Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Cloud

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 79

Full-Text Articles in Physical Sciences and Mathematics

The Impact Of Artificial Intelligence And Machine Learning On Organizations Cybersecurity, Mustafa Abdulhussein Feb 2024

The Impact Of Artificial Intelligence And Machine Learning On Organizations Cybersecurity, Mustafa Abdulhussein

Doctoral Dissertations and Projects

As internet technology proliferate in volume and complexity, the ever-evolving landscape of malicious cyberattacks presents unprecedented security risks in cyberspace. Cybersecurity challenges have been further exacerbated by the continuous growth in the prevalence and sophistication of cyber-attacks. These threats have the capacity to disrupt business operations, erase critical data, and inflict reputational damage, constituting an existential threat to businesses, critical services, and infrastructure. The escalating threat is further compounded by the malicious use of artificial intelligence (AI) and machine learning (ML), which have increasingly become tools in the cybercriminal arsenal. In this dynamic landscape, the emergence of offensive AI introduces …


Performance Analysis Of Zero Trust In Cloud Native Systems, Simone Rodigari Jan 2023

Performance Analysis Of Zero Trust In Cloud Native Systems, Simone Rodigari

Theses

Critical applications demand strong security implementations, low latency and high availability at constant rates, however, the performance of a software system is affected by the implementation of security. This research measures the performance overhead and possible mitigation in cloud native systems secured with a service mesh, which allows enabling security policies for the authentication, authorization and encryption of traffic within distributed systems. The side-car proxy is a core component of this architecture, acting as a policy enforcement point and intercepting networking communication from/to applications part of the mesh, consequently affecting the performance of applications hosted in the cloud. Physical resources …


Cloud Container Security’ Next Move, Vishakha Sadhwani Dec 2022

Cloud Container Security’ Next Move, Vishakha Sadhwani

Dissertations and Theses

In the last few years, it is apparent to cybersecurity experts everywhere that the proverbial container tech genie is out of the bottle, and has been widely embraced across multiple organizations. To achieve the flexibility of building and deploying applications anywhere and everywhere, cloud native environments have gained great momentum and made the development lifecycle simpler than ever. However, container environments brings with them a range of cybersecurity issues that includes images, containers, hosts, runtimes, registries, and orchestration platforms, which needs the necessity to focus on investing in securing your container stack.

According to this report[1], released by cloud-native …


React E-Commerce Application & Google Cloud Devops, Hemanth Panditi Aug 2022

React E-Commerce Application & Google Cloud Devops, Hemanth Panditi

Culminating Experience Projects

The “CIS 693” project consists of an electronic commerce React application and a developmental operations pipeline that was built in Google Cloud. Over the duration of the applied computer science program and popular trends in technology, there has been an emphasis on cloud computing, serverless technology/microservice architecture, containerization, and distributed computing in general. The cloud is an important and necessary platform to work from because it provides a central location with access to these tools, useful documentation, and informative demonstrations. The projects for previous classes revolved around similar topics as it is relevant in today’s context. The courses offered a …


Multi-Party Contract Management For Microservices, Zakaria Maamar, Noura Faci, Joyce El Haddad, Fadwa Yahya, Mohammad Askar Jan 2022

Multi-Party Contract Management For Microservices, Zakaria Maamar, Noura Faci, Joyce El Haddad, Fadwa Yahya, Mohammad Askar

All Works

This paper discusses the necessary steps and means for ensuring the successful deployment and execution of software components referred to as microservices on top of platforms referred to as Internet of Things (IoT) devices, clouds, and edges. These steps and means are packaged into formal documents known in the literature as contracts. Because of the multi-dimensional nature of deploying and executing microservices, contracts are specialized into discovery, deployment, and collaboration types, capturing each specific aspect of the completion of these contracts. This completion is associated with a set of Quality-of-Service (QoS) parameters that are monitored allowing to identify potential deviations …


An Online E-Voting System Based On An Adaptive Ledger With Singular Value Decomposition Technique, Rihab Habeeb Sahib, Prof. Dr. Eman Salih Al-Shamery Dec 2021

An Online E-Voting System Based On An Adaptive Ledger With Singular Value Decomposition Technique, Rihab Habeeb Sahib, Prof. Dr. Eman Salih Al-Shamery

Karbala International Journal of Modern Science

Regular E-voting systems for elections may count the votes in less time,less cost,save the privacy of citizens,but still considered risky as votes can be tampered.E-voting systems based on a network distributed ledger show fast results,more trusted,save privacy,cannot be tampered,and distributed in which no central organization controls the system.This paper illustrate an e-voting system to solve the challenge of a massive ledger that is distributed among network-nodes using a data reduction technique as a security-matching-tool,singular value decomposition(SVD) that handle a copy of election results in another form and matched with the SQL-database results to announce a successful election-event representing a transparency-powerful-secured-system


