Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Cloud Workflow Automation, William Crump, Eric Darling, Kyle Hagood, Syed Rizvi Jan 2017

Cloud Workflow Automation, William Crump, Eric Darling, Kyle Hagood, Syed Rizvi

Capstone Design Expo Posters

The goal of our project was to develop an application in the cloud which automates complex business tasks. The application allows users to create configurable events consisting of a trigger followed by an action. Triggers are designed for common tasks such as scanning a directory or email inbox for new files. When a new file is detected, the application triggers the execution of an associated action such as sending an email alerting the user of the changes or processing and moving the files. Users are thus able to automate complex tasks by configuring event sequences, leading to an increase …


Contributions To Edge Computing, Vernon K. Bumgardner Jan 2017

Contributions To Edge Computing, Vernon K. Bumgardner

Theses and Dissertations--Computer Science

Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.

Edge Computing is the migration of computational functionality to sources of data generation. The importance of …


A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Jonathan Blackledge, Paul Tobin, Lee Tobin, Mick Mckeever Jan 2017

A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Jonathan Blackledge, Paul Tobin, Lee Tobin, Mick Mckeever

Conference papers

Abstract: In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this system gives excellent security to stored data and complete control for accessing data by the client at different locations. The motivation for developing this personal encryption came about because of poor Cloud security and doubts over the safety of public encryption algorithms which might contain backdoors. However, side-channel attacks and other unwanted third-party interventions in Cloud security, probably contribute more to the poor security record history. These factors led to the development of a prototype for personalising security locally which defeats cryptanalysis. …