999 resultados para Cloud discharge


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider (CSP) that provides various database services to different users. Recently, plenty of research work has been done on the primitive of outsourced database. However, it seems that no existing solutions can perfectly support the properties of both correctness and completeness for the query results, especially in the case when the dishonest CSP intentionally returns an empty set for the query request of the user. In this paper, we propose a new verifiable auditing scheme for outsourced database, which can simultaneously achieve the correctness and completeness of search results even if the dishonest CSP purposely returns an empty set. Furthermore, we can prove that our construction can achieve the desired security properties even in the encrypted outsourced database. Besides, the proposed scheme can be extended to support the dynamic database setting by incorporating the notion of verifiable database with updates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Database query verification schemes provide correctness guarantees for database queries. Typically such guarantees are required and advisable where queries are executed on untrusted servers. This need to verify query results, even though they may have been executed on one’s own database, is something new that has arisen with the advent of cloud services. The traditional model of hosting one’s own databases on one’s own servers did not require such verification because the hardware and software were both entirely within one’s control, and therefore fully trusted. However, with the economical and technological benefits of cloud services beckoning, many are now considering outsourcing both data and execution of database queries to the cloud, despite obvious risks. This survey paper provides an overview into the field of database query verification and explores the current state of the art in terms of query execution and correctness guarantees provided for query results. We also provide indications towards future work in the area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New national infrastructure initiatives such as the National Broadband Network (NBN) allow small and medium-sized enterprises (SMEs) in Australia to have greater access to cost effective Cloud computing. However, the ability of Cloud computing to store data remotely and share services in a dynamic environment brings with it security and privacy concerns. Evaluating these concerns is critical to address the Cloud computing underutilisation issue and leverage the benefits of costly NBN investment. This paper examines the influence of privacy and security factors on Cloud adoption by Australian SMEs in metropolitan and regional area. Data were collected from 150 Australian SMEs (specifically, 79 metropolitan SMEs and 71 regional SMEs) and structural equation modelling was used for the analysis. The findings reveal that privacy and security factors do not significantly influence the decision-making of Australian SMEs in the adoption of Cloud computing. Moreover, the results indicate that Cloud computing adoption is not influenced by the geographical location (i.e., metropolitan or regional location) of the SMEs. The findings extend the current understanding of Cloud computing adoption by Australian SMEs. The results will be useful to SMEs, Cloud service providers and policy makers devising Cloud security and privacy policies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Database query verification schemes attempt to provide authenticity, completeness, and freshness guarantees for queries executed on untrusted cloud servers. A number of such schemes currently exist in the literature, allowing query verification for queries that are based on matching whole values (such as numbers, dates, etc.) or for queries based on keyword matching. However, there is a notable gap in the research with regard to query verification schemes for pattern-matching queries. Our contribution here is to provide such a verification scheme that provides correctness guarantees for pattern-matching queries executed on the cloud. We describe a trivial scheme, ȃŸż and show how it does not provide completeness guarantees, and then proceed to describe our scheme based on efficient primitives such as cryptographic hashing and Merkle hash trees along with suffix arrays. We also provide experimental results based on a working prototype to show the practicality of our scheme.Ÿż

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates the problem of minimizing data transfer between different data centers of the cloud during the neurological diagnostics of cardiac autonomic neuropathy (CAN). This problem has never been considered in the literature before. All classifiers considered for the diagnostics of CAN previously assume complete access to all data, which would lead to enormous burden of data transfer during training if such classifiers were deployed in the cloud. We introduce a new model of clustering-based multi-layer distributed ensembles (CBMLDE). It is designed to eliminate the need to transfer data between different data centers for training of the classifiers. We conducted experiments utilizing a dataset derived from an extensive DiScRi database. Our comprehensive tests have determined the best combinations of options for setting up CBMLDE classifiers. The results demonstrate that CBMLDE classifiers not only completely eliminate the need in patient data transfer, but also have significantly outperformed all base classifiers and simpler counterpart models in all cloud frameworks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

