Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Series

Cloud Computing

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 33

Full-Text Articles in Physical Sciences and Mathematics

Fault Aware Task Scheduling In Cloud Using Min-Min And Dbscan, S. M.F.D.Syed Mustapha, Punit Gupta Jul 2023

Fault Aware Task Scheduling In Cloud Using Min-Min And Dbscan, S. M.F.D.Syed Mustapha, Punit Gupta

All Works

Cloud computing leverages computing resources by managing these resources globally in a more efficient manner as compared to individual resource services. It requires us to deliver the resources in a heterogeneous environment and also in a highly dynamic nature. Hence, there is always a risk of resource allocation failure that can maximize the delay in task execution. Such adverse impact in the cloud environment also raises questions on quality of service (QoS). Resource management for cloud application and service have bigger challenges and many researchers have proposed several solutions but there is room for improvement. Clustering the resources clustering and …


A Deep Learning Framework Supporting Model Ownership Protection And Traitor Tracing, Guowen Xu, Hongwei Li, Yuan Zhang, Xiaodong Lin, Robert H. Deng, Xuemin (Sherman) Shen Dec 2020

A Deep Learning Framework Supporting Model Ownership Protection And Traitor Tracing, Guowen Xu, Hongwei Li, Yuan Zhang, Xiaodong Lin, Robert H. Deng, Xuemin (Sherman) Shen

Research Collection School Of Computing and Information Systems

Cloud-based deep learning (DL) solutions have been widely used in applications ranging from image recognition to speech recognition. Meanwhile, as commercial software and services, such solutions have raised the need for intellectual property rights protection of the underlying DL models. Watermarking is the mainstream of existing solutions to address this concern, by primarily embedding pre-defined secrets in a model's training process. However, existing efforts almost exclusively focus on detecting whether a target model is pirated, without considering traitor tracing. In this paper, we present SecureMark_DL, which enables a model owner to embed a unique fingerprint for every customer within parameters …


Infusing Raspberry Pi In The Computer Science Curriculum For Enhanced Learning, Fitratullah Khan, Mahmoud K. Quweider, Ala Qubbaj, Emmett Tomai, Lei Xu, Liyu Zhang, Hansheng Lei Jun 2020

Infusing Raspberry Pi In The Computer Science Curriculum For Enhanced Learning, Fitratullah Khan, Mahmoud K. Quweider, Ala Qubbaj, Emmett Tomai, Lei Xu, Liyu Zhang, Hansheng Lei

Computer Science Faculty Publications and Presentations

With the advent of cloud computing, the Internet of Things (IoT), and mobile computing, CS faculty are continuously revamping the curriculum material to address such burgeoning set of technologies in practical and relatable ways. Raspberry Pi (RPi) devices represent an ideal hardware/software framework that embodies all these technologies through its simple architecture, small form factor (that minimizes the volume and footprint of a desktop computer), and ability to integrate various sensors that network together and connect to the Cloud. Therefore, one of the strategies of Computer Science Department, to enhance depth of learning concepts, has been to infuse Raspberry Pi …


Csci 49378: Introduction To Distributed System And Cloudcomputing: Syllabus, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Introduction To Distributed System And Cloudcomputing: Syllabus, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Syllabus: for CSCI 49378: Introduction to Distributed Systems and Cloud Computing (Spring 2020)


Cloud Resource Optimization For Processing Multiple Streams Of Visual Data, Zohar Kapach, Andrew Ulmer, Daniel Merrick, Arshad Alikhan, Yung-Hsiang Lu, Anup Mohan, Ahmed S. Kaseb, George K. Thiruvathukal Jan 2019

Cloud Resource Optimization For Processing Multiple Streams Of Visual Data, Zohar Kapach, Andrew Ulmer, Daniel Merrick, Arshad Alikhan, Yung-Hsiang Lu, Anup Mohan, Ahmed S. Kaseb, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

Hundreds of millions of network cameras have been installed throughout the world. Each is capable of providing a vast amount of real-time data. Analyzing the massive data generated by these cameras requires significant computational resources and the demands may vary over time. Cloud computing shows the most promise to provide the needed resources on demand. In this article, we investigate how to allocate cloud resources when analyzing real-time data streams from network cameras. A resource manager considers many factors that affect its decisions, including the types of analysis, the number of data streams, and the locations of the cameras. The …


Fogfly: A Traffic Light Optimization Solution Based On Fog Computing, Quang Tran Minh, Chanh Minh Tran, Tuan An Le, Binh Thai Nguyen, Triet Minh Tran, Rajesh Krishna Balan Dec 2018

