11,501 Hits in 6.9 sec

Secure end-to-end processing of smart metering data

Andrey Brito, Christof Fetzer, Stefan Köpsell, Peter Pietzuch, Marcelo Pasin, Pascal Felber, Keiko Fonseca, Marcelo Rosa, Luiz Gomes, Rodrigo Riella, Charles Prado, Luiz F. Rust (+4 others)
2019 Journal of Cloud Computing: Advances, Systems and Applications  
The results have been validated in a real-world smart grid scenario to enable a data workflow that is protected end-to-end: from the collection of data to the generation of high-level information such  ...  The SecureCloud project aims to enable confidentiality and integrity of data and applications running in potentially untrusted cloud environments.  ...  We also thank the UCC Cloud Challenge 2018 organizers and the anonymous reviewers for their feedback. Open Access Funding by the Publication Fund of the TU Dresden.  ... 
doi:10.1186/s13677-019-0141-z fatcat:jnshkzd3brc5jjclgccpffmn2u

Integration of Blockchain and Cloud of Things: Architecture, Applications and Challenges [article]

Dinh C Nguyen, Pubudu N Pathirana, Ming Ding, Aruna Seneviratne
2019 arXiv   pre-print
In this context, blockchain provides innovative solutions to address challenges in Cloud of Things in terms of decentralization, data privacy and network security, while Cloud of Things offer elasticity  ...  One of them is Cloud of Things enabled by the corporation of Cloud computing and Internet of Things (IoT).  ...  The results of cloud data processing are used to serve end applications, aiming to facilitate IoT service provisions and meet requirements of end users. 2.2) Key characteristics of Cloud of Things The  ... 
arXiv:1908.09058v1 fatcat:ik4s66nxifhthgm3gj3rrbgbey

Cloud Computing Taxonomies: Benefits and Challenges

Okoye J. A., Mbachu C. B
2017 Circulation in Computer Science  
With cloud computing, web application providers can easily move their applications to cloud data centers.  ...  In all cases, cost optimization for system resources and Quality of Service (QoS) remains the top concern. This paper discussed cloud computing as a smart alternative to legacy computing models.  ...  process.  Protect Internet browsers from attacks to mitigate end-user security vulnerabilities.  ... 
doi:10.22632/ccs-2017-cps-02 fatcat:2hf2vpdbjjfvjjtwg5r33xqvlq

Management Challenges and Opportunities for Energy Cloud Development and Diffusion

Jones Luís Schaefer, Julio Cezar Mairesse Siluk, Patrícia Stefan de Carvalho, José Renes Pinheiro, Paulo Smith Schneider
2020 Energies  
The use of emerging technologies such as cloud computing, Internet of Things, and Big Data, is increasing as tools to assist the management of data and information related to energy systems grow.  ...  In this sense, the objective of this research is to present the basic elements and requirements for the energy cloud and its management and discuss the main management challenges and opportunities for  ...  In Reference [50] , authors implemented a cloud analytics-assisted smart power meter for smart homes.  ... 
doi:10.3390/en13164048 fatcat:6z2kjowrufcqdhoao4u6l4qg7i

Mobile Cloud Computing Research – Issues, Challenges and Needs

Setti Karthik, Advin Manhar
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Moreover, it discusses its opportunities, issues and challenges. Furthermore, the paper highlights a research roadmap for MCC.  ...  This drives a strong demand for mobile cloud applications and services for mobile device users. This brings out a great business and research opportunity in mobile cloud computing (MCC).  ...  Typical attentions could be given to mobile data and information security, end-toend mobile transactions, secured mobile cloud connectivity, and security management and assurance on mobile clouds.  ... 
doi:10.32628/cseit206644 fatcat:zazvac6minacfgf5byrf73ghpq

Integration of Cloud Computing with Internet of Things: Challenges and Open Issues

Hany F. Atlam, Ahmed Alenezi, Abdulrahman Alharthi, Robert J. Walters, Gary B. Wills
2017 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)  
This paper provides an overview of the integration of the Cloud into the IoT by highlighting the integration benefits and implementation challenges.  ...  The integration of Cloud Computing with the IoT is the most effective way on which to overcome these issues.  ...  of in-house activities (e.g. home security control, smart metering, energy saving).  ... 
doi:10.1109/ithings-greencom-cpscom-smartdata.2017.105 dblp:conf/ithings/AtlamAAWW17 fatcat:ixtpl4t44jeutc5lrj5zdvvzrq

Practical Adoption of Cloud Computing in Power Systems- Drivers, Challenges, Guidance, and Real-world Use Cases [article]

Song Zhang, Amritanshu Pandey, Xiaochuan Luo, Maggy Powell, Ranjan Banerji, Lei Fan, Abhineet Parchure, Edgardo Luzcando
2022 arXiv   pre-print
with secure, reliable and cost-effective adoption of cloud technology to meet various business needs.  ...  It follows with the discussion of the challenges and risks of migrating power grid utility workloads to the cloud.  ...  The authors would like to thank a group of Task Force members for providing the facts about how they use cloudbased solutions to address their specific business needs.  ... 
arXiv:2108.00303v5 fatcat:sr7n5gelfbcgdcm2l56c5ahcza

Cloud Computing Environment and Security Challenges: A Review

Muhammad Faheem, Urooj Akram, Irfan Khan, Sundas Naqeeb, Asim Shahzad, Arif Ullah
2017 International Journal of Advanced Computer Science and Applications  
Furthermore, this study identifies the security challenges in cloud computing during the transfer of data into the cloud and provides a viable solution to address the potential threats.  ...  The dynamic and scalable nature of cloud computing creates security challenges in their management by examining policy failure or malicious activity.  ...  Although, the security of data is in-fact challenging when data transfer to the cloud.  ... 
doi:10.14569/ijacsa.2017.081025 fatcat:6lup4o3zgrb6zesokksadljr74

