Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 4 de 4
Filtrar
Más filtros

Banco de datos
Tipo del documento
País de afiliación
Intervalo de año de publicación
1.
PeerJ Comput Sci ; 10: e1898, 2024.
Artículo en Inglés | MEDLINE | ID: mdl-38660188

RESUMEN

Data privacy is one of the biggest challenges facing system architects at the system design stage. Especially when certain laws, such as the General Data Protection Regulation (GDPR), have to be complied with by cloud environments. In this article, we want to help cloud providers comply with the GDPR by proposing a GDPR-compliant cloud architecture. To do this, we use model-driven engineering techniques to design cloud architecture and analyze cloud interactions. In particular, we develop a complete framework, called MDCT, which includes a Unified Modeling Language profile that allows us to define specific cloud scenarios and profile validation to ensure that certain required properties are met. The validation process is implemented through the Object Constraint Language (OCL) rules, which allow us to describe the constraints in these models. To comply with many GDPR articles, the proposed cloud architecture considers data privacy and data tracking, enabling safe and secure data management and tracking in the context of the cloud. For this purpose, sticky policies associated with the data are incorporated to define permission for third parties to access the data and track instances of data access. As a result, a cloud architecture designed with MDCT contains a set of OCL rules to validate it as a GDPR-compliant cloud architecture. Our tool models key GDPR points such as user consent/withdrawal, the purpose of access, and data transparency and auditing, and considers data privacy and data tracking with the help of sticky policies.

2.
PeerJ Comput Sci ; 9: e1457, 2023.
Artículo en Inglés | MEDLINE | ID: mdl-37547403

RESUMEN

In this article, we present a parameterized Colored Petri Net (CPN) model of the IEEE 802.11e protocol for wireless communications with mobile stations. CPNs provide a graphical model for the modeling and analysis of concurrent systems, which can be parameterized by the use of constants, and thus they allow us to create more flexible models. Our CPN model captures the protocol's behavior, and the specific parameters used for the 802.11e protocol and the scenarios to be evaluated are captured by the CPN parameters. The model presented is flexible enough to cover full customization of traffic types, user mobility and collision avoidance protocols. In this model, there is an access point (AP) which is visible to all the stations, and we assume that due to physical restrictions, there are two range groups. All the stations in the same range group are visible to each other. The impact of mobility is then analyzed by studying a situation in which the stations move in a controlled way to the same range group. The simulation results demonstrate the impact on network performance for sensitive and insensitive traffic types, as well as the role of the RTS/CTS protocol in collision avoidance, especially when users are located in different regions. Specifically, we show how the performance improves in the different scenarios when the stations move to the same area, where they can see each other, and we also study the impact on the performance for each type of traffic.

3.
PeerJ Comput Sci ; 8: e1171, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-36532816

RESUMEN

This article presents a tool called GDPRValidator that aims to assist small and medium-sized enterprises (SMEs) that have migrated their services, or a part of them, to the cloud to be General Data Protection Regulation (GDPR) compliant when they manage and store employees' or customers' data in the cloud. As these companies have a limited budget to hire legal experts to guide them in complying with GDPR, the main objective of this tool is to help SMEs to be more competitive by saving a considerable amount of money. By using GDPRValidator, these companies can learn and begin the GDPR compliance process by themselves and decide whether it will be necessary to hire GDPR legal experts in the end. GDPRValidator implements a process that aids companies in compliance analysis and validation and generates a series of documents with recommendations. These documents do not guarantee full GDPR compliance, but they can help the company better understand the regulation and improve its data management strategies. In order to validate the efficiency and efficacy of the tool, two SMEs have used it and provided feedback about its perceived ease of use and its perceived usefulness for understanding and complying with GDPR. The results of the validation showed that, for both companies, the degree of perceived usefulness and ease of use of GDPRValidator is quite good. All the scores expressed agreement.

4.
PeerJ Comput Sci ; 7: e513, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-34084925

RESUMEN

Cloud computing has emerged as a cutting-edge technology which is widely used by both private and public institutions, since it eliminates the capital expense of buying, maintaining, and setting up both hardware and software. Clients pay for the services they use, under the so-called Service Level Agreements (SLAs), which are the contracts that establish the terms and costs of the services. In this paper, we propose the CloudCost UML profile, which allows the modeling of cloud architectures and the users' behavior when they interact with the cloud to request resources. We then investigate how to increase the profits of cloud infrastructures by using price schemes. For this purpose, we distinguish between two types of users in the SLAs: regular and high-priority users. Regular users do not require a continuous service, so they can wait to be attended to. In contrast, high-priority users require a constant and immediate service, so they pay a greater price for their services. In addition, a computer-aided design tool, called MSCC (Modeling SLAs Cost Cloud), has been implemented to support the CloudCost profile, which enables the creation of specific cloud scenarios, as well as their edition and validation. Finally, we present a complete case study to illustrate the applicability of the CloudCost profile, thus making it possible to draw conclusions about how to increase the profits of the cloud infrastructures studied by adjusting the different cloud parameters and the resource configuration.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA