Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays, home appliances are communicating with each other with home short-range home area gateways, using existing netwo...Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays, home appliances are communicating with each other with home short-range home area gateways, using existing network communication protocols such as ZigBee, Bluetooth, RFID, and WiFi. A Gateway allows homeowners and utilities to communicate remotely with the appliances via long-range communication networks such as GPRS, WiMax, LTE, and power liner carrier. This paper utilizes the Internet of Things (IoT) concepts to monitor and control home appliances. Moreover, this paper proposes a framework that enables the integration and the coordination of Human-to-Appliance, Utility-to- Appliance, and Appliance-to-Appliance. Utilizing the concepts of Internet of Things leads to one standard communication protocols, TCP/IPV6, which overcomes the many diverse home area networks and neighborhood area networks protocols. This work proposes a cloud based framework that enables the IoTs integration and supports the coordination between devices, as well as with device-human interaction. A prototype is designed, implemented, and tested to validate the proposed solution.展开更多
Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.A...Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.As cloud computing has recently emerged as a dominant platform for running applications and storing data,digital forensics faces well-known challenges in the cloud,such as data inaccessibility,data and service volatility,and law enforcement lacks control over the cloud.To date,very little research has been done to develop efficient theory and practice for digital forensics in the cloud.In this paper,we present a novel framework,Cloud Foren,which systematically addresses the challenges of forensics in cloud computing.Cloud Foren covers the entire process of digital forensics,from the initial point of complaint to the final point where the evidence is confirmed.The key components of Cloud Foren address some challenges,which are unique to the cloud.The proposed forensic process allows cloud forensic examiner,cloud provider,and cloud customer collaborate naturally.We use two case studies to demonstrate the applicability of Cloud Foren.We believe Cloud Foren holds great promise for more precise and automatic digital forensics in a cloud computing environment.展开更多
The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many d...The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents.展开更多
Cloud computing is touted as the next big thing in the Information Technology (IT) industry, which is going to impact the businesses of any size and yet the security issue continues to pose a big threat on it. The sec...Cloud computing is touted as the next big thing in the Information Technology (IT) industry, which is going to impact the businesses of any size and yet the security issue continues to pose a big threat on it. The security and privacy issues persisting in cloud computing have proved to be an obstacle for its widespread adoption. In this paper, we look at these issues from a business perspective and how they are damaging the reputation of big companies. There is a literature review on the existing issues in cloud computing and how they are being tackled by the Cloud Service Providers (CSP). We propose a governing body framework which aims at solving these issues by establishing relationship amongst the CSPs in which the data about possible threats can be generated based on the previous attacks on other CSPs. The Governing Body will be responsible for Data Center control, Policy control, legal control, user awareness, performance evaluation, solution architecture and providing motivation for the entities involved.展开更多
Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum servic...Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum service, and a critical aspect to this is cloud security which is one among other specific challenges hindering adoption of the cloud technologies. The absence of appropriate, standardised and self-assessing security frameworks of the cloud world for SMEs becomes an endless problem in developing countries and can expose the cloud computing model to major security risks which threaten its potential success within the country. This research presents a security framework for assessing security in the cloud environment based on the Goal Question Metrics methodology. The developed framework produces a security index that describes the security level accomplished by an evaluated cloud computing environment thereby providing the first line of defence. This research has concluded with an eight-step framework that could be employed by SMEs to assess the information security in the cloud. The most important feature of the developed security framework is to devise a mechanism through which SMEs can have a path of improvement along with understanding of the current security level and defining desired state in terms of security metric value.展开更多
With more educational business absorbed into information management system at universities, traditional information management platform seems unable to provide efficient service for teaching and research. Some univers...With more educational business absorbed into information management system at universities, traditional information management platform seems unable to provide efficient service for teaching and research. Some universities then resort to cloud computing platform. In view of the problems existing in the traditional information platform, this study presented an information management framework designed with cloud technology, and introduced the security techniques for its protection.展开更多
