13,792 results on '"CLOUD"'
Search Results
152. An IoT-Based Cloud Data Platform with Real-Time Connecting Maritime Autonomous Surface Ships
- Author
-
Hwang, Hyoseong, Joe, Inwhee, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Silhavy, Radek, editor, and Silhavy, Petr, editor
- Published
- 2024
- Full Text
- View/download PDF
153. A Taxonomy for Cloud Storage Cost
- Author
-
Khan, Akif Quddus, Nikolov, Nikolay, Matskin, Mihhail, Prodan, Radu, Bussler, Christoph, Roman, Dumitru, Soylu, Ahmet, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Chbeir, Richard, editor, Benslimane, Djamal, editor, Zervakis, Michalis, editor, Manolopoulos, Yannis, editor, Ngyuen, Ngoc Thanh, editor, and Tekli, Joe, editor
- Published
- 2024
- Full Text
- View/download PDF
154. A Method for Load Balancing and Energy Optimization in Cloud Computing Virtual Machine Scheduling
- Author
-
Chandravanshi, Kamlesh, Soni, Gaurav, Mishra, Durgesh Kumar, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Naik, Nitin, editor, Jenkins, Paul, editor, Grace, Paul, editor, Yang, Longzhi, editor, and Prajapat, Shaligram, editor
- Published
- 2024
- Full Text
- View/download PDF
155. Enhancing Cloud-Based Machine Learning Models with Federated Learning Techniques
- Author
-
Shamim, Rejuwan, Farhaoui, Yousef, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Farhaoui, Yousef, editor, Hussain, Amir, editor, Saba, Tanzila, editor, Taherdoost, Hamed, editor, and Verma, Anshul, editor
- Published
- 2024
- Full Text
- View/download PDF
156. Security of IoT-Cloud Systems Based Machine Learning
- Author
-
Fadli, Ouijdane, Balboul, Younes, Fattah, Mohammed, Mazer, Said, Elbekkali, Moulhime, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Farhaoui, Yousef, editor, Hussain, Amir, editor, Saba, Tanzila, editor, Taherdoost, Hamed, editor, and Verma, Anshul, editor
- Published
- 2024
- Full Text
- View/download PDF
157. Cloud Computing—Everything as a Cloud Service in Industry 4.0
- Author
-
Aravinth, S. S., Krishnan, A. Siva Rama, Ranganathan, R., Sasikala, M., Kumar, M. Senthil, Thiyagarajan, R., Chatterjee, Prasenjit, Series Editor, Awasthi, Anjali, Series Editor, Tiwari, Manoj Kumar, Series Editor, Chakraborty, Shankar, Series Editor, Yazdani, Morteza, Series Editor, Kumar, Avadhesh, editor, Sagar, Shrddha, editor, Thangamuthu, Poongodi, editor, and Balamurugan, B., editor
- Published
- 2024
- Full Text
- View/download PDF
158. Application of Convolutional Neural Networks for the Detection of Diseases in the CCN-51 Cocoa Fruit by Means of a Mobile Application
- Author
-
Morales, Mauro, Morocho, Jerson, López, Ximena, Navas, Patricio, Celebi, Emre, Series Editor, Chen, Jingdong, Series Editor, Gopi, E. S., Series Editor, Neustein, Amy, Series Editor, Liotta, Antonio, Series Editor, Di Mauro, Mario, Series Editor, and Meng, Lei, editor
- Published
- 2024
- Full Text
- View/download PDF
159. A Survey on Security in Data Transmission in IoT: Layered Architecture
- Author
-
Ba, Mandicou, Dionlar, Lang, Haggar, Bachar Salim, DIOP, Idy, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ye, Kejiang, editor, and Zhang, Liang-Jie, editor
- Published
- 2024
- Full Text
- View/download PDF
160. Automatic Safety and Monitoring System Using ESP 8266 with Cloud Platform
- Author
-
Agarwal, Vipul, Navya, G., Lohitha, J., Pahuja, Abhishek, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Pareek, Prakash, editor, Gupta, Nishu, editor, and Reis, M. J. C. S., editor
- Published
- 2024
- Full Text
- View/download PDF
161. Design and Development of Real-Time IIoT for Multi-cloud Factory Vehicle Monitoring System
- Author
-
Kulthumrongkul, Patchapong, Fungthanmasarn, Papat, Asawakul, Chaodit, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Herath, Damayanthi, editor, Date, Susumu, editor, Jayasinghe, Upul, editor, Narayanan, Vijaykrishnan, editor, Ragel, Roshan, editor, and Wang, Jilong, editor
- Published
- 2024
- Full Text
- View/download PDF
162. Gallant Ant Colony Optimized Machine Learning Framework (GACO-MLF) for Quality of Service Enhancement in Internet of Things-Based Public Cloud Networking
- Author
-
Ramkumar, J., Vadivel, R., Narasimhan, B., Boopalan, S., Surendren, B., Das, Swagatam, Series Editor, Bansal, Jagdish Chand, Series Editor, Tavares, João Manuel R. S., editor, Rodrigues, Joel J. P. C., editor, Misra, Debajyoti, editor, and Bhattacherjee, Debasmriti, editor
- Published
- 2024
- Full Text
- View/download PDF
163. Serverless Edge Providers for AI Applications
- Author
-
Maciá-Lillo, Antonio, Mora, Higinio, Ramírez-Gordillo, Tamai, Jimeno-Morenilla, Antonio, Visvizi, Anna, editor, Troisi, Orlando, editor, and Corvello, Vincenzo, editor
- Published
- 2024
- Full Text
- View/download PDF
164. Domain Isolation and Access Control in Multi-tenant Cloud FPGAs
- Author
-
Bobda, Christophe, Mbongue, Joel Mandebi, Saha, Sujan Kumar, Ahmed, Muhammed Kawser, Szefer, Jakub, editor, and Tessier, Russell, editor
- Published
- 2024
- Full Text
- View/download PDF
165. AI Based Medicine Intake Tracker
- Author
-
Dharmale, Gulbakshee, Patil, Dipti, Shekapure, Swati, Chougule, Aditi, Anter, Ahmed M., editor, Elhoseny, Mohamed, editor, and Thakare, Anuradha D., editor
- Published
- 2024
- Full Text
- View/download PDF
166. Future Privacy and Trust Challenges for IoE Networks
- Author
-
Iftikhar, Abeer, Qureshi, Kashif Naseer, Fortino, Giancarlo, Series Editor, Liotta, Antonio, Series Editor, Naseer Qureshi, Kashif, editor, Newe, Thomas, editor, Jeon, Gwanggil, editor, and Chehri, Abdellah, editor
- Published
- 2024
- Full Text
- View/download PDF
167. Securing and Analyzing Media Signal Transfer over LoRaWAN Networks
- Author
-
Brazhenenko, Maksym, Shevchenko, Viktor, Bychkov, Oleksii, Petrova, Pepa Vl., Jekov, Bojan, Kovatcheva, Eugenia, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Tagarev, Todor, editor, and Stoianov, Nikolai, editor
- Published
