De-duplication with Authorization in Hybrid Cloud Approach for Security
Research Paper | Journal Paper
Vol.04 , Issue.04 , pp.1-4, Jun-2016
Abstract
In cloud computing, most of the communication is done in consideration of file processing, and therefore it turn out to be very critical and important to deliver competent method for data security. The main focus in on data deduplication to provide security services over cloud for stored files. Data deduplication is data compression that is used to eliminate the matching copies of echoing data. This procedure is frequently used for reducing the storage space and save bandwidth over cloud. The term deduplication used for data security and privacy offers to the stored data files, Also encryption methods are applied to stored file information for more security purpose. In this paper we have studied the authorized data deduplication technique for providing security by using user’s differential privileges. Novel deduplication structures are offered for supporting authorized duplicate check. This paper shows how the security is achieved in hybrid cloud throughout the data deduplication process.
Key-Words / Index Term
Data Security,Data Deduplication,, Privilege authorization, Hybrid Cloud
References
[1] Guljar P. Shaikh,S. D. Chaudhary, PriyankaPaygude and Debnath Bhattacharyya, “Achieving Secure Deduplication by Using Private Cloud and Public Cloud”, In International Journal of Security and Its Applications Vol. 10, No. 5, 2016, pp.17-26.
[2] Jin Li,yan kit li,xiaofengchen,patrickP.C.lee and wenjinglou,“A Hybrid Cloud Approach for Secure Authorized Deduplication”, In IEEE Transactions on Parallel and Distributed Systems, April 7,2015,pp 1206 – 1216, DOI:10.1109/TPDS.2014.2318320.
[3] MihirBellare, SriramKeelveedhi, and Thomas Ristenpart, “Dupless: Serveraided encryption for deduplicated storage”, In USENIX Security Symposium, Washington DC, August 14-16, 2013, pp 179-194.
[4] MihirBellare, SriramKeelveedhi, and Thomas Ristenpart, “Message-locked encryption and secure deduplication”, in proceedings of EUROCRYPT, Athens Greece, March 3, 2013, pp 296–312.
[5] ShaiHalevi, Danny Harnik, Benny Pinkas, and Alexandra Shulman-Peleg, “Proofs of ownership in remote storage systems”. In Proceedings of the 18thACM Conference on Computer and Communications Security, Hangzhou, China, 2011,pp 491–500.
[6] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. “Twin clouds: An architecture for secure cloud computing”. In Workshopon Cryptography and Security in Clouds (WCSC 2011), 2011
[7] Jin Li, XiaofengChen,MingqiangLi,Jingwei Li and Patrick P. C. Lee, “Secure Deduplication with Efficient and Reliable Convergent Key Management”, In IEEE Transactions on Parallel and Distributed Systems, May 12, 2014.pp 1615 – 1625, DOI: 10.1109/TPDS.2013.284.
[8] J. Yuan and S. Yu. “Secure and constant cost public cloud storage auditing with deduplication”. IACR Cryptology ePrint Archive, 2013:149, 2013.
[9] M. Bellare, C. Namprempre, and G. Neven, “Security proofs foridentity-based identification and signature schemes,” J. Cryptol.,vol. 22, no. 1, pp. 1–61, 2009.
[10] P. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” in Proc. 24th International Conference Large Installation System Admin., 2010, pp. 29–40.
[11] W. K. Ng, Y. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,” in Proc. 27th Annual ACM Symp. Appl. Computer, 2012, pp. 441–446.
[12] Qinlu He, Zhanhuai Li, Xiao Zhang, “Data Deduplication Techniques”, in International Conference on Future Information Technology and Management Engineering, China, 2010, pp.43-433.
[13] D. Meister and A. Brinkmann, “Multi-Level Comparison of Data Deduplication in a Backup Scenario”, SYSTOR '09 Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, ISBN: 978-1-60558-623-6, Article No. 8, ACM New York, NY, USA ©2009.
Citation
Guljar P. Shaikh, "De-duplication with Authorization in Hybrid Cloud Approach for Security", International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.1-4, 2016.
Cloud Based Big Data Processing Approaches
Research Paper | Journal Paper
Vol.04 , Issue.04 , pp.5-8, Jun-2016
Abstract
Nowadays Big data processing in cloud has become a challenging task. This paper describes the basics of cloud computing and current big-data processing approaches in cloud such as batch-based, stream-based, graph-based, DAG-based, interactive-based, visual-based and summarizes the strengths and weaknesses of these approaches in order to help the future big data research scholars to select the appropriate processing technique.
Key-Words / Index Term
Big data, Cloud, Data processing in cloud, Big data processing, Big Data processing approaches
References
[1] B. D. Martino, R. Aversa, G. Cretella, et al., “Big data (lost) in the cloud,” International Journal of Big Data Intelligence, vol. 1, no. 1, pp. 3–17, 2014. doi:10.1504/IJBDI.2014.063840.
[2] A. A. Chandio, F. Zhang, and T.D. Memon, “Study on LBS for characterization and analysis of big data benchmarks,” Mehran University Research Journal of Engineering and Technology, vol. 33, no. 4, pp. 432–440, Oct. 2014.
[3] GigaSpaces. (2013). Big Data Survey [Online]. Available: http://www.gigaspaces.com
[4] Q. Li, T. Zhang, and Y. Yu, “Using cloud computing to process intensive floating car data for urban traffic surveillance,” International Journal of Geographical Information Science, vol. 25, no. 8, pp. 1303–1322, Aug. 2011. doi: 10.1080/13658816.2011.577746.
