Current Issue : July - September Volume : 2013 Issue Number : 3 Articles : 5 Articles
This paper examines the challenges to collaboration among responding entities and proposes a technology-enabled self-synchronization framework for sharing information using a distributed, highly scalable, web application based on the cloud computing technologies. The proposed design applies the unique benefits of cloud computing to the disaster response domain. This notional design facilitates communication among a broad range of public and private groups without requiring these organizations to compromise competitive advantage. During disaster response, key resources are supplied from a variety of channels including federal, state and local governments; charity and nongovernmental organizations; and commercial businesses. Disaster relief efforts require that response teams work together in a cohesive manner before, during, and after a disaster. During the first 48 to 72 hours, when both survivors and responders are likely to be disoriented, response efforts are less effective....
Cloud computing has become another key resource for IT deployments, but there is still fear of securing applications and data in the cloud. These concerns include authentication, authorization, accounting (AAA) services; encryption; storage; security breaches; regulatory compliance; location of data and users; and other risks associated with isolating sensitive corporate data. Cloud forensic is cross discipline of cloud computing and digital forensics. With the rise of cloud computing, Digital forensics face the problems of increase in cybercrime and its investigation with different challenges. Digital forensic practitioners must then try to adopt and extend their digital forensic skills and tools into cloud computing environments as well as help cloud organizations and cloud consumers in establishing and developing forensic capability, as well as reduce cloud security risks. This paper discusses the emerging area of cloud forensics and highlights its challenges and opportunities....
Recommender systems use, amongst others, a mechanism called collaborative filtering (CF) to predict the rating that\r\na user will give to an item given the ratings of other items provided by other users. While reasonably accurate CF can\r\nbe achieved with various well-known techniques, preserving the privacy of rating data from individual users poses a\r\nsignificant challenge. Several privacy preserving schemes have, so far, been proposed in prior work. However, while\r\nthese schemes are theoretically feasible, there are many practical implementation difficulties on real world public\r\ncloud computing platforms. In this paper, we present our implementation experience and experimental results on\r\ntwo public Software-as-a-Service (SaaS) enabling Platform-as-a-Service (PaaS) clouds: the Google App Engine for Java\r\n(GAE/J) and the Amazon Web Services Elastic Beanstalk (AWS EBS).a...
This article describes how a Redundant Array of Independent Net-storages (RAIN) can be deployed for confidentiality\r\ncontrol in Cloud Computing. The RAIN approach splits data into segments and distributes segments between\r\nmultiple storage providers; by keeping the distribution of segments and the relationships between the distributed\r\nsegments private, the original data cannot be re-assembled by an observer. As long as each segment is small enough,\r\nan individual segment discloses no meaningful information to others, and hence RAIN is able to ensure the\r\nconfidentiality of data stored in the clouds. We describe the inter-cloud communication protocol, and present a\r\nformal model, security analysis, and simulation results....
Cloud computing offers massively scalable, elastic resources (e.g., data, computing power, and services) over the\r\ninternet from remote data centres to the consumers. The growing market penetration, with an evermore diverse\r\nprovider and service landscape, turns Cloud computing marketplaces a highly competitive one. In this highly\r\ncompetitive and distributed service environment, the assurances are insufficient for the consumers to identify the\r\ndependable and trustworthy Cloud providers.\r\nThis paper provides a landscape and discusses incentives and hindrances to adopt Cloud computing from Cloud\r\nconsumers� perspective. Due to these hindrances, potential consumers are not sure whether they can trust the Cloud\r\nproviders in offering dependable services. Trust-aided unified evaluation framework by leveraging trust and\r\nreputation systems can be used to assess trustworthiness (or dependability) of Cloud providers. Hence, cloud-related\r\nspecific parameters (QoS+) are required for the trust and reputation systems in Cloud environments. We identify the\r\nessential properties and corresponding research challenges to integrate the QoS+ parameters into trust and\r\nreputation systems. Finally, we survey and analyse the existing trust and reputation systems in various application\r\ndomains, characterizing their individual strengths and weaknesses. Our work contributes to understanding 1) why\r\ntrust establishment is important in the Cloud computing landscape, 2) how trust can act as a facilitator in this context\r\nand 3) what are the exact requirements for trust and reputation models (or systems) to support the consumers in\r\nestablishing trust on Cloud providers....
Loading....