From Software Specification to Cloud Model

Author(s):  
Dušan Savić ◽  
Siniša Vlajić ◽  
Marijana Despotović-Zrakić

Applications are often multi-tier and require application servers, workflow engines, and database management systems. Cloud computing is a computing paradigm wherein the resources such as processors, storage, and software applications are provided as services via the Internet. Moving an enterprise application to the cloud can be a challenge. This application needs to be split into the components that then automatically deploy on the cloud. In this chapter, the authors introduce a way to automatically derivate the main architecture components from the software requirements that can serve as a basis for an architecture diagram in the MOCCA method. The proposed approach is model and use case driven.

2021 ◽  
Vol 17 (1) ◽  
pp. 279-287
Author(s):  
Dorin IORDACHE

The importance of information security in general, of managed information at the level of a database has increased with the expansion of the Internet. On the other hand, it has acquired new facets with the increase of the accessibility of the users to as many resources as possible. Large volume of private data in use and the limitation of unauthorized actions to information have brought new aspects to the issue of ensuring their protection. The scope of this field is wide and allows the operation in several directions: identification, description, creation, implementation and testing of mechanisms aimed at improving the working environment in which database management systems operates. Due to the importance of the information managed by a DBMS[1], it is necessary to define a framework safe and easy to use. The database fulfills not only the role of storage, but also of data provider to users. Thus, the information must be protected throughout the interaction process: generation, storage, processing, modification, deletion, etc. Therefore, the security of databases must not only be reduced to the protection of certain data considered sensitive, but also to the creation of a secure, authorized and controlled global environment through which information becomes available to users.   [1] DBMS – DataBase Management System


2012 ◽  
pp. 733-748
Author(s):  
Roland Kübert ◽  
Gregory Katsaros

Even though public cloud providers already exist and offer computing and storage services, cloud computing is still a buzzword for scientists in various fields such as engineering, finance, social sciences, etc. These technologies are currently mature enough to leave the experimental laboratory in order to be used in real-life scenarios. To this end, the authors consider that the prime example use case of cloud computing is a web hosting service. This paper presents the architectural approach as well as the technical solution for applying elastic web hosting onto a private cloud infrastructure using only free software. Through several available software applications and tools, anyone can build their own private cloud on top of a local infrastructure and benefit from the dynamicity and scalability provided by the cloud approach.


Author(s):  
Roland Kübert ◽  
Gregory Katsaros

Even though public cloud providers already exist and offer computing and storage services, cloud computing is still a buzzword for scientists in various fields such as engineering, finance, social sciences, etc. These technologies are currently mature enough to leave the experimental laboratory in order to be used in real-life scenarios. To this end, the authors consider that the prime example use case of cloud computing is a web hosting service. This paper presents the architectural approach as well as the technical solution for applying elastic web hosting onto a private cloud infrastructure using only free software. Through several available software applications and tools, anyone can build their own private cloud on top of a local infrastructure and benefit from the dynamicity and scalability provided by the cloud approach.


Author(s):  
Feng Xu ◽  
Mingming Su ◽  
Yating Hou

The Cloud computing paradigm can improve the efficiency of distributed computing by sharing resources and data over the Internet. However, the security levels of nodes (or severs) are not the same, thus, sensitive tasks and personal data may be scheduled (or shared) to some unsafe nodes, which can lead to privacy leakage. Traditional privacy preservation technologies focus on the protection of data release and process of communication, but lack protection against disposing sensitive tasks to untrusted computing nodes. Therefore, this article put forwards a protocol based on task-transformation, by which tasks will be transformed into another form in the task manager before they can be scheduled to other nodes. The article describes a privacy preservation algorithm based on separation sensitive attributes from values (SSAV) to realize the task-transformation function. This algorithm separates sensitive attributes in the tasks from their values, which make the malicious nodes cannot comprehend the real meaning of the values even they get the transformed tasks. Analysis and simulation results show that the authors' algorithm is more effective.


2000 ◽  
Vol 09 (01n02) ◽  
pp. 147-169
Author(s):  
PATRICK MARTIN ◽  
WENDY POWLEY ◽  
ANDREW WESTON ◽  
PETER ZION

In the not too distant past, the amount of online data available to general users was relatively small. Most of the online data was maintained in organizations' database management systems and accessible only through the interfaces provided by those systems. The popularity of the Internet, in particular, has meant that there is now an abundance of online data available to users in the form of Web pages and files. This data, however, is maintained in passive data sources, that is sources that do not provide facilities to search or query their data. The data must be queried and examined using applications such as browsers and search engines. In this paper, we explore an approach to querying passive data sources based on the extraction, and subsequent exploitation, of metadata from the data sources. We describe two situations in which this approach has been used, evaluate the approach and draw some general conclusions.


