Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, we propose user identity management protocol for cloud computing customers and cloud service providers. This protocol will authenticate and authorize customers/providers in other to achieve global security networks. The protocol will be developed to achieve the set global security objectives in cloud computing environments. Confidentiality, integrity and availability are the key challenges of web services' or utility providers. A layered protocol design is proposed for cloud computing systems, the physical, networks and application layer. However, each layer will integrate existing security features such as firewalls, NIDS, NIPS, Anti-DDOS and others to prevent security threats and attacks. System vulnerability is critical to the cloud computing facilities; the proposed protocol will address this as part of measures to secure data at all levels. The protocol will protect customers/cloud service providers' infrastructure by preventing unauthorized users to gain access to the service/facility.
Abstract-This paper presents an architectural model for Wireless Peer-to-Peer (WP2P) file sharing system for ubiquitos mobile devices. File sharing is one of the rationales for computer networks with increasing demand for file sharing applications and technologies in small and large enterprise networks and on the Internet. With the popularity of mobile phones in day-to-day activities, P2P file sharing in mobile phones is highly desirable, especially in 2/2.5G mobile networks. The proposed model is based on a hybrid or semi centralized architecture with the central database server acting as an interface between the mobile devices. The P2P communication model employs the Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) as the messaging medium. The mobile phone initiates a search for a particular file on the mobile P2P network using a General Packet Radio Service (GPRS) connection. The database replies the "searcher" mobile phone with a list of all the available files and the details of the mobile phones that have them. Using this information, the requesting mobile phone makes a SMS connection to any of the phones provided by the database server. The mobile phone with the file then sends it to the requesting mobile phone using the MMS. We present an architectural model using mobile proxy, SMS and MMS, for a mobile P2P network for 2/2.5G networks despite operator constraints.
In fields such as science and engineering, virtual environment is commonly used to provide replacements for practical hands-on laboratories. Sometimes, these environments take the form of a remote interface to the physical laboratory apparatus and at other times, in the form of a complete software implementation that simulates the laboratory apparatus. In this paper, we report on the use of a semi-immersive 3D mobile Augmented Reality (mAR) interface and limited simulations as a replacement for practical hands-on laboratories in science and engineering. The 3D-mAR based interfaces implementations for three different experiments (from microelectronics , power and communications engineering) are presented; the discovered limitations are discussed along with the results of an evaluation by science and engineering students from two different institutions and plans for future work.
Abstract-The use of proxy server could help provide adequate access and response time to large numbers of World Wide Web (WWW) users requesting previously accessed page. While some studies have reported performance increase due to the use of proxy servers, a study reported performance decrease associated with the use of proxy server. Due to lack of recently published scholarly article that test the performance of proxy server, we carry out an in-depth study of the behavior of a proxy server over a six month period. The result of the study showed that hit ratios of the proxy servers range between 21% to 39% and over 70% of web pages are dynamic. The study indicates the effectiveness of the proxy server and helps evaluate the tradeoff between money spent on higher bandwidth lower latency connections, versus the cost/performance of using a caching intermediary.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.