Optimizing The Demand And Distribution Of Power In Smart Grids, Saifullah Khalid Aug 2021

Optimizing The Demand And Distribution Of Power In Smart Grids, Saifullah Khalid

Computer Science and Engineering Dissertations

The electricity is generated in bulk power plants and transported to the end-user through the transmission and distribution networks. The process incurs heavy losses adding to the operational costs. Secondly, fossil fuels dominate energy generation and are a major source of greenhouse gases. Thirdly, the power grid is vulnerable to natural disasters. The smart grid addresses these challenges by integrating distributed energy resources (DERs) in the distribution system closer to the load and with greater penetration of renewable energy. Renewable energy is key to cutting carbon emissions due to fossil fuel-based electricity generation and reducing operating costs. It can also …


Iot Garden Frost Alarm, Andrew James Jun 2021

Iot Garden Frost Alarm, Andrew James

Honors Theses

Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.

The system as designed …


An Acceptable Cloud Computing Model For Public Sectors, Eswar Kumar Devarakonda Jan 2021

An Acceptable Cloud Computing Model For Public Sectors, Eswar Kumar Devarakonda

Walden Dissertations and Doctoral Studies

Cloud computing enables information technology (IT) leaders to shift from passive business support to active value creators. However, social economic-communication barriers inhibit individual users from strategic use of the cloud. Grounded in the theory of technology acceptance, the purpose of this multiple case study was to explore strategies IT leaders in public sector organizations implement to utilize cloud computing. The participants included nine IT leaders from public sector organizations in Texas, USA. Data were collected using semi-structured interviews, field notes, and publicly available artifacts documents. Data were analyzed using thematic analysis: five themes emerged (a) user-centric and data-driven cloud model; …


Digital Forensic Readiness In Operational Cloud Leveraging Iso/Iec 27043 Guidelines On Security Monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, Sadi Alawadi Jan 2021

Digital Forensic Readiness In Operational Cloud Leveraging Iso/Iec 27043 Guidelines On Security Monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, Sadi Alawadi

Research outputs 2014 to 2021

An increase in the use of cloud computing technologies by organizations has led to cybercriminals targeting cloud environments to orchestrate malicious attacks. Conversely, this has led to the need for proactive approaches through the use of digital forensic readiness (DFR). Existing studies have attempted to develop proactive prototypes using diverse agent-based solutions that are capable of extracting a forensically sound potential digital evidence. As a way to address this limitation and further evaluate the degree of PDE relevance in an operational platform, this study sought to develop a prototype in an operational cloud environment to achieve DFR in the cloud. …


An Energy-Efficient And Secure Data Inference Framework For Internet Of Health Things: A Pilot Study, James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, Paul Haskell-Dowland, Xi Zheng Jan 2021

An Energy-Efficient And Secure Data Inference Framework For Internet Of Health Things: A Pilot Study, James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, Paul Haskell-Dowland, Xi Zheng

Research outputs 2014 to 2021

© 2021 by the authors. Licensee MDPI, Basel, Switzerland. Privacy protection in electronic healthcare applications is an important consideration, due to the sensitive nature of personal health data. Internet of Health Things (IoHT) networks that are used within a healthcare setting have unique challenges and security requirements (integrity, authentication, privacy, and availability) that must also be balanced with the need to maintain efficiency in order to conserve battery power, which can be a significant limitation in IoHT devices and networks. Data are usually transferred without undergoing filtering or optimization, and this traffic can overload sensors and cause rapid battery consumption …


Secure Data Sharing In Cloud And Iot By Leveraging Attribute-Based Encryption And Blockchain, Md Azharul Islam Jan 2021

Secure Data Sharing In Cloud And Iot By Leveraging Attribute-Based Encryption And Blockchain, Md Azharul Islam

Doctoral Dissertations

“Data sharing is very important to enable different types of cloud and IoT-based services. For example, organizations migrate their data to the cloud and share it with employees and customers in order to enjoy better fault-tolerance, high-availability, and scalability offered by the cloud. Wearable devices such as smart watch share user’s activity, location, and health data (e.g., heart rate, ECG) with the service provider for smart analytic. However, data can be sensitive, and the cloud and IoT service providers cannot be fully trusted with maintaining the security, privacy, and confidentiality of the data. Hence, new schemes and protocols are required …