- 2024
- Full Text
- View/download PDF
168. Cloud Computing Concepts
- Author
-
Kingsley, M. Scott, El-Bawab, Tarek S., Series Editor, and Kingsley, M. Scott
- Published
- 2024
- Full Text
- View/download PDF
169. Double Deep Q-Network-Based Time and Energy-Efficient Mobility-Aware Workflow Migration Approach
- Author
-
Boubaker, Nour El Houda, Zarour, Karim, Guermouche, Nawal, Benmerzoug, Djamel, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Sellami, Mohamed, editor, Vidal, Maria-Esther, editor, van Dongen, Boudewijn, editor, Gaaloul, Walid, editor, and Panetto, Hervé, editor
- Published
- 2024
- Full Text
- View/download PDF
170. Performance Evaluation of Evolutionary Under Sampling and Machine Learning Techniques for Network Security in Cloud Environment
- Author
-
Alla, Kesava Rao, Thangarasu, Gunasekar, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Hassan, Fazilah, editor, Sunar, Noorhazirah, editor, Mohd Basri, Mohd Ariffanan, editor, Mahmud, Mohd Saiful Azimi, editor, Ishak, Mohamad Hafis Izran, editor, and Mohamed Ali, Mohamed Sultan, editor
- Published
- 2024
- Full Text
- View/download PDF
171. Blockchain-Based Privacy-Preserving Electronics Healthcare Records in Healthcare 4.0 Using Proxy Re-Encryption
- Author
-
Parthiban, Latha, Sammeta, Naresh, Malathi, A. Christina Josephine, Samuel, Betty Elizebeth, Chlamtac, Imrich, Series Editor, Goundar, Sam, editor, and Anandan, R., editor
- Published
- 2024
- Full Text
- View/download PDF
172. Access management based on deep reinforcement learning for effective cloud storage security
- Author
-
Byatarayanapura Venkataswamy, Srinivas, Patil, Kavitha Sachidanand, Narayanaswamy, Harish kumar, and Veerabadrappa, Kantharaju
- Published
- 2024
- Full Text
- View/download PDF
173. Characterization of Rainfall/Cloud Signature Using Fully Polarimetric X-Band SAR Data
- Author
-
Malik, Rashmi, Mohanty, Shradha, Indu, J., Dikshit, Onkar, and Rathore, Virendra S.
- Published
- 2024
- Full Text
- View/download PDF
174. Intra Firewall Anomaly Policies Detection in Cloud Environment Using Firewall Tree
- Author
-
Hakani, Dhwani and Mann, Palvinder Singh
- Published
- 2024
- Full Text
- View/download PDF
175. An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud
- Author
-
Chen, Peng, Xu, Baochao, Li, Hui, Wang, Weiguo, Peng, Yanguo, Bhowmick, Sourav S., Chen, Xiaofeng, and Cui, Jiangtao
- Published
- 2024
- Full Text
- View/download PDF
176. Internet of thing (IoT) enabled smart sensor node (SSN) to measure the soil and environmental parameters for smart farming
- Author
-
Karothia, Rajeev and Chattopadhyay, Manju K.
- Published
- 2024
- Full Text
- View/download PDF
177. Regional differences in cloud characteristics at different depth, intensity and horizontal scale over South Asia during Indian summer monsoon using CloudSat and reanalysis data
- Author
-
Kumar, Shailendra
- Published
- 2024
- Full Text
- View/download PDF
178. An Optimised Task Scheduling of Remote Sensing Data Processing for Smart Patient Health Monitoring
- Author
-
Ravikishan, Surapaneni, Reddy, B. Eswar, and Rao, K. V. Sambasiva
- Published
- 2024
- Full Text
- View/download PDF
179. An empirical study of establishing guidelines for evaluation and adoption of secure and cost effective cloud computing
- Author
-
Ullah, Raja Muhammad Ubaid, Buckley, Kevan, Garvey, Mary, and Li, Jun
- Subjects
cloud computing ,cloud ,adoption ,security ,services ,evaluation ,cyber security - Abstract
This research investigates the factors influencing large enterprises, small and medium-sized enterprises (SMEs) behavioural intention toward adopting cloud computing (CC) services. The increasing adoption of CC services is changing how businesses maintain, select, update, and manage information and communication technology. In particular, CC services have the potential to improve IT systems reliability and scalability, allowing large enterprises and SMEs to use their limited resources on their core business and strategy. Many factors and variables influence technology adoption and usage decisions in the large enterprises and SMEs context. Despite the extensive literature, there still needs to be more research on the factors influencing large enterprises and SMEs uptakes CC services adoption. Therefore, examining large enterprises and SMEs adoption of CC is essential for successfully implementing this system. This thesis uses environmental, human, organisational, and technological factors to model the relationship between the variables considered and CC services adoption to increase the probability that large enterprises, and SMEs adopt CC services successfully. The study considers the influence of eleven variables: external support, competitive pressure, senior management support, employee's cloud knowledge, adequate resources, information intensity, relative advantage, complexity, compatibility, security/privacy, and cost-effectiveness. A quantitative research approach was applied using an online questionnaire. A conceptual model of CC services adoption by large enterprises and SMEs has been developed. Research factors and variables identified to influence the likelihood that large enterprises and SMEs would adopt CC services successfully. In particular, we found nine research variables to be statistically significant, and two adequate support and complexity non-significant. It was found that CC services adoption variances among the size of organisations to differ and be statistically significant towards adopting CC services. Hence, this result is important to owners and decision makers of large enterprises, and SMEs enterprises, service providers, service consultants, and governments to assist them in facilitating the adoption of CC services by large enterprises, and SMEs. Further, this may help to establish strategies for large enterprises, and SMEs to confirm a better adoption of CC services.
