Study and Analysis of Distributed Concurrent Models in Fog
Review Paper | Journal Paper
Vol.5 , Issue.5 , pp.77-83, May-2017
Abstract
Fog computing is a developing area that offers numerous potential advantages to different organizations and common client. It is the extended type of distributed processing. It depends on on-demand-service model in which data, infrastructure, software and different service model are given according to the customer requirement at some instance of time. Load balancing is utilized to distribute workload among various cloud systems or node to get full resource utilization. It is the prominent means to achieve efficient resource sharing and utilization. Load balancing has turned into a challenge issue now in distributed computing frameworks. To meets the clients enormous number of requests, there is a need of distributed solution to handle client request concurrently. Servers can`t be relegated to specific customers individually. Distributed computing involves a large network and different component that are available throughout the wide area. Hence, we design distributed concurrent model which handle multiple client request and reduce the load on the cloud and improve the performance. This research work is performed on student course registration in a University which shows how distributed concurrent models works in Fog when multiple request that are send by client. Our proposed Approach is use to complete tasks within deadline, efficient resource utilizations, fulfilling data consistency constraints.
Key-Words / Index Term
Fog Computing; Dsitributed model; Course Registration; Resource Utilization; Concurrency; Load Balancin;MobileComputing
References
[1] P. Jakovits, S. N. Srirama, I. Kromonov, “Stratus: A Distributed Computing Framework for Scientific Simulations on the Cloud”, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems, Liverpool, pp. 1053-1059, 2012.
[2] P. Morakos, A. Meliones, “Design and implementation of a Cloud SaaS framework for Multi-Tenant applications”, The 5th International Conference on Information Intelligence Systems and Applications, Chania, pp. 273-278, 2014.
[3] L. Ferretti, C. Michele, M. Mirco, “Distributed, concurrent, and independent access to encrypted cloud databases.” IEEE transactions on parallel and distributed systems, Vol.25, Issue.2, pp.437-446, 2014.
[4] HS Mahalle, PR Kaveri, V Chavan, “LoadBalancing On Cloud Data Centres” in International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, Issue.1, pp.1-9, 2013.
[5] Rachna Jain, Sushila Madan, Bindu Garg, “Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.130-135, 2015.
[6] R.S Sajjan, R.Y. Biradar, “Load Balancing and its Algorithms in Cloud Computing: A Survey”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.95-100, 2017.
[7] R.P. Steffi, S. Sundaramoorthy , “Top-K Spatial Preference Query with Range Based Skyline Query in Mobile Environment”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.46-50, 2014.
[8] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica., “A view of cloud computing”, Comm. of the ACM, vol. 53, no. 4, pp. 50-58, 2010.
[9] L.F. Bittencourt, E.R.M. Madeira, N.L.S. Da, “Scheduling in hybrid clouds”,IEEE Communications Magazine, vol.50, no.9, pp. 42-47, 2012.
[10] Pranay Kujur, Kiran Gautam, “Smart Interaction of Object on Internet of Things”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.15-19, 2015.
[11] M. Satyanarayanan, P. Bahl, R. Caceres, N. Davies, “The case for vm-based cloudlets in mobile computing”, IEEE Pervasive Computing, Vol.8, No.4, pp. 14-23, 2009.
[12] Y. Zhang, Y. Zhou, “Transparent Computing: a New Paradigm for Pervasive Computing”, in Ubiquitous Intelligence and Computing, Berlin, pp. 1-11, 2006.
[13] M. S. Laghari, “Automated Course Advising System”, International Journal of Machine Learning and Computing, Vol.4, No.1, pp.23-31, 2014.
[14] Z. Xu, X. Hou, J. Sun, “Ant algorithm-based task scheduling in grid computing”, thm-based task scheduling in grid computing”, presented at Electrical and Computer Engineering IEEE CCECE, CanadA, pp. 1107- 1110, 2003.
[15] L. Chen, “Resource Scheduling Based on Ant Colony Optimization Algorithm in Grid Computing Environments”, Information Technology Journal, Vol. 12, No. 24, pp. 8010-8014, 2013.
[16] V.R.T. Kanakala, K.P. Kumar, S. Kavitha, “A Hybrid Heuristic Algorithm to Enhance Load balancing in Cloud Environment”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.11, pp.129-132, 2016.
[17] S. Kashyap, V. Jaydeep, “A Survey Of Various Load Balancing Algorithms In Cloud Computing”, International Journal Of Scientific & Technology Research vol. 3, no. 11, pp.115-119, 2014.
