Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Cloud computing

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 531

Full-Text Articles in Entire DC Network

Librarian' Understanding, Perception, And Attitudes Regarding Cloud Computing In Academic Libraries Punjab, Pakistan: A Survey, Shahid Mehmood, Prof.Dr.Rais Ahmed Samdani, Muhammad Wahid Dec 2023

Librarian' Understanding, Perception, And Attitudes Regarding Cloud Computing In Academic Libraries Punjab, Pakistan: A Survey, Shahid Mehmood, Prof.Dr.Rais Ahmed Samdani, Muhammad Wahid

Library Philosophy and Practice (e-journal)

People who used the University of Sargodha library were asked what they thought about Cloud Computing for the study. The goal of this study was to find out more about how people feel about cloud computing in general and how well they understand it. There were both descriptive and quantitative methods used in the study. Over sixty-nine people were asked to take part in the study, and 65 were randomly picked from the census. The study used SPSS version 21 to turn table data with numbers into percentages and rates. Most people know what Cloud Computing is and how it …


The Degree Of Using Cloud Computing Applications In The E-Learning Environment And Its Obstacles For Secondary School Students In The Capital Amman Governorate From The Point View Of Their Teachers, Rehab Ibrahim, Fawaz Shehadeh Nov 2023

The Degree Of Using Cloud Computing Applications In The E-Learning Environment And Its Obstacles For Secondary School Students In The Capital Amman Governorate From The Point View Of Their Teachers, Rehab Ibrahim, Fawaz Shehadeh

Jordan Journal of Applied Science-Humanities Series

This study aimed to reveal the degree of use of cloud computing applications in the e-learning environment and the obstacles facing secondary school students in the Capital Governorate of Amman from the point of view of their teachers. The study adopted the descriptive survey method, and to collect data, a questionnaire was developed in the form of a scale consisting of (30) items, consisting of two parts, the first to measure the degree of use of cloud computing applications in the e-learning environment for secondary school students in the Amman governorate, and the second to measure the obstacles of cloud …


Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman Nov 2023

Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman

Research outputs 2022 to 2026

Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, …


Privacy-Preserving Arbitrary Geometric Range Query In Mobile Internet Of Vehicles, Yinbin Miao, Lin Song, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng Nov 2023

Privacy-Preserving Arbitrary Geometric Range Query In Mobile Internet Of Vehicles, Yinbin Miao, Lin Song, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng

Research Collection School Of Computing and Information Systems

The mobile Internet of Vehicles (IoVs) has great potential for intelligent transportation, and creates spatial data query demands to realize the value of data. Outsourcing spatial data to a cloud server eliminates the need for local computation and storage, but it leads to data security and privacy threats caused by untrusted third-parties. Existing privacy-preserving spatial range query solutions based on Homomorphic Encryption (HE) have been developed to increase security. However, in the single server model, the private key is held by the query user, which incurs high computation and communication burdens on query users due to multiple rounds of interactions. …


Dbscan Inspired Task Scheduling Algorithm For Cloud Infrastructure, S. M.F.D.Syed Mustapha, Punit Gupta Jul 2023

Dbscan Inspired Task Scheduling Algorithm For Cloud Infrastructure, S. M.F.D.Syed Mustapha, Punit Gupta

All Works

Cloud computing in today's computing environment plays a vital role, by providing efficient and scalable computation based on pay per use model. To make computing more reliable and efficient, it must be efficient, and high resources utilized. To improve resource utilization and efficiency in cloud, task scheduling and resource allocation plays a critical role. Many researchers have proposed algorithms to maximize the throughput and resource utilization taking into consideration heterogeneous cloud environments. This work proposes an algorithm using DBSCAN (Density-based spatial clustering) for task scheduling to achieve high efficiency. The proposed DBScan-based task scheduling algorithm aims to improve user task …


