Security Model for Mobile Cloud Database as a Service (DBaaS)

2019 ◽  
pp. 760-769
Author(s):  
Kashif Munir

There's a big change happening in the world of databases. The industry is buzzing about Database-as-a-Service (DBaaS), a cloud offering that allows companies to rent access to these managed digital data warehouses. Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Mobile Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the Mobile Cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this chapter, I propose a security model for Mobile Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.

Author(s):  
Kashif Munir

There's a big change happening in the world of databases. The industry is buzzing about Database-as-a-Service (DBaaS), a cloud offering that allows companies to rent access to these managed digital data warehouses. Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Mobile Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the Mobile Cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this chapter, I propose a security model for Mobile Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.


2018 ◽  
Author(s):  
Reuben Binns ◽  
Elettra Bietti

Amid growing concern about the use and abuse of personal data over the last decade, there is an emerging suggestion that regulators may need to turn their attention towards the concentrations of power deriving from large-scale data accumulation. No longer the preserve of data protection or privacy law, personal data is receiving attention within competition and antitrust law.Recent mergers and acquisitions between large digital technology platforms have raised important questions about how these different areas intersect and how they can complement one another in order to protect consumer welfare while ensuring competitive markets. This paper draws attention to one particularly complicated kind of digital data-intensive industry: that of third party tracking, in which a firm does not (only or primarily) collect and process personal data of its own customers or users, but rather collects and processes data from the users of other ‘first party’ services.Mergers and acquisitions between firms active in the third party tracking industry raise unique challenges for privacy and fundamental rights which are often missed in regulatory decisions and academic discussions of data and market concentration. In this paper, we combine empirical and normative insights to shed light on the role of competition regulators in addressing the specific challenges of mergers and acquisitions in the third party tracking industry. After critically assessing some of the US and EU case law in this area, we argue that a bolder approach is needed; one that engages in a pluralist analysis of economic and noneconomic concerns about concentrations of power and control over data.


2011 ◽  
Vol 6 (1) ◽  
pp. 58-69 ◽  
Author(s):  
Ixchel M. Faniel ◽  
Ann Zimmerman

There is almost universal agreement that scientific data should be shared for use beyond the purposes for which they were initially collected. Access to data enables system-level science, expands the instruments and products of research to new communities, and advances solutions to complex human problems. While demands for data are not new, the vision of open access to data is increasingly ambitious. The aim is to make data accessible and usable to anyone, anytime, anywhere, and for any purpose. Until recently, scholarly investigations related to data sharing and reuse were sparse. They have become more common as technology and instrumentation have advanced, policies that mandate sharing have been implemented, and research has become more interdisciplinary. Each of these factors has contributed to what is commonly referred to as the "data deluge". Most discussions about increases in the scale of sharing and reuse have focused on growing amounts of data. There are other issues related to open access to data that also concern scale which have not been as widely discussed: broader participation in data sharing and reuse, increases in the number and types of intermediaries, and more digital data products. The purpose of this paper is to develop a research agenda for scientific data sharing and reuse that considers these three areas.


HortScience ◽  
1998 ◽  
Vol 33 (3) ◽  
pp. 495d-495
Author(s):  
J. Farias-Larios ◽  
A. Michel-Rosales

In Western Mexico, melon production depends on high-input systems to maximize yield and product quality. Tillage, plasticulture, fumigation with methyl bromide, and fertigation, are the principal management practices in these systems. However, at present several problems has been found: pests as sweetpotato whitefly (Bemisia tabaci Gennadius), aphids (Myzus and Aphis), leafminer (Liryomiza sativae); diseases as Fusarium, Verticilium, and Pseudoperenospora, and weeds demand high pesticide utilization and labor. There is a growing demand for alternative cultural practices, with an emphasis on reducing off-farm input labor and chemicals. Our research is based on use of organic mulches, such as: rice straw, mature maize leaves, banana leaves, sugarcane bagasse, coconut leaves, and living mulches with annual legume cover crop in melons with crop rotation, such as: Canavalia, Stilozobium, Crotalaria, and Clitoria species. Also, inoculations with mycorrhizal arbuscular fungi for honeydew and cantaloupe melon seedlings production are been assayed in greenhouse conditions for a transplant system. The use of life barriers with sorghum, marigold, and other aromatic native plants in conjunction with a colored yellow systems traps for monitoring pests is being studied as well. While that the pest control is based in commercial formulations of Beauveria bassiana for biological control. The first results of this research show that the Glomus intraradices, G. fasciculatum, G. etunicatum, and G. mosseae reached 38.5%, 33.5%, 27.0%, and 31.0% of root infection levels, respectively. Honeydew melons production with rice and corn straw mulches shows an beneficial effect with 113.30 and 111.20 kg/plot of 10 m2 compared with bare soil with 100.20 kg. The proposed system likely also lowers production cost and is applicable to small- and large-scale melon production.


