@proceedings {7210305, title = {An integrated system for advanced water risk management based on cloud computing and IoT}, journal = {2nd World Symposium on Web Applications and Networking (WSWAN)}, year = {2015}, month = {March}, pages = {1-7}, publisher = {IEEE Computer Society}, abstract = {

Nowadays, the research and industrial communities are focusing their efforts on the adoption of Cloud computing for a massive interaction with the physical environment. At the same time the concept of Internet of Things (IoT), in which several embedded systems are interconnected over the Internet, is becoming more and more popular. In this context, the SIGMA project aims to exploit Cloud technologies to collect, integrate, and process heterogeneous pieces of data coming from different wireless sensor networks (e.g., meteorological, seismic, and water observatories) with the purpose to build a distributed risk management system for controlling and monitoring both environmental and industrial risks for people and things. In this paper, we specifically discuss on how SIGMA enables users to manage risks related to water. In particular, we will discuss how the whole SIGMA stack works describing the whole process from the moment in which water sensed data (e.g., turbidity, speed, methane, dissolved oxygen, water level, etc) are collected from heterogeneous sensor networks to the moment in which the Cloud-based system uniforms and stores them for processing.

}, keywords = {advanced water risk management, cloud computing, distributed risk management system, embedded systems, Floods, Internet of Things, IoT, Metals, meteorological observatories, physical environment, Risk management, Rivers, seismic observatories, sensor networks, SIGMA project, Transducers, water observatories, Water pollution, Water resources, Wireless sensor networks}, doi = {10.1109/WSWAN.2015.7210305}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true\&arnumber=7210305}, author = {Haijiang Tai and Celesti, A. and Fazio, M. and Villari, M. and Puliafito, A.} } @proceedings {6618763, title = {Remote and deep attestations to mitigate threats in Cloud Mash-Up services}, journal = {World Congress on Computer and Information Technology (WCCIT)}, year = {2013}, month = {June}, pages = {1-6}, publisher = {IEEE Computer Society}, address = {Sousse}, abstract = {

Cloud computing is an emerging technology able to offer a plethora of new advanced services. Cloud operators can use and combine such services in order to build new Mash-up Cloud platform and applications. However, security issues have strongly limited the large-scale adoption of Cloud computing, especially in business environments and similar application scenarios, where sensitive date need to be protected. At the same time the Trusted Computing technology is bringing a new way of thinking about security of systems. This paper deals with the importance to leverage the Trusted Computing for encouraging the development of secure distributed Mash-up Cloud services. We show how the Remote and Deep Attestation protocols make secure both the physical hosts and the virtual machines in a Cloud infrastructure, providing a solid framework for the deployment of federated environments.

}, keywords = {cloud computing, Deep Attestation, federation, PaaS, Trusted Computing, Virtual Machine}, issn = {978-1-4799-0460-0}, doi = {10.1109/WCCIT.2013.6618763}, author = {Celesti, A. and Fazio, M. and Villari, M. and Puliafito, A. and Mulfari, D.} } @conference {6726193, title = {Using Virtualization and Guacamole/VNC to Provide Adaptive User Interfaces to Disabled People in Cloud Computing}, booktitle = {Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC)}, year = {2013}, month = {Dec}, pages = {72-79}, keywords = {adaptive user interfaces, Adaptive User Interfaces and Tools, assisted living, Assistive Technology, AT software, AT tools, Browsers, CLEVER, cloud computing, Computer architecture, Computers, disabled people, graphical user interfaces, Guacamole, handicapped aids, HTML5, HTML5 remote desktop gateway, HTML5-based Web interface, hypermedia markup languages, hypervisor, Internet, internetworking, Keyboards, middleware, networked computer, online front-ends, personalized virtual desktops, Psychological Factors, Remote desktop, SaaS, Servers, software as a service, VIM middleware, Virtual Box, virtual infrastructure manager middleware, virtual machine monitor, virtual machines, virtual network computing, virtualisation, Virtualization, VNC, Web browser, Web-accessed VM}, doi = {10.1109/UIC-ATC.2013.42}, author = {Mulfari, D. and Celesti, A. and Villari, M. and Puliafito, A.} } @inbook {Calcavecchia201236, title = {Understanding decentralized and dynamic brokerage in federated cloud environments}, booktitle = {Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice}, year = {2012}, note = {cited By 2}, pages = {36-56}, publisher = {IGI Global}, organization = {IGI Global}, abstract = {

The advent of the cloud computing paradigm offers different ways both to sell services and to exploit external computational resources according to a pay-per-use economic model. Nowadays, cloud computing clients can buy various form of IaaS, PaaS, and SaaS from cloud providers. Besides this form of pay-per-use, the perspective of cloud federation offers further business opportunities for small/medium providers which hold physical datacenters. Considering the cloud computing ecosystem, besides large cloud providers, smaller ones are also becoming popular even though their own virtualization infrastructures (i.e., deployed in their datacenters) cannot directly compete with the bigger market leaders. The result is that often small/medium clouds have to exploit the services of mega-providers in order to develop their business logic and their cloud-based services. To this regard, a possible future alternative scenario is represented by the promotion of cooperation among small/medium cloud providers, thus enabling the sharing of computational and storage resources. However, in order to achieve such an environment, several issues have to be addressed. One of these challenges is how to plan brokerage strategies allowing cloud providers to discover other providers for partnership establishment. This chapter focuses on different possible centralized and decentralized approaches in designing a brokerage strategy for cloud federation, analyzing their features, advantages and disadvantages.

}, issn = {978-1-4666-1632-5}, doi = {10.4018/978-1-4666-1631-8.ch003}, url = {http://www.scopus.com/inward/record.url?eid=2-s2.0-84898583868\&partnerID=40\&md5=8f67fd77131acc97c38804ad0484e2e4}, author = {Calcavecchia, N.M. and Celesti, A. and Di Nitto, E.} }