scholarly journals Flexible services for the support of research

Author(s):  
Matteo Turilli ◽  
David Wallom ◽  
Chris Williams ◽  
Steve Gough ◽  
Neal Curran ◽  
...  

Cloud computing has been increasingly adopted by users and providers to promote a flexible, scalable and tailored access to computing resources. Nonetheless, the consolidation of this paradigm has uncovered some of its limitations. Initially devised by corporations with direct control over large amounts of computational resources, cloud computing is now being endorsed by organizations with limited resources or with a more articulated, less direct control over these resources. The challenge for these organizations is to leverage the benefits of cloud computing while dealing with limited and often widely distributed computing resources. This study focuses on the adoption of cloud computing by higher education institutions and addresses two main issues: flexible and on-demand access to a large amount of storage resources, and scalability across a heterogeneous set of cloud infrastructures. The proposed solutions leverage a federated approach to cloud resources in which users access multiple and largely independent cloud infrastructures through a highly customizable broker layer. This approach allows for a uniform authentication and authorization infrastructure, a fine-grained policy specification and the aggregation of accounting and monitoring. Within a loosely coupled federation of cloud infrastructures, users can access vast amount of data without copying them across cloud infrastructures and can scale their resource provisions when the local cloud resources become insufficient.

2020 ◽  
Author(s):  
André Gradvohl

Pandemic brought new forms of remote education into the discussion. However, facilitating students' access to good computing infrastructure is not a widespread task. This paper presents a report on the use of computing resources in the AWS cloud by students in the Operating Systems class during the pandemic, from March to July 2020. The use of these computational resources was essential to consolidate some of the concepts covered in the course and, at the same time, to complement the students' knowledge about cloud computing. The results of this survey were very positive. Students said they learned more about the resources available in the cloud, the potential of cloud computing, and how to use it. Besides, they were able to create their remote infrastructure to carry out the work proposed in the Operating System class.


2020 ◽  
Author(s):  
André Gradvohl

Pandemic brought new forms of remote education into the discussion. However, facilitating students' access to good computing infrastructure is not a widespread task. This paper presents a report on the use of computing resources in the AWS cloud by students in the Operating Systems class during the pandemic, from March to July 2020. The use of these computational resources was essential to consolidate some of the concepts covered in the course and, at the same time, to complement the students' knowledge about cloud computing. The results of this survey were very positive. Students said they learned more about the resources available in the cloud, the potential of cloud computing, and how to use it. Besides, they were able to create their remote infrastructure to carry out the work proposed in the Operating System class.


2021 ◽  
Author(s):  
Chunming Rong ◽  
Jiahui Geng ◽  
Thomas J. Hacker ◽  
Haakon Bryhni ◽  
Martin G. Jaatun

Abstract Modern information systems are built fron a complex composition of networks, infrastructure, devices, services, and applications, interconnected by data flows that are often private and financially sensitive. The 5G networks, which can create hyperlocalized services, have highlighted many of the deficiencies of current practices in use today to create and operate information systems. Emerging cloud computing techniques, such as Infrastructure-as-Code (IaC) and elastic computing, o↵er a path for a future re-imagining of how we create, deploy, secure, operate, and retire information systems. In this paper, we articulate the position that a comprehensive new approach is needed for all OSI layers from layer 2 up to applications that are built on underlying principles that include reproducibility, continuous integration/continuous delivery, auditability, and versioning. There are obvious needs to redesign and optimize the protocols from the network layer to the application layer. Our vision seeks to augment existing Cloud Computing and Networking solutions with support for multiple cloud infrastructures and seamless integration of cloud-based microservices. To address these issues, we propose an approach named Open Infrastructure as Code (OpenIaC), which is an attempt to provide a common open forum to integrate and build on advances in cloud computing and blockchain to address the needs of modern information architectures. The main mission of our OpenIaC approach is to provide services based on the principles of Zero Trust Architecture (ZTA) among the federation of connected resources based on Decentralized Identity (DID). Our objectives include the creation of an open-source hub with fine-grained access control for an open and connected infrastructure of shared resources (sensing, storage, computing, 3D printing, etc.) managed by blockchains and federations. Our proposed approach has the potential to provide a path for developing new platforms, business models, and a modernized information ecosystem necessary for 5G networks.


2008 ◽  
pp. 138-161
Author(s):  
Rafae Bhatti ◽  
Daniel Sanz ◽  
Elisa Bertino ◽  
Arif Ghafoor

This chapter describes a policy-based authorization framework to apply fine-grained access control on Web services. The framework is designed as a profile of the well-known WS-Policy specification tailored to meet the access control requirements in Web services by integrating WS-Policy with an access control policy specification language, X-GTRBAC. The profile is aimed at bridging the gap between available policy standards for Web services and existing policy specification languages for access control. The profile supports the WS-Policy Attachment specification, which allows separate policies to be associated with multiple components of a Web service description, and one of our key contributions is an algorithm to compute the effective policy for the Web service given the multiple policy attachments. To allow Web service applications to use our solution, we have adopted a component-based design approach based on well-known UML notations. We have also prototyped our architecture in a loosely coupled Web services environment.


