Ograniczanie wyników
Czasopisma help
Autorzy help
Lata help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 267

Liczba wyników na stronie
first rewind previous Strona / 14 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  cloud computing
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 14 next fast forward last
EN
Based on cloud providers’ reports on service outages, it has become clear that how a web service is deployed is of great importance. Clearly, using one service supplier is insufficient because it introduces single points of failure. In this paper, a novel high-availability multi-cloud model intended for a web service is proposed, which is free from such shortcomings yet preserves convenient assets of computing clouds. The methodology used to improve web service availability should involve several cloud suppliers and devise management techniques that control access to them. This is achieved by means of the server availability tracking algorithm, which controls client apps’ access to the service. Moreover, typical benefits and problems involved in choosing IT infrastructure for a web service are elaborated. State-of-the-art cloud computing models, such as IaaS, PaaS, SaaS, BPaaS, and INaaS, are outlined. Operating systems statistics used for web services are included. Open-source monitoring software solutions are gathered, which help administrators to monitor and govern web servers.
EN
Information technology already contains one of the main elements of life, as described by people and enterprises. With the emergence of the Internet and its subsequent availability, there is a digital revolution, the source of which is a reality without mobile devices, web browsers, and instant messengers. In this group, cloud computing plays an increasingly important role, enabling the sharing of more data available via the Internet. At the same time, the increasingly growing awareness of sustainable development and its current role means that this issue has been explored in the context of cloud computing for several years. Therefore, this paper aims to perform a systematic literature review on sustainability issues in cloud computing. The study included scientific publications from two databases - Scopus and Web of Science, and the review itself was based on the PRISMA procedure. After conducting an initial quantitative analysis, a detailed review of the publications was carried out to determine the role and impact of cloud computing sustainability on the areas in which it is used, which constitutes the article's novelty. The obtained results show that, firstly, cloud computing sustainability is an issue that is currently gaining popularity, which is reflected in the growing number of scientific publications. Moreover, it is characterized by various impacts on social and environmental issues, depending on the area in which cloud computing is used. Furthermore, the results show that cloud computing is perceived as one of the main elements of digital transformation.
PL
Technologie informatyczne już od wielu stanowią jeden z głównych elementów życia, zarówno w odniesieniu do ludzi jak i przedsiębiorstw. Wraz z powstaniem Internetu a następnie jego upowszechnieniem, dokonała się rewolucja cyfrowa w efekcie której trudno wyobrazić sobie rzeczywistość bez komputerów, telefonów, przeglądarek internetowych czy komunikatorów. W tej grupie, coraz bardziej znacząca role odgrywa chmura obliczeniowa, umożliwiająca przechowywanie i przetwarzanie dużej ilości danych, które są dostępne za pośrednictwem Internetu. Jednocześnie coraz bardziej rosnąca świadomość odnośnie zrównoważonego rozwoju i jego roli jaką obecnie odgrywa, powoduje, że od kilku lat, kwestia ta eksplorowana jest w kontekście chmury obliczeniowej. Dlatego też celem niniejszego artykułu jest dokonanie systematycznego przeglądu literatur dotyczącego kwestii zrównoważenia w chmurze obliczeniowej. Badanie objęło publikacje naukowe pochodzące z dwoch baz – Scopus and Web of Science, a sam przegląd dokonany został w oparciu o procedurę PRISMA. Po przeprowadzeniu wstępnej analizy ilościowej, dokonano szczegółowego przeglądu publikacji w celu określenia roli i wpływu zrównoważenia chmury obliczeniowej na poszczególne obszary, w których jest ona stosowana co stanowi o nowości artykułu. Uzyskane wyniki pokazują, że po pierwsze zrównoważenie chmury obliczeniowej to zagadnienie, które obecnie zyskuje na popularności, co przejawia się rosnącą liczbą publikacji naukowych. Ponadto charakteryzuje się różnorodnym wpływem na kwestie społeczne i środowiskowe, w zależności od obszaru w jakim chmura obliczeniowa jest stosowana. Ponadto z przeglądu wynika, że chmura obliczeniowa postrzegany jest jako jeden z głównych elementów transformacji cyfrowej.