- Published
- 2023
180. IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks
- Author
-
Abdullah Lakhan, Tor-Morten Grønli, Paolo Bellavista, Sajida Memon, Maher Alharby, and Orawit Thinnukool
- Subjects
Edge AI ,ACNN ,Federated learning ,Cloud ,Transport applications ,Computer engineering. Computer hardware ,TK7885-7895 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract Intelligent transport systems (ITS) provide various cooperative edge cloud services for roadside vehicular applications. These applications offer additional diversity, including ticket validation across transport modes and vehicle and object detection to prevent road collisions. Offloading among cooperative edge and cloud networks plays a key role when these resources constrain devices (e.g., vehicles and mobile) to offload their workloads for execution. ITS used different machine learning and deep learning methods for decision automation. However, the self-autonomous decision-making processes of these techniques require significantly more time and higher accuracy for the aforementioned applications on the road-unit side. Thus, this paper presents the new offloading ITS for IoT vehicles in cooperative edge cloud networks. We present the augmented convolutional neural network (ACNN) that trains the workloads on different edge nodes. The ACNN allows users and machine learning methods to work together, making decisions for offloading and scheduling workload execution. This paper presents an augmented federated learning scheduling scheme (AFLSS). An algorithmic method called AFLSS comprises different sub-schemes that work together in the ITS paradigm for IoT applications in transportation. These sub-schemes include ACNN, offloading, scheduling, and security. Simulation results demonstrate that, in terms of accuracy and total time for the considered problem, the AFLSS outperforms all existing methods.
- Published
- 2024
- Full Text
- View/download PDF
181. A cloud-edge computing architecture for monitoring protective equipment
- Author
-
Carlos Reaño, Jose V. Riera, Verónica Romero, Pedro Morillo, and Sergio Casas-Yrurzum
- Subjects
Cloud ,Edge ,Protective equipment ,Computer engineering. Computer hardware ,TK7885-7895 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract The proper use of protective equipment is very important to avoid fatalities. One sector in which this has a great impact is that of construction sites, where a large number of workers die each year. In this sector as in others, employers are responsible for providing their employees with this equipment. In addition, employers must monitor and ensure its correct use. These tasks are usually performed using manual procedures. Existing tools to automate this process are unreliable and present scalability issues. In this paper, we research the benefits of using a cloud-edge computing architecture to automate the monitoring of protective equipment. The solution we propose successfully addresses all the problems that appear in hostile and unstructured work environments such as construction sites. Although these sites are used as a use case, the approach presented can also be deployed in other sectors with similar characteristics and restrictions.
- Published
- 2024
- Full Text
- View/download PDF
182. C-RIA: RESISTIVITY DATA INTERPRETATION AND ANALYSIS IN CLOUD MODE
- Author
-
Andri Yadi Paembonan, Asido Saputra Sigalingging, Putu Pradnya Andika, Selvi Misnia Irawati, Edlyn Yoadan Nathania, and Muhammad Rendi Jaya
- Subjects
resistivity ,cloud ,1d model ,ves. ,Geology ,QE1-996.5 - Abstract
Geophysical methods generally require one or several processes before interpretation is carried out. This process usually requires software that requires fast computer technology. The better the computer device, the faster data can be processed. We propose a new approach in processing and interpreting and integrating geophysical data, especially resistivity data, using cloud technology. This technology is generally able to increase the speed of processing and interpreting geophysical data, which really requires devices with fast capabilities. Not to mention, if there is a lot of data being processed, it will take a long time just to process the data. Therefore, by using cloud technology the work can be done efficiently because it uses computers with modern and fast technology. In this research we apply this technology to geophysical data that is most often used for shallow exploration, namely the resistivity geoelectric method. With this research, we hope that data processing and geophysical data inversion will be more efficient and effective and the data will be safer.
- Published
- 2024
- Full Text
- View/download PDF
183. Towards Automated and Optimal IIoT Design
- Author
-
Ali Ebraheem and Ilya Ivanov
- Subjects
iiot ,iot ,ngsa-ii ,topsis ,cloud ,fog computing ,multiobjective optimization ,gateway ,edge devices ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In today’s world, the Internet of Things has become an integral part of our lives. The increasing number of intelligent devices and their pervasiveness has made it challenging for developers and system architects to plan and implement systems of Internet of Things and Industrial Internet of Things effectively. The primary objective of this work is to automate the design process of Industrial Internet of Things systems while optimizing the quality of service parameters, battery life, and cost. To achieve this goal, a general four-layer fog-computing model based on mathematical sets, constraints, and objective functions is introduced. This model takes into consideration the various parameters that affect the performance of the system, such as network latency, bandwidth, and power consumption. The Non-dominated Sorting Genetic Algorithm II is employed to find Pareto optimal solutions, while the Technique for Order of Preference by Similarity to Ideal Solution is used to identify compromise solutions on the Pareto front. The optimal solutions generated by this approach represent servers, communication links, and gateways whose information is stored in a database. These resources are chosen based on their ability to enhance the overall performance of the system. The proposed strategy follows a three-stage approach to minimize the dimensionality and reduce dependencies while exploring the search space. Additionally, the convergence of optimization algorithms is improved by using a biased initial population that exploits existing knowledge about how the solution should look. The algorithms used to generate this initial biased population are described in detail. To illustrate the effectiveness of this automated design strategy, an example of its application is presented.