Private Face Detection Based On Random Sub-Images In Cloud, Yuan Peng, Jin Xin, Xiaodong Li, Zhao Geng, Yaming Wu, Mingxin Ma, Yulu Tian, Yingya Chen Aug 2020

Private Face Detection Based On Random Sub-Images In Cloud, Yuan Peng, Jin Xin, Xiaodong Li, Zhao Geng, Yaming Wu, Mingxin Ma, Yulu Tian, Yingya Chen

Journal of System Simulation

Abstract: In order to detect faces of terminal face image in the cloud at the same time protect both privacy of data,a method of face images privacy detection based on random sub-Images representation was proposed. Terminal divided original image into 2 value sub-images weighted sum based on random sub-images generation algorithm and randomly arranges weights of sub-images. Terminal sent sub-images according to the weights of random sequence to the cloud server. Cloud server detected sub-images with its face detection algorithm. Terminal merges test results based on random sub were exploded. Two random vectors were leveraged to protect the parameters …


Cloud Resource Prediction Using Explainable And Cooperative Artificial Neural Networks, Nathan R. Nelson Aug 2020

Cloud Resource Prediction Using Explainable And Cooperative Artificial Neural Networks, Nathan R. Nelson

MSU Graduate Theses

This work proposes a system for predicting cloud resource utilization by using runtime assembled cooperative artificial neural networks (RACANN). RACANN breaks up the problem into smaller contexts, each represented by a small-scale artificial neural network (ANN). The relevant ANNs are joined together at runtime when the context is present in the data for training and predictions. By analyzing the structure of a complete ANN, the influence of inputs is calculated and used to create linguistic descriptions (LD) of model behavior, so RACANN becomes explainable (eRACANN). The predictive results of eRACANN are compared against its prototype and a single deep ANN …


Bubble-In Digital Testing System, Chaz Hampton Jun 2020

Bubble-In Digital Testing System, Chaz Hampton

Electronic Theses, Projects, and Dissertations

Bubble-In is a cloud-based test-taking system build for students and teachers. The Bubble-In system is a test-taking application that interfaces with a cloud server. The mobile applications have been built for Android and Apple devices and the webserver is hosted on Digital Ocean VPS run with Nginx. The Bubble-In application is equipped with anti-cheating mechanisms such as question-answer key scrambling, not allowing screenshots, screen recording, or leaving the application. The tests students take are sent to the webserver to be graded and have statistics calculated and displayed in easy to use format for the test creator. Instructors can use the …


How Secure Having Iot Devices In Our Homes?, Debora Estrada, Lo'ai A. Tawalbeh, Robert Vinaja Mar 2020

How Secure Having Iot Devices In Our Homes?, Debora Estrada, Lo'ai A. Tawalbeh, Robert Vinaja

Computer Science Faculty Publications

Nowadays, technology has evolved to be in our daily lives to assist in making our lives easier. We now have technology helping us in our lives at home. Devices used to create our “smart home” have done a great deal in making our lives at home less burdensome, but sadly, these devices have secured our personal lives to be more accessible to outsiders. In this paper, the security of home smart devices and their communication will be researched by using other academic articles to support facts found. The operation of the devices will be discussed along with security risks and …


Factors That Influence Throughput On Cloud-Hosted Mysql Server, Eric Brown Jan 2020

Factors That Influence Throughput On Cloud-Hosted Mysql Server, Eric Brown

Walden Dissertations and Doctoral Studies

Many businesses are moving their infrastructure to the cloud and may not fully understand the factors that can increase costs. With so many factors available to improve throughput in a database, it can be difficult for a database administrator to know which factors can provide the best efficiency to maintain lower costs. Grounded in Six Sigma theoretical framework, the purpose of this quantitative, quasi-experimental study was to evaluate the relationship between the time of day, the number of concurrent users, InnoDB buffer pool size, InnoDB Input/Output capacity, and MySQL transaction throughput to a MySQL database running on a cloud, virtual, …


Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten Jan 2020

Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten

Walden Dissertations and Doctoral Studies

Cloud computing adoption rates have not grown commensurate with several well-known and substantially tangible benefits such as horizontal distribution and reduced cost, the latter both in terms of infrastructure and specialized personnel. The lack of adoption presents a challenge to both service providers from a sales perspective and service consumers from a usability focus. The purpose of this quantitative correlational study utilizing the technological, organizational, and environmental framework was to examine the relationship between shared technology (ST), malicious insiders (MI), account hijacking, data leakage, data protection, service partner trust (SP), regulatory concerns and the key decision-makers intention to adopt cloud …


Factors Influencing Cloud Computing Adoption By Small Firms In The Payment Card Industry, Marie Njanje Tambe Jan 2020

