A conceptual framework for cloud-computing management: An end-user environment perspective

Author(s):  
Likhwa Mlotshwa ◽  
Awie Leonard ◽  
Felix Ntawanga
Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


Author(s):  
Siddath Raghavan ◽  
Saideep M ◽  
Shivashankar S ◽  
Dr. Durga Devi M

An interactive Student Information system in the cloud is an one stop portal on the internet where the students can get answers to their queries and look up relevant information. The users can check their personal details, communicate with faculties and avail a ”livechat” to get their queries solved. They are also able to access relevant information regarding different activities and events including and not limited to ”attendance”, ”timetable”, ”subject list”, ”college events”, etc. Cloud technologies reduce the challenges faced by traditional systems such as costs associated with development and maintenance. The student support system is ubiquitous in nature since it is hosted in the cloud and uses the power of cloud computing to make the application secure, scalable, and fast. Along with the power of cloud computing, good User Interface/User Experience(UI/UX) is focused upon to ensure that the end-user has a great hassle-free experience. Load balancers are used to handle huge traffic the website might face. User experience principles are used in order to make the portal easy to use.


2021 ◽  
Author(s):  
◽  
Andrew R. Mitchener

<p>Transport infrastructure is the template upon which we build our inhabitations. Decisions regarding street arrangements, block sizes, and larger scale infrastructure design for example have an enduring and profound affect on the quality of our spatial environments. The conceptual framework we apply when generating and subsequently manipulating this template sets the parameters by which it is judged. By convention, transport infrastructure is considered a purely technical undertaking, within which designers rarely play any meaningful part. The spaces of mobility are thus from their very genesis conceived as instrumental in nature, judged as mere conduits whose function is to join meaningful places such as work and home, fulfilling an economic imperative. Recent research has shown however that affective, symbolic factors play a greater role than instrumental considerations in modal choice of commuters, suggesting that, to the end user at least, transport possesses a value beyond simple utility. Indeed, mobility itself is often cited as a defining characteristic of the modern world, implying a highly symbolic status. This gap between the instrumental conceptual framework we apply to transport infrastructure and the symbolically loaded experience of mobility is an opportunity for design to enrich the experience of users, framed in this research as commuters. Through investigation of the commute as a quotidian, secular ritual greater consideration is given to extra-economic value in the spaces of transport infrastructure. This research analyses the nature and function of ritual in contemporary secular life and argues for the applicability of a ritual framework for understanding value in transport infrastructure. The spatial implications of ritual (defined as symbol + action  and exhibiting the key sociocultural functions of mnemonic and liminality) are explored through the design of a harbour ferry terminal for Wellington.</p>


Author(s):  
Claudio Estevez

Cloud computing is consistently proving to be the dominant architecture of the future, and mobile technology is the catalyst. By having the processing power and storage remotely accessible, the main focus of the terminal is now related to connectivity and user-interface. The success of cloud-based applications greatly depends on the throughput experienced by the end user, which is why transport protocols play a key role in mobile cloud computing. This chapter discusses the main issues encountered in cloud networks that affect connection-oriented transport protocols. These issues include, but are not limited to, large delay connections, bandwidth variations, power consumption, and high segment loss rates. To reduce these adverse effects, a set of proposed solutions are presented; furthermore, the advantages and disadvantages are discussed. Finally, suggestions are made for future mobile cloud computing transport-layer designs that address different aspects of the network, such as transparency, congestion-intensity estimation, and quality-of-service integration.


Author(s):  
Pedro R. Palos-Sanchez ◽  
Marisol B. Correia

This chapter aims to expose the current situation of the adoption of cloud computing in companies in general and in enterprises of the tourism sector in particular. For this, a review of the literature has been carried out to establish the conceptual framework of technology and of the new economic model that underlies its adoption. Cloud computing is one of the technologies less known to many organizations and especially users, as it is a new technology based on the Internet, through which information is stored on servers, is provided as a service and on clients' demand. Therefore, the main theories of adoption that have been used to explain the different adoption models are presented, as well as, the different solutions that are being used in the tourist industry.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


Author(s):  
Ahmed El-Yahyaoui ◽  
Mohamed Daifr Ech-Cherif El Kettani

Fully homomorphic encryption schemes (FHE) are a type of encryption algorithm dedicated to data security in cloud computing. It allows for performing computations over ciphertext. In addition to this characteristic, a verifiable FHE scheme has the capacity to allow an end user to verify the correctness of the computations done by a cloud server on his encrypted data. Since FHE schemes are known to be greedy in term of processing consumption and slow in terms of runtime execution, it is very useful to look for improvement techniques and tools to improve FHE performance. Parallelizing computations is among the best tools one can use for FHE improvement. Batching is a kind of parallelization of computations when applied to an FHE scheme, it gives it the capacity of encrypting and homomorphically processing a vector of plaintexts as a single ciphertext. This is used in the context of cloud computing to perform a known function on several ciphertexts for multiple clients at the same time. The advantage here is in optimizing resources on the cloud side and improving the quality of services provided by the cloud computing. In this article, the authors will present a detailed survey of different FHE improvement techniques in the literature and apply the batching technique to a promising verifiable FHE (VFHE) recently presented by the authors at the WINCOM17 conference.


2018 ◽  
Vol 7 (3.27) ◽  
pp. 318
Author(s):  
K Kalaiselvi ◽  
N Jayashri ◽  
G Saraswathi

Cloud computing providing confidentiality over the insensitive data was the major issue related to security. It verifies the data owned by the server through linear computations. The proposed work enables security and efficiency using the cryptographic techniques of hybrid algorithms, securing the sensitive information that is present in the cloud. In the hybrid algorithm, it is the combination of problem encryption, key generation, result decryption and proof generation. It also validates the results which are being computed and also provides end-to-end confidentiality over the data to both the end user. The uses of hybrid algorithm results in a random key generation, encrypt/decrypt, and validate the satisfied results. This will provide a low cost to both server and client.  


Sign in / Sign up

Export Citation Format

Share Document