[5] Z. Li, C. Chen, and K. Wang, “Cloud computing for agent-based urban transportation systems,” IEEE Intelligent Systems, vol. 26, no. 1, pp. 73–79, 2011. doi: 10.1109/MIS.2011.10.
[6] S. Seo, E. J. Yoon, J. Kim, et al., “Hama: an efficient matrix computation with the mapreduce framework,” in IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, USA, 2010, pp. 721–726. doi:10.1109/CloudCom.2010.17.
[7] G. Malewicz, M. H. Austern, A. J. C Bik, et al., “Pregel: a system for large-scale graph processing,” in ACM SIGMOD International Conference on Management of Data, Indianapolis, USA, 2010, pp. 135–146. doi: 10.1145/1807167.1807184.
[8] M. Isard, M. Budiu, Y. Yu, et al., “Dryad: distributed data-parallel programs from sequential building blocks,” in EuroSys'07, Lisboa, Portugal, 2007.
[9] Apache. (2013). Apache Mahout [Online]. Available: http://mahout.apache.org/
[10] Pentaho. (2013). Pentaho Big Data Analytics [Online]. Available: http://www.pentaho.com/product/big-data-analytics.
[11] Skytree. (2013). Skytree The Machine Learning Company [Online]. Available:http://www.skytree.net/
[12] Karmasphere. (2012). FICO Big Data Analyzer [Online] Available:http://www.karmasphere.com/
[13]Datameer. (2013). Datameer [Online]. Available: http://www.datameer.com/
[14]Cloudera. (2013). Cloudera [Online]. Available: http://www.cloudera.com/
[15] Apache. (2012). Apache Storm Project [Online]. Available: http://www.stormproject.net
[16]L. Neumeyer, B. Robbins, A. Nair, et al., “S4: distributed stream computing platform,” in IEEE International Conference on Data Mining Workshops, Sydney, Australia, 2010, pp. 170–177. doi: 10.1109/ICDMW.2010.172.
[17] SQLstrean. (2012). SQLstream s-Server [Online]. Available:http://www.sqlstream.com/blaze/s-server/
[18] Apache. (2011). Apache Giraph [Online]. Available: http://giraph.apache.org/
[19] Tableau. (2013). Tableau [Online]. Available: http://www.tableausoftware.com/
[20] Talend. (2009). Talend Open Studio [Online]. Available: https://www.talend.com/
[21] Aftab A. Chandio, Nikos Tziritas, Cheng-Zhong Xu, “Big-Data Processing Techniques and Their Challenges in Transport Domain”, DOI: 10.3969/j.issn.1673-5188.2015.01.007
[22]Poornima Sharma,Varun Garg, Prof. Randeep Kaur, Prof. Satendra Sonare, “Big Data in Cloud Environment”, International Journal of Computer Sciences and Engineering, Volume-01, Issue-03, Page No (15-17), Nov -2013, E-ISSN:2347-2693.
Citation
Rashmi. G, S. Sathish Kumar , "Cloud Based Big Data Processing Approaches", International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.5-8, 2016.
A Survey Paper on Data security in Cloud Computing
Survey Paper | Conference Paper
Vol.04 , Issue.04 , pp.9-13, Jun-2016
Abstract
Cloud computing is group of services for example software system storage, network and hardware these type of services are provided to user. Cloud storage is easily access anywhere anytime of the data because cloud is work in remote location. It uses the storage service provided by the cloud provider. Data is not secure in the cloud because the unauthorized user can try to use of the private data. So providing the data security it uses the different encryption method to protect the data. So that in the proposed study it use the multilevel encryption algorithm. In the multilevel encryption it combines two different algorithms for providing the better security.
Key-Words / Index Term
Component; Cloud Computing,Data Security,Encryption Algorithm
References
[1] P. Mell and T. Grance, The NIST Definition of Cloud Computing, version 15, October 7, 2009, National Institute of Standards and Technology (NIST), Information Technology Laboratory (www.csrc.nist.gov).
[2] Parneet Kaur and Sachin Majithia, "Various Aspects for Data Migration in Cloud Computing and Related Reviews", International Journal of Computer Sciences and Engineering, Volume-02, Issue-07, Page No (83-85), Jul -2014, E-ISSN: 2347-2693
[3] Sandha, M.Ganaga Durga,” Study on Data Security Mechanism in Cloud Computing”,IEEE conference no-33344.
[4] William Stallings, Cryptography and Network Security: Principles and Practices, Fifth edition, Prentice Hall, ISBN-13: 978- 0136097044, 2010.
[5] Balachandra Reddy Kandukuri, Rama Krishna Paturi and Dr. AtanuRakshit, “C loud security issues” In Services Computing, 2009. IEEE International Conference on, page 517520, 2009.
[6] Neha Jain and Gurpreet Kaur ‘Implementing DES Algorithm in Cloud for Data Security” VSRD International Journal of CS & IT Vol. 2 Issue 4, pp. 316-321, 2012.
[7] Amazon Web Services: Overview of Security Processes, may 2011.
[8] L. M. Kaufman, "Data security in the world of cloud computing,"IEEE Security & Privacy Magazine, vol. 7, pp. 61-64, July2009.