How To Resuscitate A Sick Vm In The Cloud, Xuhua Ding Jun 2023

How To Resuscitate A Sick Vm In The Cloud, Xuhua Ding

Research Collection School Of Computing and Information Systems

A guest virtual machine in a cloud platform may fall “sick” when its kernel encounters a fatal low-level bug or is subverted by an adversary. The VM owner is hence likely to lose her control over it due to a kernel hang or being denied of remote accesses. While the VM can be rebooted with the assistance from the cloud server, the owner not only faces service disruption but also is left with no opportunity to make an in-depth diagnosis and forensics on the spot, not to mention a live rectification. Currently, the cloud service provider has neither incentive nor …


Determinants Of Cloud Computing Integration And Its Impact On Sustainable Performance In Smes: An Empirical Investigation Using The Sem-Ann Approach, Mohammed A. Al-Sharafi, Mohammad Iranmanesh, Mostafa Al-Emran, Ahmed I. Alzahrani, Fadi Herzallah, Norziana Jamil May 2023

Determinants Of Cloud Computing Integration And Its Impact On Sustainable Performance In Smes: An Empirical Investigation Using The Sem-Ann Approach, Mohammed A. Al-Sharafi, Mohammad Iranmanesh, Mostafa Al-Emran, Ahmed I. Alzahrani, Fadi Herzallah, Norziana Jamil

Research outputs 2022 to 2026

Although extant literature has thoroughly investigated the incorporation of cloud computing services, examining their influence on sustainable performance, particularly at the organizational level, is insufficient. Consequently, the present research aims to assess the factors that impact the integration of cloud computing within small and medium-sized enterprises (SMEs) and its subsequent effects on environmental, financial, and social performance. The data were collected from 415 SMEs and were analyzed using a hybrid SEM-ANN approach. PLS-SEM results indicate that relative advantage, complexity, compatibility, top management support, cost reduction, and government support significantly affect cloud computing integration. This study also empirically demonstrated that SMEs …


Are You Cloud-Certified? Preparing Computing Undergraduates For Cloud Certification With Experiential Learning, Eng Lieh Ouh, Benjamin Gan May 2023

Are You Cloud-Certified? Preparing Computing Undergraduates For Cloud Certification With Experiential Learning, Eng Lieh Ouh, Benjamin Gan

Research Collection School Of Computing and Information Systems

Cloud Computing skills have been increasing in demand. Many software engineers are learning these skills and taking cloud certification examinations to be job competitive. Preparing undergraduates to be cloud-certified remains challenging as cloud computing is a relatively new topic in the computing curriculum, and many of these certifications require working experience. In this paper, we report our experiences designing a course with experiential learning to prepare our computing undergraduates to take the cloud certification. We adopt a university project-based experiential learning framework to engage industry partners who provide project requirements for students to develop cloud solutions and an experiential risk …


Calculation Of Optimal Vocs Emission Reduction Based On Improved Seirs Model In Cloud Environment, Guangqiu Huang, Xixuan Zhao, Qiuqin Lu Mar 2023

Calculation Of Optimal Vocs Emission Reduction Based On Improved Seirs Model In Cloud Environment, Guangqiu Huang, Xixuan Zhao, Qiuqin Lu

Journal of System Simulation

Abstract: Volatile organic compounds (VOCs) emissions in different regions are correlated and influenced. In order to minimize the impact of VOCs on the atmospheric environment and achieve synergistic governance of VOCs regions, an optimal emission reduction model is established with the maximum VOCs emission reduction as the primary goal. An improved SEIRS infectious disease dynamics optimization algorithm considering environmental pollution(SEIRS-CE) is proposed and the model is solved in cloud environment. Taking Xi'an city as an example, the SEIRS-CE algorithm is used in Ali cloud server to calculate the emission reduction of VOCs associated with 13 meteorological monitoring stations in Xi …


Cognitive Software Defined Networking And Network Function Virtualization And Applications, Sachin Sharma, Avishek Nag Feb 2023

Cognitive Software Defined Networking And Network Function Virtualization And Applications, Sachin Sharma, Avishek Nag

Articles

The emergence of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) has revolutionized the Internet. Using SDN, network devices can be controlled from a centralized, programmable control plane that is decoupled from their data plane, whereas with NFV, network functions (such as network address translation, firewall, and intrusion detection) can be virtualized instead of being implemented on proprietary hardware. In addition, Artificial Intelligence (AI) and Machine Learning (ML) techniques will be key to automating network operations and enhancing customer service. Many of the challenges behind SDN and NFV are currently being investigated in several projects all over the world using …


