The document summarizes a research paper that studied the effects of security and privacy concerns on the use of cloud services in the oil and gas industry. It proposes a research model based on the Theory of Planned Behavior to predict staff attitudes and intentions to use cloud services. A survey was conducted of staff at an oil and gas company. The results supported the model, validating that security and privacy perceptions positively influence attitudes, which positively influence behavioral intentions to use cloud services. The study demonstrates that addressing security and privacy is important for adoption of cloud services in industries like oil and gas that emphasize data security.
Maintaining Secure Cloud by Continuous Auditingijtsrd
Increases in cloud computing capacity, as well as decreases in the cost of processing, are moving at a fast pace. These patterns make it incumbent upon organizations to keep pace with changes in technology that significantly influence security. Cloud security auditing depends upon the environment, and the rapid growth of cloud computing is an important new context in world economics. The small price of entry, bandwidth, and processing power capability means that individuals and organizations of all sizes have more capacity and agility to exercise shifts in computation and to disrupt industry in cyberspace than more traditional domains of business economics worldwide. An analysis of prevalent cloud security issues and the utilization of cloud audit methods can mitigate security concerns. This verification methodology indicates how to use frameworks to review cloud service providers (CSPs). The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by potential customers. While preventive controls for security and privacy are actively researched, there is still little focus on detective controls related to cloud accountability and auditability. The complexity resulting from large-scale virtualization and data distribution carried out in current clouds has revealed an urgent research agenda for cloud accountability, as has the shift in focus of customer concerns from servers to data. M. Kanimozhi | A. Aishwarya | S. Triumal"Maintaining Secure Cloud by Continuous Auditing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10829.pdf http://www.ijtsrd.com/engineering/computer-engineering/10829/maintaining-secure-cloud-by-continuous-auditing/m-kanimozhi
Cloud computing is the technology which enables obtaining resources like so services,
software, hardware over the internet. With cloud storage users can store their data remotely and
enjoy on-demand services and application from the configurable resources. The cloud data storage
has many benefits over local data storage. Users should be able to just use the cloud storage as if it is
local, without worrying about the need to verify its integrity. The problem is that ensuring data
security and integrity of data of user. Sohere, I am going to have public audit ability for cloud storage
that users can resort to a third-party auditor (TPA) to check the integrity of data. This paper gives the
various issues related to privacy while storing the user’s data to the cloud storage during the TPA
auditing. Without appropriate security and privacy solutions designed for clouds this computing
paradigm could become a big failure. I am a giving privacy-preserving public auditing using ring
signature process for secure cloud storage system. This paper is going to analyze various techniques
to solve these issues and to provide the privacy and security to the data in cloud
Cloud Computing Security Issues and ChallengesCSCJournals
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...IJECEIAES
The privacy, handling, management and security of information in a cloud environment are complex and tedious tasks to achieve. With minimum investment and reduced cost of operations an organization can avail and apply the benefits of cloud computing into its business. This computing paradigm is based upon a pay as per your usage model. Moreover, security, privacy, compliance, risk management and service level agreement are critical issues in cloud computing environment. In fact, there is dire need of a model which can tackle and handle all the security and privacy issues. Therefore, we suggest a CSPCR model for evaluating the preparation of an organization to handle or to counter the threats, hazards in cloud computing environment. CSPCR discusses rules and regulations which are considered as pre-requisites in migrating or shifting to cloud computing services.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
Today, in class, I will be covering the topics of Cloud and BYOD Information Security. The intent of the lecture is to introduce students to the general issues surrounding information security in these two areas.
Maintaining Secure Cloud by Continuous Auditingijtsrd
Increases in cloud computing capacity, as well as decreases in the cost of processing, are moving at a fast pace. These patterns make it incumbent upon organizations to keep pace with changes in technology that significantly influence security. Cloud security auditing depends upon the environment, and the rapid growth of cloud computing is an important new context in world economics. The small price of entry, bandwidth, and processing power capability means that individuals and organizations of all sizes have more capacity and agility to exercise shifts in computation and to disrupt industry in cyberspace than more traditional domains of business economics worldwide. An analysis of prevalent cloud security issues and the utilization of cloud audit methods can mitigate security concerns. This verification methodology indicates how to use frameworks to review cloud service providers (CSPs). The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by potential customers. While preventive controls for security and privacy are actively researched, there is still little focus on detective controls related to cloud accountability and auditability. The complexity resulting from large-scale virtualization and data distribution carried out in current clouds has revealed an urgent research agenda for cloud accountability, as has the shift in focus of customer concerns from servers to data. M. Kanimozhi | A. Aishwarya | S. Triumal"Maintaining Secure Cloud by Continuous Auditing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10829.pdf http://www.ijtsrd.com/engineering/computer-engineering/10829/maintaining-secure-cloud-by-continuous-auditing/m-kanimozhi
Cloud computing is the technology which enables obtaining resources like so services,
software, hardware over the internet. With cloud storage users can store their data remotely and
enjoy on-demand services and application from the configurable resources. The cloud data storage
has many benefits over local data storage. Users should be able to just use the cloud storage as if it is
local, without worrying about the need to verify its integrity. The problem is that ensuring data
security and integrity of data of user. Sohere, I am going to have public audit ability for cloud storage
that users can resort to a third-party auditor (TPA) to check the integrity of data. This paper gives the
various issues related to privacy while storing the user’s data to the cloud storage during the TPA
auditing. Without appropriate security and privacy solutions designed for clouds this computing
paradigm could become a big failure. I am a giving privacy-preserving public auditing using ring
signature process for secure cloud storage system. This paper is going to analyze various techniques
to solve these issues and to provide the privacy and security to the data in cloud
Cloud Computing Security Issues and ChallengesCSCJournals
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...IJECEIAES
The privacy, handling, management and security of information in a cloud environment are complex and tedious tasks to achieve. With minimum investment and reduced cost of operations an organization can avail and apply the benefits of cloud computing into its business. This computing paradigm is based upon a pay as per your usage model. Moreover, security, privacy, compliance, risk management and service level agreement are critical issues in cloud computing environment. In fact, there is dire need of a model which can tackle and handle all the security and privacy issues. Therefore, we suggest a CSPCR model for evaluating the preparation of an organization to handle or to counter the threats, hazards in cloud computing environment. CSPCR discusses rules and regulations which are considered as pre-requisites in migrating or shifting to cloud computing services.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
Today, in class, I will be covering the topics of Cloud and BYOD Information Security. The intent of the lecture is to introduce students to the general issues surrounding information security in these two areas.