[9] P.Shanthi Bala,” Intensification of Educational Cloud Computing and Crisis of Data Security in Public Clouds”,IJCSE Vol. 02, No. 03, 2010, 741-745.
[10] K Hashizume et al., An analysis of security issues for cloud computing, Journal of Internet Services and Applications, a Springer open journal, pp 1-13, 2013.
[11] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka,and J. Molina. Controlling data in the cloud: Outsourcing computation without outsourcing control. pages 85–90, 2009
[12] Wang, J.K.; Xinpei Jia, Data Security and Authentication in hybrid cloud computing model, Global High Tech Congress on Electronics (GHTCE), 2012 IEEE, On page(s): 117-120.
[13] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013.
[14] K. Dubey, M. Namdev, S. Shrivastava, “Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment”, IEEE sixth international conference, 2012.
[15] Prakash G. L , Dr. Manish Prateek, Dr Inder Singh, ,“Efficient Data Security Method to Control Data in Cloud Storage System using Cryptographic Techniques ”,IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014, Jaipur, India
Citation
Sajjan R.S., Vijay Ghorpade and Vishvajit Dalimbkar, "A Survey Paper on Data security in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.9-13, 2016.
Arduino Applications for Smart Cities
Review Paper | Conference Paper
Vol.04 , Issue.04 , pp.4-20, Jun-2016
Abstract
As India’s population continues to grow, more citizens will move to cities leading to massive urbanization. India needs to ¬adopt smarter ways to manage complexities by developing smart cities. The Smart Cities projects involve creating an innovation network between governments and academic partners leading to excellence in the development. Devices like Drones are going to be predominant in achieving tasks to be done in these smart cities. Arduino as a supporting software along with required hardware support is a bliss to develop small applications required for smart cities. It is open source and hence supporting to use. Arduino is a company of a different type It is a project and user community that designs and manufactures microcontroller-based kits for building digital devices and interactive objects by sending a set of instructions to the microcontroller that can sense and control objects in the physical world. In this paper we present the Arduino environment and its use to build smart city applications.
Key-Words / Index Term
Arduino;microcontroller;programming;UNO;Integrated Development Environment;Smart City;Serial port
References
[1] Mishra Y.;Marwah G. K.;Verma S.,”Arduino Based Smart RFID Security and Attendance System with Audio Acknowledgement”, International Journal of Engineering Research & Technology (IJERT) Vol. 4, Issue 01,2015.
[2] Khurshid, J.,”Military robots - a glimpse from today and tomorrow”Control, Automation, Robotics and Vision Conference,ICARCV ,Volume:1,IEEE,ISBN-7803-8653-1,2004
[3] Smart Cities India 2015 Brochure,” Smarter Solutions for a Better Tomorrow” Pragati Maidan, New Delhi 20th -22th May, 2015.
[4] Molina C. P.;Ortego R. G.;Pérez F. M., “Perspectives on Technological Developments Applied to Robotics”, The Robotics Divide,2013.
[5] Lin Patrick ; Bekey George ; Abney Keith,“Autonomous Military Robotics: Risk, Ethics, and Design”, ADA534697, California Polytechnic State Univ SAN LUIS OBISPO,2008.
[6] Howlader D.;Giordano J.,” Advanced Robotics: Changing the Nature of War and Thresholds and Tolerance for Conflict - Implications for Research and Policy”,The Journal of Philosophy, Science & Law Volume 13, pages(1-19), May 24 2013.
[7] Da Silva F. B.;Scott S. D.;Cummings M. L.,”Design Methodology for Unmannded Aerial Vehicle (UAV), Prepared For Boeing Phantom Works”,HAL,May 2007.
[8] Mellis D.;Banzi M.;Cuartielles D.;Igoe T., ”Arduino: An open electronic prototyping platform”, in Proc. CHI, vol. 2007.
[9] Tariq Ahmad Sherasiya ; Hardik Upadhyay ; Hiren B. Patel ,” A survey: intrusion detection system for internet of things”, issn(p): 2278-9960; issn(e): 2278-9979 vol. 5, Issue 2, Feb - Mar 2016.
[10] Gibb M, “ New media art, design, and the Arduino microcontroller: A malleable tool ”,PhD thesis, Pratt Institute, 2010.
[11] Boxall J,”Arduino Workshop: A Hands-on Introduction with 65 Projects”,2013.
[12] Badamasi, Y.A. ,”The working principle of an Arduino” 11th International Conference on
Citation
Shruti S. Gadgil, Ruby R. Lobo, "Arduino Applications for Smart Cities", International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.4-20, 2016.
Cloud Resourse Virtualization
Review Paper | Conference Paper
Vol.04 , Issue.04 , pp.21-27, Jun-2016
Abstract
Internet, it is a large collection of networks where resources are globally networked, in internet cloud computing plays a major role in order to share the data and one of the important technology in the cloud computing is virtualization. Mainly it is used to maintain the collection IT resources which are used by the cloud providers. The main aim of the virtualization is ability to run the multiple operating systems on a single machine buy sharing all the resources that belong to the hard ware as well as it enables industry or academic IT resources through on-demand allocation dynamically. The resources have different forms such as network, server, storage, application and client. In this paper our main goal is to provide the basic knowledge about the virtualization technology in cloud computing and how it acts in the cloud computing environment. And we also discuss about, how to maintain the virtualized environment with the optimized resources.
