scholarly journals PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing

2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Yixiao Zhu ◽  
Wenjie Ma ◽  
Jiangtao Cui ◽  
Xiaofang Xia ◽  
Yanguo Peng ◽  
...  

Contact tracing is a critical tool in containing epidemics such as COVID-19. Researchers have carried out a lot of work on contact tracing. However, almost all of the existing works assume that their clients and authorities have large storage space and powerful computation capability and clients can implement contact tracing on their own mobile devices such as mobile phones, tablet computers, and wearable computers. With the widespread outbreaks of the epidemics, these approaches are of less robustness to a larger scale of datasets when it comes to resource-constrained clients. To address this limitation, we propose a publicly verifiable contact tracing algorithm in cloud computing (PvCT), which utilizes cloud services to provide storage and computation capability in contact tracing. To guarantee the integrity and accuracy of contact tracing results, PvCT applies a novel set accumulator-based authentication data structure whose computation is outsourced, and the client can check whether returned results are valid. Furthermore, we provide rigorous security proof of our algorithm based on the q -Strong Bilinear Diffie–Hellman assumption. Detailed experimental evaluation is also conducted on three real-world datasets. The results show that our algorithm is feasible within milliseconds of client CPU time and can significantly reduce the storage overhead from the size of datasets to a constant 128 bytes.

2020 ◽  
pp. 1750-1769
Author(s):  
Alexandru Aurel Costan ◽  
Bogdan Iancu ◽  
Petru Cosmin Rasa ◽  
Alexandru Radu ◽  
Adrian Peculea ◽  
...  

Cloud computing is considered the next step in the evolution of technological applications, services and products development, in the Future Internet and Internet of Things context. The permanent connection of users to the Internet has become widespread, so almost all available resources (data, software) can be placed on the Internet, shared between users - sometimes completely independently of others, and brought from the Internet to the user's computer on demand. The chapter highlights the benefits of using hybrid technology with a focus towards entrepreneurs and business innovators. Intercloud systems are built of heterogeneous services, offered by different providers of cloud computing. To emphasize the business opportunities offered by innovative Intercloud approaches, an architecture for the interconnection of cloud services offered by multiple cloud providers, with applications to e-health, is presented. The main concepts and business benefits of using Intercloud systems and an architecture for interconnecting cloud services from multiple cloud providers is described.


Author(s):  
Mohamed Firdhous ◽  
Suhaidi Hassan ◽  
Osman Ghazali

Quality of service plays an important role in distributed systems. Cloud computing has been the recent entrant to the distributed system market and has revolutionized computing by changing the way computing resources are accessed and paid for. Users can access cloud services and pay only for the usage similar to utilities. Trust computing systems can be employed for identifying the service providers quality in terms of their adherence to the committed in SLAs. Several trust computing mechanisms have been proposed in literature based on various algorithms and functions. Almost all of them are based on a single performance parameter and modify the trust scores monotonously when performance deviations are reported. This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores. Hence the proposed mechanism is protected from momentary fluctuations in system performances. The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long term system performance than the ones that were computed without the validation of the inputs.


Author(s):  
Mohamed Firdhous ◽  
Osman Ghazali ◽  
Suhaidi Hassan

Quality of service plays an important role in making distributed systems. Users prefer service providers who meet the commitments specifi ed in the Service Level Agreements to these who violate them. Cloud computing has been the recent entrant to the distributed system market and has revolutionized it by transforming the way the resources are accessed and paid for. Users can access cloud services including hardware, development platform and applications and pay only for the usage similar to the other utilities. Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specifi ed in the Service Level Agreements. Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions. Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported. This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresisbased algorithm. Hence the proposed mechanism can protect the trust scores from changes due to momentary fl uctuations in system performances. The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.  


Author(s):  
Alexandru Aurel Costan ◽  
Bogdan Iancu ◽  
Petru Cosmin Rasa ◽  
Alexandru Radu ◽  
Adrian Peculea ◽  
...  

Cloud computing is considered the next step in the evolution of technological applications, services and products development, in the Future Internet and Internet of Things context. The permanent connection of users to the Internet has become widespread, so almost all available resources (data, software) can be placed on the Internet, shared between users - sometimes completely independently of others, and brought from the Internet to the user's computer on demand. The chapter highlights the benefits of using hybrid technology with a focus towards entrepreneurs and business innovators. Intercloud systems are built of heterogeneous services, offered by different providers of cloud computing. To emphasize the business opportunities offered by innovative Intercloud approaches, an architecture for the interconnection of cloud services offered by multiple cloud providers, with applications to e-health, is presented. The main concepts and business benefits of using Intercloud systems and an architecture for interconnecting cloud services from multiple cloud providers is described.


