This paper suggests an approach for providing the dynamic federations of clouds. The approach is based on risk assessment technology and implements cloud federations without consideration of identity federations. Here...This paper suggests an approach for providing the dynamic federations of clouds. The approach is based on risk assessment technology and implements cloud federations without consideration of identity federations. Here, for solving this problem, first of all, important factors which are capable of seriously influencing the information security level of clouds are selected and then hierarchical risk assessment architecture is proposed based on these factors. Then, cloud provider’s risk priority vectors are formed by applying the AHP methodology and fuzzy logic excerpt type risk evaluation is carried out based on this vector.展开更多
The key determinants of cloud computing provide a convincing argument for HEIs and its stakeholders to adopt the innovation. These benefits reflect the essential quality characteristics of the cloud, such as Broad net...The key determinants of cloud computing provide a convincing argument for HEIs and its stakeholders to adopt the innovation. These benefits reflect the essential quality characteristics of the cloud, such as Broad network Access;Measured Service;On-demand Self-Service;Rapid Elasticity;and Resource Pooling. However, there are also risks associated with the cloud, leading to non-adoption, such as Confidence, Privacy, Security, Surety and Trust. Understanding the impact of these factors can support multiple stakeholders, such as students, lecturers, senior managers and admins in their adoptive decision of CC in their respected institutions. Using the Multiview 3 (MV3) methodology, a research model was proposed to explore the key qualities and risks that determine the adoption or non-adoption of CC by UK HEIs from multiple perspectives. An exploratory qualitative study was conducted on 32 University stakeholders across 2 UK Universities. The findings suggest that security, privacy and trust are the key determinants to non-adoption as participants felt that the cloud cannot fully guarantee the safeguarding of sensitive information. Determinants to cloud adoption include improving relationships between students and teachers via collaborative tools, in addition to proposing cloud apps for mobile devices for accessing virtual learning materials and email securely off-campus. In conclusion, University stakeholders are still at a cross-road when it comes to cloud adoption, but future advances of the cloud may help to steer their decision to adopt this innovative technology given its overwhelming potential.展开更多
Large-scale data emerge in food safety inspection and testing industry with the development of Internet technology in China.This paper was aimed at designing toxic and hazardous substance big data risk analysis algori...Large-scale data emerge in food safety inspection and testing industry with the development of Internet technology in China.This paper was aimed at designing toxic and hazardous substance big data risk analysis algorithm in food safety inspection and testing based on cloud computing^([1]).Cloud computing platform was set up to store the massive extensive data with geographical distribution,dynamic and high complexity from the Internet,and MapReduce^([2]) computational framework in cloud computing was applied to process and compute parallel data.The risk analysis results were obtained by analyzing 1000000 meat products testing data collected from the laboratory management information system based on web.The results show that food safety index IFS < 1,which proves that the food safety state is in good condition.展开更多
Cloud computing services have quickly become a mainstay in business, leading to success as a business model and numerous advantages from the client’s point of view. Ease and amount of storage and computational servic...Cloud computing services have quickly become a mainstay in business, leading to success as a business model and numerous advantages from the client’s point of view. Ease and amount of storage and computational services provisions were not previously accessible or affordable. However, parallel to this explosion has been significant security risk concerns. Thus, it is important to understand and define these security risks in a cybersecurity framework. This paper will take a case study approach to approach past security risks and propose a model that can be followed by organizations to eliminate the risk of Cloud-related cyberattacks. The main aims of this systematic literature review (SLR) are to (1) address security risks/vulnerabilities that can target cloud environments, (2) define tools that can be used by organizations to defend their cloud environment against those security risks/vulnerabilities, and (3) analyze case studies of significant cyberattacks and provide recommendations for organizations to mitigate such cyberattacks. This paper will propose a novel cloud cybersecurity model from a two-pronged offensive and defensive perspective for implementation by organizations to enhance their security infrastructure.展开更多
虚拟电厂聚合分布式能源作为第三方主体参与市场,其交易过程存有多种不确定性风险因素,准确识别并有效评估其交易风险尤为重要。该文首先基于文本挖掘技术辨识风险因素,并使用失效模式与影响分析法确定关键风险因素,进而设计风险评估指...虚拟电厂聚合分布式能源作为第三方主体参与市场,其交易过程存有多种不确定性风险因素,准确识别并有效评估其交易风险尤为重要。该文首先基于文本挖掘技术辨识风险因素,并使用失效模式与影响分析法确定关键风险因素,进而设计风险评估指标体系。其次,结合博弈论思想,对关键风险因素主客观组合赋权。再次,构建风险评估的二维云模型以描述风险发生概率的随机性和风险产生后果的模糊性问题。最后,采用所提评估方法计算多场景虚拟电厂参与市场交易情况的总体风险水平并排序,且与优劣解距离法(technique for order preference by similarity to ideal solution,TOPSIS)、秩和比综合评价法(rank sum ratio,RSR)及折衷排序方法(multi-criteria optimization and compromise solution,VIKOR)对比分析,验证了模型及方法的可行性和有效性。所做研究为VPP交易管理和风险防范提供了有益的参考,具有工程应用价值。展开更多
文摘This paper suggests an approach for providing the dynamic federations of clouds. The approach is based on risk assessment technology and implements cloud federations without consideration of identity federations. Here, for solving this problem, first of all, important factors which are capable of seriously influencing the information security level of clouds are selected and then hierarchical risk assessment architecture is proposed based on these factors. Then, cloud provider’s risk priority vectors are formed by applying the AHP methodology and fuzzy logic excerpt type risk evaluation is carried out based on this vector.
