Article

The NIST definition of cloud computing

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... NIST defines cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service Provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models [3]. Cloud forensics is a process applied to an implementation of this cloud model. ...
... The data gathered was inserted into two tables (shown in Annex A) that currently list 62 challenges, including challenge descriptions, results of overcoming the challenges, relevance of cloud computing essential characteristics [3], correlations between challenges and functionalcapabilities, categories of the challenges, and relevant references in the literature. ...
... Additionally, the team targeted only the digital forensic challenges unique to or exacerbated by the cloud environment. To assist in filtering out the challenges that do not have a cloud-based root cause, the team analyzed each challenge through the lens of the five essential characteristics of the cloud computing model as defined in The NIST Definition of Cloud Computing [3]. These characteristics are used to identify whether a challenge has a cloud-based root cause. ...
Technical Report
Full-text available
This document summarizes research performed by the members of the NIST Cloud Computing Forensic Science Working Group and aggregates, categorizes, and discusses the forensics challenges faced by experts when responding to incidents that have occurred in a cloud-computing ecosystem. The challenges are presented along with the associated literature that references them. The immediate goal of the document is to begin a dialogue on forensic science concerns in cloud computing ecosystems. The long-term goal of this effort is to gain a deeper understanding of those concerns (challenges) and to identify technologies and standards that can mitigate them.
... Cloud computing is an IT solution in which IT services (hardware and software) are provisioned and used remotely by organizations through the internet as a subscription (pay-asyou-use) service managed and controlled by cloud computing providers Vaquero et al. (2008) , Leavitt (2009) , Mell et al. (2011. The organizations do not own and maintain any IT services as they only request what they need, and pay only for what they have consumed. ...
... Cloud computing services are IT services, where organizations are charged and pay for what they consumed. Cloud computing is an IT solution in which IT services (hardware and software) are provisioned and used remotely by organizations through the internet as a subscription (pay-as-you-use) service managed and controlled by cloud computing providers Vaquero et al. (2008) , Leavitt (2009) , Mell et al. (2011. The organizations do not own and maintain any IT services as they only request what they need, and pay only for what they have consumed. ...
... Cloud computing services are IT services, where organizations are charged and pay for what they consumed. From the definitions and according to the US National Institute of Standards and Technology (NIST) and Mell et al. (2011), the characteristics of cloud computing are: on-demand self-service, broad network access, resource pooling, rapid provisioning (elasticity) and pay-as-you-use ( Buyya et al. (2009) , Rosenthal et al. (2010 , Mell et al. (2011)). There are three main cloud service models, namely Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) ( Subashini & Kavitha (2011), Rountree & Castrillo (2013) ). ...
Article
Cloud computing has taken over the IT industry. Big enterprises such as Oracle, Microsoft and Amazon have developed world class state of the art products and services for Cloud Computing. These products serve and the needs and power many corporations, business institutions and enterprises across the world. Cloud computing is continuing to growing and attracting more businesses and birthing and transforming industries such as music streaming and online gaming. As we progress and move towards a 5G and become a 4th industrial society more cloud computing products and services will be developed and used. However, there are many issues that arise such as stability, reliability, security and fraud. Addressing these problems introduces complexity towards adopting cloud comput ing for small business enterprises leaving only big enterprises to be able to afford reliable cloud computing products. There are many outstanding works that have been previously published by scholars on cloud computing. This research paper provides a systematic review and a summary of some the outstanding works of scholars recently published and the different criterias used for clouding computing adoption by South African Institutions and Business enterprises.
... Bu bulut sisteminde donanım ve yazılım gibi bulut hizmetleri bu kaynakları kullanmak isteyen her kullanıcıya sağlanmakla birlikte Google, Oracle, Microsoft gibi işletmelerin kendi veri hizmetleri üzerinde sunmuş oldukları PaaS, Iaas ve SaaS hizmetlerinin bütününü ifade etmektedir (Okutucu, 2012: 51). Diğer bir ifadeyle bulut altyapısı web teknolojisi aracılığıyla herkese açık, genel olarak kullanıma sunulmakta ve bulut bilişim sistemi sunan üçüncü bir işletmeye, satıcıya ait olmakta ve internet üzerinden herkesin genel kullanımına açık bulunan tüm hizmetlerin internetten paylaşılmasıyla işletilmektedir (Mell ve Grance, 2011). ...
... Bu anlamda maliyetli bir çözüm olarak veriler açısından daha güvenli bir depolama ortamı sağlanmış olur (Okutucu, 2012: 52). Bu kapsamda özel bulut sistemi sadece belirli özel bir kuruluşa verilen bulut hizmetidir (Mell ve Grance, 2011). Özel bulut sistemi ile işletmeler kendi yapılarını daha fazla esneklik-le ve daha az maliyetle işletebilmekte, güvenlik unsularını kendi inisiyatifleriyle yönetebilmektedirler (Rimal vd., 2011). ...
... Hibrit Bulut: Bu sistemde bulut sistemlerinin birkaçı birlikte kullanılabilir (Mell ve Grance, 2011). Bu model topluluk, genel ve özel bulut modellerinin birlerşimlerinden yeni bir bulut sisteminin oluşturulması şeklinde kullanılmakta olup hibrit modelde kütüphane gibi kullanıcısı yoğun olan özel içerikli hassas bilgiler depolayan sistemlerin yönetilmesinde ve verilerin depolanmasında daha fazla kontrol gerekli olduğu durumlarında kullanılmaktadır (Kamila, 2013: 12). ...
... NIST was designated by the Federal Chief Information Officer (CIO) Vivek Kundra as the body tasked with outlining technical standards for cloud computing in the United States. According to NIST, Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [PM11]. In the definition of cloud computing, NIST includes five key actors as illustrated in Figure 2.1 and as further expatiated in Figure 2.2. ...
... • software as a service (SaaS) [Moh20]. The NIST defines IaaS as the capability provided to the consumer to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications [PM11]. Infrastructure as a Service (IaaS) provides the basic building blocks for cloud computing such as computing infrastructure and critical computing resources including virtualizations, servers, network infrastructure, and network-accessible storage that allow consumers to run arbitrary software [Liu11]. ...
... This service model allows users to deploy applications without purchasing, managing, and maintaining related infrastructure. NIST defines Platform as a Service (PaaS) as the capability provided to the consumer to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider [PM11]. PaaS is used as a tool for the development of applications controlled by a third party for the user [Kra18]. ...