In cloud computing IT (Information Technology) related resources like infrastructure, platform and software can be utilized using web based tools and application through internet. Here Organizations are moving to the cloud computing some faster than others. However, moving to the cloud presents the organization with a number of risks to assess. Information security is the most critical risk for many organizations. This is because the intellectual property, trade secrets, personally identifiable information,
or other sensitive information can be powered by protecting information. This paper classified cloud
security based on the three service models of cloud computing SaaS, PaaS and IaaS. Attributes for each
type of security has also identified and briefly described here. We compared securities provided in different
services by world's best known cloud service providing companies such as Amazon AWS, Google App Engine, Windows Azure etc. considering cloud security category. Furthermore, we included recommendations for organizations who have decided to move their data into the cloud, but confused to choose the best service provider for their organization regarding information security.
The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively. The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation; it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among them are identified.
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
Cloud computing is a computing technology aiming to share storage, computation, and services transparently
among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality
of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and
operated by third party service providers despite it sensitivity (example contact address, mails), the risks of
disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage
by third party is also increasing. The purpose of this study is to review researches done on this technology,
identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.
Abstract: Distributed computing is a situated of IT administrations that are given to a client more than a system on a rented premise and with the capacity to scale up or down their administration necessities. Generally cloud registering administrations are conveyed by an outsider supplier who possesses the foundation. It favorable circumstances to specify yet a couple incorporate versatility, strength, adaptability, productivity and outsourcing non-center exercises. Distributed computing offers an imaginative plan of action for associations to receive IT benefits without forthright speculation. Notwithstanding the potential increases accomplished from the distributed computing, the associations are moderate in tolerating it because of security issues and difficulties connected with it. Security is one of the significant issues which hamper the development of cloud. The thought of giving over vital information to another organization is troubling; such that the shoppers should be cautious in comprehension the dangers of information breaks in this new environment. This paper presents a point by point examination of the distributed computing security issues furthermore, difficulties concentrating on the distributed computing sorts and the administration conveyance sorts.Keywords: Cloud Computing, Scalability, Infrastructure, IT.
Title: Cloud Computing Security Issues and Challenges
Author: Nishant Katiyar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
GameBus: a platform for physical, social and cognitive health gamificationGames for Health Europe
TRACK 6(3) | POSITIVE HEALTH | DAY 2 - 1 NOV 2016
Pieter Van Gorp, Assistant Professor | Eindhoven University of Technology (NL)
Games for Health Europe 2016
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...Eswar Publications
Rule based heuristic scheduling algorithms in real time and cloud computing Systems employ for resource or task scheduling since they are suitable to implement for NP-complete problems. However, they are simple but there is much room to improve these algorithms. This study presents a heuristic scheduling algorithm, called High performance hyper-heuristic scheduling algorithm (HHSA) using detection operator, to find better scheduling solutions for real and cloud computing systems. The two operators - diversity detection and
improvement detection operators - are employed in this algorithm to determine the timing to determine the heuristic algorithm.. These two are employed to dynamically determine a low level heuristic that can be used to find better solution. To evaluate the performance of this method, authors examined the above method with several scheduling algorithms and results prove that Hyper Heuristic Scheduling Algorithm can
significantly decrease the makespan of task scheduling when compared with all other scheduling algorithms.
A novel high-performance hyper-heuristic algorithm is proposed for scheduling on cloud computing systems to
reduce the makespan. This algorithm can be applied to both sequence dependent and sequence independent scheduling problems.
The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...Eswar Publications
Background: banks, as the main components of any countries` economic backbone, perpetually try to satisfy the needs and expectations of their customers to increase customer satisfaction, since in today`s competitive world, gaining competitive advantage is a high priority for any organization. On the other hand, the emergence of information technology in the banking industry has provided speed, security, efficiency, and quality of services through electronic banking and electronic payment tools. Therefore, banks and credit firms are constantly trying to increase their quality of services to satisfy their customers and gain competitive advantage.
