Green Economic and Secure Libraries on Cloud

Author(s):  
Kalpana T.M. ◽  
S. Gopalakrishnan

Libraries are considered storehouses of knowledge in the form of books and other resources. Introduction of computers and information and communication technology paved the way for resources in electronic format. Hence, storage of library resources is categorized in two ways namely physical storage and electronic storage. The advantages of e-format are multiple users, increasing availability of free resource, sharing, storing, accessibility, retrieval, flexibility, compatibility, and so forth. As an evolutionary change in adapting to the electronic dissemination, electronic data can be stored virtually, externally, and retrieved in cloud computing. For cloud storage users, service providers and tools are considered as major components of the service architecture. Tool connects cloud storage server and thin client platform through the Internet. Green computing and green production technology are utilizing minimum resources and maximum production in an eco-friendly way. Data warehousing is collection of data, categorizing, filtering, eliminating replica data, format compatibility; security of data retrieval gives economic storage of files. Warehoused data with extract, transform, and load (ETL) tools are retrieved by data mining. This chapter discusses various architecture, service providers, models of service, certifications, billing models, security issues, solutions to security issues and eco-friendly economic storage.

2016 ◽  
pp. 945-963
Author(s):  
Kalpana T.M. ◽  
S. Gopalakrishnan

Libraries are considered storehouses of knowledge in the form of books and other resources. Introduction of computers and information and communication technology paved the way for resources in electronic format. Hence, storage of library resources is categorized in two ways namely physical storage and electronic storage. The advantages of e-format are multiple users, increasing availability of free resource, sharing, storing, accessibility, retrieval, flexibility, compatibility, and so forth. As an evolutionary change in adapting to the electronic dissemination, electronic data can be stored virtually, externally, and retrieved in cloud computing. For cloud storage users, service providers and tools are considered as major components of the service architecture. Tool connects cloud storage server and thin client platform through the Internet. Green computing and green production technology are utilizing minimum resources and maximum production in an eco-friendly way. Data warehousing is collection of data, categorizing, filtering, eliminating replica data, format compatibility; security of data retrieval gives economic storage of files. Warehoused data with extract, transform, and load (ETL) tools are retrieved by data mining. This chapter discusses various architecture, service providers, models of service, certifications, billing models, security issues, solutions to security issues and eco-friendly economic storage.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Hanzhe Yang ◽  
Ruidan Su ◽  
Pei Huang ◽  
Yuhan Bai ◽  
Kai Fan ◽  
...  

With the rapid growth of data, limited by the storage capacity, more and more IoT applications choose to outsource data to Cloud Service Providers (CSPs). But, in such scenarios, outsourced data in cloud storage can be easily corrupted and difficult to be found in time, which brings about potential security issues. Thus, Provable Data Possession (PDP) protocol has been extensively researched due to its capability of supporting efficient audit for outsourced data in cloud. However, most PDP schemes require the Third-Party Auditor (TPA) to audit data for Data Owners (DOs), which requires the TPA to be trustworthy and fair. To eliminate the TPA, we present a Public Mutual Audit Blockchain (PMAB) for outsourced data in cloud storage. We first propose an audit chain architecture based on Ouroboros and an incentive mechanism based on credit to allow CSPs to audit each other mutually with anticollusion (any CSP is not willing to help other CSPs conceal data problems). Then, we design an audit protocol to achieve public audit efficiently with low cost of audit verification. Rigorous analysis explains the security of PMAB using game theory, and performance analysis shows the efficiency of PMAB using the real-world dataset.


Author(s):  
Blessing Chiparausha ◽  
Collence Takaingenhamo Chisita

Literature suggests that partnerships among libraries are important as they help with resource sharing and cost-cutting in the areas of expertise, information and communication technologies, library resources, subscriptions, publications, and library space. The chapter explores the literature on how libraries have been partnering for strategic reasons. Challenges and opportunities related to partnerships were also identified. The article seeks to find out whether there is a need to conduct further studies on the reception of the proposed Creative Library Partnership model by ZULC. Borrowing from success stories realized elsewhere, the authors make recommendations for the Zimbabwe University Libraries Consortium (ZULC) and other library consortia to adopt the Creative Library Partnership model. A follow-up survey asks: how Zimbabwe university libraries have been partnering, challenges, and opportunities associated with those partnerships.


Author(s):  
Rajesh Keshavrao Sadavarte ◽  
G. D. Kurundkar

Cloud computing is the provision of computing and storage capacity to users as a service. Cloud storage is a type of networked online storage where data is stored in virtualized storage pools as a subservice of infrastructure as a service (IaaS) in cloud computing. Cloud computing plays a significant role in the efficient use of resources and in the utilization of service. Regardless of the cloud category (e.g. private, public, hybrid or inter-cloud), all service providers rely on domain server data. As a rapid development and deployment of cloud computing and cloud storage, users are increasingly concerned about security and privacy issues involved in these techniques. This paper provides a summary of basic security problems that consist of conventional security issues. It also addresses the additional challenges resulting from the cloud computing paradigm being used by cloud system providers and consumers. In addition, solutions suggested by some researchers are presented with a focus on cryptographic techniques which support secure storage of the cloud.