Factors Influencing Cloud Computing Adoption By Small Firms In The Payment Card Industry, Marie Njanje Tambe

Walden Dissertations and Doctoral Studies

Technology acceptance is increasingly gaining attention in research considering the continuous exploits of innovation and various derived advantages. Cloud computing (CC) has shown to be the ideal solution for aligning information technology with business strategies. However, small to medium-sized enterprises (SMEs) in the payment card industry are reluctantly adopting this technology despite the benefits. This correlational study aims at investigating whether security, cost effectiveness, or regulatory compliance influence CC adoption by U.S. SMEs in the payment card sector. The study builds on the technology-organization-environment (TOE) framework and uses a previously validated instrument to assess CC adoption by decision-makers in U.S. …


Ontology‐Driven Perspective Of Cfraas, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, Hein S. Venter Jan 2020

Ontology‐Driven Perspective Of Cfraas, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, Hein S. Venter

Research outputs 2014 to 2021

A Cloud Forensic Readiness as a Service (CFRaaS) model allows an environment to preemptively accumulate relevant potential digital evidence (PDE) which may be needed during a post‐event response process. The benefit of applying a CFRaaS model in a cloud environment, is that, it is designed to prevent the modification/tampering of the cloud architectures or the infrastructure during the reactive process, which if it could, may end up having far‐reaching implications. The authors of this article present the reactive process as a very costly exercise when the infrastructure must be reprogrammed every time the process is conducted. This may hamper successful …


Business Process Specification, Verification, And Deployment In A Mono-Cloud, Multi-Edge Context, Saoussen Cheikhrouhou, Slim Kallel, Ikbel Guidara, Zakaria Maamar Jan 2020

Business Process Specification, Verification, And Deployment In A Mono-Cloud, Multi-Edge Context, Saoussen Cheikhrouhou, Slim Kallel, Ikbel Guidara, Zakaria Maamar

All Works

© 2020, ComSIS Consortium. All rights reserved. Despite the prevalence of cloud and edge computing, ensuring the satisfaction of time-constrained business processes, remains challenging. Indeed, some cloud/edge-based resources might not be available when needed leading to delaying the execution of these processes’ tasks and/or the transfer of these processes’ data. This paper presents an approach for specifying, verifying, and deploying time-constrained business processes in a mono-cloud, multi-edge context. First, the specification and verification of processes happen at design-time and run-time to ensure that these processes’ tasks and data are continuously placed in a way that would mitigate the violation of …


Cloud Based Iot Architecture, Nathan Roehl Dec 2019

Cloud Based Iot Architecture, Nathan Roehl

Theses and Dissertations

The Internet of Things (IoT) and cloud computing have grown in popularity over the past decade as the internet becomes faster and more ubiquitous. Cloud platforms are well suited to handle IoT systems as they are accessible and resilient, and they provide a scalable solution to store and analyze large amounts of IoT data. IoT applications are complex software systems and software developers need to have a thorough understanding of the capabilities, limitations, architecture, and design patterns of cloud platforms and cloud-based IoT tools to build an efficient, maintainable, and customizable IoT application. As the IoT landscape is constantly changing, …


Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili Aug 2019

Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Interactions with IoT devices generates vast amounts of personal data that can be used as a source of evidence in digital investigations. Currently, there are many challenges in IoT forensics such as the difficulty in acquiring and analysing IoT data/devices and the lack IoT forensic tools. Besides technical challenges, there are many concepts in IoT forensics that have yet to be explored such as definitions, experience and capability in the analysis of IoT data/devices and current/future challenges. A deeper understanding of these various concepts will help progress the field. To achieve this goal, we conducted a survey which received 70 …


Krahasimi I Autentifikimit Me Shumë Faktorë Të Tre Platformave Cloud, Alban Gojani Aug 2019

Krahasimi I Autentifikimit Me Shumë Faktorë Të Tre Platformave Cloud, Alban Gojani

Theses and Dissertations

Qëllimi i këtij punimi është krahasimi i autentifikimit me shumë faktorë (MFA) të tre platformave cloud më të përdorura: Microsot Azure, Amazon Web Services dhe Google Cloud Platform. MFA-ja është ndër metodat më të sigurta për autentifikim që përdoret në sisteme kompjuterike. Materiali i përdorur për këtë punim është marrë nga burime të ndryshme, gjegjësisht nga dokumentacionet e platformave cloud të lartëpërmendura, hulumtime shkencore me tema të ngjajshme, artikuj dhe publikime shkencore në internet dhe nga enciklopedia. Fillimisht është shtjelluar MFA-ja si mekanizëm në vete dhe historia e tij, pastaj janë përshkruar MFA-të e këtyre platformave dhe në fund është …


