The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many d...The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents.展开更多
The Systematic Literature Review(SLR)presented in the document focuses on the acceptance of social media(SM)platforms,particularly through the lens of the Unified Theory of Acceptance and Use of Technology(UTAUT),Tech...The Systematic Literature Review(SLR)presented in the document focuses on the acceptance of social media(SM)platforms,particularly through the lens of the Unified Theory of Acceptance and Use of Technology(UTAUT),Technology Acceptance Model(TAM),Theory of Planned Behavior(TPB)and other relevant theories.The review involves a comprehensive analysis of the most used theories of acceptance models,the methods for selecting studies,and the results and findings from the reviewed studies.The study also discusses the accomplishment of research goals and creates a research framework to guide future research.The geographic scope of the studies is also examined,providing insights into the distribution of studies across different countries.The review adheres to the PRISMA(Preferred Reporting Items for Systematic Reviews and meta-Analyses)guidelines for reporting systematic reviews and employs a theory-based approach,categorizing selected articles based on their theoretical foundations.The review’s methodology involves the use of empirical evidence that meets predetermined inclusion criteria and addresses specific research questions.The document provides a detailed account of the steps involved in the systematic review,including the identification,screening,eligibility determination,and selection of studies.The review also offers implications for theory and practice,addresses limitations,and suggests areas for future research.展开更多
文摘The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents.
文摘The Systematic Literature Review(SLR)presented in the document focuses on the acceptance of social media(SM)platforms,particularly through the lens of the Unified Theory of Acceptance and Use of Technology(UTAUT),Technology Acceptance Model(TAM),Theory of Planned Behavior(TPB)and other relevant theories.The review involves a comprehensive analysis of the most used theories of acceptance models,the methods for selecting studies,and the results and findings from the reviewed studies.The study also discusses the accomplishment of research goals and creates a research framework to guide future research.The geographic scope of the studies is also examined,providing insights into the distribution of studies across different countries.The review adheres to the PRISMA(Preferred Reporting Items for Systematic Reviews and meta-Analyses)guidelines for reporting systematic reviews and employs a theory-based approach,categorizing selected articles based on their theoretical foundations.The review’s methodology involves the use of empirical evidence that meets predetermined inclusion criteria and addresses specific research questions.The document provides a detailed account of the steps involved in the systematic review,including the identification,screening,eligibility determination,and selection of studies.The review also offers implications for theory and practice,addresses limitations,and suggests areas for future research.