2007 ◽  
Vol 2 (2) ◽  
Author(s):  
William C. Lucas

Retaining rainfall where it lands is a fundamental benefit of Low Impact Development (LID). The Delaware Urban Runoff Management Model (DURMM) was developed to address the benefits of LID design. DURMM explicitly addresses the benefits of impervious area disconnection as well as swale flow routing that responds to flow retardance changes. Biofiltration swales are an effective LID BMP for treating urban runoff. By adding check dams, the detention storage provided can also reduce peak rates. This presentation explores how the DURMM runoff reduction approach can be integrated with detention routing procedures to project runoff volume and peak flow reductions provided by BMP facilities. This approach has been applied to a 1,200 unit project on 360 hectares located in Delaware, USA. Over 5 km of biofiltration swales have been designed, many of which have stone check dams placed every 30 to 35 meters to provide detention storage. The engineering involved in the design of such facilities uses hydrologic modeling based upon TR-20 routines, as adapted by the DURMM model. The hydraulic approach includes routing of flows through the check dams. This presentation summarizes the hydrological network, presents the hydrologic responses, along with selected hydrographs to demonstrate the potential of design approach.


Author(s):  
Stephanie K. Pell

After the September 11 attacks, law enforcement's mission expanded to include, at times even prioritize, the general “prevention, deterrence and disruption” of terrorist attacks, which presumed a new emphasis upon threat detection and identification by analyzing patterns in larger, less specific bodies of information. Indeed, the unprecedented level of “third-party” possession of information inevitably makes the private sector the most reliable and comprehensive source of information available to law enforcement and intelligence agencies alike. This chapter explores the potential applications of systematic government access to data held by third-party private-sector intermediaries that would not be considered public information sources but, rather, data generated based on the role these intermediaries play in facilitating economic and business transactions (including personal business, such as buying groceries or staying at a hotel on vacation).


2021 ◽  
Vol 13 (3) ◽  
pp. 1158
Author(s):  
Cecilia M. Onyango ◽  
Justine M. Nyaga ◽  
Johanna Wetterlind ◽  
Mats Söderström ◽  
Kristin Piikki

Opportunities exist for adoption of precision agriculture technologies in all parts of the world. The form of precision agriculture may vary from region to region depending on technologies available, knowledge levels and mindsets. The current review examined research articles in the English language on precision agriculture practices for increased productivity among smallholder farmers in Sub-Saharan Africa. A total of 7715 articles were retrieved and after screening 128 were reviewed. The results indicate that a number of precision agriculture technologies have been tested under SSA conditions and show promising results. The most promising precision agriculture technologies identified were the use of soil and plant sensors for nutrient and water management, as well as use of satellite imagery, GIS and crop-soil simulation models for site-specific management. These technologies have been shown to be crucial in attainment of appropriate management strategies in terms of efficiency and effectiveness of resource use in SSA. These technologies are important in supporting sustainable agricultural development. Most of these technologies are, however, at the experimental stage, with only South Africa having applied them mainly in large-scale commercial farms. It is concluded that increased precision in input and management practices among SSA smallholder farmers can significantly improve productivity even without extra use of inputs.


Author(s):  
Kardison Lumbanbatu ◽  
Vincent Didiek Wiet Aryanto

Encompassing firms to apply green policy in a holistic management practices are strongly required in order to maintain competitive advantages and experience long-term marketing performance. This current empirical research is aimed to fill the lack of empirical findings and empirical studies on firm's innovative concept. Green-based product innovation, green management practices and green corporate image are presented as the antecedents and postulated as the sources of sustaining firm competitive advantages. A questionnaire-based survey was deployed to collect data from Large Scale Enterprises in Indonesia with Top Management, Operational and Marketing Managers served as respondents. 500 questionnaires were mailed and 388 were valid for further analysis. Data was analyzed by using Confirmatory Factor Analysis (CFA) and Structural Equation Modeling (SEM) via AMOS statistical software. Statistical findings demonstrated that green-based product innovation, green management practices and green corporate image significantly has a positive affect to sustain firm competitive advantages which is led to enhance long term marketing performance. However, green-based product innovation plays insignificant direct relationship on long term marketing performance. This study discusses some managerial implications for enterprises and recommendations on a basis of green implementation.


2014 ◽  
Vol 70 (9) ◽  
pp. 1481-1487 ◽  
Author(s):  
A. Celebi ◽  
S. Özdemir

Large-scale mining activities have a huge impact on the environment. Determination of the size of the effect and monitoring it is vital. In this study, risk assessment studies in mining areas and the effect of mining on groundwater and ecosystems were investigated. Best management practices and risk assessment steps were determined, especially in areas with huge amounts of mining wastewater. The pollution of groundwater and its reaching humans is a risk of major importance. Our study showed, using many cases with different parameters and countries, that the management of mining wastewater is vital. Environmental impact assessments and monitoring studies must be carried out before operation and at the closure of the mine. Policies must be in place and ready to apply. Factors of climate, geology, ecology and human health must be considered over a long period. Currently, only the developed countries are applying policies and paying attention to the risk. International assessments and health risk assessments should be carried out according to international standards.


Sign in / Sign up

Export Citation Format

Share Document