scholarly journals Commercial Cloud Services for a Robust Mobile Application Backend Data Storage

Author(s):  
Folasade Dahunsi ◽  
John Idogun ◽  
Abayomi Olawumi

Rapid advancements in the infrastructure of Information and Communication Technology (ICT) have led to radically new but ubiquitous technology; cloud computing. Cloud computing has gracefully emerged offering services that possess on-demand scalability, huge computing power, and a utility-like availability, all at a relatively low cost. It has unsurprisingly become a paradigm shift in ICT, gaining adoptions in all forms of application i.e., personal, academic, business, or government. Not only for its cost-effectiveness but also for its inherent ability to meet business goals and provide strategic ICT resources. More recently there have been advances in cloud computing leading to the evolution of newer commercial cloud services, one of which is the Mobile backend as a Service (MBaaS). The MBaaS is important and required for a robust mobile application back-end data storage and management. Its wide adoption and importance stem from its ability to simplify application development and deployment. Also, MBaaS is robust, with the ability to cope with errors by providing nifty tools and other features. These enable rapid scaffolding of mobile applications. This paper reviews Mobile backend as a Service (MBaaS) and provides required background knowledge on some cloud services and their providers to enable stakeholders to make informed decisions and appropriate choices.

Author(s):  
Khadija Akherfi ◽  
Hamid Harroud ◽  
Michael Gerndt

With the recent advances in cloud computing and the improvement in the capabilities of mobile devices in terms of speed, storage, and computing power, Mobile Cloud Computing (MCC) is emerging as one of important branches of cloud computing. MCC is an extension of cloud computing with the support of mobility. In this paper, the authors first present the specific concerns and key challenges in mobile cloud computing. They then discuss the different approaches to tackle the main issues in MCC that have been introduced so far, and finally focus on describing the proposed overall architecture of a middleware that will contribute to providing mobile users data storage and processing services based on their mobile devices capabilities, availability, and usage. A prototype of the middleware is developed and three scenarios are described to demonstrate how the middleware performs in adapting the provision of cloud web services by transforming SOAP messages to REST and XML format to JSON, in optimizing the results by extracting relevant information, and in improving the availability by caching. Initial analysis shows that the mobile cloud middleware improves the quality of service for mobiles, and provides lightweight responses for mobile cloud services.


Author(s):  
Pappu Sowmya ◽  
R Kumar

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization’ is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.


Author(s):  
K Dinesh Kumar ◽  
E Umamaheswari

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet while providing the privacy and security. Using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open-source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, “virtualization” is one of the techniques dividing memory into different blocks. In most of the existing systems, there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: (1) allotting the VM security monitor model for each virtual machine and (2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model. 


2018 ◽  
Vol 2018 ◽  
pp. 1-5 ◽  
Author(s):  
Jia-bin Li ◽  
Shi-wei He ◽  
Wei-chuan Yin

Effective implementation of pallet pooling system needs a strong information platform to support. Through the analysis of existing pallet pooling information platform (PPIP), the paper pointed out that the existing studies of PPIP are mainly based on traditional IT infrastructures and technologies which have software, hardware, resource utilization, and process restrictions. Because of the advantages of cloud computing technology like strong computing power, high flexibility, and low cost which meet the requirements of the PPIP well, this paper gave a PPIP architecture of two parts based on cloud computing: the users client and the cloud services. The cloud services include three layers, which are IaaS, PaaS, and SaaS. The method of how to deploy PPIP based on cloud computing is proposed finally.


Mousaion ◽  
2019 ◽  
Vol 36 (3) ◽  
Author(s):  
Chimango Nyasulu ◽  
Winner Chawinga ◽  
George Chipeta

Governments the world over are increasingly challenging universities to produce human resources with the right skills sets and knowledge required to drive their economies in this twenty-first century. It therefore becomes important for universities to produce graduates that bring tangible and meaningful contributions to the economies. Graduate tracer studies are hailed to be one of the ways in which universities can respond and reposition themselves to the actual needs of the industry. It is against this background that this study was conducted to establish the relevance of the Department of Information and Communication Technology at Mzuzu University to the Malawian economy by systematically investigating occupations of its former students after graduating from the University. The study adopted a quantitative design by distributing an online-based questionnaire with predominantly closed-ended questions. The study focused on three key objectives: to identify key employing sectors of ICT graduates, to gauge the relevance of the ICT programme to its former students’ jobs and businesses, and to establish the level of satisfaction of the ICT curriculum from the perspectives of former ICT graduates. The key findings from the study are that the ICT programme is relevant to the industry. However, some respondents were of the view that the curriculum should be strengthened by revising it through an addition of courses such as Mobile Application Development, Machine Learning, Natural Language Processing, Data Mining, and LINUX Administration to keep abreast with the ever-changing ICT trends and job requirements. The study strongly recommends the need for regular reviews of the curriculum so that it is continually responding to and matches the needs of the industry.