Thesis
Full-text available
Cloud computing is the on-demand delivery of computing resources over the Internet. Cloud services present one of the most progressive and rapidly growing areas in the IT sector, with projections showing that the demand for cloud computing services will reach approximately 791.48 billion dollars by 2028. However, whilst the sector shows massive potential and ben- efits such as scalability, cost efficiency, easy accessibility, flexibility, and Increased productivity, there are extensive risks and threats associated with it. The increasing amount of confidential data stored in multi-cloud environments leaves organizations more exposed to attacks. This is of significant concern to businesses including organizations still considering a migration to cloud computing, thereby posing a consequential threat to cloud-enabled business transfor- mation. Depending on several factors and business requirements, organizations may choose between different cloud computing deployment or service models. The choice of models de- termines the scope of control between the cloud service providers (CSPs) and cloud consumers and ultimately defines the security responsibilities between the two. By means of a systematic literature review (SLR), this research identifies 18 threats including Data breaches, loss, and leakage, Infrastructure vulnerabilities, Identity and access management, Insecure interfaces and APIs, Insider threats, External attacks, Cloud misconfiguration, etc., as the top security concerns of cloud migration that affects business transformation. This is followed by an extensive study of these identified threats and a case study on eBay, a leading online marketplace. To mitigate these established security concerns, security measures such as examining baseline security, es- tablishing an adequate cloud security strategy, utilizing proper setups, and establishing proper logging and monitoring measures are some good practices to adopt during the process of cloud migration. Other cloud migration protocols to consider include establishing a strategic plan, a definition of the migration scope, and identifying milestones and KPIs.
... Cloud computing is defined by the National Institute of Standards and Technology (NIST) as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (Mell, P. & Grance, T, 2010). This notion of Cloud Computing is in itself nothing new, it encompasses existing technologies such as centralized, distributed and utility computing and the concept of virtualization (Zhang, Cheng, & Boutaba, 2010). ...
... Cloud services are offered through four deployment models, namely, private, public, community, and hybrid (Mell & Grance, 2010). First, the private cloud deployment offers internal utilization of technologies that are maintained in house (Yang & Tate, 2012). ...
... There are three-main cloud service delivery models: software-as-a-service (SaaS), platform-as-aservice (PaaS) and infrastructure-as-a-service (IaaS) (Mell & Grance, 2010). The SaaS delivery model is based on servers, bandwidth and software that are offered and managed by a service provider. ...
Article
Full-text available
Cloud computing is evolving as a firsthand archetype of large-scale distributed computing which adds more power to internet technologies. It is a framework aiming at convenient and on-request network access to an organized and shared pool of resources. Security of data transmitted and stored by a third party happens to be the greatest challenge for organizations embracing the technology. In this work, a proposed hybrid algorithm dubbed the Soldier Ant Algorithm (SAA) a blend of the Diffie-Hellman algorithm and Delta Encoding technique (Newton Forward and Backward Interpolation). The motivation obtained is the integration of algorithms for cryptography purposes. The integration makes the proposed SAA algorithm symmetric and also makes the Diffie-Hellman algorithm withstand security threats such as man-in-the-middle attacks. The proposed algorithm establishes a secured connection between the cloud client and the cloud service provider and at the same time secures the data sent to the cloud. A comparative analysis was performed against RSA and ElGamal and indicated that the proposed algorithms’ encryption and decryption time were lower even though it is linear (O(n)).
... Cloud computing offers a variety of benefits, including scalability and manageability [16]. The National Institute of Standards and Technology (NIST) defines cloud computing as "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction" [17]. ...
... NIST also defines three service models (i.e., Software as a Service, Platform as a Service, and Infrastructure as a Service) and four deployment models (i.e., private, community, public, and hybrid) [17]. ...
... Given their enormous merits, PHR systems have attracted extensive interest worldwide. Cloud computing, as a resource provision platform, offers users mass storage space, powerful computing capability, and ubiquitous access service, which is like the traditional public utility, such as water and electricity [3]. In the pursuit of universal accessibility and low cost, in practice, the PHR service providers usually resort to the cloud server to store and share their PHRs data. ...
... The interaction between each entity is shown in Fig. 2, and the specific workflow of the BC-PC-Share scheme (the description of each numbered step) in Fig. 2 can be described as follows. 1 The patient (PHR data owner, DO) encrypts his/her PHR data to be outsourced and uploads the generated ciphertext to the cloud server for storage. 2 The DO generates the storage authentication information for the outsourced PHR data and sends it to the smart contracts for storage verification. 3 The cloud server generates the storage validation request and sends it to the smart contracts for storage validation verification. If the storage verification is passed, the smart contracts send the storage authentication information as a transaction to the blockchain. ...
... However, in public cloud the infrastructure is made available to the general public. In hybrid cloud, the cloud infrastructure is a composition of two or more deployment models that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (Mell & Grance, 2009). ...
Article
The challenges of mobile devices such as limited bandwidth, computing, and storage have led manufacturers and service providers to develop new value-added mobile services. To address these limitations , mobile cloud computing, which offers on-demand services including platforms, infrastructure, and software have been developed. This study attempts to build a significantly improved research framework based on the Technology Acceptance Model in order to identify factors that affect students' attitudes toward and intentions in using mobile cloud storage services. A structural equation model was used to assess the proposed model based on the data collected from 262 undergraduate students. Results show that perceived usefulness, subjective norm, and trust have a significantly positive effect on the attitude, which in turn is a significant predictor of behavioral intentions. The research model, which explains 82% of the variance in attitudes toward using mobile cloud storage services has a strong predictive power. The findings have both theoretical and practical implications for academics, managers, and educational institutions.
... Revista BASEv.20,n.4, outubro/dezembro 2022 Data Cloud is described as the technique that enables access and sharing of data, software and resources between people through the internet, in a ubiquitous and convenient way (Mell, & Grance, 2011;Tan et al., 2018). The data cloud can be offered in a service format and on demand, enabling a minimum interaction effort from the service provider, in which you pay based on your use and storage of information (Sajay, Babu, & Vijayalakshmi, 2019). ...
Article
Full-text available
This paper aims to map the main digital solutions practiced by entrepreneurs of Cleantech companies. Entrepreneurs from 12 Cleantech (Clean Technology) companies in the Brazilian energy sector were interviewed, using a qualitative research approach. Big Data & Data Analytics, Internet of Things and Artificial Intelligence were identified as digital technologies enablers of a sustainable energy transition for the sector. The study presents the relation and behavior of each technology with the sustainability triple bottom line and introduces a framework on how digital solutions contribute to solving the main bottlenecks in the electricity sector in a sustainable way. Research shown that Cleantechs also operationalize digital technologies like Blockchain and 5G to enable energy transformation as it has emerged as research findings. Additionally, technology and digitalization in conjunction with entrepreneur's capacity for innovation are driving mechanisms for companies in the initial stage of the energy sector, exploring regulatory loopholes and putting their business models into practice.
