{"title":"An adaptive method for node revocation in peer-to-peer networks","authors":"G. Reshmi, S. D. Madhu Kumar","doi":"10.1109/ICCCTAM.2012.6488079","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488079","url":null,"abstract":"Different solutions have been proposed by many researchers for revocation of misbehaving nodes in peer to peer networks. In particular, the focus is on developing solutions with low computation and communication costs. Two main existing solutions are quorum-based voting and self-revocation. In an adaptive method for node revocation, each node in a network individually selects the most suitable way to respond to a detected mis-behaviour. In this work, we present a decision making procedure which chooses the best revocation strategy for each node in the network, depending on the network parameters. We are tuning an existing method for adaptive node revocation in vehicular networks, for peer to peer networks. We have also developed a mechanism to identify the trusted nodes eligible to participate in the decision making procedure as well as to collect and share certain information as required by this algorithm. The importance of establishing trustworthiness of the nodes has been identified and Eigen trust algorithm is employed for implementing the same. Finally, the efficiency of the proposed method under various network conditions is studied in comparison with the existing methods by simulation. The experimental results show that our adaptive method is faster than the original voting method. The self-revocation method is similar to adaptive method in speed. The adaptive method has showed better performance than voting and self-revocation strategies in terms of correctness of decisions. The relevance of the proposed method in a cloud computing scenario is also described.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126655035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STAR: A proposed architecture for cloud computing applications","authors":"S. A. Z. Hassan","doi":"10.1109/ICCCTAM.2012.6488095","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488095","url":null,"abstract":"With rapid development of cloud computing, the need for an architecture to follow in developing cloud computing applications is necessary. Existing architectures lack the way cloud applications are developed. They focus on clouds' structure and how to use clouds as a tool in developing cloud computing applications rather than focusing on how applications themselves are developed using clouds. This paper presents a survey on key cloud computing concepts, definitions, characteristics, development phases, and architectures. Also, it proposes and describes a novel architecture, which aid developers to develop cloud computing applications in a systematic way. It discusses how cloud computing transforms the way applications are developed/delivered and describes the architectural considerations that developers must take when adopting and using cloud computing technology.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133632522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and privacy in cloud computing","authors":"Sara Hamouda","doi":"10.1109/ICCCTAM.2012.6488106","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488106","url":null,"abstract":"After decades of engineering development, Internet connectivity has become a commodity product in many countries. The rapid adoption of Web 2.0 technologies such as blogging, online media sharing, social networking, and web-based collaboration has moved enormous quantities of data onto Internet servers. Along with this migration to web services has come a push for companies to adopt utility computing. Much like traditional infrastructure utilities, such as gas and electricity, utility or cloud computing seeks to abstract the supply of computing services from concerns of everyday users. Today, security and privacy concerns may represent the biggest hazards to moving services to external clouds. With cloud computing, data is stored and delivered over the Internet. The owner of the data does not control, and typically does not even know, the location of the data. There is a real chance that the owner's data could rest on the same resources as a competitor's application and data. In this paper I focus on how to secure cloud computing in terms of security and privacy.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing and customizing university business intelligence cloud","authors":"B. Akhmetov, N. Izbassova, Bahitzhan Akhmetov","doi":"10.1109/ICCCTAM.2012.6488104","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488104","url":null,"abstract":"Increasing competition in the market of educational services among the universities make the quality of education the main factor of competitiveness. Limited funding and a number of other environmental factors make the management of most universities to reconsider the usual methods of focusing on the strategic development of higher education and science, which takes into account long-term prospects. The proposed model allows the performance of objects to a single digit which allows the university top management make decisions on improving the quality of academic, educational, social, scientific and research of the university. Cloud can reduce business intelligence system costs by limiting software implementation and support expenses.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117116062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud implementation security challenges","authors":"M. Bamiah, S. Brohi, S. Chuprat, M. N. Brohi","doi":"10.1109/ICCCTAM.2012.6488093","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488093","url":null,"abstract":"Cloud computing offers significant features such as resource pooling, scalability, on-demand self service, availability, and reliability to organizations to improve their quality of services. For example by using cloud computing services in healthcare it is possible to reach large population of people in isolated geographical areas which will assist in saving their lives in critical situations. It enables the use of latest technologies through its various service delivery and deployment models via the internet on pay-per-use billing pattern. However, cloud computing has dark side when it comes to security and privacy considerations. Critical industries such as healthcare and banking are reluctant to trust cloud computing due to the fear of losing their sensitive data, as it resides on the cloud with no knowledge of data location and lack of transparency of Cloud Service Providers (CSPs) mechanisms used to secure their data and applications which have created a barrier against adopting this agile computing paradigm. This paper addresses cloud computing security concerns that must be considered in order to adopt cloud services in information critical industries.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bamiah, S. Brohi, S. Chuprat, Jamalul-lail Ab Manan
{"title":"A study on significance of adopting cloud computing paradigm in healthcare sector","authors":"M. Bamiah, S. Brohi, S. Chuprat, Jamalul-lail Ab Manan","doi":"10.1109/ICCCTAM.2012.6488073","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488073","url":null,"abstract":"Healthcare sector is information critical industry that deals with human lives. Transforming from traditional paper-based to Electronic Health Records (EHRs) was not efficient enough since EHRs require resources, integration, maintenance and high cost implementation. Cloud computing paradigm offers flexible, cost effective, collaborative, multi-tenant infrastructure which assists in transforming electronic healthcare to smart healthcare that consists on the use of latest technologies such as smart mobiles, smart cards, robots, sensors and Tele-health systems via internet on pay-per-use basis for best medical practices. Cloud computing reduces the cost of EHRs in terms of ownership and IT maintenance, also it offers sharing, integration and management of EHRs as well as tracking patients and diseases more efficiently and effectively. This review paper represents the significance and opportunities for implementing cloud computing in healthcare sector.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127728545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}