Objective: since customer satisfaction is a high priority as one of the goals of banks and credit firms, this study aims to investigate the role of e-payment tools and e-banking in customer satisfaction.
Methodology: this study is an applied research regarding goal and a correlation type descriptive-survey regarding methodology. The statistical population consists of 80 gold customers of Pasargad bank e-payment company and the sample size was determined 66.35 using Cochran`s equation. Moreover, a questionnaire s used to collect the information. This questionnaire was developed in two sections by the researcher. The validity of the questionnaire is confirmed by a group of experts, including professors and specialists of the field, and its trust is computed using Cronbach`s alpha (α=90%). Furthermore, SPSS software and Pearson`s correlation test were used to analyze the data. Results of the research indicate that there is a positive and significant relationship between e-payment tools and e-banking. Therefore, the results can help to identify effective factors of customer satisfaction and in turn providing competitive advantage for this and similar organizations.
#숙명여대 #홍보광고학과 #브랜드커뮤니케이션전략 #브랜드북
한번은 멋모르고 만들어서 괜찮을 거 라고 생각했는데.. 왜 이번엔 뭔가 힘들었던거지? 더 많은 내용이랑 재밌는 내용을 넣고 싶었는데 잘 됐는지 궁금하다...
저번엔 페북 계정에 사정이 있어서 공유를 하다가 금방 돌렸지만 지금은 부족해서 부끄럽지만 그래도 그냥 친구공개로 업로드합니다! 너 덕분에 또 내가 일주일을 밤샜쟈냐~ 그래도 재밌었엉.. 세번은 만들기 싫다 앞으로 잘하자 소영아!
모두들 브랜드북 만드는거 수고하셨습니다 :)
문장호 교수님 감사합니다 ^ㅇ^!
In cloud computing IT (Information Technology) related resources like infrastructure, platform and software can be utilized using web based tools and application through internet. Here Organizations are moving to the cloud computing some faster than others. However, moving to the cloud presents the organization with a number of risks to assess. Information security is the most critical risk for many organizations. This is because the intellectual property, trade secrets, personally identifiable information,
or other sensitive information can be powered by protecting information. This paper classified cloud
security based on the three service models of cloud computing SaaS, PaaS and IaaS. Attributes for each
type of security has also identified and briefly described here. We compared securities provided in different
services by world's best known cloud service providing companies such as Amazon AWS, Google App Engine, Windows Azure etc. considering cloud security category. Furthermore, we included recommendations for organizations who have decided to move their data into the cloud, but confused to choose the best service provider for their organization regarding information security.
The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively. The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation; it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among them are identified.
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
Cloud computing is a computing technology aiming to share storage, computation, and services transparently
among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality
of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and
operated by third party service providers despite it sensitivity (example contact address, mails), the risks of
disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage
by third party is also increasing. The purpose of this study is to review researches done on this technology,
identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.
Abstract: Distributed computing is a situated of IT administrations that are given to a client more than a system on a rented premise and with the capacity to scale up or down their administration necessities. Generally cloud registering administrations are conveyed by an outsider supplier who possesses the foundation. It favorable circumstances to specify yet a couple incorporate versatility, strength, adaptability, productivity and outsourcing non-center exercises. Distributed computing offers an imaginative plan of action for associations to receive IT benefits without forthright speculation. Notwithstanding the potential increases accomplished from the distributed computing, the associations are moderate in tolerating it because of security issues and difficulties connected with it. Security is one of the significant issues which hamper the development of cloud. The thought of giving over vital information to another organization is troubling; such that the shoppers should be cautious in comprehension the dangers of information breaks in this new environment. This paper presents a point by point examination of the distributed computing security issues furthermore, difficulties concentrating on the distributed computing sorts and the administration conveyance sorts.Keywords: Cloud Computing, Scalability, Infrastructure, IT.
Title: Cloud Computing Security Issues and Challenges
Author: Nishant Katiyar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
GameBus: a platform for physical, social and cognitive health gamificationGames for Health Europe
TRACK 6(3) | POSITIVE HEALTH | DAY 2 - 1 NOV 2016
Pieter Van Gorp, Assistant Professor | Eindhoven University of Technology (NL)
Games for Health Europe 2016
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...Eswar Publications
Rule based heuristic scheduling algorithms in real time and cloud computing Systems employ for resource or task scheduling since they are suitable to implement for NP-complete problems. However, they are simple but there is much room to improve these algorithms. This study presents a heuristic scheduling algorithm, called High performance hyper-heuristic scheduling algorithm (HHSA) using detection operator, to find better scheduling solutions for real and cloud computing systems. The two operators - diversity detection and
improvement detection operators - are employed in this algorithm to determine the timing to determine the heuristic algorithm.. These two are employed to dynamically determine a low level heuristic that can be used to find better solution. To evaluate the performance of this method, authors examined the above method with several scheduling algorithms and results prove that Hyper Heuristic Scheduling Algorithm can
significantly decrease the makespan of task scheduling when compared with all other scheduling algorithms.
A novel high-performance hyper-heuristic algorithm is proposed for scheduling on cloud computing systems to
reduce the makespan. This algorithm can be applied to both sequence dependent and sequence independent scheduling problems.