In the modern arena, the Information and Communication Technologies (ICTs) have been playing a vital role in every walks of our day to day life. In order to enhance the ICT capacity and align with the global technolog...In the modern arena, the Information and Communication Technologies (ICTs) have been playing a vital role in every walks of our day to day life. In order to enhance the ICT capacity and align with the global technology transformations, the developing countries have started introducing the computerization and automation processes at different levels of the governments. The several research studies revealed that the existing legacy of governance system and their services in current state have several issues and challenges in terms of timeliness, cost of services, delay in service delivery, time-bound availability of services (24/7/365), inefficiency services, ease of service and discomforts, poor service collaboration, absence of responsiveness, and limited security of sensitive information/documents. A significant question is still unanswered that how to bring the Citizens and Government bodies closer for alleviating the aforementioned issues and challenges of existing government system services. This research paper aims to investigate the issues and challenges in the current status of Governance and partial E-Governance systems which encompass the computerization or automation process. The research designs a cloud framework for effective delivery of citizen centric services in general and Ethiopia as a specific case study. After rigorous analysis of prior research efforts, along with primary survey and interview, it was clearly observed that cloud computing can be an alternative instrumental for significant transformation of governmental service delivery. The research paper used a mix of exploratory and constructive research design and methodology with qualitative & quantitative data analysis approach. Finally, a Cloud Based E-Governance (CBEG) Framework is designed for the delivery of Ethiopian Citizen Centric Services. The validation, evaluation and acceptance test of the framework proves that the revealed knowledge can provide a significant transformation towards the betterment of the E Governance Services Delivery Systems.展开更多
After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtuali...After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtualization. This study also compares Microsoft, Trend Micro, and the proposed unified cloud computing architecture to show that the proposed unified framework of the cloud computing service model is comprehensive and appropriate for the current complexities of businesses. The findings of this study can contribute to the knowledge for academics and practitioners to understand, assess, and analyze a cloud computing service application.展开更多
In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunct...In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunctioning nodes generate wrong output during the run time. To detect such nodes, we create collaborative network between worker node (i.e. data node of Hadoop) and Master node (i.e. name node of Hadoop) with the help of trusted heartbeat framework (THF). We propose procedures to register node and to alter status of node based on reputation provided by other co-worker nodes.展开更多
In the last few years, cloud computing (CC) has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Many businesses including small, medium (SMEs) and large enterpr...In the last few years, cloud computing (CC) has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Many businesses including small, medium (SMEs) and large enterprises are migrating to this technology. The objective of this paper was to describe the opinions of enterprises about the benefits and challenges of cloud computing services in the private and public companies in South Lebanon. During 2019, a cross-sectional study which enrolled 29 enterprises used CC was conducted. The survey included questions on socio-demographic characteristics of representative of companies, and companies’ factors in reference to the technology, organization, and environment (TOE) framework. Most (58.6%) of companies were private and micro and SMEs sized (86.8%). The cost saving (75.0%), scalability and flexibility (75.9%), security (44.8%), and improved service delivery were the main benefits that cloud offer to the business. The security aspect, the cost, and the limited provision of infra-structure remain a challenge for the adoption of CC. In conclusion, the research reveals the potential for the development of CC and obstacles for successful implementation of this new technology.展开更多
This research work aims at modelling a framework for Private Cloud infrastructure Deployment for Information and Communication Technology Centres (ICTs) in tertiary institutions in Nigeria. Recent researches have indi...This research work aims at modelling a framework for Private Cloud infrastructure Deployment for Information and Communication Technology Centres (ICTs) in tertiary institutions in Nigeria. Recent researches have indicated that cloud computing will become the mainstream in computing technology and very effective for businesses. All Tertiary Institutions have ICT units, and are generally charged with the responsibilities of deploying ICT infrastructure and services for administration, teaching, research and learning in higher institution at large. The Structured System Analysis and Design Methodology (SSADM) is used in this research and a six-step framework for a cost effective and scalable Private cloud infrastructure using server virtualization is presented as an alternative that can guarantee total and independent control of data flow in the institutions, while ensuring adequate security of vital information.展开更多
Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provi...Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provides services over the internet: Utilizing the online services of different software. Many works have been carried out and various security frameworks relating to the security issues of cloud computing have been proposed in numerous ways. But they do not propose a quantitative approach to analyze and evaluate privacy and security in cloud computing systems. In this research, we try to introduce top security concerns of cloud computing systems, analyze the threats and propose some countermeasures for them. We use a quantitative security risk assessment model to present a multilayer security framework for the solution of the security threats of cloud computing systems. For evaluating the performance of the proposed security framework we have utilized an Own-Cloud platform using a 64-bit quad-core processor based embedded system. Own-Cloud platform is quite literally as any analytics, machine learning algorithms or signal processing techniques can be implemented using the vast variety of Python libraries built for those purposes. In addition, we have proposed two algorithms, which have been deployed in the Own-Cloud for mitigating the attacks and threats to cloud-like reply attacks, DoS/DDoS, back door attacks, Zombie, etc. Moreover, unbalanced RSA based encryption is used to reduce the risk of authentication and authorization. This framework is able to mitigate the targeted attacks satisfactorily.展开更多
In order to improve the performance of the attribute reduction algorithm to deal with the noisy and uncertain large data, a novel co-evolutionary cloud-based attribute ensemble multi-agent reduction(CCAEMR) algorith...In order to improve the performance of the attribute reduction algorithm to deal with the noisy and uncertain large data, a novel co-evolutionary cloud-based attribute ensemble multi-agent reduction(CCAEMR) algorithm is proposed.First, a co-evolutionary cloud framework is designed under the M apReduce mechanism to divide the entire population into different co-evolutionary subpopulations with a self-adaptive scale. Meanwhile, these subpopulations will share their rewards to accelerate attribute reduction implementation.Secondly, a multi-agent ensemble strategy of co-evolutionary elitist optimization is constructed to ensure that subpopulations can exploit any correlation and interdependency between interacting attribute subsets with reinforcing noise tolerance.Hence, these agents are kept within the stable elitist region to achieve the optimal profit. The experimental results show that the proposed CCAEMR algorithm has better efficiency and feasibility to solve large-scale and uncertain dataset problems with complex noise.展开更多
基金supported in part by the Department of Computer Science and Engineering at the American University of Sharjah,UAE
文摘Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays, home appliances are communicating with each other with home short-range home area gateways, using existing network communication protocols such as ZigBee, Bluetooth, RFID, and WiFi. A Gateway allows homeowners and utilities to communicate remotely with the appliances via long-range communication networks such as GPRS, WiMax, LTE, and power liner carrier. This paper utilizes the Internet of Things (IoT) concepts to monitor and control home appliances. Moreover, this paper proposes a framework that enables the integration and the coordination of Human-to-Appliance, Utility-to- Appliance, and Appliance-to-Appliance. Utilizing the concepts of Internet of Things leads to one standard communication protocols, TCP/IPV6, which overcomes the many diverse home area networks and neighborhood area networks protocols. This work proposes a cloud based framework that enables the IoTs integration and supports the coordination between devices, as well as with device-human interaction. A prototype is designed, implemented, and tested to validate the proposed solution.
文摘Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.As cloud computing has recently emerged as a dominant platform for running applications and storing data,digital forensics faces well-known challenges in the cloud,such as data inaccessibility,data and service volatility,and law enforcement lacks control over the cloud.To date,very little research has been done to develop efficient theory and practice for digital forensics in the cloud.In this paper,we present a novel framework,Cloud Foren,which systematically addresses the challenges of forensics in cloud computing.Cloud Foren covers the entire process of digital forensics,from the initial point of complaint to the final point where the evidence is confirmed.The key components of Cloud Foren address some challenges,which are unique to the cloud.The proposed forensic process allows cloud forensic examiner,cloud provider,and cloud customer collaborate naturally.We use two case studies to demonstrate the applicability of Cloud Foren.We believe Cloud Foren holds great promise for more precise and automatic digital forensics in a cloud computing environment.