[18] R. Bhaskar, “Dynamic Allocation Method For Efficient Load Balancing In Virtual Machines For Cloud Computing Environment”, Advanced Computing: An International Journal, vol. 3, no. 5, pp. 53-61, 2012.
Citation
P.Prashant Shaha, Padma Priya R., "Study and Analysis of Distributed Concurrent Models in Fog," International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.77-83, 2017.
Data Analyzing using Big Data (Hadoop) in Billing System
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.84-88, May-2017
Abstract
Hadoop is an open source structure in java that grants differing kind of immense datasets transversely over different groups of PCs using many programing models on which tremens -dous data works. By and large we saw that on the off chance that we increment the measure of the datasets away media, then recovering of information sets aside longer opportunity to prepare. Significant explanation behind this is because of the heap forced on information. So to take care of this kind of issues we utilize Big Data developed to fill this need. In this paper Hadoop eco-frameworks like Sqoop, hive, pig latin and so forth are utilized. Likewise we investigate expansive volume of power charging framework information and increased more prominent exactness in results, too it figures quick and furthermore recuperates loss of information.
Key-Words / Index Term
Sqoop,Hive,Pig,Hadoop,Volume
References
[1] R Granell, CJ Axon, DCH Wallom, "Impacts of raw data temporal resolution using selected clustering methods on residential electricity load profiles”, IEEE Transactions on Power Systems, Vol.30, No.6, pp.3217-3224, 2015.
[2] Zhang, Pei, Xiaoyu Wu, Xiaojun Wang, Sheng Bi, "Short-term load forecasting based on big data technologies”, CSEE Journal of Power and Energy Systems, Vol.1, No.3, pp.59-67, 2015.
[3] N. Mahmoudi-Kohan, M. P. Moghaddam, M. K. Sheikh-El-Eslami, S.M. Bidaki, "Improving WFA k-means technique for demand response programs applications”, 2009 IEEE Power & Energy Society General Meeting, Calgary, pp.1-5, 2009.
[4] C León, F Biscarri, I Monedero, JI. Guerrero, J. Biscarri, R. Millán. "Variability and trend-based generalized rule induction model to NTL detection in power companies." IEEE Transactions on Power Systems, Vol.26, No.4, pp.1798-1807, 2011.
[5] Y. Yang, W. Zhiliang, Q. Zhang, Yang Yang, "A time based markov model for automatic position-dependent services in smart home”, In Control and Decision Conference (CCDC), Chinaese, pp. 2771-2776, 2010.
[6] J Kwac, J Flora, R Rajagopal, "Household energy consumption segmentation using hourly data", IEEE Transactions on Smart Grid, Vol. 5, No.1, pp.420-430, 2014.
[7] S. Haben, C. Singleton, G. Peter, "Analysis and clustering of residential customers energy behavioral demand using smart meter data", IEEE Transactions on Smart Grid, Vol.7, No.1, pp.136-144, 2016.
Citation
Raju Din, Prabadevi B. , "Data Analyzing using Big Data (Hadoop) in Billing System," International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.84-88, 2017.
A Novel Inter and Intra Routing Algorithm
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.89-93, May-2017
Abstract
Routing algorithm plays a vital role in any NETWORK communications. The purpose of algorithm is to make a connection between the hops. Though different routing algorithms coexist for inter routing and intra routing but still there is need for the better one, so we make deep analysis on the existing algorithms and propose a new algorithm. The analysis addresses various routing algorithm issues and a method to overcome them. The parameters taken for comparison include speed, interconnection with the other algorithm and we develop an algorithm which will work in both inter and intra routing environment. The study analysis the functionality of the routing protocol in the real network by designing it using Gns3. Also it discusses the problems faced by the admin of the network by examining how it works in the real environment.
Key-Words / Index Term
Router, Switches, Protocols, RIP, OSPF, EIGRP, Real Networking Environment
References
[1] V.Vetriselvan, Pravin, R.Patil, M.Mahendran, “Survey on the RIP, OSPF, EIGRP Routing Protocols”, International Journal of Computer Science and Information Technologies, Vol.5, Issue.2 pp.1058-1065, 2014.
[2] Alex Hinds, Anthony Atojoko, SYing Zhu, “Evaluation of OSPF and EIGRP 2outing Protocols for IPv6”, International Journal of Future Computer and Communication, Vol.2, No.4, pp.169-175, 2013.