Development Opportunities And Application Prospects Of Aero-Engine Simulation Technology Under Digital Transformation, Jianguo Cao Jan 2023

Development Opportunities And Application Prospects Of Aero-Engine Simulation Technology Under Digital Transformation, Jianguo Cao

Journal of System Simulation

Abstract: The development of China's social economy and the improvement of its national defense capability in the new era put forward higher requirements for the development of aero-engines. It is urgent to promote the digital transformation of aero-engines in order to achieve coordinated, agile and efficient aero-engine development. Based on the current research and development of aero-engine in China, this paper clarifies the new connotation of "speediness and efficiency, accurate mapping, comprehensive coverage, and dynamic prediction" given by the development of emerging cutting-edge technologies to aero-engine simulation technology, as well as the new technical features of "spatio-temporal ubiquity, data driven, …


The Evolution Of The Chief Technology Officer And The Modernization Of Technology In Education, Brian Skibinski Jan 2023

The Evolution Of The Chief Technology Officer And The Modernization Of Technology In Education, Brian Skibinski

All Student Theses

The role of technology in education has changed dramatically over the past 20 years. From the advent of individual workstations to networked labs to one-to-one technologies, computers have transformed how teachers and students consume information. School districts today support hundreds if not thousands of devices and end users. Technology supports mission critical systems like financial, human resources, library, and student information systems and ensures they are integrating rostering information to numerous third-party programs like Clever, Classlink or textbook specific websites. They also support the district operations as well by assisting in or managing building automation controls which can include lighting, …


Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets, Sourav Kanti Addya, Anurag Satpathy, Bishakh Chandra Ghosh, Sandip Chakraborty, Soumya K. Ghosh, Sajal K. Das Jan 2023

Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets, Sourav Kanti Addya, Anurag Satpathy, Bishakh Chandra Ghosh, Sandip Chakraborty, Soumya K. Ghosh, Sajal K. Das

Computer Science Faculty Research & Creative Works

Virtual machine (VM) migration enables cloud service providers (CSPs) to balance workload, perform zero-downtime maintenance, and reduce applications' power consumption and response time. Migrating a VM consumes energy at the source, destination, and backbone networks, i.e., intermediate routers and switches, especially in a Geo-distributed setting. In this context, we propose a VM migration model called Low Energy Application Workload Migration (LEAWM) aimed at reducing the per-bit migration cost in migrating VMs over Geo-distributed clouds. With a Geo-distributed cloud connected through multiple Internet Service Providers (ISPs), we develop an approach to find out the migration path across ISPs leading to the …


Enhanced Load Balancing Based On Hybrid Artificial Bee Colony With Enhanced Β-Hill Climbing In Cloud, Maha Zeedan, Gamal Attiya, Nawal El-Fishawy Jan 2023

Enhanced Load Balancing Based On Hybrid Artificial Bee Colony With Enhanced Β-Hill Climbing In Cloud, Maha Zeedan, Gamal Attiya, Nawal El-Fishawy

Mansoura Engineering Journal

This paper proposes enhanced load balancer based artificial bee colony and β-Hill climbing for improving the performance metrics such as response time, processing cost, and utilization to avoid overloaded or under loaded situations of virtual machines. In this study, the suggested load balancer is called enhanced load balancing based on hybrid artificial bee colony with enhanced β-Hill climbing (ELBABCEβHC) to improve the response time, processing cost and the resource utilization. Our proposed approach starts by ranking the task then the greedy randomized adaptive search procedure (GRASP) is used in initializing populations. Further, the binary artificial bee colony (BABC) enhanced with …