EN
The article is part of a course on Quantum Information Technologies QIT conducted at the Faculty of Electronics and Information Technology of the Warsaw University of Technology. The subject includes a publishing workshop exercised by engineering students. How do ICT engineers see QIT from their point of view? How can they implement quantum technologies in their future work? M.Sc. students usually have strictly declared topics for their master’s theses. The implementation of some works is at an advanced stage. The potential areas of application of QIT are defined and narrow if they are to intellectually expand the area of the completed theses. This is the idea of incorporating QIT components or interfaces into classic ICT solutions at the software and hardware level. It is possible to propose a solution in the form of a functional hybrid system. QIT systems should be functionally incorporated into the existing ICT environment, generating measurable added value. Such a task is quite demanding, but practice shows that it interests students. Solutions don’t have to be mature or even feasible. They can be dreams of young engineers. The exercise is a publication workshop related to the fast development of QIT. The article is a continuation of publication exercises conducted with previous groups of students participating in QIT lectures.
4
Content available A study of big data in cloud computing
EN
Over the last two decades, the size and amount of data has increased enormously, whichhas changed traditional methods of data management and introduced two new technolog-ical terms: big data and cloud computing. Addressing big data, characterized by massivevolume, high velocity and variety, is quite challenging as it requires large computationalinfrastructure to store, process and analyze it. A reliable technique to carry out sophisti-cated and enormous data processing has emerged in the form of cloud computing becauseit eliminates the need to manage advanced hardware and software, and offers various ser-vices to users. Presently, big data and cloud computing are gaining significant interestamong academia as well as in industrial research. In this review, we introduce variouscharacteristics, applications and challenges of big data and cloud computing. We providea brief overview of different platforms that are available to handle big data, including theircritical analysis based on different parameters. We also discuss the correlation betweenbig data and cloud computing. We focus on the life cycle of big data and its vital analysisapplications in various fields and domains At the end, we present the open research issuesthat still need to be addressed and give some pointers to future scholars in the fields ofbig data and cloud computing.
EN
Cloud computing has become ubiquitous in modern society, facilitating various applications ranging from essential services to online entertainment. To ensure that quality of service (QoS) standards are met, cloud frameworks must be capable of adapting to the changing demands of users, reflecting the societal trend of collaboration and dependence on automated processing systems. This research introduces an innovative approach for link prediction and user cloud recommendation, leveraging nano-grid applications and deep learning techniques within a cloud computing framework. Heuristic graph convolutional networks predict data transmission links in cloud networks. The trust-based hybrid decision matrix algorithm is then employed to schedule links based on user recommendations. The proposed model and several baselines are evaluated using real-world networks and synthetic data sets. The experimental analysis includes QoS, mean average precision, root mean square error, precision, normalized square error, and sensitivity metrics. The proposed technique achieves QoS of 73%, mean average precision of 59%, root mean square error of 73%, precision of 76%, normalized square error of 86%, and sensitivity of 93%. The findings suggest that integrating nano-grid and deep learning techniques can effectively enhance the QoS of cloud computing frameworks.
6
EN
Purpose: The publication presents the results of an analysis of the popularity of technologies used in logistics based on published technical literature. The aim of the work was to determine the participation of individual types of technologies in the development of Logistics 4.0. In the Industry 4.0 policy implemented in highly developed countries, logistics development is referred to as “Logistics 4.0”. Methodology: The work is based on the analysis of empirical data describing the topics of the application of the latest information technology and other technologies related to the fourth industrial revolution. The scope of the analysis covers technologies developed between 2014-2022. Findings: Based on the investigation, the major technological subfields of Big Data, Cloud computing and networking, Business Intelligence and other, Internet of Things, and Hardware have been proposed as the core utility categories of technologies in Logistics 4.0. Originality/value: The analysis can be useful for practical aims, e.g., while planning logistics 4.0 trainings, enterprising technical investments, but also for scientific and educational objectives.
EN
The ongoing process of network softwareization is clearly visible for the mobile networks. The 5G standard defines core network functions as separate processes that can be easily virtualized. The next step is to make deployments cloud-enabled, e.g., independent of the hardware and hypervisor. In this work, we present a Proof-of-Concept of the 5G network cloud-based deployment. We perform the troubleshooting and propose solution for the encountered problem. We also extended the existing implementation with an analytics function.