Cloud computing is currently the most sought-after solution for almost all of enterprise problems. Distinguishing features of the Cloud are ease of service and lesser hassle on the client end. These services come with a hefty price. Cloud services face issues of delay, slower connectivity and security. Fog Computing answers these downsides by providingnearer-to-ground and ever available Internet connection to nodes.Fog Computing relies on multiple, smaller clouds, nearer to ground.Internet of Things is the next logical leap for Internet. It envisions creating an environment wherein various heterogeneous devices can communicate with each other via internet. Enabling Internet of Things requires uninterrupted Internet connection and an interpreter.Both these features are intrinsically present in Fog Computing. Hence, this paper proposes Fog asthe expected ground for enabling Internet of Things


In this challenging era of technology where cloud computing has expanded its application wings in almost all areas. From individual end-users, small scale business to large organizations. All of them are now free from the maintenance, updating the software and taking the advantage of low-cost investments just by hiring the services and required applications from the cloud rather than building and maintaining the same. Though these advantages are creating much demand for cloud services with more required features at the same time, a challenge comes on the other side from attacks on client's data in the cloud. It becomes more difficult for the investigator to carry out the investigation during cyber-attacks on the cloud. During the attacks, there is a need for a quick response when certain anti-forensics is carried out to mislead the investigators. They may lead to waste of time, efforts, and spent cost. This paper presents a unique methodology to mitigate anti-forensics in a cloud with the effective usage of the relevant graphs. With the effective usage of graphs by the generation of attack, evidence and anti-forensic graphs helpful for the investigator to understand the cause and to carry out relatively countermeasures right way without being deviated by the anti-forensics.


2021 ◽  
Vol 11 (2) ◽  
pp. 193-199
Author(s):  
Anuj Kumar Yadav ◽  
Ritika ◽  
Madan Garg

Cloud computing has emerged as a potential substitute over traditional computing systems during the time of the COVID-19 pandemic. Almost all organizations shift their working from conventional ways to the online form of working. Most of the organizations are planning to permanently change some % of their work to online WFH (Work from Home) mode. There are numerous benefits of using cloud services in terms of cost, portability, platform independence, accessibility, elasticity, etc. But security is the biggest barrier when one wants to move towards cloud computing services, especially the cloud storage service. To overcome the problem of security in cloud storage systems, we have presented an approach for data security in cloud storage. The proposed approach uses the cryptographic methods and provides security and monitoring features to the user data stored in cloud storage systems. The proposed approach continuously monitors user’s data for any kind of modification by attackers. Thus, approach not only provides data security but also improves user’s trust on cloud based storage services.


2015 ◽  
Vol 8 (2) ◽  
Author(s):  
Hitesh Marwaha ◽  
Dr. Rajeshwar Singh

Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. Cloud Computing is a computing model, in which customer plug into the “cloud” to access IT resources which are priced and provided “on-demand”. The major challenges that prevent Cloud Computing from being adopted are recognized by organizations are security issues. Many techniques for securing the data in cloud are proposed by researcher but almost all methods have some drawbacks and till date no appropriate method has not been proposed that Cloud service providers can win the trust of customer. In this research paper the various security issues are reviewed along with cloud computing service providers which will give a deep insight for cloud service providers as well as researchers to work on the areas and make cloud computing a“trusted computing “and hardening the confidence of organizations towards cloud computing migration.


2013 ◽  
Vol 2013 ◽  
pp. 1-12 ◽  
Author(s):  
Zhao Wu ◽  
Naixue Xiong ◽  
Yannong Huang ◽  
Qiong Gu ◽  
Chunyang Hu ◽  
...  

At present the cloud computing is one of the newest trends of distributed computation, which is propelling another important revolution of software industry. The cloud services composition is one of the key techniques in software development. The optimization for reliability and performance of cloud services composition application, which is a typical stochastic optimization problem, is confronted with severe challenges due to its randomness and long transaction, as well as the characteristics of the cloud computing resources such as openness and dynamic. The traditional reliability and performance optimization techniques, for example, Markov model and state space analysis and so forth, have some defects such as being too time consuming and easy to cause state space explosion and unsatisfied the assumptions of component execution independence. To overcome these defects, we propose a fast optimization method for reliability and performance of cloud services composition application based on universal generating function and genetic algorithm in this paper. At first, a reliability and performance model for cloud service composition application based on the multiple state system theory is presented. Then the reliability and performance definition based on universal generating function is proposed. Based on this, a fast reliability and performance optimization algorithm is presented. In the end, the illustrative examples are given.


Sign in / Sign up

Export Citation Format

Share Document