... La computación en la Computación en la Nube o Cloud Computing es un modelo que permite el acceso ubicuo, conveniente y bajo demanda, a un conjunto compartido de recursos informáticos configurables (por ejemplo, redes, servidores, almacenamiento, aplicaciones y servicios), que pueden aprovisionarse y liberarse rápidamente, con un mínimo esfuerzo de administración o interacción del proveedor de servicios (Mell & Grance, 2011). Existen tres categorías para servicios en la nube: ...
Book
Full-text available
Se enfoca en los pilares esenciales de la transformación digital y provee conceptos, buenas prácticas y lecciones aprendidas, dirigido a satisfacer un amplio grupo de lectores que van desde los profesionales de las TIC hasta los decisores en todos los sectores, pues la transformación digital es un proceso que impacta a todas las esferas de actuación humana. Hilvanado desde una caracterización conceptual de la transformación digital que nos lleva a reflexionar por qué necesitamos asumirla, el libro se adentra en las arquitecturas e infraestructuras claves para su desarrollo, con foco en la interoperabilidad y la ciberseguridad, como bloques fundamentales para soportar su implementación. Especial atención merecen los capítulos que describen el estado y los desafíos del gobierno digital en Cuba, junto al papel que desempeña el Observatorio de Gobierno Digital, para seguir el progreso de sus principales indicadores y las plataformas digitales, para incentivar los servicios de cara a la ciudadanía.
... The US National Institute of Standards and Technology (NIST) has defined cloud computing [3]:" A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction". It is considered a very effective, suitable and centralized sharing pool through which computer resources can be deployed and accessed with minimum overhead. ...
Article
Full-text available
Over the past several years, cloud service becomes one of the major subjects of IT, and the major topic is cloud data storage, due to the advantages of cloud service such as flexibility, mobility, costs saving, and easy to use. Cloud services provide multiple services to users over the internet. These advantages drove individuals and organizations moved their applications, data, and services to the cloud storage server. The main concerns of these services are security and privacy when the individuals and organizations are saved private data or information (sensitive data or information) in untrusted servers because of the traditional methods that used to authenticate users such as passwords, tokens and digital certificate these credentials may be often be stolen, wrongly revealed or difficult to remember, thus companies and individuals require a secure method to authenticate their users in order to ensure the functionality of their services and data saved in the cloud storages are working in a secure environment, and prevent leakage any information for users and individuals to any untrusted party. In this paper, propose a biometric-based security and authentication paradigm to help user's authentication in the cloud storage environment,used fingerprint as a biometric to an untrusted user to login to the cloud services.
... Distinctive virtual and physical resources are allocated and reallocated to enhance services according to consumer demand. In addition, computing facilities are accessible through any device that is available, such as smartphones, tablets, laptops, and desktop computers (Zhang, et al. 2010;Mell & Grance, 2011). Moreover, one of the most significant characteristics of cloud computing is reduced costs. ...
Article
Full-text available
The purpose of the study was to ascertain the extent of awareness of cloud computing for teaching and learning in tertiary institutions in Enugu State. Two research questions were formulated to guide the study, while two null hypotheses were tested. Descriptive survey research design was adopted for the study. The population for the study comprised 380 lecturers in tertiary institutions in Enugu State. The sample size for the study comprised 84 lecturers in the state government-owned tertiary institutions (ESUT, IMT and ESCET). A researcher-made structured questionnaire titled Extent of Awareness of Cloud Computing Questionnaire (EACCQ) was used as the instrument for data collection. The instrument was face-validated by three experts from the Department of Mathematics and Computer Education; one expert in Measurement and Evaluation, and the other two in Computer Education, ESUT. An overall reliability index of 0.80 was obtained for the instrument, using Cronbach Alpha. The researcher, with two trained research assistants, visited each of the state government owned tertiary institutions to administer the questionnaire to the respondents. The research questions were answered with mean and standard deviation while hypotheses were tested with Analysis of Variance (ANOVA) at 0.05 level of significance. The results of analysis showed that the extent of awareness of Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) in tertiary institutions were low. The mean scores of the lecturers did not differ significantly. Based on the findings of the study, it was recommended that conferences and workshops on cloud computing application in education should be organised by the government for lecturers in tertiary institutions, and the Tertiary Education Trust Fund (TETfund) should assist tertiary institutions in providing state-of-the-art ICT facilities needed to drive cloud computing in tertiary institutions among others.
... There is no Security implemented apart from Encryption Zheng Qin & et.al.,(2021). [3] : With the proliferation of cloud computing, data owners can outsource the spatial data from the Internet of Things devices to a cloud server to enjoy the pay-as-you-go storage resources and location-based services. However, the outsourced services may raise privacy concerns, since the cloud server may not be fully trusted by both data owners and search users. ...
Article
Nowadays every possible transaction is occurring online so for all these transactions required security must be provided. It is not easy to produce such security since there will be a huge amount of data involved here as well as stored data must be kept confidential so to achieve these things we need to perform transactions through the cloud. Since technology has been developed the rate of the cloud being attacked is also increased so to prevent this integration two clouds must be used. The existing system does not apply cloud integration instead of that they use only data encryption for secure transactions. In the Proposed system of the project apart from data encryption cloud integration is also gets implemented here to establish transactions more securely. In this proposed system, we implement three levels of security which are low, medium, and high. Here We use only data encryption for low security level and in medium security level splitting of data occur along with data encryption to establish more secure transaction than low security level. Finally in order to produce a higher security level we use both cloud integration and splitting of data along with data encryption to produce transactions more securely than medium security level.
... The existing deployment models of cloud computing can be divided into the following three types [30]: public clouds, where the cloud infrastructure is made available for public development use; private clouds, in which the cloud infrastructure is dedicated to a single organization; hybrid clouds, in which the cloud infrastructure is a hybrid of several different cloud infrastructures. Cloud brokers serve as intermediaries between cloud providers and users, providing multi-cloud based services to help users avoid vendor lock-in, i.e., addressing the lack of support for cloud interoperability and portability in cloud environments. ...
Article
Full-text available
The virtual machine (VM) scheduling problem in cloud brokers that support cloud bursting is fraught with uncertainty due to the on-demand nature of Infrastructure as a Service (IaaS) VMs. Until a VM request is received, the scheduler does not know in advance when it will arrive or what configurations it demands. Even when a VM request is received, the scheduler does not know when the VM’s lifecycle expires. Existing studies begin to use deep reinforcement learning (DRL) to solve such scheduling problems. However, they do not address how to guarantee the QoS of user requests. In this paper, we investigate a cost optimization problem for online VM scheduling in cloud brokers for cloud bursting to minimize the cost spent on public clouds while satisfying specified QoS restrictions. We propose DeepBS, a DRL-based online VM scheduler in a cloud broker which learns from experience to adaptively improve scheduling strategies in environments with non-smooth and uncertain user requests. We evaluate the performance of DeepBS under two request arrival patterns which are respectively based on Google and Alibaba cluster traces, and the experiments show that DeepBS has a significant advantage over other benchmark algorithms in terms of cost optimization.
