A Proposed Model for Trust Management: Insights from a Simulation Study in the Context of Cloud Computing

2020 ◽  
Vol 17 (7) ◽  
pp. 2983-2988
Author(s):  
Gowtham Mamidisetti ◽  
Ramesh Makala

In computing systems, one of the centric topics entails cloud computing. This dominance is attributed to the crucial role that the concept plays in the daily lives of individuals, especially in the wake of the increasing adoption of technology by individuals and organizations. Indeed, the motivation behind the establishment, adoption, and implementation of cloud computing has been attributed to the need to offer low-cost and quick consumer service provision, as well as data manipulation and storage. However, the cloud environment continues to face security threats, a trend that informs the need for further investigations and analyses that could provide room for new system improvements. The current simulation study presents a dynamic model for security management in a cloud computing environment, with the central parameter involving electronic trust. Imperatively the proposed study examines interactions between the data provider and the data owner, as well as the end user. Specifically, the proposed model is that which ensures that for authentication purposes and access permissions, there is a continuous update of trust values. From the results, the model is flexible relative to the provision of dynamic access control, a positive trend that points to its promising level of efficiency.

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Author(s):  
Ghada Refaat El Said

While e-commerce can contribute significantly to the economies of developing countries, challenges may include a lack of telecommunications infrastructure, low Internet and credit card penetration, lack of skilled professionals and insufficient delivery systems. Cloud computing offers a solution to most of these challenges, providing access to a low-cost, reliable and flexible internet-based infrastructure. However, there is little empirical validation of the adoption of cloud computing in e-commerce; to bridge that gap, the present study proposes a cloud-based model of e-commerce adoption. Based on a survey of leaders of 175 small, medium, and large ICT firms in Egypt, a developing country where e-commerce is expected to boom in the coming years, the proposed model empirically validates organizational, technical and contextual factors that would make e-commerce adoption more effective for business, governments and service providers.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 161
Author(s):  
Shakti Arora ◽  
Surjeet Dalal

Cloud computing is the becoming the architecture information technology of next generation. Cloud computing provides dynamic set of resources for different category of users. Remote access of resources is available on the pay per basis. Cloud is using the storage, computing, infrastructure services according to the requirements. Cloud manages all the user data at distributed level and provides reliability, flexibility and on demand services to user with very low cost. In Now days scenario cloud applications and data over the cloud machines are increasing day by day which indirectly invites different threats for the crucial and sensitive data on cloud. In this paper, we proposed a security model that will give the computational enhancements in different modules data. The different proposed modules: 1) key generation 2) access control strong encryption 4) remote integrity checks. The proposed model enhances t confidentiality, authentication and integrity of data. From the result analysis, it has been concluded that computation and communication overhead are minimized as compared to previous model with higher efficiency achieved.  


2020 ◽  
Vol 17 (12) ◽  
pp. 5250-5255
Author(s):  
Pasam Prudvi Kiran ◽  
E. Laxmi Lydia

The way the COVID-19 circumstance has been advancing is very disturbing over the globe and apparently this battle will be a prolonged one. At least, till the mission for vaccination succeeds, we should figure out how to live safely alongside the infection. Along with all the safety measures we have recently incorporated into our daily lives, the provision of continuous availability of water in a water tank at households, schools, marketplaces, health care facilities, and all other public gathering places is essential for right time self-sanitation and for maintaining hygienic surroundings, which ensures protection from this pandemic. In this work, at first, we explore the important role of continuous water availability in this pandemic lifestyle. Secondly, we provide a brief survey of existing works which are closely related to proposed problem and thirdly, we have prepared an improved model overcoming the maximum limitations of surveyed models and also adding new feature of thought provoking GUI and applied it to a practical case study to demonstrate its need and effectiveness. Proposed model can be adopted immediately in a cost-effective manner, with applicability ranging from 1000 Litre plastic water tank serving a normal house hold to 1000000 Litre overhead water tank serving a small village or a big industry, promoting the continuous availability of water.


2019 ◽  
Vol 8 (1) ◽  
pp. 44-49
Author(s):  
R. K. Ramesh . ◽  
K. L. Neela .

In the recent years, the cloud computing moves a step forward by providing more services for the individual users and organizations. Each and every technology and systems can be easily integrated with cloud environment. In future lot of new technology will come to play their role. But to make the new technology fulfill their role they surely need a small part of cloud computing. The cloud plays a vital role in managing the data of different users. Users may be individual or organization and they use any cloud deployment model. Cloud provides low cost unpredictable and untraceable storage space to store user’s data. The main aim is to keep the data reliable, available, secure and sharable for the authorized users. But keeping the data secure is a big issue .In a public cloud any one can access the cloud easily. But the CSP or data owner has to prevent the unauthorized user’s access to the cloud. CSP can easily modify or delete the data which are not used by the user for a long time so as to get the storage space .The data integrity problem can be overcome by some different techniques which are proposed in various models .We can surely say that this cloud computing technology will become popular than any other technology.


Author(s):  
Steffina Muthukumar ◽  
S D Karthik ◽  
Diya D Jain ◽  
Rohit Ravindran

Cloud computing has drawn expanding interests from both scholastic and industry in the recent years because of its productiveness and low-cost management. Since it offers different types of assistance in an open organization, it is critical for users to utilize secure information for stockpiling and sharing data to guarantee information classification and data users protection. To safely Protect information, the most broadly utilized technique is encryption. The dual-access control, with regards to cloud-based storage, is a control system over both the data owner and the user who can upload and download files without loss of safety, data[1] and effectiveness. The credulous arrangement is that the user can download the whole database[2]. The framework planned in this paper is when the A user logs in with his credentials and after successful acceptance from the two different administrators, the user will be able to download the file present over the cloud. When a malicious user requests, the administrators can find it because it will generate a null value and they can block the user from downloading the files.