- Published
- 2024
- Full Text
- View/download PDF
184. E-voting system using cloud-based hybrid blockchain technology
- Author
-
Beulah Jayakumari, S Lilly Sheeba, Maya Eapen, Jani Anbarasi, Vinayakumar Ravi, A. Suganya, and Malathy Jawahar
- Subjects
E-voting ,Cloud ,Blockchain ,Smart contract ,Consensus mechanism ,Risk in industry. Risk management ,HD61 - Abstract
With the invention of Internet-enabled devices, cloud and blockchain-based technologies, an online voting system can smoothly carry out election processes. During pandemic situations, citizens tend to develop panic about mass gatherings, which may influence the decrease in the number of votes. This urges a reliable, flexible, transparent, secure, and cost-effective voting system. The proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system, and it is carried out in three phases: the registration phase, vote casting phase and vote counting phase. A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting phases. Using smart contracts, third-party interventions are eliminated, and the transactions are secured in the blockchain network. Finally, to provide accurate voting results, the practical Byzantine fault tolerance (PBFT) consensus mechanism is adopted to ensure that the vote has not been modified or corrupted. Hence, the overall performance of the proposed system is significantly better than that of the existing system. Further performance was analyzed based on authentication delay, vote alteration, response time, and latency.
- Published
- 2024
- Full Text
- View/download PDF
185. A new hybrid filter for NDVI time series reconstruction and data quality enhancement
- Author
-
Agus Suprijanto, Yumin Tan, Syed Mohammad Masum, and Rodolfo Domingo Moreno Santillan
- Subjects
NDVI time series ,data reconstruction ,data gaps ,cloud ,Landsat-8 NDVI ,hybrid filter ,Environmental technology. Sanitary engineering ,TD1-1066 ,Environmental sciences ,GE1-350 ,Risk in industry. Risk management ,HD61 - Abstract
NDVI (Normalized Difference Vegetation Index) is an essential tool for climate and environmental monitoring, but it is often contaminated by clouds and unfavorable atmospheric conditions. In this study, we designed a new, simple yet effective method for reconstructing data, which we call the Hybrid Filter. This study is the first to reconstruct missing NDVI time series data in cloud-prone areas by combining several data reconstruction techniques with a forecasting technique based on Exponential Moving Average (EMA). The study was conducted in Cilegon City and Batu City using NDVI time series data from the Landsat 8 satellite for the period 2014-2022. Experimental results show that the hybrid filter significantly outperforms the Spatio-Temporal Savitzky-Golay (STSG) filter, Gap Filling Savitzky-Golay (GFSG) filter, Savitzky-Golay (SG) filter, and Whittaker filter. The hybrid filter is capable of recovering missing data with high accuracy, stability, noise reduction, and maintaining the temporal integrity of NDVI data even under conditions of large data gaps and high missing data rates, making it a reliable solution for NDVI analysis in cloud-prone areas. These findings affirm the superiority of the hybrid filter in producing accurate and reliable NDVI data for vegetation and environmental monitoring.
- Published
- 2024
- Full Text
- View/download PDF
186. IoT-cloud based traffic honk monitoring system: empowering participatory sensing.
- Author
-
Middya, Asif Iqbal and Roy, Sarbani
- Subjects
CROWDSENSING ,TRAFFIC monitoring ,CONVOLUTIONAL neural networks ,TRAFFIC noise ,NOISE pollution - Abstract
The honking events' density reflects the level of traffic noise pollution, road congestion, etc in the urban areas. In this paper, we propose a participatory sensing based traffic honk monitoring system called HonkSense that uses smartphone equipped sensors (e.g. microphone, GPS, etc.). Citizens can take part in monitoring traffic noise pollution due to honking by recording ambient noise on the road. Application running on users' smartphones is used to extract features in real time from recorded audio and then send to the cloud for honk detection and decision making tasks. Here, Mel-Frequency Cepstral Coefficients (MFCCs) are utilized as feature for presenting audio signals in honk detection. This paper uses a deep Convolutional Neural Network (CNN) model that is deployed to cloud for detecting traffic honking events. The end-to-end system provides a privacy-preserving (anonymous data collection), low-power and low-cost solution for participatory sensing based traffic honk monitoring. We evaluate our proposed system on real world participatory sensing based road sound dataset collected by participants. It achieves a classification accuracy of 96.3%. The deep CNN is also evaluated on different benchmark datasets (namely ESC-50 and UrbanSound8K). The results are also compared with the baseline support vector machine (SVM) and k-nearest neighbors (KNN) classification models. Besides, state-of-the-art visualization techniques are used to explore spatial and temporal variability of honking events in urban areas using two case studies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
