The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, more and more Cloud providers are appearing on the market. In this context, a typical issue is represented by the management of distributed services deployed on different federated Cloud providers. Assuming that a distributed service consists of several microservices, in this paper, we specifically focus on the setup of virtual environments and on deployment tasks required in each Federated...
The ever increasing utilisation of crowdsourcing in various domains and its popularity as a method of accessing free or inexpensive labour, services, and innovation, and also as a method of providing fast solutions is observed as a good opportunity for both non-profit and for-profit organisations while it also appeals to members of the crowd. In particular, many cloud-based projects have benefited...
The integration of Internet of Things (IoT) and Cloud computing has brought the rising of IoT Clouds able to provide different kinds of IoT as a Service solutions consisting of various micro-services deployed in IoT devices (including sensors and actuators) interacting with different Infrastructure, Platform, and Software as Service (i.e., IaaS, PaaS, SaaS) running in the Clouds' data centres. On...
In the paper, a location-based reminder application iDoRemind is developed to assist people in remembering and managing their everyday activities. iDoRemind overcomes the weakness of the existing location-based reminder applications by repeated alerting the user and suggesting the alternative locations based on users' preferences and their current location. The suggested locations are ranked according...
The survey of related works on insider information security (IS) threats is presented. Special attention is paid to works that consider the insiders' behavioral models as it is very up-to-date for behavioral intrusion detection. Three key research directions are defined: 1) the problem analysis in general, including the development of taxonomy for insiders, attacks and countermeasures; 2) study of...
Cloud computing is the expansion of parallel computing, distributed computing. The technology of cloud computing becomes more and more widely used, and one of the fundamental issues in this cloud environment is related to task scheduling. However, scheduling in Cloud environments represents a difficult issue since it is basically NP-complete. Thus, many variants based on approximation techniques,...
With the increasing availability of Internet of Things (IoT) devices, and potential applications that make use of data from such devices, there is a need to better identify appropriate data processing techniques that can be applied to this data. The computational complexity of these applications, and the complexity of the requirements on the data processing techniques, often derives from the capabilities...
The survey of related work in the very specialized field of information security (IS) ensurance for the Internet of Things (IoT) allowed us to work out a taxonomy of typical attacks against the IoT elements (with special attention to the IoT device protection). The key directions of countering these attacks were defined on this basis. According to the modern demand for the IoT big IS-related data...
Low Power Wide Area Networks (LPWAN) are expected to interconnect a high number of simple and inexpensive devices. The ability to control transmission parameters including modulation scheme and output power, enables reduction of the deployment costs, improvement of the network reliability, in terms of error performance under suboptimal conditions, and could contribute to the reduction of the maintenance...
Migration of existing enterprise applications to the Cloud requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating the application with functional and non-functional aspects. However, none of them has focused so far on the adaptation of security and privacy. In our previous work, Identity-as-a-service (IDaaS) decouples Authentication and...
The Internet of Things (IoT) offers challenges that are being met by the convergence of multiple technologies, which have matured rapidly over the past decade. Broadband communication and mobile platforms enable raw data collection and its transmission to the cloud. Data science, e.g., deep learning, transforms large amounts of data from the Internet-connected sensors and personal devices in meaningful...
The use of animals, specially ovines, for controlling infesting species in crops is an ancient method that has several advantages with respect to the use of chemical and/or mechanical techniques. Shepherds required to supervise animals, are getting increasingly less available and are costly. Over the last years, technologies for automatic animal supervision have been investigated, typically including...
Although academic and industry experts are now advocating for going from large-centralized Cloud Computing infrastructures to smaller ones massively distributed at the edge of the network, management systems to operate and use such infrastructures are still missing. In this paper, we focus on the monitoring service which is a key element to any management system in charge of operating a distributed...
Cloud users may decide to live migrate their virtual machines from a public cloud provider to another due to a lower cost or ceasing operations. Currently, it is not possible to install a second virtualization platform on public cloud infrastructure (IaaS) because nested virtualization and hardwareassisted virtualization are disabled by default. As a result, cloud users' VMs are tightly coupled to...
Failure in cloud system is defined as an even that occurs when the delivered service deviates from the correct intended service. As the cloud computing systems continue to grow in scale and complexity, there is an urgent need for cloud service providers (CSP) to guarantee a reliable on-demand resource to their customers in the presence of faults thereby fulfilling their service level agreement (SLA)...
Recently, flexible networks contain various services designed and implemented by different vendors to accomplish specific tasks. Trust to security systems of such services is a significant challenge. In this paper, we propose a framework to assess trust to security systems of web services based on security policy specifications and security mechanisms running on flexible networks. The framework may...
The interconnection of several web services into single composite web services is known as Web Service Composition (WSC). WSC can be implemented in three different ways such as static, semi-dynamic and dynamic. In this research, the dynamic web service composition is accentuated as it is the most challenging method where it occurs during run time to fulfill the business process requirement. Too many...
The Semantic Data are built from triples, that contain subjects, predicates and objects. On the other hand we can consider the triples as edges. The subject and the object are the nodes and the predicate is the label of the edge. In this view the Semantic Data define a graph. This graph can be very large, because a Semantic Dataset contains millions of triples. To query this dataset we can use the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.