E2EE For Data Security For Hybrid Cloud Services: A Novel Approach

Author(s):  
Kavita Saini ◽  
Vaibhav Agarwal ◽  
Arjun Varshney ◽  
Anushka Gupta
2012 ◽  
Vol 2 (1) ◽  
pp. 44-57 ◽  
Author(s):  
Yannis Siahos ◽  
Iasonas Papanagiotou ◽  
Alkis Georgopoulos ◽  
Fotis Tsamis ◽  
Ioannis Papaioannou

The authors present their experience and practices of introducing cloud services, as a means to simplify the adoption of ICT (Information Communication and Technology) in education, using Free/Open Source Software. The solution creates a hybrid cloud infrastructure, in order to provide a pre-installed (Ubuntu and Linux Terminal Server Project) virtual machine, acting as a server inside the school, providing desktop environment based on the Software as a Service cloud model, where legacy PCs act as stateless devices. Classroom management is accomplished using the application “Epoptes.” To minimize administration tasks, educational software is provided accordingly, either on-line or through repositories to automate software installation (including patches and updates). The advantages of the hybrid cloud implementation, include services that are not completely dependent on broadband connections’ state, minimal cost, reusability of obsolete equipment, ease of administration, centralized management, patches and educational software provisioning and, above all, facilitation of the educational procedure.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Shurui Gao ◽  
Weidong Meng

PurposeCloud-based technologies are reliably improving Information Technology (IT) environment incorporating changes and modifications to the present business structure. Cloud computing enables small and medium-sized businesses (SMBs) to organize and exchange pertinent data and information in real time. This study checks out the influence of cloud-based services (IT infrastructure, expenses of cloud services, cloud data security and IT knowledge of human resources) on customers' satisfaction in SMBs.Design/methodology/approachCloud computing offers a way to coordinate and share organizational and personal information and data. The adoption of cloud services is one of the most emerging technological advances in the current competitive business environment. Cloud-based services allow start-ups or SMBs to take advantage of technological advancements and respond more quickly to changing consumer demands. In the available literature, cloud computing has received a lot of attention. However, there is also a research gap in creating a paradigm that links the value development drivers in the electronic industry with the leveraging impact of cloud and intercloud computing resources for start-ups and SMBs. A hypothetical model was constructed based on a literature review, and the associations between the latent variables were investigated utilizing structural equations.FindingsFindings from the study confirmed the validity of the proposed model for customer satisfaction assessment. Besides, the results showed that customer satisfaction is affected by cloud-based services in SMBs. The results illustrated that IT infrastructure influences customer satisfaction significantly and positively, with a T-value of 2.42. Also, the results confirmed that the cost of cloud services with a T-value of 2.68 affects customer satisfaction significantly and positively. Cloud data security also impacts customer satisfaction with a T-value of 5.20. The results also showed that the IT knowledge of human resources affects customer satisfaction with a T-value of 3.01.Originality/valueThe main originality of this research is proposing a new conceptual model to assess the impact of cloud-based services on the satisfaction of the customers in SMBs.


Author(s):  
Yannis Siahos ◽  
Iasonas Papanagiotou ◽  
Alkis Georgopoulos ◽  
Fotis Tsamis ◽  
Lefteris Nikoltsios

In this chapter, the authors present the methodology and the results of their effort towards the introduction of cloud services as a means to simplify the adoption of ICT in education using Free/Open Source Software. A hybrid cloud infrastructure is established in order to provide Linux and optionally MS-Windows desktop environments with the Software as a Service cloud model. Legacy and modern school PCs function as stateless devices. To achieve this, their “Sch-scripts” application performs an unattended installation of the Linux Terminal Server Project software to a school computer that also hosts centrally maintained virtual machines. Classroom management is accomplished using their “Epoptes” application. Administration is only required in the school server while the educational software is provided with the Software as a Service model either in online form or through repositories that automate software installation. Four-hundred-twenty schools have already implemented this architecture and 117 responded to the evaluation survey. The statistical analysis of these answers confirms the design principles, which include minimal cost, as well as reusability of obsolete equipment, ease of administration, centralized management, patches and educational software provisioning, classroom management, and above all, facilitation of the educational procedure.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2019 ◽  
Vol 8 (1) ◽  
pp. 4 ◽  
Author(s):  
Saleh Altowaijri ◽  
Mohamed Ayari ◽  
Yamen El Touati

By nature, some jobs are always in closed environments and employees may stay for long periods. This is the case for many professional activities such as military watch tours of borders, civilian buildings and facilities that need efficient control processes. The role assigned to personnel in such environments is usually sensitive and of high importance, especially in terms of security and protection. With this in mind, we proposed in our research a novel approach using multi-sensor technology to monitor many safety and security parameters including the health status of indoor workers, such as those in watchtowers and at guard posts. In addition, the data gathered for those employees (heart rate, temperature, eye movement, human motion, etc.) combined with the room’s sensor data (temperature, oxygen ratio, toxic gases, air quality, etc.) were saved by appropriate cloud services, which ensured easy access to the data without ignoring the privacy protection aspect of such critical material. This information can be used later by specialists to monitor the evolution of the worker’s health status as well as its cost-effectiveness, which gives the possibility to improve productivity in the workplace and general employee health.


2020 ◽  
Vol 10 (12) ◽  
pp. 4110
Author(s):  
Qian Huang ◽  
Weichuan Yin ◽  
Jiuyu An ◽  
Yuanxiang Zhou

This paper describes the development and plans for the implementation of a cloud-based logistics platform to enable and optimize cross-border shipping, using the China Railway Express (CR Express) in the context of China’s recent One Belt and One Road (OBOR) initiative as an example of an extremely complex system that is running at suboptimal efficiency. We design a cross-border logistics information cloud platform (CLICP) and its architecture. The proposed CLICP comprises a hybrid cloud model with three layers of cloud services. We also examine the CLICP’s operation and the design of the platform’s functions, including core business and value-added service functions, such as real-time bidding, freight information push, and carrier one-stop service management functions. Finally, we propose a model for deploying our CLICP. Our study makes a significant contribution to the literature because of its hybrid cloud model architecture and for the completeness of its functionality. The study also has a good application prospect for the operation of CR Express and will play a better supporting role in cross-border logistics.


2019 ◽  
Vol 8 (4) ◽  
pp. 2882-2890

Over the recent years, the expansion of cloud computing services enable hospitals and institutions to transit their healthcare data to the cloud, thus it provides the worldwide data access and on-demand high quality services at a cheaper rate. Despite the benefits of healthcare cloud services, the associated privacy issues are widely concerned by individuals and governments. Privacy risks rise when outsourcing personal healthcare records to cloud due to the sensitive nature of health information and the social and legal implications for its disclosure. Over the recent years, a privacy-preserving data mining (PPDM) technique has become a critical issue for the problems. Our goal is to design a privacy-preserving outsourcing framework under the hybrid cloud model. In this work we propose a Hybrid Ant Colony Optimization and Gravitational Search Algorithm (ACOGSA) to express the problem of hiding sensitive data through transaction deletion. Thus, it reduces the side effects of the hybrid cloud. Substantive experiments will be carried to compare the performance of the designed algorithm with the state-of-the-art approaches in terms of the side effects and database similarity (integrity). Over the past to sanitize the databases used for hiding sensitive information, a few heuristic approaches have been proposed. The method used for the comparison involves GA, PSO, ACO, and Firefly framework.


Sign in / Sign up

Export Citation Format

Share Document