2020 ◽  
Vol 8 (2) ◽  
pp. 72-78
Author(s):  
C Vijai ◽  
D Joyce

In the current digital world, the Internet is changing our lives in terms of the way we work, learn, and interact. Cloud Computing has a platform for sharing resources that include infrastructures, software, applications; the cloud is the best way to integrate all departments using e-Governance and business. Many Governments facing critical challenges to maintain pending, unattended documents, reported to the authority, document proof of the statement, law, and order unable to solve over the year. Cloud-based e-governance plays a vital role in solve these issues helping to e-governance services. Citizens easily access government services and provide transparent activities with the help of cloud e-governance applications. This paper discusses cloud computing and cloud-based e-governance in India and to adopt cloud computing in e-Governance applications, challenges and also extended to the usage of cloud-based e-governance.


2010 ◽  
Vol 3 (1) ◽  
Author(s):  
Harry Katzan, Jr.

Cloud computing is an architecture for providing computing service via the Internet.  Use of the term “cloud” is a metaphor for the representation of the Internet used in most systems diagrams.  In this case, the Internet is the transport mechanism between a client and a server located somewhere in cyberspace, as compared to having computer applications residing on an “on premises” computer.  Adoption of cloud computing practically eliminates two ongoing problems in IT service provisioning: the upfront costs of acquiring computational resources and the time delay of building and deploying software applications.  This paper gives an ontological view of the subject in order to serve as a point of reference in the discipline and to facilitate ongoing technical development.


Author(s):  
Jana Polgar ◽  
Robert Mark Braum ◽  
Tony Polgar

Web Services are gaining in popularity because of the benefits they provide. One of the major benefits is their support for interoperability in a heterogeneous environment, which leads to the capability to add systems and solutions that require different platforms. As long as the various systems are enabled for Web Services, the services can be used to facilitate interoperation. Web Services let enterprise application developers reuse and customize existing information assets. Web Services provide developers with standard ways to access middle-tier and back-end services, such as database management systems and transaction monitors, and to integrate them with other applications.


2019 ◽  
Vol 13 (2) ◽  
pp. 104-119 ◽  
Author(s):  
Feng Xu ◽  
Mingming Su ◽  
Yating Hou

The Cloud computing paradigm can improve the efficiency of distributed computing by sharing resources and data over the Internet. However, the security levels of nodes (or severs) are not the same, thus, sensitive tasks and personal data may be scheduled (or shared) to some unsafe nodes, which can lead to privacy leakage. Traditional privacy preservation technologies focus on the protection of data release and process of communication, but lack protection against disposing sensitive tasks to untrusted computing nodes. Therefore, this article put forwards a protocol based on task-transformation, by which tasks will be transformed into another form in the task manager before they can be scheduled to other nodes. The article describes a privacy preservation algorithm based on separation sensitive attributes from values (SSAV) to realize the task-transformation function. This algorithm separates sensitive attributes in the tasks from their values, which make the malicious nodes cannot comprehend the real meaning of the values even they get the transformed tasks. Analysis and simulation results show that the authors' algorithm is more effective.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3159
Author(s):  
Jakub Jalowiczor ◽  
Jan Rozhon ◽  
Miroslav Voznak

The technologies of the Internet of Things (IoT) have an increasing influence on our daily lives. The expansion of the IoT is associated with the growing number of IoT devices that are connected to the Internet. As the number of connected devices grows, the demand for speed and data volume is also greater. While most IoT network technologies use cloud computing, this solution becomes inefficient for some use-cases. For example, suppose that a company that uses an IoT network with several sensors to collect data within a production hall. The company may require sharing only selected data to the public cloud and responding faster to specific events. In the case of a large amount of data, the off-loading techniques can be utilized to reach higher efficiency. Meeting these requirements is difficult or impossible for solutions adopting cloud computing. The fog computing paradigm addresses these cases by providing data processing closer to end devices. This paper proposes three possible network architectures that adopt fog computing for LoRaWAN because LoRaWAN is already deployed in many locations and offers long-distance communication with low-power consumption. The architecture proposals are further compared in simulations to select the optimal form in terms of total service time. The resulting optimal communication architecture could be deployed to the existing LoRaWAN with minimal cost and effort of the network operator.


Sign in / Sign up

Export Citation Format

Share Document