Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
-
- Katarina Grolinger (2)
- Research Collection School Of Computing and Information Systems (2)
- UBT International Conference (2)
- Akram YM Sarhan (1)
- Australian Digital Forensics Conference (1)
-
- C. Jason Woodard (1)
- Computer Science Faculty Publications (1)
- Computer Science Theses & Dissertations (1)
- Dissertations and Theses Collection (Open Access) (1)
- Journal of Digital Forensics, Security and Law (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
- Wayne State University Theses (1)
- Publication Type
- File Type
Articles 1 - 15 of 15
Full-Text Articles in Physical Sciences and Mathematics
A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu
A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu
Research Collection School Of Computing and Information Systems
Recent research on cloud computing adoption indicates that there has been a lack of deep understanding of its benefits by managers and organizations. This has been an obstacle for adoption. We report on an initial design for a firm-level cloud computing readiness metrics suite. We propose categories and measures to form a set of metrics to measure adoption readiness and assess the required adjustments in strategy and management, technology and operations, and business policies. We reviewed the relevant interdisciplinary literature and interviewed industry professionals to ground our metrics based on theory and practice knowledge. We identified four relevant categories for …
Authentication In Saas By Implementing Double Security Measures, Muhamet Gërvalla, Shkëlqim Berisha
Authentication In Saas By Implementing Double Security Measures, Muhamet Gërvalla, Shkëlqim Berisha
UBT International Conference
Growing trends of services offered in the field of Cloud Computing are increasing on daily basis. These services are divided into three models: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Despite this, much interest is shown to the usage of Software as a Service (SaaS) model. This model offers the usage of software’s that are hosted in Cloud that can be accessed by using web browsers or through “thin client”. Security and privacy are two most important problems that can occur in this model. Authentication through password is one of the …
The Impacts Of Cloud Computing And Big Data Applications On Developing World-Based Smallholder Farmers, Nir Kshetri
The Impacts Of Cloud Computing And Big Data Applications On Developing World-Based Smallholder Farmers, Nir Kshetri
UBT International Conference
Cloud computing and big data applications are likely to have far-reaching and profound impacts on developing world-based smallholder farmers. Especially, the use of mobile devices to access cloud-based applications is a promising approach to deliver value to smallholder farmers in developing countries since according to the International Telecommunication Union, mobile-cellular penetration in developing countries is expected to reach 90% by the end of 2014. This article examines the contexts, mechanisms, processes and consequences associated with cloud computing and big data deployments in farming activities that could affect the lives of developing world-based smallholder farmers. We analyze the roles of big …
An Approach To Identity Management In Clouds Without Trusted Third Parties, Akram Y. Sarhan, Leszek T. Lilien
An Approach To Identity Management In Clouds Without Trusted Third Parties, Akram Y. Sarhan, Leszek T. Lilien
Akram YM Sarhan
The management of sensitive data, including identity management (IDM), is an important problem in cloud computing, fundamental for authentication and fine-grained service access control. Our goal is creating an efficient and robust IDM solution that addresses critical issues in cloud computing. The proposed IDM scheme does not rely on trusted third parties (TTPs) or trusted dealers. The scheme is a multiparty interactive solution that combines RSA distributed key generation and attribute-based encryption. We believe that it will be a robust IDM privacy-preserving solution in cloud computing, because it has the following features: (i) protects sensitive data on untrusted hosts using …
Gate Monte Carlo Simulations In A Cloud Computing Environment, Blake Austin Rowedder
Gate Monte Carlo Simulations In A Cloud Computing Environment, Blake Austin Rowedder
UNLV Theses, Dissertations, Professional Papers, and Capstones
The GEANT4-based GATE is a unique and powerful Monte Carlo (MC) platform, which provides a single code library allowing the simulation of specific medical physics applications, e.g. PET, SPECT, CT, radiotherapy, and hadron therapy. However, this rigorous yet flexible platform is used only sparingly in the clinic due to its lengthy calculation time. By accessing the powerful computational resources of a cloud computing environment, GATE's runtime can be significantly reduced to clinically feasible levels without the sizable investment of a local high performance cluster. This study investigated a reliable and efficient execution of GATE MC simulations using a commercial cloud …
Resource Allocation In Vehicular Cloud Computing, Puya Ghazizadeh
Resource Allocation In Vehicular Cloud Computing, Puya Ghazizadeh
Computer Science Theses & Dissertations
Recently, we have witnessed the emergence of Cloud Computing, a paradigm shift adopted by information technology (IT) companies with a large installed infrastructure base that often goes under-utilized. The unmistakable appeal of cloud computing is that it provides scalable access to computing resources and to a multitude of IT services. Cloud computing and cloud IT services have seen and continue to see a phenomenal adoption rate around the world.