Fogfly: A Traffic Light Optimization Solution Based On Fog Computing, Quang Tran Minh, Chanh Minh Tran, Tuan An Le, Binh Thai Nguyen, Triet Minh Tran, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

This paper provides a fog-based approach to solving the traffic light optimization problem which utilizes the Adaptive Traffic Signal Control (ATSC) model. ATSC systems demand the ability to strictly reflect real-time traffic state. The proposed fog computing framework, namely FogFly, aligns with this requirement by its natures in location-awareness, low latency and affordability to the changes in traffic conditions. As traffic data is updated timely and processed at fog nodes deployed close to data sources (i.e., vehicles at intersections) traffic light cycles can be optimized efficiently while virtualized resources available at network edges are efficiently utilized. Evaluation results show that …


Towards Practical Privacy-Preserving Analytics For Iot And Cloud Based Healthcare Systems, Sagar Sharma, Keke Chen, Amit P. Sheth Mar 2018

Towards Practical Privacy-Preserving Analytics For Iot And Cloud Based Healthcare Systems, Sagar Sharma, Keke Chen, Amit P. Sheth

Kno.e.sis Publications

Modern healthcare systems now rely on advanced computing methods and technologies, such as IoT devices and clouds, to collect and analyze personal health data at unprecedented scale and depth. Patients, doctors, healthcare providers, and researchers depend on analytical models derived from such data sources to remotely monitor patients, early-diagnose diseases, and find personalized treatments and medications. However, without appropriate privacy protection, conducting data analytics becomes a source of privacy nightmare. In this paper, we present the research challenges in developing practical privacy-preserving analytics in healthcare information systems. The study is based on kHealth - a personalized digital healthcare information system …


Green Cloud - Load Balancing, Load Consolidation Using Vm Migration, Manh Duc Do Oct 2017

Green Cloud - Load Balancing, Load Consolidation Using Vm Migration, Manh Duc Do

Masters Theses & Specialist Projects

Recently, cloud computing is a new trend emerging in computer technology with a massive demand from the clients. To meet all requirements, a lot of cloud data centers have been constructed since 2008 when Amazon published their cloud service. The rapidly growing data center leads to the consumption of a tremendous amount of energy even cloud computing has better improved in the performance and energy consumption, but cloud data centers still absorb an immense amount of energy. To raise company’s income annually, the cloud providers start considering green cloud concepts which gives an idea about how to optimize CPU’s usage …


Minimal Coflow Routing And Scheduling In Openflow-Based Cloud Storage Area Networks, Chui Hui Chiu, Dipak Kumar Singh, Qingyang Wang, Kisung Lee, Seung Jong Park Sep 2017

Minimal Coflow Routing And Scheduling In Openflow-Based Cloud Storage Area Networks, Chui Hui Chiu, Dipak Kumar Singh, Qingyang Wang, Kisung Lee, Seung Jong Park

Computer Science Faculty Research & Creative Works

Researches affirm that coflow scheduling/routing substantially shortens the average application inner communication time in data center networks (DCNs). The commonly desirable critical features of existing coflow scheduling/routing framework includes (1) coflow scheduling, (2) coflow routing, and (3) per-flow rate-limiting. However, to provide the 3 features, existing frameworks require customized computing frameworks, customized operating systems, or specific external commercial monitoring frameworks on software-defined networking (SDN) switches. These requirements defer or even prohibit the deployment of coflow scheduling/routing in production DCNs. In this paper, we design a coflow scheduling and routing framework, MinCOF which has minimal requirements on hosts and switches for …


Coflourish: An Sdn-Assisted Coflow Scheduling Framework For Clouds, Chui Hui Chiu, Dipak Kumar Singh, Qingyang Wang, Seung Jong Park Sep 2017

Coflourish: An Sdn-Assisted Coflow Scheduling Framework For Clouds, Chui Hui Chiu, Dipak Kumar Singh, Qingyang Wang, Seung Jong Park

Computer Science Faculty Research & Creative Works

Existing coflow scheduling frameworks effectively shorten communication time and completion time of cluster applications. However, existing frameworks only consider available bandwidth on hosts and overlook congestion in the network when making scheduling decisions. Through extensive simulations using the realistic workload probability distribution from Facebook, we observe the performance degradation of the state-of-the-art coflow scheduling framework, Varys, in the cloud environment on a shared data center network (DCN) because of the lack of network congestion information. We propose Coflourish, the first coflow scheduling framework that exploits the congestion feedback assistances from the software-defined-networking (SDN)-enabled switches in the networks for available bandwidth …