Large Scale Data Transfers In Cloud-Based Systems, Uday Kumar Bommala Jan 2023

Large Scale Data Transfers In Cloud-Based Systems, Uday Kumar Bommala

Theses

My dissertation focuses on developing a High-performance, Scalable, and Efficient Data Transfer Framework with Configurable and Extensible Features. The exponential growth of high-volume data poses collaboration challenges for big data providers, particularly in global-scale scientific research. The Earth’s scientific sector experiences an ongoing trend of increasing temporal and spatial data resolution, resulting in massive data archives at organizations like NASA, ESA, and JAXA. To facilitate efficient scientific study with partner agencies worldwide, data transfer solutions must handle this vast data volume across platforms at reasonable costs. The dissertation proposes a 3-phase approach (Analysis, Evaluation, and Implementation) to address the implementation …


The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi Jan 2023

The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi

Information Technology & Decision Sciences Faculty Publications

[First paragraph] Enterprise information systems (EIS) have been important enablers of crossfunctional processes within businesses since the 1990s. Often referred to as enterprise resource planning (ERP) systems, they were extended in line with electronic businesses to integrate with suppliers as well as customers. Today, EIS architectures comprise not only ERP, supply chain, and customer relationship management systems, but also business intelligence and analytics. Recently, the move towards decentralized technologies has created new perspectives for EIS. Information systems (IS) research has already addressed opportunities and challenges of these developments quite well, but what will be the pressing opportunities and challenges for …


Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty Jan 2023

Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty

VMASC Publications

The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages. However, in this section, the data is much more vulnerable than others, because the data is strictly private and confidential, and it requires a highly secured framework for the transmission of data between entities. In this article, we aim to design a blockchain-envisioned authentication and key management mechanism for the IoMT-based smart healthcare applications (in short, we call it SBAKM-HS). We compare the various …


Reks: Role-Based Encrypted Keyword Search With Enhanced Access Control For Outsourced Cloud Data, Yibin Miao, Feng Li, Xiaohua Jia, Huaxiong Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng Jan 2023

Reks: Role-Based Encrypted Keyword Search With Enhanced Access Control For Outsourced Cloud Data, Yibin Miao, Feng Li, Xiaohua Jia, Huaxiong Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng

Research Collection School Of Computing and Information Systems

Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly …


The Impact Of The Adoption Of Cloud Computing On Improving The Efficiency Of Accounting Information Systems During The Covid-19 Pandemic (A Field Study On The Service Companies Listed On The Palestine Stock Exchange), Abd El Rahman Rashwan, Etidal Alhelo Dec 2022

The Impact Of The Adoption Of Cloud Computing On Improving The Efficiency Of Accounting Information Systems During The Covid-19 Pandemic (A Field Study On The Service Companies Listed On The Palestine Stock Exchange), Abd El Rahman Rashwan, Etidal Alhelo

Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث

This study mainly aimed to know the effect of using cloud computing on improving the efficiency of the performance of accounting information systems in the service companies listed on the Palestine Stock Exchange during the COVID-19 pandemic.

To achieve the objective of the study, the researchers adopted the descriptive analytical method, and the questionnaire tool to collect data from its sources, analyze it through the SPSS program, and extract the results.

The results of the study showed that cloud computing had an impact on improving the efficiency of accounting information systems, their safety and reliability in addition to achieving the …


Arcana Capstone Report, Jae Won Park, Suzi Ryu, Caitlin Rush Dec 2022

Arcana Capstone Report, Jae Won Park, Suzi Ryu, Caitlin Rush

Student Capstones

Our project, Arcana, is an augmented reality based mobile game. This application will promote outdoor activities for both children and adults and provide them with fun and engaging challenges. A user can grow their unique character and progress through puzzles and encounters. This solution will use many advanced areas of computer science, such as augmented reality and cognitive computing, and have many different components like cloud-computing and multiplayer functionality.


A Proposed Instructional Model Based On The Constructivist Theory For Using Cloud Computing Technology At The University Of Jordan And The Degree Of Appropriateness From The Experts' Point Of View أُنموذج تدريسي مقترح يستند الى النظرية البنائية لاستخدام الحوسبة السحابية في الجامعة الأردنية ودرجة ملاءمته من وجهة نظر الخبراء, Sana Y. Banat, Abdelmuhdi A. Aljarrah Nov 2022