The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study...Eswar Publications
Background: banks, as the main components of any countries` economic backbone, perpetually try to satisfy the needs and expectations of their customers to increase customer satisfaction, since in today`s competitive world, gaining competitive advantage is a high priority for any organization. On the other hand, the emergence of information technology in the banking industry has provided speed, security, efficiency, and quality of services through electronic banking and electronic payment tools. Therefore, banks and credit firms are constantly trying to increase their quality of services to satisfy their customers and gain competitive advantage.
Objective: since customer satisfaction is a high priority as one of the goals of banks and credit firms, this study aims to investigate the role of e-payment tools and e-banking in customer satisfaction.
Methodology: this study is an applied research regarding goal and a correlation type descriptive-survey regarding methodology. The statistical population consists of 80 gold customers of Pasargad bank e-payment company and the sample size was determined 66.35 using Cochran`s equation. Moreover, a questionnaire s used to collect the information. This questionnaire was developed in two sections by the researcher. The validity of the questionnaire is confirmed by a group of experts, including professors and specialists of the field, and its trust is computed using Cronbach`s alpha (α=90%). Furthermore, SPSS software and Pearson`s correlation test were used to analyze the data. Results of the research indicate that there is a positive and significant relationship between e-payment tools and e-banking. Therefore, the results can help to identify effective factors of customer satisfaction and in turn providing competitive advantage for this and similar organizations.
#숙명여대 #홍보광고학과 #브랜드커뮤니케이션전략 #브랜드북
한번은 멋모르고 만들어서 괜찮을 거 라고 생각했는데.. 왜 이번엔 뭔가 힘들었던거지? 더 많은 내용이랑 재밌는 내용을 넣고 싶었는데 잘 됐는지 궁금하다...
저번엔 페북 계정에 사정이 있어서 공유를 하다가 금방 돌렸지만 지금은 부족해서 부끄럽지만 그래도 그냥 친구공개로 업로드합니다! 너 덕분에 또 내가 일주일을 밤샜쟈냐~ 그래도 재밌었엉.. 세번은 만들기 싫다 앞으로 잘하자 소영아!
모두들 브랜드북 만드는거 수고하셨습니다 :)
문장호 교수님 감사합니다 ^ㅇ^!
Overcoming Big Data Bottlenecks in Healthcare - a Predictive Analytics Case S...Damo Consulting Inc.
Implementing population health management in transitional care settings is challenging because of: 1) Data interoperability and other bottlenecks 2) complex workflows designed for reactive rather than proactive processes; and 3) difficulty in integrating them into clinical workflows
This presenattion discusses t a use case demonstrating a practical, real-world solution to these challenges.
Three audience takeaways from presentation:
1. Learn about the big data bottlenecks in healthcare
2. Learn how Sutter Health is using its E.H.R. data in a readmission risk predictive model;
3. See how those predictive models are integrated into clinical operations in improving care
https://jst.org.in/index.html
Our Journals has a act as vehicles for the dissemination of knowledge, making research findings accessible to a wide audience. This accessibility is vital for the progress of education, as it allows students, educators, and professionals to stay informed about the latest developments in their respective fields.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
The main objective of this research is to identify the factors influencing the intentions to adopt
the public computing by the private sector firms. In this research the researcher examined the
ten factors influencing the cloud computing adoption using a proposed integrated model which
incorporates aspects of the Technology, Organization and Environment factors such as
Complexity, Compatibility, Security Concerns, Trialability, Cost Saving, Top Management
Support, Prior IT Experience, Organizational Readiness, Competitive Pressure and External
Support. In order to test influencing factors a survey was conducted and one hundred and
twenty two valid responses were received from IT decision makers from forty firms in different
industries. The results revealed that the Compatibility, Cost Saving, Trialability and External
Support are the main influential factors in the adoption intentions of public cloud computing.
Future research could be built on this study by developing different model for each industry
because each industry has unique characteristics that can influence the adoption of the
technological innovations.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
Cloud Computing a leading and getting widely adopted technology in industry, unveils some unprecedented challenges to security of company’s resources such as capital and knowledge based assets. Hither to no much attention has been paid by the governments and there is neither any universal standard adopted, nor any breakthrough to take up these challenges. Traditional contracts and licensing agreements may not provide adequate legal resources and remedies normally associated with the layers of protection for corporations. Intellectual Property, Foreign Direct Investments (FDI) and corporate governance issues have to be fully explored and practiced in domestic and international markets. So this paper discusses the need of establishment of Law and judicial framework of policies to the services embedding cloud computing technology, besides this it also addresses legal issues and existing policies adopted by different countries.
Assurance of Security and Privacy Requirements for Cloud Deployment ModelIJMTST Journal
Regardless of the few advantages of relocating endeavor basic resources for the Cloud, there are challenges particularly identified with security and protection. It is imperative that Cloud Users comprehend their security and protection needs, in light of their particular setting and select cloud show best fit to help these requirements. The writing gives works that attention on talking about security and protection issues for cloud frameworks yet such works don't give a nitty gritty methodological way to deal with evoke security and security necessities neither one of the to choose cloud arrangement models in view of fulfillment of these prerequisites by Cloud Service Providers. This work propels the present best in class towards this bearing. Specifically, we consider necessities designing ideas to inspire and dissect security and protection prerequisites and their related instruments utilizing an applied structure and an orderly procedure. The work presents confirmation as proof for fulfilling the security and protection necessities as far as culmination and reportable of security occurrence through review. This enables point of view cloud clients to characterize their confirmation prerequisites with the goal that proper cloud models can be chosen for a given setting. To exhibit our work, we display comes about because of a genuine contextual analysis in view of the Greek National Gazette.