 This thesis has developed a sensor-Cloud system that integrates WBANs with Cloud computing to enable real-time sensor data collection, storage, processing, sharing and management. As the main contribution of this study, a congestion detection and control protocol is proposed to ensure acceptable data flows are maintained during the network lifetime.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber-physical-social system (CPSS) allows individuals to share personal information collected from not only cyberspace but also physical space. This has resulted in generating numerous data at a user's local storage. However, it is very expensive for users to store large data sets, and it also causes problems in data management. Therefore, it is of critical importance to outsource the data to cloud servers, which provides users an easy, cost-effective, and flexible way to manage data, whereas users lose control on their data once outsourcing their data to cloud servers, which poses challenges on integrity of outsourced data. Many schemes have been proposed to allow a third-party auditor to verify data integrity using the public keys of users. Most of these schemes bear a strong assumption: the auditors are honest and reliable, and thereby are vulnerability in the case that auditors are malicious. Moreover, in most of these schemes, an auditor needs to manage users certificates to choose the correct public keys for verification. In this paper, we propose a secure certificateless public integrity verification scheme (SCLPV). The SCLPV is the first work that simultaneously supports certificateless public verification and resistance against malicious auditors to verify the integrity of outsourced data in CPSS. A formal security proof proves the correctness and security of our scheme. In addition, an elaborate performance analysis demonstrates that the SCLPV is efficient and practical. Compared with the only existing certificateless public verification scheme (CLPV), the SCLPV provides stronger security guarantees in terms of remedying the security vulnerability of the CLPV and resistance against malicious auditors. In comparison with the best of integrity verification scheme achieving resistance against malicious auditors, the communication cost between the auditor and the cloud server of the SCLPV is independent of the size of the processed data, meanwhile, the auditor in the SCLPV does not need to manage certificates.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Este estudo visa desenvolver uma investigação exploratória e quali-quantitativa, a cerca da representação social do Cloud Computing, na visão dos profissionais de TI brasileiros. Objetiva expor quais as percepções dos usuários da área de TI a respeito do paradigma computacional Cloud Computing. Para suportar o estudo teórico, foram coletados dados empíricos, por meio de questionários online respondidos por 221 profissionais da área de TI. Com o uso da técnica de evocação de palavras e da teoria da representação social (TRS), os dados coletados foram sumarizados. Após o tratamento dos dados mediante o uso da técnica do quadro de quatro casas de Vergès, obteve-se como resultado, a identificação do núcleo central e do sistema periférico da representação social do Cloud Computing. Por fim, os dados foram analisados utilizando-se as análises implicativa e de conteúdo, de forma a que todas as informações fossem abstraídas para melhor interpretação do tema. Obteve-se como resultado, que o núcleo central da representação social do Cloud Computing é composto pelas seguintes palavras “Nuvem”, “Armazenamento”, “Disponibilidade”, “Internet”, “Virtualização” e “Segurança”. Por sua vez, as palavras identificadas como parte do sistema periférico da representação social do Cloud Computing foram: “Compartilhamento”, “Escalabilidade” e ”Facilidade”. Os resultados permitem compreender qual percepção dos profissionais de TI a respeito deste paradigma tecnológico e sua correlação com o referencial teórico abordado. Tais informações e percepções podem auxiliar a tornar o não familiar em familiar, ou seja, compreender como o Cloud Computing é representado, visto e, finalmente, reconhecido pelos profissionais da área de TI.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

EMAp - Escola de Matemática Aplicada

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mechanical and tribological properties of AISI 304 and AISI 316 stainless steels submitted to glow discharge ion nitriding are reported. The atmosphere was 20:80 - N2:H2 with substrate temperatures ranging from 300 to 500 °C. Treatment at 300 °C produced expanded austenite (γN) in both steels. Increasing the temperature, the phases γ′-Fe4N and ε- Fe2+xN were present and the latter is the major phase for AISI 304. At 500 °C, the CrN phase was also identified in both steels. Hardnesses of about 13-14 GPa at near surface regions were obtained in both steels. Moreover, AISI 316 nitrided at 500 °C has the deepest hard layer. Tribological tests showed that wear can be reduced by up to a factor of six after the nitriding processes, even for a working temperature of 300 °C. The profiles during and after nanoscratch tests did not reveal significant differences after nitriding processes in both steels.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mechanical and tribological properties of AISI 304 and AISI 316 stainless steels submitted to glow discharge ion nitriding are reported. The atmosphere was 20:80 - N2:H2 with substrate temperatures ranging from 300 to 500 °C. Treatment at 300 °C produced expanded austenite (γN) in both steels. Increasing the temperature, the phases γ′-Fe4N and ε- Fe2+xN were present and the latter is the major phase for AISI 304. At 500 °C, the CrN phase was also identified in both steels. Hardnesses of about 13-14 GPa at near surface regions were obtained in both steels. Moreover, AISI 316 nitrided at 500 °C has the deepest hard layer. Tribological tests showed that wear can be reduced by up to a factor of six after the nitriding processes, even for a working temperature of 300 °C. The profiles during and after nanoscratch tests did not reveal significant differences after nitriding processes in both steels.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The study was conducted at the Research Laboratory of Hydraulic and Irrigation Group in the Rural Engineering Department, Technical University of Madrid (Universidad Politecnica de Madrid), Madrid, Spain. Water temperatures of 20, 30, 40 degrees C and system pressures often encountered in irrigation practices of 80, 90, 100, 110, 120, 130, 140, 150, 160, 170, 180, 190 and 200 k Pa were applied to determine the effects of different water temperatures and pressures on emitter discharge. Non-pressure compensating in-line emitter which has turbulent flow regime with a long-path (labyrinth), emitter discharge was 4 L h(-1) at system pressure of 100 kPa according to the manufacturer recommended, was used. Emitters were spaced 20 cm along the drip laterals with 16 mm diameter. Discharge equations and coefficients of variation related to temperatures of 20, 30 and 40 degrees C were obtained as q = 0.375H(0.51), q = 0.358H(0.52), q = 0.346H(0.53) and 2.68, 2.09, 3.65, respectively. Discharge of the emitter was affected by different system pressures and increased as potentially (R = 0993-0996). In general. the emitter discharge increased with increasing temperature. However, especially in the common system pressures of 90-120 k Pa, differences of obtained emitter discharges between the different water temperatures were not significant (1%).