文摘The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents.
文摘Cloud computing is touted as the next big thing in the Information Technology (IT) industry, which is going to impact the businesses of any size and yet the security issue continues to pose a big threat on it. The security and privacy issues persisting in cloud computing have proved to be an obstacle for its widespread adoption. In this paper, we look at these issues from a business perspective and how they are damaging the reputation of big companies. There is a literature review on the existing issues in cloud computing and how they are being tackled by the Cloud Service Providers (CSP). We propose a governing body framework which aims at solving these issues by establishing relationship amongst the CSPs in which the data about possible threats can be generated based on the previous attacks on other CSPs. The Governing Body will be responsible for Data Center control, Policy control, legal control, user awareness, performance evaluation, solution architecture and providing motivation for the entities involved.
文摘Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum service, and a critical aspect to this is cloud security which is one among other specific challenges hindering adoption of the cloud technologies. The absence of appropriate, standardised and self-assessing security frameworks of the cloud world for SMEs becomes an endless problem in developing countries and can expose the cloud computing model to major security risks which threaten its potential success within the country. This research presents a security framework for assessing security in the cloud environment based on the Goal Question Metrics methodology. The developed framework produces a security index that describes the security level accomplished by an evaluated cloud computing environment thereby providing the first line of defence. This research has concluded with an eight-step framework that could be employed by SMEs to assess the information security in the cloud. The most important feature of the developed security framework is to devise a mechanism through which SMEs can have a path of improvement along with understanding of the current security level and defining desired state in terms of security metric value.
文摘With more educational business absorbed into information management system at universities, traditional information management platform seems unable to provide efficient service for teaching and research. Some universities then resort to cloud computing platform. In view of the problems existing in the traditional information platform, this study presented an information management framework designed with cloud technology, and introduced the security techniques for its protection.
文摘In the modern arena, the Information and Communication Technologies (ICTs) have been playing a vital role in every walks of our day to day life. In order to enhance the ICT capacity and align with the global technology transformations, the developing countries have started introducing the computerization and automation processes at different levels of the governments. The several research studies revealed that the existing legacy of governance system and their services in current state have several issues and challenges in terms of timeliness, cost of services, delay in service delivery, time-bound availability of services (24/7/365), inefficiency services, ease of service and discomforts, poor service collaboration, absence of responsiveness, and limited security of sensitive information/documents. A significant question is still unanswered that how to bring the Citizens and Government bodies closer for alleviating the aforementioned issues and challenges of existing government system services. This research paper aims to investigate the issues and challenges in the current status of Governance and partial E-Governance systems which encompass the computerization or automation process. The research designs a cloud framework for effective delivery of citizen centric services in general and Ethiopia as a specific case study. After rigorous analysis of prior research efforts, along with primary survey and interview, it was clearly observed that cloud computing can be an alternative instrumental for significant transformation of governmental service delivery. The research paper used a mix of exploratory and constructive research design and methodology with qualitative & quantitative data analysis approach. Finally, a Cloud Based E-Governance (CBEG) Framework is designed for the delivery of Ethiopian Citizen Centric Services. The validation, evaluation and acceptance test of the framework proves that the revealed knowledge can provide a significant transformation towards the betterment of the E Governance Services Delivery Systems.
文摘After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtualization. This study also compares Microsoft, Trend Micro, and the proposed unified cloud computing architecture to show that the proposed unified framework of the cloud computing service model is comprehensive and appropriate for the current complexities of businesses. The findings of this study can contribute to the knowledge for academics and practitioners to understand, assess, and analyze a cloud computing service application.
文摘In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunctioning nodes generate wrong output during the run time. To detect such nodes, we create collaborative network between worker node (i.e. data node of Hadoop) and Master node (i.e. name node of Hadoop) with the help of trusted heartbeat framework (THF). We propose procedures to register node and to alter status of node based on reputation provided by other co-worker nodes.