187. Smart IoT Irrigation System Based on Fuzzy Logic, LoRa, and Cloud Integration.
- Author
-
Artetxe, Eneko, Barambones, Oscar, Martín Toral, Imanol, Uralde, Jokin, Calvo, Isidro, and del Rio, Asier
- Subjects
FUZZY logic ,FUZZY systems ,IRRIGATION ,AGRICULTURAL processing ,ARTIFICIAL intelligence ,WEATHER forecasting ,METEOROLOGICAL services - Abstract
Natural resources must be administered efficiently to reduce the human footprint and ensure the sustainability of the planet. Water is one of the most essential resources in agriculture. Modern information technologies are being introduced in agriculture to improve the performance of agricultural processes while optimizing water usage. In this scenario, artificial intelligence techniques may become a very powerful tool to improve efficiency. The introduction of the edge/fog/cloud paradigms, already adopted in other domains, may help to organize the services involved in complex agricultural applications. This article proposes the combination of several modern technologies to improve the management of hydrological resources and reduce water waste. The selected technologies are (1) fuzzy logic, used for control tasks since it adapts very well to the nonlinear nature of the agricultural processes, and (2) long range (LoRa) technology, suitable for establishing large distance links among the field devices (sensors and actuators) and the process controllers, executed in a centralized way. The presented approach has been validated in the laboratory by means of a control scheme aimed at achieving an adequate moisture level in the soil. The control algorithm, based on fuzzy logic, can use the weather forecast, obtained as a cloud service, to reduce water consumption. For testing purposes, the dynamics of the water balance model of the soil were implemented as hardware in the loop, executed in a dSPACE DS1104. Experiments proved the viability of the presented approach since the continuous space state output controller achieved a water loss reduction of 23.1% over a 4-day experiment length compared to a traditional on/off controller. The introduction of cloud services for weather forecasting improved the water reduction by achieving an additional reduction of 4.07% in water usage. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
188. Performance of Secure Framework AES Algorithm using Cloud Computing.
- Author
-
Rani, R. and Bathla, R. K.
- Subjects
- *
ADVANCED Encryption Standard , *CLOUD computing security measures , *ALGORITHMS , *INFORMATION networks , *ENERGY consumption , *CLOUD computing - Abstract
The conventional advanced encryption standard (AES) method requires improvement to accommodate modern security hazards in cloud computing. Outsourcing private and secret information to distant information networks is difficult due to new problems connected with the confidentiality and safety of information. The structure presented by this study has essential components involving improved security and owner-data privacy. The dual-cycle key attribute alters the 128-bit AES method, accelerating encryption at 1000 bits per second. However, a singular circular bar with 800 blocks per second has been used historically. The suggested technique uses less energy and improves the distribution of load, trust, and control of resources on the entire network. The proposed framework calls for the use of AES with 128, 64, 32, and 16 bytes of simple text. Visualizing simulation outcomes shows the technique's capability for obtaining specific quality features. According to the assessments, the proposed framework reduces energy consumption by 14.43 %, connection utilization by 11.53 %, and delay by 15.67 %. As a result, the suggested framework improves protection, decreases resource usage, and shortens latency when delivering computing services over the cloud. The experiment was done with Anaconda Python and Eclipse. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
189. Detecting clear‐sky periods from photovoltaic power measurements.
- Author
-
Wandji Nyamsi, William and Lindfors, Anders
- Subjects
- *
SPECTRAL irradiance , *SURFACE of the earth , *INSPECTION & review , *WIND speed - Abstract
A method for detecting clear‐sky periods from photovoltaic (PV) power measurements is presented and validated. It uses five tests dealing with parameters characterizing the connections between the measured PV power and the corresponding clear‐sky power. To estimate clear‐sky PV power, a PV model has been designed using as inputs downwelling shortwave irradiance and its direct and diffuse components received at ground level under clear‐sky conditions as well as reflectivity of the Earth's surface and extraterrestrial irradiance, altogether provided by the McClear service. In addition to McClear products, the PV model requires wind speed and temperature as inputs taken from ECMWF twentieth century reanalysis ERA5 products. The performance of the proposed method has been assessed and validated by visual inspection and compared to two well‐known algorithms identifying clear‐sky periods with broadband global and diffuse irradiance measurements on a horizontal surface. The assessment was carried out at two stations located in Finland offering collocated 1‐min PV power and broadband irradiance measurements. Overall, total agreement ranges between 84% and 97% (depending on the season) in discriminating clear‐sky and cloudy periods with respect to the two well‐known algorithms serving as reference. The disagreement fluctuating between 6% and 15%, depending on the season, primarily occurs while the PV module temperature is adequately high and/or when the sun is close to the horizon with many more interactions between the radiation, the atmosphere and the ground surface. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
190. DDoS attack detection in cloud using ensemble model tuned with optimal hyperparameter.
- Author
-
Reddy, K. Balachandra and Meera, S.
- Subjects
- *
DENIAL of service attacks , *FEATURE extraction , *INTRUSION detection systems (Computer security) , *OPTIMIZATION algorithms - Abstract
Summary: DDoS attacks are a type of cloud incursion that lessen service degradation. DDoS attacks target the cloud network with invalid requests, rejecting legitimate requests. Such attacks disrupt the entire cloud architecture, thus it needs efficient detection methods to spot their presence. This study proposes a novel ensemble classification model for DDoS incursion detection. Pre‐processing, feature extraction, and attack detection are the three main components of the suggested intrusion detection system. Improved data imbalance processing is processed during pre‐processing. Features including HOS‐based features enhanced entropy‐based features, correlation features, and raw features are extracted from the pre‐processed data. The generated features are trained using an ensemble model, which integrates classifiers like SVM, RF, NN, LSTM, and DRN, during the attack detection phase. A new hybrid approach known as TUDMA optimally trains the model by setting the ideal weight because DRN provides the final detected outcome. By reducing errors, this ideal training will guarantee an improvement in detection results. The suggested hybrid optimization combines the two techniques, TDO and DMO. The accuracy of the methods FS‐WOA‐DNN, RBF‐PSO, SMA, BRO, SLO, and NMRA was 86.73%, 85.69%, 84.58%, 87.43%, 88.91%, and 89.78%, respectively, while the accuracy of the TUDMA was 95.34% in the 80th learning percentage. Finally, for many measurements, the suggested efficiency is superior to the traditional methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
191. Revolutionary of secure lightweight energy efficient routing protocol for internet of medical things: a review.
- Author
-
B, Padma Vijetha Dev. and Venkata Prasad, K.
