Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

2023

Cloud computing

Discipline
Institution
Publication
Publication Type

Articles 1 - 18 of 18

Full-Text Articles in Entire DC Network

Librarian' Understanding, Perception, And Attitudes Regarding Cloud Computing In Academic Libraries Punjab, Pakistan: A Survey, Shahid Mehmood, Prof.Dr.Rais Ahmed Samdani, Muhammad Wahid Dec 2023

Librarian' Understanding, Perception, And Attitudes Regarding Cloud Computing In Academic Libraries Punjab, Pakistan: A Survey, Shahid Mehmood, Prof.Dr.Rais Ahmed Samdani, Muhammad Wahid

Library Philosophy and Practice (e-journal)

People who used the University of Sargodha library were asked what they thought about Cloud Computing for the study. The goal of this study was to find out more about how people feel about cloud computing in general and how well they understand it. There were both descriptive and quantitative methods used in the study. Over sixty-nine people were asked to take part in the study, and 65 were randomly picked from the census. The study used SPSS version 21 to turn table data with numbers into percentages and rates. Most people know what Cloud Computing is and how it …


The Degree Of Using Cloud Computing Applications In The E-Learning Environment And Its Obstacles For Secondary School Students In The Capital Amman Governorate From The Point View Of Their Teachers, Rehab Ibrahim, Fawaz Shehadeh Nov 2023

The Degree Of Using Cloud Computing Applications In The E-Learning Environment And Its Obstacles For Secondary School Students In The Capital Amman Governorate From The Point View Of Their Teachers, Rehab Ibrahim, Fawaz Shehadeh

Jordan Journal of Applied Science-Humanities Series

This study aimed to reveal the degree of use of cloud computing applications in the e-learning environment and the obstacles facing secondary school students in the Capital Governorate of Amman from the point of view of their teachers. The study adopted the descriptive survey method, and to collect data, a questionnaire was developed in the form of a scale consisting of (30) items, consisting of two parts, the first to measure the degree of use of cloud computing applications in the e-learning environment for secondary school students in the Amman governorate, and the second to measure the obstacles of cloud …


Privacy-Preserving Arbitrary Geometric Range Query In Mobile Internet Of Vehicles, Yinbin Miao, Lin Song, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng Nov 2023

Privacy-Preserving Arbitrary Geometric Range Query In Mobile Internet Of Vehicles, Yinbin Miao, Lin Song, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng

Research Collection School Of Computing and Information Systems

The mobile Internet of Vehicles (IoVs) has great potential for intelligent transportation, and creates spatial data query demands to realize the value of data. Outsourcing spatial data to a cloud server eliminates the need for local computation and storage, but it leads to data security and privacy threats caused by untrusted third-parties. Existing privacy-preserving spatial range query solutions based on Homomorphic Encryption (HE) have been developed to increase security. However, in the single server model, the private key is held by the query user, which incurs high computation and communication burdens on query users due to multiple rounds of interactions. …


Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman Nov 2023

Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman

Research outputs 2022 to 2026

Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, …


Dbscan Inspired Task Scheduling Algorithm For Cloud Infrastructure, S. M.F.D.Syed Mustapha, Punit Gupta Jul 2023

Dbscan Inspired Task Scheduling Algorithm For Cloud Infrastructure, S. M.F.D.Syed Mustapha, Punit Gupta

All Works

Cloud computing in today's computing environment plays a vital role, by providing efficient and scalable computation based on pay per use model. To make computing more reliable and efficient, it must be efficient, and high resources utilized. To improve resource utilization and efficiency in cloud, task scheduling and resource allocation plays a critical role. Many researchers have proposed algorithms to maximize the throughput and resource utilization taking into consideration heterogeneous cloud environments. This work proposes an algorithm using DBSCAN (Density-based spatial clustering) for task scheduling to achieve high efficiency. The proposed DBScan-based task scheduling algorithm aims to improve user task …


How To Resuscitate A Sick Vm In The Cloud, Xuhua Ding Jun 2023

How To Resuscitate A Sick Vm In The Cloud, Xuhua Ding

Research Collection School Of Computing and Information Systems

A guest virtual machine in a cloud platform may fall “sick” when its kernel encounters a fatal low-level bug or is subverted by an adversary. The VM owner is hence likely to lose her control over it due to a kernel hang or being denied of remote accesses. While the VM can be rebooted with the assistance from the cloud server, the owner not only faces service disruption but also is left with no opportunity to make an in-depth diagnosis and forensics on the spot, not to mention a live rectification. Currently, the cloud service provider has neither incentive nor …


Are You Cloud-Certified? Preparing Computing Undergraduates For Cloud Certification With Experiential Learning, Eng Lieh Ouh, Benjamin Gan May 2023