PL
Oprogramowanie stanowi nieodłączny element systemów telekomunikacyjnych. Jest to widoczne w sieciach 5G, które definiują funkcje sieciowe jako procesy programistyczne, z możliwością wirtualizacji. Kolejnym krokiem jest uniezależnienie wdrożeń od sprzętu oraz nadzorcy wirtualizacji. W pracy, przedstawiamy wdrożenie sieci rdzeniowej 5G w środowisku chmurowym. Przeprowadziliśmy także walidację oraz zaproponowaliśmy sposób rozwiązania problemu. Wdrożenie rozszerzyliśmy o funkcję sieciową na potrzeby analityki.
PL
Nowoczesność, ale nie ta teoretyczna, lecz w praktycznym wymiarze. Przemysł 4.0, automatyzacja, robotyzacja i inne innowacyjne technologie czy wynalazki w polskich realiach. Idące za tym zmiany w zarządzaniu [...] Niezbędna w nowych warunkach społeczno-gospodarczych elastyczność procesu produkcyjnego, z charakterystyką zmian pod wpływem bieżących niezależnych od firmy wydarzeń i procesów... [raport : rozdział 1]
EN
As the popularity of cloud computing increases, safety concerns are growing as well. Cloud forensics (CF) is a smart adaptation of the digital forensics model that is used for fighting the related offenses. This paper proposes a new forensic method relying on a blockchain network. Here, the log files are accumulated and preserved in the blockchain using different peers. In order to protect the system against illegitimate users, an improved blowfish method is applied. In this particular instance, the system is made up of five distinct components: hypervisor (VMM), IPFS file storage, log ledger, node controller, and smart contract. The suggested approach includes six phases: creation of the log file, key setup and exchange, evidence setup and control, integrity assurance, agreement validation and confidential file release, as well as blockchain-based communication. To ensure efficient exchange of data exchange between the cloud provider and the client, the methodology comprises IPFS. The SSA (FOI-SSA) model, integrated with forensic operations, is used to select the keys in the best possible way. Finally, an analysis is conducted to prove the effectiveness of the proposed FOI-SSA technique.
EN
Ciphertext policy attribute-based encryption (CPABE) is one of the efficient implementations of encrypted access control scheme for cloud computing. Though multiple implementations of CPABE exist, there are some issues that need to be addressed, including efficient revocation approach, decryption time, storage cost etc. In this paper, an efficient scheme that incorporates a hierarchical access structure, outsourced decryption, as well as user and attribute revocation is presented. The hierarchical access structure is utilized to encrypt multiple data using one common access structure and makes the encryption process more efficient. The outsourcing server is used to perform partial decryption, so that all heavy computations are performed by this server and less overhead is incurred by the data user. The proposed framework also integrates the evaluation of trustworthiness of data users and service providers to ensure trusted and encrypted access control procedures. The paper also presents an analysis of the time required for performing different operations. Simulation results show that the proposed scheme outperforms the existing approaches.
EN
Land surface albedo is a relevant variable in many climatic, environmental, and hydrological studies; its monitoring allows researchers to identify changes on the Earth’s surface. The open satellite data that is provided by the USGS/NASA Landsat mission is quite suitable for estimating this parameter through the remote sensing technique. The purpose of this paper is to evaluate the potentialities of the new Landsat 9 data for retrieving Earth’s albedo by applying da Silva et al.’s algorithm (developed in 2016 for the Landsat 8 data) using the Google Earth Engine cloud platform and R software. Two urban areas in Southern Italy with similar geomorphologic and climatic characteristics were chosen as study sites. After obtaining thematic maps of the albedos here, a statistical analysis and comparison among the Landsat 8 and Landsat 9 results was performed considering the entire study areas and each land use/land cover class that is provided by the Copernicus Urban Atlas 2018. This approach was also applied to the data after being filtered through Tukey’s test (used to detect and remove outliers). The analysis showed a very good correlation between the Landsat 8 and Landsat 9 estimations (ρ > 0.94 for both sites), with some exceptions that were related to some mis-corresponding values. Furthermore, the Landsat 8 and Landsat 9 outliers were generally overlapping. In conclusion, da Silva et al.’s approach appears to also be reasonably applicable to the Landsat 9 data despite some radiometric differences.
