-Hsiang Lu, Young-Sol Koh, Charles Hansen Aug 2015

Development Of A Web Application For Continuous Analysis Of Many Cameras (Cam2), Anurag Anjaria, Dr. Yung-Hsiang Lu, Young-Sol Koh, Charles Hansen

The Summer Undergraduate Research Fellowship (SURF) Symposium

There are tens of thousands of web cameras located around the world and publicly available on the Internet. The images captured by these cameras contain data relating to our living environment such as traffic patterns, weather and crowd movement. Researchers can capture this data using image analysis techniques on the video and image from these cameras. However, there is a lack of a single, unified repository of all the public cameras on the Internet; this, coupled with the computational demands of image analysis means there is a need for a tool to help researchers perform large-scale image analyis on many …


Data Security And Privacy In Smart Grid, Yue Tong Aug 2015

Data Security And Privacy In Smart Grid, Yue Tong

Doctoral Dissertations

This dissertation explores novel data security and privacy problems in the emerging smart grid.

The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is …


Mobile Cloud Computing Based Non Rigid Registration For Image Guided Surgery, Arun Brahmavar Vishwanatha Aug 2015

Mobile Cloud Computing Based Non Rigid Registration For Image Guided Surgery, Arun Brahmavar Vishwanatha

Computer Science Theses & Dissertations

In this thesis we present the design and implementation of a Mobile Cloud computing platform for non-rigid registration required in Image Guided Surgery (MCIGS). MCIGS contributes in flexible, portable and accurate alignment of pre-operative brain data with intra-operative MRI, for image guided diagnosis and therapy and endoscopic skull base surgery. Improved precision of image guided therapy and specifically neurosurgery procedures is known to result in the improved prognosis for brain tumor patients. MCI GS system is tested with Physics Based Non-Rigid Registration method form ITK. Our preliminary results for brain images indicate that the proposed system over Wi-Fi can be …


Maturity Of Cloud Application Interoperability Frameworks For Small To Medium Enterprises, John Warde May 2015

Maturity Of Cloud Application Interoperability Frameworks For Small To Medium Enterprises, John Warde

Dissertations

Cloud computing has many benefits and organisations have bought into the cost effective and elastic solutions provided by major players in the market. However, cloud computing and Cloud Service Providers (CSP) are still evolving, hence there are differences in how customers connect with each provider to the orchestrate application lifecycle management. A lack of standards can create vendor lock-in. This work investigates current research and possible solutions to the vendor lock-in problem through the use of Cloud Interoperability or multi-cloud frameworks. Software developers and organisations can use these frameworks which abstract the differences between CSPs and mitigate vendor lock-in. A …


Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz May 2015

Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz

Wilson A Higashino

: Advances in Web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This work focuses on the storage aspect of cloud computing, specifically on data management in cloud environments. Traditional relational databases were designed in a different hardware and software era and are facing challenges in meeting the performance and scale requirements of Big Data. NoSQL and NewSQL data stores present themselves as alternatives that can handle huge volume of data. Because of the …


Data Integrity Verification In Cloud Computing, Katanosh Morovat May 2015

Data Integrity Verification In Cloud Computing, Katanosh Morovat

Graduate Theses and Dissertations

Cloud computing is an architecture model which provides computing and storage capacity as a service over the internet. Cloud computing should provide secure services for users and owners of data as well. Cloud computing services are a completely internet-based technology where data are stored and maintained in the data center of a cloud provider. Lack of appropriate control over the data might incur several security issues. As a result, some data stored in the cloud must be protected at all times. These types of data are called sensitive data. Sensitive data is defined as data that must be protected against …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally Apr 2015

Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally

Information Science Faculty Publications

Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …


Synthesis Of Real-Time Cloud Applications For Internet Of Things, Slawomir Bak, Radoslaw Czarnecki, Stanislaw Deniziak Jan 2015

Synthesis Of Real-Time Cloud Applications For Internet Of Things, Slawomir Bak, Radoslaw Czarnecki, Stanislaw Deniziak

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents the methodology for the synthesis of real-time applications working in the ``Internet of Things'' environment. We propose the client-server architecture, where embedded systems act as smart clients and the Internet application is a server of the system. The architecture of the application conforms to the cloud computing model. Since centralized systems are prone to bottlenecks caused by accumulation of transmissions or computations, we propose the distributed architecture of the server and the methodology that constructs this architecture using Internet resources supported by a cloud provider. We assume that the function of the server is specified as a …