Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Cognitive Software Defined Networking And Network Function Virtualization And Applications, Sachin Sharma, Avishek Nag Feb 2023

Cognitive Software Defined Networking And Network Function Virtualization And Applications, Sachin Sharma, Avishek Nag

Articles

The emergence of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) has revolutionized the Internet. Using SDN, network devices can be controlled from a centralized, programmable control plane that is decoupled from their data plane, whereas with NFV, network functions (such as network address translation, firewall, and intrusion detection) can be virtualized instead of being implemented on proprietary hardware. In addition, Artificial Intelligence (AI) and Machine Learning (ML) techniques will be key to automating network operations and enhancing customer service. Many of the challenges behind SDN and NFV are currently being investigated in several projects all over the world using …


Chaos-Based Encryption Keys And Neural Key-Store For Cloud-Hosted Data Confidentiality, N.N Mosola, M.T Dlamini, Jonathan Blackledge, J.H.P Eloff, H.S Venter Sep 2017

Chaos-Based Encryption Keys And Neural Key-Store For Cloud-Hosted Data Confidentiality, N.N Mosola, M.T Dlamini, Jonathan Blackledge, J.H.P Eloff, H.S Venter

Conference papers

Cloud computing brings flexible and cost-effective services. However, security concerns plague the cloud. Data confidentiality is one of the security concerns inhibiting the adoption of cloud computing. This concern stems from various cyberattacks directed towards gaining unauthorised access to cloud-bound or cloud-hosted data. This paper proposes a clientend encryption and key management system to curb cyberattacks that target compromising data confidentiality on the cloud.


Maturity Of Cloud Application Interoperability Frameworks For Small To Medium Enterprises, John Warde May 2015

Maturity Of Cloud Application Interoperability Frameworks For Small To Medium Enterprises, John Warde

Dissertations

Cloud computing has many benefits and organisations have bought into the cost effective and elastic solutions provided by major players in the market. However, cloud computing and Cloud Service Providers (CSP) are still evolving, hence there are differences in how customers connect with each provider to the orchestrate application lifecycle management. A lack of standards can create vendor lock-in. This work investigates current research and possible solutions to the vendor lock-in problem through the use of Cloud Interoperability or multi-cloud frameworks. Software developers and organisations can use these frameworks which abstract the differences between CSPs and mitigate vendor lock-in. A …


Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba Sep 2010

Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba

Dissertations

The advent of cloud computing in recent years has sparked an interest from different organisations, institutions and users to take advantage of web applications. This is a result of the new economic model for the Information Technology (IT) department that cloud computing promises. The model promises a shift from an organisation required to invest heavily for limited IT resources that are internally managed, to a model where the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud computing also promises scalability of resources and on-demand availability of resources.

Although, the adoption …


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, N. Ptitsyn Jan 2010

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, N. Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …