The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud services are gaining popularity with times. Service level agreement (SLA) serves a basic understanding between the clients and cloud service providers (CSP). Ensuring secured and adequate service is a basic need of the customers. In this work a set of compliance parameters for cloud service level agreement is identified. A generic rule base is designed to empower the process with an automated...
This paper discusses the open issues in incorporating trust techniques in the NFV environment specified by the ETSI NFV Industry Specification Group, and analyses the available technologies to fill this gap. ETSI is developing security and trust specifications within its NFV-SEC working group, with the aim of establishing and assessing trust of both the hardware platform and the virtualised infrastructure...
With the steady increase of offered cloud storage services, they became a popular alternative to local storage systems. Beside several benefits, the usage of cloud storage services can offer, they have also some downsides like potential vendor lock-in or unavailability. Different pricing models, storage technologies and changing storage requirements are further complicating the selection of the best...
Telehealth relies on the ability of Information and Communication Technology (ICT) to maximize the quality of care provided remotely. Remote Patient Monitoring (RPM) is a key part within telehealth that enables patient to use devices to measure vital signs and sends it to a healthcare professional. Patients usually have multiple devices to measure vital signs. Those devices might be manufactured by...
The rapid development of extra-high voltage, smart power grid and energy internet leads to relative lagging of production management. This management strategy develops electric big data in depth and realizes an intelligent management platform with full life cycle management, standard defect closed-loop management, safety risk control, equipment state evaluation, etc. as its main carriers on the basis...
Cloud for Europe (C4E) is a project that aims at creating new Cloud workflows, named Service Flow (SF), for Public Administrations (PAs). These Services must guarantees on one hand to preserve national authorities, and on the other hand to promote efficiency, collaboration and harmonization for European PA bodies. This is possible by means of the creation of a Digital Market where PAs can select the...
Despite the great benefits of cloud computing on businesses, some organizations have had to withdraw from its service due to incomplete compliance to conditions from standards, bodies, or Service Level Agreements which have led to their being penalized. A structured and efficient model is helpful to aid small and medium scale enterprises (SMSEs) utilize cloud services safely and ascertain their fitting...
The Internet of Things (IoT) considers interconnected things e.g., devices that consumes web services through the internet. Such kind of devices may vary from smart phones, smart TVs, medical devices or industrial devices. Thanks to the development of the ICT field, many standards supports the existence of the IoT devices: HTTP (Hypertext Transferring Protocol), MQTT (Message Queue Telemetry Transport),...
This paper aims to evaluate the processes in the information processing chain of Internet of Things (IoT) applications from the perspective of value added by the processes. This innovative approach focuses on value architectures rather than technical network architectures. The goal is to lay the foundation for a reference process model for industrial IoT applications, which is capable to compare the...
Cloud infrastructures provide database services as cost-efficient and scalable solutions for storing and processing large amounts of data. To maximize performance, these services require users to trust sensitive information to the cloud provider, which raises privacy and legal concerns. This represents a major obstacle to the adoption of the cloud computing paradigm. Recent work addressed this issue...
Cloud computing has become a widely used computing paradigm providing on-demand computing and storage capabilities based on pay-as-you-go model. Recently, many organizations, especially in the field of big data, have been adopting the cloud model to perform data analytics through leasing powerful Virtual Machines (VMs). VMs can be attractive targets to attackers as well as untrusted cloud providers...
Increasing amounts of data from varied sources, particularly in the fields of machine learning and graph analytics, are causing storage requirements to grow rapidly. A variety of technologies exist for storing and sharing these data, ranging from parallel file systems used by supercomputers to distributed block storage systems found in clouds. Relatively few comparative measurements exist to inform...
Nowadays the adoption of IoT solutions is gaining high momentum in several fields, including energy, home and environment monitoring, transportation, and manufacturing. However, cybersecurity attacks to low-cost end-user devices can severely undermine the expected deployment of IoT solutions in a broad range of scenarios. To face these challenges, emerging software-based networking features can introduce...
Current cloud deployment scenarios imply a need for fast testing of user oriented software in diverse, heterogeneous and often unknown hardware and network environments, making it difficult to ensure optimal or reproducible in-site testing. The current paper proposes the use of container based lightweight virtualization with a ready-to-run, just-intime deployment strategy in order to minimize time...
In the past, virtualisation, and with it the move toward the cloud, has had a strong influence on the ICT (Information Communication Technology) sector, and now seems set to revolutionise the telecommunications sector as well. The virtualisation into software artefacts of functions that would usually be deployed as hardware has come to be known as Network Function Virtualisation (NFV), and the European...
Statistics show the volume of Earth Observation (EO) data increases in the exponential level during the past decade. As the new generation computing platform to meet the big data challenge, cloud computing significantly facilitates the large-scale EO data processing depending on its powerful computing capability. In this paper, we propose a Cloud WPS architecture integrating the cloud computing environment...
Nowadays, more and more Cloud providers are appearing on the market. In this context, a typical issue is represented by the management of distributed services deployed on different federated Cloud providers. Assuming that a distributed service consists of several microservices, in this paper, we specifically focus on the setup of virtual environments and on deployment tasks required in each Federated...
Computation offloading is a programming model in which program fragments (e.g. hot loops) are annotated so that their execution is performed in dedicated hardware or accelerator devices. Although offloading has been extensively used to move computation to GPUs, through directive-based annotation standards like OpenMP, offloading computation to very large computer clusters can become a complex and...
With the popularization of the network in recent years, the application of video broadcast system, video conference system, video Surveillance System and other aspects of the application have put forward higher requirements on the security of video information. Especially, if it is related to the military, economic and political sensitivity of the video data, studying the encryption of video data...
Following the Service-Oriented Architecture, a large number of diversified Cloud services are exposed as Web APIs (Application Program Interface), which serve as the contracts between the service providers and service consumers. Due to their massive and broad applications, any flaw in the cloud APIs may lead to serious consequences. API testing is thus necessary to ensure the availability, reliability,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.