Cloud Adoption in Capital Markets: A PerspectiveCognizant
For the financial services industry, the adoption of cloud services has become a viable business directive. As firms work to recoup their losses from the recent financial crisis, pay-as-you-go cloud services allow them to focus more on strategic, innovative and revenue-generating endeavors and less on managing routine IT activities and the supporting infrastructure.
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Effects of Security and Privacy Concerns on using of Cloud Services in Energy Industry, an Oil and Gas Company: A Case Study
1. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290
2779
Effects of Security and Privacy Concerns on using
of Cloud Services in Energy Industry, an Oil and
Gas Company: A Case Study
Alireza Poorebrahimi
Department of Information Technology Management Islamic Azad University, Science & Research Branch of Tehran,
Iran, Email: poorebrahimi@gmail.com
Fatemeh SoleimaniRoozbahani
Department of Information Technology Management Islamic Azad University, Science and Research Branch of Tehran,
Iran, Email: fa.solaymani@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
The topic of ‘‘the cloud’’ has attracted significant attention throughout the past few years. It allows resource
sharing that includes software, platform and infrastructure by means of virtualization. Cloud Adoption in Oil &
Gas companies have approached cloud with caution, but they are increasingly deploying cloud services. Energy
companies have carefully weighed whether they should opt for a public cloud versus a private one, and which
applications are fit for deployment via the cloud. For the most part, the industry has opted to use cloud for generic
purposes. Generic business functions like payroll process and procurement are being run through the cloud, along
with customer relationship management, likely through software-as-a-service offerings that have become well-
known. Security is as much of an issue in the cloud as it is anywhere else. Different people share different point of
view on cloud computing. Some believe it is unsafe to use cloud. Cloud vendors go out of their way to ensure
security. This paper aims to understand the effects of security and privacy concerns on educational use of cloud
services. This proposed a research model based on Ajzen’s (1991) Theory of Planned Behavior (TPB). Following
the TPB, the research developed a model, which posits that staff attitudes predicted by security and privacy
perceptions and behavioral intentions are predicted by attitudes towards using cloud services. The Model was
assess the based on the data collected by means of survey questionnaires. Results supported the proposed model,
validating the predictive power of the TPB.
Keywords - Cloud services; Privacy; Security; Energy Industry, Oil and Gas.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Dec 14, 2015 Date of Acceptance: Dec 17, 2015
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Information Technology (IT) has been adding significant
benefits to various aspects of people’s life, either in terms
of convenience or comfort or entertainment [1]. In other
side, the present competitive environment, companies are
wondering how to reduce their IT costs while increasing
their efficiency and agility to react when changes in the
business processes are required. Cloud Computing is the
latest paradigm to optimize the use of IT resources
considering “everything as a service” and receiving these
services from the Cloud (Internet) instead of owning and
managing hardware and software assets [2]. Cloud
computing is a pervasive computing paradigm that has
revolutionized how computer infrastructure and services
are delivered [3]. Cloud computing has been widely
adopted by enterprises in their business application in the
last decade [4]. Cloud computing has been propounded as
a paradigm shift in the delivery of information technology
(IT) resources and services. It has been dubbed by
proponents of the technology as the fifth utility after
water, electricity, gas, and telephone utilities [2]. The topic
of ‘‘the cloud’’ has attracted significant attention
throughout the past few years [5, 6, 7] and, as a result,
academics and trade journals have created several
competing definitions of cloud computing [8, 9]. Despite
the lack of consensus about definitions, however, there is
broad agreement on the growing demand for cloud
computing. Some estimates suggest that spending on
cloud-related technologies and services in the next few
years may climb as high as $42 billion/year [10]. Roster et
al. [11] identify three of the more commonly cited reasons
for migrating functions and capabilities to the cloud: Cost
reduction, Deployment flexibility, Speed to implement
[12].
Some industries—most notably, the financial services and
telecommunications sectors—have been relatively quick
adopters, while others have approached the cloud more
cautiously and slowly [12].
Despite the compelling case for moving towards cloud
computing, the upstream oil & gas industry faces several
technical challenges—most notably, a pronounced
emphasis on data security, a reliance on extremely large
data sets, and significant legacy investments in
information technology infrastructure—that make a full
migration to the public cloud difficult at present [13]. Oil
and gas companies have approached cloud with caution,
but they are increasingly deploying cloud services. Energy
companies have carefully weighed whether they should
opt for a public cloud versus a private one, and which
applications are fit for deployment via the cloud. For the
most part, the industry has opted to use cloud for generic
2. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290
2780
purposes. For example, cloud is being used or considered
for infrastructure such as data backup and archiving and
data storage (raw data, backup, archiving, email storage).