... Gartner mendefinisikan komputasi awan sebagai suatu cara menggunakan komputer dengan disertai kemampuan melakukan pemilihan skala TI secara masif yang disampaikan dalam bentuk suatu layanan ('as a service') bagi pengguna eksternal dengan mempergunakan teknologi Internet [4]. Sementara itu National Institute of Standards and Technology (NIST) mendefinisikan komputasi awan sebagai suatu model akses jaringan sesuai permintaan yang dapat dilayani dengan mudah dan dimana saja berada atas kelompok sumber daya komputasi secara bersama-sama, dapat dikonfigurasi yg dapat secara cepat disediakan dan disampaikan melalui manajemen atau interaksi penyedia layanan secara minimal [5]. ...
Article
Full-text available
Perkembangan industri teknologi informasi dewasa ini terjadi begitu cepat dan merambah pada berbagai sisi kehidupan. Komputasi awan sebagai teknologi komputer berbasis jaringan mulai banyak diadopsi oleh organisasi bisnis untuk meningkatkan efisiensi perusahaan. Teknologi cloud juga mulai diadopsi oleh lembaga pemerintahan untuk menyederhanakan proses bisnis dan mendorong efisiensi organisasi. Namun demikian, proses implementasi komputasi awan pada organisasi pemerintahan masih berjalan agak lambat dibandingkan dengan organisasi komersial. Komputasi awan belum secara maksimal diadopsi oleh organisasi pemerintahan. Melalui paper ini, penulis menuangkan gagasan bagaimana seharusnya model implementasi komputasi awan pada organisasi pemerintahan.
... According to NIST [11], cloud computing resources includes Iaas (Infrastructure as a Service), SaaS (Software as a Service) and PaaS (Platform as a Service). The dispersion of the resources makes cloud computing has wider coverage across the world. ...
Preprint
Full-text available
Working set size estimation (WSS) is of great significance to improve the efficiency of program executing and memory arrangement in modern operating systems. Previous work proposed several methods to estimate WSS, including self-balloning, Zballoning and so on. However, these methods which are based on virtual machine usually cause a large overhead. Thus, using those methods to estimate WSS is impractical. In this paper, we propose a novel framework to efficiently estimate WSS with eBPF (extended Berkeley Packet Filter), a cutting-edge technology which monitors and filters data by being attached to the kernel. With an eBPF program pinned into the kernel, we get the times of page fault and other information of memory allocation. Moreover, we collect WSS via vanilla tool to train a predictive model to complete estimation work with LightGBM, a useful tool which performs well on generating decision trees over continuous value. The experimental results illustrate that our framework can estimate WSS precisely with 98.5\% reduction in overhead compared to traditional methods.
... In 2011, the National Institute of Standards and Technology (NIST) of the United States Department of Commerce defined CC as a model for enabling anywhere, convenient, on-demand network access to a set of shared and configurable computing resources (servers, storage, services, etc.) that can be provided and released quickly and with very little effort. This model is mainly composed of three service models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) [3]. ...
Article
Full-text available
Most recent edge and fog computing architectures aim at pushing cloud-native traits at the edge of the network, reducing latency, power consumption, and network overhead, allowing operations to be performed close to data sources. To manage these architectures in an autonomous way, systems that materialize in specific computing nodes must deploy self-* capabilities minimizing human intervention across the continuum of computing equipment. Nowadays, a systematic classification of such capabilities is missing, as well as an analysis on how those can be implemented. For a system owner in a continuum deployment, there is not a main reference publication to consult to determine what capabilities do exist and which are the sources to rely on. In this article, a literature review is conducted to analyze the self-* capabilities needed to achieve a self-* equipped nature in truly autonomous systems. The article aims to shed light on a potential uniting taxonomy in this heterogeneous field. In addition, the results provided include conclusions on why those aspects are too heterogeneously tackled, depend hugely on specific cases, and shed light on why there is not a clear reference architecture to guide on the matter of which traits to equip the nodes with.
... It improves ethical and sustainable operations and eases production processes (Kumar et al., 2020). Typically, CSPs offer three types of services: IaaS 1 , PaaS 2 , and SaaS 3 (Mell & Grance, 2011). IaaS abstracts physical hardware, such as servers and networks, in the form of virtual servers or virtual storage, providing cloud customers with various components of a computing environment. ...
Article
Full-text available
The rapid growth of advanced technologies such as cloud computing in the Industry 4.0 era has provided numerous advantages. Cloud computing is one of the most significant technologies of Industry 4.0 for sustainable development. Numerous providers have developed various new services, which have become a crucial ingredient of information systems in many organizations. One of the challenges for cloud computing customers is evaluating potential providers. To date, considerable research has been undertaken to solve the problem of evaluating the efficiency of cloud service providers (CSPs). However, no study addresses the efficiency of providers in the context of an entire supply chain, where multiple services interact to achieve a business objective or goal. Data envelopment analysis (DEA) is a powerful method for efficiency measurement problems. However, the current models ignore undesirable outputs, integer-valued, and stochastic data which can lead to inaccurate results. As such, the primary objective of this paper is to design a decision support system that accurately evaluates the efficiency of multiple CSPs in a supply chain. The current study incorporates undesirable outputs, integer-valued, and stochastic data in a network DEA model for the efficiency measurement of service providers. The results from a case study illustrate the applicability of our new system. The results also show how taking undesirable outputs, integer-valued, and stochastic data into account changes the efficiency of service providers. The system is also able to provide the optimal composition of CSPs to suit a customer’s priorities and requirements.
... These deployment model classifications are based on the infrastructure's ownership, management, and operation. Similarly cloud computing is also classified by service models namely: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) [2], and each service model has different management and control that makes each unique. The SaaS delivers applications that are accessible to different users online, although, the user does not manage or control the underlying cloud infrastructure. ...
Article
Full-text available
Cloud-native architectures has become an essential part of the cloud computing paradigm with the capacity of improved horizontal and vertical scalability, automation, usability and multi-tenancy. However, there are parts that are yet to be fully discovered like multi-tenancy. Multi-tenancy an essential part of the cloud computing, has not been fully. The purpose of this study is to survey existing research on multi-tenancy in cloud-native architecture in order to identify useful trends, opportunity, challenges and finally the needs for further researches. A systematic mapping method was used to systematically compare, classify, analyse, evaluate and appraise existing works of literature on multi-tenancy in cloud-native. We started from over 921 potentially relevant peer reviewed publications. We applied a selection procedure resulting in 64 peer reviewed publications over the last six years between 2015 to 2022 and the selected studies were classified through the characterisation framework. The review shows the emerging challenges and trending concepts in multi-tenancy within cloud native architecture, but also discusses the improvement in multi-tenancy while considering cloud native architecture in the recent years.