PL
Autorka artykułu podjęła próbę analizy procesowej kontroli korespondencji przechowywanej w pamięci wirtualnej, czyli w tzw. chmurze (cloud computing). Opracowanie stanowi próbę odpowiedzi na pytanie, w jaki sposób urządzenia mobilne i chmury są badane i jaki wpływ na realizację czynności procesowych mają przepisy prawa odnośnie do prywatności. Wzrost zainteresowania chmurą obliczeniową skutkuje pojawieniem się wielu nowych problemów prawnych, które przekładają się m.in. na praktykę i zasady działania organów ścigania. W pierwszej kolejności omówiono pojęcie „chmura obliczeniowa” oraz poddano analizie przepisy dotyczące pozyskiwania dowodów elektronicznych. Uniezależnienie systemów teleinformatycznych od funkcjonowania klasycznego środowiska pracy opartego na pojedynczej stacji roboczej pozwoliło także postawić pytanie o transgraniczność usług świadczonych w chmurze. Dane informatyczne przekazywane poprzez chmurę obliczeniową mogą być zapisywane na kilkunastu urządzeniach zlokalizowanych w różnych państwach.
EN
The article attempts to analyze the process control of correspondence stored in virtual memory, i.e. in the so-called Cloud Computing. The study is an attempt to answer the question of how mobile devices and clouds are examined and what impact the law on privacy has on the implementation of procedural activities. The growing interest in cloud computing results in the emergence of many new legal problems, which translate into, among others, on the practice and operation of law enforcement agencies. First, the concept of „cloud computing” was discussed and the provisions on obtaining electronic evidence were analyzed. The independence of ICT systems from the functioning of a classic work environment based on a single workstation also allowed us to raise the question of the cross-border nature of services provided in the cloud. IT data transmitted via cloud computing can be saved on several devices located in different countries.
EN
Cloud computing provides centralized computing services to the user on demand. Despite this sophisticated service, it suffers from single-point failure, which blocks the entire system. Many security operations consider this single-point failure, which demands alternate security solutions to the aforesaid problem. Blockchain technology provides a corrective measure to a single-point failure with the decentralized operation. The devices communicating in the cloud environment range from small IoT devices to large cloud data storage. The nodes should be effectively authenticated in a blockchain environment. Mutual authentication is time-efficient when the network is small. However, as the network scales, authentication is less time-efficient, and dynamic scalability is not possible with smart contract-based authentication. To address this issue, the blockchain node runs the skip graph algorithm to retrieve the registered node. The skip graph algorithm possesses scalability and decentralized nature, and retrieves a node by finding the longest prefix matching. The worst time complexity is O(log n) for maximum n nodes. This method ensures fast nodal retrieval in the mutual authentication process. The proposed search by name id algorithm through skip graph is efficient compared with the state-of-art existing work and the performance is also good compared with the existing work where the latency is reduced by 30–80%, and the power consumption is reduced by 32–50% compared to other considered approaches.
14
Content available remote Is Homomorphic Encryption Feasible for Smart Mobility?
EN
Smart mobility is a promising approach to meet urban transport needs in an environmentally and and user-friendly way. Smart mobility computes itineraries with multiple means of transportation, e.g., trams, rental bikes or electric scooters, according to customer preferences. A mobility platform cares for reservations, connecting transports, invoicing and billing. This requires sharing sensible personal data with multiple parties, and puts data privacy at risk. In this paper, we investigate if fully homomorphic encryption (FHE) can be applied in practice to mitigate such privacy issues. FHE allows to calculate on encrypted data, without having to decrypt it first. We implemented three typical distributed computations in a smart mobility scenario with SEAL, a recent programming library for FHE. With this implementation, we have measured memory consumption and execution times for three variants of distributed transactions, that are representative for a wide range of smart mobility tasks. Our evaluation shows, that FHE is indeed applicable to smart mobility: With today's processing capabilities, state-of-the-art FHE increases a smart mobility transaction by about 100 milliseconds and less than 3 microcents.