Key-Words / Index Term
Virtualization;virtualizedServers;cloudcomputing;Networkvirtualization;Hypervisor
References
[1].Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013.
[2]. Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma, “Security Based Model for Cloud Computing”, International Journal of Computer Networks and Wireless Communications Vol. 1, No. 1, pp (13-19), December 2011.
[3]. Parneet Kaur and Sachin Majithia, "Various Aspects for Data Migration in Cloud Computing and Related Reviews", International Journal of Computer Sciences and Engineering, Volume-02, Issue-07, Page No (83-85), Jul -2014,
[4]. Thomas Serling And Dylan Stark “Cloud Comuting HPC”,1521-9615/09/$25.00 © 2009 ieee, copublished by the ieee CS and the aip.
[5]. G. J. Popek and R. P. Goldberg, "Formal requirements for virtualizable third generation architectures," Comm. ACM, vol. 17, no. 7, pp. 412-421,1974.
[6] Krishna tej Koganti 1 , Eswar Patnala 2 , Sai Sagar Narasingu 3 , J.N. Chaitanya 4,” Virtualization Technology in Cloud Computing Environment”, (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 3, March 2013.
[7]. Amol Selokar 1 , Prof.S.D.Zade 2 , Prof.C.U.Chavan 3,” Survey on Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment”, Vol. 3, Issue 5, May 2014.
[8]. N.M. Mosharaf Kabir Chowdhurya,1 , Raouf Boutaba b,c, “A survey of network virtualization”, IEEE Std 802.1Q-s2005 (May 2005).
[9]. Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen and Zhenghu Gong “Cloud Computing Characterstics”, 1530-2016/10 $26.00 © 2010 IEEE DOI 10.1109/ICPPW.2010.
[10]. Attila Kertesz (MTA SZTAKI),Gabor Kecskemeti (MTA SZTAKI) and SIvona Brandic,” Autonomic Resource Virtualization in Cloud-like Environments”, December 14, 2009.
[11]. D. Armstrong and K. Djemame, Performance issues in clouds: An evaluation of virtual image propagation and I/O paravirtualization, The Computer Journal, vol. 54, no.6, pp. 836-849, 2011.
[12]. L.S. Committee, IEEE Standard for Local and Metropolitan Area Networks—Virtual Bridged Local Area Networks, IEEE Std 802.1Q-s2005 (May 2006).
[13]. J.Praveen Immauel Paulraj and R.KannigaDevi,” Efficient Resource Provisioning Using Virtualization Technology in Cloud Environment”, Volume 3, Special Issue 3, March 2014.
[14]. Jia Rao, Member, IEEE, Yudi Wei, Student Member, IEEE, Jiayu Gong, Member, IEEE, and Cheng-ZhongXu, “QoS Guarantees and Service Differentiation for Dynamic Cloud Applications”, 2012.
[15]. D. Armstrong and K. Djemame, Performance issues inclouds: An evaluation of virtual image propagation and I/O paravirtualization, The Computer Journal, vol. 54, no.6, pp. 836-849, 2011.
[16]. A. Quiroz, H. Kim, M. Parashar, N. Gnanasambandam, and N.Sharma, Towardsautonomicworkloadprovisioning for enterprise grids and clouds, in Grid Computing, 2009 10th IEEE/ACM International Conference on, 2009, pp. 50-57.
[17]. N. Huber, S. Becker, C. Rathfielder, J. Schweflinghaus and R. H. Reussner, Performance modeling in industry:A case study on storage virtualization, in Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, Cape Town, South Africa, 2010.
[18]. S. Verboven, K. Vanmechelen, and J. Broeckhove, Black box scheduling for resource intensive virtual machine workloads with interference models, Future Generation Computer Systems, vol. 29, no. 8, pp. 1871-1884, 2013.
[19]. P. Padala, K.-Y. Hou, K.G. Shin, X. Zhu, M. Uysal, Z. Wang, S. Singhal, and A. Merchant, “Automated Control of Multiple Virtualized Resources,” Proc. ACM European conf. Computer Systems (EuroSys ’09), 2009.
[20] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, “Xen and the Art of Virtualization,” Proc. ACM Symp. Operating Systems principles (SOSP ’03), Oct. 2003.
[21]. V. Aggarwal, X. Chen, V. Gopalakrishnan, R. Jana, K. K. Ramakrishnan, and V. Vaishampayan, “Exploiting virtualization for delivering cloud-based IPTV services,” in Proc. IEEE Conf.Computer Communications Workshops (INFOCOM WKSHPS), Apr.2011.
[22]. V. Aggarwal, V. Gopalakrishnan, R. Jana, K. K. Ramakrishnan, and V. Vaishampayan, “Optimizing cloud resources for delivering IPTV services through virtualization,” in Proc. IEEE Int. Conf.Communication Systems and Networks (COMSNETS), Jan. 2012.
Citation
Ms. Kalburgi Tayyaba Md.Ibrahim,Ms. Sajjan R.S., "Cloud Resourse Virtualization", International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.21-27, 2016.