2021 ◽  
Vol 21 (4) ◽  
pp. 1-22
Author(s):  
Ismaeel Al Ridhawi ◽  
Moayad Aloqaily ◽  
Yaser Jararweh

The rise of fast communication media both at the core and at the edge has resulted in unprecedented numbers of sophisticated and intelligent wireless IoT devices. Tactile Internet has enabled the interaction between humans and machines within their environment to achieve revolutionized solutions both on the move and in real-time. Many applications such as intelligent autonomous self-driving, smart agriculture and industrial solutions, and self-learning multimedia content filtering and sharing have become attainable through cooperative, distributed, and decentralized systems, namely, volunteer computing. This article introduces a blockchain-enabled resource sharing and service composition solution through volunteer computing. Device resource, computing, and intelligence capabilities are advertised in the environment to be made discoverable and available for sharing with the aid of blockchain technology. Incentives in the form of on-demand service availability are given to resource and service providers to ensure fair and balanced cooperative resource usage. Blockchains are formed whenever a service request is initiated with the aid of fog and mobile edge computing (MEC) devices to ensure secure communication and service delivery for the participants. Using both volunteer computing techniques and tactile internet architectures, we devise a fast and reliable service provisioning framework that relies on a reinforcement learning technique. Simulation results show that the proposed solution can achieve high reward distribution, increased number of blockchain formations, reduced delays, and balanced resource usage among participants, under the premise of high IoT device availability.


1998 ◽  
Vol 59 (3) ◽  
pp. 212-218
Author(s):  
Harold Billings

Changes in the information world are resulting in new concepts of resource sharing, new practices in the management of library resources, and an expanding role for libraries in the educational process. However, such concepts have not necessarily been identified, named, and defined in the language of contemporary librarianship. Although librarians and their associates in the information and educational processes need to be made aware of these subtle, but powerful, new issues, discussions cannot easily proceed until there is a shared understanding of them in the language of review and debate. This paper introduces three themes that encompass these issues: distance information, managed information, and transformational budgeting.


2021 ◽  
Author(s):  
Karam Yateem ◽  
Mohammad Dabbous ◽  
Mohammad Kadem ◽  
Mohammed Khanferi

Abstract The main objective of the paper is to outline initiatives associated with leveraging creativity and innovation to sustain operational excellence. It will cover processes, applications and best practices toward continually leveraging creative and innovation such as the development of innovation team toward creating a collaborative environment in the generation, identification and development of ideas and new technological advancement deployment. The processes described will cover (1) the continuous monitoring and management update of innovation submissions, implementation and self-development course completion, (2) recognition for value addition resultant from technological deployment, (3) Technical Review Committee (TRC) centralization and streamlining of evaluating technologies and best practices, (4) the assignment of challenging targets and (5) the initiation of special innovation campaigns for pressing and challenging matters has resulted in various major accomplishments. The establishment of the 4th Industrial Revolution (IR 4.0) team to address production engineering and well services challenges and collaborate for articulate, smart, more efficient and effective resolutions, process improvements and decision making. The results were remarkable with an incremental increase into intent to submit a patent file consideration, patenting, technology deployment and production of technical manuscripts addressing the unique achievements as well as the submission of awards applications. Technical collaboration toward triggering resolutions to ongoing operational challenges has resulted in various internal in-house built strides of best practices and other collaborative initiatives with other services providers such as: Intelligent Field Equipment Industrial Professionals Training: Special training for intelligent field equipment associated with smart well completion (SWC) exercising and optimization, data retrieval from multiphase flow meters (MPFMs) as well as a permanent downhole monitoring system (PDHMS) and conducting basic preventative maintenance (PM) requirements. Multiphase Flow Metering (MPFM) Advanced Monitoring System: An in-house developed MPFM system advanced monitoring to enable production/Intelligent Field engineers to monitor and diagnose MPFMs healthiness in all fields. It includes a validation mechanism to monitor and verify the different MPFM diagnostic data, alarming mechanism, flow rates and data visualization tools to verify the health of the installed base of equipment toward higher testing efficiency, reduction of manpower exposure to the field, and cost avoidance through minimizing operational logistical arrangements and minimization of unnecessary field visits by service providers. The ultimate intent is to heavily depend upon all employees to successfully propose solutions, and subject matter experts to coach employees in the successful implementation of practical resolutions to improve operations, optimize cost, and enhance employees’ satisfaction and engagement.


2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Run Xie ◽  
Chanlian He ◽  
Dongqing Xie ◽  
Chongzhi Gao ◽  
Xiaojun Zhang

With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.


2018 ◽  
Vol 10 (12) ◽  
pp. 114 ◽  
Author(s):  
Shaukat Ali ◽  
Naveed Islam ◽  
Azhar Rauf ◽  
Ikram Din ◽  
Mohsen Guizani ◽  
...  

The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN have turned the social sphere of users into the commercial sphere. This should create a privacy and security issue for OSN users. OSN service providers collect the private and sensitive data of their customers that can be misused by data collectors, third parties, or by unauthorized users. In this paper, common security and privacy issues are explained along with recommendations to OSN users to protect themselves from these issues whenever they use social media.


Sign in / Sign up

Export Citation Format

Share Document