Generic business functions like payroll process and
procurement are being run through the cloud, along with
customer relationship management, likely through
software-as-a-service offerings that have become well-
known. Another fairly generic application is for
collaborative applications such as email, group
calendaring, and messaging. Entrepreneurial independent
upstream oil and gas companies primarily involved in
unconventional shale gas and tight oil initiatives have
adopted cloud to perform these functions. Because of
security considerations, the oil and gas industry generally
prefers private cloud over public cloud for core
applications [14].
Despite the compelling case for moving towards the cloud,
however, the absorption of these technologies and services
has been uneven [12].
Most oil and gas companies are balancing the
opportunities versus the risks in considering whether to
adopt cloud technologies. On the one hand, cloud enables
increased collaboration and can result in decreased
operational costs due to reduced infrastructure
investments, quick deployment, and flexibility of use. That
said, security concerns persist over cloud deployment. IT
security remains the number one priority for the industry,
and many CIOs have had doubts about the security of the
cloud and the ability of cloud providers to offer data
privacy.
However, there is evidence that the industry is becoming
more receptive to cloud technologies. Cloud will likely be
used in less-sensitive applications. Collaboration is
becoming critical for many O&G companies, due to skills
shortage, internationalization of operations, and growing
importance of collaborative work with business partners.
Sensitive information needs to be shared with
stakeholders, remote teams, suppliers, and JV partners to
maximize productivity and knowledge transfer.
Deployment of cloud-based solutions for document
management would enhance the collaborative experience
and allow the O&G companies to eliminate decentralized
systems with a central repository across multiple locations
and business units.
However, there are also concerns and issues to be solved
before Cloud Computing spreads across the different
industries [2]. However, some challenges still need to be
addressed such as security and privacy issues [15, 16].
Cloud Computing security is the major concern to be
addressed nowadays. If security measures are not provided
properly for data operations and transmissions then data is
at high risk [17]. Since cloud computing provides a facility
for a group of users to access the stored data there is a
possibility of having high data risk. Strongest security
measures are to be implemented by identifying security
challenge and solutions to handle these challenges [18].
The paper proceeds as follows. In the second section, the
literature on studies of cloud computing adoption and use
has been reviewed. The next sessions have been allot to
the research methods and the results of data analysis.
Finally, discussion of the research findings and their
implications are provided along with the limitations of the
study.
II. LITERATURE REVIEW
Cloud computing has recently received increasing
attention in information systems and computer science
disciplines [19]. Movahedisefat et al. [20] proposed one
of the most pervasive and fundamental challenges for
organizations in demonstrating policy compliance is
proving that the physical and virtual infrastructure of the
cloud can be trusted—particularly when those
infrastructure components are owned and managed by
external service providers. The next frontier in cloud
security and compliance will be to create transparency at
the bottom-most layers of the cloud by developing the
standards, tools, and linkages to monitor and prove that the
cloud’s physical and virtual machines are actually
performing as they should [20]. Pearson [21] claims some
core traditional mechanisms for addressing privacy (such
as model contracts) are no longer flexible or dynamic
enough, so new approaches need to be developed to fit this
new paradigm. He assess how security, trust and privacy
issues occur in the context of cloud computing and discuss
ways in which they may be addressed [21].
Yu et al. [17] addressed the problem of simultaneously
achieving fine-grainedness, scalability, and data
confidentiality of access control open issue by, on one
hand, defining and enforcing access policies based on data
attributes, and, on the other hand, allowing the data owner
to delegate most of the computation tasks involved in fine
grained data access control to untrusted cloud servers
without disclosing the underlying data contents [17].
Popović [22], discussed about the security issues,
requirements and challenges that are faced by cloud
service providers during cloud engineering [22]. Sabahi
[23] discussed about the security issues, reliability and
availability for cloud computing. He also proposed a
feasible solution for few security issues [23]. Liu
introduced some cloud computing systems and analyzes
cloud computing security problems and its strategy
according to the cloud computing concepts [24]. It is
obvious as the enthusiasm for utilize the cloud is very
high, the concerns about its challenges, particularly its
security, is high, therefore the security is a factor which
affects the using cloud computing.
III. RESEARCH METHODOLOGY
Theory of planned behavior (TPB), a prominent reasoned
action model, its conceptual foundation, its intellectual
3. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290
2781
history, and the research it has generated. From its roots in
propositional control and expectancy theory, the TPB
From its roots in propositional control and expectancy
theory, the TPB. According to the theory, intention is the
immediate antecedent of behavior and is itself a function
of attitude towards the behavior, subjective norm, and
perceived behavior control; and these determinants follow,
respectively, from beliefs about the behavior`s likely
consequences, about normative expectations of important
others, and about the presence of factors that control
behavioral performances [25]. In TPB, beliefs that are
specific to each situation are antecedent to attitude. The
theory does not assume that beliefs that apply in one
context also apply in other contexts. Likewise, TPB taps
the important control variables for each situation
independently and is more likely to capture situation
specific factors [26]. Security and privacy perception is
significant predictors of attitude towards using the cloud
services in an Energy Industry can be considered in the
model.
In an attempt to ensure content validity and face validity,
the survey instrument was developed based on
questionnaire items that had been successfully used in
prior studies. The factors which play a fundamental role in
the model include: Security and privacy, Attitude,
Behavioral intention. Security refers to the degree to
which students believe that cloud services are secure
platforms for storing and sharing sensitive data. Attitude
towards using technology is defined as students’ overall
affective reaction to using cloud service [27]. Behavioral
intention refers to the degree to which a student has
formulated conscious plans to use or not use cloud
services in the future [28].