2015 ◽  
Vol 24 (03) ◽  
pp. 1541001 ◽  
Author(s):  
Johannes Wettinger ◽  
Uwe Breitenbücher ◽  
Frank Leymann

Leading paradigms to develop, deploy, and operate applications such as continuous delivery, configuration management, and the merge of development and operations (DevOps) are the foundation for various techniques and tools to implement automated deployment. To make such applications available for users and customers, these approaches are typically used in conjunction with Cloud computing to automatically provision and manage underlying resources such as storage and virtual servers. A major class of these automation approaches follow the idea of converging toward a desired state of a resource (e.g. a middleware component deployed on a virtual machine). This is achieved by repeatedly executing idempotent scripts to reach the desired state. Because of major drawbacks of this approach, we discuss an alternative deployment automation approach based on compensation and fine-grained snapshots using container virtualization. We perform an evaluation comparing both approaches in terms of difficulties at design time and performance at runtime. Moreover, we discuss concepts, strategies, and implementations to effectively combine different deployment automation approaches.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Jiawei Zhang ◽  
Ning Lu ◽  
Teng Li ◽  
Jianfeng Ma

Mobile cloud computing (MCC) is embracing rapid development these days and able to provide data outsourcing and sharing services for cloud users with pervasively smart mobile devices. Although these services bring various conveniences, many security concerns such as illegally access and user privacy leakage are inflicted. Aiming to protect the security of cloud data sharing against unauthorized accesses, many studies have been conducted for fine-grained access control using ciphertext-policy attribute-based encryption (CP-ABE). However, a practical and secure data sharing scheme that simultaneously supports fine-grained access control, large university, key escrow free, and privacy protection in MCC with expressive access policy, high efficiency, verifiability, and exculpability on resource-limited mobile devices has not been fully explored yet. Therefore, we investigate the challenge and propose an Efficient and Multiauthority Large Universe Policy-Hiding Data Sharing (EMA-LUPHDS) scheme. In this scheme, we employ fully hidden policy to preserve the user privacy in access policy. To adapt to large scale and distributed MCC environment, we optimize multiauthority CP-ABE to be compatible with large attribute universe. Meanwhile, for the efficiency purpose, online/offline and verifiable outsourced decryption techniques with exculpability are leveraged in our scheme. In the end, we demonstrate the flexibility and high efficiency of our proposal for data sharing in MCC by extensive performance evaluation.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jing Zou ◽  
Cheng Jian

Purpose The present investigation goals to empirically test the role of expert cloud on team performance and employee creativity. Here, the expert cloud comprises cloud application, cloud management, cloud infrastructure and cloud resources. The present study aims to identify important and key criteria and examine the relationships among them. In other words, the purpose of this study to find out the impact and relationship between cloud application, cloud management, cloud infrastructure and cloud resources and team performance and employee creativity. Design/methodology/approach Today, human societies’ rapid growth and the environmental changes that surround us every day are clearly visible. They highly affect our activities. In today’s highly complex organizations, people alone cannot handle all the issues that have arisen. As organizational managers are faced with diverse cultures in the governance of organizations, the need to use work teams with different abilities and specializations to achieve the goals of organizations leads managers to use teamwork and focus on employee creativity. On the other hand, the expert cloud makes it possible for human societies like universities, firms, industries, institutes, businesses and colleges to pool and share their human resources’ skills, knowledge and experiences to meet the competitive era’s demands. Therefore, the current investigation examines the impact of expert cloud on team performance and employee creativity. The research information is collected using an online questionnaire. The data collected is analyzed using AMOS and SMART PLS software. Findings All of the formulated hypotheses are supported. The results have shown that cloud application, cloud management, cloud infrastructure and cloud resources positively and significantly affect team performance and employee creativity. Practical implications Managers must be conscious of the vital role that the professional cloud plays in team performance and the innovation of workers. This paper would also make executives more conscious of the powerful tools in the field of cloud computing. Firms can use the outcomes of this paper investigation to improve team performance and employee creativity. Originality/value It is considered one of the initial efforts to demonstrate the impacts of expert cloud on team performance and employee creativity. This study’s value relies on that practitioners and academics may have supporting evidence on the role played by novel technology such as an expert cloud.


Sign in / Sign up

Export Citation Format

Share Document