7,033 Hits in 9.0 sec

Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture

Amir Mohamed Talib, Rodziah Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad
2012 Journal of Information Security  
In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in  ...  In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data.  ...  In order to achieve these problems we proposed a comprehensive security framework based on MAS architecture, our security framework has been built using two layers: agent layer and cloud data storage layer  ... 
doi:10.4236/jis.2012.34036 fatcat:ysjzbrkw5vfxdhukvmfkuvuf4e

A comprehensive assessment of cloud computing for smart grid applications: A multi-perspectives framework

Nina Chaichi, Joao Lavoie, Soheil Zarrin, Rafaa Khalifa, Felix Sie
2015 2015 Portland International Conference on Management of Engineering and Technology (PICMET)  
The IT system is one of the key infrastructures in order to add intelligent feature to power grids.  ...  a comprehensive assessment is required.  ...  with the hierarchical structure based on cloud computing architecture, [16] proposed cloud-based multi-agent system as a distributed control architecture for Smart Micro Grids.  ... 
doi:10.1109/picmet.2015.7273227 fatcat:iqk4mwybuve5hpzpj4whm6ikeu


Geetha Radhakrishnan, Shunmuganthankl.
2018 Zenodo  
data in the cloud. This also describes the approach for designing a cloud security platform using Multi-Agent System architecture.  ...  Agents have proactive and reactive features which are beneficial for cloud data storage security. The architecture of the system is formed from a set of agent groups.  ...  The Multi-Agent System Architecture is initiated to manage the accuracy, confidentiality, and reliability of users' Cloud Data Storage.  ... 
doi:10.5281/zenodo.2351710 fatcat:s246buntsvfcfjyta6xsvogoqy

Multi-Cloud: A Comprehensive Review

Hamza Ali Imran, Usama Latif, Ataul Aziz Ikram, Maryam Ehsan, Ahmed Jamal Ikram, Waleed Ahmad Khan, Saad Wazir
2020 2020 IEEE 23rd International Multitopic Conference (INMIC)  
Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced.  ...  This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.  ...  It's a cloud storage-based gateway system which helps to store data in the form of encrypted data blocks running on multiple clouds thus minimizing the possibility of a cloud outage and increasing cloud  ... 
doi:10.1109/inmic50486.2020.9318176 fatcat:36eehcl535bdbf76umrp2rbs34

An enhanced healthcare system in mobile cloud computing environment

Jemal Hanen, Zied Kechaou, Mounir Ben Ayed
2016 Vietnam Journal of Computer Science  
To this end, we implement a medical cloud multi-agent system (MCMAS) solution for polyclinic ESSALEMA Sfax-TUNISIA, using Google's Android operating system.  ...  Mobile cloud computing (MCC) is a new technology for mobile web services. Accordingly, we assume that MCC is likely to be of the heart of healthcare transformation.  ...  To implement our proposed application, we use JADE (Java Agent Development Framework) as a software framework for developing multi-Agent systems (JADE provides a set of interfaces for the design of agents  ... 
doi:10.1007/s40595-016-0076-y fatcat:2ob74p5mbffixk4wuydqnbdzbq

Comparative Analysis: Intrusion Detection in Multi-Cloud Environment to Identify Way Forward

2021 International Journal of Advanced Trends in Computer Science and Engineering  
These systems are dependent on a rule base that is sufficient to work in certain environment but in case of multi-cloud integration, such fixed rule bases and known-resilience becomes a point of concern  ...  results in making a sustainable, secure and scalable multi-cloud environment.  ...  The middleware includes a multi-agent resource management system for the Cloud.  ... 
doi:10.30534/ijatcse/2021/1451032021 fatcat:tiqtxdmwwjeqre6muhz4yczu2i

A Study of Security Impacts and Cryptographic Techniques in Cloud-based e-Learning Technologies

Lavanya-Nehan Degambur, Sheeba Armoogum, Sameerchand Pudaruth
2022 International Journal of Advanced Computer Science and Applications  
using multi-agent software.  ...  The results obtained define several sets of criteria to evaluate the requirements of cryptographic techniques and propose an implementation framework across an end-to-end cloud-based e-learning architecture  ...  for cloud-based e-learning technologies. For future work, a theoretical framework will be implemented via a holistic approach using different cryptographic techniques.  ... 
doi:10.14569/ijacsa.2022.0130108 fatcat:cl4ozumjzvh5pecsqsgoqdvrui

A Proposed Framework for Secure Data Storage in a Big Data Environment Based on Blockchain and Mobile Agent

Khalil Ahmad Alsulbi, Maher Ali Khemakhem, Abdullah Ahamd Basuhail, Fathy Eassa Eassa, Kamal Mansur Jambi, Khalid Ali Almarhabi
2021 Symmetry  
The empirical results and framework evaluation show that our proposed framework provides an effective solution for secure data storage in a Big Data environment.  ...  Additionally, it uses mobile agent technology to take advantage of the benefits related to system performance in general.  ...  Materials and Methods System Design and Architecture We propose a new security framework for Big Data based on the Blockchain and mobile agents, which works in a multi-cluster environment.  ... 
doi:10.3390/sym13111990 fatcat:pt63v3ctwzgsjeldaorj2c3iiu