2017 ◽  
Vol 15 (3) ◽  
pp. 64-82
Author(s):  
Ghada Refaat El Said

While e-commerce can contribute significantly to the economies of developing countries, challenges may include a lack of telecommunications infrastructure, low Internet and credit card penetration, lack of skilled professionals and insufficient delivery systems. Cloud computing offers a solution to most of these challenges, providing access to a low-cost, reliable and flexible internet-based infrastructure. However, there is little empirical validation of the adoption of cloud computing in e-commerce; to bridge that gap, the present study proposes a cloud-based model of e-commerce adoption. Based on a survey of leaders of 175 small, medium, and large ICT firms in Egypt, a developing country where e-commerce is expected to boom in the coming years, the proposed model empirically validates organizational, technical and contextual factors that would make e-commerce adoption more effective for business, governments and service providers.


10.31355/33 ◽  
2018 ◽  
Vol 2 ◽  
pp. 105-120
Author(s):  
Hamed Motaghi ◽  
Saeed Nosratabadi ◽  
Thabit Qasem Atobishi

NOTE: THIS ARTICLE WAS PUBLISHED WITH THE INFORMING SCIENCE INSTITUTE. Aim/Purpose................................................................................................................................................................................................. The main objective of the current study is to develop a business model for service providers of cloud computing which is designed based on circular economy principles and can ensure the sustainable consumption. Background Even though the demand for cloud computing technology is increasing day by day in all over the world, the current the linear economy principles are incapable to ensure society development needs. To consider the benefit of the society and the vendors at the same time, the principles of circular economy can address this issue. Methodology................................................................................................................................................................................................. An extensive literature review on consumption, sustainable consumption, circular economic, business model, and cloud computing were conducted. the proposed model of Osterwalder, Pigneur and Tucci (2005) is admitted designing the circular business model. Contribution................................................................................................................................................................................................. The proposed model of the study is the contribution of this study where provides the guidelines for the cloud computing service providers to achieve both their economic profits and the society’ needs. Findings Finding reveals that if the cloud computing service providers design their business model based on the “access” principle of circular economy, they can meet their economic profits and the society’ needs at a same time. Recommendations for Practitioners.............................................................................................................................................................. It is recommended to the startup and the existing businesses to utilize the proposed model of this study to reach a sustainable development. Recommendation for Researchers................................................................................................................................................................ It proposes a new circular business model and its linkages with community building. Impact on Society............................................................................................................................................................................................ The proposed model of the study provides guidelines to the cloud computing service providers to design a business model which is able not only to meet their economic profit, but also to meet the society’s and customers’ benefits. Future Research............................................................................................................................................................................................... Future researches can build on this research model which proposed in this study to examine the limitations of this model by using empirical researches.


2020 ◽  
Vol 23 (4) ◽  
pp. 274-284 ◽  
Author(s):  
Jingang Che ◽  
Lei Chen ◽  
Zi-Han Guo ◽  
Shuaiqun Wang ◽  
Aorigele

Background: Identification of drug-target interaction is essential in drug discovery. It is beneficial to predict unexpected therapeutic or adverse side effects of drugs. To date, several computational methods have been proposed to predict drug-target interactions because they are prompt and low-cost compared with traditional wet experiments. Methods: In this study, we investigated this problem in a different way. According to KEGG, drugs were classified into several groups based on their target proteins. A multi-label classification model was presented to assign drugs into correct target groups. To make full use of the known drug properties, five networks were constructed, each of which represented drug associations in one property. A powerful network embedding method, Mashup, was adopted to extract drug features from above-mentioned networks, based on which several machine learning algorithms, including RAndom k-labELsets (RAKEL) algorithm, Label Powerset (LP) algorithm and Support Vector Machine (SVM), were used to build the classification model. Results and Conclusion: Tenfold cross-validation yielded the accuracy of 0.839, exact match of 0.816 and hamming loss of 0.037, indicating good performance of the model. The contribution of each network was also analyzed. Furthermore, the network model with multiple networks was found to be superior to the one with a single network and classic model, indicating the superiority of the proposed model.


Author(s):  
Junshu Wang ◽  
Guoming Zhang ◽  
Wei Wang ◽  
Ka Zhang ◽  
Yehua Sheng

AbstractWith the rapid development of hospital informatization and Internet medical service in recent years, most hospitals have launched online hospital appointment registration systems to remove patient queues and improve the efficiency of medical services. However, most of the patients lack professional medical knowledge and have no idea of how to choose department when registering. To instruct the patients to seek medical care and register effectively, we proposed CIDRS, an intelligent self-diagnosis and department recommendation framework based on Chinese medical Bidirectional Encoder Representations from Transformers (BERT) in the cloud computing environment. We also established a Chinese BERT model (CHMBERT) trained on a large-scale Chinese medical text corpus. This model was used to optimize self-diagnosis and department recommendation tasks. To solve the limited computing power of terminals, we deployed the proposed framework in a cloud computing environment based on container and micro-service technologies. Real-world medical datasets from hospitals were used in the experiments, and results showed that the proposed model was superior to the traditional deep learning models and other pre-trained language models in terms of performance.


Sign in / Sign up

Export Citation Format

Share Document