Based on the factors, the hypothesizes are:
H1. Perceived security and privacy will have a positive
influence on attitude.
H2. Attitude will have a significant positive influence on
behavioral intention.
H3. Behavioral intention will have a significant positive
influence on use of cloud services in Energy Industry
(Fig 1).
Fig 1. Model of Research
IV. METHODOLOGY
Based on the feedback from expert panel, modifications
were done on the survey instrument. The instrument has
total 16 Likert items, including 5 items for security-
privacy, 4 items for use, 4 items for behavioral intention,
and 3 items for attitude. Participants were asked to
indicate their level of agreement using a five-point scale
ranging from ‘‘strongly agree’’ to ‘‘strongly disagree.’’
In total, 50 randomly selected members of an Oil and Gas
company (which wants to be anonymous). However, 5
questionnaires were discarded from data set.
Prior to conducting factor analysis, data set was checked
for suitability for factor analysis. After the data set was
checked for factorability, 19 items were subjected to factor
analysis. We conducted an exploratory factor analysis
using principal components extraction to test construct
validity of the scale. Based on the results of the
exploratory factor analysis, 3 questionnaire items were
omitted from the scale. The Bartlett’s test of Sphericity
indicated that the measures for four latent constructs were
interdependent and the KMO measure of sampling
adequacy was well above the minimally accepted level of
.50. On the basis of a scree plot of eigenvalues, a one-
factor solution appeared to be most appropriate for each
measurement. For each measurement, total variance
explained ranged between 49.74 and 74.95, which are all
much higher than acceptable value of .40 for measures
with one factor Moreover, each measurement item has a
factor loading above .71 and communality value above
.50. Factor loadings, which are all much higher than
acceptable value of .40, ensure that factor structures are
robust. The corrected item-total correlation coefficients
ranged from .49 to .80, indicating acceptable to high
homogeneity of the items.
V. DISCUSSION AND FINDINGS
This paper extends Ajzen’s (1991) Theory of Planned
Behavior (TPB) to explain and predict educational use of
cloud services by pre-service teachers. Following the TPB,
we developed a research model, which posits that student
attitudes predicted by security and privacy perceptions and
behavioral intentions are predicted by attitudes towards
using cloud services. The findings supported the proposed
model, validating the predictive power of the TPB. The
findings stressed the importance of security and privacy
variable, which add to the explanatory and predictive
power of the model, in predicting attitudes towards using
cloud services, justifying the integration of this variable
within the TPB framework.
The study hypothesized that security and privacy have a
positively significant influence on staffs` attitudes towards
using cloud services. The results, along with previous
studies, support this hypothesis. This study has shown that
security and privacy perceptions have a significant
influence on attitude. Security variable has been found in
4. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290
2782
prior studies as a significant predictor of adoption
behavior, for example Salisbury et al. (2001) found that
perceived security is a strong predictor of intention to
purchase online. Zhu et al. (2006) found that security
perception has a significant effect on e-business adoption.
Dillon et al. (2010) found that security issues have an
important role in hindering cloud computing. Lin and
Chen (2012) argued that challenges of cloud computing
are security and standardization. More recently, Park and
Kim (2014) found that user acceptance of mobile cloud
services is largely affected by security, perceived mobility,
quality of service, connectedness, and satisfaction.
The results of the study supported assumptions of Theory
of Planned Behavior that we based our study on. This
suggests that the assumptions of this theory can be used to
explain the nature of educational use of similar
technologies. The present study may also contribute to the
literature since the study on oil and gas industry use of
cloud services is limited. The security and privacy
variables were found to be a strong determinant of oil and
gas industry use of cloud services. Therefore, these
variables should be taken into account in future researches
on use of similar technologies. Moreover, the results
demonstrated that attitude has a stronger effect on oil and
gas industry use of cloud services than behavioral
intention. Thus, future studies may focus on the effect of
attitude on oil and gas industry use of such services to
develop a more parsimony model that efficiently predicts
usage.
REFERENCES
[1] O. Ali and J. Soar, "Challenges and Issues Within
Cloud Computing Technology," CLOUD
COMPUTING : The Fifth International Conference
on Cloud Computing, GRIDs, and Virtualization,
2014 .
[2] C. R. Monroy, C. A. Arias and Y. N. Guerrero, "The
new cloud computing paradigm: the way to IT seen
as a utility," Latin American and Caribbean Journal
of Engineering Education, 6(2), 2013.
[3] H. M. Sabi, F.-M. E. Uzoka, K. Langmia and F. N.
Njehda, "Conceptualizing a model for adoption of
cloud computing in education," International Journal
of Information Management 36, p. 183–191, 2016.
[4] S. Nepal and S. Pandey, "Guest Editorial: Cloud
Computing and Scientific Applications (CCSA)—Big
Data Analysis in the Cloud," The Computer Journal
Advance Access published February 1, 2015.
[5] S. Cherry, "Forecast for cloud computing: up, up, and
away.," IEEE Spectrum 46, 2009.
[6] M.-H. Kuo, A. Kushniruk and E. Borycki, "Can cloud
computing benefit health services? A SWOT
analysis," Studies in Health Technology and
Informatics 169, p. 379–383, 2011.