Enterprise Architecture and Services in Cloud Computing: A Survey
Survey Paper | Conference Paper
Vol.04 , Issue.04 , pp.28-34, Jun-2016
Abstract
Cloud computing provides services such as software, platform, storage, applications, network, etc, over the Internet based on a pay-as-you-use approach. Cloud computing is a business model or key tool in the IT world. Organizations experience increasing pressure to change or move organization to respond continuously in changing environment. Enterprise Architecture can be used to solve this challenge. With cloud services and deployment models, the organizations can upgrade their existing Information Technology provision. Enterprise Architecture is a layered architecture which helps not only to build Information Technology models but also makes the organization up to date. Enterprise Architecture describes the process for an organization to achieve short-term and long-term goals. Enterprises incorporating appropriate Enterprise Architecture can upgrade their architectures by integrating the existing infrastructure with the Platform as a Service and Infrastructure as a Service support. They can extend 4-dimensions of Enterprise Architecture such as, data, business, application and technology architecture by utilizing the Platform as a Service and Software as a Service. Thus, Cloud Computing can provide a foundation to build new Enterprise Architecture for organization, on demand with cost effective manner.
Key-Words / Index Term
Cloud Computing; Enterprise Architecture; Enterprise Architecture Framework; Cloud Computing and Enterprise Architecture
References
[1] The Institute of Electrical and Electronics Engineers (IEEE) definition of architecture: Rich Hilliard, “IEEE-Std-1471-2000 Recommended Practice for Architectural Description of Software-Intensive Systems”,http://www.enterprise-architecture.info/Images/Documents/IEEE%201471-2000.pdf
[2] Parneet Kaur and Sachin Majithia, "Various Aspects for Data Migration in Cloud Computing and Related Reviews", International Journal of Computer Sciences and Engineering, Volume-02, Issue-07, Page No (83-85), Jul -2014,
[3] J.A. Zachman, “A Framework for Information Systems Architecture”, IBM Systems Journal VOL 26. NO 3, 1987, https://www.zachman.com/images/ZI_PIcs/ibmsj2603e.pdf
[4] The_Open_Group_Architecture_Framework, “TOGAF® Version 9.1, an Open Group Standard”, http://pubs.opengroup.org/architecture/togaf9-doc/arch/
[5] Peter Mell Timothy Grance”, The NIST Definition of Cloud Computing”, National Institute of Standards and Technology Special Publication 800-145(September 2011),csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[6] “A Common Perspective on Enterprise Architecture “ Developed and Endorsed by The Federation of Enterprise Architecture Professional Organizations, Common-Perspectives-on-Enterprise-Architecture-v15.pdf
[7] Z. Mahmood and R. Hill (eds.), “Cloud Computing for Enterprise Architectures”, Computer Communications and Networks, DOI 10.1007/978-1-4471-2236-4_1, © Springer-Verlag London Limited 2011, Zaigham Mahmood, “Cloud Computing for Enterprise Architectures: Concepts, Principles and Approaches”, Page No. ( 3-18)
[8] Zachman, J.A, Zachman on the Framework, Zachman Institute for Framework Advancement (ZIFA) , www.zifa.com
[9] 11Mahmood H. Shah and Zaigham Mahmood, “Frameworks for Building Enterprise Information Architectures”
[10] James E.A.Richards,” Using the Department of Defense Architecture Framework to Develop Security Requirements”, February 7, 2014 The SANS Institute, https://www.sans.org
[11] DoDAF Architecture Framework Version 2.02, Page No. (3-3,105-202), http://dodcio.defense.gov/Portals/0/Documents/DODAF/DoDAF_v2-02_web.pdf
[12] The_Open_Group_Architecture_Framework, “TOGAF® Version 9.1, an Open Group Standard “, http://pubs.opengroup.org/architecture/togaf9-doc/arch/
[13] Antonio Vallecillo, “RM-ODP: The ISO Reference Model for Open Distributed Processing”
[14] Kerry Raymond, “Reference Model for Open Distributed Processing (RM-ODP): Introduction”, Springer.
[15] https://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/fea_v2.pdf
[16] Z. Mahmood and R. Hill (eds.), “Cloud Computing for Enterprise Architectures”, Computer Communications and Networks, DOI 10.1007/978-1-4471-2236-4_1, © Springer-Verlag London Limited 2011,Pethuru Raj and Mohanavadivu Periasamy, “The Cloud Challenges for Enterprise Architects”, Page No.(198-199)
[17] Z. Mahmood and R. Hill (eds.), “Cloud Computing for Enterprise Architectures”, Computer Communications and Networks, DOI 10.1007/978-1-4471-2236-4_1, © Springer-Verlag London Limited 2011, Siavash Moshiri and Richard Hill, “Enterprise Architecture Fundamentals”, page No.( 32-38)
Citation
Sajjan R.S., Biradar Rekha Yashwantrao, Torvi Harshal, "Enterprise Architecture and Services in Cloud Computing: A Survey", International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.28-34, 2016.
High Performance In Cloud Computing
Review Paper | Conference Paper
Vol.04 , Issue.04 , pp.35-42, Jun-2016
Abstract
HPC applications nowadays are gaining huge attention in cloud computing arena. Majority of the HPC applications are used for scientific applications or purposes. They require huge CPU usage and tremendous data storage capabilities. Previously HPC applications required large set of interconnected computers in a network like clusters or supercomputers. These clusters are infeasible both financially and technically. But nowadays due to the advent of cloud computing scientific fraternity is able to reap the benefits of cloud computing due to the low cost and maintenance associated with HPC applications. Cloud computing also provides the benefits of Infrastructure as a Service (IaaS) and Platform as a Service(PaaS) both beneficial to the scientific community. Also Quality of Service(QoS) is an added advantage. This paper focuses on the present state of HPC applications as well as previous research done in this field.