[3] Pankaj Rakheja, Prabhjot kaur, Anjali gupta, Aditi Sharma, “Performance Analysis of RIP, OSPF, IGRP and EIGRP Routing Protocols in a Network”, International Journal of Computer Applications Vol.48, No.18, pp.795-805, 2012.
[4] N. Kishore, S. Singh, R. Dhir, “Energy Based Evaluation of Routing Protocol for MANETs”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.14-17, 2014
[5] Leena Pal, Pradeep Sharma, Netram Kaurav , Shivlal Mewada, “Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013.
[6] Sunil Taneja, Ashwani Kush, “A Survey of Routing Protocols in Mobile Ad Hoc Networks”, International Journal of Innovation, Management Technology, Vol.1, No.3, pp.2010-0248, 2010.
[7] Kevin Butler, TR. Farley, Patrick McDaniel, Jennifer Rexford, “A Survey of BGP Security Issues and Solutions”, Proceedings of the IEEE, Vol.98, No.1, pp.100-122, 2010.
[8] Xiaowei Yang, David Clark, Arthur W.Berger, “NIRA: A New Inter-Domain Routing Architecture”, IEEE/ACM transaction on networking, Vol.15, No.4, pp.775-788, 2007.
[9] Nick Feamster, Jared Winick, Jennifer Rexford, “A Model of BGP Routing for Network Engineering”, SIGMETRICS/ Performance-04, New York, pp. 331-342, 2004.
[10] Huichen Dai, Jianyuan Lu, Yi Wang, Bin Liu, “A two-layer intra-domain routing scheme for named data networking”, 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, pp. 2815-2820, 2012.
[11] David Applegate, Edith Cohen, “Making IntraDomain Routing Robust to Changing and Uncertain Traffic Demands: Understanding Fundamental Tradeoffs”, Proceedings of the 2003 conference on ATAP for computer communications, Germany, pp.313-324, 2003,
[12] BR. Smith, J.J. Garcia-Luna-Aceves, “Securing the Border Gateway Routing Protocol”, Defense Advanced Research Projects Agency (DARPA) under Grant F19628-96-C-0038 , Vol.4, Issue.3, pp.41-46 2002
[13] R. Nathiya, S.G. Santhi, “Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.36-43, 2014.
Citation
Prateek Sharma, Prabadevi B, "A Novel Inter and Intra Routing Algorithm," International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.89-93, 2017.
An Empirical Approach for Validation of Inter-Rater Reliability of Identified Candidate Aspects
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.94-100, May-2017
Abstract
The development of technologies for observing the relevancy of identified candidate aspects of the products and validating the reliability of filed experts is a challenging process. If the identified candidate aspects is taken into consideration for decision making process, the technology has to meet certain feasibility criteria like acceptance of aspects by product experts (Judges). Questionnaires with extracted aspects were distributed to Judges and the candidate aspects are identified. This paper describes the content validity evaluation of identified candidate aspects. The validity of the instrument was evaluated by two field experts who were asked to score each aspect on a 4-point Likert scale (1. Not Relevant, 2. Item need some revision, 3. Relevant but need minor revision, 4. Very Relevant) on relevance of 5 product (Apex AD2600 Progressive-scan DVD player, Canon G3, Creative Labs Nomad Jukebox Zen Xtra 40GB, Nikon Coolpix 4300 and Nokia 6610) datasets and the Kappa Score is calculated.
Key-Words / Index Term
Kappa Score, Aspects, Relevance, Reliability
References
[1] M. Alwan, B. Turner, S. Kell, K. Penberthy, W. Cohn, R. Felder, “Development of Survey Instruments to Guide the Design of Health Status Monitoring Systems for the Elderly: Content Validity Evaluation”, In the Proceedings of the 2006 IEEE International Conference on Information & Communication Technologies (ICTTA 2006), Syria, pp.793-797, 2006.
[2] V. Bhambri, “Data Mining as a Solution for Data Management in Banking Sector”, International Journal of Computer Sciences and Engineering, Vol.1, Issue.1, pp.20-25, 2013.
[3] M. Hu, B. Liu, “Mining and summarizing customer reviews”, In the Proceedings of 2004 ACM SIGKDD international conference on Knowledge discovery and data mining (KDD 2004), New York, pp.168-177, 2004.
[4] J. Cohen, “A Coefficient of Agreement for Nominal Scales” Educational and Psychological Measurement, Vol.20, Issue.1, pp.37-46, 1960.