Recently, Professor Olariu and his coworkers through series of research introduced a new concept, Vehicular Cloud Computing. A Vehicular Cloud (VC) is a network of vehicles in a parking lot …
Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard
Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard
C. Jason Woodard
Our paper focuses on strategic decision making in layered business ecosystems, highlighting the role of cross-layer interactions in shaping choices about product design and platform governance. Based on evidence from the cloud computing ecosystem, we analyze how concerns about architectural control and expectations regarding future value migration influence the design of product interfaces and the degree of openness to external contributions. We draw on qualitative longitudinal data to trace the development of two open-source platforms for managing cloud-based computing resources. We focus in particular on the emergence of a layered "stack" in which these platforms must compete with both vertically …
Joint Virtual Machine And Bandwidth Allocation In Software Defined Network (Sdn) And Cloud Computing Environments, Jonathan David Chase, Rakpong Kaewpuang, Wen Yonggang, Dusit Niyato
Joint Virtual Machine And Bandwidth Allocation In Software Defined Network (Sdn) And Cloud Computing Environments, Jonathan David Chase, Rakpong Kaewpuang, Wen Yonggang, Dusit Niyato
Research Collection School Of Computing and Information Systems
Cloud computing provides users with great flexibility when provisioning resources, with cloud providers offering a choice of reservation and on-demand purchasing options. Reservation plans offer cheaper prices, but must be chosen in advance, and therefore must be appropriate to users' requirements. If demand is uncertain, the reservation plan may not be sufficient and on-demand resources have to be provisioned. Previous work focused on optimally placing virtual machines with cloud providers to minimize total cost. However, many applications require large amounts of network bandwidth. Therefore, considering only virtual machines offers an incomplete view of the system. Exploiting recent developments in software …
Cloud Computing For Detecting High-Order Genome-Wide Epistatic Interaction Via Dynamic Clustering, Xuan Guo, Yu Meng, Ning Yu, Yi Pan
Cloud Computing For Detecting High-Order Genome-Wide Epistatic Interaction Via Dynamic Clustering, Xuan Guo, Yu Meng, Ning Yu, Yi Pan
Computer Science Faculty Publications
Backgroud: Taking the advan tage of high-throughput single nucleotide polymorphism (SNP) genotyping technology, large genome-wide association studies (GWASs) have been considered to hold promise for unravelling complex relationships between genotype and phenotype. At present, traditional single-locus-based methods are insufficient to detect interactions consisting of multiple-locus, which are broadly existing in complex traits. In addition, statistic tests for high order epistatic interactions with more than 2 SNPs propose computational and analytical challenges because the computation increases exponentially as the cardinality of SNPs combinations gets larger. Results: In this paper, we provide a simple, fast and powerful method using dynamic clustering and …
Pricing Strategy For Cloud Computing Services, Jianhui Huang
Pricing Strategy For Cloud Computing Services, Jianhui Huang
Dissertations and Theses Collection (Open Access)
The cloud computing services market exhibits unique characteristics such as instant accessibility, fluctuating demand and supply, and interruptible service provision. Various pricing mechanisms exist in current industry practice. None of these pricing mechanisms, however, is comprehensive enough to capture all these features in a way that allows the vendors to optimize resource allocation. This dissertation identifies key factors related to cloud computing pricing, and examines their interplays. This research uses multiple approaches, including a market survey, game theory modeling, simulation, lab experiments and econometric modeling, to analyze the pricing strategy of cloud services vendors. A field study of a representative …
Knowledge As A Service Framework For Disaster Data Management, Katarina Grolinger, Emna Mezghani, Miriam Capretz, Ernesto Exposito