... Cloud computing (CC) is defined as a model for enabling convenient, ubiquitous, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction, according to the National Institute of Standards and Technologies (NIST) [28]. The datacenter (hardware), infrastructure, platform, and application layers make up the primary architecture of CC [29]. ...
Article
Full-text available
Agriculture is regarded as one of the most crucial sectors in guaranteeing food security. However, as the world’s population grows, so do agri-food demands, necessitating a shift from traditional agricultural practices to smart agriculture practices, often known as agriculture 4.0. It is critical to recognize and handle the problems and challenges related with agriculture 4.0 in order to fully profit from its promise. As a result, the goal of this research is to contribute to the development of agriculture 4.0 by looking into the growing trends of digital technologies in the field of agriculture. A literature review is done to examine the scientific literature pertaining to crop farming published in the previous decade for this goal. This thorough examination yielded significant information on the existing state of digital technology in agriculture, as well as potential future opportunities.
... National Institute of Standards and Technology (NIST) Special Publication 800-145 describes cloud computing as "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction" [5]. The cloud model in that document consists of five essential characteristics, three service models, and four deployment models. ...
Technical Report
Full-text available
Light-water reactor operations and maintenance (O&M) costs are prohibitively high, thus contributing to the premature decommissioning of nuclear power plants (NPPs). This is partly due to how the equipment is monitored. In recent years, cloud computing has emerged as a dominant technology by virtue of its low costs, computing and storage adaptability, and ability to host applications over numerous types of virtual infrastructures. Cloud computing can be a cost-effective alternative to onsite storage and diagnostics. This paper conducts a techno-economic assessment of a provisional cloud deployment architecture for a NPP predictive monitoring (PdM) system. The cloud-based monitoring system would enable maintenance and diagnostics (M&D) analysts and other authorized plant users to remotely monitor equipment functionality so as to enable PdM practices and early detection of faults. The Microsoft Azure cloud platform is included in the proposed cloud architecture to provide data processing and storage, sensor device networking, and database management; however, this analysis could be extended to other cloud computing service providers as well. For the techno-economic assessment, technical feasibility is measured in terms of network performance metrics such as response time, latency, and throughput, whereas economic feasibility is measured in terms of operational costs and capital expenditures. Finally, this report covers certain regulatory and security aspects that may concern licensees looking to implement cloud computing. The report focuses on the integration of sensor database storage, the application of cloud resources to PdM, and the identification of technological and economic hurdles associated with moving to a cloud-computing-based architecture.
Chapter
In a college lab, a large portion of the figuring gadgets like PCs and workstations lie underutilization. An impromptu cloud can be facilitated, and occupations can be designated on these gadgets. As part of this approach, the devices must be accessed sporadically and without commitment. The machine is unlikely to be run 24 h a day, seven days a week. As soon as the job is completed and before the machine can be accessed again, it becomes inoperable. Such inaccessibility can happen because of different reasons the most widely recognized being the client may simply turn the machine off. In this paper, we, subsequently, put forward a different technique to foresee the accessibility of machines and investigate them. Regression and classification models were built for the information collection. The methods were tested on real data collected from machines from multiple university labs. In the second part, a scheduling NSGA-II algorithm is proposed that has two objectives to optimize 1. Minimize the average job completion time and 2. Allocate jobs in such a way so that the machine remains available until the deadline elapses. We found them to perform extremely well.KeywordsRegression modelClassification modelAd hocResource availabilitySchedulingNSGA-II
Conference Paper
Full-text available
ARONIA AND ANTHOCYANINS
Chapter
This chapter provides an overview of the current Cloud computing state of developments. First, it presents basic definitions and an analysis of underlying technologies, such as virtualisation and containerisation. Next, it advances a detailed overview of the existing services in public cloud providers, addressing IaaS and PaaS and including advanced service offerings as an example in the fields of Serverless, IoT Artificial intelligence. Finally, the chapter focuses on Hybrid and Multi-Cloud public cloud and open source products.
Chapter
In this chapter we develop a state of the art analysis of the academic works in Mobile Cloud Computing (MCC), providing a categorisation that distinguishes among three main approaches which can be found in today’s MCC literature: approaches based on Off-loading to a Server, approaches based on Off-loading to Public or Private Cloud Computing, Approaches based on Off-loading to Cloudlets and Approaches based on off-loading to other mobile devices. On top of that, specific challenges and analysis of contribution to Swarm computing concept and Ad-hoc Edge Cloud architectures are elaborated.
Chapter
Industry 4.0 and Industry 5.0 are changing the ways business operations are carried out. The organisations across the sectors have been facing challenges in managing the supply chain and logistics across the UK and the world. Industrial Revolution 4.0 has led to the use of digital technologies to improve the efficiency and effectiveness of supply chain processes, such as demand forecasting, inventory management, transportation routing, and order fulfillment. Industry 5.0 is an attempt to humanise the use of potential new-age digital technologies that can for sustainable supply chain management and logistics in the FMCG and automotive sectors. The chapter also advises operation and strategic managers to follow the latest trends in these technologies and follow some short-, medium-, and long-term strategies to gain a competitive edge in the market.
Chapter
This book focuses on recent developments in integrating AI, machine learning methods, medical image processing, advanced network security, and advanced antenna design techniques to implement practical Mobile Health (M-Health) systems. The editors bring together researchers and practitioners who address several developments in the field of M-Health. Chapters highlight intelligent healthcare IoT and Machine Learning based systems for personalized healthcare delivery and remote monitoring applications. The contents also explain medical applications of computing technologies such as Wireless Body Area Networks (WBANs), wearable sensors, multi-factor authentication, and cloud computing. The book is intended as a handy resource for undergraduate and graduate biomedical engineering students and mobile technology researchers who want to know about the recent trends in mobile health technology.
Article
Full-text available
The rapid expansion of remote sensing provides recent and developed advances in monitoring wetlands. Integrating cloud computing with these techniques has been identified as an effective tool, especially for dealing with heterogeneous datasets. In this study, we conducted a systematic literature review (SLR) to determine the current state-of-the-art knowledge for integrating remote sensing and cloud computing in the monitoring of wetlands. The results of this SLR revealed that platform-as-a-service was the only cloud computing service model implemented in practice for wetland monitoring. Remote sensing applications for wetland monitoring included prediction, time series analysis, mapping, classification, and change detection. Only 51% of the reviewed literature, focused on the regional scale, used satellite data. Additionally, the SLR found that current cloud computing and remote sensing technologies are not integrated enough to benefit from their potential in wetland monitoring. Despite these gaps, the analysis revealed that economic benefits could be achieved by implementing cloud computing and remote sensing for wetland monitoring. To address these gaps and pave the way for further research, we propose integrating cloud computing and remote sensing technologies with the Internet of Things (IoT) to monitor wetlands effectively.