[5] J. Keyton, T. King, NM. Mabachi, J. Manning, LL. Leonard, D. Schill, “Content analysis procedure book”, Lawrence KS: University of Kansas, Kansas, pp.22-37, 2004.
[6] M. Shelley, K. Krippendorff, “Content Analysis: An Introduction to its Methodology”, Journal of the American Statistical Association, Vol.79, Issue.385, pp.240-144, 1984.
Citation
J.S. Aravindan, K. Vivekanandan, "An Empirical Approach for Validation of Inter-Rater Reliability of Identified Candidate Aspects," International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.94-100, 2017.
Optimization Of ACO-GA for Routing Optimization
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.101-104, May-2017
Abstract
For network routing optimization many protocols and methods are evolved over time and this continuous race for more accurate and speedy data delivery is going on, our research is also one attempt on that race. Nature is best knowledge available on this planet, so ignoring this available science on any field would be foolish. Ants are social insects that searches food collectively and passed their knowledge of food path to others by leaving a hormone called pheromone on the way; researches used this earlier solely and with Genetics for routing optimization. Combination of both is used in routing optimization where output of GA is passed on ACO algorithm but we proposed to use firstly ACO and then passed the output of ACO in GA to get possible path. By our approach we not only reduced the domain of routes for GA but also optimized the time, every time GA uses for evolving best set of chromosomes. We just not only optimized the routing but also optimized earlier research of combination of ACO and GA.
Key-Words / Index Term
Ant Colony Optimization , Genetic Algorithm, Routing Optimization, Meta-Heuristic
References
[1] GD. Caro, M. Dorigo, “Ant colonies for Adaptive Routing in Packet-Switched Communications Networks”, International Conference on Parallel Problem Solving from Nature, USA, pp 673-682 , 2006
[2] M. Dorigo, “Optimization, Learning and Natural Algorithms”, PhD thesis from Politecnico di Milano, Italy, pp.1-13, 1992,
[3] V.K. Ojha, A. Abraham, V. Snasel, “ACO for Continuous Function Optimization: A Performance Analysis”, 14th International Conference on Intelligent Systems Design and Applications (ISDA), Japan, pp.145-150, 2014.
[4] GD. Caro, M. Dorigo, “AntNet : Distributed Stigmergetic Control For Communications Network”, Journal of Artificial Intelligence Research, Vol.9, Issue.1, pp.317-365, 1998.
[5] X. Wang, J. Ma, J. Wang, “Parallel energy-efficient coverage optimization with maximum entropy clustering in wireless sensor networks”, Journal of Parallel and Distributed Computing, Vol.69, Issue.10, pp.838-847, 2007.
[6] C.Saliba, RA. Farrugia, “Quality of Service Aware Ant Colony Optimization Routing Algorithm”, 15th IEEE Conference on Mediterranean Electrotechnical, Valletta, pp.343-347, 2010.
[7] G.D. Caro, M. Dorigo, “AntNet: a mobile agents approach to adaptive routing”, Proceedings of the Thirty-First Hawaii International Conference on System Science, Belgium, pp.74-83, 1998.
[8] M. Kaur, M. Agnihotri, "A Hybrid Technique Using Genetic Algorithm and ANT Colony Optimization for Improving in Cloud Datacenter", International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.100-105, 2016.
[9] D. Mukherjee, S. Acharyya, “Ant Colony Optimization Technique Applied in Network Routing Problem”, International Journal of Computer Applications, Vol.1, Issue.15, pp.66-73, 2012.
[10] M. Dorigo, “From Ant Colonies to Artificial Ants : First International Workshop on Ant Colony Optimization”, AI Communication. Vol.11, Issue.3, pp.39-42, 2000.
[11] T. Stützle, “Parallelization Strategies for Ant Colony Optimization”, Proceedings of Fifth International Conference on Parallel Problem Solving from Nature, Springer-Verlag, Barlin, pp.722-731, 1998.
[12] K. Deb, “An efficient constraint-handling method for genetic algorithms”, Comput. Methods Appl. Mech. Eng., vol.186, No.2, pp. 311-338, 2000.
[13] Yuanyuan Zhang, “Multi-Objective Search - based Requirements Selection and ptimisation”, Ph.D Thesis of King’s College-University of London, London, pp.1- 276, 2010.
[14] J. Gu, J. Hu, T. Zhao, G. Sun, “A new resource scheduling strategy based on genetic algorithm in cloud computing environment”, Journal of Computers, Vol.7, No.1, pp.42-52, 2012.