EN
This research focuses on the study of monitoring and controlling the internal climate of a public building by controlling temperature and humidity through designing and implementing an automation system. This system can be completely operated and secure using Wi-Fi networks as communication protocol, and Node MCU as a wireless hub. There are also new possibilities for remote control and monitoring of network-enabled devices as a result of the rapid expansion of the Internet. The proposed system consists of temperature and humidity sensors, a relay, and an ESP8266 Wi-Fi module that stores sensor data and transfers it to a cloud server database via Appatshy and Mysql formats to the web server. The web page is designed using HTML/CSS program language with a distinct and simple interface. The system has been implemented with a high latency so that all readings are automatically updated and displayed. The designed proposed system has efficient, secure, rapid responsive real time, and control it automatically and manually at the same time.
PL
Badania te skupiają się na badaniu monitorowania i kontrolowania klimatu wewnętrznego budynku użyteczności publicznej poprzez kontrolowanie temperatury i wilgotności poprzez zaprojektowanie i wdrożenie systemu automatyki. Ten system może być w pełni obsługiwany i bezpieczny przy użyciu sieci Wi-Fi jako protokołu komunikacyjnego oraz MCU węzła jako koncentratora bezprzewodowego. W wyniku gwałtownej ekspansji Internetu pojawiły się również nowe możliwości zdalnego sterowania i monitorowania urządzeń pracujących w sieci. Proponowany system składa się z czujników temperatury i wilgotności, przekaźnika oraz modułu Wi-Fi ESP8266, który przechowuje dane z czujników i przekazuje je do bazy danych serwera w chmurze za pośrednictwem formatów Appatshy i Mysql na serwer WWW. Strona internetowa została zaprojektowana w języku programowania HTML/CSS z wyraźnym i prostym interfejsem. System został zaimplementowany z dużym opóźnieniem, dzięki czemu wszystkie odczyty są automatycznie aktualizowane i wyświetlane. Zaprojektowany proponowany system posiada wydajny, bezpieczny, szybki czas reakcji w czasie rzeczywistym, a jednocześnie steruje nim automatycznie i ręcznie.
PL
Współczesne tekstroniczne transpondery RFID otwierają zupełnie nowe możliwości przed projektantami sprzętu AGD. W szczególności zastosowania te widoczne są w technice pralniczej, gdzie informacje zawarte w transponderze RFID wszytym w odzież można wykorzystać do wyboru najlepszego programu prania dla danego rodzaju tkaniny lub do wyboru odpowiedniego programu prania dla różnych umieszczonych tkanin w bębnie pralki. W ramach prac zaprojektowano i zbudowano stanowisko do demonstracji zastosowania transponderów RFIDtex w urządzeniu myjącym. Przygotowano system zarządzania dla zbudowanego modelu pralki wyposażonej w urządzenie RWD, wspierający podejmowanie decyzji o wyborze danej funkcji urządzenia na podstawie danych dostarczanych przez odczyt identyfikatorów RFIDtex zintegrowanych z odzieżą. Urządzenie piorące zintegrowano z chmurą obliczeniową do zarządzania ubraniami bazując na ich unikalnym identyfikatorze, a także jako moduł pośredniczący do aplikacji „wirtualnej szafy”. W ramach prac sprawdzono skuteczność działania stacji z wykorzystaniem próbek.
EN
Modern Textronics RFID transponders open completely new possibilities for designers of household appliances. In particular, these applications can be seen in laundry technology, where the information contained in the RFID transponder sewn into the clothes can be used to select the best washing program for a given type of fabric or to select the appropriate washing program for different fabrics placed in the drum of the washing machine. The work included design and construction of a demonstration station for the demonstration of RFIDtex transponders in the washing machine. A management system for a model of a washing machine equipped with Read-Write Device (RWD) was prepared, which supports decision-making based on data provided by reading of RFIDtex tags integrated with clothes. The laundry device was integrated with cloud computing for garment management based on the unique identifier of the tags and also as an intermediary module for the virtual closet application. The work checked the effectiveness of the station using samples.