文摘The key determinants of cloud computing provide a convincing argument for HEIs and its stakeholders to adopt the innovation. These benefits reflect the essential quality characteristics of the cloud, such as Broad network Access;Measured Service;On-demand Self-Service;Rapid Elasticity;and Resource Pooling. However, there are also risks associated with the cloud, leading to non-adoption, such as Confidence, Privacy, Security, Surety and Trust. Understanding the impact of these factors can support multiple stakeholders, such as students, lecturers, senior managers and admins in their adoptive decision of CC in their respected institutions. Using the Multiview 3 (MV3) methodology, a research model was proposed to explore the key qualities and risks that determine the adoption or non-adoption of CC by UK HEIs from multiple perspectives. An exploratory qualitative study was conducted on 32 University stakeholders across 2 UK Universities. The findings suggest that security, privacy and trust are the key determinants to non-adoption as participants felt that the cloud cannot fully guarantee the safeguarding of sensitive information. Determinants to cloud adoption include improving relationships between students and teachers via collaborative tools, in addition to proposing cloud apps for mobile devices for accessing virtual learning materials and email securely off-campus. In conclusion, University stakeholders are still at a cross-road when it comes to cloud adoption, but future advances of the cloud may help to steer their decision to adopt this innovative technology given its overwhelming potential.
文摘Large-scale data emerge in food safety inspection and testing industry with the development of Internet technology in China.This paper was aimed at designing toxic and hazardous substance big data risk analysis algorithm in food safety inspection and testing based on cloud computing^([1]).Cloud computing platform was set up to store the massive extensive data with geographical distribution,dynamic and high complexity from the Internet,and MapReduce^([2]) computational framework in cloud computing was applied to process and compute parallel data.The risk analysis results were obtained by analyzing 1000000 meat products testing data collected from the laboratory management information system based on web.The results show that food safety index IFS < 1,which proves that the food safety state is in good condition.
文摘Cloud computing services have quickly become a mainstay in business, leading to success as a business model and numerous advantages from the client’s point of view. Ease and amount of storage and computational services provisions were not previously accessible or affordable. However, parallel to this explosion has been significant security risk concerns. Thus, it is important to understand and define these security risks in a cybersecurity framework. This paper will take a case study approach to approach past security risks and propose a model that can be followed by organizations to eliminate the risk of Cloud-related cyberattacks. The main aims of this systematic literature review (SLR) are to (1) address security risks/vulnerabilities that can target cloud environments, (2) define tools that can be used by organizations to defend their cloud environment against those security risks/vulnerabilities, and (3) analyze case studies of significant cyberattacks and provide recommendations for organizations to mitigate such cyberattacks. This paper will propose a novel cloud cybersecurity model from a two-pronged offensive and defensive perspective for implementation by organizations to enhance their security infrastructure.
文摘虚拟电厂聚合分布式能源作为第三方主体参与市场,其交易过程存有多种不确定性风险因素,准确识别并有效评估其交易风险尤为重要。该文首先基于文本挖掘技术辨识风险因素,并使用失效模式与影响分析法确定关键风险因素,进而设计风险评估指标体系。其次,结合博弈论思想,对关键风险因素主客观组合赋权。再次,构建风险评估的二维云模型以描述风险发生概率的随机性和风险产生后果的模糊性问题。最后,采用所提评估方法计算多场景虚拟电厂参与市场交易情况的总体风险水平并排序,且与优劣解距离法(technique for order preference by similarity to ideal solution,TOPSIS)、秩和比综合评价法(rank sum ratio,RSR)及折衷排序方法(multi-criteria optimization and compromise solution,VIKOR)对比分析,验证了模型及方法的可行性和有效性。所做研究为VPP交易管理和风险防范提供了有益的参考,具有工程应用价值。