Os2: Oblivious Similarity Based Searching For Encrypted Data Outsourced To An Untrusted Domain, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Naeem Ramzan, Wajahat Ali Khan Jul 2017

Os2: Oblivious Similarity Based Searching For Encrypted Data Outsourced To An Untrusted Domain, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Naeem Ramzan, Wajahat Ali Khan

All Works

© 2017 Pervez et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted data schemes solve this problem by …


Encrypted Data Processing With Homomorphic Re-Encryption, Wenxiu Ding, Zheng Yan, Robert H. Deng May 2017

Encrypted Data Processing With Homomorphic Re-Encryption, Wenxiu Ding, Zheng Yan, Robert H. Deng

Research Collection School Of Computing and Information Systems

Cloud computing offers various services to users by re-arranging storage and computing resources. In order to preserve data privacy, cloud users may choose to upload encrypted data rather than raw data to the cloud. However, processing and analyzing encrypted data are challenging problems, which have received increasing attention in recent years. Homomorphic Encryption (HE) was proposed to support computation on encrypted data and ensure data confidentiality simultaneously. However, a limitation of HE is it is a single user system, which means it only allows the party that owns a homomorphic decryption key to decrypt processed ciphertexts. Original HE cannot support …


Core Elements In Information Security Accountability In The Cloud, Zahir Al-Rashdi, Martin Dick, Ian Storey Jan 2017

Core Elements In Information Security Accountability In The Cloud, Zahir Al-Rashdi, Martin Dick, Ian Storey

Australian Information Security Management Conference

This paper proposes 9 core elements of information security accountability in the area of cloud computing. The core elements were determined via a series of 18 case studies with Omani government organisations that were actively using and/or providing cloud computing. 36 interviews were conducted and then analysed using a grounded theory methodology As a result of the analysis, responsibility, transparency, assurance, remediation, accountability support environment, flexible change process, collaboration, mechanisms and commitment to external criteria. The research also found that the emphasis on specific core elements is context-dependent and that there was considerable variation in emphasis amongst the case study …


Privacy-Aware Relevant Data Access With Semantically Enriched Search Queries For Untrusted Cloud Storage Services, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Sungyoung Lee, Tae Choong Chung Aug 2016

Privacy-Aware Relevant Data Access With Semantically Enriched Search Queries For Untrusted Cloud Storage Services, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Sungyoung Lee, Tae Choong Chung

All Works

© 2016 Pervez et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify …


Constructing Secure Mapreduce Framework In Cloud-Based Environment, Yongzhi Wang Mar 2015

Constructing Secure Mapreduce Framework In Cloud-Based Environment, Yongzhi Wang

FIU Electronic Theses and Dissertations

MapReduce, a parallel computing paradigm, has been gaining popularity in recent years as cloud vendors offer MapReduce computation services on their public clouds. However, companies are still reluctant to move their computations to the public cloud due to the following reason: In the current business model, the entire MapReduce cluster is deployed on the public cloud. If the public cloud is not properly protected, the integrity and the confidentiality of MapReduce applications can be compromised by attacks inside or outside of the public cloud. From the result integrity’s perspective, if any computation nodes on the public cloud are compromised,thosenodes can …


Building A Scalable Global Data Processing Pipeline For Large Astronomical Photometric Datasets, Paul Doyle Jan 2015

Building A Scalable Global Data Processing Pipeline For Large Astronomical Photometric Datasets, Paul Doyle

Other

Astronomical photometry is the science of measuring the flux of a celestial object. Since its introduction, the CCD has been the principle method of measuring flux to calculate the apparent magnitude of an object. Each CCD image taken must go through a process of cleaning and calibration prior to its use. As the number of research telescopes increases the overall computing resources required for image processing also increases. Existing processing techniques are primarily sequential in nature, requiring increasingly powerful servers, faster disks and faster networks to process data. Existing High Performance Computing solutions involving high capacity data centres are complex …


Cloud Security Meets Telemedicine, Michael N. Johnstone Jan 2014

Cloud Security Meets Telemedicine, Michael N. Johnstone

Research outputs 2014 to 2021

Medical systems are potentially one domain where security is seen as an impediment to patient care and not as an essential part of a system. This is an issue for safety-critical systems where reliability and trust are essential for successful operation. Cloud computing services offer a seamless means to allow medical data to be transferred from patient to medical specialist, whilst maintaining security requirements. This paper uses a case study to investigate the use of cloud computing in a mobile application to assist with diagnostics for patients with Parkinson Disease. It was found that the developers of the app ignored …


A Conceptual Model For Federated Authentication In The Cloud, Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, Ingo Stengel Dec 2013