2019 ◽  
Author(s):  
Dalya Al-Moghrabi ◽  
Fiorella Beatriz Colonio-Salazar ◽  
Ama Johal ◽  
Padhraig Seamus Fleming

BACKGROUND Diligent wear of removable orthodontic retainers requires prolonged compliance and is invariably necessary to preserve optimal results. Patient-informed behaviour-change interventions represent a promising and novel means of enhancing compliance with retainer wear. OBJECTIVE To describe the development of a patient-informed mobile application aimed to enhance retainer wear. METHODS Four aspects were considered during mobile application development: participant preferences; analysis of publicly-available retainer-related posts on Twitter; available interventions; and behaviour-change theories. Audio-recorded one-to-one interviews were conducted with a subset of participants to account for patient preferences in terms of features, design and content. A criterion-based purposive sample of participants wearing vacuum-formed retainers for at least 4 years was used. Thematic analysis of transcribed data was undertaken. RESULTS The need to facilitate communication with the treating clinician, responsive reminder and tracking systems, and access to useful and engaging written and visual information, in addition to other personalised and interactive features were considered important. Concerns related to retainer wear shared on Twitter informed an exhaustive list of frequently-asked questions. Application features were mapped to relevant theoretical constructs. Determinants of existing behavioural change theories were used to link application features to expected outcomes. CONCLUSIONS A holistic process involving both patient and professional input can be useful in informing the development of mobile applications. The orthodontic application (“My Retainers”) will undergo further scrutiny in relation to its effectiveness in inducing behavioural change and concerning patient experiences prior to finalisation.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Bioanalysis ◽  
2021 ◽  
Author(s):  
Scott Davis ◽  
Joel Usansky ◽  
Shibani Mitra-Kaushik ◽  
John Kellie ◽  
Kimberly Honrine ◽  
...  

Challenges for data storage during drug development have become increasingly complex as the pharmaceutical industry expands in an environment that requires on-demand availability of data and resources for users across the globe. While the efficiency and relative low cost of cloud services have become increasingly attractive, hesitancy toward the use of cloud services has decreased and there has been a significant shift toward real-world implementation. Within GxP laboratories, the considerations for cloud storage of data include data integrity and security, as well as access control and usage for users around the globe. In this review, challenges and considerations when using cloud storage options for the storage of laboratory-based GxP data are discussed and best practices are defined.


Author(s):  
Ю.Н. Дорошенко ◽  
О.Я. Кравец ◽  
Ю.С. Акинина

Несмотря на множество доступных мобильных приложений с различными формами реализации (например, компонент, услуга или приложение), потребности пользователя отличаются от одного к другому. Кроме того, мобильные устройства характеризуются разнородными программными и аппаратными конфигурациями. Таким образом, важной проблемой при разработке мобильных приложений является их развертывание на доступных разнородных устройствах. Для решения этих проблем необходим процесс композиции, позволяющий повторно использовать существующие разнородные объекты для разработки мобильных приложений в соответствии с требованиями пользователя, и чтобы поведение желаемых приложений можно было настраивать в соответствии с их различной контекстной информацией. В статье эта проблема решается на основе процесса создания мобильных приложений с учетом контекста на основе существующих гетерогенных программных объектов. Despite the many mobile applications available with different forms of implementation (for example, a component, service or application), the user's needs differ from one to another. In addition, mobile devices are characterized by heterogeneous software and hardware configurations. Thus, an important problem in the development of mobile applications is their deployment on available heterogeneous devices. To solve these problems, we need a composition process that allows us to reuse existing heterogeneous objects for developing mobile applications in accordance with the user's requirements, and so that the behavior of the desired applications can be customized according to their different contextual information. In the article, this problem is solved on the basis of the process of creating mobile applications taking into account the context on the basis of existing heterogeneous program objects.


2021 ◽  
Vol 9 (4) ◽  
pp. 457
Author(s):  
I Putu Agus Wahyu Widiatmika ◽  
Cokorda Rai Adi Pramartha

Kulkul is one of Bali's cultural heritage. Kulkul is used in Balinese society for communication when there is a danger, death, a ritual, and so on. The current phenomenon is that many Balinese people are only able to know and without knowing much knowledge about kulkul. It is because this knowledge is the only word of mouth, making it difficult for it to be collected, stored, retrieved, shared, and renewed. Current technological developments, especially mobile technology, allow the development of mobile applications on cultural knowledge with an ontology approach that will help provide an explicit explanation of this knowledge. In this study, the authors propose the application of a web service with a REST API architecture to help mobile applications integrate Balinese Kulkul Semantic Ontology. This study uses the prototyping method in developing the REST API. From the tests that have been done, it is found that the REST API has successfully received requests and responses which prove that the mobile application is well integrated.


Sign in / Sign up

Export Citation Format

Share Document