[15] Abdul Kadar Muhammad Masum ,”Solving the Vehicle Routing Problem using Genetic Algorithm”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 7, pp.126-131, 2011.
Citation
AK Vajpayee, SM. Faisal, "Optimization Of ACO-GA for Routing Optimization," International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.101-104, 2017.
Implementation of Information Management System
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.105-108, May-2017
Abstract
Developing an Online Information Management System (MIS) that is of importance to either an educational institution or a college. The system is an Intranet based application that can be accessed throughout the institution or a specified department. This system may be used for monitoring attendance for the college. Students as well as staffs logging in may also access or can be search any of the information regarding college. Attendance of the faculty and students as well as marks of the students will be updated by staff. This system (M.I.S. ) is being developed for an engineering college to maintain and expedite easy access to information.[1] For this the users must be register with the system after which they can access as well as modify data as per the permissions given to them. MIS is an intranet based application that aims at providing information to all the levels of management within an organization. This system can be used as a knowledge/college management system for the college. For a given student/staff (technical/Non-technical) can access the sdftware to either upload or download some information from the database.
Key-Words / Index Term
PHP, SQL Server, HTML, Javascript, Broowser, College Management, Information System, Document Management System etc.
References
[1]. N Bowker, K Tuffin, “Users with disabilities social and economic development through online access”, Proceedings of the IASTED International Conference on Information and Knowledge Sharing, Canada, pp.122-127, 2002.
[2]. M. Durie, “Ngākāhuipou: Launching Māori futures”, Huia Publishers, Wellington, pp.1-32, 2003.
[3]. T. Hazledine, J. Quiggan, “Public policy in Australia and New Zealand: The new global context”, Australian Journal of Political Science, Vol.41, Issue.2, pp.131-143, 2006.
[4]. JS. Ackerman, “Palladio’s Italian villas”, Institute of Fine Arts (New York University), NY, pp.1-87, 1967.
[5]. PM. Lawther, “Community involvement in post disaster re‐construction‐case study of the British red cross Maldives recovery program”, International Journal of Strategic Property Management, Vol.13, Issue.2, pp.153-69, 2009.
[6]. Tony Tanner, “Jane Austen”, Palgrave Macmillan, US, pp.1-336, 2007.
[7]. CS. Freitas, JJ. Medeiros, “Organizational impacts of the electronic processing system of the Brazilian Superior Court of Justice”, JISTEM-Journal of Information Systems and Technology Management, Vol.12, Issue.2, pp.317-32, 2015.
[8]. LM. Joshi, “A Research Paper on College Management System”, International Journal of Computer Applications, Vol.122, Isseu.11, pp.48-52, 2015.
[9] S. Mahajan, P. Khare, S. Kadare, M. Bhandare, “Design and Develop Information Management System for Technical Institute”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.130-132, 2016.
Citation
S.P. Mahajan, P.B. Khare, S.W. Kedare, "Implementation of Information Management System," International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.105-108, 2017.
Image Encryption and Decryption System Using AES for Secure Transmission
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.109-114, May-2017
Abstract
Internet is the greatest blessing for all the people over the world. Large amount of data is constantly transmitted over the internet. Data means any image, videos, audio etc. Also, confidential information from Banking, Military, Government etc. are transmitted over the internet, but the security of these information is not always looked upon. Privacy and Security of information is very important in data storage and transmission. So as to secure the information, various data hiding techniques and encryption of images is done. Image Encryption can be done using various symmetric and asymmetric key algorithms. But, it is found that symmetric key algorithm is much faster and easier to implement and required less processing power as compare to asymmetric key algorithm. Therefore, we use AES Algorithm for the encryption of images. Here, the proposed system mainly deals with the encryption of image using AES algorithm to secure our data during transmission. Different image file formats are given as the input to the AES Algorithm in our system
Key-Words / Index Term
Encryption, Decryption, Image Processing, AES
References
[1] S. Mewada, P. Sharma, S. S. Gautam, “Exploration of efficient symmetric algorithms”, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp.663-666, 2016.
[2] V. Kapoor, “Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.
[3] A. Sharma, RS Thakur, S. Jaloree, “Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[4] V. Kapoor, “A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013.
[5] A. Sharma, RS Thakur, S. Jaloree, “Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.8-14, 2016.
[6] L.R. Mathew , “A Survey on Different Cryptographic Techniques”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.27-29, 2017.