Key-Words / Index Term
HighPerformanceComputing;CloudComputing;EC2;S3
References
[1] Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma, “Security Based Model for Cloud Computing”, International Journal of Computer Networks and Wireless Communications Vol. 1, No. 1, pp (13-19), December 2011.
[2] Manish Parashar, Moustafa AbdelBaky, Ivan Rodero, and Aditya Devarakonda.” Cloud Paradigms and Practices for Computational and Data-Enabled Science and Engineering”. IEEE Copublished by the IEEE CS and the AIP.
[3] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013
[4] Thomas Sterling and Dylan Stark.” A High-Performance Computing Forecast: Partly Cloudy”, 1521-9615/09/$25.00 © 2009 IEEE Copublished by the IEEE CS and the AIP.
[5] Parneet Kaur and Sachin Majithia, "Various Aspects for Data Migration in Cloud Computing and Related Reviews", International Journal of Computer Sciences and Engineering, Volume-02, Issue-07, Page No (83-85), Jul -2014,
[6] Robert C. Green, II, Lingfeng Wang, and Mansoor Alam.” Applications and Trends of High Performance Computing for Electric Power Systems: Focusing on Smart Grid”, IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013.
[7] Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen and Zhenghu GongDepartment of Computer Sciences National University of Defense Technology.” The Characteristics of Cloud Computing”, 1530-2016/10 $26.00 © 2010 IEEE DOI 10.1109/ICPPW.2010.45.
[8] Craig A. Lee, Member, IEEE, Samuel D. Gasster, Senior Member, IEEE, Antonio Plaza, Senior Member, IEEE, Chein-I Chang, Fellow, IEEE, and Bormin Huang.” Recent Developments in High PerformanceComputing for Remote Sensing: A Review”,ieee journal of selected topics in applied earth observations and remote sensing, vol. 4, no. 3, september 2011.
[9] Ye Xiaotao1, Lv Aili1, Zhao Lin2, Research of High Performance Computing With Clouds Proceedings of the Third International Symposium on Computer Science and Computational Technology(ISCSCT ’10) Jiaozuo, P. R. China, 14-15,August 2010, pp. 289-293.
[10] Christian Vecchiola1, Suraj Pandey1, and Rajkumar Buyya1,2”High-Performance Cloud Computing: A View of Scientific Applications’” Cloud computing and Distributed Systems (CLOUDS) Laboratory Department of Computer Science and Software Engineering.The University of Melbourne, Australia {csve, spandey, raj}@csse.unimelb.edu.au 2Manjrasoft Pty Ltd., Melbourne, Australia.
[11] Abhishek Gupta, Laxmikant V. Kale, Filippo Gioachin. “The Who, What, Why and How of High Performance Computing Applications in the Cloud”, HP Laboratories,HPL-2013-49.
[12] Benjamin P. Berman, Phil Maechling, Bruce Berriman, Gideon Juve, Ewa Deelman, Karan Vahi, Gaurang Mehta.” Scientific Workflow Applications on Amazon EC2” National Science Foundation under the SciFlow (CCF-0725332).
[13] Sanjay P. Ahuja, 2 Sindhu Mani.” The State of High Performance Computing in the Cloud” School of Computing, University of North Florida, Jacksonville, FL 32224.
[14] David Pellerin, Dougal Ballantyne, Adam Boeglin.A Document On “An Introduction to High Performance Computing on AWS” Amazon Web Services – August 2015.
[15] Jaliya Ekanayake and Geoffrey Fox” High Performance Parallel Computing with Clouds and Cloud Technologies” School of Informatics and Computing, Indiana University, Bloomington, IN 47405, USA.
[16] Raihan Masud” High Performance Computing with Clouds” raihan@cs.uoregon.edu.
[17] Shujia Zhou, , Ben Kobler, Dan Duffy,” Case Study for Running HPC Applications in Public Clouds” NASA Goddard Space Flight Center {shujia.zhou,benjamin.kobler,daniel.q.duffy,thomas.a.mcglynn}.
[18] Karthik Paladugu Sumanth Mukka,” Systematic Literature Review and Survey on High
Performance Computing in Cloud” Master’s Thesis Electrical Engineering September 2012.
[19] S. Wagner • A. Bode • H. Satzger • M. Brehm.A Book On” High Performance Computing
in Science and Engineering Garching/Munich 2012”.
Citation
Ms. Noorjahan Mohammed Rafique, Ms.Sajjan R.S., "High Performance In Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.35-42, 2016.
Multi-factor Authentication as a Service for Cloud Data Security
Review Paper | Conference Paper
Vol.04 , Issue.04 , pp.43-46, Jun-2016
Abstract
Cloud computing is a one of the emerging technology in IT industries nowadays. Cloud computing offers a wide range of services to its users. It delivers on demand services over internet with low cost investments. One of the service provided by cloud is data storage. But security and privacy of cloud data are main issues as cloud does not ensure the security aspects like confidentiality, integrity, identification etc. The cloud computing also enables users to access data from the cloud servers. To protect data access by unauthorized users, authentication plays an important role. Authentication is a first step for data security, through which user can establish proof of identities prior data access from system. In cloud computing environment, conventional authentication methods do not provide strong security against today’s most modern means of attacks. So cloud needs a dynamic approach for user authentication which should include more than one credentials for authentication. In this paper, we propose a data security architecture with a robust, dynamic and feasible Multi-Factor Authentication (MFA) scheme which integrates more than one factors like knowledge, possession, location and time, for cloud user authentication.