Unified Ontology Implementation of Cloud Computing for Distributed Systems

Zainab Salih Ageed, Rowaida Khalil Ibrahim, Mohammed A. M. Sadeeq
2020 Current Journal of Applied Science and Technology  
The use RDF and OWL semantic technologies in the modeling of a multi-agent system are very effective in increases coordination the interoperability.  ...  The ability to provide massive data storage, applications, platforms plus many other services leads to make the number of clouds services providers been increased.  ...  Distributed Multi-Agent System Based on Ontology Khaoula ADDAKIRI et al.  ... 
doi:10.9734/cjast/2020/v39i3431039 fatcat:glvn4asmivfihpmjnwk2jy7d6m

Towards Secure Cloud Orchestration for Multi-Cloud Deployments

Nicolae Paladi, Antonis Michalas, Hai-Van Dang
2018 Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms - CrossCloud'18  
We identify a set of attack scenarios, define security enforcement enablers and propose an architecture for a security-enabled cloud orchestration framework for multi-cloud application deployments.  ...  In this work, we analyze the security landscape of cloud orchestration frameworks for multicloud infrastructure.  ...  We base the security architecture on Occopus, a multi-cloud orchestrator to deploy and manage complex infrastructures [11] .  ... 
doi:10.1145/3195870.3195874 dblp:conf/eurosys/PaladiMD18 fatcat:qul32bkf4rfdnghqmnxyfzl5ga

A Survey of Modern Approach for Cloud Service Recommendation based on Security

Shital Sumbe, Sujata Jadhav, M.V. Pawar
2015 International Journal of Computer Applications  
As the number of new cloud service provider increases, user require secure, reliable and trustworthy Cloud Service Provider from the market to store confidential data.  ...  General Terms Cloud service providers can be ranked based on different security measures like Digital signature, Directory attack, DDos attack, DOS attack.  ...  Security for multi-cloud using a RC5 algorithm.  ... 
doi:10.5120/ijca2015906944 fatcat:rdxvshfty5gvdbityatm3e57hi

A Survey of Mobile Cloud Computing Challenges and Solutions

Ghadeer Alwafi, Mona Alrougi, Rahaf Alsulami, Shaimaa Salama
2021 International Journal of New Technology and Research  
This is considered a problem since mobile devices provide limited computing power, storage, and energy.  ...  This survey paper has done a comprehensive review of the research papers through search engines such as Google Scholar, IEEE, ScienceDirect, SCOPUS, and Research Gate to find MCC's challenges and solutions  ...  The framework consists of distant cloud, agents, and multiple mobile devices. Request filtering is adopted on the device and the agent to effectively. B.  ... 
doi:10.31871/ijntr.7.3.6 fatcat:ww7w7llcbnggxerzqsv2uwol6y

SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments

Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn
2010 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops  
In this paper, we propose a comprehensive security framework for cloud computing environments.  ...  Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption.  ...  ACKNOWLEDGMENT The work of Gail-J. Ahn was partially supported by the grants from National Science Foundation (NSF-IIS-0900970 and NSF-CNS-0831360).  ... 
doi:10.1109/compsacw.2010.74 dblp:conf/compsac/TakabiJA10 fatcat:hbfxqx6535az5dzemmlks255ny

Cloud-based Data-intensive Framework towards fault diagnosis in large-scale petrochemical plants

Zhiqiang Huo, Mithun Mukherjee, Lei Shu, Yuanfang Chen, Zhangbing Zhou
2016 2016 International Wireless Communications and Mobile Computing Conference (IWCMC)  
In this paper, we propose a Cloud-based Data-intensive Framework (CDF) for on-line equipment fault diagnosis system that facilitates the integration and processing of mass sensor data generated from Industrial  ...  Moreover, this approach contributes the establishment of on-line fault diagnosis monitoring system with sensor streaming computing and storage paradigms based on Hadoop as a key to the complex problems  ...  This paper presents a Cloud-based Data-intensive Framework, named as CDF, that supports large-scale equipment fault diagnosis systems in a cloud environment.  ... 
doi:10.1109/iwcmc.2016.7577209 dblp:conf/iwcmc/HuoMSCZ16 fatcat:3ujxzy5lczeg7cg466heawed5q

Research on Security Architecture in Mobile Cloud Computing to Prevent Adaptive Anomaly Attacks

But as cloud allows us data accessibility quite easily data security is a major concern and is an emerging area of study.  ...  Cloud Computing is a very viable data storage structure where the users can store and access the data from anywhere. Cloud computing use is increasing at a very rapid pace nowadays.  ...  This service is actually involved in the data storage of the redundant data over the cloud. Based on credential it would store and retrieve data for a user explicitly.  ... 
doi:10.35940/ijitee.f1192.0486s419 fatcat:vkmn55lhebgk5ae2c7bqfnj53y
« Previous Showing results 1 — 15 out of 7,033 results