A Proposed Instructional Model Based On The Constructivist Theory For Using Cloud Computing Technology At The University Of Jordan And The Degree Of Appropriateness From The Experts' Point Of View أُنموذج تدريسي مقترح يستند الى النظرية البنائية لاستخدام الحوسبة السحابية في الجامعة الأردنية ودرجة ملاءمته من وجهة نظر الخبراء, Sana Y. Banat, Abdelmuhdi A. Aljarrah

Jordanian Educational Journal

Abstract:

The study aimed to develop a proposed instructional model based on constructivist theory for using cloud computing technology at the University of Jordan, and to reveal the degree of its relevance from the experts' point of view. The study followed a descriptive analytical methodology to achieve the study goals. The study sample consisted of (100) experts at the University of Jordan. A questionnaire consisting of (72) items distributed over (7) dimensions after its validity and reliability has been verified and ensured. The results of the study showed that the degree of suitability of the model from the experts' point …


Comparative Analysis Of Cloud-Based Server And Conventional Server Of Simulators For Marine Engineering, Jose Maria Razon Nalus Oct 2022

Comparative Analysis Of Cloud-Based Server And Conventional Server Of Simulators For Marine Engineering, Jose Maria Razon Nalus

World Maritime University Dissertations

No abstract provided.


An Analysis Of The Microsoft 365 Cloud Migration Process, Its Alternatives, And Results, Curtis Barnes, Robert Houghton Oct 2022

An Analysis Of The Microsoft 365 Cloud Migration Process, Its Alternatives, And Results, Curtis Barnes, Robert Houghton

Mountain Plains Journal of Business and Technology

This study follows the decision making process of comparing a traditional business software stack to cloud alternatives, comparing different cloud platforms, and planning a migration. It addresses specific workloads of an example company in the financial services industry and how the tools in a Microsoft 365 subscription support that work. The process of transferring an existing Exchange server and its users to Azure is thoroughly detailed, as is the logic behind certain crucial decisions that are part of that procedure. A calculation of real-world savings is also provided. The resulting paper is usable as both a reference and guide for …


Vpsl: Verifiable Privacy-Preserving Data Search For Cloud-Assisted Internet Of Things, Qiuyun Tong, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng Oct 2022

Vpsl: Verifiable Privacy-Preserving Data Search For Cloud-Assisted Internet Of Things, Qiuyun Tong, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng

Research Collection School Of Computing and Information Systems

Cloud-assisted Internet of Things (IoT) is increasingly prevalent used in various fields, such as the healthcare system. While in such a scenario, sensitive data (e.g., personal electronic medical records) can be easily revealed, which incurs potential security challenges. Thus, Symmetric Searchable Encryption (SSE) has been extensively studied due to its capability of supporting efficient search on encrypted data. However, most SSE schemes require the data owner to share the complete key with query users and take malicious cloud servers out of consideration. Seeking to address these limitations, in this paper we propose a Verifiable Privacy-preserving data Search scheme with Limited …


Soci: A Toolkit For Secure Outsourced Computation On Integers, Bowen Zhao, Jiaming Yuan, Ximeng Liu, Yongdong Wu, Hwee Hwa Pang, Robert H. Deng Oct 2022

Soci: A Toolkit For Secure Outsourced Computation On Integers, Bowen Zhao, Jiaming Yuan, Ximeng Liu, Yongdong Wu, Hwee Hwa Pang, Robert H. Deng

Research Collection School Of Computing and Information Systems

Secure outsourced computation is a key technique for protecting data security and privacy in the cloud. Although fully homomorphic encryption (FHE) enables computations over encrypted data, it suffers from high computation costs in order to support an unlimited number of arithmetic operations. Recently, secure computations based on interactions of multiple computation servers and partially homomorphic encryption (PHE) were proposed in the literature, which enable an unbound number of addition and multiplication operations on encrypted data more efficiently than FHE and do not add any noise to encrypted data; however, these existing solutions are either limited in functionalities (e.g., computation on …


Evaluation Of Geo-Spebh Algorithm Based On Bandwidth For Big Data Retrieval In Cloud Computing, Abubakar Usman Othman, Moses Timothy, Aisha Yahaya Umar, Abdullahi Salihu Audu, Boukari Souley, Abdulsalam Ya’U Gital Sep 2022