文摘In the last few years, cloud computing (CC) has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Many businesses including small, medium (SMEs) and large enterprises are migrating to this technology. The objective of this paper was to describe the opinions of enterprises about the benefits and challenges of cloud computing services in the private and public companies in South Lebanon. During 2019, a cross-sectional study which enrolled 29 enterprises used CC was conducted. The survey included questions on socio-demographic characteristics of representative of companies, and companies’ factors in reference to the technology, organization, and environment (TOE) framework. Most (58.6%) of companies were private and micro and SMEs sized (86.8%). The cost saving (75.0%), scalability and flexibility (75.9%), security (44.8%), and improved service delivery were the main benefits that cloud offer to the business. The security aspect, the cost, and the limited provision of infra-structure remain a challenge for the adoption of CC. In conclusion, the research reveals the potential for the development of CC and obstacles for successful implementation of this new technology.
文摘This research work aims at modelling a framework for Private Cloud infrastructure Deployment for Information and Communication Technology Centres (ICTs) in tertiary institutions in Nigeria. Recent researches have indicated that cloud computing will become the mainstream in computing technology and very effective for businesses. All Tertiary Institutions have ICT units, and are generally charged with the responsibilities of deploying ICT infrastructure and services for administration, teaching, research and learning in higher institution at large. The Structured System Analysis and Design Methodology (SSADM) is used in this research and a six-step framework for a cost effective and scalable Private cloud infrastructure using server virtualization is presented as an alternative that can guarantee total and independent control of data flow in the institutions, while ensuring adequate security of vital information.
文摘Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provides services over the internet: Utilizing the online services of different software. Many works have been carried out and various security frameworks relating to the security issues of cloud computing have been proposed in numerous ways. But they do not propose a quantitative approach to analyze and evaluate privacy and security in cloud computing systems. In this research, we try to introduce top security concerns of cloud computing systems, analyze the threats and propose some countermeasures for them. We use a quantitative security risk assessment model to present a multilayer security framework for the solution of the security threats of cloud computing systems. For evaluating the performance of the proposed security framework we have utilized an Own-Cloud platform using a 64-bit quad-core processor based embedded system. Own-Cloud platform is quite literally as any analytics, machine learning algorithms or signal processing techniques can be implemented using the vast variety of Python libraries built for those purposes. In addition, we have proposed two algorithms, which have been deployed in the Own-Cloud for mitigating the attacks and threats to cloud-like reply attacks, DoS/DDoS, back door attacks, Zombie, etc. Moreover, unbalanced RSA based encryption is used to reduce the risk of authentication and authorization. This framework is able to mitigate the targeted attacks satisfactorily.
基金The National Natural Science Foundation of China(No.61300167)the Open Project Program of State Key Laboratory for Novel Software Technology of Nanjing University(No.KFKT2015B17)+3 种基金the Natural Science Foundation of Jiangsu Province(No.BK20151274)Qing Lan Project of Jiangsu Provincethe Open Project Program of Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education(No.JYB201606)the Program for Special Talent in Six Fields of Jiangsu Province(No.XYDXXJS-048)
文摘In order to improve the performance of the attribute reduction algorithm to deal with the noisy and uncertain large data, a novel co-evolutionary cloud-based attribute ensemble multi-agent reduction(CCAEMR) algorithm is proposed.First, a co-evolutionary cloud framework is designed under the M apReduce mechanism to divide the entire population into different co-evolutionary subpopulations with a self-adaptive scale. Meanwhile, these subpopulations will share their rewards to accelerate attribute reduction implementation.Secondly, a multi-agent ensemble strategy of co-evolutionary elitist optimization is constructed to ensure that subpopulations can exploit any correlation and interdependency between interacting attribute subsets with reinforcing noise tolerance.Hence, these agents are kept within the stable elitist region to achieve the optimal profit. The experimental results show that the proposed CCAEMR algorithm has better efficiency and feasibility to solve large-scale and uncertain dataset problems with complex noise.