Enabling Privacy and Security in Cloud of Things: architecture, applications, security & privacy challenges

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou, Abdelhak Mourad Gueroui
2019 Applied Computing and Informatics  
The publisher wishes to inform readers that the article "Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges" was originally published by the previous  ...  There has been no change to the content of the article. This change was necessary for the journal to transition from the previous publisher to the new one.  ...  Session containers. it ensure the security of the public clouds by helping the user in the initiation of a relatively secure connection that maintains end-to-end closure. Cloud access brokers.  ... 
doi:10.1016/j.aci.2019.11.005 fatcat:vlbpdylgv5f2rka36rckkibtbe

Anomaly detection for electricity consumption in cloud computing: framework, methods, applications, and challenges

Longji Feng, Shu Xu, Linghao Zhang, Jing Wu, Jidong Zhang, Chengbo Chu, Zhenyu Wang, Haoyang Shi
2020 EURASIP Journal on Wireless Communications and Networking  
The smart grid is envisioned to increase the detection accuracy to an acceptable level by utilizing modern technologies, such as cloud computing.  ...  Finally, the open challenges of the accuracy of detection and anomaly detection for electricity consumption with edge computing are discussed.  ...  Acknowledgements This research is supported by the National Natural Science Foundation of China under grant no. KFKT2020B06.  ... 
doi:10.1186/s13638-020-01807-0 fatcat:fu4jfd6ypzfwnou5fszbs6exku

A Survey On Cloud Computing, Security Challenges, Architecture, Applications & Solutions

Hadiqua Fazal, Imran Memon, Tarwan Kumar Khatri, Ghulam Muhammad, Qasim Ali
2020 University of Sindh Journal of Information and Communication Technology  
In this paper, we are going to emphasize on the advancement in computing technology cloud computing is an incredible innovation to perform complex processing.  ...  We studied about the contributions of cloud computing to the Internet of things technology. It will illustrate the improvements on the internet of things on the basis of cloud.  ...  BIG DATA AND CLOUD COMPUTING: Cloud computing and big data are linked with each other. Big data provides the capacity to utilize products figuring to process circulated inquiries shown in figure.4.  ... 
doaj:30f118306cd34263bf829a751cb1686f fatcat:z7lzsblz5vfyrk7jpjohjdzosy

A review report on challenges and opportunities of edge, fog and cloud computing by employing IoT technology

Sk. Wasim Akram, Dr P. Rajesh, SK. Shama
2018 International Journal of Engineering & Technology  
This pose challenge of dealing with big data from many geometrically distributed data sources which are to be managed and processed.  ...  Particularly the architecture, characteristics, key technologies, potential applications, security issues and challenges of Edge, Fog and Cloud Computing are discussed and summarized.  ...  Security and privacy Security Data security is one of the challenges in Edge and Fog Computing.  ... 
doi:10.14419/ijet.v7i3.29.18808 fatcat:botse43ibzcbjgzdevymvj4stm

Opportunities and challenges of wireless sensor networks using cloud services

Ruoshui Liu, Ian J. Wassell
2011 Proceedings of the workshop on Internet of Things and Service Platforms - IoTSP '11  
In addition, we present the opportunities and challenges of jointly applying WSN and Cloud Computing technologies.  ...  As WSNs become ubiquitous, the technology itself gives rise to some technical challenges to which Cloud Computing may offer solutions.  ...  However, the synergy between these two innovative technologies exhibits some challenges that require answers in order to move both forwards: • Data Format and Event Processing: There is still a lack of  ... 
doi:10.1145/2079353.2079357 fatcat:l325zaktcffcxpmkskdwwu2v7y

Cloud Computing Issues, Challenges, and Needs: A Survey

Mohammad Aljanabi, Shams N. Abd-Alwahab, RD Rohmat Saedudin, Hind Raad Ebraheem, - Defni, Ronal Hadi, Mohd Arfian Ismail
2021 JOIV: International Journal on Informatics Visualization  
Meanwhile, the security issues cover including ownership of device, the trust issue and legel aspects. To overcome the security issues, this paper also presents the solution at the end of this paper.  ...  The security requirement that needs by the cloud computing covers privacy, lack of user control, unauthorized secondary usage, and finally data proliferation and data flow.  ...  ACKNOWLEDGEMENTS The authors would like to thank Universiti Malaysia Pahang for the financial sponsorship under Postgraduate Research Grants Scheme (PGRS) with grant No. PGRS190360.  ... 
doi:10.30630/joiv.5.3.671 fatcat:pnokny6skzhpbjp6lka7kw6bai

Cloud Computing Technology in Smart Grid

Xue-Song ZHOU, Jia-Wei MI, You-Jie MA, Zhi-Qiang GAO
2017 DEStech Transactions on Engineering and Technology Research  
Future smart grids are expected to have reliable, efficient, secured, and cost-effective power management with the implementation of distributed architecture.  ...  In these areas, the utility of cloud computing applications is discussed, while giving directions on future opportunities for the development of the smart grid.  ...  Acknowledgment The authors would like to thank the reviewers for their very helpful comments and suggestions which have improved the presentation of the paper.  ... 
doi:10.12783/dtetr/icmeca2017/11958 fatcat:f5hnioejvzdbdmbaisyxksgz4e
« Previous Showing results 1 — 15 out of 11,501 results