EN
Cloud computing is being rapidly adopted by many organizations from different domains and large amounts of data is stored in the cloud. In order to ensure data security, the attribute-based access control mechanism has been emerging recently as a fine-grained access control model that grants access based on the data user’s attributes. In this model, the data owner builds the access policy using the attributes of the data users and access to the data is granted only if the requirements of such an access policy are satisfied. Ciphertext policy-based attribute-based encryption (CPABE) is one of the most widely used methods for providing encrypted access control. Complex, time consuming and costly paring operations are the major issue with the CPABE method. Hence, another efficient method is needed to reduce the data user’s overhead while decrypting data. This paper presents an efficient method consisting in outsourcing decryption operations to a third-party server, so that complex operations may be performed by that machine with only some simple calculations left on the data user’s side. The concept of a hierarchical access structure is also integrated with the traditional CPABE technique. The hierarchical approach enables the data owner to encrypt multiple data using a single common hierarchical access structure. This allows the user to decrypt only the relevant part of ciphertext, depending on which fragment of the hierarchical access structure is satisfied. The paper evaluates also the performance of the proposed model in terms of time and storage cost.
PL
Artykuł przedstawia porównanie oferty wybranych dostawców chmury obliczeniowych pod kątem ich wykorzystania w procesie przygotowywania i wdrażania usług opartych o idee otwartego kodu źródłowego. Przeprowadzone badania dotyczą usług dostarczanych według modelu IaaS w postaci dzierżawy maszyny wirtualnej oraz usług dostarczanych według modelu PaaS w postaci usług baz danych. Zaprezentowana analiza ma charakter tak jakościowy (ocena subiektywna) jak i ilościowy, który polega na szeregu pomiarów parametrów instancji wirtualnych. Na podstawie tej analizy, wybrany został najlepszy dostawca usług w chmurze publicznej dla użytkowników rozpoczynających wykorzystywanie zasobów chmur obliczeniowych.
EN
The article presents a comparison of the offers of selected cloud computing providers in terms of their use in the process of developing and implementing IT services based on the idea of open source code. The conducted research concerns services provided according to the IaaS model in the form of a virtual machine lease and services provided according to the PaaS model in the form of database services. The presented analysis is both qualitative (subjective assessment) and quantitative, which consists in a series of measurements of the parameters of virtual instances. Based on this analysis, the best public cloud service provider for users starting to use cloud computing resources was selected.
EN
Cloud computing has emerged as a significant technology domain, primarily due to the emergence of big data, machine learning, and quantum computing applications. While earlier, cloud computing services were focused mainly on providing storage and some infrastructures/ platforms for applications, the need to advance computational power analysis of massive datasets. It has made cloud computing almost inevitable from most client-based applications, mobile applications, or web applications. The allied challenge to protect data shared from and to cloud-based platforms has cropped up with the necessity to access public clouds. While conventional cryptographic algorithms have been used for securing and authenticating cloud data, advancements in cryptanalysis and access to faster computation have led to possible threats to the traditional security of cloud mechanisms. This has led to extensive research in homomorphic encryption pertaining to cloud security. In this paper, a security mechanism is designed targeted towards dynamic groups using public clouds. Cloud security mechanisms generally face a significant challenge in terms of overhead, throughput, and execution time to encrypt data from dynamic groups with frequent member addition and removal. A two-stage homomorphic encryption process is proposed for data security in this paper. The performance of the proposed system is evaluated in terms of the salient cryptographic metrics, which are the avalanche effect, throughput, and execution time. A comparative analysis with conventional cryptographic algorithms shows that the proposed system outperforms them regarding the cryptographic performance metrics.
EN
The application of quadcopter and intelligent learning techniques in urban monitoring systems can improve flexibility and efficiency features. This paper proposes a cloud-based urban monitoring system that uses deep learning, fuzzy system, image processing, pattern recognition, and Bayesian network. The main objectives of this system are to monitor climate status, temperature, humidity, and smoke, as well as to detect fire occurrences based on the above intelligent techniques. The quadcopter transmits sensing data of the temperature, humidity, and smoke sensors, geographical coordinates, image frames, and videos to a control station via RF communications. In the control station side, the monitoring capabilities are designed by graphical tools to show urban areas with RGB colors according to the predetermined data ranges. The evaluation process illustrates simulation results of the deep neural network applied to climate status and effects of the sensors’ data changes on climate status. An illustrative example is used to draw the simulated area using RGB colors. Furthermore, circuit of the quadcopter side is designed using electric devices.
first rewind previous Strona / 14 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.