[7] R. Arya, “Data Encryption Approach For Security”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.176-179, 2014.
[8] Ajay Hirne, Shital Namdev, H.S. Tomar, “Secure Data Distribution in Cloud Environment Using Key Aggregation Cryptic”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.15-19, 2016.
[9] SO. OKOLIE, BT. ADETOBA, “Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms”, International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.3, pp.1-6, 2016.
[10] Sachin sharma, Jeevan Singh Bisht, “Performance Analysis of Data Encryption Algorithms”, International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.1, pp.1-5, 2015.
Citation
P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma, "Image Encryption and Decryption System Using AES for Secure Transmission," International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.109-114, 2017.
A Framework for Management and Monitoring of QoS-based Cloud Services
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.115-119, May-2017
Abstract
Cloud computing provides dynamic and scalable environment for the benefit of end users to offer services which are known as cloud services. Due to on- demand, scalability low operational cost benefits the customers using cloud service is increasing day by day. Thus, the biggest and major challenges in the cloud environment is maintaining the Quality-of-Service (QoS), where cloud provider has to manage the resources in such a way that they will able to provide promised QoS metrics such as, performance, availability, reliability and cost. Cloud services are offered depends on Service Level Agreements (SLAs), an official agreement between cloud provider and user. To measure what quality of the services is offered by the cloud provider, we require monitoring the cloud computing services. Monitoring is important for both customer and service provider. The monitoring status helps cloud provider to improve their services and also helps the customer to know whether they are receiving the promised QoS or not. In this paper, we proposed the general framework and addressed the different aspects related to management and monitoring of QoS-based cloud computing services. We also discuss the key issues and challenges of QoS-based cloud services.
Key-Words / Index Term
Cloud Service Monitoring, Service Level Agreement, Qos, Cloud Service, QoS Management
References
[1] D. Ardagna, G. Casale, M. Ciavotta, J.F Pérez, W. Wang. "Quality-of-service in cloud computing: modeling techniques and their applications", Journal of Internet Services and Applications, Vol.25, Issue.1, pp.1-11, 2014.
[2] S. Ayyub, D. Roy, “Cloud Computing Characteristics and Security Issues”, International Journal of Computer Sciences and Engineering, Vol.1, Issue.4, pp.18-22, 2013.
[3] M. Lagwal, N. Bhardwaj, "A Survey On Load Balancing Methods and Algorithms in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.46-51, 2017.
[4] RP. Sarang, RK. Bunkar, "Study of Services and Privacy Usage in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.7-12, 2013.
[5] F. Jrad, J. Tao, A. Streit, "SLA based Service Brokering in Intercloud Environments", CLOSER, Portugal, pp.76-81,2012.
[6] D. Kourtesis, J.M. Alvarez-Rodríguez, I. Paraskakis, "Semantic-based QoS management in cloud systems: current status and future challenges", Future Generation Computer Systems, Vol.3, Issue.2, pp. 307-323, 2014.
[7] P. Zhang, Z. Yan, “A QoS-aware system for mobile cloud computing”, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS),US, pp.518-522, 2011.
[8] KJ Modi, DP. Chaudhury, G. Garg, “An Ontology- based Approach for Automatic Cloud Service Monitoring and Management”, International Conference on Big-Data and Cloud Computing (ICBDCC`17), NY, pp153,157, 2017
[9] Q. Zhang, L. Cherkasova, E. Smirni, “A regression-based analytic model for dynamic resource provisioning of multi-tier applications”, Fourth International Conference on Autonomic Computing, Jacksonville, pp 27-27, 2007.
[10] H. Goudarzi, M. Pedram”, Multi-dimensional SLA-based resource allocation for multi-tier cloud computing systems”, IEEE 4th International Conference on Cloud Computing, Washington, pp. 324-331, 2011.
[11] V. Patidar, M. Kumbhkar, "Analysis of Cloud Computing Security Issues in Software as a Service", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.3, pp.1-5, 2014.
[12] B. Addis, D. Ardagna, B. Panicucci, M. S. Squillante, L. Zhang, "A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms", IEEE Transactions on Dependable and Secure Computing, Vol. 10, No. 5, pp. 253-272, 2013.
Citation
K. J. Modi, D.P. Chowdhury, "A Framework for Management and Monitoring of QoS-based Cloud Services," International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.115-119, 2017.