Evaluation Of Geo-Spebh Algorithm Based On Bandwidth For Big Data Retrieval In Cloud Computing, Abubakar Usman Othman, Moses Timothy, Aisha Yahaya Umar, Abdullahi Salihu Audu, Boukari Souley, Abdulsalam Ya’U Gital

Al-Bahir Journal for Engineering and Pure Sciences

The fast increase in volume and speed of information created by mobile devices, along with the availability of web-based applications, has considerably contributed to the massive collection of data. Approximate Nearest Neighbor (ANN) is essential in big size databases for comparison search to offer the nearest neighbor of a given query in the field of computer vision and pattern recognition. Many hashing algorithms have been developed to improve data management and retrieval accuracy in huge databases. However, none of these algorithms took bandwidth into consideration, which is a significant aspect in information retrieval and pattern recognition. As a result, our …


The Internet Of Citizens: A Lawyer’S View On Some Technological Developments In The United Kingdom And India*, Guido Noto La Diega Sep 2022

The Internet Of Citizens: A Lawyer’S View On Some Technological Developments In The United Kingdom And India*, Guido Noto La Diega

Indian Journal of Law and Technology

This article aspires to constitute a useful tool for both Asian and European readers as regards some of the state-of-the-art technologies revolving around the Internet of Things (‘IoT’) and their intersection with cloud computing (the Clouds of Things, ‘CoT’) in both the continents. The main emerging legal issues will be presented, with a focus on intellectual property, consumer protection, and privacy. The cases chosen are from India and the United Kingdom, two countries that are conspicuously active on this front. I will give an account only of (what I consider to be) the highlights of the IoT in India and …


Cloud Gaming Demystified: An Introduction To The Legal Implications Of Cloud-Based Videogames, Mitchell Longan, Gaetano Dimita, Johan David Michels, Christopher Millard Sep 2022

Cloud Gaming Demystified: An Introduction To The Legal Implications Of Cloud-Based Videogames, Mitchell Longan, Gaetano Dimita, Johan David Michels, Christopher Millard

Michigan Technology Law Review

In this paper, we “demystify” cloud-based videogaming and its legal implications, in two stages. First, we describe the videogame sector; explain the basics of cloud computing and traditional videogame technologies and set out how the two converge in cloud-based videogame systems. Based on this analysis, we distinguish three separate models for cloud gaming services: (i) the “layered” model of Gaming-as-a-Service (‘GaaS’); (ii) the ‘integrated’ model of GaaS; and (iii) the ‘consumer infrastructure-as-a-service’ model. We argue that these three models are key to analyzing how intellectual property rights, contractual rights, and regulatory issues will develop in this novel environment for videogame …


Frameworks For Secure Collaborative And Concurrent Editing, Shashank Arora Aug 2022

Frameworks For Secure Collaborative And Concurrent Editing, Shashank Arora

Legacy Theses & Dissertations (2009 - 2024)

Cloud-based online document editing services, such as Google Docs and Office 365, provide an inexpensive and efficient means of managing documents. However, storing data on the cloud also raises certain security and privacy concerns, especially when the data is of confidential and sensitive nature. Storing data on third-party servers can potentially be compromising as it gives an opportunity to the third-party cloud service providers to turn semi-honest and become curious about user data. User data stored on third-party servers is also prone to attacks like virtual machine-based side-channel along with natural language processing and machine learning-based content search and retrieval …


Scheduling Many-Task Computing Applications For A Hybrid Cloud, Shifat Perveen Mithila Jul 2022

Scheduling Many-Task Computing Applications For A Hybrid Cloud, Shifat Perveen Mithila

LSU Doctoral Dissertations

A centralized scheduler can become a bottleneck for placing the tasks of a many-task application on heterogeneous cloud resources. Previously, it was demonstrated that a decentralized vector scheduling approach based on performance measurements can be used successfully for this task placement scenario. In this dissertation, we extend this approach to task placement based on latency measurements. Each node collects performance metrics from its neighbors on an overlay graph, measures the communication latency, and then makes local decisions on where to move tasks. We present a decentralized and a centralized algorithm for configuring the overlay graph based on latency measurements and …