[7] T. Sterling and D. Stark, "A high-performance
computing forecast: partly cloudy," Computing in
Science & Engineering 11(4), p. 42–49, 2009.
[8] K. Kushida, J. Murray and J. Zysman, "Diffusing the
cloud: cloud computing and implications for public
policy," JournalofIndustry, Competition and Trade
11(3), p. 209–237, 2011.
[9] H. R. Motahari-Nezhad, B. Stephenson and S.
Singhal, "Outsourcing Business to Cloud Computing
Services: Opportunities and Challenges," IEEE
Internet Computing, Special Issue on Cloud
Computing, 2009.
[10] R. Buyya, S. Pandey and C. Vecchiola, "Cloudbus
toolkit for market-oriented cloud computing," Cloud
Computing Springer Berlin Heidelberg, pp. 24-44,
2009.
[11] J. Roster, C. Moore, and K. Pfeiler, "Who really cares
about the cloud? An industry perspective," Paper
presented at the Gartner Webinar, August 24, 2010.
[12] R. K.Perrons and A. Hems, "Cloud computingin the
upstream oil & gas industry: Aproposed way
forward," Energy Policy, vol. 56, p. 732–737, 2013.
[13] R. K. Perrons and A. Hems, "Cloud computing in the
upstream oil & gas industry: A proposed way
forward," Energy Policy 56, p. 732–737, 2013.
[14] "Migrat ing to Cloud: The Business Value for Oil,"
IDC Energy Insights, 2014.
[15] T. Dillon, C. Wu and E. Chang, "Cloud computing:
Issues and challenges," In 24th IEEE international
conference on advanced information networking and
applications, 2010.
[16] E. Park and K. J. Kim, "An ıntegrated adoption model
of mobile cloud services: Exploration of key
determinants and extension of technology acceptance
model," Telematics and Informatics, 31(3), p. 376–
385, 2014.
[17] S. Yu, C. Wang, K. Ren and W. Lou, "Achieving
secure, scalable and fine-grained data access control
in cloud computing," IEEE Communications Society
subject matter experts for publication in the IEEE
INFOCOM 2010 proceedings, pp. 1-9, 2010.
5. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2779-2783 (2015) ISSN: 0975-0290
2783
[18] R. V. Rao and K. Selvamani, "Data Security
Challenges and Its Solutions in Cloud Computing,"
Procedia Computer Science 48, p. 204 – 209, 2015.
[19] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R.
Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin,
I. Stoica and M. Zaharia, "Above the Clouds: A
Berkeley View of Cloud Computing," UC Berkeley
Reliable Adaptive Distributed Systems Laboratory,
2009.
[20] M. R. Movahedisefat, S. M. R. Farshchi and D.
Mohammadpur, "Emerging Security Challenges in
Cloud Computing, from Infrastructure-Based
Security to Proposed Provisioned Cloud
Infrastructure," Emerging Trends in ICT Security,
2014.
[21] S. Pearson, "Privacy, Security and Trust in Cloud
Computing," Computer Communications and
Networks, pp. 4471-4189, 2013.
[22] K. Popović, "Cloud computing security issues and
challenges," In MIPRO, 2010 proceedings of the 33rd
international convention IEEE, pp. 344-349, 2010.
[23] F. Sabahi, "Cloud computing security threats and
responses," In Communication Software and
Networks (ICCSN), 2011 IEEE 3rd International
Conference on IEEE, pp. 245-249, 2011.
[24] W. Liu, "Research on Cloud Computing Security
Problem and Strategy," In Consumer Electronics,
Communications and Networks (CECNet), 2nd
International Conference on IEEE, pp. 1216-1219,
2012.
[25] I. Ajzen, "Theory of planned behavior, Handb Theor
Soc Psychol Vol One, 2011.
[26] K. Mathieson, "Predicting user intentions: Comparing
the technology," Information Systems Research, 2(3),
p. 173–191, 1991.
[27] V. Venkatesh and H. Bala, "Technology acceptance
model 3 and a research agenda on interventions,"
Decision sciences, 39(2), pp. 273-315, 2008.
[28] P. R. Warshaw and F. D. Davis, "Disentangling
behavioral intention and behavioral expectation,"
Journal of experimental social psychology, 21(3), pp.
213-228, 1985.
Biographies and Photographs
Professor Alireza Poorebrahimi, has
obtained Ph. D. degree in Industrial
Management from SRBIA University in
1993. His research fields are Network
Security Management, Passive Defense,
Cloud Computing, e-Banking and e-
Commerce. He is appointed as a
Professor in the SRBIA University,
Deptt. of Management.
Miss.Fatemeh Soleimani Roozbahani
has obtained B.S. degree in Nuclear
Physics from Shahid Chamran
University in 2009, and has obtained
Master degree in Information
Technology Management summa cum
laude with a cumulative GPA of 19.76
[out of 20] amongst the graduates of this
major who had been graduated in 2011 from Farabi
University. Presently she is pursuing Ph.D. in Information
Technology Management in SRBIA University. Her
research fields are Information Business Intelligence,
Deep Learning, Cloud Computing, and Security in
Computer Networks. She is appointed as a Lecturer in
Azad University, Deptt. of Information Technology.