scholarly journals Research on E-Science - Serverless Semantic E-Science Framework (SSE-SF)

2019 ◽  
Vol 8 (2S3) ◽  
pp. 1231-1235

Serverless implementation for a semantic e-science framework (SSe-SF) is all about pushing code to a compute service and networking with third party services and APIs to get the work done. The underlying infrastructure both hardware and software are hidden from the user. Serverless semantic e-science framework (SSe-SF) includes Knowledge Search and Navigation, Identity Management, URI/ Content Negotiation, RDF & RDF Schema annotated information resources, Shared Ontologies, Read-only Onto-Repository & Vocabulary, Onto-learning and merging, Semantic reasoners and Semantic data storage. SSe-SF is applied on computing the Outcome bases education attainment (OBE) calculation.

2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1343
Author(s):  
Faiza Loukil ◽  
Khouloud Boukadi ◽  
Rasheed Hussain ◽  
Mourad Abed

The insurance industry is heavily dependent on several processes executed among multiple entities, such as insurer, insured, and third-party services. The increasingly competitive environment is pushing insurance companies to use advanced technologies to address multiple challenges, namely lack of trust, lack of transparency, and economic instability. To this end, blockchain is used as an emerging technology that enables transparent and secure data storage and transmission. In this paper, we propose CioSy, a collaborative blockchain-based insurance system for monitoring and processing the insurance transactions. To the best of our knowledge, the existing approaches do not consider collaborative insurance to achieve an automated, transparent, and tamper-proof solution. CioSy aims at automating the insurance policy processing, claim handling, and payment using smart contracts. For validation purposes, an experimental prototype is developed on Ethereum blockchain. Our experimental results show that the proposed approach is both feasible and economical in terms of time and cost.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 64 ◽  
Author(s):  
S. Renu ◽  
S.H. Krishna Veni

The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 


Author(s):  
Mrs.R.M.Rajeshwari Et. al.

Vehicle Adhoc Network is deployed on the road, where vehicles constitute mobile nodes in which active security and intelligent transportation are important applications of VANET. VANETs are a key part of the intelligent transportation systems (ITS) framework. Sometimes, VANETs are referred as Intelligent Transportation Networks. However, authentication and privacy of users are still two vital issues in VANETs.  In the traditional mode, the transactional data storage provides no distributed and decentralized security, so that the third party initiates the dishonest behaviors possibly. VANET has  temporary participants , communication between vehicles are short-lived messages. Possible situation might happens , adversary may play as an legitimate user and able to perform malicious activity .To address these challenges this paper proposes timestamp based message between users to  perform secure data transmission and give the negligible probability of the attacker. With the help of Certificate Authority (CA) and the RoadSide Units (RSUs), our proposal attains the confidentiality and  trace the identity of the unauthenticated vehicle in the anonymous announcements as well. Finally, through the theoretical analysis and simulations, our scheme is able to implement a secure VANET framework with accountability and privacy preservation


2016 ◽  
Author(s):  
Brian A. Nosek ◽  
Mahzarin R. Banaji ◽  
Anthony G. Greenwald

Differences between traditional laboratory research and Internet-based research require review of basic issues of research methodology. These differences have implications for research ethics (e.g., absence of researcher, potential exposure of confidential data and/or identity to a third-party, guaranteed debriefing) and security (e.g., confidentiality and anonymity, security of data transmission, security of data storage, and tracking subjects over time). We also review basic design issues a researcher should consider before implementing an Internet study, including the problem of subject self-selection and loss of experimental control on the Internet laboratory. An additional challenge for Internet-based research is the increased opportunity for subject misbehavior, intentional or otherwise. We discuss methods to detect and minimize these threats to the validity of Internet-based research.


Author(s):  
Poovizhi. M ◽  
Raja. G

Using Cloud Storage, users can tenuously store their data and enjoy the on-demand great quality applications and facilities from a shared pool of configurable computing resources, without the problem of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained dividing resources. From users’ perspective, including both individuals and IT systems, storing data remotely into the cloud in a flexible on-demand manner brings tempting benefits: relief of the burden for storage management, universal data access with independent geographical locations, and avoidance of capital expenditure on hardware, software, and personnel maintenances, etc. To securely introduce an effective Sanitizer and third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to capably audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should take in no new vulnerabilities towards user data privacy. In this project, utilize and uniquely combine the public auditing protocols with double encryption approach to achieve the privacy-preserving public cloud data auditing system, which meets all integrity checking without any leakage of data. To support efficient handling of multiple auditing tasks, we further explore the technique of online signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. We can implement double encryption algorithm to encrypt the data twice and stored cloud server in Electronic Health Record applications.


2020 ◽  
Vol 12 (3) ◽  
pp. 960
Author(s):  
Muhammad Rizwan Akram ◽  
Abdullah Can ZÜLFİKAR

Threat to the sustainability of buried continuous pipelines (BCPs) can be associated with different factors such as corrosion, natural hazards, and third-party influences. In the past, these factors have been discussed independently by various researchers. Despite these studies, there is still space for a comprehensive review report to be performed in this domain. The purpose of this article is to manage, classify, and describe the literature work done in this sphere. Firstly, the screening of various factors based on their damage criteria has been carried out. An environmental analysis is performed to review the impact of different parameters that can influence the sustainability of BCPs. Further, a technical review on primary factors has been done to examine and measure the causes, damages, mitigation, and inspection techniques. In the last stage, review based decision has been performed. Results of the current study shows that research contribution for corrosion and earthquake factors are in an advanced stage, followed by flood and external surface loads, that are still in progress. However, temperature variations and blast factors are in a premature phase and need broad inspection and research support.


2014 ◽  
Vol 556-562 ◽  
pp. 5813-5816
Author(s):  
Dan Li

As a user-centered hub of communication and equipment, cloud computing could provide powerful data storage, web services and other superior internet functions. The digital libraries have to face with some technique and service problems along with many advantages relative to the traditional libraries, and all these produce the practical needs of cloud computing. Cloud computing has influenced information resources, information users, information personnel and information facilities of digital libraries with its unique advantages and then promoted the development of digital libraries.


2016 ◽  
Vol 4 (1) ◽  
pp. 50
Author(s):  
Rizaldi Habibie ◽  
R. Rizal Isnanto ◽  
Rinta Kridalukmana

In modern times, like today, the role of software or applications that run on top of the platform is very important. This is because almost all of the work done by the people, made by the software or application. Applications can be used to assist in the processing of data and upload the final report. Data recorded previously processed by the paper can be recorded and processed by the application so that more efficiently. PT. PLN (Persero) Semarang District State electricity company has many customers in the city of Semarang. Customer data belonging to this company has not been processed in digital form. This causes the data of regular visits undertaken are not directly connected with customer data, owned so inefficient and requires a long process in the course of the report. Thus, it takes an application that can help in the treatment of customer data, data of visited consumer, and generate reports . Customer data Java-based and mobile applications for PLN (Persero) Semarang District State intended for the treatment of customer data, data of visited connsumer and generate reports. The application consists of two application. The first applications developed using the programming language Java, which can run on the operating system Windows. The second application was designed and implemented using the framework ionic, which can run on the Android operating system. This application uses MySQL as a database management system, which is used for data storage media.


Sign in / Sign up

Export Citation Format

Share Document