Key-Words / Index Term
cloud computing; data security; multi-factor authentication; one time password
References
[1] Mell, P; Grance, T.,”The NIST Definition of cloud computing” ,Version 15, Technical Report , Computer and Information Sciences, Volume-53 No.-06, pp (1-10), 2009.
[2] Banayal R.; Jain P.; Jain V.,“Multi-factor Authentication Framework for Cloud Computing”, IEEE Computer Scociety, Fifth International Conference on Computational Intelligence, Modelling and Simulation, pp (105-110), 2013. DOI 10.1109/CIMSim.2013.25.
[3] Wenyi Liu; A. Selcuk Uluagac; Beyah R., “MACA: A Privacy-Preserving Multi-factor Cloud Authentication System Utilizing Big Data”, IEEE INFOCOM Workshop on Security and Privacy in Big Data- 2014.
[4] Behrouz A. Forouzan, Handbook on, “Cryptography and network security”, Special Indian Edition-2007, Tata McGraw-Hill Forozan Networking Series, ISBN-13: 978-0-07-066046-5.
[5] William Stalling, A Handbook on, “Cryptography and network security- Principles and practice”,Pearson Education, Fifth edition -2010, ISBN-13: 978-0-1360-9704-4.
[6] Luis M.Vaquero; Luis Rodero-Merino; Juan Caceres, Maik Lindner,” A break in the clouds: Toward a cloud definition.” ACM SIGCOMM Computer Communication Review, Volume-39, No.-01, pp.( 50-55), 2009.
[7] C. Lin; Hwang, T.,”A password authentication scheme with secure password updating,” Computers & Security , volume- 22, pp (68-72), 2003.
[8] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013
[9] S. Lee; I. Ong; H.T. Lim; H.J. Lee, “Two factor authentication for cloud computing”, International Journal of KIMICS, volume-08, pp ( 427-10), 2009.
[10] Daniel Mouly, “Strong User Authentication, Informa-tion Systems Security”, volume-11, issue-02, pp ( 47-53), 2002.
[11] M.S.Hwang; L.H. Li, ”A New Remote User Authen-tication Scheme using Smart Cards”, IEEE Transactions on Consumer Electronics. Volume- 46, No.-01, pp (28-30), 2000.
[12] H.Y.Chien; J.K. Jan; Y.M. Tseng,” An efficient and practical solution to remote authentication: Smart card”, Computer Security, Volume- 21, No.-04, pp ( 372-375), 2000.
[13] I-En Liao; Cheng-Chi Lee; Min-Shiang Hwang,”A password authentication scheme over insecure networks”, J. Computer System Science, Volume- 72, No.-04 pp ( 727-740), 2006.
[14] Multifactor Authentication, “http://searchcloudsecurity.techtarget.com/tip/Multifactor-authentication-in-the-cloud-Assessing-provider-services”, Nov. 05 2015.
[15] Chaurasia B; Shahi A.; Verma,“Authentication in Cloud Environrnent Using Two Factor Authentication”, Springer India, Third International Conference on Soft Computing for Problem Solving, Advances in Intelligent Systems and Computing 259, 2014
Citation
Sajjan Rajani, Vijay Ghorpade, Madhuri Dhange, "Multi-factor Authentication as a Service for Cloud Data Security", International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.43-46, 2016.
A Review On Cloud Data Security With MHT Based Integrity Authentication Framework
Review Paper | Conference Paper
Vol.04 , Issue.04 , pp.47-50, Jun-2016
Abstract
Cloud computing that concern the latest trend in application development for Internet services, relying on clouds of servers to manage multiple tasks that used by individual machines. So without the Internet Cloud is not for the use. The developers initiates special services, such as email, calendars, and word processing, and host them entirely online, also processing of different applications proposed by the cloud of special servers with cloud computing. Cloud storage for storing and sharing data across multiple users become more popular. Cloud computing is innovative trend that supposed to do data storing at data centres. But the limitations of cloud data security don’t prescribe cloud better. To improve data reliability and availability, cloud service providers mature strategies such as storing multiple replicas along with original datasets. Public data auditing schemes enable the users to verify their outsourced data storage without retrieving the whole dataset. Due to the efficiency and security problems the system communication overhead (bandwidth) didn’t maintains data integrity, and public auditing. The on-demand service provision with utilization of limited resources of client system benefits the client. However, data outsourcing paradigm in cloud is one of the biggest security concerns. Frequent integrity checking is needed to keep an eye on data. The proposed scheme makes use of Merkle Hash Tree (MHT) and AES algorithm to ensure data integrity at the unsecured server.
Key-Words / Index Term
Cloud, Merkle Hash Tree, Thired Party Auditor, Public Auditing
References
[1] William stalling, A Handbook on “Cryptography & Network Security, Principles & Practices” Pearson Publisher, 5th edition-2011.
[2] C. Erway, A. C. Papamanthou, and R. Tamassia, “Dynamic provable data possession” in Proc.16th ACM Conf.Comput.Commun. Security, Chicago, USA, 2009, pp. 213–222.