Chapter
Full-text available
Bu çalışmada bulut bilişim kavramı, kullanıcı şirketlere getirdiği faydalar ve doğası gereği ortaya çıkan risklerle birlikte ele alınmıştır. Bulut bilişim, denetim verimliliği ve maliyet avantajı gibi fırsatlarının yanında denetim sürecine ek karmaşıklık ve dolayısıyla riskler getirme potansiyeline sahip bir teknolojidir. Denetim firmaları, denetim sürecinde bulut teknolojilerini kullanırken yeni riskleri ve zorlukları da yönetmek zorundadırlar. Bu doğrultuda mevcut çalışmada, bulut bilişimin denetim sürecine getirdiği zorluklara ilişkin sorunlara odaklanılmıştır. Bu çalışmanın amacı, bulut bilişimin denetiminin sınırlarını çizmektir. Böylece denetçilerin bu yeni teknolojinin getirdiği fırsatların farkında olmaları ve riskleri kontrol edebilmelerine katkı sağlanmış olacaktır.
Chapter
The article deals with the most pressing issues related to the protection of personal data when using cloud technologies. In particular, the problem of applicable law to these relations is analyzed, as well as issues related to the legal qualification of contracts on the provision of cloud services. In addition, the authors touch upon aspects related to the possibility of developing general principles of data processing in the cloud, based on which legal conflicts may be resolved. Particular importance in the work is given to studying the experience of the use of cloud computing by foreign countries, including European countries, which have made a significant contribution to the development of concepts and terms that allow for a step closer to standardization and unification of the application of these technologies. Based on the study of domestic and foreign literature, the classification of cloud computing, as well as a detailed analysis of the pros and cons of their use in various areas of society. The authors conclude that the legislative regulation does not densely cover the rapidly developing market for cloud services. The lack of uniform regulation of personal data processing in the cloud, given the cross-border nature of services provided, leads to legal uncertainty and makes it difficult for users to apply legal protection tools.KeywordsCloud technologyPersonal dataInformation securityDigitalizationData operator
Chapter
Cities suffer considerably from climate changeClimate change while having made a significant contribution to it. Cities are facing complex challenges because of urban population growth and the limitation of resources. Water plays a central role in sustainable urban development. Still, climate change impacts the quality and availability of global freshwater supply and increases the possibility of droughts and flooding through the irregularities in temperature and weather. To optimize water consumption and reduce the environmental effects of water use on the environment, the concept of smart citiesSmart cities offers a smart water management systemSmart water management system. This chapter proposes an integrated, flexible, and cost-effective Decision Support System (DSSDecision Support System (DSS)) for solving the smart water management system's decision problems.
Chapter
The issue of predicting floodsFloods has received considerable critical attention, especially with the emergence of an increasing manner of climatic changes in most of our planet. The limitations of classical techniques that depend on hydrology and hydraulics in predicting flood events have heightened the need for alternative solutions that depend on artificial intelligenceArtificial intelligence (AI) approaches for solving flood prediction problems with more reliable results. This chapter discusses the flood prediction problem and investigates the strengths of some artificial intelligence approaches as well as some real AI systems for predicting flood events. Moreover, this chapter introduces a novel flood prediction approach that depends on machine learningLearning \b models and Pigeons Swarm Inspired OptimizationSwarm Inspired Optimization (PIO) Algorithm. The proposed approach has been validated using a benchmark historical dataset of past floods from 1900 to 2020. The experimental results proved the efficiency of using the PIO algorithm and Gradient BoostGradient Boost (GB) classifier for selecting the best reductReduct of features used to predict floods. Moreover, the Random ForestRandom Forest (RF) algorithm has been used to validate and confirm the obtained results in predicting the onset of floods. The contribution of this study has been to confirm the importance of developing more artificial intelligence techniques in predicting not only floods but also other natural disasters such as volcanoes, earthquakes, storms, etc.
Chapter
The concept of cloud computing is providing dynamic, scalable resources that are delivered over the Internet. Access to remote computer resources is made available to users through this service, and they only pay for the services that they actually use, at the time that they use them. However, for cloud users, the security of the information that is stored in the cloud is the most important concern that they have regarding cloud computing services. As a result of its ability to provide customers with on-demand, flexible, dependable, and low-cost services that are also scalable, cloud computing has experienced rapid growth in recent years. This invention relates to the design and implementation of an algorithm to improve cloud security with the goal of ensuring the security of information at the point of storage in the cloud. For a data security concept that emphasizes increased confidentiality and authenticity for cloud data at the cloud storage end, as well as experiment analysis to verify the approach’s effectiveness and efficiency, a security strategy is established and developed.
Thesis
According to the latest statistics, the number of connected people to the Internet is still exponentially growing and the high quality of cloud services will remain significantly requested in the coming years. Facing the resulting tremendous growth of the intra-data center traffic, the traditional Data Center Network (DCN) architectures are not capable to stay ahead of the demand in terms of scalability and cost lowering. Besides, DCNs suffer from the degradation of their network Quality of Service (QoS) performances which deeply impact the users Quality of Experience (QoE). As a result, cloud architects and service providers are pressed to deal with this rapid explosion of data center traffic by reconsidering their data center architecture to fit their customers’ needs. Hence, implementing new techniques based on optimized algorithms become compulsory to overcome these challenges within data center networks. In this regard, we tackle the performance of data center networks by investigating new promising approaches able to improve intra-data center communication and to optimize the resource allocation within their infrastructures. Motivated by its architecture strengths, we study in this thesis the CamCube Server-Only data center managed by ONOS SDN controller. Besides, we aim to implement and analyze the performance of strategies to address the optimization of routing and resource allocation for intra-CamCube servers communications. In fact, our objective consists of improving network performance and decreasing network congestion. The problem of resource allocation and routing in SDN-based CamCube topology is NP-hard. In order to overcome this challenge, we investigate the problem through three increasing complexity steps. In the first stage, we consider unicast intra-CamCube communication by proposing new methods named CRP and ACOCRP respectively based on Linear Programming Ant Colony Optimization. The latters generate an optimized path to forward packet in a typical CamCube network subjects to the constraints of network performance in terms of latency and path length. In the second phase, we propound a new M-CRP and ACO-MCRP approaches to tackle the multicast communications in SDN-based CamCube network. Our approaches addressed multicast routing and resource allocation of online arrived flows. We show that our propounded approach enhanced the CamCube QoS and the quality of the proposed multicast tree. In this thesis, we online treat the routing and the resource allocation for the communication of each arrived flow. As a third step, we focused on resource allocation optimization for batch mode arrival of traffic flows within ONOS-based CamCube topology by proposing batch-(M)CRP strategy. Note that we emulated the propounded environment to test the full proposed schemes, through extensive experimentations conducted with Mininet. We evaluate the performance of our propositions in terms of E2E delay, jitter and packet loss. Obtained results demonstrate that our proposals outperform the existing state-ofthe-art strategies such as the shortest path and OSPF routing schemes respectively for CamCube and traditional Clos DCNs architectures.
