Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2017

Cloud computing

Discipline
Institution
Publication

Articles 1 - 14 of 14

Full-Text Articles in Entire DC Network

Data Access In Multiauthority Cloud Storage: Expressive And Revocable Data Control System, Rajender Bhavika Pooja Gandi Dec 2017

Data Access In Multiauthority Cloud Storage: Expressive And Revocable Data Control System, Rajender Bhavika Pooja Gandi

Culminating Projects in Information Assurance

ABSTRACT

Cloud computing is rising enormously due to its advantages and the adaptable storage services being provided by it. Because of this, the number of users has reached the top level. The users will share the sensitive data through the cloud. Furthermore, the user can't trust the untrusted cloud server. Subsequently, the data access control has turned out to be extremely challenging in cloud storage framework. In existing work, revocable data access control scheme proposed for multi-authority cloud storage frameworks which supports the access control in light of the authority control. The authorized users who have desirable attributes given by …


Security Evaluation Of Virtualized Computing Platforms, Ganesh Reddy Gunnam Dec 2017

Security Evaluation Of Virtualized Computing Platforms, Ganesh Reddy Gunnam

Theses and Dissertations

In this thesis, security experiments were conducted to evaluate embedded security protocol performance of two leading server operating systems, Apple’s MAC OS server LION Vs. Microsoft’s Windows server 2012 R2 OS under different types of security attack. Furthermore, experiments were conducted to understand and evaluate the effect of virtualization using Hyper-V with Windows 2012 R2 OS on MAC hardware platform. For these experiments, connection rate, connection latency, non-paged pool allocations and processor core utilization for different OS, virtual machines, and under different traffic types were measured.


Accelerating Homomorphic Encryption In The Cloud Environment Through High-Level Synthesis And Reconfigurable Resources, Michael J. Foster Nov 2017

Accelerating Homomorphic Encryption In The Cloud Environment Through High-Level Synthesis And Reconfigurable Resources, Michael J. Foster

Theses

The recent surge in cloud services is revolutionizing the way that data is stored and processed. Everyone with an internet connection, from large corporations to small companies and private individuals, now have access to cutting-edge processing power and vast amounts of data storage. This rise in cloud computing and storage, however, has brought with it a need for a new type of security. In order to have access to cloud services, users must allow the service provider to have full access to their private, unencrypted data. Users are required to trust the integrity of the service provider and the security …


Enforcing Database Security On Cloud Using A Trusted Third Party Based Model, Victor Fuentes Tello Aug 2017

Enforcing Database Security On Cloud Using A Trusted Third Party Based Model, Victor Fuentes Tello

Graduate Theses and Dissertations

Cloud computing offers a considerable number of advantages to clients and organizations that use several capabilities to store sensitive data, interact with applications, or use technology infrastructure to perform daily activities. The development of new models in cloud computing brings with it a series of elements that must be considered by companies, particularly when the sensitive data needs to be protected. There are some concerns related to security that need to be taken into consideration when a service provider manage and store the data in a location outside the company. In this research, a model that uses a trusted third …


Performance Optimization And Energy Efficiency Of Big-Data Computing Workflows, Tong Shu Jul 2017

Performance Optimization And Energy Efficiency Of Big-Data Computing Workflows, Tong Shu

Dissertations

Next-generation e-science is producing colossal amounts of data, now frequently termed as Big Data, on the order of terabyte at present and petabyte or even exabyte in the predictable future. These scientific applications typically feature data-intensive workflows comprised of moldable parallel computing jobs, such as MapReduce, with intricate inter-job dependencies. The granularity of task partitioning in each moldable job of such big data workflows has a significant impact on workflow completion time, energy consumption, and financial cost if executed in clouds, which remains largely unexplored. This dissertation conducts an in-depth investigation into the properties of moldable jobs and provides an …


Blend It Applications And Server, Rebecca Mckinley, Cory Mayer, Tyler Fox, Alex Bartlett, Aly Chapman Jun 2017

Blend It Applications And Server, Rebecca Mckinley, Cory Mayer, Tyler Fox, Alex Bartlett, Aly Chapman

Computer Engineering

No abstract provided.


Whiting-Turner Plangrid Implementation On Oakland Global Logistics Center: A Case Study, Alex J. Cain Jun 2017

Whiting-Turner Plangrid Implementation On Oakland Global Logistics Center: A Case Study, Alex J. Cain

Construction Management

As construction project complexity continues to rise, there will be an increasing importance placed on a company’s ability to manage project information. This management is aided by the use of project management information systems (PMIS). These systems are made up of applications that help managers track project progress from start to finish. Whiting-Turner uses the application Plangrid within their PMIS. This paper will explore how Whiting-Turner implements Plangrid on the currently being constructed Oakland Global Logistics Center. In addition, this paper will review the fundamental concepts behind a PMIS, the framework of mobile computing applications, and the features of leading …


A Pattern Language For Designing Application-Level Communication Protocols And The Improvement Of Computer Science Education Through Cloud Computing, Jorge Edison Lascano May 2017

A Pattern Language For Designing Application-Level Communication Protocols And The Improvement Of Computer Science Education Through Cloud Computing, Jorge Edison Lascano