Building an Effective and Comfy Query services with RSAP Data Perturbation in the Cloud
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.120-123, May-2017
Abstract
Presently a day`s cloud is more prominent well known because of the reality in cloud clients have the information and transfer gigantic contained insights. It has enormous databases to database supplier sellers so database supplier suppliers keep the offerings of assortment inquiry offerings. In blurring system, a couple of clients have a tricky individual records in that situation purchasers can`t move the records for facilitating until we offer wellbeing, classification, immaculateness, address privateness are ensured to the facilitated actualities. In this paper, we proposed new contraption that is RASP RAndom space Perturbation. In this approach enhance the range seek with more grounded assaults that recovering than officially show techniques. In RASP is actualities bother way to deal with upgrade secured and proficient question, kNN inquiry bearer offers the included data inside the cloud. In RASP records bother approach consolidate dimensionality development and request protecting encryption. Arbitrary commotion infusion, irregular projection to assault the bothered insights and inquiries the utilization of the strong recovering assaults, it is under quiet ordering levels. This grants permits to speedup assortment inquiry handling for that include effectively introduce ordering techniques, strategy the kNN inquiries the kNN –R set of tenets is particularly intended for work with a RASP extend address calculations that encourages improve the way of kNN questions.
Key-Words / Index Term
Confidentiality, kNN-R Algorithm, RASP Algorithm, Query Processing
References
[1] ES. Elizabeth, MK. Padmaveni, “Confidential and Efficient Query Services in the Cloud”, IJREAT International Journal of Research in Engineering and Advanced Technology, Vol.2, Issue.1, pp.15-21, 2014.
[2] H. Xu, S. Guo, K. Chen, “Building confidential and efficient query services in the cloud with rasp data perturbation”, IEEE transactions on knowledge and data engineering, Vol.26, No.2, pp.322-335, 2014.
[3] S. Ayyub, D. Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Vol.1, Issue.4, pp.18-22, 2013.
[4] V.K. Saxena, S. Pushkar, "Privacy Preserving using Encryption Proxy in Data Security", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.36-41, 2017.
[5] K. Chen, L. Liu, G. Sun, “Towards Attack-Resilient Geometric Data Perturbation”, Proceedings of the 2007 SIAM International Conference on Data Mining, Minnesota, pp.78-89, 2007.
[6] Vanajakshi Devi, Praveen Kumar, “Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption”, International Journal of Science and Research (IJSR),Vol.4, Issue.4, pp.3087-3089, 2015.
[7] H. Hu, J. Xu, C. Ren, B. Choi, “Processing private queries over untrusted data cloud through privacy homomorphism”, Proceedings of IEEE International Conference on Data Engineering (ICDE), NY, pp.601-612, 2011.
[8] B. Chor, E. Kushilevitz, O. Goldreich, M. Sudan, “Private information retrieval”, ACM Computer Survey, Vol.45, No. 6, pp. 965-981, 1998.
[9] H. Hu, J. Xu, C. Ren, B. Choi, “Processing private queries over untrusted data cloud through privacy homomorphism”, Proceedings of IEEE International Conference on Data Engineering (ICDE), Germany, pp. 601-612, 2011.
Citation
K.P. Kumar, Z. Mihret, "Building an Effective and Comfy Query services with RSAP Data Perturbation in the Cloud," International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.120-123, 2017.
An Exhaustive Survey on Security Solutions in MANETs
Survey Paper | Journal Paper
Vol.5 , Issue.5 , pp.124-131, May-2017
Abstract
Wireless adhoc network is a self arranged wireless network comprised of large number of self controlled sensor nodes or mobile nodes. These self controlled nodes are randomly distributed in a decentralized network. These nodes connect with others node using the connectionless links. They have no information about location of other nodes. They are communicating with each other by sensing the position of every other node. They can sense within some specific transmission range. They possess the non uniform structure. Because of their non uniform structure and decentralized nature, wireless network may prone to various attacks so secure routing in wireless network is a critical task. It may consist of some trusted node or it may contain some malicious node, so it is difficult to detect whether the packet is forward to trusted or malicious nodes. So for this kind of problem several security techniques have been proposed. But a full proof protocol is yet to be discovered to handle all the attacks in an integrated manner and therefore still it is a challenge for new researchers. In this survey paper, various existing security protocol have been discussed in details. This Paper is a survey about what are the various types of attacks can occur in routing Protocol and how the security technique is followed in a particular protocol.