Article
A cloud computing model allows customers to use a pool of shared computer resources on-demand or pay-per-use basis. In terms of capital investment and operational cost reductions, cloud-based computing offers users and organizations many benefits. Despite these advantages, several challenges still limit the adoption of cloud computing. A crucial concern that is usually taken into account is security. Without this vital component, the computing model has a negative influence, which causes suffering on the human, ethical, and economic levels. This essay will look at the security issues that cloud entities must deal with. This group includes Cloud Service Provider, the Data Owner, and the Cloud User concentrating on the communication, computation, and service level agreements that make up the crypto-cloud. It will offer the required updates by evaluating the origins and consequences of different cyberattacks.
Book
Full-text available
Το παρόν βιβλίο είναι καρπός πολλών χρόνων διδασκαλίας στο Τμήμα Πληροφορικής του Πανεπιστημίου Πειραιώς και η γνώση που παρέχει είναι πλουραλιστική, σφαιρική, σύγχρονη και ταυτόχρονα συνδυαστική θεωρίας και πράξης. Πράγματι, ο αναγνώστης μπορεί να μάθει για τα γενικά επιχειρηματικά μοντέλα που εφαρμόζονται στα Πληροφοριακά Συστήματα στο Διαδίκτυο (ΠΣΔ), αλλά και για τον τρόπο υλοποίησής τους, με τις τελευταίες επικρατούσες τεχνολογίες, όπως είναι τα Πλαίσια Εφαρμογών Ιστού (Web Application Frameworks/WAF), οι υπηρεσιοστρεφείς αρχιτεκτονικές (service-oriented architectures), η υπολογιστική νέφους (cloud computing) και η κινητή υπολογιστική (mobile computing). Είναι προφανές ότι το σύνολο της γνώσης του αντικειμένου είναι αδύνατον να περιγραφεί εξ ολοκλήρου και λεπτομερώς σε ένα σύγγραμμα και μόνο. Ως εκ τούτου, απαιτείται από τον αναγνώστη να ανατρέξει σε πηγές και να μελετήσει περαιτέρω τα γραφόμενα. Το βιβλίο χωρίζεται σε τρία κύρια μέρη. Το πρώτο μέρος (Κεφάλαια 1-5) είναι θεωρητικό και επικεντρώνεται στα ΠΣΔ, το δεύτερο μέρος (Κεφάλαια 6-12) είναι προγραμματιστικό, ενώ το τρίτο μέρος (Κεφάλαιο 13) εξετάζει τη μεθοδολογία που πρέπει να ακολουθήσει κάποιος για να αναπτύξει ένα ΠΣΔ. Συγκεκριμένα, στο Κεφάλαιο 1, ο αναγνώστης εισάγεται στις βασικές έννοιες των εξεταζόμενων επιστημονικών αντικειμένων, δηλαδή στα Πληροφοριακά Συστήματα (ΠΣ) και στις νέες τεχνολογικές προκλήσεις από τη χρήση του διαδικτύου και την υιοθέτηση των νέων επιχειρηματικών μοντέλων που βασίζονται σε αυτό. Στο Κεφάλαιο 2, εξετάζονται διεξοδικά οι δυνατότητες και οι υπηρεσίες που προσφέρει το διαδίκτυο στα ΠΣ, καθώς και η διασύνδεση των ΠΣ διαφορετικών οργανισμών μέσω του διαδικτύου. Η ανακάλυψη της πληροφορίας, οι υπηρεσίες καταλόγου, οι υπηρεσίες επικοινωνίας, οι υπηρεσίες εταιρικού ιστοχώρου, οι υπηρεσίες συνεργατικότητας, η εξ αποστάσεως εκπαίδευση και η τηλεργασία είναι παραδείγματα τέτοιων υπηρεσιών. Στο Κεφάλαιο 3, παρουσιάζονται και αναλύονται τα επιχειρησιακά μοντέλα του ηλεκτρονικού επιχειρείν (e-business) και του ηλεκτρονικού εμπορίου (e-commerce), καθώς και τα συστατικά μέρη τους. Επίσης, εξετάζονται οι ηλεκτρονικές δημοπρασίες (e-auctions), τα ηλεκτρονικά κανάλια διανομής λιανοπωλητών και χονδρεμπόρων, η έρευνα συμπεριφοράς καταναλωτή, τα μοντέλα Business-to-Consumer (B2C), Consumer-to-Business (C2B), Consumer-to-Consumer (C2C) και Business-to-Business (Β2Β), η ηλεκτρονική διαφήμιση, οι διεπιχειρησιακές εφαρμογές, το ηλεκτρονικό επιχειρείν ενδοεπιχειρησιακά, η ηλεκτρονική διακυβέρνηση (e-government) και οι ηλεκτρονικές πληρωμές (e-payments). Στο Κεφάλαιο 4, εξετάζεται η κινητή υπολογιστική (m-computing), η οποία περιλαμβάνει τις τεχνολογίες των κινητών τηλεφώνων και των έξυπνων συσκευών, την τεχνολογία υπολογιστικού νέφους (cloud computing) και την πανταχού παρούσα (ubiquitous computing) και τη διεισδυτική υπολογιστική (pervasive computing), όσον αφορά τις εφαρμογές της στις σύγχρονες επιχειρήσεις και οργανισμούς, όπως είναι το κινητό εμπόριο (m-commerce) και τα «έξυπνα» σχολεία (smart schools). Στο Κεφάλαιο 5, παρουσιάζεται η αρχιτεκτονική και η υποδομή στον παγκόσμιο ιστό, ως προϋπόθεση για την κατανόηση του πληροφοριακού περιβάλλοντος λειτουργίας των ΠΣΔ. Επίσης, εξετάζονται οι χώροι ονομάτων URI και URL, το πρωτόκολλο HTTP, οι εξυπηρετητές ιστού (web servers), η αναπαραγωγή (replication) και η συσταδοποίηση (clustering) των εξυπηρετητών ιστού, η ασφάλεια επικοινωνίας και οι εξυπηρετητές εφαρμογών (application servers). Στο Κεφάλαιο 6, παρουσιάζονται τα βασικά εργαλεία στην πλευρά του πελάτη (client-side), που χρησιμοποιούνται για την ανάπτυξη των διαδικτυακών εφαρμογών. Εξετάζονται η HTML5 και η συνέργειά της με τα CSS, η JQuery, η τεχνολογία Ajax, καθώς και άλλες νέες τεχνολογίες στην πλευρά του πελάτη, όπως οι Python, Underscore.JS και Java Applets. Επίσης, μελετώνται η XML και η JSON, ως πρότυπα για τη διαλειτουργικότητα των εφαρμογών. Στο Κεφάλαιο 7, το ενδιαφέρον επικεντρώνεται στη δημιουργία εφαρμογών, υπηρεσιών και συστημάτων στο περιβάλλον του παγκόσμιου ιστού μέσω της τεχνολογίας των Java