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Enterprises that develop software use current technology because of its proven advantages and to accelerate and improve the software development process. Nevertheless, it is difficult to be up-to-date for most professionals in the area. Although students from higher academic institutions need to learn these new tools, and their main purpose is to learn how learn; colleges still need to prepare students for modern enterprise requirements, so they teach new technologies to improve students’ skills. Ubiquitous computing is software and services available everywhere, for example in mobile devices, in different locations, in different networks. This computing requires good communication protocols so …


Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal Apr 2017

Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal

Electronic Thesis and Dissertation Repository

Cloud computing is continuously growing as a business model for hosting information and communication technology applications. However, many concerns arise regarding the quality of service (QoS) offered by the cloud. One major challenge is the high availability (HA) of cloud-based applications. The key to achieving availability requirements is to develop an approach that is immune to cloud failures while minimizing the service level agreement (SLA) violations. To this end, this thesis addresses the HA of cloud-based applications from different perspectives. First, the thesis proposes a component’s HA-ware scheduler (CHASE) to manage the deployments of carrier-grade cloud applications while maximizing their …


Protecting Sensitive Data In Clouds Using Active Data Bundles And Agent-Based Secure Multi-Party Computation, Akram Y. Sarhan Apr 2017

Protecting Sensitive Data In Clouds Using Active Data Bundles And Agent-Based Secure Multi-Party Computation, Akram Y. Sarhan

Dissertations

Protection of data in cloud computing including distributed environments is a critical concern for many enterprises. This study proposes a solution that protects sensitive data outsourced to a cloud throughout their entire life cycle—both in the cloud as well as outside of the cloud (e.g., during transmission to or from the cloud). The solution enhances the existing data protection approach known as Active Bundle scheme, which uses a Trusted Third Party (ABTTP).

The Active Data Bundle (ADB) was formerly called an Active Bundle (AB). It is a software construct that encapsulates data, metadata, and a virtual machine (VM). The metadata …


A Multi-Perspective Framework For Modelling And Analysing The Determinants Of Cloud Computing Adoption Among Smes In Australia, Salim Zahir Al Isma'ili Jan 2017

A Multi-Perspective Framework For Modelling And Analysing The Determinants Of Cloud Computing Adoption Among Smes In Australia, Salim Zahir Al Isma'ili

University of Wollongong Thesis Collection 2017+

Cloud Computing (CC) is an emerging technology that can potentially revolutionise the application and delivery of IT. There has been little research, however, into the use of CC in Small and Medium-Sized Enterprises (SMEs). With all the promised benefits of cloud computing for cost-cutting, and its perceived advantages to businesses in focusing on their core business activities by outsourcing their IT capabilities to the cloud, the indicators show that CC has been adopted very slowly. Migration to CC has various challenges which go beyond the technology itself. There is also a significant research gap in the investigation of the adoption …


The Relationship Between Nonprofit Organizations And Cloud Adoption Concerns, Dana Haywood Jan 2017

The Relationship Between Nonprofit Organizations And Cloud Adoption Concerns, Dana Haywood

Walden Dissertations and Doctoral Studies

Many leaders of nonprofit organizations (NPOs) in the United States do not have plans to adopt cloud computing. However, the factors accounting for their decisions is not known. This correlational study used the extended unified theory of acceptance and use of technology (UTAUT2) to examine whether performance expectancy, effort expectancy, social influence, facilitating conditions, hedonic motivation, price value, and habit can predict behavioral intention (BI) and use behavior (UB) of NPO information technology (IT) managers towards adopting cloud computing within the Phoenix metropolitan area of Arizona of the U.S. An existing UTAUT2 survey instrument was used with a sample of …


Understanding Financial Value Of Cloud-Based Business Applications: A Phenomenological Study, Victor Arthur Arthur Jan 2017

Understanding Financial Value Of Cloud-Based Business Applications: A Phenomenological Study, Victor Arthur Arthur

Walden Dissertations and Doctoral Studies

An understanding of opportunities and challenges in cloud computing is needed to better manage technology costs and create financial value. The purposes of this transcendental phenomenological study were to understand the lived experiences of minority business owners who operated business applications in the cloud and to explore how these experiences created financial value for businesses despite security challenges. Historically, minority business owners have experienced high rates of business failures and could benefit from information to help them manage business costs in order to position their businesses to grow and succeed. Modigliani-Miller's theorem on capital structure and Brealey and Young's concept …


Decentralized Scheduling For Many-Task Applications In The Hybrid Cloud, Brian Lyle Peterson Jan 2017

Decentralized Scheduling For Many-Task Applications In The Hybrid Cloud, Brian Lyle Peterson

LSU Doctoral Dissertations

While Cloud Computing has transformed how we solve many computing tasks, some scientific and many-task applications are not efficiently executed on cloud resources. Decentralized scheduling, as studied in grid computing, can provide a scalable system to organize cloud resources and schedule a variety of work. By measuring simulations of two algorithms, the fully decentralized Organic Grid, and the partially decentralized Air Traffic Controller from IBM, we establish that decentralization is a workable approach, and that there are bottlenecks that can impact partially centralized algorithms. Through measurements in the cloud, we verify that our simulation approach is sound, and assess the …