- Abstract
Advancements in the Internet of things (IoT) make a way for medical devices to coordinate in an environment that is the Internet of Medical Things (IoMT). In IoMT, some dedicated health monitoring devices are coordinated in an environment to accomplish a specified task. In this sector, patient information is periodically collected for early diagnosis of diseases. Various wearable sensors have been developed for smart sensing in the IoMT meanwhile, the sensed data are forwarded to the smart data collecting devices. Besides the advantages of remote monitoring and lower healthcare cost in IoT-based health monitoring systems, intrusion can occur during data transmission. Moreover, the large energy consumption of devices will result in higher system costs. An energy-efficient data routing protocol is developed in this area to cater to these issues. A swarm intelligence based approach is one of the most prominent methods for energy efficient routing of the data in IoT. The major goal of this paper is to provide deep insight into the lightweight, secure energy efficient routing protocol in IoMT. Furthermore, the limitations of existing methodologies are outlined. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
192. Improved Landsat Operational Land Imager (OLI) Cloud and Shadow Detection with the Learning Attention Network Algorithm (LANA).
- Author
-
Zhang, Hankui K., Luo, Dong, and Roy, David P.
- Subjects
- *
LANDSAT satellites , *CONVOLUTIONAL neural networks , *IMAGE recognition (Computer vision) , *ALGORITHMS , *CLASSIFICATION algorithms , *HOUGH transforms - Abstract
Landsat cloud and cloud shadow detection has a long heritage based on the application of empirical spectral tests to single image pixels, including the Landsat product Fmask algorithm, which uses spectral tests applied to optical and thermal bands to detect clouds and uses the sun-sensor-cloud geometry to detect shadows. Since the Fmask was developed, convolutional neural network (CNN) algorithms, and in particular U-Net algorithms (a type of CNN with a U-shaped network structure), have been developed and are applied to pixels in square patches to take advantage of both spatial and spectral information. The purpose of this study was to develop and assess a new U-Net algorithm that classifies Landsat 8/9 Operational Land Imager (OLI) pixels with higher accuracy than the Fmask algorithm. The algorithm, termed the Learning Attention Network Algorithm (LANA), is a form of U-Net but with an additional attention mechanism (a type of network structure) that, unlike conventional U-Net, uses more spatial pixel information across each image patch. The LANA was trained using 16,861 512 × 512 30 m pixel annotated Landsat 8 OLI patches extracted from 27 images and 69 image subsets that are publicly available and have been used by others for cloud mask algorithm development and assessment. The annotated data were manually refined to improve the annotation and were supplemented with another four annotated images selected to include clear, completely cloudy, and developed land images. The LANA classifies image pixels as either clear, thin cloud, cloud, or cloud shadow. To evaluate the classification accuracy, five annotated Landsat 8 OLI images (composed of >205 million 30 m pixels) were classified, and the results compared with the Fmask and a publicly available U-Net model (U-Net Wieland). The LANA had a 78% overall classification accuracy considering cloud, thin cloud, cloud shadow, and clear classes. As the LANA, Fmask, and U-Net Wieland algorithms have different class legends, their classification results were harmonized to the same three common classes: cloud, cloud shadow, and clear. Considering these three classes, the LANA had the highest (89%) overall accuracy, followed by Fmask (86%), and then U-Net Wieland (85%). The LANA had the highest F1-scores for cloud (0.92), cloud shadow (0.57), and clear (0.89), and the other two algorithms had lower F1-scores, particularly for cloud (Fmask 0.90, U-Net Wieland 0.88) and cloud shadow (Fmask 0.45, U-Net Wieland 0.52). In addition, a time-series evaluation was undertaken to examine the prevalence of undetected clouds and cloud shadows (i.e., omission errors). The band-specific temporal smoothness index (TSIλ) was applied to a year of Landsat 8 OLI surface reflectance observations after discarding pixel observations labelled as cloud or cloud shadow. This was undertaken independently at each gridded pixel location in four 5000 × 5000 30 m pixel Landsat analysis-ready data (ARD) tiles. The TSIλ results broadly reflected the classification accuracy results and indicated that the LANA had the smallest cloud and cloud shadow omission errors, whereas the Fmask had the greatest cloud omission error and the second greatest cloud shadow omission error. Detailed visual examination, true color image examples and classification results are included and confirm these findings. The TSIλ results also highlight the need for algorithm developers to undertake product quality assessment in addition to accuracy assessment. The LANA model, training and evaluation data, and application codes are publicly available for other researchers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
193. A Method for Object-oriented Detection of Deep Convection from Geostationary Satellite Imagery Using Machine Learning.
- Author
-
Shishov, A. E.
- Subjects
- *
GEOSTATIONARY satellites , *REMOTE-sensing images , *ARTIFICIAL neural networks , *MACHINE learning , *CONVECTIVE clouds , *SEVERE storms - Abstract
Due to high spatial and temporal resolution, geostationary meteorological satellite imagery is a valuable source of information on the development of deep convective clouds and related severe weather events. Some methods for automatic deep convection detection from satellite data provide a satisfactory probability of detection for independent datasets, but are characterized by a high false alarm rate. The paper gives a description of an algorithm for automatic detection of deep convective clouds with satellite imagery using gradient boosting, logistic regression, and artificial neural network models. The results of validation of the proposed method using dependent and independent data of ground-based observations for the period 2013–2020 are presented. A low false alarm rate and high probability of detection suggest that the algorithm can be used in the operational mode. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
194. A CloudSat–CALIPSO view of cloud and precipitation in the occluded quadrants of extratropical cyclones.
- Author
-
Naud, Catherine M., Ghosh, Poushali, Martin, Jonathan E., Elsaesser, Gregory S., and Posselt, Derek J.