Characterizing And Optimizing The Performance Of Virtualized Network Systems In The Cloud, Kun Suo Aug 2019

Characterizing And Optimizing The Performance Of Virtualized Network Systems In The Cloud, Kun Suo

Computer Science and Engineering Dissertations

To leverage the elastic resource allocation of cloud computing and enhance the service availability and productivity, numerous applications and businesses have been moved from the traditional data centers into the cloud during the past decade. Despite the benefits introduced by virtualization, such as high resource utilization, flexible resource management and operation cost reduction, it also incurs additional overhead, scheduling delays as well as semantic gaps among hardware, operating system and applications. These issues can cause non-negligible impact to the performance and quality-of-service (QoS) of the cloud applications, especially for I/O-intensive services. Meanwhile, the increasing scale and complexity of the cloud …


Querying Over Encrypted Databases In A Cloud Environment, Jake Douglas May 2019

Querying Over Encrypted Databases In A Cloud Environment, Jake Douglas

Boise State University Theses and Dissertations

The adoption of cloud computing has created a huge shift in where data is processed and stored. Increasingly, organizations opt to store their data outside of their own network to gain the benefits offered by shared cloud resources. With these benefits also come risks; namely, another organization has access to all of the data. A malicious insider at the cloud services provider could steal any personal information contained on the cloud or could use the data for the cloud service provider's business advantage. By encrypting the data, some of these risks can be mitigated. Unfortunately, encrypting the data also means …


Towards Data And Model Confidentiality In Outsourced Machine Learning, Sagar Sharma Jan 2019

Towards Data And Model Confidentiality In Outsourced Machine Learning, Sagar Sharma

Browse all Theses and Dissertations

With massive data collections and needs for building powerful predictive models, data owners may choose to outsource storage and expensive machine learning computations to public cloud providers (Cloud). Data owners may choose cloud outsourcing due to the lack of in-house storage and computation resources or the expertise of building models. Similarly, users, who subscribe to specialized services such as movie streaming and social networking, voluntarily upload their data to the service providers' site for storage, analytics, and better services. The service provider, in turn, may also choose to benefit from ubiquitous cloud computing. However, outsourcing to a public cloud provider …


Exploring Firm-Level Cloud Adoption And Diffusion, William J. Wood Jan 2019

Exploring Firm-Level Cloud Adoption And Diffusion, William J. Wood

Walden Dissertations and Doctoral Studies

Cloud computing innovation adoption literature has primarily focused on individuals, small businesses, and nonprofit organizations. The functional linkage between cloud adoption and diffusion is instrumental toward understanding enterprise firm-level adoption. The purpose of this qualitative collective case study was to explore strategies used by information technology (IT) executives to make advantageous enterprise cloud adoption and diffusion decisions. This study was guided by an integrated diffusion of innovation and technology, organization, and environment conceptual framework to capture and model this complex, multifaceted problem. The study’s population consisted of IT executives with cloud-centric roles in 3 large (revenues greater than $5 billion) …


Designing Cybersecurity Competitions In The Cloud: A Framework And Feasibility Study, Chandler Ryan Newby Dec 2018

Designing Cybersecurity Competitions In The Cloud: A Framework And Feasibility Study, Chandler Ryan Newby

Theses and Dissertations

Cybersecurity is an ever-expanding field. In order to stay current, training, development, and constant learning are necessary. One of these training methods has historically been competitions. Cybersecurity competitions provide a method for competitors to experience firsthand cybersecurity concepts and situations. These experiences can help build interest in, and improve skills in, cybersecurity.

While there are diverse types of cybersecurity competitions, most are run with on-premise hardware, often centralized at a specific location, and are usually limited in scope by available hardware. This research focuses on the possibility of running cybersecurity competitions, specifically CCDC style competitions, in a public cloud environment. …


Nocloud: Experimenting With Network Disconnection By Design, Reza Rawassizadeh, Timothy Pierson, Ronald Peterson, David Kotz Mar 2018

Nocloud: Experimenting With Network Disconnection By Design, Reza Rawassizadeh, Timothy Pierson, Ronald Peterson, David Kotz

Dartmouth Scholarship

Application developers often advocate uploading data to the cloud for analysis or storage, primarily due to concerns about the limited computational capability of ubiquitous devices. Today, however, many such devices can still effectively operate and execute complex algorithms without reliance on the cloud. The authors recommend prioritizing on-device analysis over uploading the data to another host, and if on-device analysis is not possible, favoring local network services over a cloud service.