Current Issue : October - December Volume : 2018 Issue Number : 4 Articles : 5 Articles
In Infrastructure as a Service (IaaS) environments, the user virtual machine is the user�s private property. However, in\nthe case of privacy protection, how to ensure the security of files in the user virtual machine and the user virtual\nmachine�s behavior does not affect other virtual machines; it is a major challenge. This paper presents a trusted\nmeasurement model based on dynamic policy and privacy protection in IaaS security domain, called TMMDP. The\nmodel first proposed a measure architecture, where it defines the trusted measurement of the user virtual machine\ninto the trust of files in the virtual machine and trusted network behavior. The trusted measure was detected\nthrough the front-end and back-end modules. It then describes in detail the process of the trusted measurement in\nthe two modules. Because the front-end module is in the guest virtual machine, it also describes the protocol to\nensure the integrity of the module. Finally, the model proved to address security challenges of the user virtual\nmachine in IaaS environments by a security analysis....
The popularity of mobile applications on smartphones requires mobile devices to perform high-performing\nprocessing tasks. The computational resources of these devices are limited due to memory, battery life, heat,\nand weight dissipation. To overcome the limitations of mobile devices, cloud computing is considered the\nbest solution. The major issues faced by cloud computing are expensive roaming charges and growing\ndemand for radio access. However, some major benefits associated with cloud computing are fast application\nprocessing, fast transfer of data, and substantial reduction in the use of mobile resources. This study\nevaluated the association between the distance of cloud servers and cloudlets with and without coordination\nand data latency. Fast communication in the cloudlet environment is facilitated by coordinated cloudlets,\nwhich have a positive influence on the infrastructure of cloud computing. The coordinated cloudlets can be\nefficiently accessed in different areas, such as vehicular networks, vehicular fog computing, and fog\ncomputing....
Cloud computing has a significant impact on information and communication technology (ICT) and is\none of the most important technological drivers of the digitalization of enterprises. However, due to the increasing\ndissemination of cloud services and the growing number of cloud service providers (CSPs), the uncertainty and risks\nfor user companies in adopting cloud services have also increased. In this paper, we address those aspects from the\nperspective of the CSPs. We identified relevant literature and studies and conducted interviews with business\nexperts from 16 German CSPs. In our results, we present current customer requirements and barriers to using cloud\nservices from a providerââ?¬â?¢s viewpoint and identify the actions of and obstacles for CSPs in meeting the needs and\nconstraints of the customers. Finally, we identify current and future challenges for CSPs in dealing with customer\nrequirements and barriers by addressing their root causes. One of the main challenges from the CSPsââ?¬â?¢ perspective is\naddressing customers appropriately and building relationships of trust. This also ââ?¬Å?forcesââ?¬Â changes in the sales\nprocesses. In this process, the essential challenges can be identified as an increase in complexity and a\nsimultaneous simplification of specific sales activities. Therefore, the necessity arises for the continuous support of\nbusiness relationships through value-adding and additional services. However, this results in another challenge for\nthe CSPs ââ?¬â?? Namely, to find the right balance between standardization and meeting customer-specific requirements.\nIn our paper, we show that the perspective of the CSPs is rarely discussed in the literature. Nevertheless,\nunderstanding the perceptions of the providers and their actions and measures is essential for future research\nactivities in the field of cloud service selection. Comparing the customersââ?¬â?¢ perspectives and viewpoints with the\nCSPsââ?¬â?¢ actions will enhance the development of a holistic selection approach for future cloud projects. Therefore, our\npaperââ?¬â?¢s contribution to research is also the identification of this missing integration....
Mobile communication and handheld devices are currently extremely popular, and provide\npeople with convenient and instant platforms for social networking. However, existing social\nnetworking services cannot offer efficient human-machine interfaces or intuitive user experiences.\nMobile users must manually input account information and find targets from search results when\nattempting to add someone to their friend list on social networking sites, such as Facebook and Twitter.\nAdditionally, mobile users may not be able to identify correct targets because some usernames are\nidentical. Typos may occur during the input process due to unfamiliar identifiers, further increasing\nthe total operation time. To encourage social initiation between mobile users, we design an instant\nsocial networking framework, called SocialYou, to minimize the startup time based on mobile cloud\ncomputing. SocialYou proposes an efficient architecture and innovative human-machine interfaces\nto alleviate the complexity and difficulty for mobile users using handheld devices. In particular,\nwe implement an Android-based prototype to verify the feasibility and superiority of SocialYou.\nThe experimental results show that SocialYou outperforms the existing methods and saves substantial\namounts of operation time for mobile social networking....
The use of cloud computing has become common due to advantages such as low cost and sizing of computing\nresources according to demand. However, it also raises security and privacy concerns, because critical data ââ?¬â?? for\nexample, in IoT applications ââ?¬â?? are stored and processed in the cloud. This paper proposes a software architecture that\nsupports multiple approaches to secure data aggregation. For validation purposes, this software architecture was\nused in the development of applications for smart grids, computing instantaneous consumption of a region and the\nmonthly bill of an individual consumer. The consumption data can be collected by smart meters, enabling consumers\nto reduce electricity costs through close monitoring. However, such data may reveal sensitive information if no\nprivacy techniques are applied. Therefore, the proposed software architecture proved to be viable from experiments\nwith techniques such as homomorphic encryption and hardware security extensions (Intel SGX)....
Loading....