- Subjects
- *
CLOUDINESS , *PRECIPITABLE water , *CYCLONES , *LIDAR - Abstract
Using 10 years of satellite‐borne radar and lidar observations coupled with a novel method for automated occlusion identification, composite transects of cloud and precipitation across occluded thermal ridges of extratropical cyclones are, for the first time, constructed. These composites confirm that occluded sectors are characterized by the most extensive cloud cover and heaviest precipitation in any of the frontal regions of the cyclone. Hydrometeor frequency in occluded sectors is sensitive to the cyclone's ascent strength but not to the mean precipitable water in the cyclone's environment. This result is in contrast to the strong relationships between hydrometeor frequency and both precipitable water and ascent strength as previously reported in warm frontal regions. In both hemispheres, cloud and precipitation increase with the maximum value of the equivalent potential temperature at 700 hPa within the occluded thermal ridge, until a threshold is reached. For very large values of maximum equivalent potential temperature, hydrometeors become less frequent while precipitation rates increase. It is suggested that this conjunction is a by‐product of an increase in the frequency of convection in those instances. While in the Northern Hemisphere occluded sectors exhibit deeper and wider cloud structures than their Southern Hemisphere counterparts, their hydrometeor occurrence frequencies are less. The differences in maximum equivalent potential temperature of the thermal ridges in both hemispheres does not appear to explain the more frequent hydrometeors in the Southern Hemisphere. These relationships offer new perspectives on the interplay between cloud processes and cyclone evolution, as well as new observational constraints for process evaluation of Earth system models. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
195. Ordered balancing: load balancing for redundant task scheduling in robotic network cloud systems.
- Author
-
Alirezazadeh, Saeid and Alexandre, Luís A.
- Subjects
- *
LOAD balancing (Computer networks) , *COMPUTER scheduling , *ROBOTICS , *PRODUCTION scheduling , *SCHEDULING , *DATA transmission systems , *REACTION time - Abstract
To perform a set of tasks in a robotic network cloud system as fast as possible, it is recommended to use a scheduling approach that minimizes the makespan. The makespan is defined as the time between the start of the first scheduled task and the completion of all scheduled tasks. Load balancing is a technique to distribute incoming tasks across processing units in a way that the resource utilization is optimized and the makespan is minimized. Robotic network cloud systems can be conceptualized as graphs, with nodes representing hardware with independent computing power and edges representing data transmissions between the nodes. The initial scheduler assigns a set of newly arrived tasks to the processing units capable of performing them. To reduce the response time we can replicate some of the tasks and assign them to different processing units. This results in some tasks becoming redundant. Assigning redundant tasks refers to determining which processing unit should receive the replicated tasks. Load balancing for redundant allocation can be viewed as assigning tasks to multiple processing units with different resource sizes so that the load is evenly distributed among the units. We propose a technique for load balancing, the ordered balancing algorithm, to minimize the makespan in the redundant allocation and scheduling problem. We prove theoretically the correctness of the proposed algorithm and illustrate with simulations, using R version 4.0.3, the obtained results that outperform other recent load balancing proposals. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
196. Server Cloud Scheduling.
- Author
-
Maack, Marten, Meyer auf der Heide, Friedhelm, and Pukrop, Simon
- Subjects
- *
DIRECTED graphs , *DIRECTED acyclic graphs , *SCHEDULING , *PRODUCTION scheduling - Abstract
Consider a set of jobs connected to a directed acyclic task graph with a fixed source and sink. The edges of this graph model precedence constraints and the jobs have to be scheduled with respect to those. We introduce the server cloud scheduling problem, in which the jobs have to be processed either on a single local machine or on one of infinitely many cloud machines. For each job, processing times both on the server and in the cloud are given. Furthermore, for each edge in the task graph, a communication delay is included in the input and has to be taken into account if one of the two jobs is scheduled on the server and the other in the cloud. The server processes jobs sequentially, whereas the cloud can serve as many as needed in parallel, but induces costs. We consider both makespan and cost minimization. The main results are an FPTAS for the makespan objective for graphs with a constant source and sink dividing cut and strong hardness for the case with unit processing times and delays. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
197. Quantitative Relationship Between Cloud Amount and Precipitation in Summer over China and its Causes.
- Author
-
PENG Yanyu, LIU Yu, and GAO Qianqian
- Abstract
One of the requirements for producing rainfall is cloud formation, and clouds and precipitation have a very intricate and intimate relationship. First, we used databases from conventional stations and ISCCP (International Satellite Cloud Climatology Project) to evaluate the spatial and temporal relationships between the variation of several characteristic features of clouds and the variance in summertime precipitation over China. According to the station dataset's findings, there is a significant positive correlation between the anomalous percentage of total cloud cover, low cloud cover, and precipitation across the entire nation. For stations that pass the 0.05 level significance test, the linear relationships between the anomalous percentage of clouds and precipitation are particularly obvious. For every 1.00% increase in total cloud cover, precipitation increases by 2.23%, and for every 1.00% increase in low cloud cover, precipitation increases by 0.46%. The ISCCP dataset results demonstrate very strong positive connections between abnormal percentages of cloud amount, optical thickness, cloud-water path, cirrus and deep convective cloud amount in high clouds, and that of precipitation. Second, China was divided into nine climate zones using the k-means cluster analysis method and with reference to the geoclimatic distribution of China. Then wavelet coherence analysis and cross wavelet analysis were used to further investigate the relationship in the time-frequency domain between the anomalous percentage of cloud amounts and precipitation in each climate zone. The findings demonstrate substantial coherence and resonance cycles at the scales of 2 to 4 years and 5 to 8 years, and a positive correlation phase for the anomalous percentage of total and low cloud quantities and daytime precipitation in summer throughout the nine climate zones. In both time-space distributions and time-frequency domains, there are extremely significant positive correlations between the anomalous percentage of cloud amounts (especially the low cloud amount) and precipitation in summer over China. The strong coherence and resonance period between anomalous percentage of cloud amounts and precipitation are the reasons for the positive correlation between them. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