Knowledge As A Service Framework For Disaster Data Management, Katarina Grolinger, Emna Mezghani, Miriam Capretz, Ernesto Exposito
Katarina Grolinger
Each year, a number of natural disasters strike across the globe, killing hundreds and causing billions of dollars in property and infrastructure damage. Minimizing the impact of disasters is imperative in today’s society. As the capabilities of software and hardware evolve, so does the role of information and communication technology in disaster mitigation, preparation, response, and recovery. A large quantity of disaster-related data is available, including response plans, records of previous incidents, simulation data, social media data, and Web sites. However, current data management solutions offer few or no integration capabilities. Moreover, recent advances in cloud computing, big data, and …
Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz
Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz
Katarina Grolinger
: Advances in Web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This work focuses on the storage aspect of cloud computing, specifically on data management in cloud environments. Traditional relational databases were designed in a different hardware and software era and are facing challenges in meeting the performance and scale requirements of Big Data. NoSQL and NewSQL data stores present themselves as alternatives that can handle huge volume of data. Because of the …
A State-Of-The-Art Review Of Cloud Forensics, Sameera Almulla, Youssef Iraqi, Andrew Jones
A State-Of-The-Art Review Of Cloud Forensics, Sameera Almulla, Youssef Iraqi, Andrew Jones
Journal of Digital Forensics, Security and Law
Cloud computing and digital forensics are emerging fields of technology. Unlike traditional digital forensics where the target environment can be almost completely isolated, acquired and can be under the investigators control; in cloud environments, the distribution of computation and storage poses unique and complex challenges to the investigators. Recently, the term “cloud forensics” has an increasing presence in the field of digital forensics. In this state-of-the-art review, we included the most recent research efforts that used “cloud forensics” as a keyword and then classify the literature into three dimensions: (1) survey-based, (2) technology-based and (3) forensics-procedural-based. We discuss widely accepted …
Truthful Mechanisms For Resource Allocation And Pricing In Clouds, Mahyar Movahednejad
Truthful Mechanisms For Resource Allocation And Pricing In Clouds, Mahyar Movahednejad
Wayne State University Theses
A major challenging problem for cloud providers is designing efficient mechanisms for
Virtual Machine (VM) provisioning and allocation. Such mechanisms enable the cloud
providers to effectively utilize their available resources and obtain higher profits. Recently,
cloud providers have introduced auction-based models for VM provisioning and allocation
which allow users to submit bids for their requested VMs. We formulate the dynamic
VM provisioning and allocation problem for the auction-based model as an integer program
considering multiple types of resources. We then design truthful greedy and optimal
mechanisms for the problem such that the cloud provider provisions VMs based on the
requests …
A Forensically-Enabled Iaas Cloud Computing Architecture, Saad Alqahtany, Nathan Clarke, Steven Furnell, Christoph Reich
A Forensically-Enabled Iaas Cloud Computing Architecture, Saad Alqahtany, Nathan Clarke, Steven Furnell, Christoph Reich
Australian Digital Forensics Conference
Current cloud architectures do not support digital forensic investigators, nor comply with today’s digital forensics procedures largely due to the dynamic nature of the cloud. Whilst much research has focused upon identifying the problems that are introduced with a cloud-based system, to date there is a significant lack of research on adapting current digital forensic tools and techniques to a cloud environment. Data acquisition is the first and most important process within digital forensics – to ensure data integrity and admissibility. However, access to data and the control of resources in the cloud is still very much provider-dependent and complicated …