A Conceptual Model For Federated Authentication In The Cloud, Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, Ingo Stengel

Australian Information Security Management Conference

Authentication is a key security control for any computing system, whether that is a PC, server, laptop, tablet or mobile phone. However, authentication is traditionally poorly served, with existing implementations falling foul of a variety of weaknesses. Passwords are poorly selected, reused and shared (to name but a few). Research has suggested novel approaches to authentication such as transparent authentication and cooperative and distributed authentication. However, these technologies merely focus upon individual platforms rather than providing a universal and federated authentication approach that can be used across technologies and services. The advent of cloud computing, its universal connectivity, scalability and …


Accelerating Optimistic Hla-Based Simulations In Virtual Execution Environments, Zengxiang Li, Xiaorong Li, Nguyen Binh Duong Ta, Wentong Cai, Stephen John Turner May 2013

Accelerating Optimistic Hla-Based Simulations In Virtual Execution Environments, Zengxiang Li, Xiaorong Li, Nguyen Binh Duong Ta, Wentong Cai, Stephen John Turner

Research Collection School Of Computing and Information Systems

High Level Architecture (HLA)-based simulations employing optimistic synchronization allows federates to process event and to advance simulation time freely at the risk of over-optimistic execution and execution rollbacks. In this paper, an adaptive resource provisioning system is proposed to accelerate optimistic HLA-based simulations in Virtual Execution Environment (VEE). A performance monitor is introduced using a middleware approach to measure the performance of individual federates transparently to the simulation application. Based on the performance measurements, a resource manager distributes the available computational resources to the federates, making them advance simulation time with comparable speeds. Our proposed approach is evaluated using a …


The Pricing Model Of Cloud Computing Services, Jianhui Huang, Dan Ma Jan 2013

The Pricing Model Of Cloud Computing Services, Jianhui Huang, Dan Ma

Research Collection School Of Computing and Information Systems

Cloud computing service providers offer computing resource as a utility and software as a service over network. Many believe that Cloud computing is making an industry-wise paradigm shift for IT use. Besides its technique issues, the business feature of Cloud computing attracts our interests. Specifically the practice of Amazon EC2 introduces an interesting pricing scheme. Amazon provides users with virtual computing instances as a combination of interruptible service (i.e., spot instance) and uninterruptible service (i.e., on-demand and reserved instance). Spot instance is charged at a per use price which is dynamically changing over time; users of spot instance face the …


Cloud Computing For Environment-Friendly Data Centers, Michael Pawlish, Aparna Varde, Stefan Robila Dec 2012

Cloud Computing For Environment-Friendly Data Centers, Michael Pawlish, Aparna Varde, Stefan Robila

Department of Computer Science Faculty Scholarship and Creative Works

The purpose of this paper is to analyze the carbon footprint and utilization rates in a data center. The long-term goal of this work is to give data center administrators an enhanced perspective of data center operations to allow for more energy efficient operation, to lower the carbon footprint, and to promote green data centers. Previous literature shows that low utilization rates in data centers are due to the forecasting of demand to meet spikes in data center use. This management policy has led to many servers running idle the majority of the time which is a waste of resources. …


The Pricing Model Of Cloud Computing Services, Jianhui Huang, Dan Ma Aug 2012

The Pricing Model Of Cloud Computing Services, Jianhui Huang, Dan Ma

Research Collection School Of Computing and Information Systems

Cloud computing service providers offer computing resource as a utility and software as a service over network. Many believe that Cloud computing is making an industry-wise paradigm shift for IT use. Besides its technique issues, the business feature of Cloud computing attracts our interests. Specifically the practice of Amazon EC2 introduces an interesting pricing scheme. Amazon provides users with virtual computing instances as a combination of interruptible service (i.e., spot instance) and uninterruptible service (i.e., on-demand and reserved instance). Spot instance is charged at a per use price which is dynamically changing over time; users of spot instance face the …


Calm Before The Storm: The Challenges Of Cloud Computing In Digital Forensics, George Grispos, Tim Storer, William Bradley Glisson Jan 2012

Calm Before The Storm: The Challenges Of Cloud Computing In Digital Forensics, George Grispos, Tim Storer, William Bradley Glisson

Interdisciplinary Informatics Faculty Publications

Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments (among others). Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established …


Towards Cloud Mobile Hybrid Application Generation Using Semantically Enriched Domain Specific Languages, Ajith Harshana Ranabahu, Amit P. Sheth, Ashwin Manjunatha, Krishnaprasad Thirunarayan Jan 2012

Towards Cloud Mobile Hybrid Application Generation Using Semantically Enriched Domain Specific Languages, Ajith Harshana Ranabahu, Amit P. Sheth, Ashwin Manjunatha, Krishnaprasad Thirunarayan

Kno.e.sis Publications

The advancements in computing have resulted in a boom of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as you go computing resources, commonly referred to as Cloud computing. Taking advantage of this computing landscape, however, has been hampered by the many heterogeneities that exist in the mobile space as well as the Cloud space.