Key-Words / Index Term
WSN, Routing protocol, security, attacks, malicious node, packet
References
[1] R. S. Shaktawat ,D. Singh ,N. Choudhary, “An Efficient Secure Routing Protocol in MANET Security - Enhanced AODV (SE-AODV) ”, International Journal of Computer Applications, Vol.97, No.8, pp.1-12, 2014.
[2] A. K. Gupta, D. Mehrotra, “Detecting and Dealing with Malicious Nodes Problem in MANET”- International Journal of Scientific & Engineering Research, Vol.4, Issue.7, pp.61-68, 2013.
[3] A. Vijayan, T. Thomas, “Anonymity, Unlinkability and Unobservability in Mobile Ad Hoc Networks”, International Conference on Communication and Signal Processing, India pp.3-5, 2014.
[4] PK. Sharma, SL. Mewada, P. Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
[5] G. Kalpana, S. Archana, "Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET", International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.133-138, 2015.
[6] M. Jamgade , V. Shukla , “Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.145-150, 2016.
[7] M. Nachammai and N. Radha, "Survey on Black Hole and Gray Hole Attacks in MANET", International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.66-70, 2016.
[8] Y. Zeng, R. Zhang, "Active eavesdropping via spoofing relay attack", 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, pp.2159-2163, 2016.
[9] X. Li, H.-N. Dai, Y. Wang, H. Wangt, “Eavesdropping Activities in Wireless Networks: Impact of Channel Randomness”, TENCON- IEEE Region 10 Conference, Macao, pp.1-4, 2015.
[10] S. Anusuya, S. Meenakshi, "An Improved Dynamic Source Routing Protocol for Detection and Removal of Black Hole Attack in Mobile Ad-Hoc Network", International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.112-117, 2015.
[11] A. Saraf, M. Singh, "A Trust Proxy Node (TPN) Based Black hole Attack Detection Mechanism in MANET Using AODV", International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.130-135, 2015.
[12] K. Thamizhmaran, R. S. K. Mahto, V. S. K. Tripathi, “Performance Analysis of Secure Routing Protocols in MANET”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.1, Issue.9, pp.151-154, 2012.
[13] Usha MK, A.S. Poornima, “Node-To-Node Authentication Protocol to Prevent Black Hole Attack in AODV”, 2016 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), Chennai, pp. 133-136, 2016.
[14] S.V. Baghel, D.P. Theng, "A survey for secure communication of cloud third party authenticator", 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, pp.51-54, 2015.
[15] R. Ramanujan, A. Ahamad, J. Bonney, R. Hagelstrom, K. Thurber, “Techniques for intrusion-resistant ad hoc routing algorithms (TIARA)”, MILCOM 2000 21st Century Military Communications Conference Proceedings, USA, pp.660664, 2000.
[16] UK. Singh, SL. Mewada, L. Laddhani, K. Bunkar, “An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)”, International Journal of Computer Science and Information Security, Vol.9, No.4, pp.106-111, 2011.
[17] Y.C. Hu, A. Perrig , D. B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks”, Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, pp. 1976-1986, 2003.
[18] H. Tran, Hans-Jurgen Zepernick, “Proactive Attack: A Strategy for Legitimate Eavesdropping”, 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), Ha Long, pp. 457-461, 2016.
[19] J.A.N. Sidnal, “Survey - Secure Routing Protocols of MANET”, International Journal of Applied Information Systems , Vol.5, No.4, pp.1-8, 2013.
[20] S. Mewada, UK. Singh, PK. Sharma, “Simulation Based Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks (MANET)", International Journal of Computer Science, Information Technology and Security, Vol. 2, No. 4, pp.728-732, 2012.
[21] D. Airehrour, J. Gutierrez , S.K. Ray, “GradeTrust: A Secure Trust Based Routing Protocol For MANETs”, 2015 International Telecommunication Networks and Applications Conference, Sydney, pp.65-70, 2015.
[22] S.K. Dhurandher, I. Woungang, I. Traore, “C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile AdHoc Networks”, 2014 28th International Conference on Advanced Information Networking and Applications Workshops, Victoria, pp.530-535, 2014.
[23] UK. Singh, J. Patidar, KC. Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
[24] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013.
[25] D.D. Punwatkar, K.N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.65-69, 2014.
[26] D. Dave, P. Dave, “An Effective Black Hole Attack Detection Mechanism using Permutation Based Acknowledgement in MANET”, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, pp. 1690-1696, 2014.
Citation
K.B. Kalambe, S.M. Apte, "An Exhaustive Survey on Security Solutions in MANETs," International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.124-131, 2017.