Are You Cloud-Certified? Preparing Computing Undergraduates For Cloud Certification With Experiential Learning, Eng Lieh Ouh, Benjamin Gan

Research Collection School Of Computing and Information Systems

Cloud Computing skills have been increasing in demand. Many software engineers are learning these skills and taking cloud certification examinations to be job competitive. Preparing undergraduates to be cloud-certified remains challenging as cloud computing is a relatively new topic in the computing curriculum, and many of these certifications require working experience. In this paper, we report our experiences designing a course with experiential learning to prepare our computing undergraduates to take the cloud certification. We adopt a university project-based experiential learning framework to engage industry partners who provide project requirements for students to develop cloud solutions and an experiential risk …


Determinants Of Cloud Computing Integration And Its Impact On Sustainable Performance In Smes: An Empirical Investigation Using The Sem-Ann Approach, Mohammed A. Al-Sharafi, Mohammad Iranmanesh, Mostafa Al-Emran, Ahmed I. Alzahrani, Fadi Herzallah, Norziana Jamil May 2023

Determinants Of Cloud Computing Integration And Its Impact On Sustainable Performance In Smes: An Empirical Investigation Using The Sem-Ann Approach, Mohammed A. Al-Sharafi, Mohammad Iranmanesh, Mostafa Al-Emran, Ahmed I. Alzahrani, Fadi Herzallah, Norziana Jamil

Research outputs 2022 to 2026

Although extant literature has thoroughly investigated the incorporation of cloud computing services, examining their influence on sustainable performance, particularly at the organizational level, is insufficient. Consequently, the present research aims to assess the factors that impact the integration of cloud computing within small and medium-sized enterprises (SMEs) and its subsequent effects on environmental, financial, and social performance. The data were collected from 415 SMEs and were analyzed using a hybrid SEM-ANN approach. PLS-SEM results indicate that relative advantage, complexity, compatibility, top management support, cost reduction, and government support significantly affect cloud computing integration. This study also empirically demonstrated that SMEs …


Calculation Of Optimal Vocs Emission Reduction Based On Improved Seirs Model In Cloud Environment, Guangqiu Huang, Xixuan Zhao, Qiuqin Lu Mar 2023

Calculation Of Optimal Vocs Emission Reduction Based On Improved Seirs Model In Cloud Environment, Guangqiu Huang, Xixuan Zhao, Qiuqin Lu

Journal of System Simulation

Abstract: Volatile organic compounds (VOCs) emissions in different regions are correlated and influenced. In order to minimize the impact of VOCs on the atmospheric environment and achieve synergistic governance of VOCs regions, an optimal emission reduction model is established with the maximum VOCs emission reduction as the primary goal. An improved SEIRS infectious disease dynamics optimization algorithm considering environmental pollution(SEIRS-CE) is proposed and the model is solved in cloud environment. Taking Xi'an city as an example, the SEIRS-CE algorithm is used in Ali cloud server to calculate the emission reduction of VOCs associated with 13 meteorological monitoring stations in Xi …


Cognitive Software Defined Networking And Network Function Virtualization And Applications, Sachin Sharma, Avishek Nag Feb 2023

Cognitive Software Defined Networking And Network Function Virtualization And Applications, Sachin Sharma, Avishek Nag

Articles

The emergence of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) has revolutionized the Internet. Using SDN, network devices can be controlled from a centralized, programmable control plane that is decoupled from their data plane, whereas with NFV, network functions (such as network address translation, firewall, and intrusion detection) can be virtualized instead of being implemented on proprietary hardware. In addition, Artificial Intelligence (AI) and Machine Learning (ML) techniques will be key to automating network operations and enhancing customer service. Many of the challenges behind SDN and NFV are currently being investigated in several projects all over the world using …


Development Opportunities And Application Prospects Of Aero-Engine Simulation Technology Under Digital Transformation, Jianguo Cao Jan 2023

Development Opportunities And Application Prospects Of Aero-Engine Simulation Technology Under Digital Transformation, Jianguo Cao

Journal of System Simulation

Abstract: The development of China's social economy and the improvement of its national defense capability in the new era put forward higher requirements for the development of aero-engines. It is urgent to promote the digital transformation of aero-engines in order to achieve coordinated, agile and efficient aero-engine development. Based on the current research and development of aero-engine in China, this paper clarifies the new connotation of "speediness and efficiency, accurate mapping, comprehensive coverage, and dynamic prediction" given by the development of emerging cutting-edge technologies to aero-engine simulation technology, as well as the new technical features of "spatio-temporal ubiquity, data driven, …


The Evolution Of The Chief Technology Officer And The Modernization Of Technology In Education, Brian Skibinski Jan 2023

The Evolution Of The Chief Technology Officer And The Modernization Of Technology In Education, Brian Skibinski