198. A cloud-edge computing architecture for monitoring protective equipment.
- Author
-
Reaño, Carlos, Riera, Jose V., Romero, Verónica, Morillo, Pedro, and Casas-Yrurzum, Sergio
- Subjects
SAFETY appliances ,HOSTILE work environment ,BUILDING sites - Abstract
The proper use of protective equipment is very important to avoid fatalities. One sector in which this has a great impact is that of construction sites, where a large number of workers die each year. In this sector as in others, employers are responsible for providing their employees with this equipment. In addition, employers must monitor and ensure its correct use. These tasks are usually performed using manual procedures. Existing tools to automate this process are unreliable and present scalability issues. In this paper, we research the benefits of using a cloud-edge computing architecture to automate the monitoring of protective equipment. The solution we propose successfully addresses all the problems that appear in hostile and unstructured work environments such as construction sites. Although these sites are used as a use case, the approach presented can also be deployed in other sectors with similar characteristics and restrictions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
199. A Lightweight Image Cryptosystem for Cloud-Assisted Internet of Things.
- Author
-
Oladipupo, Esau Taiwo, Abikoye, Oluwakemi Christiana, and Awotunde, Joseph Bamidele
- Subjects
CRYPTOSYSTEMS ,IMAGE encryption ,INTERNET of things ,CRYPTOGRAPHY ,CLOUD computing ,STATISTICS ,DATA integrity ,ALGORITHMS - Abstract
Cloud computing and the increasing popularity of 5G have greatly increased the application of images on Internet of Things (IoT) devices. The storage of images on an untrusted cloud has high security and privacy risks. Several lightweight cryptosystems have been proposed in the literature as appropriate for resource-constrained IoT devices. These existing lightweight cryptosystems are, however, not only at the risk of compromising the integrity and security of the data but also, due to the use of substitution boxes (S-boxes), require more memory space for their implementation. In this paper, a secure lightweight cryptography algorithm, that eliminates the use of an S-box, has been proposed. An algorithm termed Enc, that accepts a block of size n divides the block into L n R bits of equal length and outputs the encrypted block as follows: E = L ⨂ R ⨁ R , where ⨂ and ⨁ are exclusive-or and concatenation operators, respectively, was created. A hash result, h a s R = S H A 256 P ⨁ K , was obtained, where SHA256, P, and K are the Secure Hash Algorithm (SHA−256), the encryption key, and plain image, respectively. A seed, S, generated from e n c h a s h = E n c h a s h e n c , K , where hashenc is the first n bits of hasR, was used to generate a random image, Rim. An intermediate image, i n t i m a g e = R i m ⨂ P , and cipher image, C = E n c i n t i m a g e , K , were obtained. The proposed scheme was evaluated for encryption quality, decryption quality, system sensitivity, and statistical analyses using various security metrics. The results of the evaluation showed that the proposed scheme has excellent encryption and decryption qualities that are very sensitive to changes in both key and plain images, and resistance to various statistical attacks alongside other security attacks. Based on the result of the security evaluation of the proposed cryptosystem termed Hash XOR Permutation (HXP), the study concluded that the security of the cryptography algorithm can still be maintained without the use of a substitution box. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
200. Cloud Security Using Fine-Grained Efficient Information Flow Tracking.
- Author
-
Alqahtani, Fahad, Almutairi, Mohammed, and Sheldon, Frederick T.
- Subjects
DATA security failures ,CLOUD computing security measures ,ACCESS to information - Abstract
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead on Cloud Service Providers (CSPs) and management activities, prompting the exploration of alternatives such as IFT. By augmenting consumer data subsets with security tags and deploying a network of monitors, IFT facilitates the detection and prevention of data leaks among cloud tenants. The research here has focused on preventing misuse, such as the exfiltration and/or extrusion of sensitive data in the cloud as well as the role of anonymization. The CloudMonitor framework was envisioned and developed to study and design mechanisms for transparent and efficient IFT (eIFT). The framework enables the experimentation, analysis, and validation of innovative methods for providing greater control to cloud service consumers (CSCs) over their data. Moreover, eIFT enables enhanced visibility to assess data conveyances by third-party services toward avoiding security risks (e.g., data exfiltration). Our implementation and validation of the framework uses both a centralized and dynamic IFT approach to achieve these goals. We measured the balance between dynamism and granularity of the data being tracked versus efficiency. To establish a security and performance baseline for better defense in depth, this work focuses primarily on unique Dynamic IFT tracking capabilities using e.g., Infrastructure as a Service (IaaS). Consumers and service providers can negotiate specific security enforcement standards using our framework. Thus, this study orchestrates and assesses, using a series of real-world experiments, how distinct monitoring capabilities combine to provide a comparatively higher level of security. Input/output performance was evaluated for execution time and resource utilization using several experiments. The results show that the performance is unaffected by the magnitude of the input/output data that is tracked. In other words, as the volume of data increases, we notice that the execution time grows linearly. However, this increase occurs at a rate that is notably slower than what would be anticipated in a strictly proportional relationship. The system achieves an average CPU and memory consumption overhead profile of 8% and 37% while completing less than one second for all of the validation test runs. The results establish a performance efficiency baseline for a better measure and understanding of the cost of preserving confidentiality, integrity, and availability (CIA) for cloud Consumers and Providers (C&P). Consumers can scrutinize the benefits (i.e., security) and tradeoffs (memory usage, bandwidth, CPU usage, and throughput) and the cost of ensuring CIA can be established, monitored, and controlled. This work provides the primary use-cases, formula for enforcing the rules of data isolation, data tracking policy framework, and the basis for managing confidential data flow and data leak prevention using the CloudMonitor framework. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.