[3] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public audit ability and data dynamics for storage security in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5,pp. 847–859, May 2011.
[4] C. Liu, J. Chen, L. T. Yang, X. Zhang, C. Yang, R. Ranjan, and K. Ramamohanarao, “Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates,” IEEE Trans. Parallel Distrib. Syst. 2014.
[5] Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Senior Member “ MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud ” IEEE Transactions On Computers, Vol. 64, No. 9, September 2015.
[6] Yubin Xia, Yutao Liu, Haibing Guan, Yunji Chen, Tianshi Chen, Binyu Zang, Haibo Chen, “Secure Outsourcing of Virtual Appliance” IEEE Transactions on Cloud Computing DOI. 2015
[7] Christina Delimitrou and Christos Kozyrakis Security Implications of Data Mining in Cloud Scheduling”, IEEE Computer Architecture Letters 2015.
[8] Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang and Yang Xiang Senior Member, IEEE and Mohammad Mehedi Hassan Member, IEEE and Abdulhameed Alelaiwi Member, IEEE “Secure Distributed Deduplication Systems with Improved Reliability” IEEE Transactions on Computers 2015.
[9] Sumitra Samal, Barkha Agrawal, Richa Parija “A Study on Different Symmetric Key Cryptographic Algorithm” Vol. 8 No.4 Page no (1-5) Apr 2016.
[9] IEEE Explore Abstract, http://ieeexplore.ieee.org March 11 2016.
[10] Amazon Web Services, https://aws.amazon.com/, Feb 10 2016.
[11 Data security in cloud computing, https://www.youtube.com/ March 20 2016.
[12] Open Stack Open Source Cloud Software, http://openstack.org/
Feb 15 2016.
Citation
Sajjan R.S., Vijay R. Ghorpade and Arkas B.D., "A Review On Cloud Data Security With MHT Based Integrity Authentication Framework", International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.47-50, 2016.
Content Based Medical Image Retrieval-A Survey
Survey Paper | Journal Paper
Vol.04 , Issue.04 , pp.51-53, Jun-2016
Abstract
In today’s world medical images play a vital role. Retrieving the correct information from medical images is the very difficult and time consuming. This paper presents the overview of content based image retrieval processing such as how medical images are processed and what are the techniques used for processing. This paper also discusses the difficulties in processing of the medical images and how to overcome difficulties. This paper overall gives an innovative idea of how content based image retrieval is employed in the medical images.
Key-Words / Index Term
CBIR, Image Retrieval, Annotation, CBIRMI
References
[1] P.Ghosh, S.Antani, L. R. Long and G.R.Thoma, "Review of medical image retrieval systems and future directions," Computer-Based Medical Systems(CBMS), 2011 24th International Symposium on, Bristol, 2011, pp.1-6.
[2] P. M. Willy and K. H. Kufer, "Content-based medical image retrieval (CBMIR): an intelligent retrieval system for handling multiple organs of interest," Computer-Based Medical Systems, 2004. CBMS 2004. Proceedings. 17th IEEE Symposium on, 2004, pp. 103-108.
[3] S. Bhadoria and C. G. Dethe, "Study of Medical Image Retrieval," Data Storage and Data Engineering (DSDE), 2010 International Conference on, Bangalore, 2010, pp. 192-196.
[4] Validation in Medical Image Processing "IEEE Transactions on Medical Imaging 2006;25(11):1405-9".
[5] Challenges of medical image processing –Ingrid Scholl • Til Aach • Thomas M. Deserno •Torsten Kuhlen Published online: 23 December 2010 © Springer-Verlag 2010 Comput Sci Res Dev (2011) 26: 5–13 DOI 10.1007/s00450-010-0146-9.
[6] BerteroMA, Poggio T, Torre V (1988) Ill-posed problems in early vision. Proc IEEE 76(8):869–889 inserm-00330525, version 1 - 21 Oct 2008.
[7] Hentschel B, Bischof C, Kuhlen T (2007) Comparative visualization of human nasal airflows. Medicine meets virtual reality 15. IOS Press, Amsterdam.
[8] Guthe S, Wand M, Gonser J, Strasser W (2002) Interactive rendering of large volume data sets. IEEE Trans Vis Computer Graph 9(3):53–60.
[9] Gobbetti E, Marton F, Guitián JA (2008) A single-pass GPU ray casting framework for interactive out-of-core rendering of massive volumetric datasets. Visual. Computing 24:797–806.
[10] Coveney PV (2005) Scientific grid computing. Philos Transact A Math Physics Engineer Science 363(1833):1707–1713.
[11] Strengert M, Magallón M,Weiskopf D, Guthe S, Ertl T (2004) Hierarchical visualization and compression of large volume datasets using GPU clusters. In: Eurographics symposium on parallel graphics and visualization.
[12] Strengert M, Magallón M, Weiskopf D, Guthe S, Ertl T(2005) Large volume visualization of compressed time-dependent datasets on GPU clusters. Parallel Computer 31(2):205–219.
[13] Sasi Kumar. M et. al. Medical Image Matching and Retrieval using Discrete Sine Transform (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 09, 2010, 2880-2882.
Citation
Manjula Gururaj Rao H and Dr. G.S Nagaraja, "Content Based Medical Image Retrieval-A Survey", International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.51-53, 2016.