All Student Theses

The role of technology in education has changed dramatically over the past 20 years. From the advent of individual workstations to networked labs to one-to-one technologies, computers have transformed how teachers and students consume information. School districts today support hundreds if not thousands of devices and end users. Technology supports mission critical systems like financial, human resources, library, and student information systems and ensures they are integrating rostering information to numerous third-party programs like Clever, Classlink or textbook specific websites. They also support the district operations as well by assisting in or managing building automation controls which can include lighting, …


Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets, Sourav Kanti Addya, Anurag Satpathy, Bishakh Chandra Ghosh, Sandip Chakraborty, Soumya K. Ghosh, Sajal K. Das Jan 2023

Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets, Sourav Kanti Addya, Anurag Satpathy, Bishakh Chandra Ghosh, Sandip Chakraborty, Soumya K. Ghosh, Sajal K. Das

Computer Science Faculty Research & Creative Works

Virtual machine (VM) migration enables cloud service providers (CSPs) to balance workload, perform zero-downtime maintenance, and reduce applications' power consumption and response time. Migrating a VM consumes energy at the source, destination, and backbone networks, i.e., intermediate routers and switches, especially in a Geo-distributed setting. In this context, we propose a VM migration model called Low Energy Application Workload Migration (LEAWM) aimed at reducing the per-bit migration cost in migrating VMs over Geo-distributed clouds. With a Geo-distributed cloud connected through multiple Internet Service Providers (ISPs), we develop an approach to find out the migration path across ISPs leading to the …


Reks: Role-Based Encrypted Keyword Search With Enhanced Access Control For Outsourced Cloud Data, Yibin Miao, Feng Li, Xiaohua Jia, Huaxiong Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng Jan 2023

Reks: Role-Based Encrypted Keyword Search With Enhanced Access Control For Outsourced Cloud Data, Yibin Miao, Feng Li, Xiaohua Jia, Huaxiong Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng

Research Collection School Of Computing and Information Systems

Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly …


Enhanced Load Balancing Based On Hybrid Artificial Bee Colony With Enhanced Β-Hill Climbing In Cloud, Maha Zeedan, Gamal Attiya, Nawal El-Fishawy Jan 2023

Enhanced Load Balancing Based On Hybrid Artificial Bee Colony With Enhanced Β-Hill Climbing In Cloud, Maha Zeedan, Gamal Attiya, Nawal El-Fishawy

Mansoura Engineering Journal

This paper proposes enhanced load balancer based artificial bee colony and β-Hill climbing for improving the performance metrics such as response time, processing cost, and utilization to avoid overloaded or under loaded situations of virtual machines. In this study, the suggested load balancer is called enhanced load balancing based on hybrid artificial bee colony with enhanced β-Hill climbing (ELBABCEβHC) to improve the response time, processing cost and the resource utilization. Our proposed approach starts by ranking the task then the greedy randomized adaptive search procedure (GRASP) is used in initializing populations. Further, the binary artificial bee colony (BABC) enhanced with …


Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty Jan 2023

Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty

VMASC Publications

The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages. However, in this section, the data is much more vulnerable than others, because the data is strictly private and confidential, and it requires a highly secured framework for the transmission of data between entities. In this article, we aim to design a blockchain-envisioned authentication and key management mechanism for the IoMT-based smart healthcare applications (in short, we call it SBAKM-HS). We compare the various …


Large Scale Data Transfers In Cloud-Based Systems, Uday Kumar Bommala Jan 2023

Large Scale Data Transfers In Cloud-Based Systems, Uday Kumar Bommala

Theses

My dissertation focuses on developing a High-performance, Scalable, and Efficient Data Transfer Framework with Configurable and Extensible Features. The exponential growth of high-volume data poses collaboration challenges for big data providers, particularly in global-scale scientific research. The Earth’s scientific sector experiences an ongoing trend of increasing temporal and spatial data resolution, resulting in massive data archives at organizations like NASA, ESA, and JAXA. To facilitate efficient scientific study with partner agencies worldwide, data transfer solutions must handle this vast data volume across platforms at reasonable costs. The dissertation proposes a 3-phase approach (Analysis, Evaluation, and Implementation) to address the implementation …


The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi Jan 2023

The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi

Information Technology & Decision Sciences Faculty Publications

[First paragraph] Enterprise information systems (EIS) have been important enablers of crossfunctional processes within businesses since the 1990s. Often referred to as enterprise resource planning (ERP) systems, they were extended in line with electronic businesses to integrate with suppliers as well as customers. Today, EIS architectures comprise not only ERP, supply chain, and customer relationship management systems, but also business intelligence and analytics. Recently, the move towards decentralized technologies has created new perspectives for EIS. Information systems (IS) research has already addressed opportunities and challenges of these developments quite well, but what will be the pressing opportunities and challenges for …