Servlets. Επίσης, δίνεται μια σειρά από προγραμματιστικά παραδείγματα. Στο Κεφάλαιο 8, παρουσιάζονται οι τεχνολογίες Java Server Pages (JSP) και τα συναφή πλαίσια-βιβλιοθήκες δομημένης ανάπτυξης εφαρμογών ιστού, οι οποίες αφορούν την πλευρά του εξυπηρετητή (server-side). Εξετάζεται η αρχιτεκτονική MVC και παρουσιάζονται δύο από τα πιο δημοφιλή WAF, το Struts και το Spring. Στο Κεφάλαιο 9, γίνεται αναφορά στη στοίβα πρωτοκόλλων στην οποία βασίζονται οι Υπηρεσίες Ιστού (Web Services/WS), το πρωτόκολλο Simple Object Access Protocol (SOAP), η Γλώσσα Περιγραφής των Υπηρεσιών Ιστού, δηλαδή η Web Services Description Language (WSDL), η υπηρεσία για την ανακάλυψη Υπηρεσιών Ιστού, η Universal Description, Discovery and Integration (UDDI), καθώς και η νέα εκδοχή των Υπηρεσιών Ιστού, τα Restful Web Services. Στο Κεφάλαιο 10, εξετάζονται εκτενώς τα τεχνικά και επιχειρησιακά πλεονεκτήματα μιας Υπηρεσιοστρεφούς Αρχιτεκτονικής (Service Oriented Architecture/SOA). Δίνεται ένα πραγματικό παράδειγμα SOA, αυτό του Επιχειρησιακού Διαύλου Υπηρεσιών (Enterprise Service Bus/ESB), καθώς και ένα παράδειγμα ανοικτού κώδικα ESB. Στο Κεφάλαιο 11, αναπτύσσεται το θέμα της ασφάλειας στις διαδικτυακές εφαρμογές ιστού, ακολουθώντας τη μεθοδολογία του «Top Ten Project» του οργανισμού Open Web Application Security Project (OWASP), το οποίο προδιαγράφει τις βασικές περιοχές ευπάθειας των διαδικτυακών εφαρμογών και τρόπους ανίχνευσης και αντιμετώπισής τους. Επίσης, γίνεται αναφορά στα πρότυπα της Κοινοπραξίας του Παγκόσμιου Ιστού (World Wide Web Consortium/W3C), για την ασφάλεια των WS, καθώς και στα χαρακτηριστικά ασφαλείας της γλώσσας προγραμματισμού Java. Στο Κεφάλαιο 12, αναλύονται η ενσωμάτωση των υπηρεσιών νέφους στην υλοποίηση διαδικτυακών εφαρμογών, καθώς και η δημιουργία εφαρμογών κινητών τηλεφώνων. Στο τέλος, το ενδιαφέρον εστιάζεται στην αρχιτεκτονική και τον τρόπο λειτουργίας του λειτουργικού συστήματος Android. Στο Κεφάλαιο 13, γίνεται αναφορά σε μεθοδολογίες και σχετικά θέματα των έργων ανάπτυξης των ΠΣΔ. Παρουσιάζεται συνοπτικά η γλώσσα UML, ενώ εξετάζονται και μέθοδοι αξιολόγησης της αποτελεσματικότητας της εφαρμογής των ΠΣΔ. Το βιβλίο συνοδεύεται από ασκήσεις πολλαπλών επιλογών, καθώς και από βίντεο, προκειμένου ο αναγνώστης να εμπεδώσει καλύτερα την ύλη. Σε όλη την έκταση του ηλεκτρονικού βιβλίου παρατίθενται υπερσύνδεσμοι αναφορών, στις οποίες μπορεί να ανατρέξει ο αναγνώστης.
Conference Paper
Fog computing works in conjunction with cloud computing because cloud computing has latency issues for the critical applications. When the client requests reach to the fog server they are allocated to the Virtal machines (VMs) and then the VMs are placed into the physical machines (PMs). During the VM placement the provider tries to allocate all the requests to the VMs and then the VMs has to be placed inside the PMs. Virtual Machine Placement (VMP) problem is a NP-hard problem and the provider always wants to optimize the hosted VMs, minimize the PMs and minimize the resource wastage to optimize power consumption. This paper proposes Multi-objective integer linear programming (MOILP) and solves in two different methods such as lexicographical preference method and weighted sum method and it has been implemented for two categories of fog center such as homogeneous and heterogeneous and it has been found that the weighted sum method outperforms over the lexicographical method and also for heterogeneous fog center.
Article
Full-text available
Identity-Based Encryption that means simplication of general public key and certificates control at Public Key Infrastructure is a good-sized substitute in comparison to public-key encryption. Be that because it may, one of the number one productiveness drawbacks of IBE is the transparency calculation at Private Key Generator in the course of client revocation. Effective rejection has been complete focused in commonplace PKI settings, but the cumbersome management of testaments is unequivocally the load that IBE endeavors to ease. At the existing time, at looking after the critical difficulty of person refusal, we deliver redistributing figuring into IBE is the reason that and advocate a IBE plot withinside the server setting. Our association offloads a large little bit of the important thing age-associated errands in the course of key-giving and key-replace systems Key modernize cloud support provider, leave-taking simplest a predictable wide variety of essential assignments for PKG and clients to carry out locally. This aim is practiced via way of means of utilizing a unique information secure system: we use a crossbreed non-public key for each customer, entryway is incorporated to interface and sure the person component and the time portion. As of the extension idea we're the usage of the bloom clear out to encrypt the data. By the usage of this bloom clear out we're lowering the encryption time as compared to different techniques.
ResearchGate has not been able to resolve any references for this publication.