This research attempts to introduce a disciplined methodology to develop Cloud-mobile hybrid applications by using a Domain Specific Language (DSL) centric approach to generate applications. A Cloud-mobile hybrid is an application that is split between a Cloud based back-end and …


A Domain Specific Language For Enterprise Grade Cloud-Mobile Hybrid Applications, Ajith H. Ranabahu, E. Michael Maximilien, Amit P. Sheth, Krishnaprasad Thirunarayan Oct 2011

A Domain Specific Language For Enterprise Grade Cloud-Mobile Hybrid Applications, Ajith H. Ranabahu, E. Michael Maximilien, Amit P. Sheth, Krishnaprasad Thirunarayan

Kno.e.sis Publications

Cloud computing has changed the technology landscape by offering flexible and economical computing resources to the masses. However, vendor lock-in makes the migration of applications and data across clouds an expensive proposition. The lock-in is especially serious when considering the new technology trend of combining cloud with mobile devices.

In this paper, we present a domain specific language (DSL) that is purposely created for generating hybrid applications spanning across mobile devices as well as computing clouds. We propose a model-driven development process that makes use of a DSL to provide sufficient programming abstractions over both cloud and mobile features. We …


Enhance And "Mobilize" The Library Catalog With Cloud Services, Jolinda Thompson Mar 2011

Enhance And "Mobilize" The Library Catalog With Cloud Services, Jolinda Thompson

Himmelfarb Library Faculty Publications

Explores new products and services that make it possible to enhance and mobilize traditional library catalogs.


Role Of Cloud Computing Interventions For Micro-Enterprise Growth: Implications For Global Development, Sajda Qureshi, Mehruz Kamal Jan 2011

Role Of Cloud Computing Interventions For Micro-Enterprise Growth: Implications For Global Development, Sajda Qureshi, Mehruz Kamal

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

While the majority of businesses around the world are micro-enterprises, they are the most vulnerable and are often run by people with limited resources, and skills to be able to avail the benefits of Information and Communication Technologies (ICTs). These are a form of small business which employs between 1-5 people and face challenges of limited resources, skills and ability to grow. When they do adopt IT their potential to survive and grow increases as they are then able to participate in the global economy. The challenge for global development lies in enabling these micro-enterprises to adopt the appropriate IT …


The Cloud Agnostic E-Science Analysis Platform, Ajith Harshana Ranabahu, Paul E. Anderson, Amit P. Sheth Jan 2011

The Cloud Agnostic E-Science Analysis Platform, Ajith Harshana Ranabahu, Paul E. Anderson, Amit P. Sheth

Kno.e.sis Publications

The amount of data being generated for e-Science domains has grown exponentially in the past decade, yet the adoption of new computational techniques in these fields hasn't seen similar improvements. The presented platform can exploit the power of cloud computing while providing abstractions for scientists to create highly scalable data processing workflows.


An Empirical Study Of Challenges In Managing The Security In Cloud Computing, Bupesh Mansukhani, Tanveer A. Zia Jan 2011

An Empirical Study Of Challenges In Managing The Security In Cloud Computing, Bupesh Mansukhani, Tanveer A. Zia

Australian Information Security Management Conference

Cloud computing is being heralded as an important trend in information technology throughout the world. Benefits for business and IT include reducing costs and increasing productivity. The downside is that many organizations are moving swiftly to the cloud without making sure that the information they put in the cloud is secure. The purpose of this paper is to learn from IT and IT security practitioners in the Indian Continent the current state of cloud computing security in their organizations and the most significant changes anticipated by respondents as computing resources migrate from on-premise to the cloud. As organizations grapple with …


A Break In The Clouds: Towards A Cloud Definition, Chris Rose Jan 2011

A Break In The Clouds: Towards A Cloud Definition, Chris Rose

Walden Faculty and Staff Publications

This paper discusses the concept of Cloud Computing to achieve a complete definition of what a Cloud is, using the main characteristics typically associated with this paradigm in the literature. More than 20 definitions have been studied allowing for the extraction of a consensus definition as well as a minimum definition containing the essential characteris- tics. This paper pays much attention to the Grid paradigm, as it is often confused with Cloud technologies. We also de- scribe the relationships and distinctions between the Grid and Cloud approaches.